System and method of using spatial and temporal signals to identify and prevent attacks
First Claim
1. A method of determining the validity of a request for information over a network, the method comprising:
- storing a plurality of threshold values each associated with a geographic location, the threshold values corresponding to a distance from their respective geographic locations;
receiving, by one or more processors, from a first device of the network, a request for information regarding a target identified by the first device in the request for information, the target having an associated target geographic location, and the request including information indicating a device geographic location of the first device;
selecting, by the one or more processors, a threshold value from the plurality of stored threshold values based on the target geographic location; and
determining, by a second device of the network, if the request for information is a valid request, where the valid request identifies the target geographic location as being less than a threshold distance from the device geographic location of the first device.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods according to aspects of the invention verify requests for information over a network. Computing devices communicating over a network transmit numerous signals with various types of information including spatial information, temporal information, device-specific information, and transmission specific information. This information may be used to generate statistical records of valid request for information. Various combinations of these signals may be used to determine whether a request for information is a valid request based on the statistical records associated with the signals. Where a request for information has been verified, the system and method may provide the information. Where the request for information has not been verified, the system and method may deny the request for information. Thus the system and method may be used to prevent and block scraping and spamming attacks.
40 Citations
17 Claims
-
1. A method of determining the validity of a request for information over a network, the method comprising:
-
storing a plurality of threshold values each associated with a geographic location, the threshold values corresponding to a distance from their respective geographic locations; receiving, by one or more processors, from a first device of the network, a request for information regarding a target identified by the first device in the request for information, the target having an associated target geographic location, and the request including information indicating a device geographic location of the first device; selecting, by the one or more processors, a threshold value from the plurality of stored threshold values based on the target geographic location; and determining, by a second device of the network, if the request for information is a valid request, where the valid request identifies the target geographic location as being less than a threshold distance from the device geographic location of the first device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for determining the validity of a request for information over a network, the method comprising:
-
one or more memories storing a plurality of threshold values each associated with a geographic location, the threshold values corresponding to a distance from their respective geographic locations; one or more processors in communication with the one or more memories and configured to; receive from a first device of the network, a request for information regarding a target identified by the first device in the request for information, the target having an associated target geographic location, and the request including information indicating a device geographic location of the first device; select a threshold value from the plurality of stored threshold values based on the target geographic location; and determine if the request for information is a valid request, where the valid request identifies the target geographic location as being less than a threshold distance from the device geographic location of the first device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium storing instructions executable by one or more processors to perform a method of determining the validity of a request for information over a network, the method comprising:
-
storing a plurality of threshold values each associated with a geographic location, the threshold values corresponding to a distance from their respective geographic locations; receiving from a first device of the network, a request for information identifying a target identified by the first device in the request for information, the target having an associated target geographic location, and the request including information indicating a device geographic location of the first device; selecting a threshold value from the plurality of stored threshold values based on the target geographic location; and determining if the request for information is a valid request, where the valid request identifies the target geographic location as being less than a threshold distance from the device geographic location of the first device.
-
Specification