17551563. DETECTING WEB RESOURCES SPOOFING THROUGH STYLISTIC FINGERPRINTS simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

DETECTING WEB RESOURCES SPOOFING THROUGH STYLISTIC FINGERPRINTS

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Xu Lin of Chicago IL (US)

Frederico Araujo of White Plains NY (US)

Teryl Paul Taylor of Danbury CT (US)

DETECTING WEB RESOURCES SPOOFING THROUGH STYLISTIC FINGERPRINTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17551563 titled 'DETECTING WEB RESOURCES SPOOFING THROUGH STYLISTIC FINGERPRINTS

Simplified Explanation

The abstract describes a method for detecting deceptive web activity using an intermediary between a client device and a server hosting a web application. Here are the key points:

  • The method starts with a bootstrap phase to create a database of client characteristics.
  • When a page is requested by the client, the server injects an invisible DOM element with random style properties into the page.
  • The modified page is sent back to the client, and the intermediary tracks the device's styles as the client interacts with the page.
  • The intermediary uses the tracked styles to identify the client from the database.
  • Once the client is identified, the intermediary checks for spoofing attacks on the DOM element's styles.
  • By leveraging the tracked styles, the method can detect and prevent spoofing attacks on the DOM element.

Potential applications of this technology:

  • Enhancing security in web applications by detecting and preventing spoofing attacks.
  • Protecting users from deceptive web activity and fraudulent websites.
  • Improving the accuracy of user identification and authentication processes.

Problems solved by this technology:

  • Detecting and preventing spoofing attacks on web applications.
  • Identifying and tracking client devices accurately.
  • Enhancing the security and trustworthiness of online interactions.

Benefits of this technology:

  • Increased security and protection against deceptive web activity.
  • Improved user identification and authentication processes.
  • Enhanced trust and confidence in online interactions.


Original Abstract Submitted

A method of detecting deceptive web activity is implemented in an intermediary located between a requesting client device, and a server that hosts a web application. Following a bootstrap phase used to generate a database of information identifying characteristics of clients, the method begins by receiving a page directed to the client from the server. The server injects an invisible DOM element having a set of style properties associated therewith, with one of the set of style properties assigned a random value, to generate a modified page, which is returned to the client. As the client interacts with the modified page, the intermediary tracks the device's styles and uses them to identify the client from information in the database. Once the device is identified, the intermediary then detects whether a spoofing attack has occurred. By leveraging the tracked styles, a spoofing attack on the DOM element's styles may also be detected.