Google llc (20240187420). SECURING BROWSER COOKIES simplified abstract

From WikiPatents
Jump to navigation Jump to search

SECURING BROWSER COOKIES

Organization Name

google llc

Inventor(s)

Gang Wang of Frederick MD (US)

Marcel M. Moti Yung of New York NY (US)

SECURING BROWSER COOKIES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240187420 titled 'SECURING BROWSER COOKIES

Simplified Explanation

The patent application describes a method, system, and apparatus for verifying the integrity of requests using an attestation token provided by an application.

  • The method involves receiving a request from an application containing an attestation token with a set of data including a public key and token creation time.
  • The attestation token also includes a signature generated using a private key corresponding to the public key.
  • The integrity of the request is verified by checking if the token creation time is within a threshold duration of the time the request was received.
  • Additionally, the verification includes ensuring that the set of data has not been tampered with.

Potential Applications

This technology can be applied in secure communication systems, authentication processes, and data integrity verification in various industries.

Problems Solved

This technology solves the problem of verifying the integrity of requests and ensuring that the data has not been altered during transmission.

Benefits

The benefits of this technology include enhanced security, data integrity assurance, and protection against unauthorized access or tampering.

Potential Commercial Applications

Potential commercial applications of this technology include secure messaging platforms, financial transactions, and secure data transfer systems.

Possible Prior Art

One possible prior art for this technology could be methods of digital signature verification and data integrity checks in secure communication systems.

What are the potential limitations of this technology in real-world applications?

One potential limitation of this technology in real-world applications could be the computational overhead required for verifying the integrity of requests, especially in high-volume systems.

How does this technology compare to existing methods of request verification and data integrity checks?

This technology improves upon existing methods by providing a secure and efficient way to verify the integrity of requests using attestation tokens and digital signatures.


Original Abstract Submitted

methods, systems, and apparatus, including an apparatus for verifying the integrity of requests. in some aspects, a method includes receiving, from an application, a request including an attestation token of the application. the attestation token includes a set of data that includes at least a public key of the application and a token creation time that indicates a time at which the attestation token was created. the attestation also includes a signature of the set of data. the signature is generated using a private key that corresponds to the public key. the integrity of the request is verified using the attestation token. the verification includes determining that the integrity of the request is valid based on a determination that the token creation time is within a threshold duration of the time at which the request was received and a determination that the set of data has not been.