Patents Assigned to SHAPE SECURITY, INC.
  • Publication number: 20190245833
    Abstract: A computer implemented method for improving security of a server computer that is configured to deliver computer program instructions to a remote client computer, and comprising, using an intermediary computer that is topologically interposed between the server computer and the remote client computer is provided. The intermediary computer is configured to intercept a first set of source code instructions from the server computer. The intermediary computer identifies first party operations that include operations on objects and the objects themselves. The intermediary computer identifies a first set of operations within the first party operations that are configured to define values for one or more objects based on one or more constants. The intermediary computer then generates a second set of operations, where the second set of operations are configured to define same values for the one or more objects, when executed by a web browser on the client computer.
    Type: Application
    Filed: December 30, 2018
    Publication date: August 8, 2019
    Applicant: Shape Security, Inc.
    Inventors: JARROD OVERSON, SIYING YANG
  • Publication number: 20190245858
    Abstract: A computer-implemented method for securing a content server system is disclosed. The method includes identifying that a request has been made by a client computing device for serving of content from the content server system; serving, to the client computing device and for execution on the client computing device, reconnaissance code that is programmed to determine whether the client computing device is human-controlled or bot-controlled; receiving, from the reconnaissance code, data that indicates whether the client computing device is human-controlled or bot-controlled; and serving follow-up content to the client computing device, wherein the make-up of the follow-up content is selected based on a determination of whether the client computing device is human-controlled or bot-controlled.
    Type: Application
    Filed: December 30, 2018
    Publication date: August 8, 2019
    Applicant: Shape Security, Inc.
    Inventors: Nwokedi Idika, Justin D. Call
  • Patent number: 10375026
    Abstract: Systems, methods, and other techniques for improving the operation of computing systems are described. Some implementations include a computer-implemented method. The method can include intercepting, at an intermediary computing system, messages communicated between a web server system and one or more client computing devices. A subset of the intercepted messages can be selected that are determined to commonly relate to a particular web transaction. The method can identify an expression pattern that occurs in the subset of the intercepted messages, and can determine that the identified expression pattern matches a first pre-defined expression pattern from among a plurality of different pre-defined expression patterns. A status of the particular web transaction can be determined based on the first pre-defined expression pattern that matches the identified expression pattern occurring in the subset of the intercepted messages.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: August 6, 2019
    Assignee: Shape Security, Inc.
    Inventors: Siying Yang, Justin D. Call
  • Patent number: 10367903
    Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.
    Type: Grant
    Filed: May 1, 2018
    Date of Patent: July 30, 2019
    Assignee: Shape Security, Inc.
    Inventor: Zhiwei Li
  • Publication number: 20190215304
    Abstract: Techniques are provided for a security policy for browser extensions. Second detection code, when executed at a second client computing device, gathers and transmits information relating to browser extensions operating on the second client computing device. second browser extension data generated by the second detection code is received. It is determined, based the second browser extension data, that a second browser extension operating on the second client computing device is associated with a second request from the second client computing device to the first web server system. It is determined that the second browser extension is not whitelisted with respect to the first web server system. In response to determining that the second browser extension is not whitelisted with respect to the first web server system, performing a second automated response that causes the first web server system to not process the second request.
    Type: Application
    Filed: December 30, 2018
    Publication date: July 11, 2019
    Applicant: Shape Security, Inc.
    Inventors: Siying Yang, Sergey Shekyan
  • Publication number: 20190166141
    Abstract: Techniques are provided for detection of malicious activity using behavior data. A behavior model is trained with behavior data generated in association with a plurality of requests. Data is received that describes a particular request from a particular client device to a server system hosting a website. The data includes particular behavior data generated at the particular client device in association with the particular request. The particular behavior data is analyzed using the behavior model to generate a behavior model result. An automation determination for the particular request is generated based on the behavior model result. The particular request is handled based on the automation determination for the particular request.
    Type: Application
    Filed: May 22, 2018
    Publication date: May 30, 2019
    Applicant: SHAPE SECURITY, INC.
    Inventors: Ye Xu, Yao Zhao, Xinran Wang, Jarrod Overson
  • Patent number: 10298599
    Abstract: In an embodiment, a computer system is configured to improve security of server computers interacting with client computers through an intermediary computer, and comprising: a memory comprising processor logic; one or more processors coupled to the memory, wherein the one or more processors execute the processor logic, which causes the one or more processors to: intercept, from a server computer, one or more original instructions to be sent to a browser being executed on a client computer; inject, into the one or more original instructions, one or more browser detection instructions, which when executed cause one or more operations to be performed by an execution environment on the client computer and send a result that represents an internal state of the execution environment after performing the one or more operations to the intermediary computer; send the one or more original instructions with the one or more browser detection instructions to the browser; receive the result and determine whether the browse
    Type: Grant
    Filed: September 18, 2015
    Date of Patent: May 21, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventors: Bei Zhang, Sergey Shekyan
  • Publication number: 20190140835
    Abstract: Techniques are provided for blind hash compression, such as serving, from a computer server system and to a plurality of different computing devices remote from the computer server system, web code and code for reporting status of the computing devices; receiving from one or more of the computing devices, first data that indicates a parameter of the one or more computing devices, the first data in a compressed format; receiving from one or more others of the computing devices, second data that indicates the parameter of the one or more others of the computing devices, the second data in an uncompressed format; and compressing the second data and comparing the compressed second data to the first data to correlate the first data to the second data. The code for reporting status of the computing devices can include code for allowing the computing devices to determine whether to send the first or second data.
    Type: Application
    Filed: December 30, 2018
    Publication date: May 9, 2019
    Applicant: Shape Security, Inc.
    Inventors: Daniel G. Moen, Bryan D. Hanks
  • Patent number: 10230718
    Abstract: A computer-implemented method for securing a content server system is disclosed. The method includes identifying that a request has been made by a client computing device for serving of content from the content server system; serving, to the client computing device and for execution on the client computing device, reconnaissance code that is programmed to determine whether the client computing device is human-controlled or bot-controlled; receiving, from the reconnaissance code, data that indicates whether the client computing device is human-controlled or bot-controlled; and serving follow-up content to the client computing device, wherein the make-up of the follow-up content is selected based on a determination of whether the client computing device is human-controlled or bot-controlled.
    Type: Grant
    Filed: July 7, 2016
    Date of Patent: March 12, 2019
    Assignee: Shape Security, Inc.
    Inventors: Nwokedi Idika, Justin D. Call
  • Patent number: 10225255
    Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: March 5, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventors: Ganesh Jampani, Susanto Irwan
  • Patent number: 10216488
    Abstract: A computer implemented method for improving security of a server computer that is configured to deliver computer program instructions to a remote client computer, and comprising, using an intermediary computer that is topologically interposed between the server computer and the remote client computer is provided. The intermediary computer is configured to intercept a first set of source code instructions from the server computer. The intermediary computer identifies first party operations that include operations on objects and the objects themselves. The intermediary computer identifies a first set of operations within the first party operations that are configured to define values for one or more objects based on one or more constants. The intermediary computer then generates a second set of operations, where the second set of operations are configured to define same values for the one or more objects, when executed by a web browser on the client computer.
    Type: Grant
    Filed: March 14, 2016
    Date of Patent: February 26, 2019
    Assignee: Shape Security, Inc.
    Inventors: Jarrod Overson, Siying Yang
  • Patent number: 10212173
    Abstract: Computer systems and methods for improving security or performance of one or more client computers interacting with a plurality of server computers. In an embodiment, a computer system comprises a first server computer and a second server computer; wherein the first server computer is configured to: generate a challenge nonce, wherein the challenge nonce corresponds to a challenge state; generate the challenge state based on the challenge nonce, wherein the challenge state corresponds to a response state; send, to a first client computer, the challenge nonce and the challenge state, but not the response state; wherein the second server computer is configured to: receive, from the first client computer, a test nonce and a test response state; determine whether the test response state matches the response state based on the test nonce, without: receiving the challenge state from the first server computer; receiving the challenge state from the first client computer.
    Type: Grant
    Filed: March 12, 2018
    Date of Patent: February 19, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventor: Michael J. Ficarra
  • Patent number: 10212130
    Abstract: Methods and apparatus are described for detecting browser extensions. Specific implementations relate to configurable security policies and automated actions performed in response to the detection of browser extensions.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: February 19, 2019
    Assignee: Shape Security, Inc.
    Inventors: Siying Yang, Sergey Shekyan
  • Publication number: 20190042394
    Abstract: In an embodiment, a method comprises rendering a first image of a first user interface based on a first set of instructions; rendering a second image of a second user interface based on a second set of instructions; generating a first mask comprising a plurality of points, wherein each point in the first mask indicates whether a first point in the first image and a second point in the second image are different; rendering a third image of a third user interface based on a third set of instructions, wherein the first set of instructions are different than the third set of instructions and the first image is different than the third image; determining that the first image is equivalent to the third image based on the first image, the first mask, and the third image.
    Type: Application
    Filed: October 2, 2018
    Publication date: February 7, 2019
    Applicant: SHAPE SECURITY, INC.
    Inventor: SUBRAMANIAN VARADARAJAN
  • Patent number: 10187408
    Abstract: A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party, the data including data that characterizes (a) the client computing devices and (b) user interaction with the client computing devices; classifying the client computing devices as controlled by actual users or instead by automated software based on analysis of the received data from the client computing devices; and providing to the third party one or more reports that characterize an overall level of automated software activity among client computing devices that have been served code by the third party.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: January 22, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventors: Justin D. Call, Xinran Wang, Yao Zhao, Timothy Dylan Peacock
  • Publication number: 20190007444
    Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.
    Type: Application
    Filed: July 23, 2018
    Publication date: January 3, 2019
    Applicant: SHAPE SECURITY, INC.
    Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
  • Publication number: 20190007387
    Abstract: Techniques are provided for secure detection and management of compromised credentials. A first candidate credential is received, comprising a first username and a first password, wherein the first candidate credential was sent in a first request from a first client computer to log in to a first server computer. A first salt associated with the first username in a salt database is obtained. A first hashed credential is generated based on the first password and the first salt. The first hashed credential is transmitted to a set model server computer, wherein the set model server computer is configured to maintain a set model that represents a set of spilled credentials, determine whether the first hashed credential is represented in the set model, and in response to determining that the first hashed credential is represented in the set model, performing additional processing on the first hashed credential.
    Type: Application
    Filed: July 2, 2018
    Publication date: January 3, 2019
    Applicant: SHAPE SECURITY, INC.
    Inventors: Zhipu Jin, Gautam Agrawal, Daniel G. Moen, Weiguo Liang, Xingang Wang
  • Publication number: 20190007428
    Abstract: Techniques are provided for detecting compromised credentials in a credential stuffing attack. A set model is trained based on a first set of spilled credentials. The set model does not comprise any credential of the first set of spilled credentials. A first request is received from a client computer with a first candidate credential to login to a server computer. The first candidate credential is tested for membership in the first set of spilled credentials using the set model. In response to determining the first set of spilled credentials includes the first candidate credential using the set model, one or more negative actions is performed.
    Type: Application
    Filed: June 29, 2018
    Publication date: January 3, 2019
    Applicant: SHAPE SECURITY, INC.
    Inventors: Daniel G Moen, Carl Schroeder
  • Publication number: 20180359216
    Abstract: An API call filtering system filters responses to API call requests received, via a network, from UEs. The API call filtering system is configured to require personalized API call requests wherein each API call (except for some minor exceptions) includes a unique UE identifier (“UEIN”) of the UE making the request. Using the UEIN, the web service or other service protected by the API call filtering system can be secured against excessive request iterations from a set of rogue UEs while allowing for ordinary volumes of requests of requests the UEs, wherein one or more boundaries between what is deemed to be an ordinary volume of requests and what is deemed to be excessive request iterations are determined by predetermined criteria.
    Type: Application
    Filed: August 13, 2018
    Publication date: December 13, 2018
    Applicant: SHAPE SECURITY, INC.
    Inventor: Marc Hansen
  • Patent number: 10129289
    Abstract: In an embodiment, a computer system is configured to receive, from a client computer, a request with one or more values; determine, based on the one or more values, whether the request is from a platform-specific application compiled for a first computer platform; determine, based on the one or more values, whether the platform-specific application is being executed within an emulator being executed by a second computer platform, wherein the second computer platform is different than the first computer platform.
    Type: Grant
    Filed: March 11, 2016
    Date of Patent: November 13, 2018
    Assignee: Shape Security, Inc.
    Inventors: Siying Yang, Shuman Ghosemajumder