Patents Assigned to SHAPE SECURITY, INC.
  • Publication number: 20190312859
    Abstract: Techniques for authenticated bypass of default security countermeasures are described. A request for an electronic resource, generated at a client computing device, is received. A security token generated at the client computing device, generated using a shared secret comprising a token recipe, is received. The security token received from the client computing device is validated. Validating the security token includes verifying an identity of the client computing device. Based on validating the security token, a level of trust for the client computing device is determined. Based on the level of trust for the client computing device, a modified set of security countermeasures is selected based on a default set of one or more security countermeasures that interfere with an ability of malware to interact with the electronic resource on the client computing device. The modified set of countermeasures is applied to the request for the electronic resource.
    Type: Application
    Filed: June 25, 2019
    Publication date: October 10, 2019
    Applicant: Shape Security, Inc.
    Inventor: Siying Yang
  • Patent number: 10397265
    Abstract: Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.
    Type: Grant
    Filed: July 23, 2018
    Date of Patent: August 27, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventors: Sergey Shekyan, Michael Coates, Wesley Hales, Tim Peacock, Justin Call
  • Patent number: 10397187
    Abstract: An API call filtering system filters responses to API call requests received, via a network, from UEs. The API call filtering system is configured to require personalized API call requests wherein each API call (except for some minor exceptions) includes a unique UE identifier (“UEIN”) of the UE making the request. Using the UEIN, the web service or other service protected by the API call filtering system can be secured against excessive request iterations from a set of rogue UEs while allowing for ordinary volumes of requests of requests the UEs, wherein one or more boundaries between what is deemed to be an ordinary volume of requests and what is deemed to be excessive request iterations are determined by predetermined criteria.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: August 27, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventor: Marc Hansen
  • Patent number: 10382482
    Abstract: This document generally relates to systems, method, and other techniques for identifying and interfering with the operation of computer malware, as a mechanism for improving system security. Some implementations include a computer-implemented method by which a computer security server system performs actions including receiving a request for content directed to a particular content server system; forwarding the request to the particular content server system; receiving executable code from the particular content server system; inserting executable injection code into at least one file of the executable code; applying a security countermeasure to the combined executable code and executable injection code to create transformed code; and providing the transformed code to a client computing device.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: August 13, 2019
    Assignee: Shape Security, Inc.
    Inventors: Siying Yang, Jarrod Overson, Ben Vinegar, Bei Zhang
  • Publication number: 20190245833
    Abstract: A computer implemented method for improving security of a server computer that is configured to deliver computer program instructions to a remote client computer, and comprising, using an intermediary computer that is topologically interposed between the server computer and the remote client computer is provided. The intermediary computer is configured to intercept a first set of source code instructions from the server computer. The intermediary computer identifies first party operations that include operations on objects and the objects themselves. The intermediary computer identifies a first set of operations within the first party operations that are configured to define values for one or more objects based on one or more constants. The intermediary computer then generates a second set of operations, where the second set of operations are configured to define same values for the one or more objects, when executed by a web browser on the client computer.
    Type: Application
    Filed: December 30, 2018
    Publication date: August 8, 2019
    Applicant: Shape Security, Inc.
    Inventors: JARROD OVERSON, SIYING YANG
  • Publication number: 20190245858
    Abstract: A computer-implemented method for securing a content server system is disclosed. The method includes identifying that a request has been made by a client computing device for serving of content from the content server system; serving, to the client computing device and for execution on the client computing device, reconnaissance code that is programmed to determine whether the client computing device is human-controlled or bot-controlled; receiving, from the reconnaissance code, data that indicates whether the client computing device is human-controlled or bot-controlled; and serving follow-up content to the client computing device, wherein the make-up of the follow-up content is selected based on a determination of whether the client computing device is human-controlled or bot-controlled.
    Type: Application
    Filed: December 30, 2018
    Publication date: August 8, 2019
    Applicant: Shape Security, Inc.
    Inventors: Nwokedi Idika, Justin D. Call
  • Publication number: 20190243971
    Abstract: Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.
    Type: Application
    Filed: December 27, 2018
    Publication date: August 8, 2019
    Applicant: Shape Security, Inc.
    Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
  • Publication number: 20190243951
    Abstract: A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of the web server system that could be determined from the computer code; generating transformation information that is needed in order to reverse the modifications of the computer code to obscure the operation of the web server system; and serving to the computing client the modified code and the reverse transformation information.
    Type: Application
    Filed: December 27, 2018
    Publication date: August 8, 2019
    Applicant: Shape Security, Inc.
    Inventors: Marc R. Hansen, Sumit Agarwal, Subramanian Varadarajan, Justin D. Call
  • Patent number: 10375026
    Abstract: Systems, methods, and other techniques for improving the operation of computing systems are described. Some implementations include a computer-implemented method. The method can include intercepting, at an intermediary computing system, messages communicated between a web server system and one or more client computing devices. A subset of the intercepted messages can be selected that are determined to commonly relate to a particular web transaction. The method can identify an expression pattern that occurs in the subset of the intercepted messages, and can determine that the identified expression pattern matches a first pre-defined expression pattern from among a plurality of different pre-defined expression patterns. A status of the particular web transaction can be determined based on the first pre-defined expression pattern that matches the identified expression pattern occurring in the subset of the intercepted messages.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: August 6, 2019
    Assignee: Shape Security, Inc.
    Inventors: Siying Yang, Justin D. Call
  • Patent number: 10367903
    Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.
    Type: Grant
    Filed: May 1, 2018
    Date of Patent: July 30, 2019
    Assignee: Shape Security, Inc.
    Inventor: Zhiwei Li
  • Publication number: 20190215304
    Abstract: Techniques are provided for a security policy for browser extensions. Second detection code, when executed at a second client computing device, gathers and transmits information relating to browser extensions operating on the second client computing device. second browser extension data generated by the second detection code is received. It is determined, based the second browser extension data, that a second browser extension operating on the second client computing device is associated with a second request from the second client computing device to the first web server system. It is determined that the second browser extension is not whitelisted with respect to the first web server system. In response to determining that the second browser extension is not whitelisted with respect to the first web server system, performing a second automated response that causes the first web server system to not process the second request.
    Type: Application
    Filed: December 30, 2018
    Publication date: July 11, 2019
    Applicant: Shape Security, Inc.
    Inventors: Siying Yang, Sergey Shekyan
  • Publication number: 20190166141
    Abstract: Techniques are provided for detection of malicious activity using behavior data. A behavior model is trained with behavior data generated in association with a plurality of requests. Data is received that describes a particular request from a particular client device to a server system hosting a website. The data includes particular behavior data generated at the particular client device in association with the particular request. The particular behavior data is analyzed using the behavior model to generate a behavior model result. An automation determination for the particular request is generated based on the behavior model result. The particular request is handled based on the automation determination for the particular request.
    Type: Application
    Filed: May 22, 2018
    Publication date: May 30, 2019
    Applicant: SHAPE SECURITY, INC.
    Inventors: Ye Xu, Yao Zhao, Xinran Wang, Jarrod Overson
  • Patent number: 10298599
    Abstract: In an embodiment, a computer system is configured to improve security of server computers interacting with client computers through an intermediary computer, and comprising: a memory comprising processor logic; one or more processors coupled to the memory, wherein the one or more processors execute the processor logic, which causes the one or more processors to: intercept, from a server computer, one or more original instructions to be sent to a browser being executed on a client computer; inject, into the one or more original instructions, one or more browser detection instructions, which when executed cause one or more operations to be performed by an execution environment on the client computer and send a result that represents an internal state of the execution environment after performing the one or more operations to the intermediary computer; send the one or more original instructions with the one or more browser detection instructions to the browser; receive the result and determine whether the browse
    Type: Grant
    Filed: September 18, 2015
    Date of Patent: May 21, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventors: Bei Zhang, Sergey Shekyan
  • Publication number: 20190140835
    Abstract: Techniques are provided for blind hash compression, such as serving, from a computer server system and to a plurality of different computing devices remote from the computer server system, web code and code for reporting status of the computing devices; receiving from one or more of the computing devices, first data that indicates a parameter of the one or more computing devices, the first data in a compressed format; receiving from one or more others of the computing devices, second data that indicates the parameter of the one or more others of the computing devices, the second data in an uncompressed format; and compressing the second data and comparing the compressed second data to the first data to correlate the first data to the second data. The code for reporting status of the computing devices can include code for allowing the computing devices to determine whether to send the first or second data.
    Type: Application
    Filed: December 30, 2018
    Publication date: May 9, 2019
    Applicant: Shape Security, Inc.
    Inventors: Daniel G. Moen, Bryan D. Hanks
  • Patent number: 10230718
    Abstract: A computer-implemented method for securing a content server system is disclosed. The method includes identifying that a request has been made by a client computing device for serving of content from the content server system; serving, to the client computing device and for execution on the client computing device, reconnaissance code that is programmed to determine whether the client computing device is human-controlled or bot-controlled; receiving, from the reconnaissance code, data that indicates whether the client computing device is human-controlled or bot-controlled; and serving follow-up content to the client computing device, wherein the make-up of the follow-up content is selected based on a determination of whether the client computing device is human-controlled or bot-controlled.
    Type: Grant
    Filed: July 7, 2016
    Date of Patent: March 12, 2019
    Assignee: Shape Security, Inc.
    Inventors: Nwokedi Idika, Justin D. Call
  • Patent number: 10225255
    Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: March 5, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventors: Ganesh Jampani, Susanto Irwan
  • Patent number: 10216488
    Abstract: A computer implemented method for improving security of a server computer that is configured to deliver computer program instructions to a remote client computer, and comprising, using an intermediary computer that is topologically interposed between the server computer and the remote client computer is provided. The intermediary computer is configured to intercept a first set of source code instructions from the server computer. The intermediary computer identifies first party operations that include operations on objects and the objects themselves. The intermediary computer identifies a first set of operations within the first party operations that are configured to define values for one or more objects based on one or more constants. The intermediary computer then generates a second set of operations, where the second set of operations are configured to define same values for the one or more objects, when executed by a web browser on the client computer.
    Type: Grant
    Filed: March 14, 2016
    Date of Patent: February 26, 2019
    Assignee: Shape Security, Inc.
    Inventors: Jarrod Overson, Siying Yang
  • Patent number: 10212173
    Abstract: Computer systems and methods for improving security or performance of one or more client computers interacting with a plurality of server computers. In an embodiment, a computer system comprises a first server computer and a second server computer; wherein the first server computer is configured to: generate a challenge nonce, wherein the challenge nonce corresponds to a challenge state; generate the challenge state based on the challenge nonce, wherein the challenge state corresponds to a response state; send, to a first client computer, the challenge nonce and the challenge state, but not the response state; wherein the second server computer is configured to: receive, from the first client computer, a test nonce and a test response state; determine whether the test response state matches the response state based on the test nonce, without: receiving the challenge state from the first server computer; receiving the challenge state from the first client computer.
    Type: Grant
    Filed: March 12, 2018
    Date of Patent: February 19, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventor: Michael J. Ficarra
  • Patent number: 10212130
    Abstract: Methods and apparatus are described for detecting browser extensions. Specific implementations relate to configurable security policies and automated actions performed in response to the detection of browser extensions.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: February 19, 2019
    Assignee: Shape Security, Inc.
    Inventors: Siying Yang, Sergey Shekyan
  • Publication number: 20190042394
    Abstract: In an embodiment, a method comprises rendering a first image of a first user interface based on a first set of instructions; rendering a second image of a second user interface based on a second set of instructions; generating a first mask comprising a plurality of points, wherein each point in the first mask indicates whether a first point in the first image and a second point in the second image are different; rendering a third image of a third user interface based on a third set of instructions, wherein the first set of instructions are different than the third set of instructions and the first image is different than the third image; determining that the first image is equivalent to the third image based on the first image, the first mask, and the third image.
    Type: Application
    Filed: October 2, 2018
    Publication date: February 7, 2019
    Applicant: SHAPE SECURITY, INC.
    Inventor: SUBRAMANIAN VARADARAJAN