Web-authorization using enhanced cookie

    公开(公告)号:US12199987B2

    公开(公告)日:2025-01-14

    申请号:US18102074

    申请日:2023-01-26

    Applicant: Intuit Inc.

    Abstract: A method is provided for authenticating a user. A request to access a resource is received from a user agent. A cookie associated with the request is identified. The cookie includes a first subset of data that was previously used to authenticate the user. The cookie is validated based on the first subset of the data. Responsive to validating the cookie, a second subset of the data is retrieved from server-side storage. A risk decision is generated based on the first subset and the second subset. When the risk decision meets a threshold, the user is authenticated without presenting an authentication challenge, and access to the resources permitted.

    Detection of abnormal application programming interface (API) sessions including a sequence of API requests using space partitioning data structures

    公开(公告)号:US11921847B1

    公开(公告)日:2024-03-05

    申请号:US18351703

    申请日:2023-07-13

    Applicant: INTUIT INC.

    CPC classification number: G06F21/552 G06F21/54

    Abstract: A computer-implemented method includes receiving training data that includes a plurality of API requests from a plurality of client devices. The method includes generating a plurality of permissible API sessions based on the training data. Each of the permissible API sessions is associated with a corresponding client device of the plurality of client devices and includes a sequence of API requests originating from the corresponding client device. The method includes applying a sequence embedding technique to the plurality of permissible API sessions to generate a plurality of embeddings and applying a dimensionality reduction technique to the plurality of embedding to generate a plurality of compact embeddings. The method includes storing each of the compact embeddings in a space partitioning data structure at storage locations within the space partitioning data structure that are determined based on similarities between the compact embeddings.

    Detection of abnormal application programming interface (API) sessions including a sequence of API requests

    公开(公告)号:US11900179B1

    公开(公告)日:2024-02-13

    申请号:US18351715

    申请日:2023-07-13

    Applicant: INTUIT INC.

    CPC classification number: G06F9/541 G06F21/552 H04L63/00 H04L63/14

    Abstract: A computer-implemented method includes receiving training data including a plurality of API requests from a plurality of client devices. The method includes generating a plurality of permissible API sessions based on the training data. The method includes applying a sequence embedding technique to the plurality of permissible API sessions to generate a plurality of embeddings. The method includes applying a dimensionality reduction technique to the plurality of embeddings to generate a plurality of compact embeddings. The method includes applying a clustering technique to the plurality of compact embeddings to determine a plurality of different clusters of the compact embeddings. The method includes generating a plurality of patterns based on the plurality of different clusters. Each of the plurality of patterns is descriptive of permissible API sessions associated with a corresponding cluster of the plurality of different clusters.

    Homomorphic key derivation
    7.
    发明授权

    公开(公告)号:US11546149B2

    公开(公告)日:2023-01-03

    申请号:US17202280

    申请日:2021-03-15

    Applicant: INTUIT INC.

    Abstract: A processor of a remote crypto cluster (RCC) may receive a public key from a client device through at least one network. The processor of the RCC may obtain an encrypted specific key and a blinded project key from at least one data source through the at least one network. The processor of the RCC may derive a derived key in blind based on the encrypted specific key and the blinded project key. The processor of the RCC may send the derived key in blind to the client device.

    Privacy preserving oracle
    9.
    发明授权

    公开(公告)号:US11381381B2

    公开(公告)日:2022-07-05

    申请号:US16427549

    申请日:2019-05-31

    Applicant: INTUIT INC.

    Abstract: Certain aspects of the present disclosure provide techniques for performing computations on encrypted data. One example method generally includes obtaining, at a computing device, encrypted data, wherein the encrypted data is encrypted using fully homomorphic encryption and performing at least one computation on the encrypted data while the encrypted data remains encrypted. The method further includes identifying a clear data operation to perform on the encrypted data and transmitting, from the computing device to a server, a request to perform the clear data operation on the encrypted data, wherein the request includes the encrypted data. The method further includes receiving, at the computing device in response to the request, encrypted output from the server, wherein the encrypted output is of the same size and the same format for all encrypted data transmitted to the server.

    Systems and methods for blocking decryption capabilities in symmetric key encryption

    公开(公告)号:US12212671B2

    公开(公告)日:2025-01-28

    申请号:US18485165

    申请日:2023-10-11

    Applicant: INTUIT INC.

    Abstract: Systems and methods that may be used to provide policies and protocols for blocking decryption capabilities in symmetric key encryption using a unique protocol in which key derivation may include injecting a random string into each key derivation. For example, a policy may be assigned to each client device indicating whether the client device has been assigned encryption only permission or full access permission to both encrypt and decrypt data. The disclosed protocol prevents client devices with encryption only permission from obtaining keys for decryption.

Patent Agency Ranking