BLUECAVA, INC. Patent applications |
Patent application number | Title | Published |
20150350244 | DETECTION OF SPOOFING OF REMOTE CLIENT SYSTEM INFORMATION - Digital fingerprint generation logic executed by a client device includes quirk-exposing logic configured to expose behavioral differences between various system configurations of client devices. The digital fingerprint generation logic queries a remote client device for system configuration, and generates a digital fingerprint of the client device that includes a system configuration characteristic reported by the client device in response to the query. Results of execution of the quirk-exposing logic are compared to expected results that are specific to the reported system configuration. If the results of execution do not match the expected results, the digital fingerprint is determined to have been spoofed. | 12-03-2015 |
20150127825 | INCREMENTAL BROWSER-BASED DEVICE FINGERPRINTING - A method for incrementally fingerprinting a computing device includes steps for executing device-identification code programmed to retrieve a complete set of device configuration metrics from a web browser of the computing device, interrupting execution of the device-identification code after retrieval of a first subset of the device configuration metrics, generating a partial device fingerprint from the first subset, generating a temporary device identifier from the partial device fingerprint, and generating a subset indicator identifying the device configuration metrics that compose the first subset. Additional steps include writing the temporary device identifier and the subset indicator to browser-based storage of the computing device, resuming execution of the device-identification code, querying the browser-based storage for presence of the temporary device identifier, and retrieving, responsive to detecting the temporary device identifier, a second subset of the device configuration metrics, the second subset comprising device configuration metrics not identified by the subset indicator. | 05-07-2015 |
20140310773 | BROWSER ACCESS TO NATIVE CODE DEVICE IDENTIFICATION - A thick client installed on a client device includes a network protocol server that serves thin client requests for digital fingerprints of the client device. A thin client requests a digital fingerprint of the client device in which the thin client is executing by forming a URL according to a protocol served by the server of the thick client and addressing the URL to the local client device. The thick client returns the digital fingerprint as a response to the request from the thin client. | 10-16-2014 |
20140122684 | EARLY ACCESS TO USER-SPECIFIC DATA FOR BEHAVIOR PREDICTION - A device-indexed data server associates persistent device identifiers of client computing devices with user behavior data devoid of personally identifiable information (PII). User behavior data and PII are aggregated by an off-line data aggregator and associated with non-persistent non-PII user identifiers. Users visiting third party web sites are authenticated by their device identifiers, and identified to the device-indexed data server by the device identifier or by the non-PII user identifier. The device-indexed data server retrieves from the aggregator user behavior data associated with the non-PII user identifier, returns the data to the third party server, and maintains records of user behavior associated with persistent device identifiers without maintaining PII. Subsequent user visits to any third party server can thereby be customized according to known user behavior without first requiring the user to identify herself. | 05-01-2014 |
20140026220 | DETECTION OF SPOOFING OF REMOTE CLIENT SYSTEM INFORMATION - Digital fingerprint generation logic executed by a client device includes quirk-exposing logic configured to expose behavioral differences between various system configurations of client devices. The digital fingerprint generation logic queries a remote client device for system configuration, and generates a digital fingerprint of the client device that includes a system configuration characteristic reported by the client device in response to the query. Results of execution of the quirk-exposing logic are compared to expected results that are specific to the reported system configuration. If the results of execution do not match the expected results, the digital fingerprint is determined to have been spoofed. | 01-23-2014 |
20140025791 | Incremental Browser-Based Device Fingerprinting - A method for incrementally fingerprinting a computing device includes steps for executing device-identification code programmed to retrieve a complete set of device configuration metrics from a web browser of the computing device, interrupting execution of the device-identification code after retrieval of a first subset of the device configuration metrics, generating a partial device fingerprint from the first subset, generating a temporary device identifier from the partial device fingerprint, and generating a subset indicator identifying the device configuration metrics that compose the first subset. Additional steps include writing the temporary device identifier and the subset indicator to browser-based storage of the computing device, resuming execution of the device-identification code, querying the browser-based storage for presence of the temporary device identifier, and retrieving, responsive to detecting the temporary device identifier, a second subset of the device configuration metrics, the second subset comprising device configuration metrics not identified by the subset indicator. | 01-23-2014 |