US 12,218,916 B2
Systems, methods and media for the creation of a protective layer between an application and a cybersecurity risk
Nate Kharrl, San Jose, CA (US); and Colben Matthew Kharrl, Goodyear, AZ (US)
Assigned to SpecTrust, Inc., San Jose, CA (US)
Filed by SpecTrust, Inc., San Jose, CA (US)
Filed on Dec. 28, 2021, as Appl. No. 17/564,014.
Prior Publication US 2023/0208814 A1, Jun. 29, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/0281 (2013.01) [H04L 63/1433 (2013.01)] 48 Claims
OG exemplary drawing
 
1. An intelligent secure networked system configured by at least one processor to execute instructions stored in memory to form a protective layer between an application and a cybersecurity risk, the system comprising:
an HTTPS load balancer in communication with a controller/proxy, the controller/proxy configured to detect relevant user data contained in a first request, to create a copy of the relevant user data, and to determine what session the relevant user data is to be associated;
the controller/proxy in communication with a session database, a secrets management server and a workflow engine, the workflow engine in communication with the session database, the secrets management server and an integration station;
the session database configured, by the at least one processor and the memory, to collate and store session information, the session information including requests that are received concurrently, unordered, or in unsigned form and subsequently collated by the system and attributed to a device of a specific end-user, the attribution to the device of the specific end-user being effected by:
generating, by the at least one processor, a technical fingerprint using probabilistic matching of common message characteristics and device and network attributes in the concurrent, unordered, and unsigned requests; and
using, by the at least one processor, the technical fingerprint with a fuzzy matching algorithm to compare a first received request to a second received request; and
a hub server in communication with the session database, the secrets management server, and a hub client.