US 12,483,567 B2
Malicious request detection
Marina Grechuhin, New York, NY (US); Moshe Ingber, New York, NY (US); and Ori Gold, New York, NY (US)
Assigned to HUMAN SECURITY, INC., New York, NY (US)
Filed by HUMAN SECURITY, INC., New York, NY (US)
Filed on Nov. 14, 2023, as Appl. No. 18/389,475.
Prior Publication US 2025/0159000 A1, May 15, 2025
Int. Cl. H04L 9/40 (2022.01); G06N 20/00 (2019.01)
CPC H04L 63/1416 (2013.01) [G06N 20/00 (2019.01); H04L 63/10 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A method, comprising:
collecting page data of a website, and information of a user request;
generating an algorithm and a baseline of authorized activity with the collected page data and the information of the user request, wherein the baseline is generated by determining a query depth, a number of queries sent in the user request, variable keys and if they are used, and a category of the user request;
establishing legitimacy of the user request based on the baseline, wherein the user request is established as legitimate when the information of the user request is within the baseline, and wherein the user request is established as illegitimate when the information of the user request lie outside of the baseline; and
controlling access to a web application based on the legitimacy of the user request by
granting access to the web application when the user request is established as legitimate; and
denying access to the web application when the request is established as illegitimate.