Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for realizing Phishing identification based on challenge password token

A technology of challenging passwords and phishing websites, applied in the information field, can solve problems such as user loss, counterfeiting of legitimate user identities, and information theft cannot be guaranteed, and achieve the effect of increasing security, improving security, and preventing user property loss

Inactive Publication Date: 2011-08-31
SHANGHAI PEOPLENET SECURITY TECH
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the password used by the user is different each time, even if the hacker intercepts the password once, it cannot use this password to impersonate a legitimate user
[0005] Dynamic password authentication has strengthened the security of users' account information access and other operations to a certain extent, but it still cannot guarantee the security in the event of information theft.
For example, some current phishing websites, by introducing users to illegal websites, provide a user interface very similar to regular online banking websites, and induce users to enter their own account information, such as user names, passwords and even bank accounts, without vigilance. Dynamic authentication password, the phishing website immediately logs in to the official online banking website after obtaining the information, and then performs online banking operations, such as transfer or online banking consumption, causing great losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for realizing Phishing identification based on challenge password token
  • System and method for realizing Phishing identification based on challenge password token
  • System and method for realizing Phishing identification based on challenge password token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0048] like figure 1 As shown, it is a schematic diagram of the composition of a phishing website identification system based on a challenge password token in Embodiment 1 of the present invention, and the system includes:

[0049] An identification code generation module, the identification code generation module is located in the website, and is used to generate a group of dynamic identification codes according to the website identification code, the personal account information input by the user and the current time factor when the user performs an account operation;

[0050] The challenge password token is used to generate a set of dynamic authentication codes, and match the dynamic identification codes and dynamic authentication codes to perform website identity authentication.

[0051] Said sites include banking or other payment sites.

[0052] When u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for realizing Phishing identification based on a challenge password token, which are used in the information technology field to solve the problem of account information being stolen for illegal use. The system comprises: an identification code generating module, which is in a website and is used for generating a set of dynamic identification code according to a website identification code, personal account information inputted by the user and a present time factor when a user carries out account operation; and a challenge password token, which is used for generating a set of dynamic authentication code and carrying out website identity authentication by matching the dynamic identification code with the dynamic authentication code. The system of the invention, through the real-time adding of website identification factor and time factor, generates the dynamic website identification code according to the factors. Then, the challenge password token also generates the dynamic authentication code and carries out the website identity authentication according to the website identification code, so that when the user logins in or carries out account operation, the website identity authentication is enhanced to avoid the user transaction action being tampered with; and association information undergoes diversified expansion to increase security during password authentication.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a system and method for identifying phishing websites based on challenge password tokens. Background technique [0002] With the development of smart card applications, users have higher and higher requirements for smart card application functions. It is hoped that smart cards can provide more and more application functions to meet the safety, convenience and diversification of people during use. need. [0003] However, while the networking of the information application system realizes information sharing and extensive and in-depth application, it also brings about the problem of data security. If there is no sufficient security guarantee, information storage, sharing and transmission on the public communication network may be blocked. Illegal eavesdropping, interception, tampering or destruction, the development of information technology makes information security issues ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/00G06F21/56
Inventor 谈剑锋
Owner SHANGHAI PEOPLENET SECURITY TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More