Malicious website access defending method and related device

A malicious website and malicious technology are applied in the field of access defense methods and related devices and network systems for malicious websites, which can solve the problems of unknown security, difficulty in effectively protecting users' Internet security, and the like, and achieve the effect of saving server storage space.

Inactive Publication Date: 2013-07-24
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, when each user visits such a URL, the cloud security system is unknown to its security, so it is difficult to effectively protect the online security of each user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious website access defending method and related device
  • Malicious website access defending method and related device
  • Malicious website access defending method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention provide a malicious website access defense method, a related device and a network system, in order to more flexibly and effectively defend against malicious websites.

[0041] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0042] Each will be described in detail below.

[0043] The terms "first", "second", "third", "fourth", etc. (if any) in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a malicious website access defending method and a related device. The access defending method comprises the following steps of: receiving a security query request carrying a first uniform resource locator from a user terminal; querying whether a record matched with a first domain name included in the first uniform resource locator exists or not in N domain name security records, wherein, a domain name and an indication whether the domain name is malicious or not are recorded in each of the N domain name security records, and N is an integer more than or equal to 1; and if the domain name security record N1 in the N domain name security records is matched with the first domain name and indicates that the first domain name is malicious, informing the user terminal that the first domain name is malicious. According to the technical scheme provided by the embodiment of the invention, malicious websites can be defended more flexibly and effectively.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a malicious website access defense method, a related device and a network system. Background technique [0002] With the development of Internet technology, there are more and more types of computer viruses. [0003] The rapid development of Internet technology has brought more and more convenience to people's life. Through the Internet, people can conveniently share and download various materials, obtain various important information, and pay bills online. At the same time, the Internet security situation is not optimistic. Trojan horse viruses disguise themselves as normal files and spread wantonly, and phishing websites imitate normal websites to steal user account passwords intensified. [0004] In recent years, with the continuous development of cloud technology, major security vendors have launched security software based on cloud technology. The basic principle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1441H04L67/02H04L63/10
Inventor 刘健
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products