Malicious URL (unified resource locator) authenticating method and device

Inactive Publication Date: 2013-10-02
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the inventor found through research that in this way in the prior art, hackers can use complex coding, page encryption, JS multiple jumps, and use loopholes in large websites to upload counterfeit QQ space phishing pages, etc., so that Basically, there is no need to display text on the page, thus avoiding the above-mentioned detection methods, thereby reducing the identification effect of malicious URLs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious URL (unified resource locator) authenticating method and device
  • Malicious URL (unified resource locator) authenticating method and device
  • Malicious URL (unified resource locator) authenticating method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0045] In order to solve the problem of poor identification effect of malicious URL in the prior art, the embodiment of the present invention provides a malicious URL identification method, such as figure 1 shown, including steps:

[0046] S11. URL matching is performed between the URL included in the content of the communication message and the preset URL blacklist; if the URL matching is successful, a risk warning is generated, otherwise, go to step S12;

[0047...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a malicious URL (unified resource locator) authenticating method and a malicious URL authenticating device. The authenticating method comprises the steps that a URL contained in the content of a communication message is matched with a preset URL blacklist; if the URL is successfully matched, a risk prompt is generated, if not, the IP address of a sending end of the communication message is matched with a preset IP (internet protocol) blacklist; and if the IP is successfully matched, a risk prompt is generated. The malicious URL (unified resource locator) authenticating method and the authenticating device can remind a user after the user receives the communication message containing the malicious URL. In the technical scheme of the embodiment, the malicious URL can be authenticated without authenticating the website content of the malicious URL, so that the authentication effect of the malicious URL is effectively improved.

Description

technical field [0001] The invention relates to the field of computer security, and more specifically, to a malicious URL identification method and device. Background technique [0002] URL (Uniform Resource Locator, Uniform Resource Locator), also known as webpage address, referred to as URL, is the address of a standard resource on the Internet. Through the URL, the user can access the corresponding web page content in the network. Malicious URLs refer to various fraudulent, counterfeiting, phishing or horse-mounted webpages. When users accidentally visit such webpages, they may cause economic losses to users, leak personal privacy information, or infect the current computer with Trojan horse viruses. and other adverse effects. [0003] The current security software can warn the user after identifying the malicious URL by identifying the malicious URL, so as to protect the safety of the user. [0004] In the prior art, identification of malicious URLs is mainly based on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L61/30H04L67/02
Inventor 张辉刘健申飞龙
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products