Method for loading user security seal in visited page and device thereof

A user and stamp technology, applied in the Internet field, can solve the problem that phishing sites are difficult for users to see through, and achieve the effect of improving user experience, avoiding counterfeiting, and ensuring normal access

Active Publication Date: 2013-11-27
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, in this scheme, only phishing sites that have been identified or reported by users will enter the blacklist database. A phishing site that has just appeared or has not been identified by others or security service providers is generally difficult to be detected by users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for loading user security seal in visited page and device thereof
  • Method for loading user security seal in visited page and device thereof
  • Method for loading user security seal in visited page and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0037] figure 1It shows a schematic diagram of a verification device for loading a user security seal on an access page according to one aspect of the present invention; wherein, the verification device includes a site acquisition device 1, a seal generation device 2, a seal determination device 3, and a loading device 4 . Specifically, the site acquiring means 1 acquires information on one or more candidate sites; the seal generating means 2 determines a candidate user security seal corresponding to the candidate site information according to the candidate site information, wherein the The candidate user security stamp is generated based on the anti-phishing data information of the corresponding user; the stamp determination device 3 determines the user security stamp corresponding to the visited page in the candidate user security stamp according to the si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The aim of the invention is to provide a method for loading a user security seal in a visited page and a device thereof. Through one or more candidate site information and anti phishing data information corresponding to a user, a candidate user security seal corresponding to the candidate site information is generated, according to site visit information corresponding to a visited page, a user security seal corresponding to the visited page is determined in the candidate user security seal, and then the user security seal is loaded to the visited page. Compared with the prior art, personalized user security seals are arranged for a plurality of sites, the cost of making and using the user security seal is reduced, the counterfeiting of a real website by a phishing website is avoided, the normal access of the user is ensured, the security of the access is raised, and the user experience of the user is improved.

Description

technical field [0001] The invention relates to the Internet field, in particular to a technology for loading user security seals on access pages. Background technique [0002] Forge a page that is exactly the same as the page on a well-known site that is used to input sensitive personal information (such as login user name, password, bank card, credit card details, etc.), and guide the victim to this page by inducing or link hijacking. It is one of the most commonly used and most effective methods in phishing attacks; and as more and more open platforms open account connection functions to the outside world (that is, users can pass Its account on the open platform provider logs in to a third-party application or site), forges the user login interface of the open platform provider to carry out phishing attacks on users of the platform, and obtains its login user name and password on the platform, etc. Sensitive information has increasingly become one of the main means of at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 朱建庭
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products