Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network link detection method and system

A network link and detection method technology, which is applied in the field of Internet security, can solve the problems of high malicious link attack risk, etc., and achieve the effect of reducing attack risk and avoiding fraud

Active Publication Date: 2014-08-27
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, there is a high risk of malicious link attacks due to the inability to detect the network link in the scenario where the user copies the network link and opens it.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network link detection method and system
  • Network link detection method and system
  • Network link detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Such as figure 1 Shown, in one embodiment, a kind of network link detection method, comprises the steps:

[0023] Step S110, receiving the copied content reported by capturing the copying behavior.

[0024] In this embodiment, the copied content is the object copied on the page when the user triggers the copying behavior, and may include text information, picture information, and network links.

[0025] In one embodiment, before the above step S110, it also includes: capturing the copying behavior in the page, obtaining the copied content according to the copying behavior, and reporting the copied content.

[0026] In this embodiment, the copying behavior triggered in the currently displayed page is captured to obtain the copying content corresponding to the copying behavior, and report it to the background server.

[0027] Step S130, performing malicious detection on the network link in the copied content to obtain a detection result.

[0028] In this embodiment, af...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for detecting network link are disclosed. The method includes: receiving copy content by capturing a copy behavior; performing malware detection on network link in the copy content to obtain a detection result; generating a risk warning message according to the detection result. The system includes: a receiving module, configured to receive copy content by capturing a copy behavior; a detecting module, configured to perform malware detection on network link in the copy content to obtain a detection result; a message generating module, configured to generate a risk warning message according to the detection result. The method and system can reduce the attack risk of malicious network link.

Description

technical field [0001] The invention relates to Internet security technology, in particular to a network link detection method and system. Background technique [0002] With the development of the Internet, people are increasingly accessing the Internet through network links to obtain required information and services. For example, a user may access an e-mail through the Internet, browse the received e-mail in the e-mail interface, and click a web link provided in the e-mail to enter the web page mentioned in the e-mail. [0003] When the user clicks on a network link, the network link will be detected to determine whether the network link is a malicious link, and then a prompt page will pop up to remind the user. However, in practical applications, since the network link cannot be detected in the scenario where the user copies the network link and opens it, there is a high risk of malicious link attacks. Contents of the invention [0004] Based on this, it is necessary ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L29/06H04L63/145H04L67/535H04L63/1408H04L63/1433
Inventor 王永峰林华尚文琛
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products