Unlock instant, AI-driven research and patent intelligence for your innovation.
Method and device for conducting security detection on network page
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A web page and security technology, applied in the field of network security, can solve problems such as not effectively identifying phishing websites, and achieve the effect of ensuring property security
Active Publication Date: 2015-04-29
AEROSPACE INFORMATION
View PDF5 Cites 7 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] Currently, there is no effective way to identi
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0042] The embodiment of the present invention checks the domain name of the network page to be accessed by the browser, converts the check result of the domain name check into a domain name judgment threshold, performs UR1 check on the network page, and converts the check result of the UR1 check into UR1 Judging the threshold, performing email checking on the web page, converting the checking result of the email checking into an email judging threshold;
[0043] Carry out weighted summation of the domain name judgment threshold, UR1 judgment threshold and email judgment threshold to obtain the judgment threshold total value, compare the judgment threshold total value with the preset alarm judgment total threshold, and determine the said judgment threshold according to the comparison result Security of web pages.
[0044] This embodiment provides a processing flow of a method for performing security detection on a web page as follows: figure 1 As shown, the following processi...
Embodiment 2
[0085] This embodiment provides a device for performing security detection on web pages, and its structural diagram is as follows figure 2 shown, including:
[0086] A domain name check module, configured to check the domain name of the web page to be accessed by the browser, and convert the check result of the domain name check into a domain name judgment threshold;
[0087] UR1 inspection module, for carrying out UR1 inspection to network page, the inspection result of described UR1 inspection is converted into UR1 judgment threshold;
[0088] An e-mail checking module, configured to perform e-mail checking on a web page, and convert the checking result of the e-mail checking into an e-mail judging threshold;
[0089] The first judgment comparison module is used to carry out weighted summation of the domain name judgment threshold, UR1 judgment threshold and email judgment threshold to obtain the judgment threshold total value, and compare the judgment threshold total valu...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The embodiment of the invention provides a method and a device for conducting security detection on a network page. The method mainly comprises the following steps: conducting domain name inspection on the network page to be accessed by a browser, converting the inspection result of the domain name inspection to a domain name judgment threshold value, conducting URL inspection on the network page, converting the inspection result of the URL inspection to a URL judgment threshold value, conducting e-mail inspection on the network page, and converting the inspection result of the e-mail inspection to an e-mail judgment threshold value; weighting and summing the domain name judgment threshold value, the URL judgment threshold value and the e-mail judgment threshold value to obtain a total judgment threshold value, comparing the total judgment threshold value with a preset total alarm judgment threshold value, and determining the security of the network page according to the comparison result. According to the method disclosed by the invention, the security of the network page can be effectively identified, the phishing page in the financial industry and other industries can be accurately identified, and the property security of users can be ensured.
Description
technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for detecting the security of a network page. Background technique [0002] With the development of information technology, the network has gradually penetrated into all areas of society. People cannot live without the network, whether it is work or entertainment. Therefore, it is very important to have a safe, healthy and stable network environment. A very important carrier of the network is the website. Various websites carry countless information and data. Therefore, website security management must not be ignored. Website security management can ensure the stable and healthy operation of the website, and can guarantee the safety of people browsing the website. [0003] Phishing websites usually refer to websites that pretend to be banks and e-commerce websites. The main harm is to steal private information such as bank account numbers and passwor...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.