Unlock instant, AI-driven research and patent intelligence for your innovation.

Automatic spoofed digital certificate detection

A deceptive and certificate technology, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., can solve problems such as distinction

Active Publication Date: 2018-10-26
MICROSOFT TECH LICENSING LLC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a malicious user can perform a variety of attacks in an attempt to get the user to accept a fraudulent credential, thereby causing the user to communicate with a device operated by the malicious user and provide confidential or otherwise private information to the malicious user
The problem with current computers is that it is difficult for users to distinguish between a spoofed certificate from a malicious user and a legitimate certificate from a trusted entity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic spoofed digital certificate detection
  • Automatic spoofed digital certificate detection
  • Automatic spoofed digital certificate detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] This article discusses automatic spoofed digital certificate detection. Computing devices analyze digital certificates received from various locations (eg, accessed via the Internet or other networks) to automatically detect fraudulent digital certificates. A computing device maintains a record of the digital certificates it receives from these various locations. A certificate screening service operating remotely and independently from the computing device also accesses these various locations and maintains a record of the digital certificates that the service receives from these locations. In response to the request to access the target location, the computing device receives the current digital certificate from the target location. The computing device compares the current digital certificate to a last digital certificate previously received from the target site and determines whether the current digital certificate matches the last digital certificate. This matchin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Computing devices analyze digital certificates received from various locations (eg, accessed via the Internet or other networks) to automatically detect fraudulent digital certificates. A computing device maintains a record of the digital certificates it receives from these various locations. A certificate screening service operating remotely from the computing device also visits these various locations and maintains a record of the digital certificates that the service receives from those locations. In response to the request to access the target location, the computing device receives the current digital certificate from the target location. The computing device determines whether the current digital certificate is authentic or fraudulent based on one or more previously received digital certificates for the target site, validation certificates received from the credential screening service, and additional characteristics of the digital certificate and / or the target site of.

Description

Background technique [0001] With the development of computing technology, computers have become more and more common in people's lives. While using their computers, people sometimes desire to communicate information that is confidential or otherwise private in nature to one or more other devices. However, when performing such communications, users typically desire to verify that the one or more other devices with which they are communicating are in fact operated by an entity that the user trusts. For example, if a user is communicating his or her credit card number to another device in order to purchase a product, the user typically desires to verify that the other device is in fact an entity he or she trusts (e.g., the company from which the product was purchased, credit card processing companies, etc.). [0002] One way in which such verification can be performed is through the use of digital certificates that can associate an encryption key with a particular entity. Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3268H04L63/061H04L63/1483H04L67/02H04W12/63H04L63/1408
Inventor M.U.简朱亚Y.A.梅塔M.范霍伦比克A.萨布里N.波特V.D.巴卡洛夫B.尼塔
Owner MICROSOFT TECH LICENSING LLC