Method and system for detecting phishing hotspot

A detection method and hotspot technology, applied in the detection method and system field of phishing hotspots, can solve the problems of easy misjudgment, easy to be broken by hackers, low effectiveness, etc., and achieve the effect of protecting information security

Active Publication Date: 2015-12-02
INST OF INFORMATION ENG CAS
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the defects of low effectiveness, easy misjudgment and easy hacking of the exist

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting phishing hotspot
  • Method and system for detecting phishing hotspot
  • Method and system for detecting phishing hotspot

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] Such as figure 1 As shown, it is a schematic flowchart of a method for detecting fishing hotspots provided by an embodiment of the present invention. The method includes the following steps:

[0051] S1: The terminal connects to the wireless hotspot, and judges the type of the wireless hotspot according to the attribute information of the wireless hotspot.

[0052] Wherein, the attribute information of the wireless hotspot includes a service set identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting a phishing hotspot, which comprises the steps of connecting a terminal to a wireless hotspot, and judging the type of the wireless hotspot according to attribute information of the wireless hotspot; sending a network verification data packet to the wireless hotspot according to the type of hotspot, and judging whether the wireless hotspot is a phishing wireless hotspot or not through data fed back by the wireless hotspot according to the network verification data packet; and prompting a user to disconnect connection between the terminal and the wireless hotspot if the wireless hotspot is a phishing wireless hotspot. The invention further provides a system for detecting the phishing hotspot, which comprises a hotspot type judgment unit, a phishing hotspot judgment unit and a prompt unit. The method and the system disclosed by the invention can accurately detect phishing wireless hotspots with high camouflage performance, display a phishing mode of camouflaged hotspots, prompt users to timely disconnect dangerous hotspots, and protect the security of information in an intelligent terminal.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method and system for detecting fishing hotspots. Background technique [0002] Smart terminals usually choose to connect to wireless hotspots in scenarios where there are wireless hotspots to increase the speed of connecting to the network, but the security and reliability of the wireless hotspots cannot be effectively judged and identified. Once a wireless hotspot involved in malicious phishing may It leads to data leakage or important information leakage in the terminal, which poses a great threat to the user's information security. [0003] Aiming at the problem of stealing user information by false hotspots and phishing hotspots, most of the current main smart terminal detection methods stay at the stage of detecting the name of the hotspot and the encryption attribute of the hotspot. This detection method is less effective and is easy to be broken by hacker...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1475H04L63/1483
Inventor 弥宝鑫朱大立冯维淼朱海涛李云颂
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products