Supercharge Your Innovation With Domain-Expert AI Agents!

Phishing website identification method and device

A technology of phishing websites and identification methods, which is applied in the field of communication, can solve the problems of not being able to be included in time and not be detected, and achieve the effect of high security

Inactive Publication Date: 2016-05-11
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above detection method can detect 100% blacklisted phishing websites, but there is a certain delay in the collection of blacklists, and new phishing websites cannot be included in the blacklist in time, so the existing methods cannot detect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Phishing website identification method and device
  • Phishing website identification method and device
  • Phishing website identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] see figure 1 , shows the method for identifying a phishing website provided by an embodiment of the present invention.

[0045] The method for identifying a phishing website is applied to a server, and specifically includes the following steps:

[0046] In step S101, receive key information sent by the client;

[0047] In step S102, search for tag information corresponding to the key information;

[0048] In the embodiment of the present invention, before the step of receiving the key information sent by the client, the following step is further included: establishing a correspondence table between key information and tag information in advance.

[0049] Then, the step of searching for the tag information corresponding to the key information specifically includes: searching for the tag information corresponding to the key information in the correspondence table.

[0050] In step S103, the tag information is sent to the client, so that the client can identify whether ...

Embodiment 2

[0057] see figure 2 , shows the method for identifying a phishing website provided by an embodiment of the present invention.

[0058] The method for identifying a phishing website is applied to a server, and specifically includes the following steps:

[0059] In step S201, the user name information sent by the client is received;

[0060] In step S202, search for tag information corresponding to the user name information;

[0061] In the embodiment of the present invention, before the step of receiving the user name information sent by the client, the following step is further included: establishing a correspondence table between user name information and tag information in advance.

[0062] Then, the step of searching for the label information corresponding to the user name information specifically includes: searching for the label information corresponding to the user name information in the correspondence table.

[0063] In step S203, the tag information is sent to the...

Embodiment 3

[0069] see image 3 , shows the method for identifying a phishing website provided by an embodiment of the present invention.

[0070] The method for identifying a phishing website is applied in a client browser, and specifically includes the following steps:

[0071] In step S301, send key information to the server;

[0072] In step S302, receiving and displaying the label information corresponding to the key information sent by the server, so that the client can identify whether the current website is a phishing website through the label information;

[0073] In step S303, a confirmation button of the label information is displayed;

[0074] In step S304, receiving a confirmation instruction obtained by the user clicking the confirmation button, and sending the confirmation instruction of the tag information to the server;

[0075] In step S305, the user information input interface obtained according to the confirmation instruction sent by the server is received and displ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a phishing website identification method. The method comprises following steps: receiving key information sent by a client; searching tag information corresponding to the key information; sending the tag information to the client so that the client can identify whether the current website is a phishing website according to the tag information; receiving a confirmation instruction which is sent by the client and is obtained according to the tag information; and sending a user information input interface to the client according to the confirmation instruction. According to the method and the device, before a user inputs a user name or a password, the user can know whether the login website is the phishing website; the user can be prompted timely; therefore the information of the user will not be leaked; and the security is high.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and device for identifying phishing websites. Background technique [0002] Phishing website is a kind of network fraud, which means criminals use various methods to counterfeit the URL address and page content of the real website, or use the loopholes in the real website server program to insert dangerous HTML codes into some webpages of the site, so as to Malicious websites that defraud users of private or sensitive information such as bank or credit card account numbers and passwords. [0003] Phishing websites are highly disseminated and do great harm to users. Therefore, the prior art proposes various methods for detecting phishing websites. Among them, the commonly used detection method is: set a blacklist, when the client browser accesses the server, first check whether the website to be accessed by the client browser is in the blacklist, and if so, direct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1483
Inventor 夏向红
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More