False link interception method, device and system

An interception device and fake technology, applied in the field of fake link interception methods and systems, can solve the problems of inability to comprehensively protect user network security, false interception, and low accuracy.

Inactive Publication Date: 2016-09-21
广东世纪网通信设备股份有限公司
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The information update of this false link interception method is lagging behind, and the protection is not strong. When it works, the interests of users have often been violated, and it is impossible to fully protect the user's network security.
The false link identification method for active identification of linked domain names is generally based on the character ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • False link interception method, device and system
  • False link interception method, device and system
  • False link interception method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0014] Such as figure 1 As shown in the process of intercepting false links based on page similarity judgment, the server determines whether the link is in the server's database after obtaining the mirror image of the link accessed by the client. The database of the server includes a blacklist and a whitelist of links. If the link is in the whitelist of the database, it means that the link is a normal webpage link, and the server allows users to access the webpage; if the link is in the blacklist of the database, It shows that the link is a false link, the server intercepts the user's access to the webpage, and returns the homepage of the website to the user's client through webpage redirection technology. If the link is not in the database, the server compares the webpage pointed to by the obtained link with the pre-stored normal webpage, and judges whether the link is a fake link according to the similarity between the two pages.

[0015] Taking the page of Taobao as an exa...

Embodiment 2

[0021] Such as figure 2 As shown in the process of intercepting false links based on domain name and page similarity judgments, the server determines whether the link is in the server's database after obtaining the mirror image of the link accessed by the client. The database of the server includes a blacklist and a whitelist of links. If the link is in the whitelist of the database, it means that the link is a normal webpage link, and the server allows users to access the webpage; if the link is in the blacklist of the database, It shows that the link is a false link, the server intercepts the user's access to the webpage, and returns the homepage of the website to the user's client through webpage redirection technology. If the link is not in the database, the server compares the link with the domain name corresponding to the regular webpage, and judges whether the link is a fake link according to the comparison result combined with the page similarity obtained by the webpa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network safety and especially relates to a false link interception method and system. The false link interception method is characterized by carrying out identification on a webpage access request initiated by a user client and obtaining a mirror image link; actively analyzing domain name information of the link and safety of the specific webpage content information; and intercepting a false link access request, thereby providing a more accurate and higher-recognition efficiency false link interception method for users. The false link interception method can be realized by establishing function modules, combining the function modules into a function module framework, and implementing the function module framework through computer programs stored in a computer readable storage medium. The false link interception system is established based on the false link interception method. The system comprises a client, an operator host, a network end and a server. The server of the false link interception system has the function module framework, and the system can enter the computer programs for implementing the function module framework, so that false link interception is realized.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a false link interception method and system. For the method of intercepting false links, functional modules can be established, combined into a functional module framework, and implemented by a computer program stored in a computer-readable storage medium. Background technique [0002] With the rapid development of the Internet and mobile terminals, some false links that fake or maliciously imitate well-known network addresses are spread on the Internet. Once users enter the webpage pointed to by the false link, they are easy to be deceived by the content of these webpages, resulting in the leakage of personal information and even financial security. on the loss. As the threats of false links to the security performance of Internet communication and e-commerce are increasing, the technology of false link detection is also attracting more and more attention. [0003] At...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/10H04L63/1441
Inventor 李涛
Owner 广东世纪网通信设备股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products