Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-phishing method and system based on blockchain

A blockchain and anti-phishing technology, applied in the field of network security, can solve problems such as illegal use of user reserved information, and achieve the effect of reliability and security guarantee

Inactive Publication Date: 2018-06-01
CHINA CHAIN TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, the technical problem to be solved by the present invention is to overcome the defect that the user reserved information used to verify the authenticity of the website may be intercepted and illegally used in the prior art, thereby providing a blockchain-based anti-phishing method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-phishing method and system based on blockchain
  • Anti-phishing method and system based on blockchain
  • Anti-phishing method and system based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] Embodiments of the present invention provide a blockchain-based anti-phishing method, such as figure 1 As shown, the anti-phishing method includes the following steps:

[0025] Step S101: Receive the anti-phishing verification request sent by the website server, and extract the data to be verified including the digital fingerprint and the corresponding blockchain verification number in the anti-phishing verification request. In a specific embodiment, the digital fingerprint is an encrypted character string generated by encrypting the data including the user reserved information and the random salt through an encryption algorithm.

[0026] Step S102: Query the blockchain according to the blockchain verification number to determine whether digital fingerprint verification data corresponding to the data to be verified of the digital fingerprint is stored in the blockchain.

[0027] Step S103: When the digital fingerprint verification data corresponding to the digital fing...

Embodiment 2

[0044] The embodiment of the present invention provides a blockchain-based anti-phishing system, such as Figure 5 As shown, the anti-phishing system includes: a receiving module 1 and an inquiry and verification module 2 . Wherein, the receiving module 1 is used to receive the anti-phishing verification request sent by the website server, extract the verification data containing the digital fingerprint in the anti-phishing verification request, and decrypt the verification data to extract the digital fingerprint. For details, please refer to step S101 and step S102. The query and verification module 2 is used to query the block chain according to the digital fingerprint to determine whether the digital fingerprint verification data corresponding to the digital fingerprint is stored in the block chain; when the block chain stores the digital fingerprint corresponding to the digital fingerprint When verifying the data, the verification of the website server is passed. For deta...

Embodiment 3

[0046] An embodiment of the present invention provides a non-transitory computer-readable storage medium, where the computer-executable instruction is stored in the computer-executable instruction, and the computer-executable instruction can execute the anti-phishing method in any of the above method embodiments. Wherein, the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a flash memory (Flash Memory), a hard disk (Hard Disk Drive, abbreviation: HDD) or a solid-state drive (Solid-State Drive, SSD), etc.; the storage medium may also include a combination of the above-mentioned types of memory.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an anti-phishing method and system based on a blockchain. The anti-phishing method comprises the steps of: receiving an anti-phishing verification request sent by a website server, and extracting to-be-verified data of digital fingerprints and a corresponding blockchain verification number in the anti-phishing verification request; performing querying in a blockchain according to the blockchain verification number, and judging whether digital fingerprint verification data corresponding to the to-be-verified data of the digital fingerprints is stored in the blockchain ornot; and, when the digital fingerprint verification data corresponding to the to-be-verified data of the digital fingerprints is stored in the blockchain, passing verification of the website server. According to the anti-phishing method and system based on the blockchain provided by the invention, on the basis of the existing anti-phishing method, secondary verification is increased; and thus, thedisadvantage that user reservation information used for verifying the authenticity of a website is possibly intercepted and illegally used in the existing anti-phishing method can be avoided.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a blockchain-based anti-phishing method and system. Background technique [0002] Phishing websites generally steal personal bank information, account numbers and passwords in QQ or games, which will bring great losses to users. One of the anti-phishing methods in the prior art is to allow users to set reserved information on the website platform to help users judge whether the system they log in is a real system, rather than a phishing website made by criminals to steal user information, so as to This plays the role of anti-phishing. However, ordinary reserved information may also be intercepted and stored, and put into phishing websites through some technical means to confuse users. Therefore, the security of the existing anti-phishing method is relatively low, and the information security of the user is still greatly threatened. Contents of the invention [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/1483H04L9/3239H04L9/3249H04L63/0435H04L63/0442H04L63/0876
Inventor 柳瑞辰路成业
Owner CHINA CHAIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products