Phishing Attack Defense Method and Authorization Server
An authorization server and phishing attack technology, which is applied in the field of authorization server, can solve the problems of difficult identification of precise phishing attacks, leakage of user information, and difficulty in distinguishing between true and false, so as to reduce the security risk of OAuth authorization being stolen and reduce security risks Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] This embodiment provides an identity authentication mechanism for client authentication applications, and prompts the client identity to the user to provide support for the user to decide whether to authorize, thereby preventing some phishing attacks using OAuth authentication and reducing the security risk of OAuth authorization being stolen.
[0044] figure 1 It is a schematic flowchart of an embodiment of the method for defending against phishing attacks using open authorization OAuth authentication based on identity prompts in the present invention.
[0045] Such as figure 1 As shown, the method of the present embodiment includes:
[0046] Step 110: the user accesses the client through a user agent (such as a browser), and the client directs the user to the authorization server of the service provider to apply for authentication.
[0047] Wherein, the authentication application of the client includes the following parameters, for example:
[0048] response_type: ...
Embodiment 2
[0062] This embodiment provides a short message verification mechanism to prevent phishing attacks due to counterfeiting of users and reduce the security risk of OAuth authorization being stolen.
[0063] figure 2 It is a schematic flowchart of an embodiment of a phishing attack defense method using open authorization OAuth authentication implemented based on a short message verification mechanism in the present invention.
[0064] Such as figure 2 As shown, the method of the present embodiment includes:
[0065] Step 210: The user accesses the client through a user agent (such as a browser), and the client directs the user to the authorization server of the service provider to apply for authentication. Refer to step 110 for details.
[0066] Step 220: If the user authorizes the client, go to step 230.
[0067] Step 230: The authorization server obtains the mobile phone number of the user, generates a verification code via SMS, and sends it to the mobile phone of the use...
Embodiment 3
[0070] This embodiment combines the client identity verification and prompt mechanism with the SMS verification mechanism to prevent phishing attacks using OAuth authentication and reduce the security risk of OAuth authorization being stolen.
[0071] image 3 It is a schematic flowchart of an embodiment of a method for defending against phishing attacks using open authorization OAuth authentication based on double authentication in the present invention.
[0072] Such as image 3 As shown, the method of the present embodiment includes:
[0073] Step 310: the user accesses the client through a user agent (such as a browser), and the client directs the user to the authorization server of the service provider to apply for authentication. Refer to step 110 for details.
[0074] Step 320: The authorization server verifies the identity of the client according to the redirection URI of the client, and prompts the user through the user agent for the identity of the client, and the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


