Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Two-dimensional code risk identification method and system

A technology of two-dimensional code and detection method, which is applied in the payment system, payment system structure, protocol authorization, etc., can solve the problems of hidden safety risks, incomplete consistency, lack of two-dimensional code risk identification ability, etc., and achieve strong identification initiative , to identify a wide range of effects

Pending Publication Date: 2019-11-12
ADVANCED NEW TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

QR codes not only bring convenience to people, but also cover up some information, allowing criminals to take advantage of them, thus causing many hidden dangers of security risks
[0003] Currently common security scanning solutions include, for example, relying on the blacklist mechanism, but this solution lacks the risk identification capability for QR codes that are not in the blacklist, and also includes post-event and strong confrontation control solutions based on user reports, but these solutions are far from meeting the risk identification requirements for QR codes
[0004] In addition, the current detection methods for malicious URLs corresponding to QR codes are all based on string matching methods. Security vendors collect a large number of malicious URLs and store them in the signature database. When URL detection is performed, only string comparison is performed. This current method can solve most of the malicious URL detection problems, but due to the variability of the URL format mentioned above, a simple change of a malicious URL, without changing the nature of its malicious link, its content has already changed. It is not completely consistent with the features in the virus database to be matched, which makes it impossible to recognize the malicious URL corresponding to the QR code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code risk identification method and system
  • Two-dimensional code risk identification method and system
  • Two-dimensional code risk identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Various embodiments will be described in more detail hereinafter with reference to the accompanying drawings which form a part hereof, and which illustrate specific exemplary embodiments. Embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and these The scope of the embodiments is fully conveyed to those of ordinary skill in the art. Various embodiments may be implemented as methods, systems or devices. Accordingly, these embodiments may take the form of a hardware implementation, an entirely software implementation, or a combination of software and hardware aspects. Therefore, the following detailed description is not limiting.

[0040] figure 1 An application environment 100 is shown in which various embodiments of the present disclosure may be implemented.

[0041] Using mobile phones t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a technical scheme of two-dimensional code risk identification. In the scheme, a set of fraudulent two-dimensional code recognition algorithm is established from multiple dimensions, so that the fraudulent or malicious two-dimensional code can be accurately found in the two-dimensional code provided by the user. According to the scheme, a URL corresponding to a two-dimensional code is identified to identify a malicious URL. The scheme also comprises a derivation risk identification step which comprises deriving and discovering more fraudulent persons and fraudulent persons based on the discovered fraudulent two-dimensional code so as to realize self-circulation two-dimensional code risk identification.

Description

technical field [0001] This application relates to the technical field of information security, and in particular to a method and system for risk identification of two-dimensional codes. Background technique [0002] The appearance of two-dimensional codes greatly facilitates people's lives. They can scan codes to pay, add friends, and open web pages, which greatly reduces the difficulty of people's operations and saves operation time. With the development of information technology, more and more offline scenes are connected online through QR codes, and people have become accustomed to scanning codes. While the QR code brings convenience to people, it also conceals some information, allowing criminals to take advantage of it, thus causing many hidden safety risks. For example, black products will convert phishing links into QR codes for users to scan, thus increasing the difficulty of user identification. Compared with an unknown link, it is easier for users to take the bai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06Q20/40G06Q20/32
CPCG06F21/51G06Q20/4016G06Q20/3276G06F2221/2119
Inventor 张哲应亦丰
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products