Anti-phishing method, client and system for communication content

A communication content and anti-phishing technology, applied in the field of network security, can solve problems such as weak security awareness and successful phishing, and achieve the effect of preventing phishing fraud and improving network security awareness

Pending Publication Date: 2021-11-09
上海纽盾网安科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the case that illegal emails cannot be effectively filtered, the existing technology does not have further remedial measures. Once a person who receives an email containing phishing information has weak security awareness or is negligent for a while, he may be successfully phished

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-phishing method, client and system for communication content
  • Anti-phishing method, client and system for communication content
  • Anti-phishing method, client and system for communication content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0056] see figure 1 As shown, it is an anti-phishing method for communication content provided by an embodiment of the present invention. The method comprises the steps of:

[0057] S100. Collect job type or occupation information of instant messaging users.

[0058] The type of work or occupation information of the user can be set by the user or the system. Specifically, for example, the user can actively set his or her job type or occupation information based on the instant messaging tool.

[0059] The instant messaging tools, also known as instant messaging tools, generally refer to clients with instant messaging functions in this field, such as WeChat, QQ, and DingTalk. As an example and not a limitation, the instant messaging tool may be a network version application, a PC version application or a handheld terminal APP application. Optionally, a job type or occupation setting column is set in the instant messaging tool for the user to set related information.

[0060...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-phishing method for communication content, a client and a system, and relates to the technical field of network security. The invention discloses an anti-phishing method for communication content. The method comprises the following steps: collecting work type or occupational information of an instant messaging user; detecting instant messaging interaction information between the user and a contact object when judging that the work type or the occupation belongs to a preset sensitive work type or occupation type; judging whether the instant messaging interaction information contains phishing sensitive data or not; and when judging that the fishing sensitive data is contained, executing an anti-fishing safety action. The instant messaging content of the sensitive user can be effectively monitored, the network security awareness of the user is improved, and phishing fraud of the user is timely prevented.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, client and system for preventing phishing of communication content. Background technique [0002] Business Email Compromise (BEC) is one of the mainstream malicious fraud methods in the world. Fraudsters register domain names close to customer subjects, send related emails, and use social engineering techniques to carry out counterfeiting and fraudulent activities. [0003] In the specific implementation process of commercial email phishing fraud, according to different scenarios, the attacker may pretend to be the manager of the enterprise or the insider of the authoritative organization, obtain the sensitive information of the victim through social engineering methods, and send a message to the designated attack target. Send commercial fraudulent emails. Different from pure email spoofing (Email spoofing), this type of email fraud is often more concealed, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/1483H04L51/04
Inventor 杨腾霄马宇尘
Owner 上海纽盾网安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products