Anti-phishing contact person adding safety control method, client and a system

A security control and anti-phishing technology, applied in the field of network security, can solve problems such as weak security awareness and successful phishing, and achieve the effect of preventing phishing fraud and improving network security awareness

Active Publication Date: 2021-11-12
上海纽盾网安科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the case that illegal emails cannot be effectively filtered, the existing technology does not have further remedial measures. Once a person who receives an email containing phishing information has weak security awareness or is negligent for a while, he may be successfully phished

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-phishing contact person adding safety control method, client and a system
  • Anti-phishing contact person adding safety control method, client and a system
  • Anti-phishing contact person adding safety control method, client and a system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] see figure 1 As shown, it is an anti-phishing security control method for adding contacts provided by the embodiment of the present invention. The method comprises the steps of:

[0052] S100, collecting an application request of a user to add a friend or join a chat group through an instant messaging tool.

[0053] S200. Obtain identity attribute information of the user to determine whether the user belongs to a sensitive user type.

[0054] S300. When it is determined that the user belongs to a sensitive user type, obtain preset anti-phishing associated contact information, and establish an anti-phishing group with the aforementioned user based on the aforementioned anti-phishing associated contact.

[0055] S400. Send the aforementioned application request information to the aforementioned anti-phishing group for review.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-phishing contact person adding safety control method, a client and a system, and relates to the technical field of network safety. The method comprises the following steps: collecting an application request of a user for adding friends or adding a chat group through an instant messaging tool; acquiring identity attribute information of the user to judge whether the user belongs to a sensitive user type or not; when judging that the user belongs to the sensitive user type, acquiring preset anti-phishing associated contact information, and establishing an anti-phishing group together with the user based on the anti-phishing associated contact; and sending the application request information to the anti-phishing group for auditing. According to the method, the network communication environment of sensitive users can be effectively supervised, the network security awareness of the users is improved, and the phishing fraud of the users is effectively prevented.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a security control method, client and system for anti-phishing adding contacts. Background technique [0002] While the Internet greatly facilitates people's lives, it also brings some unsafe factors to people. For example, the existence of some phishing websites endangers the safety of people's property and private information. Among them, Business Email Compromise (BEC) has always been a major mainstream of malicious fraud methods in the world. [0003] Fraudsters register domain names close to customer subjects, send related emails, and use social engineering techniques to carry out counterfeiting and fraudulent activities. In the specific implementation process of BEC attack, according to different scenarios, the attacker may pretend to be the manager of the enterprise or the insider of the authoritative organization, obtain the sensitive information of the victim t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/1483H04L51/04H04L51/42
Inventor 杨腾霄马宇尘严涛
Owner 上海纽盾网安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products