Method and System for Preventing Phishing Attacks

a technology of phishing attacks and methods, applied in the field of network security, can solve problems such as the difficulty of detecting whether a website is a fake website, and achieve the effect of preventing unnecessary losses

Inactive Publication Date: 2013-01-31
BEIJING PIANRUOJINGHONG TECH CO LTD
View PDF16 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0004]Illustrative embodiments of the present disclosure have recognized the above disadvantages in the prior art. To this end, the present disclosure provides a lightweight solution capable of helping ordinary users to identify some common type of phishing attacks and thus to prevent unnecessary losses caused thereby.
[0013]By implementing the method or system according to the above one or more embodiments of the present disclosure, since a reproduced Web page is first detected to determine whether it is a fake website of a phishing attack before it is displayed to the user and the user is warned upon detecting a fake website, unnecessary losses due to phishing attacks can be prevented.

Problems solved by technology

However, these methods have their respective disadvantages, although they can solve part of the problems.
For example, it is still difficult to detect whether a website is a fake website even through a SSL secure connection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and System for Preventing Phishing Attacks
  • Method and System for Preventing Phishing Attacks
  • Method and System for Preventing Phishing Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]In the following will be described exemplary embodiments of the present disclosure in conjunction with the accompanying drawings. For clarity and simplicity, not all the features of the actual embodiments are described herein. However, it should be understood that many decisions specific to the actual embodiments must be made during the process of developing the actual embodiments, so as to realize the specific objects of the developers, e.g., complying with those constraints related to the system and business, which constraints may change with different embodiments. In addition, it should be further understood that although the development may be complex and time-consuming, the development work is merely routine tasks for those skilled in the art with the benefits of the contents of the present disclosure.

[0019]It should also be pointed out here that, in order to prevent the present disclosure to be unnecessarily blurred by details, the drawings only illustrate the apparatus ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method, system and program product for preventing phishing attacks, wherein the method comprises: acquiring links in a Web page; classifying the acquired links according link types; and determining whether a phishing attack exists according to the classified links, wherein the links are classified into two types: internal links belonging to the same domain as the address of the Web page, and external links belonging to a different domain from the address of the Web page. By carrying out the method or system according to the above one or more embodiments of the present disclosure, since it is first detected whether a Web page is a fake website of a phishing attack before displaying the reproduced Web page to the user and the user is warned upon detecting a fake website, unnecessary losses due to phishing attacks can be prevented.

Description

CROSS-REFERENCE TO RELATED APPLICATION(S)[0001]This application claims the benefit of priority to Chinese Patent Application No. 201110215504.1, filed on Jul. 29, 2011, the contents of which are hereby incorporated by reference.TECHNICAL FIELDS[0002]The present invention relates to network security, more particularly, to a method and system for preventing phishing attacks.DESCRIPTION OF THE RELATED ART[0003]Phishing attack is a criminal fraud procedure that attempts to obtain personal sensitive information like usernames, passwords and credit card details, etc. by using electronic communications to disguise as a creditworthy legal person media. These communications usually claim that they are from Internet banks, electronic payment websites, online retailers, credit card companies or network administrators, to deceive credulous victims. Phishing attacks are usually carried out through emails or instant messages. Phishing attacks usually direct the user to a fake website with an inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/00
CPCG06F21/56G06F21/577G06F21/54
Inventor WANG, BINXIE, LINSONG, YINZHANG, LEISUN, MANLI, DONG
Owner BEIJING PIANRUOJINGHONG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products