Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network transaction security system and method

A security system and network transaction technology, applied in transmission systems, payment architectures, instruments, etc., can solve the problems of limited coverage of third-party security clients, inability to cover phishing websites, and inability to completely block them, achieving high timeliness and low cost The probability of huge loss, the effect of improving the accuracy rate

Inactive Publication Date: 2011-12-28
SHENGQU INFORMATION TECH SHANGHAI
View PDF4 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. The cost of educating users is relatively high;
[0010] 2. The coverage of third-party security clients is limited. For example, the network shields of major banks have limited coverage, and similar products are only owned by one bank;
[0011] 3. There are too many sources of news, and it is impossible to completely block them. For example, it is entirely possible for a user to receive a false message on a mobile terminal and log in to a PC terminal;
[0012] 4. Due to the limited coverage of the third-party security client, the information reported is only the phishing website information of the cooperative bank, and cannot cover all phishing websites

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network transaction security system and method
  • A network transaction security system and method
  • A network transaction security system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The network transaction security system and method proposed by the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0040] like figure 1 As shown, the present invention proposes a network transaction security system, including: a system client 1 installed in a user terminal device and a system server 2 interactively communicating with the system client 1 .

[0041] Wherein, the system server 2 is used to store and update the black and white list database 21 of the website, the black list in the black and white list database 21 contains the URLs of the audited phishing websites, and the white list in the black and white list database contains the audited phishing websites. The URL of the secure website.

[0042] The system client 1 includes a monitoring module 11 , a judging module 12 and a prompting module 13 .

[0043] The monitoring module 11 is used to monitor the input information o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a network transaction security system and method. The monitoring module monitors user input in real time so that the judging module can judge in real time whether the currently visited website is a phishing website, and the prompt module quickly sends a vigilant prompt to the user and informs the unknown URL of the currently visited website. Report for review to update to the black and white list database, which improves the correct rate of identifying phishing websites and blocking access, and greatly reduces the probability of huge losses caused by theft of the user's online banking account. It is applicable to various bank cards, credit cards, and social security cards. Anti-phishing for online transactions such as game point cards, recharge cards, shopping cards and electronic money, with wide coverage, multiple notification methods and channels, and high timeliness.

Description

technical field [0001] The invention relates to the field of IT security, in particular to a network transaction security system and method. Background technique [0002] The so-called "phishing website" is a kind of network fraud, which refers to the use of various means by criminals to counterfeit the URL (i.e., uniform resource locator, also known as web page address) and page content of the real website, or exploit the loopholes in the real website server program. Insert dangerous HTML codes into some web pages of the site, so as to defraud the user's online banking account number, password and other private information. [0003] At present, online banking fraud is very serious. Some criminals fake bank websites or fake bank online shopping and online payment webpages (ie phishing websites) to induce customers to enter bank card numbers, online banking passwords or passwords, etc., in order to steal customer information and carry out illegal activities. . However, when...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06Q20/00
Inventor 张赟林金明杨晖季昕华夏红卫吴锐
Owner SHENGQU INFORMATION TECH SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products