Anti-phishing method and system

An anti-phishing and consistent technology, applied in the field of Internet security applications, can solve problems such as difficult to distinguish authenticity, achieve the effect of preventing phishing attacks and enhancing security

Inactive Publication Date: 2016-03-02
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when people face a variety of website information, it is often difficult to identify its authenticity, and it is difficult to effectively prevent phishing attacks only through the above methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-phishing method and system
  • Anti-phishing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the accompanying drawings.

[0030] as attached figure 1 Shown, a kind of anti-phishing method, described method comprises:

[0031] S1. The application program that needs to input user data generates and displays a random value while starting the data input interface and waits for the user to input verification data;

[0032] S2. Obtain the verification data input by the user, and determine whether the verification data input by the user is consistent with the random value;

[0033] S3. When the verification data input by the user is inconsistent with the random value, mark the application program as being intercepted by a malicious phishing program, and start a detection program to detect the data input interface, when it is detected that the data input interface is blocked by the interface program When the cover is covered ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-phishing method and system. By means of the method and the system, whether an application program which user data need to be input into and is operated by users is intercepted by a vicious phishing program can be verified by increasing random values, alarm prompting can be transmitted to the users if the application program is intercepted by the vicious phishing program. The users can further perform verification processing by utilizing the verification processing procedures of the anti-phishing method, if the relevant application program is intercepted by the vicious phishing program according to the verification, the users can unload the vicious phishing program and record a process number of the vicious phishing program permanently (namely the vicious phishing program is recorded in a backlist), the progress can be automatically killed and the vicious phishing program can be automatically unloaded next time the vicious phishing program is started, and safety of user on-line operation is greatly strengthened.

Description

technical field [0001] The present invention relates to the related fields of Internet security applications, in particular to a method and system for anti-phishing. Background technique [0002] With the popularization of the Internet and the rapid development of 3G mobile Internet, more and more application systems are running on the Internet. As a result, network security issues have become increasingly prominent. A common criminal attack is "phishing", which attempts to trick users into providing personal information to phishing attackers. Phishing attackers use the obtained information to carry out criminal activities. Simple In other words, the phishing attacker obtains the trust of the victim and responds by forging information, so as to achieve the purpose of the phishing attacker. Phishing attackers often guide users to counterfeit websites whose interface appearance is very similar to real legitimate websites when users log in to the network to perform related ope...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
Inventor 王映理
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products