A server, user equipment and interaction method between user equipment and server

A technology for user equipment and servers, applied in the field of network security, can solve the problems of low reliability, high false negative rate of malicious websites, and narrow blacklist coverage, and achieve the effect of high reliability and convenient and quick identification process.

Active Publication Date: 2018-06-22
CHINA UNIONPAY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Static identification usually maintains a blacklist of malicious websites on the server side through user reporting and network scanning. This method is widely used and low in implementation cost. However, due to the continuous emergence of phishing websites, the coverage of the blacklist is narrow and the update frequency is too slow, resulting in malicious websites. The site has a high rate of false positives
The dynamic identification method establishes a website behavior analysis model based on the website domain name, pictures, page scripts, etc., and identifies the authenticity of the website in real time when the user browses the webpage. Compared with the static traditional method, the identification efficiency has been improved, but due to continuous development The website counterfeiting technology, the dynamic identification method still has false positives and false negatives, and because the dynamic identification method is implemented by software, it is easily interfered and blocked by malicious programs such as Trojan horses, and its reliability is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A server, user equipment and interaction method between user equipment and server
  • A server, user equipment and interaction method between user equipment and server
  • A server, user equipment and interaction method between user equipment and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The specific implementation manners of the present invention will be described in further detail below with reference to the accompanying drawings. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more aspects of the embodiments. It may be apparent, however, to one skilled in the art that one or more aspects of the embodiments may be practiced with a lesser degree of these specific details. Additionally, although a particular feature or aspect of an embodiment may be disclosed with respect to only one of the embodiments, that feature or aspect may be combined with one of the other embodiments as may be desired and advantageous for any given or particular application. or a combination of features or aspects. The following description is therefore not to be seen as limiting, but rather the scope of protection is defined by the appended claims.

[0039] figure 1 It i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a server capable of sending website authentication information to a user equipment, the user equipment capable of receiving the website authentication information from the server, and a method for the user equipment to interact with the server. At least one or more server public keys and user equipment private keys are stored on the user equipment.

Description

technical field [0001] The present invention relates to network security, and in particular to a server, user equipment, and an interaction method between the user equipment and the server. Background technique [0002] The authenticity of the website can be identified by installing anti-phishing client software or browser plug-ins on the user end. This method includes static authentication and dynamic authentication. Static identification usually maintains a blacklist of malicious websites on the server side through user reports and network scanning. The website has a high rate of false positives. The dynamic identification method establishes a website behavior analysis model based on the website domain name, pictures, page scripts, etc., and identifies the authenticity of the website in real time when the user browses the webpage. Compared with the static traditional method, the identification efficiency has been improved, but due to continuous development False positiv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/32
Inventor 赵海徐燕军陈芳周皓章明周明
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products