会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Aggregation-based phishing site detection
    • 基于聚合的网络钓鱼站点检测
    • US07854001B1
    • 2010-12-14
    • US11771712
    • 2007-06-29
    • Chih-Sheng ChenYao-Tang ChangShr-An Su
    • Chih-Sheng ChenYao-Tang ChangShr-An Su
    • G06F11/00G06F15/16
    • H04L63/1441H04L41/00H04L63/1483
    • A computer-implemented method for reducing phishing attacks that employ malicious websites is provided. The computer-implemented method includes gathering information about potentially malicious websites from a plurality of sources. The computer-implemented method also includes reducing the number of potentially malicious websites gathered; thereby creating a malicious website database that tracks at least a subset of the potentially malicious websites. In addition, the computer-implemented method includes generating a malicious website blacklist from the malicious website database, each website in the malicious website blacklist satisfying inclusion criteria, wherein the malicious website blacklist is employed to decide whether an access request to a given website is permitted.
    • 提供了一种用于减少使用恶意网站的网络钓鱼攻击的计算机实现的方法。 计算机实现的方法包括从多个源收集关于潜在恶意网站的信息。 计算机实现的方法还包括减少收集的潜在恶意网站的数量; 从而创建一个恶意网站数据库,跟踪潜在恶意网站的至少一个子集。 此外,计算机实现的方法包括从恶意网站数据库生成恶意网站黑名单,恶意网站黑名单中的每个网站满足入围标准,其中采用恶意网站黑名单来决定是否允许对给定网站的访问请求 。
    • 5. 发明授权
    • Protecting computer users from online frauds
    • 保护计算机用户免受网络欺诈
    • US07958555B1
    • 2011-06-07
    • US11906022
    • 2007-09-28
    • Chih Sheng ChenShr-An SuYi-Chan Hung
    • Chih Sheng ChenShr-An SuYi-Chan Hung
    • G06F11/00
    • H04L63/1441G06F21/554G06F2221/2119H04L63/1483
    • Protecting computer users from online frauds, such as phishing and pharming. A client computer may include a page signature extractor and a policy enforcer. The page signature extractor may encode a web page to generate its signature, which may be provided to a remote server computer for comparison with signatures of phishing pages. The client computer and the server computer may communicate using the DNS protocol. The policy enforcer may perform one or more predetermined actions when a match is found. Examples of such actions include replacing the web page with a blocking page, displaying a warning message, or both. The policy enforcer may be configured to determine if the web page is part of a phishing or pharming attack by comparing the URL of the web page to URLs of legitimate web pages.
    • 保护计算机用户免受在线欺诈,如网络钓鱼和制药。 客户端计算机可以包括页面签名提取器和策略执行器。 页面签名提取器可以编码网页以生成其签名,其可以提供给远程服务器计算机以与钓鱼页面的签名进行比较。 客户端计算机和服务器计算机可以使用DNS协议进行通信。 当发现匹配时,策略执行者可以执行一个或多个预定动作。 此类操作的示例包括用阻止页面替换网页,显示警告消息或两者。 策略执行者可以被配置为通过将网页的URL与合法网页的URL进行比较来确定网页是否是网络钓鱼或制药攻击的一部分。