CN103020287B - Finite term purpose is excluded based on part cryptographic Hash - Google Patents

Finite term purpose is excluded based on part cryptographic Hash Download PDF

Info

Publication number
CN103020287B
CN103020287B CN201210582239.5A CN201210582239A CN103020287B CN 103020287 B CN103020287 B CN 103020287B CN 201210582239 A CN201210582239 A CN 201210582239A CN 103020287 B CN103020287 B CN 103020287B
Authority
CN
China
Prior art keywords
cryptographic hash
user
network address
term purpose
finite term
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210582239.5A
Other languages
Chinese (zh)
Other versions
CN103020287A (en
Inventor
高剑青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201210582239.5A priority Critical patent/CN103020287B/en
Publication of CN103020287A publication Critical patent/CN103020287A/en
Priority to PCT/CN2013/082904 priority patent/WO2014079257A1/en
Application granted granted Critical
Publication of CN103020287B publication Critical patent/CN103020287B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

Part cryptographic Hash excludes finite term purpose, is to submit the part cryptographic Hash of project and service provider's database the inside black by user(In vain)The cryptographic Hash of list is compared exclusion, is conducive to the privacy for protecting user.

Description

Finite term purpose is excluded based on part cryptographic Hash
Technical field
Computer, internet, cryptography.
Background technology
All it is at present by submitting the network address of user or the complete cryptographic Hash of network address to the exclusion of fishing website(Such as:md5) Then compare with the fishing network address blacklist inside database and excluded.And if server is to all network address domain name meters in the whole world Cryptographic Hash is calculated, server still can inquire the actually opened website of user from the cryptographic Hash that user submits, be unfavorable for using The protection of family privacy.
Invention content
The Hash value part that user's network address is calculated is submitted into service provider, if the part cryptographic Hash that a) user submits Not inside blacklist, the possibility of fishing network address has just been eliminated.If b) the part cryptographic Hash that user submits is taking Existing inside quotient data of being engaged in library can number of downloads(Such as:1000), user can download the identical cryptographic Hash in these parts, at this Ground is compared.If c) first 2 are also unable to reach, increase the cryptographic Hash partial amt that user submits(Length), continue first 2 Judge until completing.

Claims (2)

1. one kind is based on part cryptographic Hash to finite term purpose method for removing, technical characteristic is:User's network address is calculated Hash value part submit to service provider, if the part cryptographic Hash that user submits just has been arranged not inside blacklist In addition to the possibility for network address of going fishing.
2. one kind is based on part cryptographic Hash to finite term purpose method for removing, technical characteristic is:User's network address is calculated Hash value part submit to service provider, if the part cryptographic Hash submitted of user inside service provider's database in the presence of can download Quantity, user can download the identical cryptographic Hash in these parts, be compared locally.
CN201210582239.5A 2012-11-20 2012-12-28 Finite term purpose is excluded based on part cryptographic Hash Expired - Fee Related CN103020287B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210582239.5A CN103020287B (en) 2012-11-20 2012-12-28 Finite term purpose is excluded based on part cryptographic Hash
PCT/CN2013/082904 WO2014079257A1 (en) 2012-11-20 2013-09-04 Exclusion of limited items on the basis of partial hash value

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
CN201210470121 2012-11-20
CN2012104701213 2012-11-20
CN201210470121.3 2012-11-20
CN201210581099X 2012-12-28
CN201210581099.X 2012-12-28
CN201210581099 2012-12-28
CN201210582239.5A CN103020287B (en) 2012-11-20 2012-12-28 Finite term purpose is excluded based on part cryptographic Hash

Publications (2)

Publication Number Publication Date
CN103020287A CN103020287A (en) 2013-04-03
CN103020287B true CN103020287B (en) 2018-08-10

Family

ID=47968890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210582239.5A Expired - Fee Related CN103020287B (en) 2012-11-20 2012-12-28 Finite term purpose is excluded based on part cryptographic Hash

Country Status (1)

Country Link
CN (1) CN103020287B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014079257A1 (en) * 2012-11-20 2014-05-30 Gao Jianqing Exclusion of limited items on the basis of partial hash value
CN103701804A (en) * 2013-12-26 2014-04-02 北京奇虎科技有限公司 Network shopping environment safety detecting method and device
CN107786529B (en) * 2016-08-31 2020-12-01 阿里巴巴集团控股有限公司 Website detection method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101390068A (en) * 2006-02-23 2009-03-18 微软公司 Client side attack resistant phishing detection
CN101888427A (en) * 2009-05-12 2010-11-17 中国移动通信集团公司 Method for matching dialing name and terminal
CN102047260A (en) * 2008-05-28 2011-05-04 赛门铁克公司 Intelligent hashes for centralized malware detection
CN102638448A (en) * 2012-02-27 2012-08-15 珠海市君天电子科技有限公司 Method for judging phishing websites based on non-content analysis

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040172551A1 (en) * 2003-12-09 2004-09-02 Michael Connor First response computer virus blocking.

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101390068A (en) * 2006-02-23 2009-03-18 微软公司 Client side attack resistant phishing detection
CN102047260A (en) * 2008-05-28 2011-05-04 赛门铁克公司 Intelligent hashes for centralized malware detection
CN101888427A (en) * 2009-05-12 2010-11-17 中国移动通信集团公司 Method for matching dialing name and terminal
CN102638448A (en) * 2012-02-27 2012-08-15 珠海市君天电子科技有限公司 Method for judging phishing websites based on non-content analysis

Also Published As

Publication number Publication date
CN103020287A (en) 2013-04-03

Similar Documents

Publication Publication Date Title
US11483332B2 (en) System and method for cybersecurity analysis and score generation for insurance purposes
Thomas et al. Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software
US11637869B2 (en) System and method for self-adjusting cybersecurity analysis and score generation
De Donno et al. Cyber-storms come from clouds: Security of cloud computing in the IoT era
RU2015136264A (en) METHOD FOR DATABASE MAINTAINING AND RELATED SERVER
EP3759638B1 (en) Domain specific browser identifiers as replacement of browser cookies
WO2013034278A3 (en) Method for paying with at least one electronic payment means key
US20220060512A1 (en) System and methods for automatically assessing and improving a cybersecurity risk score
GB2534470A (en) Method and apparatus for managing access to electronic content
CN103020287B (en) Finite term purpose is excluded based on part cryptographic Hash
US20140373137A1 (en) Modification of application store output
US9749295B2 (en) Systems and methods for internet traffic analysis
JP2014011762A5 (en)
CN108235074B (en) Method for sending and receiving key information, server and computer equipment
CN102404331A (en) Method for judging whether website is maliciously tampered
Fuchs A note on the quicksort asymptotics
RU2015122725A (en) METHOD AND DEVICE FOR TRANSACTION MANAGEMENT
Qassem et al. Dengue fever or West Nile virus outbreak? Yemen 2013
Demon et al. Erratum: Caspase-11 is expressed in the colonic mucosa and protects against dextran sodium sulfate-induced colitis
Davis The Lighter Side of Things: The Inevitable Convergence of the Internet of Things and Cybersecurity
WO2014079257A1 (en) Exclusion of limited items on the basis of partial hash value
Salnikov et al. Some Problems with Securing Information on Mobile Connections
Fareed Arif et al. Efficient MUS Enumeration of Horn Formulae with Applications to Axiom Pinpointing
Braucher et al. AMS 13-Preface
Bashari et al. Identifing grazing indicator species using gradient analysis approach in Semi-Steppe rangelands of Feridan-Isfahan

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180810

Termination date: 20181228