CN103020287B - Finite term purpose is excluded based on part cryptographic Hash - Google Patents
Finite term purpose is excluded based on part cryptographic Hash Download PDFInfo
- Publication number
- CN103020287B CN103020287B CN201210582239.5A CN201210582239A CN103020287B CN 103020287 B CN103020287 B CN 103020287B CN 201210582239 A CN201210582239 A CN 201210582239A CN 103020287 B CN103020287 B CN 103020287B
- Authority
- CN
- China
- Prior art keywords
- cryptographic hash
- user
- network address
- term purpose
- finite term
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
Part cryptographic Hash excludes finite term purpose, is to submit the part cryptographic Hash of project and service provider's database the inside black by user(In vain)The cryptographic Hash of list is compared exclusion, is conducive to the privacy for protecting user.
Description
Technical field
Computer, internet, cryptography.
Background technology
All it is at present by submitting the network address of user or the complete cryptographic Hash of network address to the exclusion of fishing website(Such as:md5)
Then compare with the fishing network address blacklist inside database and excluded.And if server is to all network address domain name meters in the whole world
Cryptographic Hash is calculated, server still can inquire the actually opened website of user from the cryptographic Hash that user submits, be unfavorable for using
The protection of family privacy.
Invention content
The Hash value part that user's network address is calculated is submitted into service provider, if the part cryptographic Hash that a) user submits
Not inside blacklist, the possibility of fishing network address has just been eliminated.If b) the part cryptographic Hash that user submits is taking
Existing inside quotient data of being engaged in library can number of downloads(Such as:1000), user can download the identical cryptographic Hash in these parts, at this
Ground is compared.If c) first 2 are also unable to reach, increase the cryptographic Hash partial amt that user submits(Length), continue first 2
Judge until completing.
Claims (2)
1. one kind is based on part cryptographic Hash to finite term purpose method for removing, technical characteristic is:User's network address is calculated
Hash value part submit to service provider, if the part cryptographic Hash that user submits just has been arranged not inside blacklist
In addition to the possibility for network address of going fishing.
2. one kind is based on part cryptographic Hash to finite term purpose method for removing, technical characteristic is:User's network address is calculated
Hash value part submit to service provider, if the part cryptographic Hash submitted of user inside service provider's database in the presence of can download
Quantity, user can download the identical cryptographic Hash in these parts, be compared locally.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210582239.5A CN103020287B (en) | 2012-11-20 | 2012-12-28 | Finite term purpose is excluded based on part cryptographic Hash |
PCT/CN2013/082904 WO2014079257A1 (en) | 2012-11-20 | 2013-09-04 | Exclusion of limited items on the basis of partial hash value |
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210470121 | 2012-11-20 | ||
CN2012104701213 | 2012-11-20 | ||
CN201210470121.3 | 2012-11-20 | ||
CN201210581099X | 2012-12-28 | ||
CN201210581099.X | 2012-12-28 | ||
CN201210581099 | 2012-12-28 | ||
CN201210582239.5A CN103020287B (en) | 2012-11-20 | 2012-12-28 | Finite term purpose is excluded based on part cryptographic Hash |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103020287A CN103020287A (en) | 2013-04-03 |
CN103020287B true CN103020287B (en) | 2018-08-10 |
Family
ID=47968890
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210582239.5A Expired - Fee Related CN103020287B (en) | 2012-11-20 | 2012-12-28 | Finite term purpose is excluded based on part cryptographic Hash |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103020287B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014079257A1 (en) * | 2012-11-20 | 2014-05-30 | Gao Jianqing | Exclusion of limited items on the basis of partial hash value |
CN103701804A (en) * | 2013-12-26 | 2014-04-02 | 北京奇虎科技有限公司 | Network shopping environment safety detecting method and device |
CN107786529B (en) * | 2016-08-31 | 2020-12-01 | 阿里巴巴集团控股有限公司 | Website detection method, device and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101390068A (en) * | 2006-02-23 | 2009-03-18 | 微软公司 | Client side attack resistant phishing detection |
CN101888427A (en) * | 2009-05-12 | 2010-11-17 | 中国移动通信集团公司 | Method for matching dialing name and terminal |
CN102047260A (en) * | 2008-05-28 | 2011-05-04 | 赛门铁克公司 | Intelligent hashes for centralized malware detection |
CN102638448A (en) * | 2012-02-27 | 2012-08-15 | 珠海市君天电子科技有限公司 | Method for judging phishing websites based on non-content analysis |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040172551A1 (en) * | 2003-12-09 | 2004-09-02 | Michael Connor | First response computer virus blocking. |
-
2012
- 2012-12-28 CN CN201210582239.5A patent/CN103020287B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101390068A (en) * | 2006-02-23 | 2009-03-18 | 微软公司 | Client side attack resistant phishing detection |
CN102047260A (en) * | 2008-05-28 | 2011-05-04 | 赛门铁克公司 | Intelligent hashes for centralized malware detection |
CN101888427A (en) * | 2009-05-12 | 2010-11-17 | 中国移动通信集团公司 | Method for matching dialing name and terminal |
CN102638448A (en) * | 2012-02-27 | 2012-08-15 | 珠海市君天电子科技有限公司 | Method for judging phishing websites based on non-content analysis |
Also Published As
Publication number | Publication date |
---|---|
CN103020287A (en) | 2013-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11483332B2 (en) | System and method for cybersecurity analysis and score generation for insurance purposes | |
Thomas et al. | Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software | |
US11637869B2 (en) | System and method for self-adjusting cybersecurity analysis and score generation | |
De Donno et al. | Cyber-storms come from clouds: Security of cloud computing in the IoT era | |
RU2015136264A (en) | METHOD FOR DATABASE MAINTAINING AND RELATED SERVER | |
EP3759638B1 (en) | Domain specific browser identifiers as replacement of browser cookies | |
WO2013034278A3 (en) | Method for paying with at least one electronic payment means key | |
US20220060512A1 (en) | System and methods for automatically assessing and improving a cybersecurity risk score | |
GB2534470A (en) | Method and apparatus for managing access to electronic content | |
CN103020287B (en) | Finite term purpose is excluded based on part cryptographic Hash | |
US20140373137A1 (en) | Modification of application store output | |
US9749295B2 (en) | Systems and methods for internet traffic analysis | |
JP2014011762A5 (en) | ||
CN108235074B (en) | Method for sending and receiving key information, server and computer equipment | |
CN102404331A (en) | Method for judging whether website is maliciously tampered | |
Fuchs | A note on the quicksort asymptotics | |
RU2015122725A (en) | METHOD AND DEVICE FOR TRANSACTION MANAGEMENT | |
Qassem et al. | Dengue fever or West Nile virus outbreak? Yemen 2013 | |
Demon et al. | Erratum: Caspase-11 is expressed in the colonic mucosa and protects against dextran sodium sulfate-induced colitis | |
Davis | The Lighter Side of Things: The Inevitable Convergence of the Internet of Things and Cybersecurity | |
WO2014079257A1 (en) | Exclusion of limited items on the basis of partial hash value | |
Salnikov et al. | Some Problems with Securing Information on Mobile Connections | |
Fareed Arif et al. | Efficient MUS Enumeration of Horn Formulae with Applications to Axiom Pinpointing | |
Braucher et al. | AMS 13-Preface | |
Bashari et al. | Identifing grazing indicator species using gradient analysis approach in Semi-Steppe rangelands of Feridan-Isfahan |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180810 Termination date: 20181228 |