CN102027728B - 用于战胜中间人计算机黑客技术的方法和系统 - Google Patents

用于战胜中间人计算机黑客技术的方法和系统 Download PDF

Info

Publication number
CN102027728B
CN102027728B CN2009801174366A CN200980117436A CN102027728B CN 102027728 B CN102027728 B CN 102027728B CN 2009801174366 A CN2009801174366 A CN 2009801174366A CN 200980117436 A CN200980117436 A CN 200980117436A CN 102027728 B CN102027728 B CN 102027728B
Authority
CN
China
Prior art keywords
user
website
ippw
transaction
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2009801174366A
Other languages
English (en)
Chinese (zh)
Other versions
CN102027728A (zh
Inventor
爱德华·E·凯利
韦恩·M·迪莉娅
佛朗哥·莫蒂卡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CN102027728A publication Critical patent/CN102027728A/zh
Application granted granted Critical
Publication of CN102027728B publication Critical patent/CN102027728B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
CN2009801174366A 2008-06-03 2009-05-28 用于战胜中间人计算机黑客技术的方法和系统 Active CN102027728B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/132,203 2008-06-03
US12/132,203 US8055587B2 (en) 2008-06-03 2008-06-03 Man in the middle computer technique
PCT/EP2009/056500 WO2009147049A2 (en) 2008-06-03 2009-05-28 Method and system for defeating the man in the middle computer hacking technique

Publications (2)

Publication Number Publication Date
CN102027728A CN102027728A (zh) 2011-04-20
CN102027728B true CN102027728B (zh) 2013-10-02

Family

ID=41380876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009801174366A Active CN102027728B (zh) 2008-06-03 2009-05-28 用于战胜中间人计算机黑客技术的方法和系统

Country Status (8)

Country Link
US (1) US8055587B2 (https=)
EP (1) EP2232811B1 (https=)
JP (1) JP4921614B2 (https=)
KR (1) KR20110014177A (https=)
CN (1) CN102027728B (https=)
AT (1) ATE536591T1 (https=)
CA (1) CA2706582C (https=)
WO (1) WO2009147049A2 (https=)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102377572B (zh) * 2011-11-23 2014-01-29 广东南方信息安全产业基地有限公司 基于线性移位的双向认证方法
US8800004B2 (en) 2012-03-21 2014-08-05 Gary Martin SHANNON Computerized authorization system and method
US8954004B1 (en) 2012-09-20 2015-02-10 Trend Micro Incorporated Systems and methods for accessing websites using smartphones
US10693893B2 (en) 2018-01-16 2020-06-23 International Business Machines Corporation Detection of man-in-the-middle in HTTPS transactions independent of certificate trust chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030188012A1 (en) * 2002-03-29 2003-10-02 Ford Daniel E. Access control system and method for a networked computer system
US7171564B2 (en) * 2002-08-29 2007-01-30 International Business Machines Corporation Universal password generation method
CN101034977A (zh) * 2006-04-21 2007-09-12 飞塔信息科技(北京)有限公司 在客户端计算机上施加策略兼容的方法、装置、信号和介质

Family Cites Families (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US6085224A (en) * 1997-03-11 2000-07-04 Intracept, Inc. Method and system for responding to hidden data and programs in a datastream
US6112240A (en) * 1997-09-03 2000-08-29 International Business Machines Corporation Web site client information tracker
US6092196A (en) * 1997-11-25 2000-07-18 Nortel Networks Limited HTTP distributed remote user authentication system
US6304906B1 (en) * 1998-08-06 2001-10-16 Hewlett-Packard Company Method and systems for allowing data service system to provide class-based services to its users
US6205480B1 (en) * 1998-08-19 2001-03-20 Computer Associates Think, Inc. System and method for web server user authentication
US6374359B1 (en) * 1998-11-19 2002-04-16 International Business Machines Corporation Dynamic use and validation of HTTP cookies for authentication
US6985953B1 (en) * 1998-11-30 2006-01-10 George Mason University System and apparatus for storage and transfer of secure data on web
US6714926B1 (en) * 1999-02-02 2004-03-30 Amazon.Com, Inc. Use of browser cookies to store structured data
US7155605B1 (en) * 1999-03-31 2006-12-26 Lenovo (Singapore) Pte. Ltd. Data processing system and method for maintaining secure data blocks
US6751654B2 (en) * 1999-03-31 2004-06-15 International Business Machines Corporation Simulating web cookies for non-cookie capable browsers
US6226752B1 (en) * 1999-05-11 2001-05-01 Sun Microsystems, Inc. Method and apparatus for authenticating users
US7188181B1 (en) * 1999-06-30 2007-03-06 Sun Microsystems, Inc. Universal session sharing
US6976077B1 (en) * 1999-07-06 2005-12-13 Microsoft Corporation Automatic and transparent synchronization of server-side state information with a client application
US6789115B1 (en) * 1999-07-09 2004-09-07 Merrill Lynch & Company System for collecting, analyzing, and reporting high volume multi-web server usage
US6970933B1 (en) * 1999-07-15 2005-11-29 F5 Networks, Inc. Enabling application level persistence between a server and another resource over a network
US6851060B1 (en) * 1999-07-15 2005-02-01 International Business Machines Corporation User control of web browser user data
US7287084B1 (en) * 1999-07-15 2007-10-23 F5 Networks, Inc. Enabling encryption of application level persistence between a server and a client
US20010027439A1 (en) * 1999-07-16 2001-10-04 Holtzman Henry N. Method and system for computerized form completion
US6651217B1 (en) * 1999-09-01 2003-11-18 Microsoft Corporation System and method for populating forms with previously used data values
US6909785B1 (en) * 1999-11-11 2005-06-21 Qualcomm, Inc. Method and apparatus for efficient irregular synchronization of a stream cipher
US6725269B1 (en) * 1999-12-02 2004-04-20 International Business Machines Corporation System and method for maintaining multiple identities and reputations for internet interactions
JP2001274786A (ja) * 2000-01-21 2001-10-05 Victor Co Of Japan Ltd コンテンツ情報伝送方法、コンテンツ情報記録方法、コンテンツ情報伝送装置、コンテンツ情報記録装置、伝送媒体、及び記録媒体
US6751736B1 (en) * 2000-03-14 2004-06-15 International Business Machines Corporation Method and apparatus for E-commerce by using optional fields for virtual bar codes
US7200863B2 (en) * 2000-05-16 2007-04-03 Hoshiko Llc System and method for serving content over a wide area network
US6714930B1 (en) * 2000-05-31 2004-03-30 International Business Machines Corporation Lightweight directory access protocol, (LDAP) trusted processing of unique identifiers
US6836845B1 (en) * 2000-06-30 2004-12-28 Palm Source, Inc. Method and apparatus for generating queries for secure authentication and authorization of transactions
US7194764B2 (en) * 2000-07-10 2007-03-20 Oracle International Corporation User authentication
US7124203B2 (en) * 2000-07-10 2006-10-17 Oracle International Corporation Selective cache flushing in identity and access management systems
US7249369B2 (en) * 2000-07-10 2007-07-24 Oracle International Corporation Post data processing
US6973580B1 (en) * 2000-07-13 2005-12-06 International Business Machines Corporation System and method for alerting computer users of digital security intrusions
US7010605B1 (en) * 2000-08-29 2006-03-07 Microsoft Corporation Method and apparatus for encoding and storing session data
JP2002091828A (ja) * 2000-09-18 2002-03-29 Sharp Corp データ処理装置および記憶装置、並びに、それらを使用したデータ転送システム
US7085744B2 (en) * 2000-12-08 2006-08-01 International Business Machines Corporation Method and system for conducting a transaction over a network
US7185364B2 (en) * 2001-03-21 2007-02-27 Oracle International Corporation Access system interface
US7020705B2 (en) * 2001-04-26 2006-03-28 Intel Corporation De-authenticating in security environments only providing authentication
US7231661B1 (en) * 2001-06-21 2007-06-12 Oracle International Corporation Authorization services with external authentication
US7225256B2 (en) * 2001-11-30 2007-05-29 Oracle International Corporation Impersonation in an access system
US6665634B2 (en) * 2001-12-21 2003-12-16 Hewlett-Packard Development Company, L.P. Test system for testing dynamic information returned by a web server
ATE322790T1 (de) * 2002-01-18 2006-04-15 Stonesoft Corp Ueberwachung des datenflusses zur verbesserung des netzwerksicherheitsschutzes
US7100049B2 (en) * 2002-05-10 2006-08-29 Rsa Security Inc. Method and apparatus for authentication of users and web sites
US7334013B1 (en) * 2002-12-20 2008-02-19 Microsoft Corporation Shared services management
US20040158746A1 (en) * 2003-02-07 2004-08-12 Limin Hu Automatic log-in processing and password management system for multiple target web sites
US7281130B2 (en) * 2003-07-30 2007-10-09 Hewlett-Packard Development Company, L.P. Storing authentication sequences for expedited login to secure applications
US7340496B2 (en) * 2003-12-17 2008-03-04 International Business Machines Corporation System and method for determining the Nth state of linear feedback shift registers
FR2905488B1 (fr) * 2006-09-04 2011-04-01 Baracoda Architecture d'acces a un flux de donnees au moyen d'un terminal utilisateur
US20080104672A1 (en) * 2006-10-25 2008-05-01 Iovation, Inc. Detecting and preventing man-in-the-middle phishing attacks
US8745151B2 (en) * 2006-11-09 2014-06-03 Red Hat, Inc. Web page protection against phishing
US8356345B2 (en) * 2008-06-03 2013-01-15 International Business Machines Corporation Constructing a secure internet transaction

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030188012A1 (en) * 2002-03-29 2003-10-02 Ford Daniel E. Access control system and method for a networked computer system
US7171564B2 (en) * 2002-08-29 2007-01-30 International Business Machines Corporation Universal password generation method
CN101034977A (zh) * 2006-04-21 2007-09-12 飞塔信息科技(北京)有限公司 在客户端计算机上施加策略兼容的方法、装置、信号和介质

Also Published As

Publication number Publication date
US20090299759A1 (en) 2009-12-03
CA2706582A1 (en) 2009-12-10
EP2232811B1 (en) 2011-12-07
WO2009147049A3 (en) 2010-02-25
ATE536591T1 (de) 2011-12-15
WO2009147049A2 (en) 2009-12-10
EP2232811A2 (en) 2010-09-29
US8055587B2 (en) 2011-11-08
CA2706582C (en) 2017-04-11
CN102027728A (zh) 2011-04-20
JP4921614B2 (ja) 2012-04-25
JP2011525011A (ja) 2011-09-08
KR20110014177A (ko) 2011-02-10

Similar Documents

Publication Publication Date Title
TWI424726B (zh) 消除中間人電腦駭客技術之方法及系統
US9537861B2 (en) Method of mutual verification between a client and a server
US8019995B2 (en) Method and apparatus for preventing internet phishing attacks
US20080148057A1 (en) Security token
US20080168546A1 (en) Randomized images collection method enabling a user means for entering data from an insecure client-computing device to a server-computing device
EP3258375A1 (en) Systems and methods for detecting and reacting to malicious activity in computer networks
US20160036849A1 (en) Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies
Dougan et al. Man in the browser attacks
US20100031041A1 (en) Method and system for securing internet communication from hacking attacks
CN101897166A (zh) 用于使用浏览器组件建立安全通信信道的系统和方法
KR20080101333A (ko) 가상키보드를 이용한 보안방법
CN101473314B (zh) 在不可信机器上输入机密信息
CN102027728B (zh) 用于战胜中间人计算机黑客技术的方法和系统
Badra et al. Phishing attacks and solutions
Routh et al. Attacks and vulnerability analysis of e-mail as a password reset point
Sidheeq et al. Utilizing trusted platform module to mitigate botnet attacks
Fowdur et al. Implementation of SSL/TLS-based security mechanisms in e-commerce and e-mail applications using Java
Luckett Phishing Resistant Systems: A Literature Review.
CN111669746A (zh) 一种用于物联网信息安全的防护系统
JP7643676B2 (ja) 認証要素ファイル
VERMA et al. Covert Channel using User-Agent String in the HTTP Header
Krishna et al. Authenticating Clients without using their Login IDs through Mind Metrics
Misbahuddin Survey on DNS Specific Security Issues and Solution Approach
Ghazizadeh et al. Research Article Secure OpenID Authentication Model by Using Trusted Computing
KR20080019743A (ko) 웹사이트 탐색시 키로거로부터 안전한 중요정보 입력방법

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant