CN102780686A - Credible resource based method and device for protecting bank user information - Google Patents
Credible resource based method and device for protecting bank user information Download PDFInfo
- Publication number
- CN102780686A CN102780686A CN2011101243257A CN201110124325A CN102780686A CN 102780686 A CN102780686 A CN 102780686A CN 2011101243257 A CN2011101243257 A CN 2011101243257A CN 201110124325 A CN201110124325 A CN 201110124325A CN 102780686 A CN102780686 A CN 102780686A
- Authority
- CN
- China
- Prior art keywords
- user
- bank
- card number
- browsing pages
- authentication information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Abstract
The invention provides a credible resource based method for protecting bank user information. The method includes obtaining a user card number from a page browsed by the user; determining the bank identification code for the card number of the user; determining the bank identification information about the card number of the user based on the bank identification code for the card number of the user; and prompting the user about information of the current operation based on the bank identification code for the card number of the user and the page browsed by the user.
Description
Technical field
The present invention relates to network security, and relate in particular to method and apparatus based on trusted resource protection bank-user information.
Background technology
Along with the professional development of internet payment, network payment also brings various problems when convenience in payment is provided, and wherein phishing scam is distinct issues the most.Show according to recent statistics information, in the recent period, official website of clone bank, the fraud that the transmission note is gained Net silver user fund by cheating is rampant once more.China Internet information report center monitors data have shown that since 2010, the swindle website report quantity relevant with bank obviously increases, nearly more than 70 of clone websites.In the case of medium public reported, the cheated amount of money of walking of user is arranged up to 1,000,000 yuan.According to national computer network emergency center estimation, the loss that " phishing " brings for the ecommerce user has reached 7,600,000,000 yuan at present, and it is 86 yuan that average every net purchase user " is angled " amount of money of walking.
In the situation of phishing scam, the holder is confused by fishing website and inputs right user name (containing account information) and password; Perhaps, in mail and note, provide false link, inveigle the holder to land the fishing website in the false link, gain holder's true identity authentication information by cheating with fishing mail and fishing short message mode.
Take advantage of means to these fishing; Each bank has designed multiple mode with some payment companies and has taken precautions against; But these modes can only prevent separately free website or bank card/Payment Card to be gone fishing, and unified all holders of strick precaution strategy protection can't be provided.
In addition, what prior art adopted is the blacklist mode, and under the situation that fishing website emerges in an endless stream at present, the blacklist mode is difficult to management.
Another common ground of prior art is that user's legal identity is verified, the username and password mode that for example is widely used.Yet, go again to swindle through the real legal identity of usurping and make the bank and the Net silver system of payment company be difficult to take precautions against.
Therefore, for solving above-mentioned and other problem, need a kind of unified precautionary technology solution.
Summary of the invention
For solving above-mentioned and other problem; According to one object of the present invention; A kind of method based on trusted resource protection bank-user information is provided, and trusted resource comprises bank's authentication information, bank's cognizance code, and wherein bank's authentication information is corresponding one by one with the bank cognizance code; Bank-user information comprises subscriber card number and user cipher; Said method comprising the steps of:
A, from the browsing pages of user capture, obtain user's card number;
B, definite bank's cognizance code about user's card number;
C, based on confirming bank's authentication information about user's card number about bank's cognizance code of user's card number;
D, based on about the bank's authentication information of user's card number and the browsing pages of user capture, the prompting user is about the information of current operation.
Preferably, in steps A, from the sequence that the user imports, obtain user's card number browsing pages.
Preferably, said sequence is 13 to 19 a numeric string.
Preferably, said sequence comprises 13 to 19 numeric string and other nonnumeric symbol.
Preferably, the time interval of the input operation of the numeral in the said sequence is less than 1 second.
Preferably, said bank authentication information comprises the credible IP of bank's trusted payment network address and/or bank address.
Preferably, the network address of the browsing pages through bank's trusted payment network address in bank's authentication information of user's card number relatively and user capture is pointed out the user information about current operation.
Preferably, the form of said prompting is a pop-up window in browsing pages.
Preferably, in step D, when judges is being utilized browsing pages visit untrusted resource, point out the current operation of user dangerous.
Preferably, trusted resource also comprises bank card number check digit position and bank's card number checking algorithm, and in step D, when judges was being utilized browsing pages visit trusted resource, said step D further comprised:
Utilization is confirmed the check digit position and the checking algorithm of user's card number about bank's cognizance code of user's card number, and utilizes the check digit position of this user's card number and checking algorithm to come the verified users card number,
What the prompting user was current when user's card number verification succeeds is operating as safety operation.
According to another object of the present invention, a kind of device based on trusted resource protection bank-user information is provided, trusted resource comprises bank's authentication information, bank's cognizance code, wherein bank's authentication information is corresponding one by one with the bank cognizance code; Bank-user information comprises subscriber card number and user cipher; This device comprises memory cell, capturing unit, judging unit, wherein,
Memory cell is used for storage and management trusted resource;
Capturing unit is used for obtaining user's card number from the browsing pages of user capture;
Judging unit is configured to confirm the bank's cognizance code about user's card number,
Judging unit further is configured to based on bank's authentication information of confirming user's card number about bank's cognizance code of user's card number,
Judging unit further is configured to point out the user information about current operation based on about the bank's authentication information of user's card number and the browsing pages of user capture.
Preferably, capturing unit obtains user's card number from the sequence that the user imports browsing pages.
Preferably, said sequence is 13 to 19 a numeric string.
Preferably, said sequence comprises 13 to 19 numeric string and other nonnumeric symbol.
Preferably, the time interval of the input operation of the numeral in the said sequence is less than 1 second.
Preferably, said bank authentication information comprises the credible IP of bank's trusted payment network address and/or bank address.
Preferably, judging unit is pointed out the user information about current operation through comparison about the network address of the browsing pages of bank's trusted payment network address in bank's authentication information of user's card number and user capture.
Preferably, the form of said prompting is a pop-up window in browsing pages.
Preferably, when the user was utilizing browsing pages visit untrusted resource, judging unit pointed out the current operation of user dangerous.
Preferably, trusted resource also comprises bank card number check digit position and bank's card number checking algorithm, and when judges was being utilized browsing pages visit trusted resource, judging unit further was configured to:
Utilization is confirmed the check digit position and the checking algorithm of user's card number about bank's cognizance code of user's card number, and utilizes the check digit position of this user's card number and checking algorithm to come the verified users card number, and
What the prompting user was current when user's card number verification succeeds is operating as safety operation.
Preferably, browsing pages is the browsing pages that in the browser of personal computer or handheld communication devices, produces.
Preferably, memory cell is the remote storage unit.
Preferably, device is installed in the employed browser of user capture browsing pages as plug-in unit.
Preferably, said device begins Monitoring Service automatically with the startup of browser.
An advantage of the present invention is based on trusted resource information, is prone to implement than the blacklist management, and safety and reliability.
Another advantage of the present invention is to have adopted screen to blur capture technique, promptly merely to the cardinar number word string, also to the centre separator is arranged, and the centre has operating time numeric string at interval all to carry out to catch action, enlarged the scope of protection.
Another advantage of the present invention is the card number verifying function, can be more accurate to the delivery operation prompting, protected cardholder account information better.
Another advantage of the present invention is to adopt IE safety insert technology, is convenient to install, and triggers automatically, and background job does not influence holder's daily use, is easy to accept.。
Description of drawings
With reference to advantages after the embodiment of the present invention, those skilled in the art will become apparent various aspects of the present invention.One skilled in the art will appreciate that these accompanying drawings only are used to cooperate embodiment that technical scheme of the present invention is described, and be not to be intended to protection scope of the present invention is constituted restriction.Wherein,
Fig. 1 is the flow chart based on the method for trusted resource protection bank-user information according to the embodiment of the invention.
Fig. 2 is the schematic representation of apparatus based on trusted resource protection bank-user information according to the embodiment of the invention.
Embodiment
With reference to the accompanying drawings, specific embodiments of the invention is done further to describe in detail.
In the present invention, trusted resource can be used as a table and is stored in the database, and is as shown in table 1 below, and trusted resource can comprise Bank Name, bank trusted payment address, bank's cognizance code, card number check digit position and card number checking algorithm.These data item to specific bank can provide foundation for protection specific bank user profile.In addition, can in the trusted resource table, safeguard trusted resource, so unified strick precaution can be provided for all holders about each bank of all holders.The trusted resource epiphase is easy to safeguard for the mode of blacklist more.
Bank Name |
Bank's trusted payment network address |
Bank card bin |
Card number check digit position |
The card number checking algorithm |
Table 1
What it will be appreciated by those skilled in the art that is that the data item in the table 1 can also be the information of other type or form.For example, can use bank credible IP address to replace bank trusted payment address as the holder safety verification to be provided as bank's authentication information.Here, bank card bin is the bank's cognizance code that is used to discern the affiliated bank of each card number.
The bank-user information of protecting comprises subscriber card number and user cipher.
In one embodiment, trusted resource can only comprise bank's authentication information and bank's cognizance code, and wherein bank's authentication information of each bank is corresponding one by one with the bank cognizance code.
As shown in Figure 1, it illustrates the flow chart based on the method for trusted resource protection bank-user information according to the embodiment of the invention.
In steps A, from the browsing pages of user capture, obtain user's card number.For example, as well-known to those skilled in the art, can obtain user's card number from the list entries the browsing pages of user capture.This sequence can be 13 to 19 numeric string.Alternately, this sequence can comprise 13 to 19 numeric string and other nonnumeric symbol, for example space or comma or strigula or the like.Alternately; The time interval of the input operation of the numeral in this sequence is less than 1 second; So; Divide under the situation of a plurality of edit box ineditings at numeric string, as long as the time interval between keyboard digital key operation and operation of keyboard shift key and the mouse move operation less than 1 second, also belongs to the scope of sequence capturing.One skilled in the art will appreciate that and to realize above-mentioned catching through variety of way such as computer program.Through this fuzzy catching method, can enlarge protection range to user's card number.After confirming list entries, can from this sequence, extract the user's card number that meets bank's card number form accordingly according to all-purpose bank's card number form.
In step B, confirm bank's cognizance code about user's card number, promptly block bin.This step can through with in the user's card number that obtains with trusted resource in bank's cognizance code mate and accomplish.
In step C, confirm bank's authentication information about user's card number based on bank's cognizance code about user's card number.Here, bank's authentication information is corresponding one by one with the bank cognizance code, i.e. the corresponding bank's authentication information of bank's cognizance code.
In step D,, point out the user information about current operation based on about the bank's authentication information of user's card number and the browsing pages of user capture.For example, can point out the user information about the network address of the browsing pages of bank's trusted payment network address in bank's authentication information of user's card number and user capture through comparison about current operation.
In one embodiment; When about the network address of the browsing pages of bank's trusted payment network address in bank's authentication information of user's card number and user capture when inconsistent; Confirm the user through browsing pages visit untrusted resource, thereby point out the current operation of user dangerous.Here can point out the page of user's current accessed possibly be the illegal page through the form that ejects dialog box.So, when one detect the page of user capture when dangerous immediately to user report, can before the user input password or after the user inputs password, click the fail safe that notify the current operation of user before the acknowledgement key immediately as far as possible.
In another embodiment; Trusted resource can also comprise bank card number check digit position and bank's card number checking algorithm; In step D; When judges was being utilized browsing pages visit trusted resource, said step D can also comprise next further prompting user's the current operation of the process of user's card number verification.The process of card number verification comprises that utilization confirms the check digit position and the checking algorithm of user's card number about bank's cognizance code of user's card number, and utilizes the check digit position of this user's card number and checking algorithm to come the verified users card number.What the prompting user was current when user's card number verification succeeds is operating as safety operation.Alternately, the prompting user possibly should note the account safety of cross-check information and protection oneself in the operation of paying when user's card number verification succeeds, so can more accurately protect user profile better.
Fig. 2 is the schematic representation of apparatus based on trusted resource protection bank-user information according to the embodiment of the invention.
As shown in Figure 2, protect the protective device of bank-user information to comprise memory cell, capturing unit, judging unit based on trusted resource.Wherein, memory cell is used for storage and management trusted resource.Here, it can be the remote storage unit perhaps that memory cell can be set at protective device inner, thereby communicates by letter with judging unit through network.Capturing unit is used for obtaining user's card number from the browsing pages of user capture.Judging unit is configured to confirm the bank's cognizance code about user's card number.Here, thus judging unit can mate the bank that confirms under user's card number according to bank's cognizance code of storing in the memory cell to the numeral in user's card number.
Judging unit further is configured to based on bank's authentication information of confirming user's card number about bank's cognizance code of user's card number.
Judging unit further is configured to point out the user information about current operation based on about the bank's authentication information of user's card number and the browsing pages of user capture.
In one embodiment, judging unit is pointed out the user information about current operation through comparison about the network address of the browsing pages of bank's trusted payment network address in bank's authentication information of user's card number and user capture.
In one embodiment, trusted resource can also comprise bank card number check digit position and bank's card number checking algorithm,
When judges was being utilized browsing pages visit trusted resource, judging unit further was configured to:
The check digit position and the checking algorithm of user's card number confirmed in utilization about bank's cognizance code of user's card number; And utilize the check digit position of this user's card number and checking algorithm to come the verified users card number, and when user's card number verification succeeds the prompting user current be operating as safety operation.
In an embodiment of the present invention, browsing pages can be the browsing pages that in the browser of personal computer or handheld communication devices, produces.
In another embodiment of the present invention, protective device is installed in the employed browser of user capture browsing pages as plug-in unit.Alternatively, protective device begins Monitoring Service automatically with the startup of browser.Here, protective device can be the secure browser plug-in unit, does not therefore have the preface of application, installs automatically, and with memory-resident, this protected mode is transparent fully to the user after installing, and not interference user regular job is convenient to the user and is accepted.
Through the description of above execution mode, those skilled in the art can understand, and under situation without departing from the spirit and scope of the present invention, can also specific embodiments of the invention do various changes and replacement.These changes and replacement all drop in claims of the present invention institute restricted portion.
Claims (24)
1. the method based on trusted resource protection bank-user information is characterized in that,
Trusted resource comprises bank's authentication information, bank's cognizance code, and wherein bank's authentication information is corresponding one by one with the bank cognizance code;
Bank-user information comprises subscriber card number and user cipher;
Said method comprising the steps of:
A, from the browsing pages of user capture, obtain user's card number;
B, definite bank's cognizance code about user's card number;
C, based on confirming bank's authentication information about user's card number about bank's cognizance code of user's card number;
D, based on about the bank's authentication information of user's card number and the browsing pages of user capture, the prompting user is about the information of current operation.
2. method according to claim 1 is characterized in that, in steps A, from the sequence that the user imports, obtains user's card number browsing pages.
3. method according to claim 2 is characterized in that, said sequence is 13 to 19 a numeric string.
4. method according to claim 2 is characterized in that, said sequence comprises 13 to 19 numeric string and other nonnumeric symbol.
5. method according to claim 2 is characterized in that the time interval of the input operation of the numeral in the said sequence is less than 1 second.
6. method according to claim 1 is characterized in that, said bank authentication information comprises the credible IP of bank's trusted payment network address and/or bank address.
7. method according to claim 6 is characterized in that, points out the user information about current operation through comparison about the network address of the browsing pages of bank's trusted payment network address in bank's authentication information of user's card number and user capture.
8. the method for claim 1 is characterized in that, the form of said prompting is a pop-up window in browsing pages.
9. method according to claim 1 is characterized in that, in step D, when judges is being utilized browsing pages visit untrusted resource, points out the current operation of user dangerous.
10. method according to claim 1 is characterized in that,
Said trusted resource also comprises bank card number check digit position and bank's card number checking algorithm,
In step D, when judges was being utilized browsing pages visit trusted resource, said step D further comprised:
Utilization is confirmed the check digit position and the checking algorithm of user's card number about bank's cognizance code of user's card number, and utilizes the check digit position of this user's card number and checking algorithm to come the verified users card number,
What the prompting user was current when user's card number verification succeeds is operating as safety operation.
11. the device based on trusted resource protection bank-user information is characterized in that,
Trusted resource comprises bank's authentication information, bank's cognizance code, and wherein bank's authentication information is corresponding one by one with the bank cognizance code;
Bank-user information comprises subscriber card number and user cipher;
This device comprises memory cell, capturing unit, judging unit, wherein,
Memory cell is used for storage and management trusted resource;
Capturing unit is used for obtaining user's card number from the browsing pages of user capture;
Judging unit is configured to confirm the bank's cognizance code about user's card number,
Judging unit further is configured to based on bank's authentication information of confirming user's card number about bank's cognizance code of user's card number,
Judging unit further is configured to point out the user information about current operation based on about the bank's authentication information of user's card number and the browsing pages of user capture.
12. device according to claim 11 is characterized in that, capturing unit obtains user's card number from the sequence that the user imports browsing pages.
13. device according to claim 12 is characterized in that, said sequence is 13 to 19 a numeric string.
14. device according to claim 12 is characterized in that, said sequence comprises 13 to 19 numeric string and other nonnumeric symbol.
15. device according to claim 12 is characterized in that, the time interval of the input operation of the numeral in the said sequence is less than 1 second.
16. device according to claim 11 is characterized in that, said bank authentication information comprises the credible IP of bank's trusted payment network address and/or bank address.
17. device according to claim 16 is characterized in that, judging unit is pointed out the user information about current operation through comparison about the network address of the browsing pages of bank's trusted payment network address in bank's authentication information of user's card number and user capture.
18. device as claimed in claim 11 is characterized in that, the form of said prompting is a pop-up window in browsing pages.
19. device according to claim 11 is characterized in that, when the user was utilizing browsing pages visit untrusted resource, judging unit pointed out the current operation of user dangerous.
20. device according to claim 11 is characterized in that,
Said trusted resource also comprises bank card number check digit position and bank's card number checking algorithm,
When judges was being utilized browsing pages visit trusted resource, judging unit further was configured to:
Utilization is confirmed the check digit position and the checking algorithm of user's card number about bank's cognizance code of user's card number, and utilizes the check digit position of this user's card number and checking algorithm to come the verified users card number, and
What the prompting user was current when user's card number verification succeeds is operating as safety operation.
21. device according to claim 11 is characterized in that, said browsing pages is the browsing pages that in the browser of personal computer or handheld communication devices, produces.
22. device according to claim 12 is characterized in that, said memory cell is the remote storage unit.
23. device according to claim 12 is characterized in that, said device is installed in the employed browser of user capture browsing pages as plug-in unit.
24. device according to claim 23 is characterized in that, said device begins Monitoring Service automatically with the startup of browser.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101243257A CN102780686A (en) | 2011-05-13 | 2011-05-13 | Credible resource based method and device for protecting bank user information |
PCT/CN2012/075436 WO2012155818A1 (en) | 2011-05-13 | 2012-05-14 | Method and device for protecting user information based on credible resource |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101243257A CN102780686A (en) | 2011-05-13 | 2011-05-13 | Credible resource based method and device for protecting bank user information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102780686A true CN102780686A (en) | 2012-11-14 |
Family
ID=47125442
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011101243257A Pending CN102780686A (en) | 2011-05-13 | 2011-05-13 | Credible resource based method and device for protecting bank user information |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102780686A (en) |
WO (1) | WO2012155818A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103854169A (en) * | 2012-11-28 | 2014-06-11 | 纽海信息技术(上海)有限公司 | Integrated payment system |
CN104217494A (en) * | 2013-05-30 | 2014-12-17 | 财付通支付科技有限公司 | Card number calibration method and device |
CN110956467A (en) * | 2019-10-30 | 2020-04-03 | 网银在线(北京)科技有限公司 | Data storage method, device and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090126795A1 (en) * | 2009-01-10 | 2009-05-21 | Williams Charles J | 3-D energy cell w/t reflector |
CN101714272A (en) * | 2009-11-19 | 2010-05-26 | 北京邮电大学 | Method for protecting number and password of bank card from stealing by phishing website |
CN101911134A (en) * | 2007-12-28 | 2010-12-08 | 艾格瑞系统有限公司 | Credit and debit card transaction approval using location verification |
CN101919219A (en) * | 2007-09-19 | 2010-12-15 | 阿尔卡特朗讯美国公司 | Method and apparatus for preventing phishing attacks |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1738240A (en) * | 2004-08-16 | 2006-02-22 | 彭国展 | Attestation method and safe identification method for network identity |
CN1900963A (en) * | 2005-07-18 | 2007-01-24 | 中国银联股份有限公司 | Online safety payment system |
-
2011
- 2011-05-13 CN CN2011101243257A patent/CN102780686A/en active Pending
-
2012
- 2012-05-14 WO PCT/CN2012/075436 patent/WO2012155818A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101919219A (en) * | 2007-09-19 | 2010-12-15 | 阿尔卡特朗讯美国公司 | Method and apparatus for preventing phishing attacks |
CN101911134A (en) * | 2007-12-28 | 2010-12-08 | 艾格瑞系统有限公司 | Credit and debit card transaction approval using location verification |
US20090126795A1 (en) * | 2009-01-10 | 2009-05-21 | Williams Charles J | 3-D energy cell w/t reflector |
CN101714272A (en) * | 2009-11-19 | 2010-05-26 | 北京邮电大学 | Method for protecting number and password of bank card from stealing by phishing website |
Non-Patent Citations (1)
Title |
---|
无: "银行卡发卡行标识代码及卡号", 《中国信用卡》, no. 5, 31 May 2001 (2001-05-31), pages 23 - 24 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103854169A (en) * | 2012-11-28 | 2014-06-11 | 纽海信息技术(上海)有限公司 | Integrated payment system |
CN103854169B (en) * | 2012-11-28 | 2019-02-12 | 北京京东尚科信息技术有限公司 | Integrated Payments system |
CN104217494A (en) * | 2013-05-30 | 2014-12-17 | 财付通支付科技有限公司 | Card number calibration method and device |
CN110956467A (en) * | 2019-10-30 | 2020-04-03 | 网银在线(北京)科技有限公司 | Data storage method, device and system |
Also Published As
Publication number | Publication date |
---|---|
WO2012155818A1 (en) | 2012-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104009977B (en) | A kind of method and system of information protection | |
RU2635275C1 (en) | System and method of identifying user's suspicious activity in user's interaction with various banking services | |
CN104468249B (en) | Account abnormity detection method and device | |
CN105262779B (en) | Identity authentication method, device and system | |
EP1875653B1 (en) | System and method for fraud monitoring, detection, and tiered user authentication | |
CN101496344B (en) | Method and system having self-setting authentication formula for webs bank payment and identification confirmation | |
CN103368957B (en) | Method and system that web page access behavior is processed, client, server | |
US10484426B2 (en) | Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity | |
CN108012268A (en) | A kind of mobile phone terminal SIM card and the method for safe handling App, medium | |
CN109039987A (en) | A kind of user account login method, device, electronic equipment and storage medium | |
WO2013028794A2 (en) | Multi-factor identity fingerprinting with user behavior | |
US11403633B2 (en) | Method for sending digital information | |
CN109978533B (en) | Offline secure payment system and method for resisting two-dimension code theft | |
CN112217835A (en) | Message data processing method and device, server and terminal equipment | |
Kang et al. | Security considerations for smart phone smishing attacks | |
CN105431843A (en) | Network identity authentication using communication device identification code | |
CN107918911A (en) | System and method for performing safe web bank transaction | |
CN105635044B (en) | Information synchronization method and device | |
CN106559419A (en) | The application and identification method and identification terminal of short message verification code | |
CN102780686A (en) | Credible resource based method and device for protecting bank user information | |
CN107948973B (en) | Equipment fingerprint generation method applied to IOS (input/output system) for security risk control | |
CN106897880A (en) | A kind of account methods of risk assessment and equipment | |
US20150066763A1 (en) | Method and apparatus for cross channel monitoring | |
Boggs et al. | Discovery of emergent malicious campaigns in cellular networks | |
KR20150059882A (en) | System and method for analyzing malicious application of smart-phone and service system and service method for blocking malicious application of smart-phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20121114 |