CN116938557B - Fake website identification method based on blockchain, electronic equipment and storage medium - Google Patents

Fake website identification method based on blockchain, electronic equipment and storage medium Download PDF

Info

Publication number
CN116938557B
CN116938557B CN202310901897.4A CN202310901897A CN116938557B CN 116938557 B CN116938557 B CN 116938557B CN 202310901897 A CN202310901897 A CN 202310901897A CN 116938557 B CN116938557 B CN 116938557B
Authority
CN
China
Prior art keywords
website
unique identification
identification information
blockchain
counterfeit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310901897.4A
Other languages
Chinese (zh)
Other versions
CN116938557A (en
Inventor
刘文胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shidai Technology Co ltd
Original Assignee
Shanghai Shidai Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shidai Technology Co ltd filed Critical Shanghai Shidai Technology Co ltd
Priority to CN202310901897.4A priority Critical patent/CN116938557B/en
Publication of CN116938557A publication Critical patent/CN116938557A/en
Application granted granted Critical
Publication of CN116938557B publication Critical patent/CN116938557B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention provides a block chain-based counterfeit website identification method, a block chain-based counterfeit website identification system and block chain-based counterfeit website identification equipment, and relates to the field of counterfeit website identification, wherein the method comprises the following steps: acquiring unique identification information of a visiting website; the unique identification information comprises a website address; inquiring an official authentication certificate of the blockchain according to the unique identification information; the certificate includes brand party, unique identification of website and brand public information; judging whether the certification certificate is displayed or not, if so, determining the type of the access website according to the unique identification information and the certification certificate; the types include official authentication websites and counterfeit websites; if not, determining the access website as a counterfeit website. The invention can improve the identification efficiency of the counterfeit website.

Description

Fake website identification method based on blockchain, electronic equipment and storage medium
Technical Field
The invention relates to the field of counterfeit website identification, in particular to a method, a system and equipment for identifying counterfeit websites based on blockchain.
Background
At present, the counterfeit actions such as village, high imitation and the like are performed on the market, and various fraudulent consumers can frequently perform actions such as using counterfeit websites, counterfeit public numbers, counterfeit applets and counterfeit APP. With the development of internet technology, people have more opportunities to access networks and use various websites, applets, APP and other programs in work, life and shopping. The lack of effective judgment of the authenticity of network sites and content has led to an increasing probability of being deceptively produced. There is a need for an effective way to contain this behavior and inform the user whether the access object is trusted.
At present, two technologies for verifying counterfeit websites generally exist in the market, one is to uplink the content of the accessed website, compare the displayed content of the website with the blockchain certificate when the user accesses the website, and judge whether the content of the accessed website is tampered or not and judge whether the counterfeit exists or not. The other mode is that the AI technology is utilized to report the malicious website automatically or manually, then a malicious website database is established, when a user accesses the malicious website registered in the database, the browser automatically intercepts, and similar early warning information such as a red exclamation mark appears on a page to inform the user of impersonation.
The above scheme 1 needs to be uplink because of the content of the web site, but the content of the web page is generally complex and diverse, and the content of the web page is not unique and is easy to copy. Frequent updates of the page content result in the need to re-document the page content for each update. Because the page content is stored in a webpage screenshot mode, the picture identification and reading rate of the access page and the stored page is low in comparison, and mistakes are easy to occur. The uplink process is very complex and costly. In the scheme 2, malicious or counterfeit websites are stored in the database by means of reporting, and interception is performed when the recorded websites are accessed, and in the scheme, lawbreakers often replace the counterfeit websites access addresses, so that sample data of the counterfeit websites need to be continuously learned and added to improve the hit rate of database comparison, and the related interception time is poor.
Disclosure of Invention
The invention aims to provide a block chain-based counterfeit website identification method, a block chain-based counterfeit website identification system and block chain-based counterfeit website identification equipment, which are used for solving the problems that the counterfeit website identification process is complex and the counterfeit website identification efficiency is low due to the fact that a large amount of sample data is required.
In order to achieve the above object, the present invention provides the following solutions:
a counterfeit website identification method based on a blockchain comprises the following steps:
acquiring unique identification information of a visiting website; the unique identification information comprises a website address;
inquiring an official authentication certificate of the blockchain according to the unique identification information; the certificate includes brand party, unique identification of website and brand public information;
judging whether the certificate is displayed or not to obtain a first judgment result;
if the first judgment result shows that the certification certificate is displayed, determining the type of the access website according to the unique identification information and the certification certificate; the types include official authentication websites and counterfeit websites;
and if the first judgment result shows that the certificate is not displayed, determining that the access website is a counterfeit website.
Optionally, inquiring the certification authority of the official certification on the blockchain according to the unique identification information specifically includes:
extracting brand names in the unique identification information;
matching a brand party corresponding to the brand name on the blockchain;
a certification authority for official certification on the blockchain is determined from a brand party corresponding to the brand name.
Optionally, determining the type of the access website according to the unique identification information and the certification certificate specifically includes:
acquiring official unique identification information on the certificate;
comparing the unique identification information of the access website with the official unique identification information, judging whether the unique identification information is matched with the official unique identification information or not, and obtaining a second judgment result;
if the second judgment result shows that the unique identification information and the official unique identification information are matched, determining that the access website is an official authentication website;
and if the second judgment result shows that the unique identification information and the official unique identification information are not matched, determining that the access website is a counterfeit website.
Optionally, determining the access website is a counterfeit website specifically includes:
extracting a brand name in the unique identification information, judging whether a brand party corresponding to the brand name performs authentication operation on the blockchain according to the brand name, and obtaining a third judgment result;
if the third judging result shows that the brand party corresponding to the brand name performs authentication operation on the blockchain, determining that the access website is a counterfeit website;
and if the third judging result shows that the brand party corresponding to the brand name does not perform authentication operation on the blockchain, determining that the access website is a suspected counterfeit website.
Optionally, the method further comprises:
updating the certification authority certificate of the official certification on the blockchain in real time.
A blockchain-based counterfeit website identification system, comprising:
the unique identification information acquisition module is used for acquiring the unique identification information of the access website; the unique identification information comprises a website address;
the certification storing certificate inquiring module is used for inquiring the certification storing certificate of the official authentication on the blockchain according to the unique identification information; the certificate includes brand party, unique identification of website and brand public information;
the first judging module is used for judging whether the certificate is displayed or not to obtain a first judging result;
the type determining module of the access website is used for determining the type of the access website according to the unique identification information and the certificate if the first judging result shows that the certificate is displayed; the types include official authentication websites and counterfeit websites;
and the counterfeit website determining module is used for determining that the access website is a counterfeit website if the first judging result shows that the certificate is not displayed.
Optionally, the certificate-preserving certificate query module specifically includes:
a brand name extraction unit configured to extract a brand name in the unique identification information;
a brand party matching unit for matching a brand party corresponding to the brand name on the blockchain;
and the certification authority determining unit is used for determining certification authorities on the blockchain according to the brand parties corresponding to the brand names.
Optionally, the type determining module of the access website specifically includes:
an official unique identification information acquisition unit configured to acquire official unique identification information on the certificate of certification;
the second judging unit is used for comparing the unique identification information of the access website with the official unique identification information and judging whether the unique identification information is matched with the official unique identification information or not to obtain a second judging result;
the official authentication website determining unit is used for determining that the access website is an official authentication website if the second judging result shows that the unique identification information is matched with the official unique identification information;
and the counterfeit website determining unit is used for determining that the access website is a counterfeit website if the second judging result shows that the unique identification information and the official unique identification information are not matched.
An electronic device comprising a memory for storing a computer program and a processor that runs the computer program to cause the electronic device to perform the blockchain-based counterfeit website identification method described above.
A computer readable storage medium storing a computer program which when executed by a processor implements the blockchain-based counterfeit website identification method described above.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects: the invention only uploads the unique identification information of the access website on the blockchain, does not need to uplink to access all page contents of the website, greatly reduces the uplink burden and the uplink cost, queries the official authentication certificate on the blockchain according to the unique identification information, and is a counterfeit website as long as the official authentication certificate cannot be queried no matter how the website of the malicious website is transformed, thereby greatly improving the identification efficiency of the counterfeit website.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions of the prior art, the drawings that are needed in the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a method for identifying a counterfeit website based on a blockchain provided by the invention;
FIG. 2 is a flow chart of a first access mode operation provided by the present invention;
FIG. 3 is a flow chart of a second access mode operation provided by the present invention;
FIG. 4 is a flowchart of a method for identifying a counterfeit website based on a blockchain in the actual operation process provided by the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention aims to provide a method, a system and equipment for identifying a counterfeit website based on a blockchain, which improve the identification efficiency of the counterfeit website.
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description.
The invention relates to a trusted website authenticity verification technology based on a blockchain, which is used for carrying out blockchain verification on unique identification information such as a accessed website, a public number, a small program, a link address of an APP object or a serial number, and the like, and informing a user of the verification record information of the unique identification of the related website through the blockchain technology after the user accesses the website, so that the user is helped to verify the authenticity of the website, and the brand public trust is improved.
As shown in FIG. 1, the invention provides a block chain-based counterfeit website identification method, which comprises the following steps:
step 101: acquiring unique identification information of a visiting website; the unique identification information includes a website address.
Step 102: inquiring an official authentication certificate of the blockchain according to the unique identification information; the certification certificate comprises a brand party, a website unique identifier and brand public information.
In practical applications, the step 102 specifically includes: extracting brand names in the unique identification information; matching a brand party corresponding to the brand name on the blockchain; a certification authority for official certification on the blockchain is determined from a brand party corresponding to the brand name.
Step 103: and judging whether the certificate is displayed, if so, executing step 104, and if not, executing step 105.
Step 104: determining the type of the access website according to the unique identification information and the certification authority; the types include official authentication websites and counterfeit websites.
In practical applications, the step 104 specifically includes: acquiring official unique identification information on the certificate; comparing the unique identification information of the access website with the official unique identification information, judging whether the unique identification information is matched with the official unique identification information or not, and obtaining a second judgment result; if the second judgment result shows that the unique identification information and the official unique identification information are matched, determining that the access website is an official authentication website; and if the second judgment result shows that the unique identification information and the official unique identification information are not matched, determining that the access website is a counterfeit website.
Step 105: and determining the access website as a counterfeit website.
In practical applications, the step 105 specifically includes: extracting a brand name in the unique identification information, judging whether a brand party corresponding to the brand name performs authentication operation on the blockchain according to the brand name, and if so, determining that the access website is a counterfeit website; if not, determining that the access website is a suspected counterfeit website.
In practical applications, the invention further comprises: updating the certification authority certificate of the official certification on the blockchain in real time.
The invention stores unique identification information of the website address class and is used for reflecting the authenticity of the access object. The realization thinking is that firstly, unique identification of an access website of a brand official and blockchain certification are carried out on information disclosed by the brand party, so that an access object (such as a website address, an applet link and the like) is identified when a user accesses, the correct authorized address of the relevant brand or other information for public certification is informed, the user is helped to verify, and a corresponding certification-keeping certificate is provided, and the certificate has a certain public trust on the certification-keeping certificate by a third party organization or a government department, so that the effect of informing the authenticity of the access website and preventing counterfeiting is achieved.
In practical application, the specific operation steps of the invention are as follows:
the first step: the brand side carries out blockchain uplink on the unique identifier of the official website address which needs to be correct, and after the unique identifier is uplink, the binding relation between the unique identifier of the website address and the corresponding brand and other public information is established.
And a second step of: when the user accesses, the unique identification ID representing the website can be informed of the block chain certification authority information in advance or when the page displays the content. When a user views, branding parties corresponding to the unique identification ID of the related website and other public information for helping the verification of the website can be obtained. After the related information is obtained, the user can compare the information with the information of the brand party to be accessed actually, and judge whether the related website is the brand party authorized website to be accessed actually, so that the user is helped to identify the authenticity of the address of the accessed website.
And a third step of: when clicking the certification information, the user can access the blockchain to acquire the certification information corresponding to the certification, and the provider of the certification is a chain provider or a government agency disclosed by a third party and has certain public confidence.
Taking applet as an example, the invention discloses two access modes.
Mode one: as shown in FIG. 2, when a user accesses a brand side applet or a web page, the system informs the unique identification of the website in advance to help the user judge the authenticity of the website, and after the user compares the authentication, the user clicks a button to access the corresponding brand official website.
Mode two: as shown in fig. 3, when a user accesses a brand side applet or a website, the system accesses the brand official website first, then the unique identification certification information representing the website is displayed in the page of the brand official website, and the user clicks the certification link information to inquire the record information such as blockchain certification certificate.
FIG. 4 is a flowchart of a method for identifying a counterfeit website based on a blockchain in the actual operation process provided by the invention, and as shown in FIG. 4, the method can be aimed at various common query entry information such as an authorized brand party address, a small program link, a website address and the like; in addition, the invention can actively or passively display the certificate of the certificate, and can actively display the unique identification information and brand information of the query website to the user when entering the website before or after entering the official website, thereby informing the user of the certificate of the website in advance to help the user judge whether the certificate is true or false. The related certificate information is displayed on a certain plate in the content page of the enterprise official website in a passive mode, and a user clicks the certificate to enter a blockchain for inquiry.
Example two
In order to execute the corresponding method of the above embodiment to achieve the corresponding functions and technical effects, a block chain-based counterfeit website identification system is provided below.
A blockchain-based counterfeit website identification system, comprising:
the unique identification information acquisition module is used for acquiring the unique identification information of the access website; the unique identification information includes a website address.
The certification storing certificate inquiring module is used for inquiring the certification storing certificate of the official authentication on the blockchain according to the unique identification information; the certification certificate comprises a brand party, a website unique identifier and brand public information.
In practical application, the certificate-storing certificate inquiry module specifically includes: a brand name extraction unit configured to extract a brand name in the unique identification information; a brand party matching unit for matching a brand party corresponding to the brand name on the blockchain; and the certification authority determining unit is used for determining certification authorities on the blockchain according to the brand parties corresponding to the brand names.
And the first judging module is used for judging whether the certificate is displayed or not to obtain a first judging result.
The type determining module of the access website is used for determining the type of the access website according to the unique identification information and the certificate if the first judging result shows that the certificate is displayed; the types include official authentication websites and counterfeit websites.
In practical application, the type determining module for accessing the website specifically includes: an official unique identification information acquisition unit configured to acquire official unique identification information on the certificate of certification; the second judging unit is used for comparing the unique identification information of the access website with the official unique identification information and judging whether the unique identification information is matched with the official unique identification information or not to obtain a second judging result; the official authentication website determining unit is used for determining that the access website is an official authentication website if the second judging result shows that the unique identification information is matched with the official unique identification information; and the counterfeit website determining unit is used for determining that the access website is a counterfeit website if the second judging result shows that the unique identification information and the official unique identification information are not matched.
And the counterfeit website determining module is used for determining that the access website is a counterfeit website if the first judging result shows that the certificate is not displayed.
Example III
The embodiment of the invention provides an electronic device which comprises a memory and a processor, wherein the memory is used for storing a computer program, and the processor runs the computer program to enable the electronic device to execute the block chain-based counterfeit website identification method provided in the embodiment one.
In practical applications, the electronic device may be a server.
In practical applications, the electronic device includes: at least one processor (processor), memory (memory), bus, and communication interface (communication interface).
Wherein: the processor, communication interface, and memory communicate with each other via a communication bus.
And the communication interface is used for communicating with other devices.
And a processor, configured to execute a program, and specifically may execute the method described in the foregoing embodiment.
In particular, the program may include program code including computer-operating instructions.
The processor may be a central processing unit, CPU, or specific integrated circuit ASIC (ApplicationSpecificIntegratedCircuit), or one or more integrated circuits configured to implement embodiments of the present invention. The one or more processors included in the electronic device may be the same type of processor, such as one or more CPUs; but may also be different types of processors such as one or more CPUs and one or more ASICs.
And the memory is used for storing programs. The memory may comprise high-speed RAM memory or may further comprise non-volatile memory (non-volatile memory), such as at least one disk memory.
Based on the description of the above embodiments, the embodiments of the present application provide a storage medium having stored thereon computer program instructions executable by a processor to implement the method of any of the embodiments
The blockchain-based counterfeit website identification system provided by the embodiments of the present application exists in a variety of forms, including but not limited to:
(1) A mobile communication device: such devices are characterized by mobile communication capabilities and are primarily aimed at providing voice, data communications. Such terminals include: smart phones (e.g., iPhone), multimedia phones, functional phones, and low-end phones, etc.
(2) Ultra mobile personal computer device: such devices are in the category of personal computers, having computing and processing functions, and generally having mobile internet access capabilities. Such terminals include: PDA, MID, and UMPC devices, etc., such as iPad.
(3) Portable entertainment device: such devices may display and play multimedia content. The device comprises: audio, video players (e.g., iPod), palm game consoles, electronic books, and smart toys and portable car navigation devices.
(4) Other electronic devices with data interaction functions.
Thus, particular embodiments of the present subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may be advantageous.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in one or more software and/or hardware elements when implemented in the present application. It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash memory (flashRAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of a storage medium for a computer include, but are not limited to, a phase change memory (PRAM), a Static Random Access Memory (SRAM), a Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a flash memory or other memory technology, a compact disc read only memory (CD-ROM), a compact disc Read Only Memory (ROM),
Digital Versatile Disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, may be used to store information that may be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transshipment) such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular transactions or implement particular abstract data types. The application may also be practiced in distributed computing environments where transactions are performed by remote processing devices that are connected through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, and identical and similar parts between the embodiments are all enough to refer to each other. For the system disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
The principles and embodiments of the present invention have been described herein with reference to specific examples, the description of which is intended only to assist in understanding the methods of the present invention and the core ideas thereof; also, it is within the scope of the present invention to be modified by those of ordinary skill in the art in light of the present teachings. In view of the foregoing, this description should not be construed as limiting the invention.

Claims (5)

1. A blockchain-based counterfeit website identification method, comprising:
acquiring unique identification information of a visiting website; the unique identification information comprises a website address;
inquiring an official authentication certificate of the blockchain according to the unique identification information; the certificate includes brand party, unique identification of website and brand public information;
judging whether the certificate is displayed or not to obtain a first judgment result;
if the first judgment result shows that the certification certificate is displayed, determining the type of the access website according to the unique identification information and the certification certificate; the types include official authentication websites and counterfeit websites;
if the first judgment result shows that the certificate is not displayed, determining that the access website is a counterfeit website;
the method for determining the type of the access website according to the unique identification information and the certification certificate specifically comprises the following steps:
acquiring official unique identification information on the certificate;
comparing the unique identification information of the access website with the official unique identification information, judging whether the unique identification information is matched with the official unique identification information or not, and obtaining a second judgment result;
if the second judgment result shows that the unique identification information and the official unique identification information are matched, determining that the access website is an official authentication website;
if the second judgment result shows that the unique identification information and the official unique identification information are not matched, determining that the access website is a counterfeit website;
determining that the access website is a counterfeit website specifically comprises:
extracting a brand name in the unique identification information, judging whether a brand party corresponding to the brand name performs authentication operation on the blockchain according to the brand name, and obtaining a third judgment result;
if the third judging result shows that the brand party corresponding to the brand name has performed authentication operation on the blockchain, determining that the access website is a counterfeit website;
and if the third judging result shows that the brand party corresponding to the brand name does not perform authentication operation on the blockchain, determining that the access website is a suspected counterfeit website.
2. The blockchain-based counterfeit website identification method of claim 1, wherein the querying of the official authenticated certification on the blockchain based on the unique identification information comprises:
extracting brand names in the unique identification information;
matching a brand party corresponding to the brand name on the blockchain;
a certification authority for official certification on the blockchain is determined from a brand party corresponding to the brand name.
3. The blockchain-based counterfeit website identification method of claim 1, further comprising:
updating the certification authority certificate of the official certification on the blockchain in real time.
4. An electronic device comprising a memory for storing a computer program and a processor that runs the computer program to cause the electronic device to perform the blockchain-based counterfeit website identification method of any of claims 1-3.
5. A computer readable storage medium, characterized in that it stores a computer program which, when executed by a processor, implements a blockchain-based counterfeit website identification method as in any of claims 1-3.
CN202310901897.4A 2023-07-21 2023-07-21 Fake website identification method based on blockchain, electronic equipment and storage medium Active CN116938557B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310901897.4A CN116938557B (en) 2023-07-21 2023-07-21 Fake website identification method based on blockchain, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310901897.4A CN116938557B (en) 2023-07-21 2023-07-21 Fake website identification method based on blockchain, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116938557A CN116938557A (en) 2023-10-24
CN116938557B true CN116938557B (en) 2024-04-09

Family

ID=88389153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310901897.4A Active CN116938557B (en) 2023-07-21 2023-07-21 Fake website identification method based on blockchain, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116938557B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218029A (en) * 2018-09-27 2019-01-15 深圳壹账通智能科技有限公司 The credible querying method of network credentials, device and storage medium based on block chain
CN110035075A (en) * 2019-04-03 2019-07-19 北京奇安信科技有限公司 Detection method, device, computer equipment and the storage medium of fishing website
CN110516173A (en) * 2019-08-28 2019-11-29 腾讯科技(深圳)有限公司 A kind of illegal website recognition methods, device, equipment and medium
CN111683089A (en) * 2020-06-08 2020-09-18 绿盟科技集团股份有限公司 Method, server, medium and computer equipment for identifying phishing website
CN114117264A (en) * 2021-11-19 2022-03-01 北京恒安嘉新安全技术有限公司 Illegal website identification method, device, equipment and storage medium based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021005574A1 (en) * 2019-07-11 2021-01-14 Castelao Soares Marco Antonio Method and system for reliable authentication of the origin of a website

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218029A (en) * 2018-09-27 2019-01-15 深圳壹账通智能科技有限公司 The credible querying method of network credentials, device and storage medium based on block chain
CN110035075A (en) * 2019-04-03 2019-07-19 北京奇安信科技有限公司 Detection method, device, computer equipment and the storage medium of fishing website
CN110516173A (en) * 2019-08-28 2019-11-29 腾讯科技(深圳)有限公司 A kind of illegal website recognition methods, device, equipment and medium
CN111683089A (en) * 2020-06-08 2020-09-18 绿盟科技集团股份有限公司 Method, server, medium and computer equipment for identifying phishing website
CN114117264A (en) * 2021-11-19 2022-03-01 北京恒安嘉新安全技术有限公司 Illegal website identification method, device, equipment and storage medium based on block chain

Also Published As

Publication number Publication date
CN116938557A (en) 2023-10-24

Similar Documents

Publication Publication Date Title
US11323260B2 (en) Method and device for identity verification
CN109067541B (en) Data verification method and device based on block chain and electronic equipment
CN112333198B (en) Secure cross-domain login method, system and server
CN107086909B (en) Identity information generation method and device and identity verification method and device
CN103916244B (en) Verification method and device
CN105592011B (en) Account login method and device
CN112383519A (en) Enterprise authentication and authentication tracing method, device and equipment based on block chain
CN116432247A (en) Infringement evidence method and device based on blockchain
CN111415158B (en) Wind control method and system based on block chain
JP2016521932A (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
CN111786994B (en) Data processing method based on block chain and related equipment
CN103139761B (en) The method and communication terminal of a kind of information real-time show
CN111353176B (en) Method and system for inquiring block chain data
CN112200585B (en) Service processing method, device, equipment and system
CN105187399A (en) Resource processing method and device
CN113901424A (en) Method and device for selectively disclosing digital identity attribute
CN113852639A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN113704734A (en) Distributed digital identity-based method for realizing certificate verification and related device
CN116938557B (en) Fake website identification method based on blockchain, electronic equipment and storage medium
WO2018152978A1 (en) Method and device for prompting change of account-bound telephone number and computer storage medium
CN111310137A (en) Block chain associated data evidence storing method and device and electronic equipment
CN105337946A (en) Webpage forgery prevention verification method and device
CN113836331A (en) Image query method, device and storage medium
CN112561679A (en) Credit investigation system, credit investigation method, electronic device and storage medium
CN112214751A (en) Verification code generation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant