JP6640869B2 - スマートイメージを使用したフィッシング対策のための方法およびシステム - Google Patents

スマートイメージを使用したフィッシング対策のための方法およびシステム Download PDF

Info

Publication number
JP6640869B2
JP6640869B2 JP2017548385A JP2017548385A JP6640869B2 JP 6640869 B2 JP6640869 B2 JP 6640869B2 JP 2017548385 A JP2017548385 A JP 2017548385A JP 2017548385 A JP2017548385 A JP 2017548385A JP 6640869 B2 JP6640869 B2 JP 6640869B2
Authority
JP
Japan
Prior art keywords
mobile device
image
service
location
access code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2017548385A
Other languages
English (en)
Japanese (ja)
Other versions
JP2018512106A (ja
JP2018512106A5 (enExample
Inventor
アナントハラジュ,ギリッシュ
Original Assignee
オラクル・インターナショナル・コーポレイション
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by オラクル・インターナショナル・コーポレイション filed Critical オラクル・インターナショナル・コーポレイション
Publication of JP2018512106A publication Critical patent/JP2018512106A/ja
Publication of JP2018512106A5 publication Critical patent/JP2018512106A5/ja
Application granted granted Critical
Publication of JP6640869B2 publication Critical patent/JP6640869B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
JP2017548385A 2015-03-20 2016-03-07 スマートイメージを使用したフィッシング対策のための方法およびシステム Active JP6640869B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/663,555 US10069864B2 (en) 2015-03-20 2015-03-20 Method and system for using smart images
US14/663,555 2015-03-20
PCT/US2016/021128 WO2016153766A1 (en) 2015-03-20 2016-03-07 Method and system for anti-phishing using smart images

Publications (3)

Publication Number Publication Date
JP2018512106A JP2018512106A (ja) 2018-05-10
JP2018512106A5 JP2018512106A5 (enExample) 2019-04-11
JP6640869B2 true JP6640869B2 (ja) 2020-02-05

Family

ID=55588598

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2017548385A Active JP6640869B2 (ja) 2015-03-20 2016-03-07 スマートイメージを使用したフィッシング対策のための方法およびシステム

Country Status (5)

Country Link
US (1) US10069864B2 (enExample)
EP (1) EP3272093B1 (enExample)
JP (1) JP6640869B2 (enExample)
CN (1) CN107211030B (enExample)
WO (1) WO2016153766A1 (enExample)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113507377B (zh) * 2015-02-17 2024-04-26 维萨国际服务协会 用于使用基于交易特定信息的令牌和密码的交易处理的装置和方法
US10069864B2 (en) 2015-03-20 2018-09-04 Oracle International Corporation Method and system for using smart images
US11567962B2 (en) * 2015-07-11 2023-01-31 Taascom Inc. Computer network controlled data orchestration system and method for data aggregation, normalization, for presentation, analysis and action/decision making
US10861019B2 (en) * 2016-03-18 2020-12-08 Visa International Service Association Location verification during dynamic data transactions
KR101817306B1 (ko) * 2016-06-03 2018-01-11 (주)투비스마트 시각화 암호를 이용한 인증 장치 및 그 방법
KR102526959B1 (ko) * 2016-10-27 2023-05-02 삼성전자주식회사 전자 장치 및 그의 동작 방법
US20180270215A1 (en) * 2017-03-16 2018-09-20 Ca, Inc. Personal assurance message over sms and email to prevent phishing attacks
CN109558262A (zh) * 2018-11-30 2019-04-02 武汉推杰网络科技有限公司 一种基于计算机验证码识别的大数据分析系统
US11336684B2 (en) * 2019-06-07 2022-05-17 Lookout, Inc. Mobile device security using a secure execution context
WO2025072928A1 (en) * 2023-09-29 2025-04-03 Obsidian Security, Inc. Systems and methods to perform phishing detection and device attestation via browser extension

Family Cites Families (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6269446B1 (en) * 1998-06-26 2001-07-31 Canon Kabushiki Kaisha Authenticating images from digital cameras
US20040208343A1 (en) * 1998-07-09 2004-10-21 Colorado State University Research Foundation Apparatus and method for creating a record using biometric information
US7236596B2 (en) * 2000-02-07 2007-06-26 Mikos, Ltd. Digital imaging system for evidentiary use
JP2002123172A (ja) * 2000-10-16 2002-04-26 Toshiba Information Systems (Japan) Corp 暗号化装置、復号化装置、情報管理システム及び施錠システム
US7143289B2 (en) 2000-10-30 2006-11-28 Geocodex Llc System and method for delivering encrypted information in a communication network using location identity and key tables
JP2005143094A (ja) * 2003-10-14 2005-06-02 Canon Inc 画像検証システム、管理方法、及びコンピュータ読み取り可能な記憶媒体
JP4422088B2 (ja) * 2005-09-27 2010-02-24 Necネクサソリューションズ株式会社 画像配列型認証システム
US20070083919A1 (en) * 2005-10-11 2007-04-12 Guy Heffez Secure Image Protocol
US20120289209A1 (en) * 2005-11-14 2012-11-15 Crawford C S Lee Method of conducting operations for a social network application including activity list generation
US9135469B2 (en) * 2006-02-28 2015-09-15 Paypal, Inc. Information protection system
US8997177B2 (en) * 2006-05-24 2015-03-31 Confident Technologies, Inc. Graphical encryption and display of codes and text
US20080034428A1 (en) 2006-07-17 2008-02-07 Yahoo! Inc. Anti-phishing for client devices
US20080052245A1 (en) * 2006-08-23 2008-02-28 Richard Love Advanced multi-factor authentication methods
US8356333B2 (en) * 2006-12-12 2013-01-15 Bespoke Innovations Sarl System and method for verifying networked sites
JP4648420B2 (ja) * 2007-03-12 2011-03-09 ヤフー株式会社 認証システム
JP4933327B2 (ja) * 2007-03-30 2012-05-16 Kddi株式会社 ファイル管理システム、ファイル管理方法及びプログラム
KR100910378B1 (ko) * 2008-10-06 2009-08-04 주식회사 오엘콥스 암호화된 이미지를 이용한 전자증명서 발급 시스템 및 방법
US20100287382A1 (en) * 2009-05-07 2010-11-11 John Charles Gyorffy Two-factor graphical password for text password and encryption key generation
JP2011097192A (ja) * 2009-10-27 2011-05-12 Hanamaru Kk 暗号化メッセージ送信装置、プログラム、暗号化メッセージ送信方法および認証システム
KR20110066508A (ko) * 2009-12-11 2011-06-17 삼성전자주식회사 휴대용 단말기에서 통합 로그인 입력 장치 및 방법
US8977260B1 (en) 2010-04-14 2015-03-10 Sprint Communication Company L.P. Preventing clone device registration in a wireless communication system
CA2739313C (en) * 2010-05-07 2016-06-28 Research In Motion Limited Locally stored phishing countermeasure
JP5988036B2 (ja) * 2011-05-18 2016-09-07 パナソニックIpマネジメント株式会社 通信制御システムおよびその方法、ならびに通信装置およびその方法、プログラム
AU2011202415B1 (en) * 2011-05-24 2012-04-12 Microsoft Technology Licensing, Llc Picture gesture authentication
US8910274B2 (en) * 2011-07-28 2014-12-09 Xerox Corporation Multi-factor authentication using digital images of barcodes
US20130036461A1 (en) * 2011-08-01 2013-02-07 Apple Inc. Image-based authentication
US20130097697A1 (en) * 2011-10-14 2013-04-18 Microsoft Corporation Security Primitives Employing Hard Artificial Intelligence Problems
WO2013134306A1 (en) * 2012-03-05 2013-09-12 Michael Fiske One-time passcodes with asymmetric keys
US9076061B2 (en) * 2012-03-12 2015-07-07 Google Inc. System and method for updating geographic data
GB2514517A (en) * 2012-03-23 2014-11-26 Wendy Mackinnon Keith System and method for facilitating secure self payment transactions of retail goods
US9740884B2 (en) * 2012-04-10 2017-08-22 Good Technology Holdings Limited Method and device for generating a code
ITMI20120708A1 (it) * 2012-04-27 2013-10-28 St Microelectronics Srl Dispositivo di assegnazione di una posizione geografica ad una immagine
US20140009378A1 (en) * 2012-07-03 2014-01-09 Yen Hsiang Chew User Profile Based Gesture Recognition
US9069069B2 (en) * 2012-10-30 2015-06-30 The Standard Register Company Systems, methods, and apparatus for marking, verifying, and authenticating consumer products
US9172692B2 (en) * 2013-03-14 2015-10-27 William M. Langley Systems and methods for securely transferring authentication information between a user and an electronic resource
US9300645B1 (en) * 2013-03-14 2016-03-29 Ip Holdings, Inc. Mobile IO input and output for smartphones, tablet, and wireless devices including touch screen, voice, pen, and gestures
US9741085B2 (en) * 2013-03-14 2017-08-22 Artificial Intelligence Research Group Limited System and method of encoding content and an image
US9324075B2 (en) * 2013-03-15 2016-04-26 Paypal, Inc. Geotagged image for checking validity of purchase transaction
CN109086581B (zh) * 2013-03-15 2021-11-05 美国邮政管理局 身份验证系统和方法
US9646434B2 (en) * 2013-10-10 2017-05-09 Google Technology Holdings LLC Method and system for controlling access to a restricted location
US9537661B2 (en) * 2014-02-28 2017-01-03 Verizon Patent And Licensing Inc. Password-less authentication service
US9786010B2 (en) * 2014-04-23 2017-10-10 State Farm Mutual Automobile Insurance Company Homeowners insurance application process using geotagged photos
CN104038476B (zh) * 2014-05-16 2019-01-11 百度在线网络技术(北京)有限公司 一种用于登录管理的方法、设备与系统
US10069864B2 (en) 2015-03-20 2018-09-04 Oracle International Corporation Method and system for using smart images

Also Published As

Publication number Publication date
US10069864B2 (en) 2018-09-04
US20160277443A1 (en) 2016-09-22
CN107211030B (zh) 2019-08-13
CN107211030A (zh) 2017-09-26
WO2016153766A1 (en) 2016-09-29
JP2018512106A (ja) 2018-05-10
EP3272093B1 (en) 2019-09-11
EP3272093A1 (en) 2018-01-24

Similar Documents

Publication Publication Date Title
US10142327B2 (en) Rule based device enrollment
US10735196B2 (en) Password-less authentication for access management
JP6640869B2 (ja) スマートイメージを使用したフィッシング対策のための方法およびシステム
US11934541B2 (en) Securely sharing selected fields in a blockchain with runtime access determination
US10154037B2 (en) Techniques for implementing a data storage device as a security device for managing access to resources
US10467421B2 (en) Establishing trust between containers
CN108351933A (zh) 最终用户启动的访问服务器真实性检查

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20190228

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20190228

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20191029

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20191203

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20191226

R150 Certificate of patent or registration of utility model

Ref document number: 6640869

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250