NO20083486L - Angrepsresistent phishing-deteksjon pa klient - Google Patents

Angrepsresistent phishing-deteksjon pa klient

Info

Publication number
NO20083486L
NO20083486L NO20083486A NO20083486A NO20083486L NO 20083486 L NO20083486 L NO 20083486L NO 20083486 A NO20083486 A NO 20083486A NO 20083486 A NO20083486 A NO 20083486A NO 20083486 L NO20083486 L NO 20083486L
Authority
NO
Norway
Prior art keywords
phishing
component
client component
client
detection
Prior art date
Application number
NO20083486A
Other languages
English (en)
Inventor
Dinei A Florencio
Cormac E Herley
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of NO20083486L publication Critical patent/NO20083486L/no

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

En klientkomponent for deteksjon phishing og en fremgangsmåte er tilveiebrakt. Komponenten kan benyttes som en del av et system til å detektere, og valgfritt forhindre, phishingangrep. Klientkomponenten for deteksjon av phishing kan for eksempel tilveiebringe en rapport over gjenbrukte passord for en serverkomponent for deteksjon av phishing. Klientkomponenten kan videre omfatte en akkreditiv-komponent som kan spore en brukers bruk av akkreditiver, og avgjøre om et spesifikt sikkerhetsakkreditiv blir brukt eller presentert. På grunn av phishings generelt ondsinnede natur, kan klientkomponenten være utsatt for angrep fra phishingbedragere. For eksempel kan phishingbedragere generere falske innlogginger i et forsøk på å overflomme klientkomponenten med informasjon som resulterer i påført falske positiver og/eller påførte falske negativer. Klientkomponenten kan utføre en eller flere tester for å avgjøre om falsk(e) innlogging(er) er blitt forsøkt.
NO20083486A 2006-02-23 2008-08-12 Angrepsresistent phishing-deteksjon pa klient NO20083486L (no)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/360,254 US8640231B2 (en) 2006-02-23 2006-02-23 Client side attack resistant phishing detection
PCT/US2007/004044 WO2007120383A2 (en) 2006-02-23 2007-02-13 Client side attack resistant phishing detection

Publications (1)

Publication Number Publication Date
NO20083486L true NO20083486L (no) 2008-11-24

Family

ID=38429902

Family Applications (1)

Application Number Title Priority Date Filing Date
NO20083486A NO20083486L (no) 2006-02-23 2008-08-12 Angrepsresistent phishing-deteksjon pa klient

Country Status (10)

Country Link
US (1) US8640231B2 (no)
EP (1) EP1999609B1 (no)
JP (1) JP5382850B2 (no)
KR (1) KR20080100204A (no)
CN (1) CN101390068B (no)
AU (1) AU2007239055A1 (no)
BR (1) BRPI0707987A2 (no)
CA (1) CA2643294C (no)
NO (1) NO20083486L (no)
WO (1) WO2007120383A2 (no)

Families Citing this family (117)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9412123B2 (en) 2003-07-01 2016-08-09 The 41St Parameter, Inc. Keystroke analysis
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US8065525B2 (en) * 2004-09-22 2011-11-22 Bekad Mgmt. Ii, Llc Device with built-in user authentication and method for user authentication and identity theft protection
US20060095955A1 (en) * 2004-11-01 2006-05-04 Vong Jeffrey C V Jurisdiction-wide anti-phishing network service
US7681234B2 (en) * 2005-06-30 2010-03-16 Microsoft Corporation Preventing phishing attacks
US20070015533A1 (en) * 2005-07-12 2007-01-18 Microsoft Corporation Mono hinge for communication device
US20070015553A1 (en) * 2005-07-12 2007-01-18 Microsoft Corporation Compact and durable clamshell smartphone
US7630741B2 (en) * 2005-07-12 2009-12-08 Microsoft Corporation Compact and durable messenger device
US7676242B2 (en) * 2005-07-12 2010-03-09 Microsoft Corporation Compact and durable thin smartphone
US8938671B2 (en) 2005-12-16 2015-01-20 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8640231B2 (en) 2006-02-23 2014-01-28 Microsoft Corporation Client side attack resistant phishing detection
US7861229B2 (en) * 2006-03-16 2010-12-28 Microsoft Corporation Complexity metrics for data schemas
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US20070245422A1 (en) * 2006-04-18 2007-10-18 Softrun, Inc. Phishing-Prevention Method Through Analysis of Internet Website to be Accessed and Storage Medium Storing Computer Program Source for Executing the Same
US8010996B2 (en) * 2006-07-17 2011-08-30 Yahoo! Inc. Authentication seal for online applications
US20080034428A1 (en) * 2006-07-17 2008-02-07 Yahoo! Inc. Anti-phishing for client devices
US8220047B1 (en) * 2006-08-09 2012-07-10 Google Inc. Anti-phishing system and method
US7813350B2 (en) * 2006-10-23 2010-10-12 Cisco Technology, Inc. System and method to process data packets in a network using stateful decision trees
CA2676106A1 (en) 2007-02-02 2008-08-14 Websense, Inc. System and method for adding context to prevent data leakage over a computer network
US8091118B2 (en) * 2007-12-21 2012-01-03 At & T Intellectual Property I, Lp Method and system to optimize efficiency when managing lists of untrusted network sites
US8250080B1 (en) 2008-01-11 2012-08-21 Google Inc. Filtering in search engines
US9015842B2 (en) 2008-03-19 2015-04-21 Websense, Inc. Method and system for protection against information stealing software
US8370948B2 (en) * 2008-03-19 2013-02-05 Websense, Inc. System and method for analysis of electronic information dissemination events
US9130986B2 (en) 2008-03-19 2015-09-08 Websense, Inc. Method and system for protection against information stealing software
US8407784B2 (en) * 2008-03-19 2013-03-26 Websense, Inc. Method and system for protection against information stealing software
US8739252B2 (en) 2009-02-03 2014-05-27 Inbay Technologies Inc. System and method for secure remote access
US9485254B2 (en) 2009-02-03 2016-11-01 Inbay Technologies Inc. Method and system for authenticating a security device
US9736149B2 (en) 2009-02-03 2017-08-15 Inbay Technologies Inc. Method and system for establishing trusted communication using a security device
US9521142B2 (en) 2009-02-03 2016-12-13 Inbay Technologies Inc. System and method for generating passwords using key inputs and contextual inputs
US9166975B2 (en) 2012-02-16 2015-10-20 Inbay Technologies Inc. System and method for secure remote access to a service on a server computer
US9548978B2 (en) 2009-02-03 2017-01-17 Inbay Technologies Inc. Method and system for authorizing secure electronic transactions using a security device
US8973111B2 (en) * 2009-02-03 2015-03-03 Inbay Technologies Inc. Method and system for securing electronic transactions
US9608988B2 (en) * 2009-02-03 2017-03-28 Inbay Technologies Inc. Method and system for authorizing secure electronic transactions using a security device having a quick response code scanner
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US8621614B2 (en) * 2009-05-26 2013-12-31 Microsoft Corporation Managing potentially phishing messages in a non-web mail client context
AU2010254269A1 (en) 2009-05-26 2011-12-22 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
US20120089481A1 (en) * 2009-11-24 2012-04-12 Chain Reaction Ecommerce, Inc. Securing sensitive information with a trusted proxy frame
FR2959331B1 (fr) * 2010-04-22 2013-03-29 St Microelectronics Rousset Procede et dispositif d'authentification d'un utilisateur a l'aide de donnees biometriques.
US8752137B2 (en) * 2010-05-28 2014-06-10 Bladelogic, Inc. Security context passing for stateless system management
WO2012054646A2 (en) 2010-10-19 2012-04-26 The 41St Parameter, Inc. Variable risk engine
US8397294B2 (en) * 2010-11-30 2013-03-12 Research In Motion Limited Apparatus, system and method for preventing data loss
US20120180134A1 (en) * 2011-01-07 2012-07-12 Research In Motion Limited Personal Information Guard
CN102096781B (zh) * 2011-01-18 2012-11-28 南京邮电大学 一种基于网页关联性的钓鱼检测方法
US9065850B1 (en) 2011-02-07 2015-06-23 Zscaler, Inc. Phishing detection systems and methods
US8832804B1 (en) * 2011-08-05 2014-09-09 Google Inc. Password pre-verification in client-server applications
US10754913B2 (en) 2011-11-15 2020-08-25 Tapad, Inc. System and method for analyzing user device information
TWI459232B (zh) * 2011-12-02 2014-11-01 Inst Information Industry 釣魚網站處理方法、系統以及儲存其之電腦可讀取記錄媒體
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US9432401B2 (en) * 2012-07-06 2016-08-30 Microsoft Technology Licensing, Llc Providing consistent security information
WO2014022813A1 (en) 2012-08-02 2014-02-06 The 41St Parameter, Inc. Systems and methods for accessing records via derivative locators
JP6200509B2 (ja) 2012-09-25 2017-09-20 エムエックス・テクノロジーズ・インコーポレーテッドMX Technologies, Inc. アグリゲーション・ソース・ルーティング
JP5727991B2 (ja) * 2012-11-12 2015-06-03 株式会社オプティム ユーザ端末、不正サイト情報管理サーバ、不正リクエスト遮断方法、及び不正リクエスト遮断プログラム
WO2014078569A1 (en) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
CN103020287B (zh) * 2012-11-20 2018-08-10 高剑青 基于部分哈希值对有限项目的排除
US9241259B2 (en) 2012-11-30 2016-01-19 Websense, Inc. Method and apparatus for managing the transfer of sensitive information to mobile devices
CN103929407B (zh) * 2013-01-15 2015-03-11 腾讯科技(深圳)有限公司 一种木马拦截方法、装置和系统
US9398038B2 (en) 2013-02-08 2016-07-19 PhishMe, Inc. Collaborative phishing attack detection
US8966637B2 (en) 2013-02-08 2015-02-24 PhishMe, Inc. Performance benchmarking for simulated phishing attacks
US9356948B2 (en) 2013-02-08 2016-05-31 PhishMe, Inc. Collaborative phishing attack detection
US9344449B2 (en) 2013-03-11 2016-05-17 Bank Of America Corporation Risk ranking referential links in electronic messages
US9300629B1 (en) 2013-05-31 2016-03-29 Palo Alto Networks, Inc. Password constraint enforcement used in external site authentication
US9621566B2 (en) 2013-05-31 2017-04-11 Adi Labs Incorporated System and method for detecting phishing webpages
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
JP6193802B2 (ja) * 2014-05-14 2017-09-06 日本電信電話株式会社 認証システム及び認証方法
CN104050257A (zh) * 2014-06-13 2014-09-17 百度国际科技(深圳)有限公司 钓鱼网页的检测方法和装置
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
KR101599213B1 (ko) * 2014-12-23 2016-03-04 주식회사 윈스 네트워크 보안 시스템에서 탐지규칙 제공 서비스 방법 및 시스템
US9906539B2 (en) 2015-04-10 2018-02-27 PhishMe, Inc. Suspicious message processing and incident response
US10110628B2 (en) 2015-07-22 2018-10-23 Bank Of America Corporation Phishing source tool
US9729573B2 (en) 2015-07-22 2017-08-08 Bank Of America Corporation Phishing campaign ranker
US9942249B2 (en) 2015-07-22 2018-04-10 Bank Of America Corporation Phishing training tool
US10110623B2 (en) 2015-07-22 2018-10-23 Bank Of America Corporation Delaying phishing communication
US9749359B2 (en) 2015-07-22 2017-08-29 Bank Of America Corporation Phishing campaign ranker
US10523637B2 (en) 2015-07-22 2019-12-31 Paypal, Inc. Anonymous account security exchange
US9825974B2 (en) 2015-07-22 2017-11-21 Bank Of America Corporation Phishing warning tool
US10051001B1 (en) 2015-07-31 2018-08-14 Palo Alto Networks, Inc. Efficient and secure user credential store for credentials enforcement using a firewall
US9967236B1 (en) 2015-07-31 2018-05-08 Palo Alto Networks, Inc. Credentials enforcement using a firewall
US10200381B2 (en) * 2015-08-05 2019-02-05 Mcafee, Llc Systems and methods for phishing and brand protection
NZ740710A (en) * 2015-09-11 2020-05-29 Okta Inc Secured user credential management
US9781132B2 (en) * 2015-10-13 2017-10-03 Yahoo Holdings, Inc. Fraud prevention
US9692815B2 (en) 2015-11-12 2017-06-27 Mx Technologies, Inc. Distributed, decentralized data aggregation
US10205737B2 (en) 2016-01-11 2019-02-12 International Business Machines Corporation Addressing login platform security risks
US10129298B2 (en) 2016-06-30 2018-11-13 Microsoft Technology Licensing, Llc Detecting attacks using compromised credentials via internal network monitoring
WO2018004600A1 (en) 2016-06-30 2018-01-04 Sophos Limited Proactive network security using a health heartbeat
US10320775B2 (en) 2016-09-09 2019-06-11 Paypal, Inc. Eliminating abuse caused by password reuse in different systems
US9882918B1 (en) 2017-05-15 2018-01-30 Forcepoint, LLC User behavior profile in a blockchain
US10447718B2 (en) 2017-05-15 2019-10-15 Forcepoint Llc User profile definition and management
US10999296B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Generating adaptive trust profiles using information derived from similarly situated organizations
US10917423B2 (en) 2017-05-15 2021-02-09 Forcepoint, LLC Intelligently differentiating between different types of states and attributes when using an adaptive trust profile
US10999297B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Using expected behavior of an entity when prepopulating an adaptive trust profile
US10129269B1 (en) 2017-05-15 2018-11-13 Forcepoint, LLC Managing blockchain access to user profile information
US10862927B2 (en) 2017-05-15 2020-12-08 Forcepoint, LLC Dividing events into sessions during adaptive trust profile operations
US10943019B2 (en) 2017-05-15 2021-03-09 Forcepoint, LLC Adaptive trust profile endpoint
US10318729B2 (en) 2017-07-26 2019-06-11 Forcepoint, LLC Privacy protection during insider threat monitoring
US11271950B2 (en) 2018-04-04 2022-03-08 Sophos Limited Securing endpoints in a heterogenous enterprise network
US10911487B2 (en) * 2018-06-20 2021-02-02 Checkpoint Mobile Security Ltd On-device network protection
US11212312B2 (en) 2018-08-09 2021-12-28 Microsoft Technology Licensing, Llc Systems and methods for polluting phishing campaign responses
US11159566B2 (en) 2018-08-21 2021-10-26 International Business Machines Corporation Countering phishing attacks
US11297101B1 (en) * 2018-08-22 2022-04-05 NuRD LLC Phishing website detection by checking form differences followed by false credentials submission
US11496510B1 (en) 2018-08-24 2022-11-08 NuRD LLC Fully automated target identification of a phishing web site
US11164206B2 (en) * 2018-11-16 2021-11-02 Comenity Llc Automatically aggregating, evaluating, and providing a contextually relevant offer
US10997295B2 (en) 2019-04-26 2021-05-04 Forcepoint, LLC Adaptive trust profile reference architecture
WO2021056230A1 (en) 2019-09-25 2021-04-01 Citrix Systems, Inc. Systems and methods for securing user domain credentials from phishing attacks
CN113139170B (zh) * 2020-01-17 2024-06-25 华为云计算技术有限公司 生成鉴权凭证和鉴权的方法、装置和设备
US12216791B2 (en) 2020-02-24 2025-02-04 Forcepoint Llc Re-identifying pseudonymized or de-identified data utilizing distributed ledger technology
US12443703B2 (en) * 2020-05-22 2025-10-14 Vivek Chinar Nair Secure system and method for detecting credential stuffing attacks
US11550949B2 (en) * 2020-07-21 2023-01-10 Constella Intelligence, Inc. Secure exchange of password presence data
US11997135B2 (en) * 2020-12-29 2024-05-28 Citrix Systems, Inc. Systems and methods for protection against theft of user credentials
US11741200B2 (en) 2020-12-29 2023-08-29 Citrix Systems, Inc. Systems and methods for protection against theft of user credentials
US12192233B2 (en) 2021-04-15 2025-01-07 Citrix Systems, Inc. Systems and methods for phishing attack protection based on identity provider verification
US12380201B2 (en) 2021-12-06 2025-08-05 Citrix Systems, Inc. Detecting sharing of passwords
US12563094B2 (en) 2022-04-27 2026-02-24 Citrix Systems, Inc. Systems and methods for preventing one-time password phishing
US12452826B2 (en) 2022-10-05 2025-10-21 Bank Of America Corporation Systems and methods for controlling electronic communications in real time via an artificial intelligence engine based on location data and user data
KR102521677B1 (ko) * 2022-12-07 2023-04-18 (주)라바웨이브 피싱 피해 모니터링 시스템 및 그 방법
FR3145814B1 (fr) * 2023-02-15 2025-03-07 Deepdef Procede de securisation d’un acces a une ressource

Family Cites Families (70)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69738856D1 (de) 1996-02-26 2008-09-04 Nokia Corp Verfahren zur Bedienung eines Funktelefons
US6453345B2 (en) * 1996-11-06 2002-09-17 Datadirect Networks, Inc. Network security and surveillance system
US6044152A (en) 1998-01-15 2000-03-28 Ericsson Inc. Shielded keyboard for a portable communication device
US6230269B1 (en) 1998-03-04 2001-05-08 Microsoft Corporation Distributed authentication system and method
US6104916A (en) 1998-06-15 2000-08-15 Motorola, Inc. Hinge pin
US6185689B1 (en) * 1998-06-24 2001-02-06 Richard S. Carson & Assoc., Inc. Method for network self security assessment
CA2255047A1 (en) 1998-11-30 2000-05-30 Ibm Canada Limited-Ibm Canada Limitee Comparison of hierarchical structures and merging of differences
GB2349960A (en) 1999-05-08 2000-11-15 Ibm Secure password provision
US6826697B1 (en) * 1999-08-30 2004-11-30 Symantec Corporation System and method for detecting buffer overflow attacks
JP3739641B2 (ja) 2000-04-19 2006-01-25 富士通株式会社 折りたたみ型携帯機
EP1277326A2 (en) * 2000-04-28 2003-01-22 Internet Security Systems, Inc. Method and system for managing computer security information
JP3908448B2 (ja) 2000-08-17 2007-04-25 日本電気株式会社 移動電話装置及びその内蔵アンテナ
JP2002073553A (ja) 2000-08-24 2002-03-12 Shijin Kogyo Sakushinkai 嵌入式侵入検出システム
EP1219401A3 (en) 2000-12-29 2004-02-04 Nokia Corporation Resin injection molded article with reinforcing or decorative core
US6925313B2 (en) 2001-02-07 2005-08-02 Hyundai Curitel Inc. Folder-type mobile communication terminal having double-sided LCD
US7845004B2 (en) 2001-07-27 2010-11-30 International Business Machines Corporation Correlating network information and intrusion information to find the entry point of an attack upon a protected computer
CA2354443A1 (en) 2001-07-31 2003-01-31 Ibm Canada Limited-Ibm Canada Limitee Method and system for visually constructing xml schemas using an object-oriented model
US6655863B2 (en) 2001-08-03 2003-12-02 L&K Precision Industrial Co., Ltd. Pen-sized keyboard arrangement
US8250025B2 (en) * 2001-11-06 2012-08-21 Business Controls, Inc. Anonymous reporting system
US7159120B2 (en) * 2001-11-19 2007-01-02 Good Technology, Inc. Method and system for protecting data within portable electronic devices
US7228417B2 (en) 2002-02-26 2007-06-05 America Online, Inc. Simple secure login with multiple-authentication providers
US6845380B2 (en) 2002-03-04 2005-01-18 Hewlett-Packard Development Company, L.P. Method and system of valuing transformation between extensible markup language (XML) documents
TW592420U (en) 2002-04-19 2004-06-11 Quanta Comp Inc Mobile phone
US7162485B2 (en) 2002-06-19 2007-01-09 Georg Gottlob Efficient processing of XPath queries
AU2003250302A1 (en) 2002-07-15 2004-03-03 Siemens Aktiengesellschaft Method and devices for encoding/decoding structured documents, especially xml documents
EP1413980A1 (en) 2002-10-24 2004-04-28 SCHLUMBERGER Systèmes Protection of a portable object against denial of service type attacks
US7043487B2 (en) 2002-12-28 2006-05-09 International Business Machines Corporation Method for storing XML documents in a relational database system while exploiting XML schema
US7152244B2 (en) * 2002-12-31 2006-12-19 American Online, Inc. Techniques for detecting and preventing unintentional disclosures of sensitive data
US20040143581A1 (en) 2003-01-15 2004-07-22 Bohannon Philip L. Cost-based storage of extensible markup language (XML) data
US7694136B2 (en) 2003-02-10 2010-04-06 International Business Machines Corporation Method for distributing and authenticating public keys using hashed password protection
JP2004295252A (ja) 2003-03-25 2004-10-21 Nifty Corp 認証データ自動入力プログラム及び装置
US8640234B2 (en) * 2003-05-07 2014-01-28 Trustwave Holdings, Inc. Method and apparatus for predictive and actual intrusion detection on a network
CA2432658C (en) 2003-06-17 2008-04-01 Ibm Canada Limited - Ibm Canada Limitee Simple types in xml schema complex types
US7509495B2 (en) 2003-07-10 2009-03-24 Cinnober Financial Technology, Ab Authentication protocol
JP2005070074A (ja) 2003-08-21 2005-03-17 Pioneer Electronic Corp 表示装置及び該表示装置を含んでなる電子機器
JP2005078316A (ja) 2003-08-29 2005-03-24 Kyocera Corp 携帯端末装置
US7523220B2 (en) 2003-09-17 2009-04-21 Microsoft Corporation Metaspace: communication middleware for partially connected mobile ad hoc networks
US7685296B2 (en) 2003-09-25 2010-03-23 Microsoft Corporation Systems and methods for client-based web crawling
US7314785B2 (en) 2003-10-24 2008-01-01 Semiconductor Energy Laboratory Co., Ltd. Display device and manufacturing method thereof
US7526803B2 (en) 2003-11-17 2009-04-28 Alcatel Lucent Detection of denial of service attacks against SIP (session initiation protocol) elements
US7487541B2 (en) * 2003-12-10 2009-02-03 Alcatel Lucent Flow-based method for tracking back single packets
JP4485184B2 (ja) 2003-12-15 2010-06-16 株式会社半導体エネルギー研究所 発光装置および電子機器
US8191139B2 (en) * 2003-12-18 2012-05-29 Honeywell International Inc. Intrusion detection report correlator and analyzer
US20060294187A1 (en) * 2004-01-20 2006-12-28 Thomas Hakel Integrated web communications system
US20050177578A1 (en) 2004-02-10 2005-08-11 Chen Yao-Ching S. Efficient type annontation of XML schema-validated XML documents without schema validation
TWI230827B (en) 2004-02-12 2005-04-11 Au Optronics Corp Liquid crystal display module
US7603654B2 (en) 2004-03-01 2009-10-13 Microsoft Corporation Determining XML schema type equivalence
US20050228999A1 (en) * 2004-04-09 2005-10-13 Arcot Systems, Inc. Audit records for digitally signed documents
US20050229097A1 (en) 2004-04-09 2005-10-13 Microsoft Corporation Systems and methods for layered XML schemas
US7363513B2 (en) 2004-04-15 2008-04-22 International Business Machines Corporation Server denial of service shield
US20060090073A1 (en) * 2004-04-27 2006-04-27 Shira Steinberg System and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity
US7457823B2 (en) * 2004-05-02 2008-11-25 Markmonitor Inc. Methods and systems for analyzing data related to possible online fraud
US20050273629A1 (en) * 2004-06-04 2005-12-08 Vitalsource Technologies System, method and computer program product for providing digital rights management of protected content
AU2005255513A1 (en) 2004-06-21 2005-12-29 Echoworx Corporation Method, system and computer program for protecting user credentials against security attacks
US7606821B2 (en) * 2004-06-30 2009-10-20 Ebay Inc. Method and system for preventing fraudulent activities
US7886345B2 (en) * 2004-07-02 2011-02-08 Emc Corporation Password-protection module
JP4636456B2 (ja) 2004-09-16 2011-02-23 富士通東芝モバイルコミュニケーションズ株式会社 無線装置
US20060095955A1 (en) * 2004-11-01 2006-05-04 Vong Jeffrey C V Jurisdiction-wide anti-phishing network service
US7634810B2 (en) * 2004-12-02 2009-12-15 Microsoft Corporation Phishing detection, prevention, and notification
US20060123478A1 (en) * 2004-12-02 2006-06-08 Microsoft Corporation Phishing detection, prevention, and notification
US20050086161A1 (en) * 2005-01-06 2005-04-21 Gallant Stephen I. Deterrence of phishing and other identity theft frauds
US8024488B2 (en) 2005-03-02 2011-09-20 Cisco Technology, Inc. Methods and apparatus to validate configuration of computerized devices
US8601574B2 (en) * 2005-03-29 2013-12-03 At&T Intellectual Property I, L.P. Anti-phishing methods based on an aggregate characteristic of computer system logins
US7475135B2 (en) * 2005-03-31 2009-01-06 International Business Machines Corporation Systems and methods for event detection
US20060224677A1 (en) * 2005-04-01 2006-10-05 Baytsp Method and apparatus for detecting email fraud
US20060232495A1 (en) 2005-04-19 2006-10-19 Toppoly Optoelectronics Corp. Dual panel display
US7681234B2 (en) 2005-06-30 2010-03-16 Microsoft Corporation Preventing phishing attacks
US20070136806A1 (en) * 2005-12-14 2007-06-14 Aladdin Knowledge Systems Ltd. Method and system for blocking phishing scams
US20070162331A1 (en) * 2006-01-10 2007-07-12 Michael Sullivan Systems and methods for providing information and conducting business using the internet
US8640231B2 (en) 2006-02-23 2014-01-28 Microsoft Corporation Client side attack resistant phishing detection

Also Published As

Publication number Publication date
CN101390068A (zh) 2009-03-18
EP1999609A2 (en) 2008-12-10
BRPI0707987A2 (pt) 2011-05-17
JP2009527855A (ja) 2009-07-30
WO2007120383A2 (en) 2007-10-25
WO2007120383A3 (en) 2008-02-21
AU2007239055A1 (en) 2007-10-25
KR20080100204A (ko) 2008-11-14
US8640231B2 (en) 2014-01-28
EP1999609A4 (en) 2009-10-14
CA2643294A1 (en) 2007-10-25
CN101390068B (zh) 2010-12-08
JP5382850B2 (ja) 2014-01-08
EP1999609B1 (en) 2018-03-28
CA2643294C (en) 2016-04-19
US20070199054A1 (en) 2007-08-23

Similar Documents

Publication Publication Date Title
NO20083486L (no) Angrepsresistent phishing-deteksjon pa klient
Wu et al. Effective defense schemes for phishing attacks on mobile computing platforms
US12316671B2 (en) Detection of impersonated web pages and other impersonation methods for web-based cyber threats
US20130263263A1 (en) Web element spoofing prevention system and method
Conteh et al. The rise in cybercrime and the dynamics of exploiting the human vulnerability factor
CN104837159A (zh) Android平台OAuth协议误用安全检测方法
Mahdad et al. Breaching security keys without root: Fido2 deception attacks via overlays exploiting limited display authenticators
Viegas et al. IT Security Controls
US20120167212A1 (en) Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates
Zhao et al. Explicit authentication response considered harmful
Dadkhah et al. A novel approach to deal with keyloggers
Braun et al. Phishsafe: leveraging modern javascript api's for transparent and robust protection
Mahdad et al. Sok: A comprehensive evaluation of 2fa-based schemes in the face of active concurrent attacks from user terminal
Kumawat et al. Ethical Hacking: White Hat Hackers
Sindhu et al. A critical analysis of privacy implications surrounding Alexa and voice assistants
Gautam et al. Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers
Kautwima et al. Information security mechanisms and ICT policy in practice: A case of the University of Namibia
Davis Ten Easy Steps to Reduce Your Risk of Cyberattack or Data Breach
Dand et al. Vulnerability
Murthy Practical Cybersecurity Learning with Usable Security
Monteiro et al. Exemplifying attack identification and analysis in a novel forensically viable Syslog model
Qbea’h et al. Classification of Authentication Approaches to Stop the Next Breaking: Challenges, Benefits, Drawbacks, Awareness, and Recommendations
Hazeyama et al. Case base for secure software development using software security knowledge base
Asante et al. Securing Remote Learning Environments
Gupta et al. Network intrusion prevention system