NO20083486L - Angrepsresistent phishing-deteksjon pa klient - Google Patents
Angrepsresistent phishing-deteksjon pa klientInfo
- Publication number
- NO20083486L NO20083486L NO20083486A NO20083486A NO20083486L NO 20083486 L NO20083486 L NO 20083486L NO 20083486 A NO20083486 A NO 20083486A NO 20083486 A NO20083486 A NO 20083486A NO 20083486 L NO20083486 L NO 20083486L
- Authority
- NO
- Norway
- Prior art keywords
- phishing
- component
- client component
- client
- detection
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
En klientkomponent for deteksjon phishing og en fremgangsmåte er tilveiebrakt. Komponenten kan benyttes som en del av et system til å detektere, og valgfritt forhindre, phishingangrep. Klientkomponenten for deteksjon av phishing kan for eksempel tilveiebringe en rapport over gjenbrukte passord for en serverkomponent for deteksjon av phishing. Klientkomponenten kan videre omfatte en akkreditiv-komponent som kan spore en brukers bruk av akkreditiver, og avgjøre om et spesifikt sikkerhetsakkreditiv blir brukt eller presentert. På grunn av phishings generelt ondsinnede natur, kan klientkomponenten være utsatt for angrep fra phishingbedragere. For eksempel kan phishingbedragere generere falske innlogginger i et forsøk på å overflomme klientkomponenten med informasjon som resulterer i påført falske positiver og/eller påførte falske negativer. Klientkomponenten kan utføre en eller flere tester for å avgjøre om falsk(e) innlogging(er) er blitt forsøkt.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/360,254 US8640231B2 (en) | 2006-02-23 | 2006-02-23 | Client side attack resistant phishing detection |
| PCT/US2007/004044 WO2007120383A2 (en) | 2006-02-23 | 2007-02-13 | Client side attack resistant phishing detection |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| NO20083486L true NO20083486L (no) | 2008-11-24 |
Family
ID=38429902
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| NO20083486A NO20083486L (no) | 2006-02-23 | 2008-08-12 | Angrepsresistent phishing-deteksjon pa klient |
Country Status (10)
| Country | Link |
|---|---|
| US (1) | US8640231B2 (no) |
| EP (1) | EP1999609B1 (no) |
| JP (1) | JP5382850B2 (no) |
| KR (1) | KR20080100204A (no) |
| CN (1) | CN101390068B (no) |
| AU (1) | AU2007239055A1 (no) |
| BR (1) | BRPI0707987A2 (no) |
| CA (1) | CA2643294C (no) |
| NO (1) | NO20083486L (no) |
| WO (1) | WO2007120383A2 (no) |
Families Citing this family (117)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9412123B2 (en) | 2003-07-01 | 2016-08-09 | The 41St Parameter, Inc. | Keystroke analysis |
| US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
| US8065525B2 (en) * | 2004-09-22 | 2011-11-22 | Bekad Mgmt. Ii, Llc | Device with built-in user authentication and method for user authentication and identity theft protection |
| US20060095955A1 (en) * | 2004-11-01 | 2006-05-04 | Vong Jeffrey C V | Jurisdiction-wide anti-phishing network service |
| US7681234B2 (en) * | 2005-06-30 | 2010-03-16 | Microsoft Corporation | Preventing phishing attacks |
| US20070015533A1 (en) * | 2005-07-12 | 2007-01-18 | Microsoft Corporation | Mono hinge for communication device |
| US20070015553A1 (en) * | 2005-07-12 | 2007-01-18 | Microsoft Corporation | Compact and durable clamshell smartphone |
| US7630741B2 (en) * | 2005-07-12 | 2009-12-08 | Microsoft Corporation | Compact and durable messenger device |
| US7676242B2 (en) * | 2005-07-12 | 2010-03-09 | Microsoft Corporation | Compact and durable thin smartphone |
| US8938671B2 (en) | 2005-12-16 | 2015-01-20 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
| US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
| US8640231B2 (en) | 2006-02-23 | 2014-01-28 | Microsoft Corporation | Client side attack resistant phishing detection |
| US7861229B2 (en) * | 2006-03-16 | 2010-12-28 | Microsoft Corporation | Complexity metrics for data schemas |
| US8151327B2 (en) | 2006-03-31 | 2012-04-03 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
| US20070245422A1 (en) * | 2006-04-18 | 2007-10-18 | Softrun, Inc. | Phishing-Prevention Method Through Analysis of Internet Website to be Accessed and Storage Medium Storing Computer Program Source for Executing the Same |
| US8010996B2 (en) * | 2006-07-17 | 2011-08-30 | Yahoo! Inc. | Authentication seal for online applications |
| US20080034428A1 (en) * | 2006-07-17 | 2008-02-07 | Yahoo! Inc. | Anti-phishing for client devices |
| US8220047B1 (en) * | 2006-08-09 | 2012-07-10 | Google Inc. | Anti-phishing system and method |
| US7813350B2 (en) * | 2006-10-23 | 2010-10-12 | Cisco Technology, Inc. | System and method to process data packets in a network using stateful decision trees |
| CA2676106A1 (en) | 2007-02-02 | 2008-08-14 | Websense, Inc. | System and method for adding context to prevent data leakage over a computer network |
| US8091118B2 (en) * | 2007-12-21 | 2012-01-03 | At & T Intellectual Property I, Lp | Method and system to optimize efficiency when managing lists of untrusted network sites |
| US8250080B1 (en) | 2008-01-11 | 2012-08-21 | Google Inc. | Filtering in search engines |
| US9015842B2 (en) | 2008-03-19 | 2015-04-21 | Websense, Inc. | Method and system for protection against information stealing software |
| US8370948B2 (en) * | 2008-03-19 | 2013-02-05 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
| US9130986B2 (en) | 2008-03-19 | 2015-09-08 | Websense, Inc. | Method and system for protection against information stealing software |
| US8407784B2 (en) * | 2008-03-19 | 2013-03-26 | Websense, Inc. | Method and system for protection against information stealing software |
| US8739252B2 (en) | 2009-02-03 | 2014-05-27 | Inbay Technologies Inc. | System and method for secure remote access |
| US9485254B2 (en) | 2009-02-03 | 2016-11-01 | Inbay Technologies Inc. | Method and system for authenticating a security device |
| US9736149B2 (en) | 2009-02-03 | 2017-08-15 | Inbay Technologies Inc. | Method and system for establishing trusted communication using a security device |
| US9521142B2 (en) | 2009-02-03 | 2016-12-13 | Inbay Technologies Inc. | System and method for generating passwords using key inputs and contextual inputs |
| US9166975B2 (en) | 2012-02-16 | 2015-10-20 | Inbay Technologies Inc. | System and method for secure remote access to a service on a server computer |
| US9548978B2 (en) | 2009-02-03 | 2017-01-17 | Inbay Technologies Inc. | Method and system for authorizing secure electronic transactions using a security device |
| US8973111B2 (en) * | 2009-02-03 | 2015-03-03 | Inbay Technologies Inc. | Method and system for securing electronic transactions |
| US9608988B2 (en) * | 2009-02-03 | 2017-03-28 | Inbay Technologies Inc. | Method and system for authorizing secure electronic transactions using a security device having a quick response code scanner |
| US9112850B1 (en) | 2009-03-25 | 2015-08-18 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
| US8621614B2 (en) * | 2009-05-26 | 2013-12-31 | Microsoft Corporation | Managing potentially phishing messages in a non-web mail client context |
| AU2010254269A1 (en) | 2009-05-26 | 2011-12-22 | Websense, Inc. | Systems and methods for efficient detection of fingerprinted data and information |
| US20120089481A1 (en) * | 2009-11-24 | 2012-04-12 | Chain Reaction Ecommerce, Inc. | Securing sensitive information with a trusted proxy frame |
| FR2959331B1 (fr) * | 2010-04-22 | 2013-03-29 | St Microelectronics Rousset | Procede et dispositif d'authentification d'un utilisateur a l'aide de donnees biometriques. |
| US8752137B2 (en) * | 2010-05-28 | 2014-06-10 | Bladelogic, Inc. | Security context passing for stateless system management |
| WO2012054646A2 (en) | 2010-10-19 | 2012-04-26 | The 41St Parameter, Inc. | Variable risk engine |
| US8397294B2 (en) * | 2010-11-30 | 2013-03-12 | Research In Motion Limited | Apparatus, system and method for preventing data loss |
| US20120180134A1 (en) * | 2011-01-07 | 2012-07-12 | Research In Motion Limited | Personal Information Guard |
| CN102096781B (zh) * | 2011-01-18 | 2012-11-28 | 南京邮电大学 | 一种基于网页关联性的钓鱼检测方法 |
| US9065850B1 (en) | 2011-02-07 | 2015-06-23 | Zscaler, Inc. | Phishing detection systems and methods |
| US8832804B1 (en) * | 2011-08-05 | 2014-09-09 | Google Inc. | Password pre-verification in client-server applications |
| US10754913B2 (en) | 2011-11-15 | 2020-08-25 | Tapad, Inc. | System and method for analyzing user device information |
| TWI459232B (zh) * | 2011-12-02 | 2014-11-01 | Inst Information Industry | 釣魚網站處理方法、系統以及儲存其之電腦可讀取記錄媒體 |
| US9633201B1 (en) | 2012-03-01 | 2017-04-25 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
| US9521551B2 (en) | 2012-03-22 | 2016-12-13 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
| US9432401B2 (en) * | 2012-07-06 | 2016-08-30 | Microsoft Technology Licensing, Llc | Providing consistent security information |
| WO2014022813A1 (en) | 2012-08-02 | 2014-02-06 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
| JP6200509B2 (ja) | 2012-09-25 | 2017-09-20 | エムエックス・テクノロジーズ・インコーポレーテッドMX Technologies, Inc. | アグリゲーション・ソース・ルーティング |
| JP5727991B2 (ja) * | 2012-11-12 | 2015-06-03 | 株式会社オプティム | ユーザ端末、不正サイト情報管理サーバ、不正リクエスト遮断方法、及び不正リクエスト遮断プログラム |
| WO2014078569A1 (en) | 2012-11-14 | 2014-05-22 | The 41St Parameter, Inc. | Systems and methods of global identification |
| CN103020287B (zh) * | 2012-11-20 | 2018-08-10 | 高剑青 | 基于部分哈希值对有限项目的排除 |
| US9241259B2 (en) | 2012-11-30 | 2016-01-19 | Websense, Inc. | Method and apparatus for managing the transfer of sensitive information to mobile devices |
| CN103929407B (zh) * | 2013-01-15 | 2015-03-11 | 腾讯科技(深圳)有限公司 | 一种木马拦截方法、装置和系统 |
| US9398038B2 (en) | 2013-02-08 | 2016-07-19 | PhishMe, Inc. | Collaborative phishing attack detection |
| US8966637B2 (en) | 2013-02-08 | 2015-02-24 | PhishMe, Inc. | Performance benchmarking for simulated phishing attacks |
| US9356948B2 (en) | 2013-02-08 | 2016-05-31 | PhishMe, Inc. | Collaborative phishing attack detection |
| US9344449B2 (en) | 2013-03-11 | 2016-05-17 | Bank Of America Corporation | Risk ranking referential links in electronic messages |
| US9300629B1 (en) | 2013-05-31 | 2016-03-29 | Palo Alto Networks, Inc. | Password constraint enforcement used in external site authentication |
| US9621566B2 (en) | 2013-05-31 | 2017-04-11 | Adi Labs Incorporated | System and method for detecting phishing webpages |
| US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
| JP6193802B2 (ja) * | 2014-05-14 | 2017-09-06 | 日本電信電話株式会社 | 認証システム及び認証方法 |
| CN104050257A (zh) * | 2014-06-13 | 2014-09-17 | 百度国际科技(深圳)有限公司 | 钓鱼网页的检测方法和装置 |
| US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
| KR101599213B1 (ko) * | 2014-12-23 | 2016-03-04 | 주식회사 윈스 | 네트워크 보안 시스템에서 탐지규칙 제공 서비스 방법 및 시스템 |
| US9906539B2 (en) | 2015-04-10 | 2018-02-27 | PhishMe, Inc. | Suspicious message processing and incident response |
| US10110628B2 (en) | 2015-07-22 | 2018-10-23 | Bank Of America Corporation | Phishing source tool |
| US9729573B2 (en) | 2015-07-22 | 2017-08-08 | Bank Of America Corporation | Phishing campaign ranker |
| US9942249B2 (en) | 2015-07-22 | 2018-04-10 | Bank Of America Corporation | Phishing training tool |
| US10110623B2 (en) | 2015-07-22 | 2018-10-23 | Bank Of America Corporation | Delaying phishing communication |
| US9749359B2 (en) | 2015-07-22 | 2017-08-29 | Bank Of America Corporation | Phishing campaign ranker |
| US10523637B2 (en) | 2015-07-22 | 2019-12-31 | Paypal, Inc. | Anonymous account security exchange |
| US9825974B2 (en) | 2015-07-22 | 2017-11-21 | Bank Of America Corporation | Phishing warning tool |
| US10051001B1 (en) | 2015-07-31 | 2018-08-14 | Palo Alto Networks, Inc. | Efficient and secure user credential store for credentials enforcement using a firewall |
| US9967236B1 (en) | 2015-07-31 | 2018-05-08 | Palo Alto Networks, Inc. | Credentials enforcement using a firewall |
| US10200381B2 (en) * | 2015-08-05 | 2019-02-05 | Mcafee, Llc | Systems and methods for phishing and brand protection |
| NZ740710A (en) * | 2015-09-11 | 2020-05-29 | Okta Inc | Secured user credential management |
| US9781132B2 (en) * | 2015-10-13 | 2017-10-03 | Yahoo Holdings, Inc. | Fraud prevention |
| US9692815B2 (en) | 2015-11-12 | 2017-06-27 | Mx Technologies, Inc. | Distributed, decentralized data aggregation |
| US10205737B2 (en) | 2016-01-11 | 2019-02-12 | International Business Machines Corporation | Addressing login platform security risks |
| US10129298B2 (en) | 2016-06-30 | 2018-11-13 | Microsoft Technology Licensing, Llc | Detecting attacks using compromised credentials via internal network monitoring |
| WO2018004600A1 (en) | 2016-06-30 | 2018-01-04 | Sophos Limited | Proactive network security using a health heartbeat |
| US10320775B2 (en) | 2016-09-09 | 2019-06-11 | Paypal, Inc. | Eliminating abuse caused by password reuse in different systems |
| US9882918B1 (en) | 2017-05-15 | 2018-01-30 | Forcepoint, LLC | User behavior profile in a blockchain |
| US10447718B2 (en) | 2017-05-15 | 2019-10-15 | Forcepoint Llc | User profile definition and management |
| US10999296B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Generating adaptive trust profiles using information derived from similarly situated organizations |
| US10917423B2 (en) | 2017-05-15 | 2021-02-09 | Forcepoint, LLC | Intelligently differentiating between different types of states and attributes when using an adaptive trust profile |
| US10999297B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Using expected behavior of an entity when prepopulating an adaptive trust profile |
| US10129269B1 (en) | 2017-05-15 | 2018-11-13 | Forcepoint, LLC | Managing blockchain access to user profile information |
| US10862927B2 (en) | 2017-05-15 | 2020-12-08 | Forcepoint, LLC | Dividing events into sessions during adaptive trust profile operations |
| US10943019B2 (en) | 2017-05-15 | 2021-03-09 | Forcepoint, LLC | Adaptive trust profile endpoint |
| US10318729B2 (en) | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
| US11271950B2 (en) | 2018-04-04 | 2022-03-08 | Sophos Limited | Securing endpoints in a heterogenous enterprise network |
| US10911487B2 (en) * | 2018-06-20 | 2021-02-02 | Checkpoint Mobile Security Ltd | On-device network protection |
| US11212312B2 (en) | 2018-08-09 | 2021-12-28 | Microsoft Technology Licensing, Llc | Systems and methods for polluting phishing campaign responses |
| US11159566B2 (en) | 2018-08-21 | 2021-10-26 | International Business Machines Corporation | Countering phishing attacks |
| US11297101B1 (en) * | 2018-08-22 | 2022-04-05 | NuRD LLC | Phishing website detection by checking form differences followed by false credentials submission |
| US11496510B1 (en) | 2018-08-24 | 2022-11-08 | NuRD LLC | Fully automated target identification of a phishing web site |
| US11164206B2 (en) * | 2018-11-16 | 2021-11-02 | Comenity Llc | Automatically aggregating, evaluating, and providing a contextually relevant offer |
| US10997295B2 (en) | 2019-04-26 | 2021-05-04 | Forcepoint, LLC | Adaptive trust profile reference architecture |
| WO2021056230A1 (en) | 2019-09-25 | 2021-04-01 | Citrix Systems, Inc. | Systems and methods for securing user domain credentials from phishing attacks |
| CN113139170B (zh) * | 2020-01-17 | 2024-06-25 | 华为云计算技术有限公司 | 生成鉴权凭证和鉴权的方法、装置和设备 |
| US12216791B2 (en) | 2020-02-24 | 2025-02-04 | Forcepoint Llc | Re-identifying pseudonymized or de-identified data utilizing distributed ledger technology |
| US12443703B2 (en) * | 2020-05-22 | 2025-10-14 | Vivek Chinar Nair | Secure system and method for detecting credential stuffing attacks |
| US11550949B2 (en) * | 2020-07-21 | 2023-01-10 | Constella Intelligence, Inc. | Secure exchange of password presence data |
| US11997135B2 (en) * | 2020-12-29 | 2024-05-28 | Citrix Systems, Inc. | Systems and methods for protection against theft of user credentials |
| US11741200B2 (en) | 2020-12-29 | 2023-08-29 | Citrix Systems, Inc. | Systems and methods for protection against theft of user credentials |
| US12192233B2 (en) | 2021-04-15 | 2025-01-07 | Citrix Systems, Inc. | Systems and methods for phishing attack protection based on identity provider verification |
| US12380201B2 (en) | 2021-12-06 | 2025-08-05 | Citrix Systems, Inc. | Detecting sharing of passwords |
| US12563094B2 (en) | 2022-04-27 | 2026-02-24 | Citrix Systems, Inc. | Systems and methods for preventing one-time password phishing |
| US12452826B2 (en) | 2022-10-05 | 2025-10-21 | Bank Of America Corporation | Systems and methods for controlling electronic communications in real time via an artificial intelligence engine based on location data and user data |
| KR102521677B1 (ko) * | 2022-12-07 | 2023-04-18 | (주)라바웨이브 | 피싱 피해 모니터링 시스템 및 그 방법 |
| FR3145814B1 (fr) * | 2023-02-15 | 2025-03-07 | Deepdef | Procede de securisation d’un acces a une ressource |
Family Cites Families (70)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE69738856D1 (de) | 1996-02-26 | 2008-09-04 | Nokia Corp | Verfahren zur Bedienung eines Funktelefons |
| US6453345B2 (en) * | 1996-11-06 | 2002-09-17 | Datadirect Networks, Inc. | Network security and surveillance system |
| US6044152A (en) | 1998-01-15 | 2000-03-28 | Ericsson Inc. | Shielded keyboard for a portable communication device |
| US6230269B1 (en) | 1998-03-04 | 2001-05-08 | Microsoft Corporation | Distributed authentication system and method |
| US6104916A (en) | 1998-06-15 | 2000-08-15 | Motorola, Inc. | Hinge pin |
| US6185689B1 (en) * | 1998-06-24 | 2001-02-06 | Richard S. Carson & Assoc., Inc. | Method for network self security assessment |
| CA2255047A1 (en) | 1998-11-30 | 2000-05-30 | Ibm Canada Limited-Ibm Canada Limitee | Comparison of hierarchical structures and merging of differences |
| GB2349960A (en) | 1999-05-08 | 2000-11-15 | Ibm | Secure password provision |
| US6826697B1 (en) * | 1999-08-30 | 2004-11-30 | Symantec Corporation | System and method for detecting buffer overflow attacks |
| JP3739641B2 (ja) | 2000-04-19 | 2006-01-25 | 富士通株式会社 | 折りたたみ型携帯機 |
| EP1277326A2 (en) * | 2000-04-28 | 2003-01-22 | Internet Security Systems, Inc. | Method and system for managing computer security information |
| JP3908448B2 (ja) | 2000-08-17 | 2007-04-25 | 日本電気株式会社 | 移動電話装置及びその内蔵アンテナ |
| JP2002073553A (ja) | 2000-08-24 | 2002-03-12 | Shijin Kogyo Sakushinkai | 嵌入式侵入検出システム |
| EP1219401A3 (en) | 2000-12-29 | 2004-02-04 | Nokia Corporation | Resin injection molded article with reinforcing or decorative core |
| US6925313B2 (en) | 2001-02-07 | 2005-08-02 | Hyundai Curitel Inc. | Folder-type mobile communication terminal having double-sided LCD |
| US7845004B2 (en) | 2001-07-27 | 2010-11-30 | International Business Machines Corporation | Correlating network information and intrusion information to find the entry point of an attack upon a protected computer |
| CA2354443A1 (en) | 2001-07-31 | 2003-01-31 | Ibm Canada Limited-Ibm Canada Limitee | Method and system for visually constructing xml schemas using an object-oriented model |
| US6655863B2 (en) | 2001-08-03 | 2003-12-02 | L&K Precision Industrial Co., Ltd. | Pen-sized keyboard arrangement |
| US8250025B2 (en) * | 2001-11-06 | 2012-08-21 | Business Controls, Inc. | Anonymous reporting system |
| US7159120B2 (en) * | 2001-11-19 | 2007-01-02 | Good Technology, Inc. | Method and system for protecting data within portable electronic devices |
| US7228417B2 (en) | 2002-02-26 | 2007-06-05 | America Online, Inc. | Simple secure login with multiple-authentication providers |
| US6845380B2 (en) | 2002-03-04 | 2005-01-18 | Hewlett-Packard Development Company, L.P. | Method and system of valuing transformation between extensible markup language (XML) documents |
| TW592420U (en) | 2002-04-19 | 2004-06-11 | Quanta Comp Inc | Mobile phone |
| US7162485B2 (en) | 2002-06-19 | 2007-01-09 | Georg Gottlob | Efficient processing of XPath queries |
| AU2003250302A1 (en) | 2002-07-15 | 2004-03-03 | Siemens Aktiengesellschaft | Method and devices for encoding/decoding structured documents, especially xml documents |
| EP1413980A1 (en) | 2002-10-24 | 2004-04-28 | SCHLUMBERGER Systèmes | Protection of a portable object against denial of service type attacks |
| US7043487B2 (en) | 2002-12-28 | 2006-05-09 | International Business Machines Corporation | Method for storing XML documents in a relational database system while exploiting XML schema |
| US7152244B2 (en) * | 2002-12-31 | 2006-12-19 | American Online, Inc. | Techniques for detecting and preventing unintentional disclosures of sensitive data |
| US20040143581A1 (en) | 2003-01-15 | 2004-07-22 | Bohannon Philip L. | Cost-based storage of extensible markup language (XML) data |
| US7694136B2 (en) | 2003-02-10 | 2010-04-06 | International Business Machines Corporation | Method for distributing and authenticating public keys using hashed password protection |
| JP2004295252A (ja) | 2003-03-25 | 2004-10-21 | Nifty Corp | 認証データ自動入力プログラム及び装置 |
| US8640234B2 (en) * | 2003-05-07 | 2014-01-28 | Trustwave Holdings, Inc. | Method and apparatus for predictive and actual intrusion detection on a network |
| CA2432658C (en) | 2003-06-17 | 2008-04-01 | Ibm Canada Limited - Ibm Canada Limitee | Simple types in xml schema complex types |
| US7509495B2 (en) | 2003-07-10 | 2009-03-24 | Cinnober Financial Technology, Ab | Authentication protocol |
| JP2005070074A (ja) | 2003-08-21 | 2005-03-17 | Pioneer Electronic Corp | 表示装置及び該表示装置を含んでなる電子機器 |
| JP2005078316A (ja) | 2003-08-29 | 2005-03-24 | Kyocera Corp | 携帯端末装置 |
| US7523220B2 (en) | 2003-09-17 | 2009-04-21 | Microsoft Corporation | Metaspace: communication middleware for partially connected mobile ad hoc networks |
| US7685296B2 (en) | 2003-09-25 | 2010-03-23 | Microsoft Corporation | Systems and methods for client-based web crawling |
| US7314785B2 (en) | 2003-10-24 | 2008-01-01 | Semiconductor Energy Laboratory Co., Ltd. | Display device and manufacturing method thereof |
| US7526803B2 (en) | 2003-11-17 | 2009-04-28 | Alcatel Lucent | Detection of denial of service attacks against SIP (session initiation protocol) elements |
| US7487541B2 (en) * | 2003-12-10 | 2009-02-03 | Alcatel Lucent | Flow-based method for tracking back single packets |
| JP4485184B2 (ja) | 2003-12-15 | 2010-06-16 | 株式会社半導体エネルギー研究所 | 発光装置および電子機器 |
| US8191139B2 (en) * | 2003-12-18 | 2012-05-29 | Honeywell International Inc. | Intrusion detection report correlator and analyzer |
| US20060294187A1 (en) * | 2004-01-20 | 2006-12-28 | Thomas Hakel | Integrated web communications system |
| US20050177578A1 (en) | 2004-02-10 | 2005-08-11 | Chen Yao-Ching S. | Efficient type annontation of XML schema-validated XML documents without schema validation |
| TWI230827B (en) | 2004-02-12 | 2005-04-11 | Au Optronics Corp | Liquid crystal display module |
| US7603654B2 (en) | 2004-03-01 | 2009-10-13 | Microsoft Corporation | Determining XML schema type equivalence |
| US20050228999A1 (en) * | 2004-04-09 | 2005-10-13 | Arcot Systems, Inc. | Audit records for digitally signed documents |
| US20050229097A1 (en) | 2004-04-09 | 2005-10-13 | Microsoft Corporation | Systems and methods for layered XML schemas |
| US7363513B2 (en) | 2004-04-15 | 2008-04-22 | International Business Machines Corporation | Server denial of service shield |
| US20060090073A1 (en) * | 2004-04-27 | 2006-04-27 | Shira Steinberg | System and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity |
| US7457823B2 (en) * | 2004-05-02 | 2008-11-25 | Markmonitor Inc. | Methods and systems for analyzing data related to possible online fraud |
| US20050273629A1 (en) * | 2004-06-04 | 2005-12-08 | Vitalsource Technologies | System, method and computer program product for providing digital rights management of protected content |
| AU2005255513A1 (en) | 2004-06-21 | 2005-12-29 | Echoworx Corporation | Method, system and computer program for protecting user credentials against security attacks |
| US7606821B2 (en) * | 2004-06-30 | 2009-10-20 | Ebay Inc. | Method and system for preventing fraudulent activities |
| US7886345B2 (en) * | 2004-07-02 | 2011-02-08 | Emc Corporation | Password-protection module |
| JP4636456B2 (ja) | 2004-09-16 | 2011-02-23 | 富士通東芝モバイルコミュニケーションズ株式会社 | 無線装置 |
| US20060095955A1 (en) * | 2004-11-01 | 2006-05-04 | Vong Jeffrey C V | Jurisdiction-wide anti-phishing network service |
| US7634810B2 (en) * | 2004-12-02 | 2009-12-15 | Microsoft Corporation | Phishing detection, prevention, and notification |
| US20060123478A1 (en) * | 2004-12-02 | 2006-06-08 | Microsoft Corporation | Phishing detection, prevention, and notification |
| US20050086161A1 (en) * | 2005-01-06 | 2005-04-21 | Gallant Stephen I. | Deterrence of phishing and other identity theft frauds |
| US8024488B2 (en) | 2005-03-02 | 2011-09-20 | Cisco Technology, Inc. | Methods and apparatus to validate configuration of computerized devices |
| US8601574B2 (en) * | 2005-03-29 | 2013-12-03 | At&T Intellectual Property I, L.P. | Anti-phishing methods based on an aggregate characteristic of computer system logins |
| US7475135B2 (en) * | 2005-03-31 | 2009-01-06 | International Business Machines Corporation | Systems and methods for event detection |
| US20060224677A1 (en) * | 2005-04-01 | 2006-10-05 | Baytsp | Method and apparatus for detecting email fraud |
| US20060232495A1 (en) | 2005-04-19 | 2006-10-19 | Toppoly Optoelectronics Corp. | Dual panel display |
| US7681234B2 (en) | 2005-06-30 | 2010-03-16 | Microsoft Corporation | Preventing phishing attacks |
| US20070136806A1 (en) * | 2005-12-14 | 2007-06-14 | Aladdin Knowledge Systems Ltd. | Method and system for blocking phishing scams |
| US20070162331A1 (en) * | 2006-01-10 | 2007-07-12 | Michael Sullivan | Systems and methods for providing information and conducting business using the internet |
| US8640231B2 (en) | 2006-02-23 | 2014-01-28 | Microsoft Corporation | Client side attack resistant phishing detection |
-
2006
- 2006-02-23 US US11/360,254 patent/US8640231B2/en not_active Expired - Fee Related
-
2007
- 2007-02-13 CA CA2643294A patent/CA2643294C/en not_active Expired - Fee Related
- 2007-02-13 KR KR1020087020611A patent/KR20080100204A/ko not_active Abandoned
- 2007-02-13 WO PCT/US2007/004044 patent/WO2007120383A2/en not_active Ceased
- 2007-02-13 BR BRPI0707987-7A patent/BRPI0707987A2/pt not_active Application Discontinuation
- 2007-02-13 AU AU2007239055A patent/AU2007239055A1/en not_active Abandoned
- 2007-02-13 EP EP07770592.9A patent/EP1999609B1/en not_active Not-in-force
- 2007-02-13 JP JP2008556358A patent/JP5382850B2/ja not_active Expired - Fee Related
- 2007-02-13 CN CN2007800063193A patent/CN101390068B/zh not_active Expired - Fee Related
-
2008
- 2008-08-12 NO NO20083486A patent/NO20083486L/no unknown
Also Published As
| Publication number | Publication date |
|---|---|
| CN101390068A (zh) | 2009-03-18 |
| EP1999609A2 (en) | 2008-12-10 |
| BRPI0707987A2 (pt) | 2011-05-17 |
| JP2009527855A (ja) | 2009-07-30 |
| WO2007120383A2 (en) | 2007-10-25 |
| WO2007120383A3 (en) | 2008-02-21 |
| AU2007239055A1 (en) | 2007-10-25 |
| KR20080100204A (ko) | 2008-11-14 |
| US8640231B2 (en) | 2014-01-28 |
| EP1999609A4 (en) | 2009-10-14 |
| CA2643294A1 (en) | 2007-10-25 |
| CN101390068B (zh) | 2010-12-08 |
| JP5382850B2 (ja) | 2014-01-08 |
| EP1999609B1 (en) | 2018-03-28 |
| CA2643294C (en) | 2016-04-19 |
| US20070199054A1 (en) | 2007-08-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| NO20083486L (no) | Angrepsresistent phishing-deteksjon pa klient | |
| Wu et al. | Effective defense schemes for phishing attacks on mobile computing platforms | |
| US12316671B2 (en) | Detection of impersonated web pages and other impersonation methods for web-based cyber threats | |
| US20130263263A1 (en) | Web element spoofing prevention system and method | |
| Conteh et al. | The rise in cybercrime and the dynamics of exploiting the human vulnerability factor | |
| CN104837159A (zh) | Android平台OAuth协议误用安全检测方法 | |
| Mahdad et al. | Breaching security keys without root: Fido2 deception attacks via overlays exploiting limited display authenticators | |
| Viegas et al. | IT Security Controls | |
| US20120167212A1 (en) | Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates | |
| Zhao et al. | Explicit authentication response considered harmful | |
| Dadkhah et al. | A novel approach to deal with keyloggers | |
| Braun et al. | Phishsafe: leveraging modern javascript api's for transparent and robust protection | |
| Mahdad et al. | Sok: A comprehensive evaluation of 2fa-based schemes in the face of active concurrent attacks from user terminal | |
| Kumawat et al. | Ethical Hacking: White Hat Hackers | |
| Sindhu et al. | A critical analysis of privacy implications surrounding Alexa and voice assistants | |
| Gautam et al. | Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers | |
| Kautwima et al. | Information security mechanisms and ICT policy in practice: A case of the University of Namibia | |
| Davis | Ten Easy Steps to Reduce Your Risk of Cyberattack or Data Breach | |
| Dand et al. | Vulnerability | |
| Murthy | Practical Cybersecurity Learning with Usable Security | |
| Monteiro et al. | Exemplifying attack identification and analysis in a novel forensically viable Syslog model | |
| Qbea’h et al. | Classification of Authentication Approaches to Stop the Next Breaking: Challenges, Benefits, Drawbacks, Awareness, and Recommendations | |
| Hazeyama et al. | Case base for secure software development using software security knowledge base | |
| Asante et al. | Securing Remote Learning Environments | |
| Gupta et al. | Network intrusion prevention system |