Phishing blocking method using trusted network

2006 
A method for blocking phishing with a trusted network is provided to recognize phishing mails or websites based on trusted updated information by using the trusted network, and manage all processes from a phishing mail reception process to a phishing website connection process effectively by using a plug-in type module. A user computer receives an e-mail including a URL(Uniform Resource Locator) related to a website registered to a trusted network, which is a trusted DNS(Domain Name Service) constructed by receiving a domain name and IP(Internet Protocol) address information from wired/wireless and online application providers(S410). A phishing blocking plug-in installed in the user computer determines whether the received e-mail is a phishing mail or not by comparing the URL included in the received e-mail with a trusted IP or black/white website list stored in the plug-in(S425). A management method for preventing connection to a phishing website included in the phishing mail is provided to when the received e-mail is determined as the phishing e-mail(S440). The phishing blocking plug-in is downloaded to the user computer from the website registered to the trusted network, and information stored in the phishing blocking plug-in is periodically updated(S470).
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []