Phishing blocking method using trusted network
2006
A method for blocking phishing with a trusted network is provided to recognize phishing mails or websites based on trusted updated information by using the trusted network, and manage all processes from a phishing mail reception process to a phishing website connection process effectively by using a plug-in type module. A user computer receives an e-mail including a URL(Uniform Resource Locator) related to a website registered to a trusted network, which is a trusted DNS(Domain Name Service) constructed by receiving a domain name and IP(Internet Protocol) address information from wired/wireless and online application providers(S410). A phishing blocking plug-in installed in the user computer determines whether the received e-mail is a phishing mail or not by comparing the URL included in the received e-mail with a trusted IP or black/white website list stored in the plug-in(S425). A management method for preventing connection to a phishing website included in the phishing mail is provided to when the received e-mail is determined as the phishing e-mail(S440). The phishing blocking plug-in is downloaded to the user computer from the website registered to the trusted network, and information stored in the phishing blocking plug-in is periodically updated(S470).
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
0
References
0
Citations
NaN
KQI