Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ファーミング・フィッシング攻撃で用いられる不正なSSL証明書・DNSリダイレクトの検出方法
Document Type and Number:
Japanese Patent JP5329859
Kind Code:
B2
Abstract:
Certificate information associated with a received certificate, such as a Secure Sockets Layer (SSL) certificate is stored in a trusted local cache and/or in one or more remote trusted sources, such as a single remote trusted source and/or a trusted peer network. When a site certificate is received on a host computer system, certificate information associated with the received site certificate is obtained and compared with the stored certificate information to determine whether or not the site certificate indicates malicious activity, such as a malicious DNS redirection or a fraudulent local certificate. When a site certificate is not found indicative of malicious activity, the site certificate is released. Alternatively, when a site certificates is found indicative of malicious activity protective action is taken. In some embodiments, a user's log-in credentials are automatically obtained from a trusted local cache and automatically submitted to a web site.

Inventors:
Paul Agbabian
William E. Sobel
Bruce McCawkendale
Application Number:
JP2008182144A
Publication Date:
October 30, 2013
Filing Date:
July 14, 2008
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
Symantec Corporation
International Classes:
H04L9/32; G06F21/00; G06F21/33; G09C1/00
Domestic Patent References:
JP2002163395A
JP2007122692A
JP2007020004A
JP2005311812A
JP2005311818A
JP2007004415A
JP2007060466A
JP2006270504A
Foreign References:
WO2006091755A1
US20050278534
Attorney, Agent or Firm:
Kenji Sugimura