TY - GEN
T1 - Preventing the access of fraudulent WEB sites by using a special two-dimensional code
AU - Teraura, Nobuyuki
AU - Sakurai, Kouichi
PY - 2012/10/26
Y1 - 2012/10/26
N2 - Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected to fraudulent WEB sites. To address this issue, a registration server for inspecting WEB addresses and storing the corresponding registration IDs in the two-dimensional code format was established. Subsequently, the reliability of directing users to WEB sites only after verifying the registration ID of the target WEB address was examined. However, this approach was susceptible to phishing and camouflage when malicious software was used to rewrite the registration ID and the relationship of the WEB address on the registration server. Therefore, an approach that uses two-dimensional codes with a secret encrypted component was proposed.
AB - Mobile phone users are being increasingly directed to WEB sites through the identification of the WEB address from a two-dimensional code on the phone. However, incidents where mobile phones direct users to malicious WEB sites are also increasing. The direct lead mechanism, in which mobile phones directly send users to an uninspected WEB address, is the most common mechanism by which users are misdirected to fraudulent WEB sites. To address this issue, a registration server for inspecting WEB addresses and storing the corresponding registration IDs in the two-dimensional code format was established. Subsequently, the reliability of directing users to WEB sites only after verifying the registration ID of the target WEB address was examined. However, this approach was susceptible to phishing and camouflage when malicious software was used to rewrite the registration ID and the relationship of the WEB address on the registration server. Therefore, an approach that uses two-dimensional codes with a secret encrypted component was proposed.
UR - http://www.scopus.com/inward/record.url?scp=84867724864&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84867724864&partnerID=8YFLogxK
U2 - 10.1109/IMIS.2012.57
DO - 10.1109/IMIS.2012.57
M3 - Conference contribution
AN - SCOPUS:84867724864
SN - 9780769546841
T3 - Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
SP - 645
EP - 650
BT - Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
T2 - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
Y2 - 4 July 2012 through 6 July 2012
ER -