0% found this document useful (0 votes)
51 views1 page

Image Against Phishing Algorithm

The document describes an algorithm to prevent phishing by verifying a trusted connection between a client and server. The algorithm compares details like registered IP addresses, image sizes, pixel values, hosted addresses, number of files and page weights stored in a server database to those in a client request to confirm the authenticity of the connection. A flow chart shows key pairs being checked between the client, server and server database to determine if the requesting client has the authority to access the hosted site.

Uploaded by

aravindwin
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views1 page

Image Against Phishing Algorithm

The document describes an algorithm to prevent phishing by verifying a trusted connection between a client and server. The algorithm compares details like registered IP addresses, image sizes, pixel values, hosted addresses, number of files and page weights stored in a server database to those in a client request to confirm the authenticity of the connection. A flow chart shows key pairs being checked between the client, server and server database to determine if the requesting client has the authority to access the hosted site.

Uploaded by

aravindwin
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Image Against phishing algorithm: Create logo for trusted Connection Trusted connection is nothing but Image contains

the code that connects the original server and Requesting client server. Requesting client server may not contain the authority to host this site.

The following figure explains about the p0rocess going in this algorithm. Key Pair(Client) Request Host Exact Registered IP Image Size Image Pixel Hosted Address Number of files present in that requested IP. Page weight(Exact)

Key Pair(Server DB) Registered IP List Default Image Size of particular host Image Pixel for All device Exact Address transfer without URL hidden Number of files present in that requested IP. Page weight(Exact)

Client Server

Key of the Client Request

Server

Web page with its files Key Pair

You might also like