Image Against Phishing Algorithm

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Image Against phishing algorithm: Create logo for trusted Connection Trusted connection is nothing but Image contains

the code that connects the original server and Requesting client server. Requesting client server may not contain the authority to host this site.

The following figure explains about the p0rocess going in this algorithm. Key Pair(Client) Request Host Exact Registered IP Image Size Image Pixel Hosted Address Number of files present in that requested IP. Page weight(Exact)

Key Pair(Server DB) Registered IP List Default Image Size of particular host Image Pixel for All device Exact Address transfer without URL hidden Number of files present in that requested IP. Page weight(Exact)

Client Server

Key of the Client Request

Server

Web page with its files Key Pair

You might also like