摘要 |
<p>A method for an HTTP server to decide whether a remote client is victim of a phishing ttack, comprising: -receiving a first HTTP request from the remote client on said HTTP Server; -responding to said first HTTP request, wherein a token is added to the response submitted to said remote client; -receiving a second HTTP request on said HTTP server; -judging whether the second HTTP request includes said token; -judging whether the token originates from said remote client; -processing the HTTP request when said remote client has really issued the second HTTP request.</p> |