Movatterモバイル変換


[0]ホーム

URL:


US20230155971A1 - Detecting of business email compromise - Google Patents

Detecting of business email compromise
Download PDF

Info

Publication number
US20230155971A1
US20230155971A1US18/156,937US202318156937AUS2023155971A1US 20230155971 A1US20230155971 A1US 20230155971A1US 202318156937 AUS202318156937 AUS 202318156937AUS 2023155971 A1US2023155971 A1US 2023155971A1
Authority
US
United States
Prior art keywords
party
message
hyperlink
email
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/156,937
Inventor
Bjorn Markus Jakobsson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZapFraud Inc
Original Assignee
ZapFraud Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZapFraud IncfiledCriticalZapFraud Inc
Priority to US18/156,937priorityCriticalpatent/US20230155971A1/en
Assigned to ZapFraud, Inc.reassignmentZapFraud, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: JAKOBSSON, BJORN MARKUS
Publication of US20230155971A1publicationCriticalpatent/US20230155971A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system and method for detection of email risk automatically is disclosed.

Description

Claims (20)

What is claimed is:
1. A system for detection of email risk, comprising:
a processor configured to:
automatically determine that a first party is considered by the system to be trusted by a second party, based on at least one of determining that the first party is on a whitelist and that the first party is in an address book associated with the second party;
receive a message addressed to the second party from a third party;
perform a risk determination of the message by determining whether the message comprises a hyperlink and by determining whether a display name of the first party and a display name of third party are the same or that a domain name of the first party and a domain name of the third party are similar, wherein similarity is determined based on having a string distance below a first threshold or being conceptually similar based on a list of conceptually similar character strings;
responsive to determining that the message poses a risk, automatically perform a security action comprising at least one of marking the message up with a warning, quarantining the message, performing a report generating action comprising including information about the message in a report accessible to an admin of the system, and replacing the hyperlink in the message with a proxy hyperlink; and
a memory coupled to the processor and configured to provide the processor with instructions.
2. The system ofclaim 1 wherein a request associated with the proxy hyperlink causes the system to: determine the hyperlink from the proxy hyperlink; determine whether a site associated with the hyperlink is associated with risk; and based on the determination whether the site associated with the hyperlink is associated with risk, cause a warning to be displayed or a redirection to be made from the proxy hyperlink to the hyperlink.
3. The system ofclaim 2 further comprising determining whether the site associated with the hyperlink is associated with risk before the request associated with the proxy hyperlink is received.
4. The system ofclaim 2 further comprising determining whether the site associated with the hyperlink is associated with risk in response to receiving the request associated with the proxy hyperlink.
5. The system ofclaim 1 wherein in response to receiving a request associated with the proxy hyperlink: determine the hyperlink from the proxy hyperlink; verify content of a site associated with the hyperlink, and based on a result of the verification, cause at least one of a warning to be displayed and a redirection to be made from the proxy hyperlink to the hyperlink.
6. The system ofclaim 1 wherein the proxy hyperlink encodes at least a portion of the hyperlink.
7. The system ofclaim 1 wherein the security action comprises at least one of: initiating a multi-factor authentication verification, modifying the display name of the message, transmitting a notification or a warning to an address associated with the second party, collecting information comprising at least one of an IP address, a cookie, and browser version information, and transmitting a confirmation request to an address associated with the first party, the confirmation request comprising at least a portion of the message.
8. The system ofclaim 7 wherein a confirmation received in response to the confirmation request comprises at least one of an entered code or a clicked link, wherein the link is included in the confirmation request.
9. The system ofclaim 8 wherein information associated with the clicked link is collected, wherein the information comprises at least one of the IP address, the cookie, and the browser version information.
10. The system ofclaim 1 wherein the risk determination is further based at least in part on at least one of: an indication of spoofing, an indication of account takeover, a presence of a reply-to address, a geographic inconsistency, detection of a new signature file, detection of a new display name, detection of high-risk email content, detection of an abnormal delivery path, and based on analysis of attachments.
11. The system ofclaim 1 wherein an address associated with the first party is determined to be a secondary communication channel associated with at least one of the first party and an admin associated with the first party.
12. The system ofclaim 1 wherein the security action further comprises transmitting a confirmation request to an address associated with the first party, the confirmation request comprising at least a portion of the message, wherein the message is delivered to the second party based on verification of information received in response to the confirmation request.
13. A system for determining whether an electronic message is deceptive, comprising:
a processor configured to:
automatically determine whether a first party is considered trusted by a second party, based on at least on one of determining that the first party is on a whitelist and that the first party is in an address book associated with the second party;
receive a message addressed to the second party from a third party;
determine if the received message poses a risk by determining that a display name of the first party and a display name of third party are the same or that a domain name of the first party and a domain name of the third party are similar, wherein similarity is determined based on having a string distance below a first threshold or being conceptually similar based on a list of conceptually similar character strings;
responsive to the first party is considered trusted by the second party, and the received message is determined to pose a risk, determine that the message is deceptive;
responsive to a determination that the first party is not considered trusted by the second party, determine that the message is not deceptive;
responsive to the message being found deceptive, automatically perform a security action and a report generation action without having received any user input from a user associated with the second party in response to the message, wherein the security action comprises marking the message up with a warning or quarantining the message, wherein the report generating action comprises including information about the received message in a report accessible to an admin of the system; and
responsive to the message being found not deceptive, deliver the message to the second party; and
a memory coupled to the processor and configured to provide the processor with instructions.
14. A method for detection of email risk, comprising:
automatically determining that a first party is considered trusted by a second party, based on at least one of determining that the first party is on a whitelist and that the first party is in an address book associated with the second party;
receiving a message addressed to the second party from a third party;
performing a risk determination of the message by determining whether the message comprises a hyperlink and by determining whether a display name of the first party and a display name of the third party are the same or that a domain name of the first party and a domain name of the third party are similar, wherein similarity is determined based on having a string distance below a first threshold or being conceptually similar based on a list of conceptually similar character strings;
responsive to determining that the message poses a risk automatically performing a security action comprising at least one of marking the message up with a warning, quarantining the message, performing a report generating action comprising including information about the message in a report accessible to an admin, and replacing the hyperlink in the message with a proxy hyperlink.
15. The method ofclaim 14 wherein a request associated with the proxy hyperlink results in the method: determining the hyperlink from the proxy hyperlink; determining whether a site associated with the hyperlink is associated with risk; and based on the determination that the site associated with the hyperlink is associated with risk, causing a warning to be displayed or a redirection to be made from the proxy hyperlink to the hyperlink.
16. The method ofclaim 15 further comprising determining whether the site associated with the hyperlink is associated with risk before the request associated with the proxy hyperlink is received.
17. The method ofclaim 15 further comprising determining whether the site associated with the hyperlink is associated with risk in response to receiving the request associated with the proxy hyperlink.
18. The method ofclaim 14 further comprising in response to receiving a request associated with the proxy hyperlink determining the hyperlink from the proxy hyperlink; verifying content of a site associated with the hyperlink, and based on a result of the verification, causing a warning to be displayed or a redirection to be made from the proxy hyperlink to the hyperlink.
19. The method ofclaim 14 further comprising causing the proxy hyperlink to encode at least a portion of the hyperlink.
20. A method for determining whether an electronic message is deceptive, comprising: automatically determining whether a first party is trusted by a second party, based on at least on one of determining that the first party is on a whitelist and that the first party is in an address book associated with the second party;
receiving a message addressed from a third party distinct from the first party and addressed to the second party;
performing a risk determination of the received message to determine if the received message poses a risk by determining that a display name of the first party and a display name of third party are the same or that a domain name of the first party and a domain name of the third party are similar, wherein similarity is determined based on having a string distance below a first threshold, or being conceptually similar based on a list of conceptually similar character strings;
responsive to the first party being trusted by the second party and the received message is determined to pose a risk, determining that the message is deceptive;
responsive to a determination that the first party is not trusted by the second party, determining that the message is not deceptive;
responsive to the message being found deceptive, automatically performing a security action and a report generation action without having received any user input from a user associated with the second party in response to the message, wherein the security action comprises marking the message up with a warning or quarantining the message, wherein the report generating action comprises including information about the received message in a report accessible to an admin of the system; and
responsive to the message being found not deceptive, delivering the message to the second party.
US18/156,9372016-01-262023-01-19Detecting of business email compromisePendingUS20230155971A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US18/156,937US20230155971A1 (en)2016-01-262023-01-19Detecting of business email compromise

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201662287378P2016-01-262016-01-26
US15/414,489US10721195B2 (en)2016-01-262017-01-24Detection of business email compromise
US16/917,197US11595336B2 (en)2016-01-262020-06-30Detecting of business email compromise
US18/156,937US20230155971A1 (en)2016-01-262023-01-19Detecting of business email compromise

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/917,197ContinuationUS11595336B2 (en)2016-01-262020-06-30Detecting of business email compromise

Publications (1)

Publication NumberPublication Date
US20230155971A1true US20230155971A1 (en)2023-05-18

Family

ID=59398670

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US15/414,489Active2037-06-04US10721195B2 (en)2016-01-262017-01-24Detection of business email compromise
US16/917,197Active2038-03-15US11595336B2 (en)2016-01-262020-06-30Detecting of business email compromise
US18/156,937PendingUS20230155971A1 (en)2016-01-262023-01-19Detecting of business email compromise

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US15/414,489Active2037-06-04US10721195B2 (en)2016-01-262017-01-24Detection of business email compromise
US16/917,197Active2038-03-15US11595336B2 (en)2016-01-262020-06-30Detecting of business email compromise

Country Status (2)

CountryLink
US (3)US10721195B2 (en)
WO (1)WO2017132170A1 (en)

Families Citing this family (59)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10694029B1 (en)2013-11-072020-06-23Rightquestion, LlcValidating automatic number identification data
US10019567B1 (en)*2014-03-242018-07-10Amazon Technologies, Inc.Encoding of security codes
US10721195B2 (en)2016-01-262020-07-21ZapFraud, Inc.Detection of business email compromise
US10116678B2 (en)2016-02-252018-10-30Verrafid LLCSystem for detecting fraudulent electronic communications impersonation, insider threats and attacks
WO2017176934A1 (en)*2016-04-052017-10-12Joinesty, Inc.Apparatus and method for automated email and password creation and curation across multiple websites
US11936604B2 (en)2016-09-262024-03-19Agari Data, Inc.Multi-level security analysis and intermediate delivery of an electronic message
US10805270B2 (en)2016-09-262020-10-13Agari Data, Inc.Mitigating communication risk by verifying a sender of a message
US11044267B2 (en)2016-11-302021-06-22Agari Data, Inc.Using a measure of influence of sender in determining a security risk associated with an electronic message
US11722513B2 (en)2016-11-302023-08-08Agari Data, Inc.Using a measure of influence of sender in determining a security risk associated with an electronic message
US11019076B1 (en)2017-04-262021-05-25Agari Data, Inc.Message security assessment using sender identity profiles
US11757914B1 (en)2017-06-072023-09-12Agari Data, Inc.Automated responsive message to determine a security risk of a message sender
US11102244B1 (en)2017-06-072021-08-24Agari Data, Inc.Automated intelligence gathering
CN109104280B (en)2017-06-202021-09-28腾讯科技(深圳)有限公司Method and device for forwarding message
US10412032B2 (en)2017-07-062019-09-10Facebook, Inc.Techniques for scam detection and prevention
US11665195B2 (en)2017-08-312023-05-30Barracuda Networks, Inc.System and method for email account takeover detection and remediation utilizing anonymized datasets
US11563757B2 (en)2017-08-312023-01-24Barracuda Networks, Inc.System and method for email account takeover detection and remediation utilizing AI models
US10891373B2 (en)*2017-08-312021-01-12Micro Focus LlcQuarantining electronic messages based on relationships among associated addresses
US10778717B2 (en)*2017-08-312020-09-15Barracuda Networks, Inc.System and method for email account takeover detection and remediation
US11736521B2 (en)*2017-11-062023-08-22Mimecast Services Ltd.Systems and methods for detecting domain impersonation
US10733572B2 (en)*2017-12-222020-08-04Microsoft Technology Licensing, LlcData protection using alerts to delay transmission
CN111727588A (en)*2018-01-312020-09-29阿西亚Spe有限责任公司 System and method for net neutrality testing
US10834127B1 (en)*2018-04-242020-11-10Trend Micro IncorporatedDetection of business email compromise attacks
JP6758542B2 (en)*2018-06-012020-09-23三菱電機株式会社 Suspicious email detection device, suspicious email detection method and suspicious email detection program
US11323464B2 (en)2018-08-082022-05-03Rightquestion, LlcArtifact modification and associated abuse detection
US11824870B2 (en)2018-12-192023-11-21Abnormal Security CorporationThreat detection platforms for detecting, characterizing, and remediating email-based threats in real time
US11431738B2 (en)2018-12-192022-08-30Abnormal Security CorporationMultistage analysis of emails to identify security threats
US11050793B2 (en)2018-12-192021-06-29Abnormal Security CorporationRetrospective learning of communication patterns by machine learning models for discovering abnormal behavior
US11032312B2 (en)2018-12-192021-06-08Abnormal Security CorporationProgrammatic discovery, retrieval, and analysis of communications to identify abnormal communication activity
EP4369229A3 (en)*2018-12-312024-09-25INTEL CorporationSecuring systems employing artificial intelligence
US11411990B2 (en)*2019-02-152022-08-09Forcepoint LlcEarly detection of potentially-compromised email accounts
US11102010B2 (en)*2019-02-242021-08-24Ondefend Holdings, LlcSystem and apparatus for providing authenticable electronic communication
US11323270B2 (en)*2019-02-242022-05-03Ondefend Holdings, LlcSystem and apparatus for providing authenticable electronic communication
US11539531B2 (en)2019-02-242022-12-27Ondefend Holdings, LlcSystem and apparatus for providing authenticable electronic communication
US11063897B2 (en)*2019-03-012021-07-13Cdw LlcMethod and system for analyzing electronic communications and customer information to recognize and mitigate message-based attacks
US11128649B1 (en)2019-03-062021-09-21Trend Micro IncorporatedSystems and methods for detecting and responding to anomalous messaging and compromised accounts
US12034767B2 (en)*2019-08-292024-07-09Darktrace Holdings LimitedArtificial intelligence adversary red team
US11757816B1 (en)2019-11-112023-09-12Trend Micro IncorporatedSystems and methods for detecting scam emails
CN111091204B (en)*2019-12-142023-07-18树行科技(上海)有限公司Intelligent monitoring method and device for maintenance behaviors and computer readable storage medium
US11470042B2 (en)2020-02-212022-10-11Abnormal Security CorporationDiscovering email account compromise through assessments of digital activities
US10911489B1 (en)*2020-02-212021-02-02Abnormal Security CorporationDiscovering email account compromise through assessments of digital activities
US11477234B2 (en)2020-02-282022-10-18Abnormal Security CorporationFederated database for establishing and tracking risk of interactions with third parties
WO2021178423A1 (en)2020-03-022021-09-10Abnormal Security CorporationMultichannel threat detection for protecting against account compromise
US11252189B2 (en)*2020-03-022022-02-15Abnormal Security CorporationAbuse mailbox for facilitating discovery, investigation, and analysis of email-based threats
US11451576B2 (en)2020-03-122022-09-20Abnormal Security CorporationInvestigation of threats using queryable records of behavior
EP4139801A4 (en)2020-04-232024-08-14Abnormal Security CorporationDetection and prevention of external fraud
US12332961B1 (en)*2020-07-092025-06-17Nvidia CorporationDetecting malformed resource references
US11050698B1 (en)*2020-09-182021-06-29Area 1 Security, Inc.Message processing system with business email compromise detection
US11310270B1 (en)2020-10-142022-04-19Expel, Inc.Systems and methods for intelligent phishing threat detection and phishing threat remediation in a cyber security threat detection and mitigation platform
US11528242B2 (en)*2020-10-232022-12-13Abnormal Security CorporationDiscovering graymail through real-time analysis of incoming email
US11687648B2 (en)2020-12-102023-06-27Abnormal Security CorporationDeriving and surfacing insights regarding security threats
US12143399B2 (en)*2021-01-052024-11-12Apex Techlink, Inc.Email certification system
US11700234B2 (en)2021-01-262023-07-11Cisco Technology, Inc.Email security based on display name and address
EP4044503A1 (en)*2021-02-102022-08-17AO Kaspersky LabSystem and method for creating heuristic rules to detect fraudulent emails classified as business email compromise attacks
US11882112B2 (en)*2021-05-262024-01-23Bank Of America CorporationInformation security system and method for phishing threat prevention using tokens
US11831661B2 (en)2021-06-032023-11-28Abnormal Security CorporationMulti-tiered approach to payload detection for incoming communications
US11831688B2 (en)*2021-06-182023-11-28Capital One Services, LlcSystems and methods for network security
US11695701B2 (en)*2021-06-242023-07-04Zipwhip, LlcDynamic communication system registry traffic control on a communication network
FR3136073B1 (en)*2022-05-242024-10-04MailSPEC SAS Method of sending an e-mail securely
US12335254B2 (en)*2022-07-192025-06-17Bank Of America CorporationMalicious universal resource locator and file detector and response action engine

Citations (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040054742A1 (en)*2002-06-212004-03-18Shimon GruperMethod and system for detecting malicious activity and virus outbreak in email
US20050210106A1 (en)*2003-03-192005-09-22Cunningham Brian DSystem and method for detecting and filtering unsolicited and undesired electronic messages
US20060253597A1 (en)*2005-05-052006-11-09Mujica Technologies Inc.E-mail system
US20080313704A1 (en)*2005-10-212008-12-18Boxsentry Pte Ltd.Electronic Message Authentication
US20090217370A1 (en)*2008-02-272009-08-27Microsoft CorporationSafe file transmission and reputation lookup
US20100250929A1 (en)*2009-03-312010-09-30Telefonaktiebolaget Lm Ericsson (Publ)Method and apparatus for email communication
US20110060802A1 (en)*2000-02-082011-03-10Katsikas Peter LSystem for eliminating unauthorized electronic mail
US20120278887A1 (en)*2011-04-282012-11-01Microsoft CorporationReporting compromised email accounts
US20130145425A1 (en)*2011-12-062013-06-06At&T Intellectual Property I, L.P.Verification service
US8484741B1 (en)*2012-01-272013-07-09Chapman Technology Group, Inc.Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
US20130305318A1 (en)*2012-05-102013-11-14International Business Machines CorproationCommunications security management
US20130325991A1 (en)*2011-11-092013-12-05Proofpoint, Inc.Filtering Unsolicited Emails
US20150067839A1 (en)*2011-07-082015-03-05Brad WardmanSyntactical Fingerprinting
US9154514B1 (en)*2012-11-052015-10-06Astra Identity, Inc.Systems and methods for electronic message analysis
US20150381653A1 (en)*2012-06-072015-12-31Proofpoint, Inc.Malicious message detection and processing
US9332022B1 (en)*2014-07-072016-05-03Symantec CorporationSystems and methods for detecting suspicious internet addresses
US20170200015A1 (en)*2016-01-072017-07-13Emmanuel GonzalezSystem and method to reduce inappropriate email and online behavior
US20170206545A1 (en)*2016-01-202017-07-20Zipstorm Inc.Recipient centric messaging system and protocols to implement it over data networks
US9740858B1 (en)*2015-07-142017-08-22Trend Micro IncorporatedSystem and method for identifying forged emails
US10027702B1 (en)*2014-06-132018-07-17Trend Micro IncorporatedIdentification of malicious shortened uniform resource locators

Family Cites Families (111)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6161130A (en)1998-06-232000-12-12Microsoft CorporationTechnique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set
US6574658B1 (en)1999-01-292003-06-03Lucent Technologies Inc.System and method for secure classification of electronic mail
US7149893B1 (en)1999-09-072006-12-12Poofaway.Com, Inc.System and method for enabling the originator of an electronic mail message to preset an expiration time, date, and/or event, and to control processing or handling by a recipient
US6734886B1 (en)1999-12-212004-05-11Personalpath Systems, Inc.Method of customizing a browsing experience on a world-wide-web site
US7644274B1 (en)2000-03-302010-01-05Alcatel-Lucent Usa Inc.Methods of protecting against spam electronic mail
US7058566B2 (en)2001-01-242006-06-06Consulting & Clinical Psychology, Ltd.System and method for computer analysis of computer generated communications to produce indications and warning of dangerous behavior
US20030023736A1 (en)2001-07-122003-01-30Kurt AbkemeierMethod and system for filtering messages
US7870203B2 (en)2002-03-082011-01-11Mcafee, Inc.Methods and systems for exposing messaging reputation to an end user
US8132250B2 (en)2002-03-082012-03-06Mcafee, Inc.Message profiling systems and methods
US20030229672A1 (en)2002-06-052003-12-11Kohn Daniel MarkEnforceable spam identification and reduction system, and method thereof
EP1376420A1 (en)2002-06-192004-01-02Pitsos ErrikosMethod and system for classifying electronic documents
US20040203589A1 (en)2002-07-112004-10-14Wang Jiwei R.Method and system for controlling messages in a communication network
US8327442B2 (en)2002-12-242012-12-04Herz Frederick S MSystem and method for a distributed application and network security system (SDI-SCAM)
WO2004059506A1 (en)2002-12-262004-07-15Commtouch Software Ltd.Detection and prevention of spam
US20040176072A1 (en)2003-01-312004-09-09Gellens Randall C.Simplified handling of, blocking of, and credit for undesired messaging
US7299261B1 (en)2003-02-202007-11-20Mailfrontier, Inc. A Wholly Owned Subsidiary Of Sonicwall, Inc.Message classification using a summary
US20050080857A1 (en)2003-10-092005-04-14Kirsch Steven T.Method and system for categorizing and processing e-mails
US20040177120A1 (en)2003-03-072004-09-09Kirsch Steven T.Method for filtering e-mail messages
US7676546B2 (en)2003-03-252010-03-09Verisign, Inc.Control and management of electronic messaging
US7293063B1 (en)2003-06-042007-11-06Symantec CorporationSystem utilizing updated spam signatures for performing secondary signature-based analysis of a held e-mail to improve spam email detection
US7155484B2 (en)2003-06-302006-12-26Bellsouth Intellectual Property CorporationFiltering email messages corresponding to undesirable geographical regions
US7200637B2 (en)2003-07-162007-04-03Thomas John KlosSystem for processing electronic mail messages with specially encoded addresses
US7814545B2 (en)2003-07-222010-10-12Sonicwall, Inc.Message classification using classifiers
WO2005010728A2 (en)2003-07-232005-02-03Findbase LlcMethod and system for determining the probability of origin of an email
US7433924B2 (en)2003-08-072008-10-07International Business Machines CorporationInterceptor for non-subscribed bulk electronic messages
JP4253271B2 (en)2003-08-112009-04-08株式会社日立製作所 Image processing system and vehicle control system
US20050060643A1 (en)2003-08-252005-03-17Miavia, Inc.Document similarity detection and classification system
US7451487B2 (en)2003-09-082008-11-11Sonicwall, Inc.Fraudulent message detection
US7257564B2 (en)2003-10-032007-08-14Tumbleweed Communications Corp.Dynamic message filtering
US8990928B1 (en)2003-12-112015-03-24Radix Holdings, LlcURL salience
US7359941B2 (en)2004-01-082008-04-15International Business Machines CorporationMethod and apparatus for filtering spam email
US8856239B1 (en)2004-02-102014-10-07Sonicwall, Inc.Message classification based on likelihood of spoofing
US20050182735A1 (en)2004-02-122005-08-18Zager Robert P.Method and apparatus for implementing a micropayment system to control e-mail spam
US20050216587A1 (en)2004-03-252005-09-29International Business Machines CorporationEstablishing trust in an email client
US20050223076A1 (en)2004-04-022005-10-06International Business Machines CorporationCooperative spam control
US20050235065A1 (en)2004-04-152005-10-20Nokia CorporationMethod, network element, and system for providing security of a user session
US7627670B2 (en)2004-04-292009-12-01International Business Machines CorporationMethod and apparatus for scoring unsolicited e-mail
US20070107053A1 (en)2004-05-022007-05-10Markmonitor, Inc.Enhanced responses to online fraud
US7457823B2 (en)2004-05-022008-11-25Markmonitor Inc.Methods and systems for analyzing data related to possible online fraud
US8769671B2 (en)2004-05-022014-07-01Markmonitor Inc.Online fraud solution
US20060026242A1 (en)2004-07-302006-02-02Wireless Services CorpMessaging spam detection
US20060168329A1 (en)2004-11-302006-07-27Sensory Networks, Inc.Apparatus and method for acceleration of electronic message processing through pre-filtering
US7899866B1 (en)2004-12-312011-03-01Microsoft CorporationUsing message features and sender identity for email spam filtering
US20060149821A1 (en)2005-01-042006-07-06International Business Machines CorporationDetecting spam email using multiple spam classifiers
US7831834B2 (en)2005-03-142010-11-09Yahoo! IncAssociating a postmark with a message to indicate trust
US20060224677A1 (en)2005-04-012006-10-05BaytspMethod and apparatus for detecting email fraud
RU2007142368A (en)2005-04-182009-05-27Дзе Трастиз Оф Коламбия Юниверсити Ин Дзе Сити Оф Нью Йорк (Us) SYSTEMS AND METHODS FOR DETECTING AND SUPPRESSING ATTACKS USING "MEDONOS"
CN1863170A (en)2005-05-102006-11-15光宝科技股份有限公司 Method for dealing with junk e-mails and computer-readable storage medium
KR100651841B1 (en)*2005-07-192006-12-01엘지전자 주식회사 Blocking method
NZ541711A (en)2005-09-282006-10-27Chuan Pei ChenHuman factors authentication using abstract definitions of viewable or audible objects
US8374973B2 (en)2006-02-162013-02-12Microsoft CorporationReputation system
US9152949B2 (en)2006-05-172015-10-06International Business Machines CorporationMethods and apparatus for identifying spam email
US8489689B1 (en)2006-05-312013-07-16Proofpoint, Inc.Apparatus and method for obfuscation detection within a spam filtering model
US7945684B2 (en)2006-06-212011-05-17International Business Machines CorporationSpam risk assessment
US7640030B2 (en)2006-06-292009-12-29Alcatel-Lucent Usa Inc.SMPP message processing for SMS spam filtering
US8141132B2 (en)2006-08-152012-03-20Symantec CorporationDetermining an invalid request
US7783114B2 (en)2006-08-222010-08-24Intel CorporationTraining and using classification components on multiple processing units
US7809795B1 (en)2006-09-262010-10-05Symantec CorporationLinguistic nonsense detection for undesirable message classification
US8577968B2 (en)2006-11-142013-11-05Mcafee, Inc.Method and system for handling unwanted email messages
US9092434B2 (en)2007-01-232015-07-28Symantec CorporationSystems and methods for tagging emails by discussions
US8214497B2 (en)2007-01-242012-07-03Mcafee, Inc.Multi-dimensional reputation scoring
US8763114B2 (en)2007-01-242014-06-24Mcafee, Inc.Detecting image spam
US20100287246A1 (en)2007-02-142010-11-11Thomas KlosSystem for processing electronic mail messages with specially encoded addresses
EP2130322B1 (en)2007-03-212014-06-25Intel CorporationProtection against impersonation attacks
US9137257B2 (en)2007-05-042015-09-15Gary Stephen ShusterAnti-phishing filter
US8667069B1 (en)2007-05-162014-03-04Aol Inc.Filtering incoming mails
US7575157B2 (en)2007-05-222009-08-18Bank Of America CorporationFraud protection
US8073912B2 (en)2007-07-132011-12-06Michael Gregor KaplanSender authentication for difficult to classify email
US20090089859A1 (en)2007-09-282009-04-02Cook Debra LMethod and apparatus for detecting phishing attempts solicited by electronic mail
JP4444998B2 (en)2007-10-122010-03-31富士通株式会社 E-mail information management program, e-mail information management apparatus, and e-mail information management method
US8010614B1 (en)2007-11-012011-08-30Bitdefender IPR Management Ltd.Systems and methods for generating signatures for electronic communication classification
US20090210708A1 (en)2008-02-142009-08-20Higher Challenge, Inc.Systems and Methods for Authenticating and Authorizing a Message Receiver
US20090228583A1 (en)2008-03-072009-09-10Oqo, Inc.Checking electronic messages for compliance with user intent
EP2266269B1 (en)2008-04-022019-01-02Twilio Inc.System and method for processing telephony sessions
US8837465B2 (en)2008-04-022014-09-16Twilio, Inc.System and method for processing telephony sessions
TW200949570A (en)2008-05-232009-12-01Univ Nat Taiwan Science TechMethod for filtering e-mail and mail filtering system thereof
US8131655B1 (en)2008-05-302012-03-06Bitdefender IPR Management Ltd.Spam filtering using feature relevance assignment in neural networks
US20090319629A1 (en)2008-06-232009-12-24De Guerre James AllanSystems and methods for re-evaluatng data
US20100042687A1 (en)2008-08-122010-02-18Yahoo! Inc.System and method for combating phishing
US20100070761A1 (en)2008-09-172010-03-18Alcatel-LucentReliable authentication of message sender's identity
US8321516B2 (en)2008-09-302012-11-27Aol Inc.Systems and methods for creating and updating reputation records
US8364766B2 (en)2008-12-042013-01-29Yahoo! Inc.Spam filtering based on statistics and token frequency modeling
US8285798B2 (en)2009-04-152012-10-09Ecert, Inc.System and method for the management of message policy
US20100313253A1 (en)2009-06-092010-12-09Walter Stanley ReissMethod, system and process for authenticating the sender, source or origin of a desired, authorized or legitimate email or electrinic mail communication
US8473281B2 (en)2009-10-092013-06-25Crisp Thinking Group Ltd.Net moderator
US7917655B1 (en)2009-10-232011-03-29Symantec CorporationMethod and system for employing phone number analysis to detect and prevent spam and e-mail scams
EP2527991B1 (en)2010-01-192018-12-26Fujitsu LimitedAnalysis method, analysis device, and analysis program
US8255572B1 (en)2010-01-222012-08-28Symantec CorporationMethod and system to detect and prevent e-mail scams
US9098459B2 (en)2010-01-292015-08-04Microsoft Technology Licensing, LlcActivity filtering based on trust ratings of network
JP2013529345A (en)2010-05-212013-07-18バウルティブ リミテッド System and method for securely using a messaging system
US8924488B2 (en)2010-07-272014-12-30At&T Intellectual Property I, L.P.Employing report ratios for intelligent mobile messaging classification and anti-spam defense
WO2012043650A1 (en)2010-09-292012-04-05楽天株式会社Display program, display device, information processing method, recording medium, and information processing device
US8607361B2 (en)2010-12-232013-12-10Microsoft CorporationEmail trust service
US8495737B2 (en)2011-03-012013-07-23Zscaler, Inc.Systems and methods for detecting email spam and variants thereof
US10360385B2 (en)2011-03-222019-07-23Microsoft Technology Licensing LlcVisual styles for trust categories of messages
US8752172B1 (en)2011-06-272014-06-10Emc CorporationProcessing email messages based on authenticity analysis
US8875293B2 (en)2011-09-222014-10-28Raytheon CompanySystem, method, and logic for classifying communications
US8646877B2 (en)2011-09-292014-02-11Xerox CorporationPre-treatment methods, apparatus, and systems for contact leveling radiation curable gel inks
US9245115B1 (en)2012-02-132016-01-26ZapFraud, Inc.Determining risk exposure and avoiding fraud using a collection of terms
US9338287B1 (en)2012-10-092016-05-10Whatsapp Inc.Automated verification of a telephone number
US8566938B1 (en)2012-11-052013-10-22Astra Identity, Inc.System and method for electronic message analysis for phishing detection
US9356948B2 (en)2013-02-082016-05-31PhishMe, Inc.Collaborative phishing attack detection
US9253207B2 (en)2013-02-082016-02-02PhishMe, Inc.Collaborative phishing attack detection
US9060057B1 (en)2013-03-072015-06-16Serdar Artun DanisSystems and methods for caller ID authentication, spoof detection and list based call handling
US9332119B1 (en)2013-03-072016-05-03Serdar Artun DanisSystems and methods for call destination authenticaiton and call forwarding detection
US9247427B2 (en)2013-07-292016-01-26Verizon Patent And Licensing Inc.Multi-factor caller identification
US20150067833A1 (en)2013-08-302015-03-05Narasimha ShashidharAutomatic phishing email detection based on natural language processing techniques
JP6209914B2 (en)2013-09-182017-10-11富士通株式会社 Mail creation program, mail creation method, and information processing apparatus
US20160104132A1 (en)2014-10-082016-04-14Facebook, Inc.Performing risk checks for electronic remittances
US10002292B2 (en)2015-09-302018-06-19Microsoft Technology Licensing, LlcOrganizational logo enrichment
US10721195B2 (en)2016-01-262020-07-21ZapFraud, Inc.Detection of business email compromise

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110060802A1 (en)*2000-02-082011-03-10Katsikas Peter LSystem for eliminating unauthorized electronic mail
US20040054742A1 (en)*2002-06-212004-03-18Shimon GruperMethod and system for detecting malicious activity and virus outbreak in email
US20050210106A1 (en)*2003-03-192005-09-22Cunningham Brian DSystem and method for detecting and filtering unsolicited and undesired electronic messages
US20060253597A1 (en)*2005-05-052006-11-09Mujica Technologies Inc.E-mail system
US20080313704A1 (en)*2005-10-212008-12-18Boxsentry Pte Ltd.Electronic Message Authentication
US20090217370A1 (en)*2008-02-272009-08-27Microsoft CorporationSafe file transmission and reputation lookup
US20100250929A1 (en)*2009-03-312010-09-30Telefonaktiebolaget Lm Ericsson (Publ)Method and apparatus for email communication
US20120278887A1 (en)*2011-04-282012-11-01Microsoft CorporationReporting compromised email accounts
US20150067839A1 (en)*2011-07-082015-03-05Brad WardmanSyntactical Fingerprinting
US20130325991A1 (en)*2011-11-092013-12-05Proofpoint, Inc.Filtering Unsolicited Emails
US20130145425A1 (en)*2011-12-062013-06-06At&T Intellectual Property I, L.P.Verification service
US8484741B1 (en)*2012-01-272013-07-09Chapman Technology Group, Inc.Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
US20130305318A1 (en)*2012-05-102013-11-14International Business Machines CorproationCommunications security management
US20150381653A1 (en)*2012-06-072015-12-31Proofpoint, Inc.Malicious message detection and processing
US9154514B1 (en)*2012-11-052015-10-06Astra Identity, Inc.Systems and methods for electronic message analysis
US10027702B1 (en)*2014-06-132018-07-17Trend Micro IncorporatedIdentification of malicious shortened uniform resource locators
US9332022B1 (en)*2014-07-072016-05-03Symantec CorporationSystems and methods for detecting suspicious internet addresses
US9740858B1 (en)*2015-07-142017-08-22Trend Micro IncorporatedSystem and method for identifying forged emails
US20170200015A1 (en)*2016-01-072017-07-13Emmanuel GonzalezSystem and method to reduce inappropriate email and online behavior
US20170206545A1 (en)*2016-01-202017-07-20Zipstorm Inc.Recipient centric messaging system and protocols to implement it over data networks

Also Published As

Publication numberPublication date
US20170230323A1 (en)2017-08-10
US11595336B2 (en)2023-02-28
WO2017132170A1 (en)2017-08-03
US20200336451A1 (en)2020-10-22
US10721195B2 (en)2020-07-21

Similar Documents

PublicationPublication DateTitle
US11595336B2 (en)Detecting of business email compromise
US12261883B2 (en)Detecting phishing attempts
US11102244B1 (en)Automated intelligence gathering
US20240089285A1 (en)Automated responsive message to determine a security risk of a message sender
US10581780B1 (en)Tertiary classification of communications
US11595354B2 (en)Mitigating communication risk by detecting similarity to a trusted message contact
US12316591B2 (en)Multi-level security analysis and intermediate delivery of an electronic message
US12184662B2 (en)Message security assessment using sender identity profiles
US11722513B2 (en)Using a measure of influence of sender in determining a security risk associated with an electronic message
US11044267B2 (en)Using a measure of influence of sender in determining a security risk associated with an electronic message
US10715543B2 (en)Detecting computer security risk based on previously observed communications
US12069021B2 (en)Email sender and reply-to authentication to prevent interception of email replies

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:ZAPFRAUD, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JAKOBSSON, BJORN MARKUS;REEL/FRAME:062437/0678

Effective date:20170228

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION COUNTED, NOT YET MAILED

Free format text:FINAL REJECTION MAILED


[8]ページ先頭

©2009-2025 Movatter.jp