Advanced processing of electronic messages with attachments in a cybersecurity system
First Claim
1. A system for managing computer security risks associated with message file attachments in a cybersecurity network, the system comprising:
- a client computing device comprising;
a processing device,a messaging client, anda computer-readable medium portion storing programming instructions that are configured to cause the client computing device to;
receive an electronic message that includes an attachment; and
prevent the attachment from actuating on the client computing device until the system determines whether the received message is a legitimate message or a potentially malicious message; and
a computer-readable medium portion storing programming instructions that are configured to cause the client computing device or a remote computing device to;
determine whether the received message is a legitimate message or a potentially malicious message without analyzing the attachment,if the determining determines that the received message is a legitimate message, permit the attachment to actuate on the client computing device, andif the determining determines that the received message is not or may not be a legitimate message, continue preventing the attachment from actuating on the client computing device.
5 Assignments
0 Petitions
Accused Products
Abstract
A system manages computer security risks associated with message file attachments. When a user of an electronic device with a messaging client attempts to open an attachment to a message that is in the client'"'"'s inbox, the system will analyze the message to determine whether the message is a legitimate message or a potentially malicious message without the need to actually process or analyze the attachment itself. If the system determines that the received message is a legitimate message, the system will permit the attachment to actuate on the client computing device. If the system determines that the received message is not or may not be a legitimate message, the system will continue preventing the attachment from actuating on the client computing device.
79 Citations
22 Claims
-
1. A system for managing computer security risks associated with message file attachments in a cybersecurity network, the system comprising:
-
a client computing device comprising; a processing device, a messaging client, and a computer-readable medium portion storing programming instructions that are configured to cause the client computing device to; receive an electronic message that includes an attachment; and prevent the attachment from actuating on the client computing device until the system determines whether the received message is a legitimate message or a potentially malicious message; and a computer-readable medium portion storing programming instructions that are configured to cause the client computing device or a remote computing device to; determine whether the received message is a legitimate message or a potentially malicious message without analyzing the attachment, if the determining determines that the received message is a legitimate message, permit the attachment to actuate on the client computing device, and if the determining determines that the received message is not or may not be a legitimate message, continue preventing the attachment from actuating on the client computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of managing computer security risks associated with message file attachments in a cybersecurity network, the method comprising:
by a client computing device comprising a processing device, executing programming instructions configured to cause the client computing device to; receive, by a messaging client application of the client computing device, an electronic message that includes an attachment, prevent the attachment from actuating until the client computing device determines whether the received message is a legitimate message or a potentially malicious message, without analyzing the attachment, determine whether the received message is a legitimate message or a potentially malicious message, if the determining determines that the received message is a legitimate message, permit the attachment to actuate on the client computing device, and if the determining determines that the received message is not or may not be a legitimate message, continue to prevent the attachment from actuating on the client computing device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
Specification