Electronic mail sender verification
First Claim
1. A method for verifying a purported sender of an e-mail message, the method comprising:
- retrieving an encryption key associated with a device from which the e-mail message originated;
attempting decryption of one or more components of the e-mail message using the encryption key;
determining that the decryption fails;
in response to determining that the decryption fails, disarming but not deleting the e-mail message to form a disarmed e-mail message;
delivering the disarmed e-mail message in place of the e-mail message;
parsing a transaction identifier from the e-mail message, wherein the transaction identifier identifies a mail submission transaction by which the e-mail message was submitted; and
comparing the transaction identifier to one or more previously stored transaction identifiers associated with the purported sender of the e-mail.
4 Assignments
0 Petitions
Accused Products
Abstract
An e-mail server decrypts attachments of an e-mail message with a key associated with a sending device such that failure of the decryption indicates the e-mail message can be harmful. The sending device inserts its device identifier into the e-mail message as a header and uses an encryption key associated with the device identifier and a digital fingerprint of the sending device to encrypt all attachments of the e-mail message. The delivering e-mail server processes the e-mail message. If the e-mail message contains no identifier, if no key is associated with the parsed identifier, or if attempted encryption fails, the e-mail server determines that the e-mail message is potentially harmful and disarms the e-mail message.
43 Citations
12 Claims
-
1. A method for verifying a purported sender of an e-mail message, the method comprising:
-
retrieving an encryption key associated with a device from which the e-mail message originated; attempting decryption of one or more components of the e-mail message using the encryption key; determining that the decryption fails; in response to determining that the decryption fails, disarming but not deleting the e-mail message to form a disarmed e-mail message; delivering the disarmed e-mail message in place of the e-mail message; parsing a transaction identifier from the e-mail message, wherein the transaction identifier identifies a mail submission transaction by which the e-mail message was submitted; and comparing the transaction identifier to one or more previously stored transaction identifiers associated with the purported sender of the e-mail. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory tangible computer readable medium useful in association with a computer that includes one or more processors and a memory, the non-transitory computer readable medium including computer instructions that are configured to cause the computer, by execution of the computer instructions in the one or more processors from the memory, to verify a purported sender of an e-mail message by at least:
-
retrieving an encryption key associated with a device from which the e-mail message originated; attempting decryption of one or more components of the e-mail message using the encryption key; determining that the decryption fails; in response to determining that the decryption fails, disarming but not deleting the e-mail message to form a disarmed e-mail message; delivering the disarmed e-mail message in place of the e-mail message; parsing a transaction identifier from the e-mail message, wherein the transaction identifier identifies a mail submission transaction by which the e-mail message was submitted; and comparing the transaction identifier to one or more previously stored transaction identifiers associated with the purported sender of the e-mail. - View Dependent Claims (6, 7, 8)
-
-
9. A computer system comprising:
-
at least one processor; a computer readable medium that is operatively coupled to the processor; network access circuitry that is operatively coupled to the processor; and sender verification logic (i) that executes at least in part in the processor from the computer readable medium and (ii) that, when executed, causes the processor to verify a purported sender of an e-mail message by at least; retrieving an encryption key associated with a device from which the e-mail message originated; attempting decryption of one or more components of the e-mail message using the encryption key; determining that the decryption fails; in response to determining that the decryption fails, disarming but not deleting the e-mail message to form a disarmed e-mail message; delivering the disarmed e-mail message in place of the e-mail message; parsing a transaction identifier from the e-mail message, wherein the transaction identifier identifies a mail submission transaction by which the e-mail message was submitted; and comparing the transaction identifier to one or more previously stored transaction identifiers associated with the purported sender of the e-mail. - View Dependent Claims (10, 11, 12)
-
Specification