×

Detecting phishing attempts

DC
  • US 10,277,628 B1
  • Filed: 09/16/2014
  • Issued: 04/30/2019
  • Est. Priority Date: 09/16/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. A classification system for detecting attempted deception in an electronic communication, comprising:

  • a client device used to access the electronic communication addressed to a user of the client device;

    at least one of a profile and content database; and

    at least one server in communication with the client device and the at least one of the profile and content database, the at least one server comprising;

    an interface configured to receive the electronic communication; and

    a set of one or more processors configured to;

    parse a display name associated with the electronic communication;

    determine, by at least one classifier component, that the electronic communication appears to have been transmitted on behalf of an authoritative entity by;

    computing a similarity distance between the display name and at least a name of the authoritative entity, wherein the name of the authoritative entity is retrieved from the at least one of the profile and the content database, wherein the similarity distance is computed by comparison of items by at least one of;



    basing the comparison on at least one of a match between the display name of the electronic communication and the display name of the authoritative entity, and 

    a match between headers associated with the electronic communication and headers associated with the authoritative entity, 

    wherein the matches are determined by at least one of;



    determining that the compared items are the same, determining that the compared items have a Hamming distance below a threshold value, determining that the compared items have an edit distance below a threshold value, determining that a support vector machine indicates a similarity based on previously trained examples, determining a similarity score based on how many characters were replaced by characters of sufficient similarity and performing at least one normalization followed by a comparison;

    determine, by the at least one classifier component, that the electronic communication was not transmitted with authorization from the authoritative entity;

    based at least in part on determining that the electronic communication appears to have been transmitted on behalf of the authoritative entity and determining that the electronic communication was not transmitted with authorization from the authoritative entity, perform a security determination including classifying the electronic communication, wherein the classifying includes two or more security classifications including good and bad; and

    based at least in part on the security determination resulting in a bad classification, perform an action comprising at least one of erasing the electronic communication, marking up the electronic communication at least in part by adding a warning or an explanation, flagging the electronic communication, forwarding the electronic communication to a third party, placing the electronic communications in the spam folder, and forwarding the electronic communication to a repository; and

    a memory coupled to the processor and configured to provide the processor with instructions.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×