SYSTEM FOR DETECTING AUTHENTIC E-MAIL MESSAGES
First Claim
1. A computer program, embodied on a computer readable storage medium, for assisting a user to determine whether an email comes from a purported originator, the computer program comprising:
- a code segment that determines with a computerized system whether the email includes an authenticity mark including an originator identifier and encrypted data;
a code segment that decrypts said encrypted data based on said originator identifier, into decrypted data;
a code segment that presents to the user on a display unit;
whether the email includes said authenticity mark;
whether said encrypted data decrypts successfully; and
information based on said authenticity mark and said decrypted data.
5 Assignments
0 Petitions
Accused Products
Abstract
A system (50, 150) for assisting a user (14) to determine whether an email (18) comes from a purported originator (16). A computerized system having a display unit is provided. Logic (54) in the computerized system determines whether the email (18) includes an authenticity mark (52) including an originator identifier (102) and encrypted data (104). Logic (54) in the computerized system then decrypts the encrypted data (104) into decrypted data (108-14), based on the originator identifier (102). Logic (54) in the computerized system then presents to the user (14), on the display, whether the email (18) includes the authenticity mark (52), whether the encrypted data (104) decrypts successfully, and information based on the authenticity mark (52) and the decrypted data (108-14).
82 Citations
34 Claims
-
1. A computer program, embodied on a computer readable storage medium, for assisting a user to determine whether an email comes from a purported originator, the computer program comprising:
-
a code segment that determines with a computerized system whether the email includes an authenticity mark including an originator identifier and encrypted data;
a code segment that decrypts said encrypted data based on said originator identifier, into decrypted data;
a code segment that presents to the user on a display unit;
whether the email includes said authenticity mark;
whether said encrypted data decrypts successfully; and
information based on said authenticity mark and said decrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for assisting a user to determine whether an email comes from a purported originator, the system comprising:
-
a computerized system having a display unit;
a logic in said computerized system that determines whether the email includes an authenticity mark including an originator identifier and encrypted data;
a logic in said computerized system that decrypts said encrypted data based on said originator identifier, into decrypted data;
a logic in said computerized system that that presents to the user, on said display;
whether the email includes said authenticity mark;
whether said encrypted data decrypts successfully; and
information based on said authenticity mark and said decrypted data. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for assisting a user to determine whether an email comes from a purported originator, the method comprising:
-
determining whether the email includes an authenticity mark including an originator identifier and encrypted data;
decrypting said encrypted data based on said originator identifier, into decrypted data;
presenting to the user;
whether the email includes said authenticity mark;
whether said encrypted data decrypts successfully; and
information based on said authenticity mark and said decrypted data. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
Specification