Protected Environments for Protecting Users Against Undesirable Activities
First Claim
1. A computer-implemented method comprising:
- identifying data that is suspected of being associated with one or more undesirable activities;
providing indicia in a user interface that the data is suspected of being associated with one or more undesirable activities; and
presenting the data in a visually-distinctive protected environment wherein the protected environment allows the data to be scrutinized in full fidelity and prevents user activities with respect to the data that can expose a user to the one or more undesirable activities.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments protect against undesirable activities, in at least some embodiments, by combining the protection of a data or message filter with the user'"'"'s own knowledge and judgment. In at least some embodiments, data or a message that is suspected of being associated with an undesirable activity is identified and indicia is provided to a user that the message is suspect. The data or message is presented to the user in a protected environment that allows the user to access the data or message in full fidelity, but prevents them from interacting with the data or message in a manner which would expose them to the undesirable activity. After reviewing the data or message in the protected environment, the user can decide how the message should thereafter be treated.
118 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
identifying data that is suspected of being associated with one or more undesirable activities; providing indicia in a user interface that the data is suspected of being associated with one or more undesirable activities; and presenting the data in a visually-distinctive protected environment wherein the protected environment allows the data to be scrutinized in full fidelity and prevents user activities with respect to the data that can expose a user to the one or more undesirable activities. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method comprising:
-
determining whether an email message is suspected of being associated with an undesirable activity; and encasing the email message in a transparent protective window that allows the email message to be scrutinized in full fidelity but prevents a user from engaging in activities with respect to the message that can expose the user to the one or more undesirable activities. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
one or more computer-readable media; and an email application that resides on the one or more computer-readable media and which is configured to receive email messages, process the messages to identify suspicious messages and encase any suspicious messages in a transparent, visually distinctive wrap that can allow a user to read the content of any wrapped messages, but which prevents the user from directly interacting with content of any wrapped messages until the user specifically chooses to remove the distinctive wrap. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification