IDENTITY THEFT COUNTERMEASURES
0 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing.
112 Citations
21 Claims
-
1. (canceled)
-
2. A non-transitory computer-readable medium storing instructions that, when executed by a processor of a computing device, causes the computing device to perform operations comprising:
-
determining an address for a document that is to be presented on a display of the computing device; determining whether the document is trustworthy based on the address; if the document is determined to be trustworthy, processing the document in a first mode; and if the document is determined to be untrustworthy, processing the document in a second mode that is different than the first mode. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computing device comprising:
-
a display device; a memory resource storing instructions; and a processor coupled to the display device and the memory resource, the processor executing the instructions to cause the computing device to perform operations comprising; determining an address for a document that is to be presented on the display device; determining whether the document is trustworthy based on the address; if the document is determined to be trustworthy, processing the document in a first mode; and if the document is determined to be untrustworthy, processing the document in a second mode that is different than the first mode. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification