DETERMINING EMAIL AUTHENTICITY
First Claim
Patent Images
1. A method comprising:
- monitoring service access by a user to a plurality of internet-based services;
storing a service access dataset for the user;
receiving an email dataset from an email service that includes a uniform resource locator (URL); and
determining a correlation between the email dataset and the service access dataset.
1 Assignment
0 Petitions
Accused Products
Abstract
Monitoring across multiple-channels, used by multiple devices, to determine which email messages being sent to a user are solicited by the user. A broad spectrum of network and telephony access records are analyzed to determine whether an email message is likely being sent as a result of legitimate services access by the user.
33 Citations
20 Claims
-
1. A method comprising:
-
monitoring service access by a user to a plurality of internet-based services; storing a service access dataset for the user; receiving an email dataset from an email service that includes a uniform resource locator (URL); and determining a correlation between the email dataset and the service access dataset. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising a computer readable storage medium having stored thereon:
-
first program instructions programmed to monitor service access by a user to a plurality of internet-based services; second program instructions programmed to store a service access dataset for the user; third program instructions programmed to receive an email dataset from an email service that includes a uniform resource locator (URL); and fourth program instructions programmed to determine a correlation between the email dataset and the service access dataset. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system comprising:
-
a processor(s) set; and a computer readable storage medium; wherein; the processor set is structured, located, connected, and/or programmed to run program instructions stored on the computer readable storage medium; and the program instructions include; first program instructions programmed to monitor service access by a user to a plurality of internet-based services; second program instructions programmed to store a service access dataset for the user; third program instructions programmed to receive an email dataset from an email service that includes a uniform resource locator (URL); and fourth program instructions programmed to determine a correlation between the email dataset and the service access dataset. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification