TECHNIQUES TO VERIFY MESSAGE AUTHENTICITY
First Claim
1. A computer-implemented method executed by one or more computers, the method comprising:
- receiving, by the one or more computers and from a user computing device, a verification request to verify authenticity of a first message received by the user computing device, the verification request including a first user identifier and verification information;
obtaining, by the one or more computers, a delivery message record that includes a plurality of entries associated with one or more messages sent to one or more user computing devices, each entry of the plurality of entries including a user identifier and feature information of a respective message of the one or more messages; and
identifying, by the one or more computers, at least one entry of the plurality of entries that has a second user identifier that matches the first user identifier, and in response;
determining, by the one or more computers, that the feature information of the identified at least one entry matches the verification information from the verification request, andin response to determining that the feature information matches the verification information, providing a verification message to the user computing device, the verification message indicating that authenticity of the first message is verified.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for verifying message authenticity is provided. In some implementations, a verification request to verify authenticity of a first message is received from a user computing device. The verification request includes a first user identifier and verification information. A delivery message record is obtained. The delivery message record includes a plurality of entries associated with one or more messages sent to one or more user computing devices. Each entry includes a user identifier and feature information of a respective message of the one or more messages. At least one entry that has a second user identifier matching the first user identifier is identified. In response to determining that the feature information of the identified at least one entry matches the verification information from the verification request, a verification message is provided to the user computing device. The verification message indicates that authenticity of the first message is verified.
9 Citations
20 Claims
-
1. A computer-implemented method executed by one or more computers, the method comprising:
-
receiving, by the one or more computers and from a user computing device, a verification request to verify authenticity of a first message received by the user computing device, the verification request including a first user identifier and verification information; obtaining, by the one or more computers, a delivery message record that includes a plurality of entries associated with one or more messages sent to one or more user computing devices, each entry of the plurality of entries including a user identifier and feature information of a respective message of the one or more messages; and identifying, by the one or more computers, at least one entry of the plurality of entries that has a second user identifier that matches the first user identifier, and in response; determining, by the one or more computers, that the feature information of the identified at least one entry matches the verification information from the verification request, and in response to determining that the feature information matches the verification information, providing a verification message to the user computing device, the verification message indicating that authenticity of the first message is verified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
receiving, from a user computing device, a verification request to verify authenticity of a first message received by the user computing device, the verification request including a first user identifier and verification information; obtaining a delivery message record that includes a plurality of entries associated with one or more messages sent to one or more user computing devices, each entry of the plurality of entries including a user identifier and feature information of a respective message of the one or more messages; and identifying at least one entry of the plurality of entries that has a second user identifier that matches the first user identifier, and in response; determining that the feature information of the identified at least one entry matches the verification information from the verification request, and in response to determining that the feature information matches the verification information, providing a verification message to the user computing device, the verification message indicating that authenticity of the first message is verified. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented system, comprising:
-
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising; receiving, from a user computing device, a verification request to verify authenticity of a first message received by the user computing device, the verification request including a first user identifier and verification information; obtaining a delivery message record that includes a plurality of entries associated with one or more messages sent to one or more user computing devices, each entry of the plurality of entries including a user identifier and feature information of a respective message of the one or more messages; and identifying at least one entry of the plurality of entries that has a second user identifier that matches the first user identifier, and in response; determining that the feature information of the identified at least one entry matches the verification information from the verification request, and in response to determining that the feature information matches the verification information, providing a verification message to the user computing device, the verification message indicating that authenticity of the first message is verified. - View Dependent Claims (18, 19, 20)
-
Specification