SIGNED MESSAGE HEADER STORING SENDER ACCOUNT AUTHENTICATION METHOD
First Claim
1. A system, comprising:
- a delivering email system configured to;
receive a request from a sender to send an email to a recipient;
identify an authentication method of a sender account for the email;
modify one or more email headers of the email to include an indication of the authentication method;
generate one or more digital signatures for the email that include the one or more email headers within a scope of the one or more digital signatures;
modify the email such that an email header of the email includes the one or more digital signatures; and
transmit the email, including the indication of the authentication method and the one or more digital signatures, to the recipient at a receiving email system; and
the receiving email system configured to;
receive the email having the one or more email headers indicating the authentication method of a sender account of the email and the one or more digital signatures of the one or more email headers;
determine that the one or more email headers are unaltered by validating the one or more digital signatures against a public key of the sender domain of the email;
determine whether the authentication method indicated in the one or more email headers meets a criteria; and
execute, in response to the authentication method failing the criteria, a security response against the email.
1 Assignment
0 Petitions
Accused Products
Abstract
A delivering email system is configured to receive a request to send an email to a recipient, identify an authentication method of a sender account for the email, modify email headers of the email to include an indication of the authentication method, generate digital signatures for the email that include the email headers within a scope of the digital signatures, modify the email such that an email header of the email includes the digital signatures, and transmit the email, including the indication of the authentication method and the digital signatures, to the recipient at a receiving email system. The receiving email system is configured to receive the email, determine that the email headers are unaltered by validating the digital signatures against a public key of the sender domain, determine whether the authentication method indicated meets a criteria, and execute a security response against the email if not.
-
Citations
20 Claims
-
1. A system, comprising:
-
a delivering email system configured to; receive a request from a sender to send an email to a recipient; identify an authentication method of a sender account for the email; modify one or more email headers of the email to include an indication of the authentication method; generate one or more digital signatures for the email that include the one or more email headers within a scope of the one or more digital signatures; modify the email such that an email header of the email includes the one or more digital signatures; and transmit the email, including the indication of the authentication method and the one or more digital signatures, to the recipient at a receiving email system; and the receiving email system configured to; receive the email having the one or more email headers indicating the authentication method of a sender account of the email and the one or more digital signatures of the one or more email headers; determine that the one or more email headers are unaltered by validating the one or more digital signatures against a public key of the sender domain of the email; determine whether the authentication method indicated in the one or more email headers meets a criteria; and execute, in response to the authentication method failing the criteria, a security response against the email. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer implemented method, comprising:
-
receiving a request from a sender to send an email to a recipient; identifying an authentication method of a sender account for the email; modifying one or more email headers of the email to include an indication of the authentication method; generating one or more digital signatures for the email that includes the one or more email headers within a scope of the one or more digital signatures; modifying the email such that an email header of the email includes the one or more digital signatures; and transmitting the email, including the indication of the authentication method and the one or more digital signatures, to the recipient. - View Dependent Claims (15)
-
-
16. A computer implemented method, comprising:
-
receiving an email having one or more email headers indicating an authentication method of a sender account of the email and one or more digital signatures of the one or more email headers; determining that the one or more email headers are unaltered by validating the one or more digital signatures against a public key of the sender domain of the email; determining whether the authentication method indicated in the one or more email headers meets a criteria; and executing, in response to the authentication method failing the criteria, a security response against the email. - View Dependent Claims (17)
-
-
18. A non-transitory computer readable storage medium, comprising instructions, that when executed by a processor, cause the processor to perform the operations of:
-
receiving a request from a sender to send an email to a recipient; identifying an authentication method of a sender account for the email; modifying one or more email headers of the email to include an indication of the authentication method; generating one or more digital signatures for the email that include one or more email headers within a scope of the one or more digital signatures; modifying the email such that an email header of the email includes the one or more digital signatures; and transmitting the email, including the indication of the authentication method and the one or more digital signatures, to the recipient. - View Dependent Claims (19)
-
-
20. A non-transitory computer readable storage medium, comprising instructions, that when executed by a processor, cause the processor to perform the operations of:
-
receiving an email having one or more email headers indicating an authentication method of a sender account of the email and one or more digital signatures of the one or more email headers; determining that the one or more email headers are unaltered by validating the one or more digital signatures against a public key of the sender domain of the email; determining whether the authentication method indicated in the one or more email headers meets a criteria; and executing, in response to the authentication method failing the criteria, a security response against the email.
-
Specification