×

Method and system for phishing detection

  • US 7,668,921 B2
  • Filed: 05/30/2006
  • Issued: 02/23/2010
  • Est. Priority Date: 05/30/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for detection of phishing attempts in received electronic mail messages in a networked environment including a plurality of personal computers, and electronic mail server, the method comprising:

  • receiving an incoming electronic mail message, wherein said electronic mail message includes an address;

    retrieving the source code of said incoming message;

    retrieving text as displayed to the recipient of said electronic message;

    retrieving a list of all specified addresses from said retrieved source code;

    applying visual character normalization to each said specified address to develop all possible address combinations and to form a normalized address list, said visual character normalization comprises the steps of;

    extracting the address core from said incoming address;

    replacing any character within said address core by its visual homonym,wherein said visual homonym includes a homographic character that comprises another character, to form a list of possible address cores;

    performing additional character normalization operations on each of said possible address cores, wherein said additional character normalization operations include at least one member selected from the group consisting of duplicate character normalization, reduced character normalization, plural character normalization, and punctuation character normalization;

    forming lists of new address cores for each of said character normalization operations performed;

    merging said lists of new address cores and said possible address cores and removing duplicate address cores from said merged list to create a composite address core list;

    recombining said composite address core list with the prefixes and suffixes appearing in said incoming electronic mail address to form a recombined list of addresses;

    replacing the suffix of each said recombined address with all other possible suffixes to form a suffix list; and

    merging said suffix list and said recombined list to form said normalized address list;

    removing said specified addresses from said normalized address list to create a revised address list;

    performing at least one comparison test to determine if each address in said revised address list is a valid address;

    returning a message to said recipient that said electronic message may be a forgery if a tested address is found to be not valid;

    performing said comparison tests on another address in said revised address list if said tested address is found to be valid; and

    informing said recipient that said electronic message is valid and accepted if said tested address is found to be valid.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×