Protected environments for protecting users against undesirable activities
First Claim
1. A computer-implemented method comprising:
- storing, in a memory communicatively coupled to a processor, computer-executable instructions for performing a method of protecting users against undesirable activities;
executing the instructions on the processor;
according to the instructions being executed;
identifying an email message that is suspected of being associated with one or more undesirable activities, the identifying comprising;
receiving input from a remote filter having an updated list of uniform resource locators (URLs) known to be associated with phishing; and
action by a local filter acting on a list of message characteristics deemed suspicious with respect to a device upon which the processor operates;
providing indicia in a user interface that the email message is suspected of being associated with one or more undesirable activities, the user interface comprising a delete button, to delete the email message, and an unlock button, to allow a user full access to the email message, the providing of the indicia being performed by an email application, the email application, upon identifying the email message that is suspected of being associated with one or more undesirable activities, notifies a browser application of the email message and notifies the browser application that the email message is deemed suspicious, the email application and browser application both operated on a computer operated by the user; and
presenting the email message in a visually-distinctive protected environment, the protected environment allowing the email message to be scrutinized in full fidelity and prevents user activities with respect to the email message that can expose a user to the one or more undesirable activities, wherein said protected environment comprises a transparent window which encases the email message shown in a message list and preview window pane behind a watermark which contributes to an appearance of a shrink-wrap covering, the appearance of the shrink-wrap covering created by watermarks, textures, gradients and lighting effects to simulate a tactile aspect of the shrink-wrap covering.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments protect against undesirable activities, in at least some embodiments, by combining the protection of a data or message filter with the user'"'"'s own knowledge and judgment. In at least some embodiments, data or a message that is suspected of being associated with an undesirable activity is identified and indicia is provided to a user that the message is suspect. The data or message is presented to the user in a protected environment that allows the user to access the data or message in full fidelity, but prevents them from interacting with the data or message in a manner which would expose them to the undesirable activity. After reviewing the data or message in the protected environment, the user can decide how the message should thereafter be treated.
-
Citations
16 Claims
-
1. A computer-implemented method comprising:
-
storing, in a memory communicatively coupled to a processor, computer-executable instructions for performing a method of protecting users against undesirable activities; executing the instructions on the processor; according to the instructions being executed; identifying an email message that is suspected of being associated with one or more undesirable activities, the identifying comprising; receiving input from a remote filter having an updated list of uniform resource locators (URLs) known to be associated with phishing; and action by a local filter acting on a list of message characteristics deemed suspicious with respect to a device upon which the processor operates; providing indicia in a user interface that the email message is suspected of being associated with one or more undesirable activities, the user interface comprising a delete button, to delete the email message, and an unlock button, to allow a user full access to the email message, the providing of the indicia being performed by an email application, the email application, upon identifying the email message that is suspected of being associated with one or more undesirable activities, notifies a browser application of the email message and notifies the browser application that the email message is deemed suspicious, the email application and browser application both operated on a computer operated by the user; and presenting the email message in a visually-distinctive protected environment, the protected environment allowing the email message to be scrutinized in full fidelity and prevents user activities with respect to the email message that can expose a user to the one or more undesirable activities, wherein said protected environment comprises a transparent window which encases the email message shown in a message list and preview window pane behind a watermark which contributes to an appearance of a shrink-wrap covering, the appearance of the shrink-wrap covering created by watermarks, textures, gradients and lighting effects to simulate a tactile aspect of the shrink-wrap covering. - View Dependent Claims (2, 3, 4)
-
-
5. A computer-implemented method comprising:
-
storing, in a memory communicatively coupled to a processor, computer-executable instructions for performing a method of protecting users against undesirable activities; executing the instructions on the processor; according to the instructions being executed; determining whether an email message is suspected of being associated with one or more undesirable activities, the determining being performed by an email application, the email application, upon identifying the email message that is suspected of being associated with one or more undesirable activities, notifying a browser application of the email message and notifies the browser application that the email message is deemed suspicious, the email application and browser application both operated on a computer operated by a user, and the determining comprising; receiving input from a remote filter having an updated list of uniform resource locators (URLs) known to be associated with phishing, the updated list adapted for testing for similarity to a suspicious message and testing for receipt from a source suspected of phishing and testing for a number of recipients of the email message; and action by a local filter acting on a list of message characteristics deemed suspicious with respect to a device upon which the processor operates; and encasing the email message, if suspected of being associated with one or more undesirable activities, in a transparent protective window that allows the email message to be scrutinized in full fidelity but prevents the user from engaging in activities with respect to the email message that can expose the user to the one or more undesirable activities, wherein a delete button, to delete the email message, and an unlock button, to allow a user full access to the email message, are defined within the transparent protective window, and wherein the transparent protective window encases the email message shown in a message list and preview window pane behind a watermark which contributes to an appearance of a shrink-wrap coating, the appearance of the shrink-wrap coating created by watermarks, textures, gradients and lighting effects to simulate a tactile aspect of the shrink-wrap coating. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
one or more computer-readable media; and an executable email application that resides on the one or more computer-readable media and which is configured to receive email messages, process the email messages to identify suspicious email messages and provide a user interface that encases any suspicious email messages in a transparent, visually distinctive wrap that can allow a user to read content of any wrapped email messages, but which prevents the user from directly interacting with content of any wrapped email messages until the user specifically chooses to remove the transparent, visually distinctive wrap, the identifying suspicious email messages comprising; receiving input from a remote filter having an updated list of uniform resource locators (URLs) known to be associated with phishing; and action by a local filter acting on a list of message characteristics deemed suspicious with respect to a device upon which a processor operates; the user interface comprising a delete button, to delete a suspicious email message, and an unlock button, to allow the user full access to the suspicious email message; and the email application, upon identifying the email message that is suspected of being associated with one or more undesirable activities, notifying a browser application within the system of the email message and notifying the browser application that the email message is deemed suspicious, the email application and browser application both operated on a computer operated by the user, wherein the transparent, visually distinctive wrap encases the suspicious email message shown in a message list and preview window pane behind a watermark which contributes to an appearance of a shrink-wrap covering, the appearance of the shrink-wrap covering created by watermarks, textures, gradients and lighting effects to simulate a tactile aspect of the shrink-wrap covering. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification