Identity theft countermeasures
First Claim
Patent Images
1. A non-transitory computer-readable medium storing instructions that, when executed by a processor of a computing device, causes the computing device to perform operations comprising:
- receiving an electronic message that includes a link corresponding to a source address for a document that is to be presented on a display of the computing device;
determining whether the document is trustworthy based on the source address;
if the document is determined to be trustworthy, processing the document in a first mode by retrieving the document from the source address and presenting the document on the display of the computing device, and retrieving and presenting any subsequent documents selected from the document without determining whether the subsequent documents are trustworthy; and
if the document is determined to be untrustworthy, processing the document in a second mode that is different than the first mode, and processing any subsequent documents selected from the document in the second mode.
1 Assignment
0 Petitions
Accused Products
Abstract
In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing.
44 Citations
18 Claims
-
1. A non-transitory computer-readable medium storing instructions that, when executed by a processor of a computing device, causes the computing device to perform operations comprising:
-
receiving an electronic message that includes a link corresponding to a source address for a document that is to be presented on a display of the computing device; determining whether the document is trustworthy based on the source address; if the document is determined to be trustworthy, processing the document in a first mode by retrieving the document from the source address and presenting the document on the display of the computing device, and retrieving and presenting any subsequent documents selected from the document without determining whether the subsequent documents are trustworthy; and if the document is determined to be untrustworthy, processing the document in a second mode that is different than the first mode, and processing any subsequent documents selected from the document in the second mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device comprising:
-
a display device; a memory resource storing instructions; and a processor coupled to the display device and the memory resource, the processor executing the instructions to cause the computing device to perform operations comprising; receiving an electronic message that includes a link corresponding to a source address for a document that is to be presented on the display device; determining whether the document is trustworthy based on the source address; if the document is determined to be trustworthy, processing the document in a first mode by retrieving the document from the source address and presenting the document on the display device, and retrieving and presenting any subsequent documents selected from the document without determining whether the subsequent documents are trustworthy; and if the document is determined to be untrustworthy, processing the document in a second mode that is different than the first mode, and processing any subsequent documents selected from the document in the second mode. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification