Message sender authenticity validation
First Claim
1. An apparatus comprising:
- a network interface; and
one or more logic elements, including at least a processor and a memory, comprising a validation server engine operable for multi-phase validation, comprising;
receiving an unverified message via the network interface;
parsing header data of the message;
analyzing the header data in relation to a content of the message; and
assigning the message a phase 1 credibility score based at least in part on the analyzing the header data; and
working cooperatively with end-user input to validate the unverified message; and
wherein the validation server engine is further operable for;
analyzing a publically-available database via the network interface;
comparing the publically-available database to the content of the message; and
assigning the message a phase 2 credibility score based at least in part on the comparing.
10 Assignments
0 Petitions
Accused Products
Abstract
In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet posting, or other electronic message. An authenticity server engine may first prescreen the message with anti-spam, anti-malware, and other filters. The screened message is then provided to the end user. If the end user deems the message suspicious, he may request additional validation. The authenticity server engine may then apply an example four-phase validation scheme, including analyzing header data for consistency with the message body, analyzing public data sources, analyzing private data sources, and receiving a result of an off-channel challenge to the sender. The server may then assign the message a sender validity confidence score.
15 Citations
20 Claims
-
1. An apparatus comprising:
-
a network interface; and one or more logic elements, including at least a processor and a memory, comprising a validation server engine operable for multi-phase validation, comprising; receiving an unverified message via the network interface; parsing header data of the message; analyzing the header data in relation to a content of the message; and assigning the message a phase 1 credibility score based at least in part on the analyzing the header data; and working cooperatively with end-user input to validate the unverified message; and wherein the validation server engine is further operable for; analyzing a publically-available database via the network interface; comparing the publically-available database to the content of the message; and assigning the message a phase 2 credibility score based at least in part on the comparing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. One or more tangible, non-transitory computer-readable mediums having stored thereon executable instructions operable for providing a validation server engine operable for providing a multi-phase authentication, comprising:
-
receiving an unverified message via a network interface; parsing header data of the message; analyzing the header data in relation to a content of the message; assigning the message a phase 1 credibility score based at least in part on the analyzing the header data; and working cooperatively with end-user input to validate the unverified message; and wherein the validation server engine is further operable for; analyzing a publically-available database via the network interface; comparing the publically-available database to the content of the message; and assigning the message a phase 2 credibility score based at least in part on the comparing. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for providing multi-phase validation on a computing apparatus, comprising:
-
receiving an unverified message via a network interface; parsing header data of the message; analyzing the header data in relation to a content of the message; assigning the message a phase 1 credibility score based at least in part on the analyzing the header data; working cooperatively with end-user input to validate the unverified message; analyzing a publically-available database via the network interface; comparing the publically-available database to the content of the message; and assigning the message a phase 2 credibility score based at least in part on the comparing.
-
Specification