Automatic detection of hidden link mismatches with spoofed metadata
First Claim
Patent Images
1. A computer system comprising:
- a processor;
a memory device coupled to the processor and holding an instruction set executable on the processor to cause the computer system to perform operations comprising;
detecting, by an alert manager application, receipt of a message that includes an access request control, the access request control being operable by a recipient of the message to access a resource network address of an external network resource, the message further including message data indicative of a source network address of a source of the message;
predicting, by the alert manager application, a time range during which the recipient of the message is likely to operate the access request control that is included in the message;
generating, by the alert manager application, a visual message alert feature based on a comparison of a threshold degree of difference to a measured degree of difference between the resource network address of the external network resource and the source network address of the source of the message; and
automatically causing, by the alert manager application, the visual message alert feature to be presented on a display of the computer system during the predicted time range during which the recipient is likely to operate the access request control that is included in the message.
2 Assignments
0 Petitions
Accused Products
Abstract
Example methods and systems directed to an Alert Manager are described. According to various embodiments, the Alert Manager detects receipt of a message. The message includes a selectable functionality for accessing an external resource and message data indicative of a source of the message. The Alert Manager predicts when a recipient of the message will interact with the selectable functionality. Prior to the recipient'"'"'s predicted interaction with the selectable functionality, the Alert Manager generates a message alert feature based on a degree of a difference between the external resource and the source of the message.
19 Citations
20 Claims
-
1. A computer system comprising:
-
a processor; a memory device coupled to the processor and holding an instruction set executable on the processor to cause the computer system to perform operations comprising; detecting, by an alert manager application, receipt of a message that includes an access request control, the access request control being operable by a recipient of the message to access a resource network address of an external network resource, the message further including message data indicative of a source network address of a source of the message; predicting, by the alert manager application, a time range during which the recipient of the message is likely to operate the access request control that is included in the message; generating, by the alert manager application, a visual message alert feature based on a comparison of a threshold degree of difference to a measured degree of difference between the resource network address of the external network resource and the source network address of the source of the message; and automatically causing, by the alert manager application, the visual message alert feature to be presented on a display of the computer system during the predicted time range during which the recipient is likely to operate the access request control that is included in the message. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method, comprising:
-
detecting, by one or more processors of a machine, receipt of a message that includes an access request control, the access request control being operable by a recipient of the message to access a resource network address of an external network resource, the message further including message data indicative of a source address of a source of the message; predicting, by the one or more processors of the machine, a time range during which a recipient of the message is likely to operate the access request control that is included in the message; generating, by the one or more processors of the machine, a visual message alert feature based on a comparison of a threshold degree of difference to a measured degree of difference between the resource network address of the external network resource and the source address of the source of the message; and automatically causing, by the one or more processors of the machine, the visual message alert feature to be presented on a display of the computer system during the predicted time range during which the recipient is likely to operate the access request control that is included in the message. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium storing executable instructions thereon that, when executed by a processor, cause the processor to perform operations including:
-
detecting message that includes a selectable functionality for accessing a resource network address of an external network resource, the message further including message data indicative of a source address of a source of the message; predicting a time range during which a recipient of the message will interact with the selectable functionality included in the message; and generating a visual message alert feature based on a comparison of a threshold degree of difference to a measured degree of difference between the resource network address of the external network resource and the source address of the source of the message; and automatically causing the visual message alert feature to be presented on a display of the computer system during the predicted time range during which the recipient is likely to operate the access request control that is included in the message. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification