Systems and methods for securing computers
First Claim
Patent Images
1. A method for avoiding electronic mail (email) attacks on a computer, comprising:
- downloading to a first email application running on the computer one or more emails in virtual-copy format to prevent the one or more emails from executing;
determining by the first email application whether a potentially infected email is in the one or more emails; and
displaying the potentially infected email to a user and providing a user interface to allow the user to select and delete the infected email using the first email application prior to downloading emails to a second email application running on the user'"'"'s computer.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for avoiding electronic mail (email) attacks on a computer by downloading one or more emails in virtual-copy format to prevent the one or more emails from executing; determining whether a potentially infected email is in the one or more emails; and displaying the potentially infected email to a user and providing a user interface to allow the user to select and delete the infected email prior to downloading emails to the user'"'"'s computer.
11 Citations
33 Claims
-
1. A method for avoiding electronic mail (email) attacks on a computer, comprising:
-
downloading to a first email application running on the computer one or more emails in virtual-copy format to prevent the one or more emails from executing; determining by the first email application whether a potentially infected email is in the one or more emails; and displaying the potentially infected email to a user and providing a user interface to allow the user to select and delete the infected email using the first email application prior to downloading emails to a second email application running on the user'"'"'s computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for avoiding electronic mail (email) attacks on a computer, comprising:
-
a processor; a memory coupled to the processor, the memory comprising computer program instructions executable by the processor comprising; meansinstructions for downloading to a first email application running on the computer one or more emails in virtual-copy format prevent the one or more emails from executing; meansinstructions for determining by the first email application whether a potentially infected email is in the one or more emails; and meansinstructions for displaying the potentially infected email to a user and providing a user interface to allow the user to select and delete the infected email using the first email application prior to downloading emails to a second email application running on the user'"'"'s computer. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program embodied on a non-transitory computer readable medium, the program including code for avoiding electronic mail (email) attacks on a computer, comprising:
-
code for downloading to a first email application running on the computer one or more emails in virtual-copy format to prevent the one or more emails from executing; code for determining by the first email application whether a potentially infected email is in the one or more emails; and code for displaying the potentially infected email to a user and providing a user interface to allow the user to select and delete the infected email using the first email application prior to downloading emails to a second email application running on the user'"'"'s computer. - View Dependent Claims (22, 23, 24)
-
-
25. A programmed computer, comprising electronic computer hardware operating in combination with software to avoid electronic mail (email) attacks on a computer, the programmed computer being configured to execute a plurality of steps, the steps comprising:
-
downloading to a first email application running on the computer one or more emails in virtual-copy format to prevent the one or more emails from executing; determining by the first email application whether a potentially infected email is in the one or more emails; and displaying the potentially infected email to a user and providing a user interface to allow the user to select and delete the infected email using the first email application prior to downloading emails to a second email application running on the user'"'"'s computer. - View Dependent Claims (26, 27, 28)
-
-
29. A computer program embodied on a non-transitory computer readable medium, the program including code for avoiding electronic mail (email) attacks on a computer, comprising:
-
code for downloading to, a first email program resident on the computer, one or more emails in non-executable format; code for determining, by a second email program, whether a potentially infected email is in the one or more emails; and code for displaying the potentially infected email to a user and providing a user interface to allow the user to select and delete the infected email using a third email program prior to downloading entails to a fourth email program resident on the user'"'"'s computer. - View Dependent Claims (30, 31, 32, 33)
-
Specification