×

Techniques for to defeat phishing

  • US 7,422,115 B2
  • Filed: 09/07/2004
  • Issued: 09/09/2008
  • Est. Priority Date: 09/07/2004
  • Status: Active Grant
First Claim
Patent Images

1. A process for defeating phishers and carried out in a distributed email system having a protected email server coupled via a wide area network (WAN) to a plurality of client computers executing protected email software, comprising:

  • A) receiving an initiation message at the protected email server from a particular client computer executing a protected email sender process, the initiation message requesting a code in a form of a stemp for inclusion in a header of a proposed email addressed to a recipient, the initiation message including at least ID information which identifies a sender and includes secure information to which a particular phisher would not have access and including at least the header of the proposed email;

    B) using the ID information and/or the secure information to determine an identity of the sender of the initiation message by looking up an owner of a protected email micropayments account associated with the ID information and/or the secure information;

    C) authenticating the sender of the initiation message by determining if the sender of the initiation message is the owner of the protected email micropayments account determined from the ID information and/or the secure information in the initiation message;

    D) if the sender of the initiation message is not authentic, sending a warning message and denying a particular request for the stemp;

    E) if the sender is authentic, determining if the particular request for the stemp from the sender is legitimate in terms of a stemp policy; and

    , if not, denying the particular request for the stemp;

    F) if the particular request for the stemp is within the stemp policy, using an encryption key to encrypt the stemp, the encrypted stemp including at least unique information which directly or indirectly identifies the sender;

    G) saving the encryption key, the unique information, the identity of the sender or a pointer to the identity of the sender, any Truemark, generic logo or white list source icon associated with the sender an the encrypted version of the stemp in a table or database;

    H) determining if the sender is on a white list of an intended recipient, and if not, deducting a micropayment amount from a micropayments account owned by the sender;

    (I) sending the stemp back to the sender computer which sent the initiation message along with the header of the proposed email;

    J) after a recipient computer receives a proposed email purportedly from the sender computer, receiving at least the header of the proposed email if the proposed email had the stemp therein;

    K) using the encrypted version of the stemp or a transaction number decrypted using a standard key from the encrypted stemp to look up a database record or table entry that pertains to the proposed email;

    L) determining the identity of the sender from the database record or the table entry that pertains to the proposed email, determining if the stemp is a valid paid-for stemp and determining if there is a source icon of a particular Truemark or a particular white list variety associated with the proposed email that should be displayed with the proposed email when the proposed email is displayed on the recipient computer;

    M) determining if a sender ID decrypted from the stemp matches the sender who purportedly sent the proposed email;

    N) if the sender does not match, sending back a warning message to the recipient computer; and

    O) if the sender matches, sending back another message to the recipient computer indicating the sender is authenticated and sending the particular Truemark or the particular white list icon to be displayed with the proposed email or data indicating which locally stored Truemark source icon should be displayed with the proposed email or that the particular white list icon should be displayed with the proposed email.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×