Email security analysis

An electronic message, message technology, applied in the field of email security analysis, can solve problems such as error-prone, time-consuming, etc.

Pending Publication Date: 2021-10-19
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this is often a manual assessment, which is time-consuming and error-prone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Email security analysis
  • Email security analysis
  • Email security analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The subject matter of aspects of the technology is described with specificity herein to satisfy statutory requirements. However, the description itself is not intended to limit the scope of this patent. Rather, the inventors have contemplated that the claimed subject matter may also be implemented in other ways, to include different steps or combinations of steps similar to those described in this document, in connection with other present or future technologies. Furthermore, although the terms "step" and / or "block" may be used herein to imply different elements of the method employed, these terms should not be interpreted as implying a process within or between the various steps disclosed herein. any particular order unless and except when the order of the individual steps is explicitly described.

[0017] The techniques described herein visually map hidden message properties to help users determine whether an email is genuine or fraudulent. Hidden message properties...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The technology described herein visibly depicts hidden message traits to help users determine whether an email is genuine or deceptive. The hidden message traits are revealed by identifying and changing attributes that keep the hidden traits from being displayed in a rendered message. Spam messages, phishing messages, and messages that include or link to malicious programs (e.g., malware, ransomware) are examples of unwanted messages that can harm a recipient. These messages often rely on deception to get past email filtering systems and to trick a user into acting on content in a message. The deception often involves including hidden traits in a message that fool an automated filtering system. The technology described herein shows the visible traits to a user by including them in the rendered version of the message.

Description

Background technique [0001] E-mail is a widely used communication tool that provides a fast and inexpensive way of communicating between individuals and groups. Spam emails, phishing emails, and emails that include or link to malicious programs (eg, malware, ransomware) pose an increasing risk to users, companies, and computing devices. Efforts have been made by users to use filtering systems to identify harmful and / or malicious email before it is received. Filtering systems may use natural language processing or other mechanisms to categorize emails. Currently, no email filtering system is perfect. Some benign emails are misclassified as spam, while others reach user inboxes. When an email is classified as benign, there is a small chance that the email is actually malicious. When an email is classified as malicious, there is a small chance that the email is actually benign. In a corporate environment, some emails are quarantined instead of being delivered to the trash fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/56G06F3/14G06F40/14G06F40/205G06Q10/10H04L12/58H04L29/06
CPCG06F21/56G06F21/51G06F21/562H04L63/02H04L63/0254H04L63/0245H04L63/14G06Q10/107H04L63/16G06F40/205G06F40/14G06F3/14G09G2358/00H04L51/18H04L51/212G06F16/93H04W12/128H04L61/5007H04L67/52H04L63/0227
Inventor 李伟生
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products