Log in
Enquire now
‌

US Patent 10530806 Methods and systems for malicious message detection and processing

Patent 10530806 was granted and assigned to Proofpoint on January, 2020 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Applicant
Proofpoint
Proofpoint
0
Current Assignee
Proofpoint
Proofpoint
0
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
105308060
Patent Inventor Names
Angelo Starink0
David Knight0
Date of Patent
January 7, 2020
0
Patent Application Number
163860190
Date Filed
April 16, 2019
0
Patent Citations
‌
US Patent 10326791 Malicious message detection and processing
‌
US Patent 10009362 Systems and methods for targeted attack protection using predictive sandboxing
0
‌
US Patent 10419464 Systems and methods for targeted attack protection using predictive sandboxing
Patent Citations Received
‌
US Patent 12107949 Key diversification in a tracking device environment
0
‌
US Patent 11770711 End-to-end encryption with distributed key management in a tracking device environment
‌
US Patent 11368290 Key diversification in a tracking device environment
‌
US Patent 11876892 Key diversification in a tracking device environment
0
‌
US Patent 11979502 Data protection in a tracking device environment
0
‌
US Patent 12028713 End-to-end encryption with distributed key management in a tracking device environment
0
‌
US Patent 11574071 Reliability of information security controls for attack readiness
‌
US Patent 10911467 Targeted attack protection from malicious links in messages using predictive sandboxing
...
Patent Primary Examiner
‌
Theodore C Parsons
0
Patent abstract

Methods and corresponding systems for malicious message detection and processing are provided herein. According to example embodiments, a method includes detecting, via an intermediary node, a link included in a message, the link being associated with an unknown resource. The intermediary node may have a processor and a memory for storing executable instructions to perform the method. The example method further includes hashing a unique identifier for a recipient of the message; coupling the hashed identifier with the link to create an updated link, and replacing the link in the message with the updated link. The method may include causing forwarding of the updated message to a recipient. Clicking on or otherwise selecting the updated link by the one or more recipients of the message may be tracked. The method may include mapping the hashed identifier to the unique identifier of each of the one or more recipients.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10530806 Methods and systems for malicious message detection and processing

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.