The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 03, 2017

Filed:

Aug. 17, 2016
Applicant:

Wombat Security Technologies, Inc., Pittsburgh, PA (US);

Inventors:

Alan Himler, Pittsburgh, PA (US);

John T. Campbell, Bridgeville, PA (US);

Joseph A. Ferrara, Wexford, PA (US);

Trevor T. Hawthorn, Ashburn, VA (US);

Norman Sadeh-Koniecpol, Pittsburgh, PA (US);

Kurt Wescoe, Pittsburgh, PA (US);

Assignee:

WOMBAT SECURITY TECHNOLOGIES, INC., Pittsburgh, PA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 12/58 (2006.01); H04L 29/12 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1433 (2013.01); H04L 51/046 (2013.01); H04L 63/1425 (2013.01); H04L 69/22 (2013.01); H04L 61/2007 (2013.01);
Abstract

An electronic message analysis system of a cybersecurity network assesses whether a received message is a mock malicious message in response to, receiving a user activation action that indicates that the user has reported the received message as a potentially malicious message. The system does this by determining whether any header field of a header section of the message starts with a predetermined key. For any header field that starts with the predetermined key, the system determines whether a value that follows the predetermined key satisfies a trusted sender rule. If the value that follows the predetermined key satisfies the trusted sender rule, the system determines that the received message originated from a trusted sender. If the value that immediately follows the predetermined key does not satisfy the trusted sender rule, the system determines that the received message did not originate from a trusted sender.


Find Patent Forward Citations

Loading…