-
公开(公告)号:US20240314163A1
公开(公告)日:2024-09-19
申请号:US18185221
申请日:2023-03-16
Applicant: Cisco Technology, Inc.
Inventor: Suresh Gopathy , Gajendar Pandey
IPC: H04L9/40 , G06F40/295 , G06V10/74 , G06V30/19 , H04L51/21
CPC classification number: H04L63/1483 , G06V10/74 , G06V30/19 , H04L51/21
Abstract: Techniques are described herein for detecting an authorization status for an email based on content included in that email. In embodiments, such techniques may comprise receiving an electronic communication associated with an origination address, identifying, within the electronic communication, information indicating a claimed source entity, determining, based on the information, a claimed source entity, determining a number of authorized addresses associated with the claimed source entity, determining whether the electronic communication is authorized by the claimed source entity based on whether the origination address is included within the number of authorized addresses, updating the electronic communication to include an indication of whether the electronic communication is authorized by the claimed source entity, and transmitting the electronic communication to its intended recipient.
-
公开(公告)号:US20220303308A1
公开(公告)日:2022-09-22
申请号:US17203228
申请日:2021-03-16
Applicant: Cisco Technology, Inc.
Inventor: Suresh Gopathy , Gajendar Pandey , Pradyumna Paralikar
Abstract: This disclosure describes techniques for preventing network attacks within messages. For instance, electronic device(s) may receive a message, such as an email, from a first electronic device. The message may include a first code with a first embedded address to a first network resource, such as a malicious network resource. As such, the electronic device(s) may analyze the message to identify the first code. The electronic device(s) may then generate a second address associated with a second network resource, such as a secure proxy, a remote browser, a click-time protection service, and/or the like. Next, the electronic device(s) may embed the second address in a second code and replace the first code within the message with the second code. After replacing the first code, the electronic device(s) may send the message to a second electronic device of the second user.
-
公开(公告)号:US12143418B2
公开(公告)日:2024-11-12
申请号:US17203228
申请日:2021-03-16
Applicant: Cisco Technology, Inc.
Inventor: Suresh Gopathy , Gajendar Pandey , Pradyumna Paralikar
Abstract: This disclosure describes techniques for preventing network attacks within messages. For instance, electronic device(s) may receive a message, such as an email, from a first electronic device. The message may include a first code with a first embedded address to a first network resource, such as a malicious network resource. As such, the electronic device(s) may analyze the message to identify the first code. The electronic device(s) may then generate a second address associated with a second network resource, such as a secure proxy, a remote browser, a click-time protection service, and/or the like. Next, the electronic device(s) may embed the second address in a second code and replace the first code within the message with the second code. After replacing the first code, the electronic device(s) may send the message to a second electronic device of the second user.
-
公开(公告)号:US11411998B2
公开(公告)日:2022-08-09
申请号:US15968250
申请日:2018-05-01
Applicant: Cisco Technology, Inc.
Inventor: Ganesh Sundaram , Bibhuti Bhusan Kar , Suresh Gopathy , Sudharsan Rangarajan
Abstract: In accordance with various embodiments, a method is performed including determining a plurality of network reputation scores for a respective plurality of network subsets of a fabric network environment and determining a reputation policy for traffic traversing the fabric network environment. The method includes routing traffic traversing the fabric network environment according to the reputation policy and the plurality of network reputation scores.
-
-
-