Browsing Internet content, such as websites, comes with risk. Without security information about websites to guide selections, users may navigate to unsafe websites or disclose sensitive information. For example, a user may browse to a website that installs harmful software, called malware, on their computing device. A website may also be designed to trick a user into installing malware on their computing device. Such malware may harm the computing device of the user, enable the theft of personal data, enable unauthorized access to a network of computers, or the like. A website may also be designed to engage in phishing for user information, scam users for payments or payment information, and/or perform other illicit monetization techniques (e.g., cybercrimes).
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Systems and methods are disclosed herein for phishing protection. A secure session is implemented between devices without trust in intervening devices or components. A security identifier is displayed in association with secure content. A secure identifier may also be displayed separately for comparison. The security identifier may be generated by a user, a local secure source, or a remote secure source. The user may visually and/or physically confirm a security identifier, such as a character string or a quick response (QR) code. Phishing attempts are monitored, detected, and alerted during and outside a secure session.
In aspects, a device, such as a docking station, is configured to modify images received from a first computing device for display on a display monitor. The device may comprise an interface, a detector, an alert combiner, and a combiner. The interface is configured to receive a first image (e.g., display video) from the first computing device. The detector is configured to monitor the first image for an indication of counterfeit secure information. The alert generator is configured to generate a security alert if the detector detects counterfeit secure information. In response to a secure session being conducted, the combiner is configured to combine a secure image (e.g., a secure window) associated with a secure identifier with the first image. In response to the detector detecting counterfeit secure information, the combiner is configured to present the security alert in association with the first image.
Further features and advantages of the embodiments, as well as the structure and operation of various embodiments, are described in detail below with reference to the accompanying drawings. It is noted that the claimed subject matter is not limited to the specific embodiments described herein. Such embodiments are presented herein for illustrative purposes only. Additional embodiments will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein.
The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate embodiments and, together with the description, further serve to explain the principles of the embodiments and to enable a person skilled in the pertinent art to make and use the embodiments.
The subject matter of the present application will now be described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left-most digit(s) of a reference number identifies the drawing in which the reference number first appears.
The following detailed description discloses numerous example embodiments. The scope of the present patent application is not limited to the disclosed embodiments, but also encompasses combinations of the disclosed embodiments, as well as modifications to the disclosed embodiments. It is noted that any section/subsection headings provided herein are not intended to be limiting. Embodiments are described throughout this document, and any type of embodiment may be included under any section/subsection. Furthermore, embodiments disclosed in any section/subsection may be combined with any other embodiments described in the same section/subsection and/or a different section/subsection in any manner.
Without security information about websites to guide selections, users may navigate to unsafe websites or disclose sensitive information. For example, the computing device of a user may become infected with malware. Such malware may harm the computing device of the user, enable the theft of personal data, enable unauthorized access to a network of computers, or the like. A website may also be designed to engage in phishing for user information, scam users for payments or payment information, and/or perform other illicit monetization techniques (e.g., cybercrimes). For instance, during a phishing attack, an attacker presents a computing device with an image that appears to be secure window for display on a display of the computing. However, the image is not a secure window, and if a user interacts with the image, the interactions of the user, such as typing and other operations, are revealed to the operating system (OS) of the computing device in a non-secured manner. For example, malicious software may become associated with the OS that corrupts the OS and causes a counterfeit secured screen region to be displayed that is not actually secure. This may result in user input provided to the secured screen region being provided to the corrupted OS without encryption, allowing access to the user input by an attacker.
As such, systems, apparatuses, methods, and computer program products are disclosed herein for phishing protection. A secure session is implemented between devices without trust in intervening devices or components. A security identifier is displayed in association with secure content. The secure identifier may also be displayed separately for comparison. The security identifier may be generated by a user, a local secure source, or a remote secure source. The user may visually and/or physically confirm a security identifier. An identifier may be, for example, a character string or a quick response (QR) code. Phishing attempts are monitored, detected, and alerted during and outside a secure session.
In aspects, a device, such as a docking station, is configured to modify images received from a first computing device for display on a display monitor. The device may comprise an interface, a detector, an alert combiner, and a combiner. The interface is configured to receive a first image (e.g., display video) from the first computing device. The detector is configured to monitor the first image for an indication of counterfeit secure information. The alert generator is configured to generate a security alert if the detector detects counterfeit secure information. In response to a secure session being conducted, the combiner is configured to combine a secure image (e.g., a secure window) associated with a secure identifier with the first image. In response to the detector detecting counterfeit secure information, the combiner is configured to present the security alert in association with the first image.
Embodiments have numerous advantages. For instance, when using a secure device in secure mode, user input (e.g., typing, drawing/inking) is provided (e.g., to a cloud server) and a responsive image is produced so that the client's operating system (OS) is not exposed to user input or screen display. A visual indicator may be generated locally, remotely, or entered by a user and displayed on screen for a user to see. The visual indicator may be displayed elsewhere, such as on an LCD, on a cell phone message, etc., for visual comparison. Automated comparison of a secure source and the displayed indicator may also be performed. User inputs are protected with automated and manual confirmation and detection of phishing attempts using counterfeit secure information.
These and further embodiments may be implemented in various ways. For instance,
First computing device 104 is a computing device utilized by one or more users (e.g., individual users, family users, enterprise users, governmental users, administrators, etc.). First computing device 104 may comprise one or more applications, operating systems, virtual machines (VMs), storage devices, etc., that may be executed, hosted, and/or stored therein or via one or more other computing devices via network(s) 112. In an example, first computing device 104 may access one or more server devices via network(s) 112. First computing device 104 may each be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., a personal digital assistant (PDA), a laptop computer, a notebook computer, a tablet computer, a netbook, etc.), a mobile phone, a wearable computing device, or other type of mobile device, or a stationary computing device such as a desktop computer or PC (personal computer), or a server. First computing device 104 is not limited to physical machines, but may include other types of machines or nodes, such as a virtual machine, that are executed in physical machines. An example computing device with example features is presented in
First computing device 104 may operate in respective computing environments and may execute one or more processes in such respective computing environments. A process is any type of executable (e.g., binary, program, application) that is being executed by a computing device. A computing environment may be any environment in which one or more computing devices may operate and interact, including a client-server system, a multi-computer network, etc. First computing device 104 may execute a browser application, which may execute code (e.g., using a JavaScript engine) to display remote content 108, such as webpages, web applications (web apps), which may have user interfaces (e.g., graphical user interfaces (GUIs)) that user(s) interact with. For example, a remote content GUI displayed by a browser may request computer network login credentials to determine whether a user can access a company's network. A browser application may be configured to communicate (e.g., via network(s) 112) with one or more applications executed by server(s), e.g., second computing device 102.
First computing device 104 may generate display information, which may be displayed by a display 106 associated with first computing device 104 and/or may be output as first image 110, as shown in
In some examples, a user of first computing device 104 may connect first computing device 104 to secure device 114 to utilize secure device 114 for secure sessions that avoid and/or detect whether there are potential security risks (e.g., phishing attempts) associated with first computing device 104, such as a potentially corrupted operating system (OS).
Second computing device 102 may comprise one or more computing devices, servers, services, local processes, remote machines, web services, etc., which may include providing remote content 108. Second computing device 102 may comprise, for example, a server located on an organization's premises and/or coupled to an organization's local network, a remotely located server, a cloud-based server (e.g., one or more servers organized in a distributed manner), or any other device or service. Second computing device 102 may execute a plurality of programs. For example, second computing device 102 may be a cloud server hosting one or more websites accessible using one or more uniform resource locators (URLs) or other type of resource indicator. In some examples, second computing device 102 may host secure content accessible to authorized users.
Network(s) 112 may include, for example, one or more of any of a local area network (LAN), a wide area network (WAN), a personal area network (PAN), a combination of communication networks, such as the Internet, and/or a virtual network. In example implementations, computing device 104, secure device 114, and second computing device 102 may be communicatively coupled via network(s) 112. In an implementation, any one or more of computing device 104, secure device 114, and second computing device 102 may communicate via one or more application programming interfaces (APIs), and/or according to other interfaces and/or techniques. Computing device 104, secure device 114, and second computing device 102 may include one or more network interfaces that enable communications between devices.
Monitor 146 may be any type of display used in association with computing devices. Monitor 146 may be standalone or integrated with secure device 114. Monitor 146 may be configured to receive a combined image 136 from secure device 114, which monitor 146 displays for viewing by a user. A combined image 136 may include one or more of first image 110, secure image 128, secure identifier 150, and/or an alert (e.g., see
Input devices 148 may include any type of input device for a computing device, such as a keyboard, a pointing device (e.g., computer mouse), a joystick, a video game controller, a scanner, a touch pad, a stylus pen, a voice recognition system to receive voice input, a gesture recognition system to receive gesture input, etc. A user may use input devices 148, for example, to enter a URL 138, e.g., to access remote content 108 on second computing device 102. A user may use input devices 148, for example, to enter secure identifier 138, which may be used as a secure identifier for a secure session or may be used to confirm secure identifier 150 created by secure identifier generator 118. By the user entering secure identifier 138 by input devices 148, the user is aware of the correct value of secure identifier 138, and thus is enabled to independently determine that a phishing attempt is underway when a displayed value of secure identifier 138 on monitor 146 does not match the value entered by the user.
Secure device 114 is configured to provide secure computing sessions and/or to monitor and detect security issues, such as phishing attempts, with first computing device 104. Secure device 114 may be implemented as a standalone device (e.g., a docking station) or may be integrated, for example, with first computing device 104 or with monitor 146. Secure device 114 may be utilized alone (e.g., without first computing device 104) or as an intermediate device, e.g., between first computing device 104 and one or more of network(s) 112, second computing device 102, and/or monitor 146. Secure device 114 may include, for example, a processor 122, interface(s) 116, a secure identifier generator 118, and a display 120.
Interface(s) 116 may include one or more wired or wireless, internal and/or external communication interfaces, drivers, switches, etc., such as an IEEE 802.11 wireless LAN (WLAN) wireless interface, a Worldwide Interoperability for Microwave Access (Wi-MAX) interface, an Ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a Bluetooth™ interface, a near field communication (NFC) interface, liquid crystal display (LCD) driver, an Ethernet switch, etc. Interface(s) 116 may receive inputs from and drive outputs to internal components and external devices.
For example, interface(s) 116 receive first image 110 from first computing device 104 and receive secure identifier 150 generated by secure identifier generator 118. Interface(s) 116 may receive URLs and/or secure identifiers from input devices 148. Interface(s) 116 may drive control and data signals to display 120. Interface(s) 116 may send information (e.g., URLs) to second computing device 102 via network(s) 112 and receive remote content 108 from second computing device 102. Interface(s) 116 may communicate with processor 122 executing an operating system and one or more applications, such as secure session app 124. For example, interface(s) 116 may provide first image 116, remote content 108, secure identifier 150, and user inputs 138 to processor 122 for use by secure session app 124. Interface(s) 116 may receive and forward from processor 122 browser requests (e.g., including URLs) and send them to network(s) 112. Interface(s) 116 may receive from processor 122 instructions on how to drive display 120. Interface(s) 116 may receive from processor 122 combined image 136 and drive it to monitor 146 for display.
Secure identifier generator 118 is configured to generate a secure identifier (ID) 150 for use in secure sessions. For example, secure session app 122 is configured to obtain a secure ID 150 from secure identifier generator 118 for use during a secure session. Secure identifier 150 may be any type of identifier, such as a character string (e.g., numbers, letters), a symbol (e.g., a graphical code, such as a quick response (QR) code), and/or an image. In some examples, secure identifier generator 118 may be a random number generator. As shown by example in
Display 120 may display the secure identifier 150 for a secure session, for example, so that a user need not remember the secure identifier and can quickly compare the secure identifier on the display to the secure identifier displayed on the monitor 146. Display 120 may be, for example, a liquid crystal display (LCD). For example, secure session app 124 may send a secure identifier 150 for a secure session to an LCD driver in interface(s) 116 for display by display 120. A user may visually compare the displayed secure identifier 150 with a secure identifier display 140 on monitor 146, for example, to manually identify a security issue, such as a phishing attempt.
Processor 122 comprises any type of processor, microcontroller, a microprocessor, signal processor (e.g., digital signal processor (DSP)), application specific integrated circuit (ASIC), and/or other physical hardware processor circuit) for performing computing tasks, such as program execution, signal coding, data processing, input/output processing, power control, and/or other functions. Processor 232 is configured to execute program code, such as an operating system and/or application programs. Processor 232 may perform operations, e.g., based on execution of executable code, which may include one or more steps in processes/methods disclosed herein. Processor 122 may associated with (e.g., may read and write to) a variety of memory and storage, such as SSD, RAM, ROM, flash memory, MEM, etc. Processor 122 may execute one or more applications, such as secure session application 124.
Secure session application (app) 124, e.g., when executed by processor 122, implements secure communication sessions and/or monitors for and detects security issues, such as phishing attempts. Secure device 114, via secure session app 124, may be configured to modify images received from first computing device 104 for display on monitor 146. A user may select secure session app 124 or secure session app 124 may always be active. A user may indicate a computing device to implement a secure session with, for example, by selecting or entering an address, such as URL 138, using input device(s) 148. For example, a user may type in a URL 138 indicating that secure session app 124 should create a secure session with second computing device 102. Secure session app 124 receives the URL 138 via interface(s) 116. Secure session app 124 may communicate the requested URL to second computing device 102 via interface(s) 116 and network(s) 112. Second computing device 102 may respond by providing remote content 108 to secure session app 124, again via interface(s) 116 and network(s) 112.
Secure session app 124 receives a secure identifier from secure identifier generator 118 and/or from input device(s) 148. In some examples, secure session app 124 may obtain secure identifier 118 from secure identifier generator 118 in response to receiving a request for a secure session from input device(s) 148. In some examples, secure session app 124 may provide a graphical user interface (GUI) to request that a user enter or select a secure identifier for a secure session. In some examples, secure session app 124 may provide a graphical user interface (GUI) to request that a user confirm secure identifier display 140 by entering the secure identifier displayed on monitor 146. Secure session app 124 may communicate a session number with second computing device 102, which may be displayed on monitor 46 and/or display 120.
Secure session application 124 may include, for example, secure image generator 126, combiner 130, detector 132, and alert generator 134, to perform one or more operations related to a secure session and/or monitoring and detecting security threats.
For instance, secure image generator 126 is configured to generate secure images, such as secure image 128, based on remote content 108 provided by second computing device 102. Secure image generator 126 may, for example, generate secure image 128 as the image indicated by remote content with a border (e.g., a red border) and/or with an integrated (e.g., or otherwise associated) image of the secure identifier 150.
Combiner 130 is configured to combine the first image 110, if received, with other imagery, which may depend on a variety of scenarios. For example, in response to a secure session, combiner 130 may combine first image 110 with secure image 128 associated with a secure identifier (e.g., secure identifier 150 or 138). As shown by example in
Detector 132 is configured to monitor the first image 110 for an indication of counterfeit secure information. Secure sessions are implemented through secure device 114. A “secure session” appearing in first image 110 may indicate a counterfeit secure session generated by a corrupted executable in first computing device 104. Counterfeit secure information may include, for example, a counterfeit secure border, a counterfeit secure image, a counterfeit secure identifier, a counterfeit secure session ID, etc. Detector 132 may be configured to process first image 110 in search of one or more of these indicia or characteristics present in imagery (e.g., video) in first image 110. For example, detector 132 may implement one or more pattern matching criteria to determine whether display 106 includes one or more types of counterfeit secure information. A user may, additionally or alternatively, identify counterfeit secure information by knowing that the user is not in a secure session and/or by comparing a secure identifier displayed by display 120 to secure identifier display 140 displayed by monitor 146.
Alert generator 134 is configured to generate a security alert if the detector 132 indicates that it detected counterfeit secure information. Alert generator 134 may monitor or receive an indication of detected counterfeit information from detector 132. As shown in
Embodiments described herein may operate in various ways. For instance,
Flowchart 100B includes step 160. In step 160, a first image is received from a first computing device. For example, as shown in
In step 162, an indication of user initiation of a secured session is received. For example, as shown in
In step 164, a secure identifier (e.g., character string or QR code) is received (e.g., from user interface) or generated. For example, as shown in
In step 166, a secure window is generated for the secured session associated with the secure identifier. For example, as shown in
In step 168, the secure window, secure identifier is combined with (e.g., overlaid over) the first image. For example, as shown in
In step 170, the combined image is provided to a display. For example, as shown in
In step 172, the secure identifier is displayed, e.g., to allow the user to manually spot a phishing attempt. For example, as shown in
In step 174, upon exiting a secure session, the secure identifier is discarded/reset. For example, as shown in
In step 176, the first image is monitored (e.g., during and outside a secure session) for an indication of a counterfeit information (e.g., secure image or secure identifier). For example, as shown in
As shown in
Input devices 148 includes any type of input device for a computing device, such as a keyboard, a pointing device (e.g., computer mouse), a joystick, a video game controller, a scanner, a touch pad, a stylus pen, a voice recognition system to receive voice input, a gesture recognition system to receive gesture input, etc. A user may use input devices 148, for example, to enter a URL 138, e.g., to access remote content 108 on second computing device 102. As a QR code may be complex, a user may not be requested to enter or to confirm a QR code, e.g., unless input device(s) 148 include a scanner to accept a QR code (e.g., from a user's cell phone).
Monitor 146 is any type of display used in association with computing devices. Monitor 146 may be standalone or integrated with secure device 114. Monitor 146 may be configured to receive a combined image 136 from secure device 114, which monitor 146 displays for viewing by a user. A combined image 136 may include one or more of first image 110, secure image 128, secure identifier 150, and/or an alert (e.g., see
System 200A may operate in various ways to perform its function. For instance,
Flowchart 200B includes step 260. In step 260, a first image is received from a first computing device. For example, as shown in
In step 262, an indication of user initiation of a secured session is received. For example, as shown in
In step 264, a secure identifier (e.g., QR code) is received (e.g., from user interface) or generated. For example, as shown in
In step 266, a secure window is generated for the secured session associated with the secure identifier. For example, as shown in
In step 268, the secure window, secure identifier is combined with (e.g., overlaid over) the first image. For example, as shown in
In step 270, the combined image is provided to a display. For example, as shown in
In step 272, upon exiting a secure session, the secure identifier is discarded/reset. For example, as shown in
In step 274, the first image is monitored (e.g., during and outside a secure session) for an indication of a counterfeit information (e.g., secure image or secure identifier). For example, as shown in
A further system for phishing detection is described as follows with respect to
Second computing device 102 may comprise one or more computing devices, servers, services, local processes, remote machines, web services, etc., which may include providing remote content 108. Second computing device 102 may comprise, for example, a server located on an organization's premises and/or coupled to an organization's local network, a remotely located server, a cloud-based server (e.g., one or more servers organized in a distributed manner), or any other device or service. Second computing device 102 may be implemented as a plurality of programs executed by one or more computing devices. For example, second computing device 102 may be a cloud server hosting one or more websites accessible using one or more URLs. In some examples, second computing device 102 may host secure content accessible to authorized users.
As shown in
Second computing device 302 may, e.g., additionally, send the secure ID to a device a user has access to, such as a user's cell phone. For example, as shown in
Secure identifier generator 318 is configured to generate a secure ID for use in secure sessions. For example, second computing device 302 may receive an indication to provide a secure ID associated with remove content, e.g., to provide remote content and secure ID 308. Secure ID 308 may be any type of identifier, such as a character string (e.g., numbers, letters), a symbol (e.g., a graphical code, such as a QR code), and/or an image. In some examples, secure identifier generator 318 may be a random number generator. As shown by example in
A user may receive the texted secure ID on his/her cell phone 354. The user may confirm that the texted secure ID matches the secure identifier display 140 displayed by monitor 146. The user may, e.g., alternatively or additionally, provide the texted secure ID 308 to secure device 114 by typing it in or scanning it in (e.g., QR code) using input device(s) 148. The user-entered secure ID 338 may be provided to secure session app 324.
Secure session app 324 may send the secure ID to interface(s) 116 to drive the secure ID to display 120. Detector 132 may process the secure image or a separately received secure ID 308 to determine whether the secure ID 308 matches the secure ID entered by the user. Upon determining a match, secure session app 324 may create and send a secure session ID to second computing device 302. In some examples, session creation may be based on secure ID confirmation. Secure session app 324 may send the session ID to secure image generator 126 and/or display 120 for display to the user.
System 300B may operate in various ways. For instance,
Flowchart 300B includes step 360. In step 360, a first image is received from a first computing device. For example, as shown in
In step 362, an indication of user initiation of a secured session is received. For example, as shown in
In step 364, a secure image associated with a secure identifier is received from a second computing device. For example, as shown in
In step 366, a secure window is generated for the secured session associated with the secure identifier. For example, as shown in
In step 368, the secure window, secure identifier, and user prompt are combined with (e.g., overlaid over) the first image. For example, as shown in
In step 370, the combined image is provided to a display. For example, as shown in
In step 372, the secure identifier is received on a third device (e.g., user mobile phone). For example, as shown in
In step 374, a secure identifier (e.g., character string) is received via input device(s) 148. For example, as shown in
In step 376, the secure identifier is displayed, e.g., to allow the user to manually spot a phishing attempt. For example, as shown in
In step 378, the received secure identifier is verified to match the secure ID associated with the secure image. For example, as shown in
In step 380, upon verification, a “session number” is transmitted to the second device in a secure channel. For example, as shown in
In step 382, the session number is displayed (e.g., with the combined image and/or on the LCD). For example, as shown in
In step 384, upon exiting a secure session, the secure identifier and session number are discarded/reset. For example, as shown in
In step 386, the first image is monitored (e.g., during and outside a secure session) for an indication of a counterfeit information (e.g., secure image or secure identifier). For example, as shown in
Embodiments described herein may operate in various ways. For instance,
Flowchart 400B includes step 460. In step 460, a first image is received from a first computing device. For example, as shown in
In step 462, the first image is monitored (e.g., during and outside a secure session) for an indication of a counterfeit information (e.g., secure image or secure identifier). For example, as shown in
In step 464, an indication of counterfeit information is detected in the first image. For example, as shown in
In step 466, a security alert is generated for the detected counterfeit secure information. For example, as shown in
In step 468, the security alert is combined with (e.g., overlaid over) the first image. For example, as shown in
In step 470, the combined image is provided to a display. For example, as shown in
Embodiments described herein may operate in various ways. For instance,
Flowchart 500 includes step 502. In step 502, a first image is received from a first computing device. For example, as shown in
In step 504, the first image is monitored for an indication of counterfeit secure information (e.g., secure image or secure identifier). For example, as shown in
In step 506, in response to detected counterfeit secure information, a security alert is generated. For example, as shown in
In step 508, in response to a secure session, a secure image associated with a secure identifier is combined with the first image. For example, as shown in
In step 510, in response to the generation of the security alert, the security alert is combined with the first image. For example, as shown in
As noted herein, the embodiments described, along with any circuits, components and/or subcomponents thereof, as well as the flowcharts/flow diagrams described herein, including portions thereof, and/or other embodiments, may be implemented in hardware, or hardware with any combination of software and/or firmware, including being implemented as computer program code (program instructions) configured to be executed in one or more processors and stored in a computer readable storage medium, or being implemented as hardware logic/electrical circuitry, such as being implemented together in a system-on-chip (SoC), a field programmable gate array (FPGA), and/or an application specific integrated circuit (ASIC). A SoC may include an integrated circuit chip that includes one or more of a processor (e.g., a microcontroller, microprocessor, digital signal processor (DSP), etc.), memory, one or more communication interfaces, and/or further circuits and/or embedded firmware to perform its functions.
Embodiments disclosed herein may be implemented in one or more computing devices that may be mobile (a mobile device) and/or stationary (a stationary device) and may include any combination of the features of such mobile and stationary computing devices. Examples of computing devices in which embodiments may be implemented are described as follows with respect to
Computing device 602 can be any of a variety of types of computing devices. For example, computing device 602 may be a mobile computing device such as a handheld computer (e.g., a personal digital assistant (PDA)), a laptop computer, a tablet computer, a hybrid device, a notebook computer, a netbook, a mobile phone (e.g., a cell phone, a smart phone, etc.), a wearable computing device (e.g., a head-mounted augmented reality and/or virtual reality device including smart glasses), or other type of mobile computing device. Computing device 602 may alternatively be a stationary computing device such as a desktop computer, a personal computer (PC), a stationary server device, a minicomputer, a mainframe, a supercomputer, etc.
As shown in
A single processor 610 (e.g., central processing unit (CPU), microcontroller, a microprocessor, signal processor, ASIC (application specific integrated circuit), and/or other physical hardware processor circuit) or multiple processors 610 may be present in computing device 602 for performing such tasks as program execution, signal coding, data processing, input/output processing, power control, and/or other functions. Processor 610 may be a single-core or multi-core processor, and each processor core may be single-threaded or multithreaded (to provide multiple threads of execution concurrently). Processor 610 is configured to execute program code stored in a computer readable medium, such as program code of operating system 612 and application programs 614 stored in storage 620. The program code is structured to cause processor 610 to perform operations, including the processes/methods disclosed herein. Operating system 612 controls the allocation and usage of the components of computing device 602 and provides support for one or more application programs 614 (also referred to as “applications” or “apps”). Application programs 614 may include common computing applications (e.g., e-mail applications, calendars, contact managers, web browsers, messaging applications), further computing applications (e.g., word processing applications, mapping applications, media player applications, productivity suite applications), one or more machine learning (ML) models, as well as applications related to the embodiments disclosed elsewhere herein. Processor(s) 610 may include one or more general processors (e.g., CPUs) configured with or coupled to one or more hardware accelerators, such as one or more NPUs and/or one or more GPUs.
Any component in computing device 602 can communicate with any other component according to function, although not all connections are shown for ease of illustration. For instance, as shown in
Storage 620 is physical storage that includes one or both of memory 656 and storage device 690, which store operating system 612, application programs 614, and application data 616 according to any distribution. Non-removable memory 622 includes one or more of RAM (random access memory), ROM (read only memory), flash memory, a solid-state drive (SSD), a hard disk drive (e.g., a disk drive for reading from and writing to a hard disk), and/or other physical memory device type. Non-removable memory 622 may include main memory and may be separate from or fabricated in a same integrated circuit as processor 610. As shown in
One or more programs may be stored in storage 620. Such programs include operating system 612, one or more application programs 614, and other program modules and program data. Examples of such application programs may include, for example, computer program logic (e.g., computer program code/instructions) for implementing secure identifier generator 118, secure session app 124, secure image generator 126, combiner 130, detector, alert generator 134, secure identifier generator 318, and/or secure session app 324, as well as any of flowcharts 100B, 200B, 300B, 400B, 500, and/or any individual steps thereof.
Storage 620 also stores data used and/or generated by operating system 612 and application programs 614 as application data 616. Examples of application data 616 include web pages, text, images, tables, sound files, video data, and other data, which may also be sent to and/or received from one or more network servers or other devices via one or more wired or wireless networks. Storage 620 can be used to store further data including a subscriber identifier, such as an International Mobile Subscriber Identity (IMSI), and an equipment identifier, such as an International Mobile Equipment Identifier (IMEI). Such identifiers can be transmitted to a network server to identify users and equipment.
A user may enter commands and information into computing device 602 through one or more input devices 630 and may receive information from computing device 602 through one or more output devices 650. Input device(s) 630 may include one or more of touch screen 632, microphone 634, camera 636, physical keyboard 638 and/or trackball 640 and output device(s) 650 may include one or more of speaker 652 and display 654. Each of input device(s) 630 and output device(s) 650 may be integral to computing device 602 (e.g., built into a housing of computing device 602) or external to computing device 602 (e.g., communicatively coupled wired or wirelessly to computing device 602 via wired interface(s) 680 and/or wireless modem(s) 660). Further input devices 630 (not shown) can include a Natural User Interface (NUI), a pointing device (computer mouse), a joystick, a video game controller, a scanner, a touch pad, a stylus pen, a voice recognition system to receive voice input, a gesture recognition system to receive gesture input, or the like. Other possible output devices (not shown) can include piezoelectric or other haptic output devices. Some devices can serve more than one input/output function. For instance, display 654 may display information, as well as operating as touch screen 632 by receiving user commands and/or other information (e.g., by touch, finger gestures, virtual keyboard, etc.) as a user interface. Any number of each type of input device(s) 630 and output device(s) 650 may be present, including multiple microphones 634, multiple cameras 636, multiple speakers 652, and/or multiple displays 654.
One or more wireless modems 660 can be coupled to antenna(s) (not shown) of computing device 602 and can support two-way communications between processor 610 and devices external to computing device 602 through network 604, as would be understood to persons skilled in the relevant art(s). Wireless modem 660 is shown generically and can include a cellular modem 666 for communicating with one or more cellular networks, such as a GSM network for data and voice communications within a single cellular network, between cellular networks, or between the mobile device and a public switched telephone network (PSTN). Wireless modem 660 may also or alternatively include other radio-based modem types, such as a Bluetooth modem 664 (also referred to as a “Bluetooth device”) and/or Wi-Fi modem 662 (also referred to as an “wireless adaptor”). Wi-Fi modem 662 is configured to communicate with an access point or other remote Wi-Fi-capable device according to one or more of the wireless network protocols based on the IEEE (Institute of Electrical and Electronics Engineers) 802.11 family of standards, commonly used for local area networking of devices and Internet access. Bluetooth modem 664 is configured to communicate with another Bluetooth-capable device according to the Bluetooth short-range wireless technology standard(s) such as IEEE 802.15.1 and/or managed by the Bluetooth Special Interest Group (SIG).
Computing device 602 can further include power supply 682, LI receiver 684, accelerometer 686, and/or one or more wired interfaces 680. Example wired interfaces 680 include a USB port, IEEE 1394 (Fire Wire) port, a RS-232 port, an HDMI (High-Definition Multimedia Interface) port (e.g., for connection to an external display), a DisplayPort port (e.g., for connection to an external display), an audio port, an Ethernet port, the purposes and functions of each of which are well known to persons skilled in the relevant art(s). Wired interface(s) 680 of computing device 602 provide for wired connections between computing device 602 and network 604, or between computing device 602 and one or more devices/peripherals when such devices/peripherals are external to computing device 602 (e.g., a pointing device, display 654, speaker 652, camera 636, physical keyboard 638, etc.). Power supply 682 is configured to supply power to each of the components of computing device 602 and may receive power from a battery internal to computing device 602, and/or from a power cord plugged into a power port of computing device 602 (e.g., a USB port, an A/C power port). LI receiver 684 may be used for location determination of computing device 602 and may include a satellite navigation receiver such as a Global Positioning System (GPS) receiver or may include other type of location determiner configured to determine location of computing device 602 based on received information (e.g., using cell tower triangulation, etc.). Accelerometer 686 may be present to determine an orientation of computing device 602.
Note that the illustrated components of computing device 602 are not required or all-inclusive, and fewer or greater numbers of components may be present as would be recognized by one skilled in the art. For example, computing device 602 may also include one or more of a gyroscope, barometer, proximity sensor, ambient light sensor, digital compass, etc. Processor 610 and memory 656 may be co-located in a same semiconductor device package, such as being included together in an integrated circuit chip, FPGA, or system-on-chip (SOC), optionally along with further components of computing device 602.
In embodiments, computing device 602 is configured to implement any of the above-described features of flowcharts herein. Computer program logic for performing any of the operations, steps, and/or functions described herein may be stored in storage 620 and executed by processor 610.
In some embodiments, server infrastructure 670 may be present in computing environment 600 and may be communicatively coupled with computing device 602 via network 604. Server infrastructure 670, when present, may be a network-accessible server set (e.g., a cloud-based environment or platform). As shown in
Each of nodes 674 may, as a compute node, comprise one or more server computers, server systems, and/or computing devices. For instance, a node 674 may include one or more of the components of computing device 602 disclosed herein. Each of nodes 674 may be configured to execute one or more software applications (or “applications”) and/or services and/or manage hardware resources (e.g., processors, memory, etc.), which may be utilized by users (e.g., customers) of the network-accessible server set. For example, as shown in
In an embodiment, one or more of clusters 672 may be co-located (e.g., housed in one or more nearby buildings with associated components such as backup power supplies, redundant data communications, environmental controls, etc.) to form a datacenter, or may be arranged in other manners. Accordingly, in an embodiment, one or more of clusters 672 may be a datacenter in a distributed collection of datacenters. In embodiments, exemplary computing environment 600 comprises part of a cloud-based platform.
In an embodiment, computing device 602 may access application programs 676 for execution in any manner, such as by a client application and/or a browser at computing device 602.
For purposes of network (e.g., cloud) backup and data security, computing device 602 may additionally and/or alternatively synchronize copies of application programs 614 and/or application data 616 to be stored at network-based server infrastructure 670 as application programs 676 and/or application data 678. For instance, operating system 612 and/or application programs 614 may include a file hosting service client, configured to synchronize applications and/or data stored in storage 620 at network-based server infrastructure 670.
In some embodiments, on-premises servers 692 may be present in computing environment 600 and may be communicatively coupled with computing device 602 via network 604. On-premises servers 692, when present, are hosted within an organization's infrastructure and, in many cases, physically onsite of a facility of that organization. On-premises servers 692 are controlled, administered, and maintained by IT (Information Technology) personnel of the organization or an IT partner to the organization. Application data 698 may be shared by on-premises servers 692 between computing devices of the organization, including computing device 602 (when part of an organization) through a local network of the organization, and/or through further networks accessible to the organization (including the Internet). Furthermore, on-premises servers 692 may serve applications such as application programs 696 to the computing devices of the organization, including computing device 602. Accordingly, on-premises servers 692 may include storage 694 (which includes one or more physical storage devices such as storage disks and/or SSDs) for storage of application programs 696 and application data 698 and may include one or more processors for execution of application programs 696. Still further, computing device 602 may be configured to synchronize copies of application programs 614 and/or application data 616 for backup storage at on-premises servers 692 as application programs 696 and/or application data 698.
Embodiments described herein may be implemented in one or more of computing device 602, network-based server infrastructure 670, and on-premises servers 692. For example, in some embodiments, computing device 602 may be used to implement systems, clients, or devices, or components/subcomponents thereof, disclosed elsewhere herein. In other embodiments, a combination of computing device 602, network-based server infrastructure 670, and/or on-premises servers 692 may be used to implement the systems, clients, or devices, or components/subcomponents thereof, disclosed elsewhere herein.
As used herein, the terms “computer program medium,” “computer-readable medium,” “computer-readable storage medium,” and “computer-readable storage device,” etc., are used to refer to physical hardware media. Examples of such physical hardware media include any hard disk, optical disk, SSD, other physical hardware media such as RAMs, ROMs, flash memory, digital video disks, zip disks, MEMs (microelectronic machine) memory, nanotechnology-based storage devices, and further types of physical/tangible hardware storage media of storage 620. Such computer-readable media and/or storage media are distinguished from and non-overlapping with communication media and propagating signals (do not include communication media and propagating signals). Communication media embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wireless media such as acoustic, RF, infrared, and other wireless media, as well as wired media. Embodiments are also directed to such communication media that are separate and non-overlapping with embodiments directed to computer-readable storage media.
As noted above, computer programs and modules (including application programs 614) may be stored in storage 620. Such computer programs may also be received via wired interface(s) 680 and/or wireless modem(s) 660 over network 604. Such computer programs, when executed or loaded by an application, enable computing device 602 to implement features of embodiments discussed herein. Accordingly, such computer programs represent controllers of the computing device 602.
Embodiments are also directed to computer program products comprising computer code or instructions stored on any computer-readable medium or computer-readable storage medium. Such computer program products include the physical storage of storage 620 as well as further physical storage types.
Systems, methods, and instrumentalities are described herein related to phishing protection. A secure session may be implemented between devices without trust in intervening devices or components. A security identifier may be displayed in association with secure content. A secure identifier may also be displayed separately for comparison. A security identifier may be generated by a user, a local secure source, or a remote secure source. A user may visually and/or physically confirm a security identifier. An identifier may be, for example, a character string or a quick response (QR) code. Phishing attempts may be monitored, detected, and alerted during and outside a secure session.
In examples, a device (e.g., a docking station) may be configured to modify images from a first computing device to a display monitor. The device may comprise a processor and a memory device comprising program code structured to cause the processor to: receive a first image from the first computing device; monitor the first image for an indication of counterfeit secure information; generate a security alert if the detector detects counterfeit secure information; and perform at least one of: in response to a secure session, combine the first image with a secure image associated with a secure identifier, or in response to the detector detecting counterfeit secure information, combine the first image with the security alert.
In another example, a device may be configured to modify images from a first computing device to a display monitor. The device may comprise an interface configured to receive a first image (e.g., display video) from the first computing device; a detector configured to monitor the first image for an indication of counterfeit secure information (e.g., secure image or secure identifier); an alert generator configured to generate a security alert if the detector detects counterfeit secure information; and a combiner configured to combine with (e.g., overlay over) the first image: (i) in response to a secure session, a secure image (e.g., secure window) associated with a secure identifier and (ii) in response to the detector detecting counterfeit secure information, the security alert.
In examples, the interface may be configured to receive the secure image from a second (e.g., remote) computing device.
In examples, the interface may be configured to receive the secure identifier from a second (e.g., remote) computing device.
In examples, the interface may be configured to receive the secure identifier from a user interface.
In examples, the device may further comprise an identifier generator configured to generate the secure identifier.
In examples, the device may further comprise an image generator configured to generate the secure image.
In examples, the device may further comprise a display (e.g., LCD) configured to display the secure identifier for visual comparison to a display of the combined image.
In examples, the secure identifier may comprise a character string (e.g., numbers, letters, other characters).
In examples, the secure identifier may comprise a quick response (QR) code.
In examples, the secure identifier may comprise a watermark embedded in the second image.
In examples, a method may comprise receiving a first image from a first computing device; monitoring the first image for an indication of a counterfeit secure information; generating a security alert if there is a detected counterfeit secure information; in response to a secure session, combining for display a secure image associated with a secure identifier with the first image; and in response to the generation of the security alert, combining for display the security alert with the first image.
In examples, the method may further comprise receiving the secure image from a second computing device.
In examples, the method may further comprise receiving the secure identifier from a second computing device.
In examples, the method may further comprise receiving the secure identifier from a user interface.
In examples, the method may further comprise generating the secure identifier.
In examples, the method may further comprise generating the secure image.
In examples, the method may further comprise displaying the secure identifier for visual comparison to a display of the combined image.
In examples, a computer-readable storage device may have instructions recorded thereon that, when executed by a hardware accelerator, implement a method. The method may comprise receiving a first image from a first computing device; monitoring the first image for an indication of a counterfeit secure information; generating a security alert if there is a detected counterfeit secure information; in response to a secure session, combining for display a secure image associated with a secure identifier with the first image; and in response to the generation of the security alert, combining for display the security alert with the first image.
In examples, the method may further comprise receiving at least one of the secure image or the secure identifier from a second computing device.
In examples, the method may further comprise performing at least one of the following: receiving the secure identifier from a user interface; generating the secure identifier; generating the secure image; or displaying the secure identifier for visual comparison to a display of the combined image.
In examples, a method in a docking station for detecting a phishing attempt may comprise, for example, receiving an indication of a secured session initiated on a host device coupled to a monitor through the docking station; receiving a unique identifier; displaying a secure window for a secured session on the monitor with the identifier displayed in association with the secure window; displaying the identifier on the docking station; monitoring for an identifier pattern based on predefined identifier pattern characteristics in a video feed received from the host device; detecting an instance of the identifier pattern in a video feed from the host device; determining the detected pattern includes counterfeit information (e.g., an invalid identifier) indicative that a fake secure window is displayed as a phishing attempt on the monitor by the host device; and displaying a warning of the phishing attempt on the monitor.
References in the specification to “one embodiment,” “an embodiment,” “an example embodiment,” etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
In the discussion, unless otherwise stated, adjectives modifying a condition or relationship characteristic of a feature or features of an implementation of the disclosure, should be understood to mean that the condition or characteristic is defined to within tolerances that are acceptable for operation of the implementation for an application for which it is intended. Furthermore, if the performance of an operation is described herein as being “in response to” one or more factors, it is to be understood that the one or more factors may be regarded as a sole contributing factor for causing the operation to occur or a contributing factor along with one or more additional factors for causing the operation to occur, and that the operation may occur at any time upon or after establishment of the one or more factors. Still further, where “based on” is used to indicate an effect being a result of an indicated cause, it is to be understood that the effect is not required to only result from the indicated cause, but that any number of possible additional causes may also contribute to the effect. Thus, as used herein, the term “based on” should be understood to be equivalent to the term “based at least on.”
Numerous example embodiments have been described above. Any section/subsection headings provided herein are not intended to be limiting. Embodiments are described throughout this document, and any type of embodiment may be included under any section/subsection. Furthermore, embodiments disclosed in any section/subsection may be combined with any other embodiments described in the same section/subsection and/or a different section/subsection in any manner.
Furthermore, example embodiments have been described above with respect to one or more running examples. Such running examples describe one or more particular implementations of the example embodiments; however, embodiments described herein are not limited to these particular implementations.
Moreover, according to the described embodiments and techniques, any components of systems, computing devices, servers, device management services, virtual machine provisioners, applications, and/or data stores and their functions may be caused to be activated for operation/performance thereof based on other operations, functions, actions, and/or the like, including initialization, completion, and/or performance of the operations, functions, actions, and/or the like.
In some example embodiments, one or more of the operations of the flowcharts described herein may not be performed. Moreover, operations in addition to or in lieu of the operations of the flowcharts described herein may be performed. Further, in some example embodiments, one or more of the operations of the flowcharts described herein may be performed out of order, in an alternate sequence, or partially (e.g., or completely) concurrently with each other or with other operations.
The embodiments described herein and/or any further systems, sub-systems, devices and/or components disclosed herein may be implemented in hardware (e.g., hardware logic/electrical circuitry), or any combination of hardware with software (e.g., computer program code configured to be executed in one or more processors or processing devices) and/or firmware.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the embodiments. Thus, the breadth and scope of the embodiments should not be limited by any of the above-described example embodiments, but should be defined only in accordance with the following claims and their equivalents.
This application claims priority to U.S. Provisional Patent Application Ser. No. 63/606,969, filed Dec. 6, 2023, and titled “PHISHING PROTECTION,” the entirety of which is incorporated by reference herein.
| Number | Date | Country | |
|---|---|---|---|
| 63606969 | Dec 2023 | US |