首页>
外国专利>
RESPONSIVE ACTIONS TO SUSPICIOUS E-MAIL, AS INFERRED FROM NEGATIVE USER ASSESSMENT, BY THIRD PARTY SECURITY SYSTEMS WITHOUT MODIFICATION OF EXISTING E-MAIL CLIENTS
RESPONSIVE ACTIONS TO SUSPICIOUS E-MAIL, AS INFERRED FROM NEGATIVE USER ASSESSMENT, BY THIRD PARTY SECURITY SYSTEMS WITHOUT MODIFICATION OF EXISTING E-MAIL CLIENTS
展开▼
机译:可疑操作对可疑电子邮件,从负用户评估推断,第三方安全系统,无需修改现有的电子邮件客户
展开▼
页面导航
摘要
著录项
相似文献
摘要
A data security system, including a security manager computer making network application programming interface (API) calls to a cloud-based service that performs data exchange transactions among end users, the API calls remotely controlling the cloud-based service so that the security manager computer accesses transactions that have entered the cloud-based service, whereby an end user may forward a transaction received through the cloud-based service to a central authority as being a potentially harmful or deceptive transaction, and a data inspector operative to analyze a transaction as being indeed harmful or deceptive, by applying machine learning, wherein the security manager computer controls the cloud-based service so as to transmit to the security manager transactions forwarded to the central authority, instead of or in addition to transmitting these transactions to the central authority, for analysis by the data inspector.
展开▼