DETECTING MALICIOUS EMAIL ATTACKS BASED ON ENTITY IMAGE ANALYSIS

    公开(公告)号:US20240333762A1

    公开(公告)日:2024-10-03

    申请号:US18192453

    申请日:2023-03-29

    CPC classification number: H04L63/1483 G06F40/30 G06V10/40 G06V2201/09

    Abstract: In some aspects, the techniques described herein relate to a method for detecting malicious emails, the method including: receiving an email, wherein the email is associated with a markup payload; determining, based on the markup payload, text data associated with the email; determining, using the text data and a first machine learning model, a first representation of the email representing text associated with the email; rendering the email to generate image data that represents a rendering of the email; determining, using the image data and a second machine learning model, a second representation of the email that represents at least the rendering of the email; and determining a prediction for the email based on the first representation and the second representation, wherein the prediction represents whether the email is predicted to be malicious based on the first representation and the second representation.

    SYSTEM TO AUTHENTICATE A PRODUCT AND A METHOD THEREOF

    公开(公告)号:US20240127266A1

    公开(公告)日:2024-04-18

    申请号:US18542074

    申请日:2023-12-15

    CPC classification number: G06Q30/0185 G06F16/9566 G06V10/70 G06V2201/09

    Abstract: The present disclosure relates to the field of product authentication and verification and discloses a system (100) and method (200) to authenticate a product. The system (100) comprises a memory (102), a scanning module (104), a product identification module (108), a first re-direction module (106) and a second re-direction module (110). The product identification module (108) detects a design printed on the packaging of products and identifies products based on pre-trained machine learning model and detected design. The scanning module (104) facilitates user to scan visual codes printed on products and extracts UIDs and verification URLs from scanned visual code. The first re-direction module (106) receives extracted UID and verification URL if product is identified and screens extracted URL to identify its authenticity. The second re-direction module (110) re-directs users to a third-party verification platform at the embedded URL for product verification if product is not identified.

Patent Agency Ranking