Browse Prior Art Database

Social Mail Threat Management System Disclosure Number: IPCOM000216622D
Publication Date: 2012-Apr-10
Document File: 4 page(s) / 28K

Publishing Venue

The Prior Art Database


Disclosed is a security system and method applied to a social software platform that utilizes analytics to manage unsolicited messages. The system identifies threats associated with the rendering of specially crafted or non-solicited social messages and/or gadgets that link an individual's system with a malicious or an unintended backend.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 40% of the total text.

Page 01 of 4

Social Mail Threat Management System

With the popularity and ubiquity of email, many companies leverage mail and social messages as a workflow trigger. These workflow triggers include File Sharing Notifications, Sales Opportunity Notifications, Social Network Invitations, Project Management Task Notification, and many more.

With the rise of enhanced workflow triggers via social media, and email, applications, there emerges a new threat vector. The vector is associated with the rendering of specially crafted or non-solicited messages that link an individual's system with a malicious or unintended backend. These threats may be independent of content contained within the message. The independence comes from the remote gadget, or Uniform Resource Locator (URL)-based resource, which may be used to render the social mail, message, or embedded experience aspect of an application.

There is a clear need for a system to address issues with specially crafted mime-type messages that render gadgets.

In traditional email systems, a user may create sophisticated embedded content (e.g., embedded Hypertext Markup Language (HTML) or objects) that is passed with the mail message and rendered based on the capabilities of the mail client - ActiveX controls, Embedded Browser. The details of the rendering are included in the mail message. The social mail system does not embed the content or the rendering details directly in the email message.

The disclosed system curtails gadget rendering in a social mail environment by: (Note: these numbers are referenced in the example embodiments that follow.)

1. Identifying targets of message (to, cc, bcc) of a social mail

2. Identifying a social distance of the targets and originator

3. Establishing a threat rating based on social distance, where the rating is based on ideal social distance versus actual social distance

4. Applying a level of constraint to the rendering gadget

To generate the Threat Rating (1), the system:

1. Sums the total number of recipients and originators in the email

2. Calculates the social distance from one user to originator

3. Sums the total social distance for the users

4. Divides the sum of recipients and originators by social distance

5. Assigns a rating based on low, medium and high ranges

6. Has the ability/option to:

A. Further calculate the degrees of separation from user to another user in the social network (e.g., User1 is connected to User3, who is connected to User2. User1 is a secondary relation to User2)

B. Further use the organizational hierarchy to calculate the separation

C. Calculate the social distance for the total matrix of users, or choose the primary subset of users


Page 02 of 4

D. Calculate this number on demand or in route

E. Adjust the calculation based on detected gadget modification from original state (e.g., User2 launches the social mail twice, he can calculate twice, or

just once, or combine the two calculations)

F. Be applied based on the primary key or m...