US 12,335,254 B2
Malicious universal resource locator and file detector and response action engine
George Anthony Albero, Charlotte, NC (US); and Elijah Clark, Charlotte, NC (US)
Assigned to BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed by BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed on Jul. 19, 2022, as Appl. No. 17/868,463.
Prior Publication US 2024/0031355 A1, Jan. 25, 2024
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/083 (2013.01) [H04L 63/123 (2013.01); H04L 63/1416 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A system for electronic communication security, the system comprising:
a first computing platform having a first memory and one or more first computing processor devices in communication with the first memory, wherein the first memory stores a security token assignment module that is (i) executable by at least one of the one or more first computing processor devices and (ii) configured to:
detect at least one chosen from the group consisting of (i) an embedded Universal Resource Locator (URLs) within a first electronic mail (email), and (ii) attachment of a file to the first email, wherein the first email is being sent from a sender having a first email address of a first domain to a first recipient having a second email address of the first domain,
in response to detecting the least one of the embedded URL and the attachment of the file, assign one or more security tokens to the first email, each of the one or more security tokens corresponding to the embedded URL or the attached file detected in the first email, wherein the security token is a passcode,
store the one or more assigned security tokens in a database, wherein the database associates a security token with a corresponding embedded URL or attached file,
provide for communication of the one or more assigned security tokens to the first recipient in a communication other than the first email comprising a Short Message Service (SMS) message or another email,
in response to detecting the least one of the embedded URL and the attachment of the file, inactivate the at least one of the embedded URL and attached file;
a second computing platform having a second memory and one or more second computing processor devices in communication with the second memory, wherein the second memory stores a URL/file verification module that is (i) executable by at least one of the one or more computing processor devices and (ii) configured to:
in response to the first recipient receiving (i) the one or more assigned security tokens, and (ii) the first email, attempt to verify an authenticity of the at least one of the embedded URL and the attached file by comparing the received one or more assigned security tokens to the assigned security tokens stored in the database,
in response to determining matches for each of the received one or more assigned security tokens and the assigned security tokens stored in the database, activate the at least one of the embedded URL and the attached file in the first email, and
in response to failing to determine matches for at least one of the received one or more assigned security tokens and the assigned security tokens stored in the database, auto-forward the first email to one or more suspicious activity reporting entities.