US 12,425,446 B2
Prevention of vishing attacks
Michael F. Angelo, Houston, TX (US); and Douglas Max Grover, Rigby, ID (US)
Assigned to Micro Focus LLC, Santa Clara, CA (US)
Filed by MICRO FOCUS LLC, Santa Clara, CA (US)
Filed on Jan. 3, 2023, as Appl. No. 18/149,618.
Prior Publication US 2024/0223604 A1, Jul. 4, 2024
Int. Cl. H04L 9/40 (2022.01); H04L 65/1069 (2022.01); H04L 65/403 (2022.01)
CPC H04L 63/1466 (2013.01) [H04L 63/1483 (2013.01); H04L 65/1069 (2013.01); H04L 65/403 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system, comprising:
a microprocessor; and
a computer readable medium, coupled with the microprocessor and comprising microprocessor readable and executable instructions that, when executed by the microprocessor, cause the microprocessor to:
receive a first communication stream, wherein the first communication stream is part of a first communication session;
determine if the first communication stream is completely generated using a first session watermark;
in response to determining that the first communication stream is completely generated using the first session watermark, identifying the first communication stream as a legitimate communication stream; and
in response to determining that the first communication stream has not been completely generated using the first session watermark identifying the first communication stream as a vishing communication stream and/or a potential vishing communication stream,
wherein determining if the first communication stream is completely generated using the first session watermark is accomplished by comparing the first communication stream to a second communication stream that was completely generated with the first session watermark,
wherein the second communication stream is a copy of the first communication stream, and
wherein the first communication stream and the second communication stream are both sent by a same communication device.