Electronic mail verification

ABSTRACT

Aspects of the disclosure relate to email verification. A computing platform may receive an electronic message and identify one or more portions of content in the message. Then, the computing platform may generate and embed one or more message-specific identifiers into the electronic message and store electronic message information associating the one or more portions of content with the one or more embedded message-specific identifiers. Thereafter, the computing platform may receive an electronic message verification request to verify authenticity of an identified electronic message received by a computing device. The computing platform may prompt a user of the computing device to provide authentication information associated with one or more portions of content of the identified electronic message. Based on comparing the authentication information provided by the user to the stored electronic message information, the computing platform may determine whether the identified electronic message is valid and send a notification accordingly.

BACKGROUND

Aspects of the disclosure relate to computer system security andidentifying fraudulent electronic mail (email). In particular, one ormore aspects of the disclosure relate to email verification.

Many organizations rely on email as an important communication tool. Agrowing concern for such organizations is the practice of “phishing,”which involves tricking a user into visiting a fraudulent website thatappears to be a legitimate website, and then soliciting personalinformation from the user. For example, the user may be fooled intogiving away personal information which might then be used by theoperators of the fraudulent website or others to steal the user'sidentity and/or make purchases under the user's name and account.Oftentimes, these phishing attempts may be accomplished through the useof email. In many instances, as phishing emails become more complex andlook ever more legitimate, it may be harder for recipients to identifyauthentic emails from fraudulent ones.

SUMMARY

Aspects of the disclosure provide effective, efficient, scalable, andconvenient technical solutions that address and overcome the technicalproblems associated with email verification. For example, some aspectsof the disclosure provide ways for a user (e.g., a recipient of anemail) to verify the legitimacy of (e.g., validate the origin of) anemail in question, such as by entering information about the email intoa web form (e.g., a code included in the email, an email address of therecipient, and/or other additional information about the email message),which would then yield details about what the email message shouldcontain. Such details about what the email message should contain (e.g.,who or what group sent the email, wording that the email should contain,a time the email was sent, a subject of the email, an email address ofthe originator, or the like) may then be used to match against the emailin question (e.g., to validate contents of the received email).Additional aspects of the disclosure may relieve email recipients of theneed to rely on an email provider to implement or adhere totechnological standards since the techniques for email verificationdescribed herein may be agonistic with regard to the technology used todeliver and/or receive email content.

In accordance with one or more embodiments, a computing platform havingat least one processor, a communication interface, and memory mayreceive, via the communication interface, an electronic message thatincludes one or more portions of content. The computing platform mayidentify the one or more portions of content in the electronic message.The computing platform may generate one or more message-specificidentifiers that may uniquely identify the one or more portions ofcontent in the electronic message. Subsequently, the computing platformmay embed the one or more message-specific identifiers into theelectronic message. The computing platform may store, in an electronicmessage database, electronic message information associating the one ormore portions of content of the electronic message with the one or moremessage-specific identifiers embedded into the electronic message. Then,the computing platform may receive, via the communication interface, anelectronic message verification request from at least one computingdevice to verify authenticity of an identified electronic messagereceived by the at least one computing device. Next, the computingplatform may prompt a user of the at least one computing device toprovide authentication information. In addition, the authenticationinformation may include information associated with one or more portionsof content of the identified electronic message received by the at leastone computing device. The computing platform may compare theauthentication information provided by the user of the at least onecomputing device to the electronic message information stored in theelectronic message database. Based on comparing the authenticationinformation provided by the user of the at least one computing device tothe electronic message information stored in the electronic messagedatabase, the computing platform may determine whether the identifiedelectronic message is valid. Then, the computing platform may send, viathe communication interface, to the at least one computing device, anotification indicating whether the identified electronic message isvalid.

In some embodiments, the computing platform may cause the electronicmessage including the one or more message-specific identifiers to besent, via the communication interface, to the at least one computingdevice.

In some embodiments, based on determining that the identified electronicmessage is not valid, the computing platform may send, via thecommunication interface, an alert to an enterprise computing device.

In some embodiments, based on determining that the identified electronicmessage is not valid, the computing platform may send, via thecommunication interface, a copy of the identified electronic message toan enterprise computing device.

In some embodiments, in response to receiving the electronic messageverification request from the at least one computing device, thecomputing platform may send, via the communication interface, anauthenticated image to the at least one computing device, where theauthenticated image verifies authenticity of the identified electronicmessage received by the at least one computing device.

In some embodiments, prompting the user of the at least one computingdevice to provide authentication information may include prompting theuser to input one or more of: an email address of a sender of theidentified electronic message, a time the identified electronic messagewas sent, a date the identified electronic message was sent, a subjectof the identified electronic message, or a portion of content at aspecific location in the identified electronic message.

In some embodiments, prompting a user of the at least one computingdevice to provide authentication information may include prompting theuser to enter the authentication information into a verification page onan online banking website to retrieve verification information.

In some embodiments, prompting a user of the at least one computingdevice to provide authentication information may include prompting theuser to capture a unique graphical identifier in the identifiedelectronic message.

These features, along with many others, are discussed in greater detailbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIGS. 1A and 1B depict an illustrative computing environment for emailverification in accordance with one or more example embodiments;

FIGS. 2A-2C depict an illustrative event sequence for email verificationin accordance with one or more example embodiments;

FIGS. 3-5 depict example graphical user interfaces for emailverification in accordance with one or more example embodiments; and

FIG. 6 depicts an illustrative method for email verification inaccordance with one or more example embodiments.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

It is noted that various connections between elements are discussed inthe following description. It is noted that these connections aregeneral and, unless specified otherwise, may be direct or indirect,wired or wireless, and that the specification is not intended to belimiting in this respect.

FIGS. 1A and 1B depict an illustrative computing environment for emailverification in accordance with one or more example embodiments.Referring to FIG. 1A, computing environment 100 may include one or morecomputing devices and/or other computing systems. For example, computingenvironment 100 may include email verification computing platform 110,database computer system 120, enterprise user computing device 130, andcustomer computing device 140. Although one enterprise user computingdevice 130 is shown for illustrative purposes, any number of enterpriseuser computing devices may be used without departing from thedisclosure. In addition, although one customer computing device 140 isshown for illustrative purposes, any number of customer computingdevices may be used without departing from the disclosure.

As illustrated in greater detail below, email verification computingplatform 110 may include one or more computing devices configured toperform one or more of the functions described herein. For example,email verification computing platform 110 may include one or morecomputers (e.g., laptop computers, desktop computers, servers, serverblades, or the like).

Database computer system 120 may include different information storageentities storing electronic messages and/or information associated withthe electronic messages. In some examples, database computer system 120may store a collection of emails that have been previously sent (e.g.,over a period of time). In some examples, database computer system 120may store electronic message information associating one or moreportions of content of an electronic message with one or moremessage-specific identifiers embedded into the electronic message.

Enterprise user computing device 130 may include one or more computingdevices and/or other computer components (e.g., processors, memories,communication interfaces). For instance, enterprise user computingdevice 130 may be a server, desktop computer, laptop computer, tablet,mobile device, or the like, and may be associated with an enterpriseorganization operating email verification computing platform 110.Customer computing device 140 may include one or more computing devicesand/or other computer components (e.g., processors, memories,communication interfaces). For instance, customer computing device 140may be a server, desktop computer, laptop computer, tablet, mobiledevice, or the like, and may be used by a customer of an organization,such as a customer of a financial institution.

Computing environment 100 also may include one or more networks, whichmay interconnect one or more of email verification computing platform110, database computer system 120, enterprise user computing device 130,and customer computing device 140. For example, computing environment100 may include private network 150 and public network 160. Privatenetwork 150 and/or public network 160 may include one or moresub-networks (e.g., local area networks (LANs), wide area networks(WANs), or the like).

Private network 150 may be associated with a particular organization(e.g., a corporation, financial institution, educational institution,governmental institution, or the like) and may interconnect one or morecomputing devices associated with the organization. For example, emailverification computing platform 110, database computer system 120, andenterprise user computing device 130 may be associated with anorganization (e.g., a financial institution), and private network 150may be associated with and/or operated by the organization, and mayinclude one or more networks (e.g., LANs, WANs, virtual private networks(VPNs), or the like) that interconnect email verification computingplatform 110, database computer system 120, and enterprise usercomputing device 130 and one or more other computing devices and/orcomputer systems that are used by, operated by, and/or otherwiseassociated with the organization.

Public network 160 may connect private network 150 and/or one or morecomputing devices connected thereto (e.g., email verification computingplatform 110, database computer system 120, and enterprise usercomputing device 130) with one or more networks and/or computing devicesthat are not associated with the organization. For example, customercomputing device 150 might not be associated with an organization thatoperates private network 150, and public network 160 may include one ormore networks (e.g., the Internet) that connect customer computingdevice 150 to private network 150 and/or one or more computing devicesconnected thereto (e.g., email verification computing platform 110,database computer system 120, and enterprise user computing device 130).

In one or more arrangements, email verification computing platform 110,database computer system 120, enterprise user computing device 130, andcustomer computing device 140 may be any type of computing devicecapable of receiving a user interface, receiving input via the userinterface, and communicating the received input to one or more othercomputing devices. For example, email verification computing platform110, database computer system 120, enterprise user computing device 130,customer computing device 140, and/or the other systems included incomputing environment 100 may, in some instances, include one or moreprocessors, memories, communication interfaces, storage devices, and/orother components. As noted above, and as illustrated in greater detailbelow, any and/or all of the computing devices included in computingenvironment 100 may, in some instances, be special-purpose computingdevices configured to perform specific functions.

Referring to FIG. 1B, email verification computing platform 110 mayinclude one or more processor(s) 111, memory(s) 112, and communicationinterface(s) 113. A data bus may interconnect processor 111, memory 112,and communication interface 113. Communication interface 113 may be anetwork interface configured to support communication between emailverification computing platform 110 and one or more networks (e.g.,private network 150, public network 160, or the like). Memory 112 mayinclude one or more program modules having instructions that whenexecuted by processor 111 cause email verification computing platform110 to perform one or more functions described herein and/or one or moredatabases and/or other libraries that may store and/or otherwisemaintain information which may be used by such program modules and/orprocessor 111.

In some instances, the one or more program modules and/or databases maybe stored by and/or maintained in different memory units of emailverification computing platform 110 and/or by different computingdevices that may form and/or otherwise make up email verificationcomputing platform 110. For example, memory 112 may have, store, and/orinclude an email verification module 112 a and an email verificationdatabase 112 b. Email verification module 112 a may have instructionsthat direct and/or cause email verification computing platform 110 to,for instance, verify the authenticity of an email and determine how torespond, as discussed in greater detail below. Email verificationdatabase 112 b may store information used by email verification module112 a and/or email verification computing platform 110 in verifying theauthenticity of email and/or in performing other functions, as discussedin greater detail below.

FIGS. 2A-2C depict an illustrative event sequence for email verificationin accordance with one or more example embodiments. Referring to FIG.2A, at step 201, email verification computing platform 110 may receive,via a communication interface (e.g., communication interface 113), anelectronic message comprising one or more portions of content. Forexample, at step 201, email verification computing platform 110 mayreceive an electronic mail message from an enterprise user computingdevice 130, from which email messages may be composed by a user of theenterprise user computing device 130.

At step 202, email verification computing platform 110 may identify theone or more portions of content in the electronic message. For example,email verification computing platform 110 may parse or extractinformation from the received electronic message, such as informationfrom a header field, a message subject, a message sender, a messagegroup to/from header, and/or other information from the header fields ofthe email and/or from the body of the email. At step 203, emailverification computing platform 110 may generate one or moremessage-specific identifiers (e.g., a unique symmetric key). Suchmessage-specific identifiers may uniquely identify the one or moreportions of content in the electronic message, including informationfrom the header fields of the email and/or from the body of the email.

At step 204, email verification computing platform 110 may embed the oneor more message-specific identifiers into the electronic message. Forexample, email verification computing platform 110 may embed the one ormore message-specific identifiers into the electronic message by addingan element (e.g., code, an authentication token, a validation token,and/or the like) to the email that is sent with the email but might notbe displayed to the user.

Referring to FIG. 2B, at step 205, email verification computing platform110 may store, in an electronic message database, electronic messageinformation associating the one or more portions of content of theelectronic message with the one or more message-specific identifiersembedded into the electronic message. For example, email verificationcomputing platform 110 may cause an electronic message database (e.g.,database computer system 120) to store information associating the oneor more portions of content of the electronic message with a one-timepassword or token included in the electronic message.

At step 206, in some embodiments, email verification computing platform110 may cause the electronic message including the one or moremessage-specific identifiers to be sent, via the communication interface(e.g., communication interface 113), to at least one computing device(e.g., email server, email reception device, or the like). For example,email verification computing platform 110 may cause the electronicmessage including the one or more message-specific identifiers to besent to a customer using a customer computing device 140. Additionallyor alternatively, the electronic message including the one or moremessage-specific identifiers may be sent to non-clients or potentialclients (e.g., users receiving marketing information associated withproducts and/or services offered by the originator of the email).

At step 207, email verification computing platform 110 may receive, viathe communication interface (e.g., communication interface 113), anelectronic message verification request from the at least one computingdevice (e.g., customer computing device 140) to verify authenticity ofan identified electronic message received by the at least one computingdevice. In turn, at step 208, email verification computing platform 110may prompt a user of the at least one computing device (e.g., customercomputing device 140) to provide authentication information. Inaddition, the authentication information may include informationassociated with one or more portions of content of the identifiedelectronic message received by the at least one computing device. Forexample, email verification computing platform 110 may cause the atleast one computing device (e.g., customer computing device 140) todisplay and/or otherwise present one or more graphical user interfacessimilar to graphical user interface 300, which is illustrated in FIG. 3. As seen in FIG. 3 , graphical user interface 300 may include textand/or other information prompting the user of the at least onecomputing device (e.g., customer computing device 140) to provideauthentication information associated with one or more portions ofcontent of an identified electronic message received by the at least onecomputing device (e.g., “Welcome to email message verification service.Please enter the following information about your email. [Enter youremail address] [Enter code shown in email] [Enter additional details].”)

In some examples, prompting a user of the at least one computing deviceto provide authentication information may include prompting the user toenter the authentication information into a verification page on anonline banking website to retrieve verification information. In someexamples, prompting the user of the at least one computing device toprovide authentication information may include prompting the user of theat least one computing device (e.g., customer computing device 140) toinput one or more of: an email address of a sender of the identifiedelectronic message, a time the identified electronic message was sent, adate the identified electronic message was sent, a subject of theidentified electronic message, or a portion of content at a specificlocation in the identified electronic message. For instance, the user ofthe at least one computing device (e.g., customer computing device 140)may be prompted to identify or enter words that are at specific pointswithin the body of the email. In some examples, prompting a user of theat least one computing device (e.g., customer computing device 140) toprovide authentication information may include prompting the user tocapture a unique graphical identifier in the identified electronicmessage. For instance, the user of the at least one computing device(e.g., customer computing device 140) might be presented with a QR codeor other graphical code on the computing device and may be prompted touse an application (e.g., a mobile phone camera or scanner) to capturethe code, which may then be sent to email verification computingplatform 110 for verification.

In some embodiments, in response to receiving the electronic messageverification request from the at least one computing device at step 207,the computing platform may provide the user with additional checks. Forexample, the computing platform may send, via the communicationinterface (e.g., communication interface 113), an authenticated image orlogo to the at least one computing device (e.g., customer computingdevice 140) that may assist in verifying authenticity of the identifiedelectronic message received by the at least one computing device (e.g.,by matching against the user's received email).

Referring to FIG. 2C, at step 209, email verification computing platform110 may receive the authentication information from the at least onecomputing device (e.g., provided at user interface 300). In turn, atstep 210, email verification computing platform 110 may compare theauthentication information provided by the user of the at least onecomputing device (e.g., customer computing device 140) to the electronicmessage information stored in the electronic message database (e.g.,database computer system 120). For example, email verification computingplatform 110 may execute the comparison by performing a search throughall of the stored emails in database computer system 120 that pertain toa specific recipient, a specific period, or that include a specificcode. At step 211, based on comparing the authentication informationprovided by the user of the at least one computing device (e.g.,customer computing device 140) to the electronic message informationstored in the electronic message database (e.g., database computersystem 120), the computing platform may determine whether the identifiedelectronic message is valid (e.g., whether database computer system 120has a record or no record of the email in question).

At step 212, email verification computing platform 110 may send, via thecommunication interface (e.g., communication interface 113), to the atleast one computing device, a notification indicating whether theidentified electronic message is valid. For example, in sending thenotification (e.g., at step 212), email verification computing platform110 may cause the at least one computing device (e.g., customercomputing device 140) to display and/or otherwise present one or moregraphical user interfaces similar to graphical user interfaces 400 and500, which are illustrated in FIGS. 4 and 5 , respectively. As seen inFIGS. 4 and 5 , graphical user interfaces 400 and 500 may include textand/or other information indicating whether the identified electronicmessage is valid. As seen in FIG. 4 , graphical user interface 400 mayinclude text and/or other information indicating that the identifiedelectronic message is valid (e.g., “We can confirm that the email wassent from us. [See details]”). As seen in FIG. 5 , graphical userinterface 500 may include text and/or other information indicating thatthe identified electronic message is valid (“Sorry, the email was notsent from us. Please contact our support team. [See details]”). In thisregard, graphical user interfaces 400 and 500 may provide details suchas who or what group sent the email, wording that the email shouldcontain, a time the email was sent, a subject of the email, an emailaddress of the originator, or the like, such that the user may validatethe details against a received email message. It will be appreciatedthat other and/or different notifications may also be provided.

In some examples, based on determining that the identified electronicmessage is not valid, email verification computing platform 110 maysend, via the communication interface (e.g., communication interface113), an alert to an enterprise computing device (e.g., enterprisecomputing device 130). For instance, email verification computingplatform 110 may forward the email to an abuse mailbox at enterprisecomputing device 130 or other computing device for review, remediation,or other resolution. In other examples, based on determining that theidentified electronic message is not valid, email verification computingplatform 110 may send, via the communication interface (e.g.,communication interface 113), a copy of the identified electronicmessage to an enterprise computing device. For instance, emailverification computing platform 110 may instantly upload the emailcontent, thereby providing instant reporting of a suspicious ormalicious email without relying on the user device to forward the emailseparately.

FIG. 6 depicts an illustrative method for email verification inaccordance with one or more example embodiments. Referring to FIG. 6 ,at step 605, a computing platform having at least one processor, acommunication interface, and memory may receive, via the communicationinterface, an electronic message that includes one or more portions ofcontent. At step 610, the computing platform may identify the one ormore portions of content in the electronic message. At step 615, thecomputing platform may generate one or more message-specific identifiersthat may uniquely identify the one or more portions of content in theelectronic message. At step 620, the computing platform may embed theone or more message-specific identifiers into the electronic message. Atstep 625, the computing platform may store, in an electronic messagedatabase, electronic message information associating the one or moreportions of content of the electronic message with the one or moremessage-specific identifiers embedded into the electronic message. Atstep 630, the computing platform may receive, via the communicationinterface, an electronic message verification request from at least onecomputing device to verify authenticity of an identified electronicmessage received by the at least one computing device. At step 635, thecomputing platform may prompt a user of the at least one computingdevice to provide authentication information. In addition, theauthentication information may include information associated with oneor more portions of content of the identified electronic messagereceived by the at least one computing device. At step 640, thecomputing platform may compare the authentication information providedby the user of the at least one computing device to the electronicmessage information stored in the electronic message database. At step645, based on comparing the authentication information provided by theuser of the at least one computing device to the electronic messageinformation stored in the electronic message database, the computingplatform may determine whether the identified electronic message isvalid. At step 650, the computing platform may send, via thecommunication interface, to the at least one computing device, anotification indicating whether the identified electronic message isvalid.

One or more aspects of the disclosure may be embodied in computer-usabledata or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices to performthe operations described herein. Generally, program modules includeroutines, programs, objects, components, data structures, and the likethat perform particular tasks or implement particular abstract datatypes when executed by one or more processors in a computer or otherdata processing device. The computer-executable instructions may bestored as computer-readable instructions on a computer-readable mediumsuch as a hard disk, optical disk, removable storage media, solid-statememory, RAM, and the like. The functionality of the program modules maybe combined or distributed as desired in various embodiments. Inaddition, the functionality may be embodied in whole or in part infirmware or hardware equivalents, such as integrated circuits,application-specific integrated circuits (ASICs), field programmablegate arrays (FPGA), and the like. Particular data structures may be usedto more effectively implement one or more aspects of the disclosure, andsuch data structures are contemplated to be within the scope of computerexecutable instructions and computer-usable data described herein.

Various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination. Inaddition, various signals representing data or events as describedherein may be transferred between a source and a destination in the formof light or electromagnetic waves traveling through signal-conductingmedia such as metal wires, optical fibers, or wireless transmissionmedia (e.g., air or space). In general, the one or morecomputer-readable media may be and/or include one or more non-transitorycomputer-readable media.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, and thelike). For example, in alternative embodiments, one or more of thecomputing platforms discussed above may be combined into a singlecomputing platform, and the various functions of each computing platformmay be performed by the single computing platform. In such arrangements,any and/or all of the above-discussed communications between computingplatforms may correspond to data being accessed, moved, modified,updated, and/or otherwise used by the single computing platform.Additionally or alternatively, one or more of the computing platformsdiscussed above may be implemented in one or more virtual machines thatare provided by one or more physical computing devices. In sucharrangements, the various functions of each computing platform may beperformed by the one or more virtual machines, and any and/or all of theabove-discussed communications between computing platforms maycorrespond to data being accessed, moved, modified, updated, and/orotherwise used by the one or more virtual machines.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one or more of the steps depicted in theillustrative figures may be performed in other than the recited order,and one or more depicted steps may be optional in accordance withaspects of the disclosure.

What is claimed is:
 1. A computing platform, comprising: at least oneprocessor; a communication interface communicatively coupled to the atleast one processor; and memory storing computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: receive, via the communication interface, an electronicmessage comprising one or more portions of content; identify the one ormore portions of content in the electronic message; generate one or moremessage-specific identifiers that uniquely identify the one or moreportions of content in the electronic message; embed the one or moremessage-specific identifiers into the electronic message; store, in anelectronic message database, electronic message information associatingthe one or more portions of content of the electronic message with theone or more message-specific identifiers embedded into the electronicmessage; receive, via the communication interface, an electronic messageverification request from at least one computing device to verifyauthenticity of an identified electronic message received by the atleast one computing device; prompt a user of the at least one computingdevice to input authentication information into a verification page onan online banking website to verify the authenticity of the identifiedelectronic message received by the at least one computing device,wherein the authentication information includes information associatedwith one or more portions of content of the identified electronicmessage received by the at least one computing device, including aportion of content at a specific location in the identified electronicmessage received by the at least one computing device; compare theauthentication information input by the user of the at least onecomputing device to the electronic message information stored in theelectronic message database; based on comparing the authenticationinformation input by the user of the at least one computing device tothe electronic message information stored in the electronic messagedatabase, determine whether the identified electronic message is valid;and send, via the communication interface, to the at least one computingdevice, a notification indicating whether the identified electronicmessage is valid.
 2. The computing platform of claim 1, wherein thememory stores additional computer-readable instructions that, whenexecuted by the at least one processor, cause the computing platform to:cause the electronic message comprising the one or more message-specificidentifiers to be sent, via the communication interface, to the at leastone computing device.
 3. The computing platform of claim 1, wherein thememory stores additional computer-readable instructions that, whenexecuted by the at least one processor, cause the computing platform to:based on determining that the identified electronic message is notvalid, send, via the communication interface, an alert to an enterprisecomputing device.
 4. The computing platform of claim 1, wherein thememory stores additional computer-readable instructions that, whenexecuted by the at least one processor, cause the computing platform to:based on determining that the identified electronic message is notvalid, send, via the communication interface, a copy of the identifiedelectronic message to an enterprise computing device.
 5. The computingplatform of claim 1, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, cause the computing platform to: in response to receiving theelectronic message verification request from the at least one computingdevice, send, via the communication interface, an authenticated image tothe at least one computing device that verifies authenticity of theidentified electronic message received by the at least one computingdevice.
 6. The computing platform of claim 1, wherein prompting the userof the at least one computing device to input authentication informationfurther comprises prompting the user to input one or more of: an emailaddress of a sender of the identified electronic message, a time theidentified electronic message was sent, a date the identified electronicmessage was sent, or a subject of the identified electronic message. 7.The computing platform of claim 1, wherein prompting a user of the atleast one computing device to input authentication information comprisesprompting the user to capture a unique graphical identifier in theidentified electronic message.
 8. A method, comprising: at a computingplatform comprising at least one processor, a communication interface,and memory: receiving, by the at least one processor, via thecommunication interface, an electronic message comprising one or moreportions of content; identifying, by the at least one processor, the oneor more portions of content in the electronic message; generating, bythe at least one processor, one or more message-specific identifiersthat uniquely identify the one or more portions of content in theelectronic message; embedding, by the at least one processor, the one ormore message-specific identifiers into the electronic message; storing,by the at least one processor, in an electronic message database,electronic message information associating the one or more portions ofcontent of the electronic message with the one or more message-specificidentifiers embedded into the electronic message; receiving, by the atleast one processor, via the communication interface, an electronicmessage verification request from at least one computing device toverify authenticity of an identified electronic message received by theat least one computing device; prompting, by the at least one processor,a user of the at least one computing device to input authenticationinformation into a verification page on an online banking website toverify the authenticity of the identified electronic message received bythe at least one computing device, wherein the authenticationinformation includes information associated with one or more portions ofcontent of the identified electronic message received by the at leastone computing device, including a portion of content at a specificlocation in the identified electronic message received by the at leastone computing device; comparing, by the at least one processor, theauthentication information input by the user of the at least onecomputing device to the electronic message information stored in theelectronic message database; based on comparing the authenticationinformation input by the user of the at least one computing device tothe electronic message information stored in the electronic messagedatabase, identifying, by the at least one processor, whether theidentified electronic message is valid; and sending, by the at least oneprocessor, via the communication interface, to the at least onecomputing device, a notification indicating whether the identifiedelectronic message is valid.
 9. The method of claim 8, furthercomprising: causing the electronic message comprising the one or moremessage-specific identifiers to be sent, via the communicationinterface, to the at least one computing device.
 10. The method of claim8, further comprising: based on determining that the identifiedelectronic message is not valid, sending, by the at least one processor,via the communication interface, an alert to an enterprise computingdevice.
 11. The method of claim 8, further comprising: based ondetermining that the identified electronic message is not valid,sending, by the at least one processor, via the communication interface,a copy of the identified electronic message to an enterprise computingdevice.
 12. The method of claim 8, further comprising: in response toreceiving the electronic message verification request from the at leastone computing device, sending, by the at least one processor, via thecommunication interface, an authenticated image to the at least onecomputing device that verifies authenticity of the identified electronicmessage received by the at least one computing device.
 13. The method ofclaim 8, wherein prompting the user of the at least one computing deviceto input authentication information further comprises prompting the userto input one or more of: an email address of a sender of the identifiedelectronic message, a time the identified electronic message was sent, adate the identified electronic message was sent, or a subject of theidentified electronic message.
 14. The method of claim 8, whereinprompting a user of the at least one computing device to inputauthentication information comprises prompting the user to capture aunique graphical identifier in the identified electronic message. 15.One or more non-transitory computer-readable media storing instructionsthat, when executed by a computing platform comprising at least oneprocessor, a communication interface, and memory, cause the computingplatform to: receive, via the communication interface, an electronicmessage comprising one or more portions of content; identify the one ormore portions of content in the electronic message; generate one or moremessage-specific identifiers that uniquely identify the one or moreportions of content in the electronic message; embed the one or moremessage-specific identifiers into the electronic message; store, in anelectronic message database, electronic message information associatingthe one or more portions of content of the electronic message with theone or more message-specific identifiers embedded into the electronicmessage; receive, via the communication interface, an electronic messageverification request from at least one computing device to verifyauthenticity of an identified electronic message received by the atleast one computing device; prompt a user of the at least one computingdevice to input authentication information into a verification page onan online banking website to verify the authenticity of the identifiedelectronic message received by the at least one computing device,wherein the authentication information includes information associatedwith one or more portions of content of the identified electronicmessage received by the at least one computing device, including aportion of content at a specific location in the identified electronicmessage received by the at least one computing device; compare theauthentication information input by the user of the at least onecomputing device to the electronic message information stored in theelectronic message database; based on comparing the authenticationinformation input by the user of the at least one computing device tothe electronic message information stored in the electronic messagedatabase, determine whether the identified electronic message is valid;and send, via the communication interface, to the at least one computingdevice, a notification indicating whether the identified electronicmessage is valid.
 16. The one or more non-transitory computer-readablemedia of claim 15, wherein the instructions are configured to, whenexecuted, further cause the computing platform to: based on determiningthat the electronic message is not valid, send, via the communicationinterface, a copy of the identified electronic message to an enterprisecomputing device.
 17. The one or more non-transitory computer-readablemedia of claim 15, wherein prompting the user of the at least onecomputing device to input authentication information further comprisesprompting the user to input one or more of: an email address of a senderof the identified electronic message, a time the identified electronicmessage was sent, a date the identified electronic message was sent, ora subject of the identified electronic message.