US20120185551A1 - Unwanted e-mail filtering system including voting feedback - Google Patents
Unwanted e-mail filtering system including voting feedback Download PDFInfo
- Publication number
- US20120185551A1 US20120185551A1 US13/429,354 US201213429354A US2012185551A1 US 20120185551 A1 US20120185551 A1 US 20120185551A1 US 201213429354 A US201213429354 A US 201213429354A US 2012185551 A1 US2012185551 A1 US 2012185551A1
- Authority
- US
- United States
- Prior art keywords
- unwanted message
- potentially unwanted
- unwanted
- message
- forwarding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/247—Telephone sets including user guidance or feature selection means facilitating their use
- H04M1/2478—Telephone terminals specially adapted for non-voice services, e.g. email, internet access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/53—Centralised arrangements for recording incoming messages, i.e. mailbox systems
- H04M3/5322—Centralised arrangements for recording incoming messages, i.e. mailbox systems for recording text messages
Definitions
- This invention relates to the field of data processing systems. More particularly, this invention relates to the field of e-mail filtering within such data processing systems.
- the present invention provides a computer program product comprising a computer program operable to control a computer to process received e-mail messages, said computer program comprising:
- filter downloading logic operable to download filter data from a remote source, said filter data specifying a plurality of tests that may be used to identify unwanted e-mail messages;
- e-mail filtering logic operable to receive an e-mail message and to apply said plurality of tests to identify unwanted e-mail messages
- unwanted message reporting logic operable to allow reporting to a filter data generator a new unwanted e-mail message received and not identified by said plurality of tests such that said filter data may be updated to identify said new unwanted e-mail message.
- the invention recognises that unwanted e-mail messages are not generally restricted to a single user and that filtering rules developed in response to receipt of an unwanted e-mail message by one user may well be of use to another user who has yet to receive any of that unwanted e-mail.
- the invention also recognises that the value of allowing users to report the receipt of new unwanted e-mail messages not already trapped by the filters is that the positive identification of that mail as wanted by a user is very strongly indicative of the mail genuinely being a Spam mail that will be unwanted by all users. This contrasts with computer virus reporting or bug reporting by users where the updating of a central resource by a provider needs much more careful consideration before being performed as users may often be incorrect in their assessment of the nature of the problem.
- the tests applied by the filtering mechanisms of preferred embodiments use scoring algorithms to identify received e-mail messages as unwanted e-mail messages.
- the scoring algorithms are generally more flexible and have a chance of identifying new unwanted e-mail messages at their first occurrence due to content matching known criteria for unwanted e-mail messages, such as the presence of predetermined words in a high proportion or characteristics of the addressee list.
- a particularly preferred feature of the invention is that should the tests identify an e-mail message as potentially unwanted then it is forwarded to its addressee together with a prompt that allows the addressee to provide feedback as to whether or not in their opinion the e-mail is an unwanted e-mail message.
- This preferred feature builds upon the realisation that the determination of whether or not an e-mail message is an unwanted e-mail message is primarily in the mind of the recipient and accordingly allowing the recipient to make this decision enables the load of maintaining the rules set to be distributed and a faster and more reliable response achieved.
- a particularly preferred way of facilitating such feedback is to encapsulate the suspect e-mail message within a mark up language document that provides voting buttons to allow the addressee to give their feedback to the system.
- the filtering mechanisms are in place upstream of the primary mail server.
- the invention also provides a computer program product comprising a computer program operable to control a computer to process received e-mail messages, said computer program comprising:
- e-mail filtering logic operable to receive an e-mail message and to apply at least one test to identify a received e-mail message as a potentially unwanted e-mail message
- message forwarding logic operable to forward said potentially unwanted e-mail message to its addressee together with a prompt for said addressee to provide feedback as to whether or not said received e-mail message is an unwanted e-mail message.
- the user feedback mechanism applied to suspect e-mail messages is potentially advantageous in its own right independently of the central downloadable source of filter data.
- the invention also provides a computer program product comprising a computer program operable to control a computer to provide downloadable filter data for identifying unwanted e-mail messages, said computer program comprising:
- filter data updating logic operable in response to receipt of one or more of said user reports to modify said downloadable filter data to add a test to identify a new unwanted e-mail message.
- the source of the downloadable filter data itself represents a complementary aspect of the present invention.
- the downloadable data source and the client system using that downloadable data may be physically separated by considerable distance and may be provided in different countries. Both the client and the data source are separate aspects of the same inventive concept.
- FIG. 1 schematically illustrates an arrangement of a filter data provider and filter data users
- FIG. 2 is a flow diagram illustrating the operation of a client user of the filter data
- FIG. 3 schematically illustrates the encapsulation of a suspect e-mail message within a markup language document with voting buttons
- FIG. 4 is a flow diagram illustrating the processing by a user of the message of FIG. 3 ;
- FIG. 5 is a flow diagram illustrating the response of a system to votes received from recipients of the message of FIG. 3 ;
- FIG. 6 is a flow diagram illustrating the processing applied by the downloadable filtered data provider on receipt of user reports of problem e-mails.
- FIG. 7 is a schematic diagram showing a computer that may be used to implement the above described techniques.
- FIG. 1 illustrates a plurality of e-mail users in the form of client computers connected via respective mail servers and gateways through the internet.
- a central provider 1 of the downloadable filter data uses an attached rule database 2 to generate filter data files that may be downloaded by individual connected gateway computers 4 , 6 , 8 .
- These gateway computers apply the downloaded filter data specified tests to received e-mail messages prior to passing these along to their associated mail servers.
- the individual gateways 4 , 6 , 8 may also apply locally defined filtering rules specific to that particular organisation or user.
- the rules specified in the rule database 2 may be of an algorithmic form rather than a less flexible direct regular expression form.
- a predetermined list of words identified as common within unwanted e-mail messages may be established. Words such as “buy”, “free”, “credit” and others have a relatively higher likelihood of occurrence within unwanted e-mail messages than in wanted e-mail messages.
- By being responsive both to the occurrence of such predetermined rules and the size of the e-mail message itself an indication of the likelihood of an e-mail message being an unwanted e-mail message can be algorithmically determined. Individual words may be given a greater or lesser waiting in the degree to which they indicate that an e-mail message is an unwanted e-mail message.
- the rules may also be responsive to the addressee of a received e-mail message. If a particular e-mail message is detected as being addressed to users who do not exist as well as some that do exist, then this may be indicative of an unwanted e-mail message generated using lexicon based techniques. Depending upon the preponderance of invalid e-mail addresses compared to valid e-mail addresses, such a rule could be used to classify an e-mail message as either definitely unwanted, suspect or wanted.
- FIG. 2 is a flow diagram schematically illustrating the rule based processing that may be applied by the various gateway computers 4 , 6 , 8 .
- an e-mail message is received.
- the e-mail message is compared with the downloaded and locally generated rule sets held by that gateway computer 4 , 6 , 8 and scored as to its likelihood of being an unwanted e-mail message.
- the message is forwarded to the addressee at step 22 .
- FIG. 3 schematically illustrates a markup language document 24 containing the encapsulated suspect e-mail message 26 .
- the voting buttons 28 provided at the foot of the message 24 sent to the user allows the user to provide feedback to a central source effectively voting upon the nature of the encapsulated e-mail message 26 .
- a threshold of a predetermined number of votes positively identifying an e-mail as an unwanted e-mail may be set before triggering a report to the central filter data provider or the generation of a new local rule.
- the feedback mechanism illustrated is shown in the form of classic HTML buttons, but it will be appreciated that different user interface mechanisms may be provided in conjunction with the encapsulated message to allow a user to provide their feedback as to the nature of the encapsulated E-mail message 26 .
- FIG. 4 is a flow diagram illustrating the processing performed by the recipient of a message such as illustrated in FIG. 3 .
- the user receives the message.
- the user votes on the nature of the message by clicking on one of the buttons 28 .
- this vote is returned to the gateway computer 4 , 6 , 8 associated with that user.
- FIG. 5 is a flow diagram illustrating how the gateway computer 4 , 6 , 8 may respond to votes upon suspect e-mail messages.
- the system waits for votes to be received.
- step 38 determines whether or not this newly received vote has the result of making the total number of votes received in relation to that particular encapsulated message 26 exceed a predetermined threshold level, such as three votes positively identifying the encapsulated message 26 as unwanted. If the threshold has not yet been exceeded, then step 40 serves to increment the current count and processing terminates. Processing to accommodate conflicting votes may also be provided.
- step 42 issues a notification to an administrator of the gateway computer 4 , 6 , 8 .
- the notification to the administrator generated at step 42 can give an indication of the unwanted e-mail message and allow the administrator to either confirm or not confirm the appropriateness of now treating that e-mail message as unwanted and generating an associated new rule.
- the administrator makes this confirmation at step 44 .
- step 46 stops further counting of votes relating to that message. If the administrator indicates that the message should not be treated as unwanted, then step 46 stops further counting of votes relating to that message. If the e-mail message is confirmed as unwanted, then step 48 automatically generates a new local rule to filter out that e-mail message and step 50 provides a notification of the nature of that e-mail message to the central downloadable filter data source such that other users may benefit from the experience of the current user.
- FIG. 6 is a flow diagram illustrating how the central source of downloadable filter data may respond to notifications from separate gateway computers 4 , 6 , 8 of newly detected unwanted e-mail messages.
- the system waits for new notifications.
- the system checks as to whether or not a newly received notification means that a threshold level of notifications relating to a particular e-mail message has now been received. If the threshold level has not yet been exceeded, then step 56 increments the current count and processing terminates.
- a central authority confirming new globally applicable rules is notified at step 58 .
- new rules set up within the downloadable filtered data will impact potentially all the users of the system, there is a high level of justification for at least having some level of manual checking of new global rules. It may be that the new rules are automatically added to the set and checked retrospectively in order to provide the optimum speed of response. It could be that the confirmation would not be required if severally highly trusted users reported an e-mail message as unwanted compared with perhaps individual users.
- step 60 If confirmation is being sought, then this is received at step 60 . If the new rule is not confirmed, then step 62 terminates further counting in relation to that e-mail message. If the new rule is confirmed, then step 64 automatically adds it to the downloadable rule set 2 .
- FIG. 7 schematically illustrates a computer 200 of a type that may be used to execute the computer programs described above.
- the computer 200 includes a central processing unit 202 , a random access memory 204 , a read-only memory 206 , a hard disk drive 208 , a display driver 210 and display 212 , a user input/output circuit 214 , a keyboard 216 , a mouse 218 and a network interface circuit 220 , all coupled via a common bus 222 .
- the central processing unit 202 executes computer programs using the random access memory 204 as its working memory.
- the computer programs may be stored within the read-only memory 206 , the hard disk drive 208 or retrieved via the network interface circuit 220 from a remote source.
- the computer 200 displays the results of its processing activity to the user via the display driver 210 and the display 212 .
- the computer 200 receives control inputs from the user via the user input/output circuit 214 , the keyboard 216 and the mouse 218
- the computer program product described above may take the form of a computer program stored within the computer system 200 on the hard disk drive 208 , within the random access memory 204 , within the read-only memory 206 , or downloaded via the network interface circuit 220 .
- the computer program product may also take the form of a recording medium such as a compact disk or floppy disk drive that may be used for distribution purposes.
- the various components of the computer 200 serve to provide the appropriate circuits and logic for carrying out the above described functions and acts.
- the computer 200 illustrated in FIG. 7 is merely one example of a type of computer that may execute the computer program product, method and provide the apparatus described above.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Human Computer Interaction (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A filter mechanism for unwanted e-mail messages uses a downloadable central source (1, 2) of filter rule data. User reports of received unwanted e-mail messages are relayed back to the central source of the filter data and used to automatically update that filter data. An algorithmic approach to identifying characteristics of unwanted e-mail messages may be applied based upon the preponderance of predetermined words within an e-mail message or characteristics of the addressee list. If an e-mail message is identified as suspect, but not definitely unwanted, then it may be encapsulated within a HTML document and sent to its addressee together with buttons (28) allowing the recipient to provide feedback in the form of votes as to whether or not that e-mail message is unwanted. This recipient feedback may be used to establish a new local rule.
Description
- 1. Field of the Invention
- This invention relates to the field of data processing systems. More particularly, this invention relates to the field of e-mail filtering within such data processing systems.
- With the rise in the use of e-mail as a communication mechanism, this has been accompanied by a rise in the occurrence of unsolicited and unwanted e-mail messages. These so-called “Spam” messages cause a number of problems, such as consuming physical network and processing resources as well as wasting the time of the recipients in dealing with these messages in their inbox.
- 2. Description of the Prior Art
- It is known to provide e-mail filtering mechanisms that apply predefined rules to received e-mail messages in order that Spam messages may be identified and automatically deleted. These existing system often work on content filtering with rules based on regular expressions applied to all inbound messages. A significant amount of unwanted e-mail is generally still able to pass through such systems because the filtering rules are not normally maintained to a high degree and tend to lack flexibility to deal with an ever changing problem.
- Viewed from one aspect the present invention provides a computer program product comprising a computer program operable to control a computer to process received e-mail messages, said computer program comprising:
- (i) filter downloading logic operable to download filter data from a remote source, said filter data specifying a plurality of tests that may be used to identify unwanted e-mail messages;
- (ii) e-mail filtering logic operable to receive an e-mail message and to apply said plurality of tests to identify unwanted e-mail messages; and
- (iii) unwanted message reporting logic operable to allow reporting to a filter data generator a new unwanted e-mail message received and not identified by said plurality of tests such that said filter data may be updated to identify said new unwanted e-mail message.
- The invention recognises that unwanted e-mail messages are not generally restricted to a single user and that filtering rules developed in response to receipt of an unwanted e-mail message by one user may well be of use to another user who has yet to receive any of that unwanted e-mail. The invention also recognises that the value of allowing users to report the receipt of new unwanted e-mail messages not already trapped by the filters is that the positive identification of that mail as wanted by a user is very strongly indicative of the mail genuinely being a Spam mail that will be unwanted by all users. This contrasts with computer virus reporting or bug reporting by users where the updating of a central resource by a provider needs much more careful consideration before being performed as users may often be incorrect in their assessment of the nature of the problem. Compared to this, whether or not an e-mail is an unwanted e-mail is a decision that is primarily made in the mind of the recipient and so a report of such an e-mail message to a provider of filtered data is substantially definitive in establishing that the filter data should be modified to prevent receipt of that unwanted e-mail message. This lends the mechanisms well suited to being substantially automated thereby giving a possibility of faster filter generation and anti-Spam protection.
- The tests applied by the filtering mechanisms of preferred embodiments use scoring algorithms to identify received e-mail messages as unwanted e-mail messages. The scoring algorithms are generally more flexible and have a chance of identifying new unwanted e-mail messages at their first occurrence due to content matching known criteria for unwanted e-mail messages, such as the presence of predetermined words in a high proportion or characteristics of the addressee list.
- A particularly preferred feature of the invention is that should the tests identify an e-mail message as potentially unwanted then it is forwarded to its addressee together with a prompt that allows the addressee to provide feedback as to whether or not in their opinion the e-mail is an unwanted e-mail message. This preferred feature builds upon the realisation that the determination of whether or not an e-mail message is an unwanted e-mail message is primarily in the mind of the recipient and accordingly allowing the recipient to make this decision enables the load of maintaining the rules set to be distributed and a faster and more reliable response achieved.
- A particularly preferred way of facilitating such feedback is to encapsulate the suspect e-mail message within a mark up language document that provides voting buttons to allow the addressee to give their feedback to the system.
- Whilst the system could be arranged such that new rules could only be created centrally within the downloading source, preferred embodiments provide the ability for local rules t be created. This allows a faster response for an organisation receiving problems through unwanted e-mail messages and also allows a organisation to treat as unwanted e-mail messages that may not qualify as such in the view of the provider of the downloadable filter data.
- In order to advantageously offload the burden of unwanted e-mail messages from the bulk of the mail systems of an organisation it is preferred that the filtering mechanisms are in place upstream of the primary mail server.
- Viewed from another aspect the invention also provides a computer program product comprising a computer program operable to control a computer to process received e-mail messages, said computer program comprising:
- (i) e-mail filtering logic operable to receive an e-mail message and to apply at least one test to identify a received e-mail message as a potentially unwanted e-mail message; and
- (ii) message forwarding logic operable to forward said potentially unwanted e-mail message to its addressee together with a prompt for said addressee to provide feedback as to whether or not said received e-mail message is an unwanted e-mail message.
- The user feedback mechanism applied to suspect e-mail messages is potentially advantageous in its own right independently of the central downloadable source of filter data.
- Viewed from a further aspect the invention also provides a computer program product comprising a computer program operable to control a computer to provide downloadable filter data for identifying unwanted e-mail messages, said computer program comprising:
- (i) user report receiving logic operable to receive a user report of an unwanted e-mail message received by said user of said downloadable filter data; and
- (ii) filter data updating logic operable in response to receipt of one or more of said user reports to modify said downloadable filter data to add a test to identify a new unwanted e-mail message.
- It will be appreciated that the source of the downloadable filter data itself represents a complementary aspect of the present invention. The downloadable data source and the client system using that downloadable data may be physically separated by considerable distance and may be provided in different countries. Both the client and the data source are separate aspects of the same inventive concept.
- Further aspects of the invention provide a method of processing received e-mail messages and an apparatus for processing received e-mail messages.
- The above, and other objects, features and advantages of this invention will be apparent from the following detailed description of illustrative embodiments which is to be read in connection with the accompanying drawings.
-
FIG. 1 schematically illustrates an arrangement of a filter data provider and filter data users; -
FIG. 2 is a flow diagram illustrating the operation of a client user of the filter data; -
FIG. 3 schematically illustrates the encapsulation of a suspect e-mail message within a markup language document with voting buttons; -
FIG. 4 is a flow diagram illustrating the processing by a user of the message ofFIG. 3 ; -
FIG. 5 is a flow diagram illustrating the response of a system to votes received from recipients of the message ofFIG. 3 ; -
FIG. 6 is a flow diagram illustrating the processing applied by the downloadable filtered data provider on receipt of user reports of problem e-mails; and -
FIG. 7 is a schematic diagram showing a computer that may be used to implement the above described techniques. -
FIG. 1 illustrates a plurality of e-mail users in the form of client computers connected via respective mail servers and gateways through the internet. Acentral provider 1 of the downloadable filter data uses an attachedrule database 2 to generate filter data files that may be downloaded by individual connectedgateway computers individual gateways - The rules specified in the
rule database 2 may be of an algorithmic form rather than a less flexible direct regular expression form. A predetermined list of words identified as common within unwanted e-mail messages may be established. Words such as “buy”, “free”, “credit” and others have a relatively higher likelihood of occurrence within unwanted e-mail messages than in wanted e-mail messages. By being responsive both to the occurrence of such predetermined rules and the size of the e-mail message itself an indication of the likelihood of an e-mail message being an unwanted e-mail message can be algorithmically determined. Individual words may be given a greater or lesser waiting in the degree to which they indicate that an e-mail message is an unwanted e-mail message. When an e-mail message has been processed by this “fuzzy logic” type testing mechanism, then an indication will be given as to whether or not the e-mail message is definitely unwanted, potentially unwanted or wanted. Wanted e-mail messages can be passed through to the addressee, definitely unwanted e-mail messages can be deleted and potentially unwanted e-mail messages can be subject to further processing as described below. - The rules may also be responsive to the addressee of a received e-mail message. If a particular e-mail message is detected as being addressed to users who do not exist as well as some that do exist, then this may be indicative of an unwanted e-mail message generated using lexicon based techniques. Depending upon the preponderance of invalid e-mail addresses compared to valid e-mail addresses, such a rule could be used to classify an e-mail message as either definitely unwanted, suspect or wanted.
-
FIG. 2 is a flow diagram schematically illustrating the rule based processing that may be applied by thevarious gateway computers step 12 the e-mail message is compared with the downloaded and locally generated rule sets held by thatgateway computer - At step 14, a determination is made from the score as to whether or not the e-mail message is definitely unwanted. If the e-mail message falls within this category, then it is deleted at
step 16. If the e-mail message is not definitely unwanted, then it passes to step 18 where a test is made as to whether or not its score indicates that it is a potentially unwanted suspect e-mail message. If the e-mail message is a potentially unwanted E-mail message, then it is passed to step 20 where it is encapsulated within an HTML mail message with voting buttons added to the bottom of the mail message to enable a recipient to provide feedback to a central source as to whether or not that encapsulated mail message is in fact an unwanted mail message. Button is a term that indicates a mechanism within the message allowing automated feedback rather than a specific appearance or coding form. - If the e-mail message is definitely wanted or after encapsulation at
step 20, then the message is forwarded to the addressee atstep 22. -
FIG. 3 schematically illustrates a markup language document 24 containing the encapsulatedsuspect e-mail message 26. The voting buttons 28 provided at the foot of the message 24 sent to the user allows the user to provide feedback to a central source effectively voting upon the nature of the encapsulatede-mail message 26. Within anindividual gateway computer E-mail message 26. -
FIG. 4 is a flow diagram illustrating the processing performed by the recipient of a message such as illustrated inFIG. 3 . At step 30 the user receives the message. Atstep 32 the user votes on the nature of the message by clicking on one of the buttons 28. At step 34 this vote is returned to thegateway computer -
FIG. 5 is a flow diagram illustrating how thegateway computer step 38 determines whether or not this newly received vote has the result of making the total number of votes received in relation to that particular encapsulatedmessage 26 exceed a predetermined threshold level, such as three votes positively identifying the encapsulatedmessage 26 as unwanted. If the threshold has not yet been exceeded, then step 40 serves to increment the current count and processing terminates. Processing to accommodate conflicting votes may also be provided. - If the threshold has now been exceeded, then step 42 issues a notification to an administrator of the
gateway computer - If the administrator indicates that the message should not be treated as unwanted, then step 46 stops further counting of votes relating to that message. If the e-mail message is confirmed as unwanted, then step 48 automatically generates a new local rule to filter out that e-mail message and step 50 provides a notification of the nature of that e-mail message to the central downloadable filter data source such that other users may benefit from the experience of the current user.
- It will be appreciated that the confirmation steps by the administrator could be removed and the process once the votes had exceeded the predetermined threshold level could be completely automated. This accords well with the realisation that the determination of whether or not an e-mail message is a Spam e-mail message is one properly decided by the recipients and intervention by an administrator may not be necessary or appropriate.
-
FIG. 6 is a flow diagram illustrating how the central source of downloadable filter data may respond to notifications fromseparate gateway computers - If the threshold has been exceeded, then a central authority confirming new globally applicable rules is notified at step 58. Given that new rules set up within the downloadable filtered data will impact potentially all the users of the system, there is a high level of justification for at least having some level of manual checking of new global rules. It may be that the new rules are automatically added to the set and checked retrospectively in order to provide the optimum speed of response. It could be that the confirmation would not be required if severally highly trusted users reported an e-mail message as unwanted compared with perhaps individual users.
- If confirmation is being sought, then this is received at step 60. If the new rule is not confirmed, then step 62 terminates further counting in relation to that e-mail message. If the new rule is confirmed, then step 64 automatically adds it to the
downloadable rule set 2. -
FIG. 7 schematically illustrates acomputer 200 of a type that may be used to execute the computer programs described above. Thecomputer 200 includes a central processing unit 202, a random access memory 204, a read-only memory 206, ahard disk drive 208, a display driver 210 anddisplay 212, a user input/output circuit 214, a keyboard 216, amouse 218 and anetwork interface circuit 220, all coupled via a common bus 222. In operation, the central processing unit 202 executes computer programs using the random access memory 204 as its working memory. The computer programs may be stored within the read-only memory 206, thehard disk drive 208 or retrieved via thenetwork interface circuit 220 from a remote source. Thecomputer 200 displays the results of its processing activity to the user via the display driver 210 and thedisplay 212. Thecomputer 200 receives control inputs from the user via the user input/output circuit 214, the keyboard 216 and themouse 218. - The computer program product described above may take the form of a computer program stored within the
computer system 200 on thehard disk drive 208, within the random access memory 204, within the read-only memory 206, or downloaded via thenetwork interface circuit 220. The computer program product may also take the form of a recording medium such as a compact disk or floppy disk drive that may be used for distribution purposes. When operating under control of the above described computer program product, the various components of thecomputer 200 serve to provide the appropriate circuits and logic for carrying out the above described functions and acts. It will be appreciated that thecomputer 200 illustrated inFIG. 7 is merely one example of a type of computer that may execute the computer program product, method and provide the apparatus described above. - Although illustrative embodiments of the invention have been described in detail herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various changes and modifications can be effected therein by one skilled in the art without departing from the scope and spirit of the invention as defined by the appended claims.
Claims (21)
1.-36. (canceled)
37. A method of processing received messages for a plurality of addressees, the method comprising:
identifying a potentially unwanted message in the received messages based on filter data received from a remote source;
forwarding the potentially unwanted message to at least one of the addressees;
receiving feedback from at least one of the addressees confirming the potentially unwanted message as an unwanted message; and
reporting the unwanted message to the remote source for updating the filter data.
38. The method of claim 37 , wherein the potentially unwanted message is identified with a scoring algorithm.
39. The method of claim 37 , wherein the potentially unwanted message is identified with a scoring algorithm responsive to identification of predetermined words within the received messages and a size of the received messages.
40. The method of claim 37 , wherein the scoring algorithm is responsive to validity of the addressees.
41. The method of claim 37 , wherein forwarding the potentially unwanted message comprises forwarding the potentially unwanted message with a prompt to provide the feedback.
42. The method of claim 37 , wherein forwarding the potentially unwanted message comprises encapsulating the potentially unwanted message within a markup language providing voting buttons for providing the feedback.
43. The method of claim 37 , wherein:
the potentially unwanted message is identified with a scoring algorithm; and
forwarding the potentially unwanted message comprises encapsulating the potentially unwanted message within a markup language providing voting buttons for providing the feedback.
44. Logic encoded in one or more non-transitory media that includes code for execution and when executed by one or more processors is operable to perform operations for processing received messages for a plurality of addressees, the operations comprising:
identifying a potentially unwanted message in the received messages based on filter data received from a remote source;
forwarding the potentially unwanted message to at least one of the addressees;
receiving feedback from at least one of the addressees confirming the potentially unwanted message as an unwanted message; and
reporting the unwanted message to the remote source for updating the filter data.
45. The encoded logic of claim 44 , wherein the potentially unwanted message is identified with a scoring algorithm.
46. The encoded logic of claim 44 , wherein the potentially unwanted message is identified with a scoring algorithm responsive to identification of predetermined words within the received messages and a size of the received messages.
47. The encoded logic of claim 44 , wherein the scoring algorithm is responsive to validity of the addressees.
48. The encoded logic of claim 44 , wherein forwarding the potentially unwanted message comprises forwarding the potentially unwanted message with a prompt to provide the feedback.
49. The encoded logic of claim 44 , wherein forwarding the potentially unwanted message comprises encapsulating the potentially unwanted message within a markup language providing voting buttons for providing the feedback.
50. The encoded logic of claim 44 , wherein:
the potentially unwanted message is identified with a scoring algorithm; and
forwarding the potentially unwanted message comprises encapsulating the potentially unwanted message within a markup language providing voting buttons for providing the feedback.
51. An apparatus for processing received messages for a plurality of addressees, comprising one or more processors operable to execute instructions such that the apparatus is configured for:
identifying a potentially unwanted message in the received messages based on filter data received from a remote source;
forwarding the potentially unwanted message to at least one of the addressees;
receiving feedback from at least one of the addressees confirming the potentially unwanted message as an unwanted message; and
reporting the unwanted message to the remote source for updating the filter data.
52. The apparatus of claim 51 , wherein the potentially unwanted message is identified with a scoring algorithm.
53. The apparatus of claim 51 , wherein the potentially unwanted message is identified with a scoring algorithm responsive to identification of predetermined words within the received messages and a size of the received messages.
54. The apparatus of claim 51 , wherein the scoring algorithm is responsive to validity of the addressees.
55. The apparatus of claim 51 , wherein forwarding the potentially unwanted message comprises forwarding the potentially unwanted message with a prompt to provide the feedback.
56. The apparatus of claim 51 , wherein forwarding the potentially unwanted message comprises encapsulating the potentially unwanted message within a markup language providing voting buttons for providing the feedback.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/429,354 US20120185551A1 (en) | 2001-02-20 | 2012-03-24 | Unwanted e-mail filtering system including voting feedback |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/785,240 US8219620B2 (en) | 2001-02-20 | 2001-02-20 | Unwanted e-mail filtering system including voting feedback |
US13/429,354 US20120185551A1 (en) | 2001-02-20 | 2012-03-24 | Unwanted e-mail filtering system including voting feedback |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/785,240 Division US8219620B2 (en) | 2001-02-20 | 2001-02-20 | Unwanted e-mail filtering system including voting feedback |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120185551A1 true US20120185551A1 (en) | 2012-07-19 |
Family
ID=25134858
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/785,240 Expired - Fee Related US8219620B2 (en) | 2001-02-20 | 2001-02-20 | Unwanted e-mail filtering system including voting feedback |
US13/429,338 Abandoned US20120185549A1 (en) | 2001-02-20 | 2012-03-24 | Unwanted E-Mail Filtering System Including Voting Feedback |
US13/429,345 Expired - Fee Related US8838714B2 (en) | 2001-02-20 | 2012-03-24 | Unwanted e-mail filtering system including voting feedback |
US13/429,354 Abandoned US20120185551A1 (en) | 2001-02-20 | 2012-03-24 | Unwanted e-mail filtering system including voting feedback |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/785,240 Expired - Fee Related US8219620B2 (en) | 2001-02-20 | 2001-02-20 | Unwanted e-mail filtering system including voting feedback |
US13/429,338 Abandoned US20120185549A1 (en) | 2001-02-20 | 2012-03-24 | Unwanted E-Mail Filtering System Including Voting Feedback |
US13/429,345 Expired - Fee Related US8838714B2 (en) | 2001-02-20 | 2012-03-24 | Unwanted e-mail filtering system including voting feedback |
Country Status (1)
Country | Link |
---|---|
US (4) | US8219620B2 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100263045A1 (en) * | 2004-06-30 | 2010-10-14 | Daniel Wesley Dulitz | System for reclassification of electronic messages in a spam filtering system |
US20130086635A1 (en) * | 2011-09-30 | 2013-04-04 | General Electric Company | System and method for communication in a network |
US8601160B1 (en) | 2006-02-09 | 2013-12-03 | Mcafee, Inc. | System, method and computer program product for gathering information relating to electronic content utilizing a DNS server |
US8838714B2 (en) | 2001-02-20 | 2014-09-16 | Mcafee, Inc. | Unwanted e-mail filtering system including voting feedback |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9117069B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Real-time vulnerability monitoring |
US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US20160142352A1 (en) * | 2014-11-17 | 2016-05-19 | At&T Intellectual Property I, L.P. | System and Method for Cloud Based IP Mobile Messaging Spam Detection and Defense |
US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
Families Citing this family (180)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0955591A3 (en) * | 1992-04-30 | 2004-05-12 | Apple Computer, Inc. | Method and apparatus for organizing information in a computer system |
US6832245B1 (en) | 1999-12-01 | 2004-12-14 | At&T Corp. | System and method for analyzing communications of user messages to rank users and contacts based on message content |
US7624172B1 (en) | 2000-03-17 | 2009-11-24 | Aol Llc | State change alerts mechanism |
WO2001072020A2 (en) | 2000-03-17 | 2001-09-27 | America Online, Inc. | Instant messaging with additional voice communication |
US9736209B2 (en) | 2000-03-17 | 2017-08-15 | Facebook, Inc. | State change alerts mechanism |
US9356894B2 (en) | 2000-05-04 | 2016-05-31 | Facebook, Inc. | Enabled and disabled menu choices based on presence state |
US7979802B1 (en) | 2000-05-04 | 2011-07-12 | Aol Inc. | Providing supplemental contact information corresponding to a referenced individual |
US6912564B1 (en) | 2000-05-04 | 2005-06-28 | America Online, Inc. | System for instant messaging the sender and recipients of an e-mail message |
US20130073648A1 (en) | 2000-05-04 | 2013-03-21 | Facebook, Inc. | Presenting a recipient of an e-mail with an option to instant message a sender or another recipient based on the sender's or the other recipient's address and online status |
US9100221B2 (en) | 2000-05-04 | 2015-08-04 | Facebook, Inc. | Systems for messaging senders and recipients of an electronic message |
US8132110B1 (en) | 2000-05-04 | 2012-03-06 | Aol Inc. | Intelligently enabled menu choices based on online presence state in address book |
US8122363B1 (en) | 2000-05-04 | 2012-02-21 | Aol Inc. | Presence status indicator |
US7032023B1 (en) * | 2000-05-16 | 2006-04-18 | America Online, Inc. | Throttling electronic communications from one or more senders |
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US6408277B1 (en) * | 2000-06-21 | 2002-06-18 | Banter Limited | System and method for automatic task prioritization |
US9699129B1 (en) | 2000-06-21 | 2017-07-04 | International Business Machines Corporation | System and method for increasing email productivity |
US8290768B1 (en) | 2000-06-21 | 2012-10-16 | International Business Machines Corporation | System and method for determining a set of attributes based on content of communications |
US8001190B2 (en) | 2001-06-25 | 2011-08-16 | Aol Inc. | Email integrated instant messaging |
EP1303974B1 (en) | 2000-07-25 | 2011-03-16 | America Online, Inc. | Video messaging |
US7711790B1 (en) | 2000-08-24 | 2010-05-04 | Foundry Networks, Inc. | Securing an accessible computer system |
US6802012B1 (en) * | 2000-10-03 | 2004-10-05 | Networks Associates Technology, Inc. | Scanning computer files for unwanted properties |
US7644057B2 (en) | 2001-01-03 | 2010-01-05 | International Business Machines Corporation | System and method for electronic communication management |
DE10115428A1 (en) * | 2001-03-29 | 2002-10-17 | Siemens Ag | Procedure for detecting an unsolicited email |
US8799183B2 (en) * | 2001-04-09 | 2014-08-05 | United States Postal Service | System and method for predelivery notifcation using mail image |
US7325249B2 (en) * | 2001-04-30 | 2008-01-29 | Aol Llc | Identifying unwanted electronic messages |
US7380126B2 (en) * | 2001-06-01 | 2008-05-27 | Logan James D | Methods and apparatus for controlling the transmission and receipt of email messages |
US7076527B2 (en) * | 2001-06-14 | 2006-07-11 | Apple Computer, Inc. | Method and apparatus for filtering email |
US7502829B2 (en) * | 2001-06-21 | 2009-03-10 | Cybersoft, Inc. | Apparatus, methods and articles of manufacture for intercepting, examining and controlling code, data and files and their transfer |
US7016939B1 (en) * | 2001-07-26 | 2006-03-21 | Mcafee, Inc. | Intelligent SPAM detection system using statistical analysis |
US7647376B1 (en) * | 2001-07-26 | 2010-01-12 | Mcafee, Inc. | SPAM report generation system and method |
US7117533B1 (en) * | 2001-08-03 | 2006-10-03 | Mcafee, Inc. | System and method for providing dynamic screening of transient messages in a distributed computing environment |
US7765484B2 (en) | 2001-09-28 | 2010-07-27 | Aol Inc. | Passive personalization of lists |
US7512652B1 (en) | 2001-09-28 | 2009-03-31 | Aol Llc, A Delaware Limited Liability Company | Passive personalization of buddy lists |
US7774711B2 (en) | 2001-09-28 | 2010-08-10 | Aol Inc. | Automatic categorization of entries in a contact list |
US7403953B2 (en) * | 2001-10-03 | 2008-07-22 | Amazingmail.Com | Methods and apparatus for a dynamic messaging engine |
US6988129B2 (en) * | 2001-11-26 | 2006-01-17 | Pitney Bowes Inc. | Method for providing address change notification in an electronic message forwarding system |
CN1332333C (en) * | 2002-02-19 | 2007-08-15 | 波斯蒂尼公司 | E-mail management services |
US20030208524A1 (en) * | 2002-05-02 | 2003-11-06 | Morman Daniel N. | System for routing data in a communication network |
US7139801B2 (en) * | 2002-06-14 | 2006-11-21 | Mindshare Design, Inc. | Systems and methods for monitoring events associated with transmitted electronic mail messages |
US7539726B1 (en) | 2002-07-16 | 2009-05-26 | Sonicwall, Inc. | Message testing |
US8396926B1 (en) | 2002-07-16 | 2013-03-12 | Sonicwall, Inc. | Message challenge response |
US7908330B2 (en) | 2003-03-11 | 2011-03-15 | Sonicwall, Inc. | Message auditing |
US8924484B2 (en) * | 2002-07-16 | 2014-12-30 | Sonicwall, Inc. | Active e-mail filter with challenge-response |
US7899867B1 (en) * | 2002-07-31 | 2011-03-01 | FaceTime Communications, Inc, | SpIM blocking and user approval techniques for real-time messaging networks |
US7334020B2 (en) * | 2002-09-20 | 2008-02-19 | Goodcontacts Research Ltd. | Automatic highlighting of new electronic message address |
US6804687B2 (en) * | 2002-09-30 | 2004-10-12 | Scott E. Sampson | File system management with user-definable functional attributes stored in a token action log |
US7010565B2 (en) * | 2002-09-30 | 2006-03-07 | Sampson Scott E | Communication management using a token action log |
US8051172B2 (en) | 2002-09-30 | 2011-11-01 | Sampson Scott E | Methods for managing the exchange of communication tokens |
US7200636B2 (en) * | 2002-11-01 | 2007-04-03 | Sun Microsystems, Inc. | Method and apparatus for applying personalized rules to e-mail messages at an e-mail server |
US7428580B2 (en) | 2003-11-26 | 2008-09-23 | Aol Llc | Electronic message forwarding |
US8701014B1 (en) | 2002-11-18 | 2014-04-15 | Facebook, Inc. | Account linking |
US8965964B1 (en) | 2002-11-18 | 2015-02-24 | Facebook, Inc. | Managing forwarded electronic messages |
AU2003287671A1 (en) | 2002-11-18 | 2004-06-15 | America Online, Inc. | People lists |
US7640306B2 (en) | 2002-11-18 | 2009-12-29 | Aol Llc | Reconfiguring an electronic message to effect an enhanced notification |
US8005919B2 (en) | 2002-11-18 | 2011-08-23 | Aol Inc. | Host-based intelligent results related to a character stream |
US7590696B1 (en) | 2002-11-18 | 2009-09-15 | Aol Llc | Enhanced buddy list using mobile device identifiers |
US7899862B2 (en) | 2002-11-18 | 2011-03-01 | Aol Inc. | Dynamic identification of other users to an online user |
US8122137B2 (en) | 2002-11-18 | 2012-02-21 | Aol Inc. | Dynamic location of a subordinate user |
US7636755B2 (en) | 2002-11-21 | 2009-12-22 | Aol Llc | Multiple avatar personalities |
US8037150B2 (en) | 2002-11-21 | 2011-10-11 | Aol Inc. | System and methods for providing multiple personas in a communications environment |
US7949759B2 (en) | 2003-04-02 | 2011-05-24 | AOL, Inc. | Degrees of separation for handling communications |
US8538895B2 (en) * | 2004-03-15 | 2013-09-17 | Aol Inc. | Sharing social network information |
US7945674B2 (en) | 2003-04-02 | 2011-05-17 | Aol Inc. | Degrees of separation for handling communications |
US9742615B1 (en) | 2002-12-31 | 2017-08-22 | Aol Inc. | Popularity index |
US7263614B2 (en) | 2002-12-31 | 2007-08-28 | Aol Llc | Implicit access for communications pathway |
US7533148B2 (en) * | 2003-01-09 | 2009-05-12 | Microsoft Corporation | Framework to enable integration of anti-spam technologies |
US7171450B2 (en) * | 2003-01-09 | 2007-01-30 | Microsoft Corporation | Framework to enable integration of anti-spam technologies |
US7725544B2 (en) * | 2003-01-24 | 2010-05-25 | Aol Inc. | Group based spam classification |
US7089241B1 (en) * | 2003-01-24 | 2006-08-08 | America Online, Inc. | Classifier tuning based on data similarities |
US20040176072A1 (en) * | 2003-01-31 | 2004-09-09 | Gellens Randall C. | Simplified handling of, blocking of, and credit for undesired messaging |
US7917620B2 (en) | 2003-02-20 | 2011-03-29 | Nokia Corporation | Communication system |
US8266215B2 (en) | 2003-02-20 | 2012-09-11 | Sonicwall, Inc. | Using distinguishing properties to classify messages |
US7406502B1 (en) | 2003-02-20 | 2008-07-29 | Sonicwall, Inc. | Method and system for classifying a message based on canonical equivalent of acceptable items included in the message |
US7299261B1 (en) | 2003-02-20 | 2007-11-20 | Mailfrontier, Inc. A Wholly Owned Subsidiary Of Sonicwall, Inc. | Message classification using a summary |
US7219148B2 (en) * | 2003-03-03 | 2007-05-15 | Microsoft Corporation | Feedback loop for spam prevention |
US20040179039A1 (en) | 2003-03-03 | 2004-09-16 | Blattner Patrick D. | Using avatars to communicate |
US7913176B1 (en) | 2003-03-03 | 2011-03-22 | Aol Inc. | Applying access controls to communications with avatars |
US7908554B1 (en) | 2003-03-03 | 2011-03-15 | Aol Inc. | Modifying avatar behavior based on user action or mood |
US20050091319A1 (en) * | 2003-10-09 | 2005-04-28 | Kirsch Steven T. | Database for receiving, storing and compiling information about email messages |
US7366761B2 (en) * | 2003-10-09 | 2008-04-29 | Abaca Technology Corporation | Method for creating a whitelist for processing e-mails |
US20050091320A1 (en) * | 2003-10-09 | 2005-04-28 | Kirsch Steven T. | Method and system for categorizing and processing e-mails |
US20050080857A1 (en) * | 2003-10-09 | 2005-04-14 | Kirsch Steven T. | Method and system for categorizing and processing e-mails |
US20040177120A1 (en) * | 2003-03-07 | 2004-09-09 | Kirsch Steven T. | Method for filtering e-mail messages |
US7206814B2 (en) * | 2003-10-09 | 2007-04-17 | Propel Software Corporation | Method and system for categorizing and processing e-mails |
US8117265B2 (en) | 2003-03-26 | 2012-02-14 | Aol Inc. | Identifying and using identities deemed to be known to a user |
US7546348B2 (en) * | 2003-05-05 | 2009-06-09 | Sonicwall, Inc. | Message handling with selective user participation |
US20050187913A1 (en) | 2003-05-06 | 2005-08-25 | Yoram Nelken | Web-based customer service interface |
US8495002B2 (en) | 2003-05-06 | 2013-07-23 | International Business Machines Corporation | Software tool for training and testing a knowledge base |
US7590695B2 (en) | 2003-05-09 | 2009-09-15 | Aol Llc | Managing electronic messages |
US7831667B2 (en) * | 2003-05-15 | 2010-11-09 | Symantec Corporation | Method and apparatus for filtering email spam using email noise reduction |
US7657599B2 (en) * | 2003-05-29 | 2010-02-02 | Mindshare Design, Inc. | Systems and methods for automatically updating electronic mail access lists |
US8145710B2 (en) * | 2003-06-18 | 2012-03-27 | Symantec Corporation | System and method for filtering spam messages utilizing URL filtering module |
US7739602B2 (en) | 2003-06-24 | 2010-06-15 | Aol Inc. | System and method for community centric resource sharing based on a publishing subscription model |
US7562119B2 (en) | 2003-07-15 | 2009-07-14 | Mindshare Design, Inc. | Systems and methods for automatically updating electronic mail access lists |
US8214437B1 (en) | 2003-07-21 | 2012-07-03 | Aol Inc. | Online adaptive filtering of messages |
US7653693B2 (en) | 2003-09-05 | 2010-01-26 | Aol Llc | Method and system for capturing instant messages |
US8892673B1 (en) * | 2003-08-08 | 2014-11-18 | Radix Holdings, Llc | Hybrid challenge-response |
ATE370466T1 (en) * | 2003-09-15 | 2007-09-15 | Philippe Baumard | METHOD AND SYSTEM FOR INTEREST LEVEL MEASUREMENT OF DIGITAL NEWS |
US7610342B1 (en) * | 2003-10-21 | 2009-10-27 | Microsoft Corporation | System and method for analyzing and managing spam e-mail |
US7395314B2 (en) | 2003-10-28 | 2008-07-01 | Mindshare Design, Inc. | Systems and methods for governing the performance of high volume electronic mail delivery |
AU2003303298A1 (en) * | 2003-11-03 | 2005-05-19 | Adva Technologies Ltd | Apparatus and method for filtering unwanted e-mail |
US7620690B1 (en) | 2003-11-20 | 2009-11-17 | Lashback, LLC | Privacy control system for electronic communication |
US7660857B2 (en) * | 2003-11-21 | 2010-02-09 | Mindshare Design, Inc. | Systems and methods for automatically updating electronic mail access lists |
US7730137B1 (en) | 2003-12-22 | 2010-06-01 | Aol Inc. | Restricting the volume of outbound electronic messages originated by a single entity |
US7548956B1 (en) | 2003-12-30 | 2009-06-16 | Aol Llc | Spam control based on sender account characteristics |
US20050198145A1 (en) * | 2004-01-12 | 2005-09-08 | Xerox Corporation | Pay e-mail methods and systems |
US7693943B2 (en) * | 2004-01-23 | 2010-04-06 | International Business Machines Corporation | Classification of electronic mail into multiple directories based upon their spam-like properties |
CA2457478A1 (en) * | 2004-02-12 | 2005-08-12 | Opersys Inc. | System and method for warranting electronic mail using a hybrid public key encryption scheme |
CA2554915C (en) * | 2004-02-17 | 2013-05-28 | Ironport Systems, Inc. | Collecting, aggregating, and managing information relating to electronic messages |
US10257164B2 (en) | 2004-02-27 | 2019-04-09 | International Business Machines Corporation | Classifying e-mail connections for policy enforcement |
US8635273B2 (en) * | 2004-03-05 | 2014-01-21 | Aol Inc. | Announcing new users of an electronic communications system to existing users |
US8595146B1 (en) | 2004-03-15 | 2013-11-26 | Aol Inc. | Social networking permissions |
US7756930B2 (en) * | 2004-05-28 | 2010-07-13 | Ironport Systems, Inc. | Techniques for determining the reputation of a message sender |
US7873695B2 (en) * | 2004-05-29 | 2011-01-18 | Ironport Systems, Inc. | Managing connections and messages at a server by associating different actions for both different senders and different recipients |
US7849142B2 (en) * | 2004-05-29 | 2010-12-07 | Ironport Systems, Inc. | Managing connections, messages, and directory harvest attacks at a server |
US8832316B2 (en) * | 2004-09-28 | 2014-09-09 | Presto Services Inc. | Method and system for message delivery using a secure device and simple output without the use of a personal computer |
US7454778B2 (en) * | 2004-09-30 | 2008-11-18 | Microsoft Corporation | Enforcing rights management through edge email servers |
US7730143B1 (en) | 2004-12-01 | 2010-06-01 | Aol Inc. | Prohibiting mobile forwarding |
US9002949B2 (en) | 2004-12-01 | 2015-04-07 | Google Inc. | Automatically enabling the forwarding of instant messages |
US8060566B2 (en) | 2004-12-01 | 2011-11-15 | Aol Inc. | Automatically enabling the forwarding of instant messages |
US9652809B1 (en) | 2004-12-21 | 2017-05-16 | Aol Inc. | Using user profile information to determine an avatar and/or avatar characteristics |
US7921369B2 (en) | 2004-12-30 | 2011-04-05 | Aol Inc. | Mood-based organization and display of instant messenger buddy lists |
US7577709B1 (en) | 2005-02-17 | 2009-08-18 | Aol Llc | Reliability measure for a classifier |
WO2006119506A2 (en) | 2005-05-05 | 2006-11-09 | Ironport Systems, Inc. | Method of validating requests for sender reputation information |
US7606580B2 (en) | 2005-05-11 | 2009-10-20 | Aol Llc | Personalized location information for mobile devices |
US7765265B1 (en) | 2005-05-11 | 2010-07-27 | Aol Inc. | Identifying users sharing common characteristics |
JP4559295B2 (en) * | 2005-05-17 | 2010-10-06 | 株式会社エヌ・ティ・ティ・ドコモ | Data communication system and data communication method |
US8131805B2 (en) * | 2006-03-01 | 2012-03-06 | Research In Motion Limited | Multilevel anti-spam system and method with load balancing |
US7685271B1 (en) * | 2006-03-30 | 2010-03-23 | Symantec Corporation | Distributed platform for testing filtering rules |
US20080028029A1 (en) * | 2006-07-31 | 2008-01-31 | Hart Matt E | Method and apparatus for determining whether an email message is spam |
US8726195B2 (en) | 2006-09-05 | 2014-05-13 | Aol Inc. | Enabling an IM user to navigate a virtual world |
US8078625B1 (en) | 2006-09-11 | 2011-12-13 | Aol Inc. | URL-based content categorization |
US8510388B2 (en) * | 2006-11-13 | 2013-08-13 | International Business Machines Corporation | Tracking messages in a mentoring environment |
US8224905B2 (en) * | 2006-12-06 | 2012-07-17 | Microsoft Corporation | Spam filtration utilizing sender activity data |
US8948046B2 (en) | 2007-04-27 | 2015-02-03 | Aerohive Networks, Inc. | Routing method and system for a wireless network |
US20090006532A1 (en) * | 2007-06-28 | 2009-01-01 | Yahoo! Inc. | Dynamic phishing protection in instant messaging |
US8285737B1 (en) | 2008-04-10 | 2012-10-09 | Google Inc. | Selecting content for publication |
US8218502B1 (en) | 2008-05-14 | 2012-07-10 | Aerohive Networks | Predictive and nomadic roaming of wireless clients across different network subnets |
US8548503B2 (en) | 2008-08-28 | 2013-10-01 | Aol Inc. | Methods and system for providing location-based communication services |
US9674892B1 (en) | 2008-11-04 | 2017-06-06 | Aerohive Networks, Inc. | Exclusive preshared key authentication |
US9424407B2 (en) * | 2008-12-30 | 2016-08-23 | International Business Machines Corporation | Weak password support in a multi-user environment |
US8483194B1 (en) | 2009-01-21 | 2013-07-09 | Aerohive Networks, Inc. | Airtime-based scheduling |
US10558949B2 (en) * | 2009-05-20 | 2020-02-11 | International Business Machines Corporation | User-configured alternate email rendering |
US9900251B1 (en) | 2009-07-10 | 2018-02-20 | Aerohive Networks, Inc. | Bandwidth sentinel |
US11115857B2 (en) | 2009-07-10 | 2021-09-07 | Extreme Networks, Inc. | Bandwidth sentinel |
SG177015A1 (en) * | 2010-06-07 | 2012-01-30 | Boxsentry Pte Ltd | In situ correction of false-positive errors in messaging security systems (lagotto) |
US8671187B1 (en) | 2010-07-27 | 2014-03-11 | Aerohive Networks, Inc. | Client-independent network supervision application |
US9002277B2 (en) | 2010-09-07 | 2015-04-07 | Aerohive Networks, Inc. | Distributed channel selection for wireless networks |
US9450781B2 (en) * | 2010-12-09 | 2016-09-20 | Alcatel Lucent | Spam reporting and management in a communication network |
US9384471B2 (en) | 2011-02-22 | 2016-07-05 | Alcatel Lucent | Spam reporting and management in a communication network |
US8650649B1 (en) * | 2011-08-22 | 2014-02-11 | Symantec Corporation | Systems and methods for determining whether to evaluate the trustworthiness of digitally signed files based on signer reputation |
US20130086486A1 (en) * | 2011-09-30 | 2013-04-04 | Michael James Ahiakpor | Mutable Message Attributes |
TWI456948B (en) * | 2011-10-05 | 2014-10-11 | Univ Southern Taiwan Tech | Method for mailing |
US10091065B1 (en) * | 2011-10-31 | 2018-10-02 | Aerohive Networks, Inc. | Zero configuration networking on a subnetted network |
US8787375B2 (en) | 2012-06-14 | 2014-07-22 | Aerohive Networks, Inc. | Multicast to unicast conversion technique |
US9143498B2 (en) | 2012-08-30 | 2015-09-22 | Aerohive Networks, Inc. | Internetwork authentication |
WO2014094198A1 (en) * | 2012-12-17 | 2014-06-26 | Nokia Corporation | Message preloading system |
US9413772B2 (en) | 2013-03-15 | 2016-08-09 | Aerohive Networks, Inc. | Managing rogue devices through a network backhaul |
US9769056B2 (en) | 2013-03-15 | 2017-09-19 | Aerohive Networks, Inc. | Gateway using multicast to unicast conversion |
US10389650B2 (en) | 2013-03-15 | 2019-08-20 | Aerohive Networks, Inc. | Building and maintaining a network |
US9762679B2 (en) | 2013-03-15 | 2017-09-12 | Aerohive Networks, Inc. | Providing stateless network services |
US20140316844A1 (en) * | 2013-04-22 | 2014-10-23 | Nipendo Ltd. | Messaging engine |
US9544256B2 (en) * | 2013-06-28 | 2017-01-10 | Td Ameritrade Ip Company, Inc. | Crowdsourcing e-mail filtering |
US20160078365A1 (en) | 2014-03-21 | 2016-03-17 | Philippe Baumard | Autonomous detection of incongruous behaviors |
US9992619B2 (en) | 2014-08-12 | 2018-06-05 | Aerohive Networks, Inc. | Network device based proximity beacon locating |
US9591131B2 (en) | 2015-04-20 | 2017-03-07 | Youmail, Inc. | System and method for identifying unwanted callers and rejecting or otherwise disposing of calls from same |
CN112567395B (en) | 2018-06-12 | 2024-09-13 | 鹰图公司 | Artificial intelligence application for computer aided scheduling system |
US10656884B2 (en) * | 2018-07-26 | 2020-05-19 | Xerox Corporation | System and method for automatically locking in response to a print fault a print job and notification thereof |
US11431738B2 (en) | 2018-12-19 | 2022-08-30 | Abnormal Security Corporation | Multistage analysis of emails to identify security threats |
US11824870B2 (en) | 2018-12-19 | 2023-11-21 | Abnormal Security Corporation | Threat detection platforms for detecting, characterizing, and remediating email-based threats in real time |
US11050793B2 (en) | 2018-12-19 | 2021-06-29 | Abnormal Security Corporation | Retrospective learning of communication patterns by machine learning models for discovering abnormal behavior |
US11470042B2 (en) | 2020-02-21 | 2022-10-11 | Abnormal Security Corporation | Discovering email account compromise through assessments of digital activities |
WO2021178423A1 (en) | 2020-03-02 | 2021-09-10 | Abnormal Security Corporation | Multichannel threat detection for protecting against account compromise |
US11252189B2 (en) | 2020-03-02 | 2022-02-15 | Abnormal Security Corporation | Abuse mailbox for facilitating discovery, investigation, and analysis of email-based threats |
US11470108B2 (en) | 2020-04-23 | 2022-10-11 | Abnormal Security Corporation | Detection and prevention of external fraud |
US11528242B2 (en) * | 2020-10-23 | 2022-12-13 | Abnormal Security Corporation | Discovering graymail through real-time analysis of incoming email |
US11687648B2 (en) | 2020-12-10 | 2023-06-27 | Abnormal Security Corporation | Deriving and surfacing insights regarding security threats |
CN114827073A (en) * | 2021-01-29 | 2022-07-29 | Zoom视频通讯公司 | Voicemail spam detection |
US11831661B2 (en) | 2021-06-03 | 2023-11-28 | Abnormal Security Corporation | Multi-tiered approach to payload detection for incoming communications |
US11895074B2 (en) | 2022-05-31 | 2024-02-06 | Microsoft Technology Licensing, Llc | Systems and methods for determining scores for messages based on actions of message recipients and a network graph |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5724567A (en) * | 1994-04-25 | 1998-03-03 | Apple Computer, Inc. | System for directing relevance-ranked data objects to computer users |
US6199103B1 (en) * | 1997-06-24 | 2001-03-06 | Omron Corporation | Electronic mail determination method and system and storage medium |
US6370526B1 (en) * | 1999-05-18 | 2002-04-09 | International Business Machines Corporation | Self-adaptive method and system for providing a user-preferred ranking order of object sets |
US6421709B1 (en) * | 1997-12-22 | 2002-07-16 | Accepted Marketing, Inc. | E-mail filter and method thereof |
US20020116463A1 (en) * | 2001-02-20 | 2002-08-22 | Hart Matthew Thomas | Unwanted e-mail filtering |
US6460050B1 (en) * | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US6546390B1 (en) * | 1999-06-11 | 2003-04-08 | Abuzz Technologies, Inc. | Method and apparatus for evaluating relevancy of messages to users |
US6654787B1 (en) * | 1998-12-31 | 2003-11-25 | Brightmail, Incorporated | Method and apparatus for filtering e-mail |
US6802012B1 (en) * | 2000-10-03 | 2004-10-05 | Networks Associates Technology, Inc. | Scanning computer files for unwanted properties |
US6807566B1 (en) * | 2000-08-16 | 2004-10-19 | International Business Machines Corporation | Method, article of manufacture and apparatus for processing an electronic message on an electronic message board |
US7072942B1 (en) * | 2000-02-04 | 2006-07-04 | Microsoft Corporation | Email filtering methods and systems |
Family Cites Families (128)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5121345A (en) * | 1988-11-03 | 1992-06-09 | Lentz Stephen A | System and method for protecting integrity of computer data and software |
US5283856A (en) * | 1991-10-04 | 1994-02-01 | Beyond, Inc. | Event-driven rule-based messaging system |
US5509120A (en) * | 1993-11-30 | 1996-04-16 | International Business Machines Corporation | Method and system for detecting computer viruses during power on self test |
US5870549A (en) * | 1995-04-28 | 1999-02-09 | Bobo, Ii; Charles R. | Systems and methods for storing, delivering, and managing messages |
US5619648A (en) * | 1994-11-30 | 1997-04-08 | Lucent Technologies Inc. | Message filtering techniques |
US5805911A (en) * | 1995-02-01 | 1998-09-08 | Microsoft Corporation | Word prediction system |
US5623600A (en) * | 1995-09-26 | 1997-04-22 | Trend Micro, Incorporated | Virus detection and removal apparatus for computer networks |
US6101531A (en) * | 1995-12-19 | 2000-08-08 | Motorola, Inc. | System for communicating user-selected criteria filter prepared at wireless client to communication server for filtering data transferred from host to said wireless client |
US5765028A (en) * | 1996-05-07 | 1998-06-09 | Ncr Corporation | Method and apparatus for providing neural intelligence to a mail query agent in an online analytical processing system |
US6396513B1 (en) * | 1996-05-14 | 2002-05-28 | At&T Corp. | Electronic message sorting and notification system |
US6453327B1 (en) * | 1996-06-10 | 2002-09-17 | Sun Microsystems, Inc. | Method and apparatus for identifying and discarding junk electronic mail |
US5832208A (en) * | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers |
US6144934A (en) | 1996-09-18 | 2000-11-07 | Secure Computing Corporation | Binary filter using pattern recognition |
US5845285A (en) | 1997-01-07 | 1998-12-01 | Klein; Laurence C. | Computer system and method of data analysis |
US5898836A (en) * | 1997-01-14 | 1999-04-27 | Netmind Services, Inc. | Change-detection tool indicating degree and location of change of internet documents by comparison of cyclic-redundancy-check(CRC) signatures |
CA2282502A1 (en) | 1997-02-25 | 1998-08-27 | Intervoice Limited Partnership | E-mail server for message filtering and routing |
US6092101A (en) * | 1997-06-16 | 2000-07-18 | Digital Equipment Corporation | Method for filtering mail messages for a plurality of client computers connected to a mail service system |
US6047277A (en) * | 1997-06-19 | 2000-04-04 | Parry; Michael H. | Self-organizing neural network for plain text categorization |
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
WO1999004344A1 (en) * | 1997-07-18 | 1999-01-28 | Net Exchange, Inc. | Apparatus and method for effecting correspondent-centric electronic mail |
US6199102B1 (en) | 1997-08-26 | 2001-03-06 | Christopher Alan Cobb | Method and system for filtering electronic messages |
US6266664B1 (en) * | 1997-10-01 | 2001-07-24 | Rulespace, Inc. | Method for scanning, analyzing and rating digital information content |
US6370139B2 (en) | 1997-10-24 | 2002-04-09 | Tranz-Send Broadcasting Network, Inc. | System and method for providing information dispersal in a networked computing environment |
US6393465B2 (en) * | 1997-11-25 | 2002-05-21 | Nixmail Corporation | Junk electronic mail detector and eliminator |
US6023723A (en) * | 1997-12-22 | 2000-02-08 | Accepted Marketing, Inc. | Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms |
US6052709A (en) * | 1997-12-23 | 2000-04-18 | Bright Light Technologies, Inc. | Apparatus and method for controlling delivery of unsolicited electronic mail |
US5999932A (en) * | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing |
US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
US6161130A (en) * | 1998-06-23 | 2000-12-12 | Microsoft Corporation | Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set |
US6108703A (en) * | 1998-07-14 | 2000-08-22 | Massachusetts Institute Of Technology | Global hosting system |
US6167434A (en) | 1998-07-15 | 2000-12-26 | Pang; Stephen Y. | Computer code for removing junk e-mail messages |
US6356935B1 (en) * | 1998-08-14 | 2002-03-12 | Xircom Wireless, Inc. | Apparatus and method for an authenticated electronic userid |
AU6392899A (en) | 1998-09-15 | 2000-04-03 | Local2Me.Com, Inc. | Dynamic matching TM of users for group communication |
GB9825102D0 (en) * | 1998-11-16 | 1999-01-13 | Insignia Solutions Plc | Computer system |
US6189002B1 (en) * | 1998-12-14 | 2001-02-13 | Dolphin Search | Process and system for retrieval of documents using context-relevant semantic profiles |
US6643686B1 (en) * | 1998-12-18 | 2003-11-04 | At&T Corp. | System and method for counteracting message filtering |
US6615242B1 (en) | 1998-12-28 | 2003-09-02 | At&T Corp. | Automatic uniform resource locator-based message filter |
US6266692B1 (en) * | 1999-01-04 | 2001-07-24 | International Business Machines Corporation | Method for blocking all unwanted e-mail (SPAM) using a header-based password |
US6330590B1 (en) | 1999-01-05 | 2001-12-11 | William D. Cotten | Preventing delivery of unwanted bulk e-mail |
US6598026B1 (en) | 1999-01-25 | 2003-07-22 | Nextag.Com, Inc. | Methods and apparatus for brokering transactions |
US6609205B1 (en) * | 1999-03-18 | 2003-08-19 | Cisco Technology, Inc. | Network intrusion detection signature analysis using decision graphs |
US6393423B1 (en) * | 1999-04-08 | 2002-05-21 | James Francis Goedken | Apparatus and methods for electronic information exchange |
US7213061B1 (en) * | 1999-04-29 | 2007-05-01 | Amx Llc | Internet control system and method |
US6393464B1 (en) * | 1999-05-10 | 2002-05-21 | Unbound Communications, Inc. | Method for controlling the delivery of electronic mail messages |
US7164413B2 (en) * | 1999-05-19 | 2007-01-16 | Digimarc Corporation | Enhanced input peripheral |
JP2004500615A (en) | 1999-05-28 | 2004-01-08 | ザ・コカ−コーラ・カンパニー | Method and apparatus for network-based electronic transaction surrogate control |
US6718367B1 (en) * | 1999-06-01 | 2004-04-06 | General Interactive, Inc. | Filter for modeling system and method for handling and routing of text-based asynchronous communications |
CN100384180C (en) | 1999-06-30 | 2008-04-23 | 倾向探测公司 | Method and apparatus for monitoring traffic in network |
US6868498B1 (en) * | 1999-09-01 | 2005-03-15 | Peter L. Katsikas | System for eliminating unauthorized electronic mail |
GB9920905D0 (en) * | 1999-09-03 | 1999-11-10 | Sgs Thomson Microelectronics | A relocation format for linking |
US6687740B1 (en) * | 1999-09-21 | 2004-02-03 | Neostar, Inc. | System, method and article of manufacture for preventing the proliferation of unwanted electronic messages |
US7281268B2 (en) * | 1999-11-14 | 2007-10-09 | Mcafee, Inc. | System, method and computer program product for detection of unwanted processes |
US6321267B1 (en) | 1999-11-23 | 2001-11-20 | Escom Corporation | Method and apparatus for filtering junk email |
US7007080B2 (en) * | 1999-12-23 | 2006-02-28 | Solution Inc Limited | System for reconfiguring and registering a new IP address for a computer to access a different network without user intervention |
EP1260108B1 (en) * | 2000-03-03 | 2010-04-28 | QUALCOMM Incorporated | Method and apparatus for participating in group communication services in an existing communication system |
US6691156B1 (en) * | 2000-03-10 | 2004-02-10 | International Business Machines Corporation | Method for restricting delivery of unsolicited E-mail |
EP1137236A1 (en) | 2000-03-24 | 2001-09-26 | BRITISH TELECOMMUNICATIONS public limited company | Processing network address identifiers |
US7082430B1 (en) | 2000-04-17 | 2006-07-25 | Accenture Llp | Collaboration planning in a collaborative work tool architecture |
US20020001307A1 (en) * | 2000-05-20 | 2002-01-03 | Equipe Communications Corporation | VPI/VCI availability index |
US7225244B2 (en) * | 2000-05-20 | 2007-05-29 | Ciena Corporation | Common command interface |
US7213062B1 (en) * | 2000-06-01 | 2007-05-01 | General Instrument Corporation | Self-publishing network directory |
US6609081B1 (en) * | 2000-06-02 | 2003-08-19 | Astec International Limited | Automated expansion analyzer for telecommunications power systems |
US6901519B1 (en) | 2000-06-22 | 2005-05-31 | Infobahn, Inc. | E-mail virus protection system and method |
US8204082B2 (en) * | 2000-06-23 | 2012-06-19 | Cloudshield Technologies, Inc. | Transparent provisioning of services over a network |
US7725602B2 (en) * | 2000-07-19 | 2010-05-25 | Akamai Technologies, Inc. | Domain name resolution using a distributed DNS network |
US7574499B1 (en) * | 2000-07-19 | 2009-08-11 | Akamai Technologies, Inc. | Global traffic management system using IP anycast routing and dynamic load-balancing |
US7716367B1 (en) * | 2000-07-20 | 2010-05-11 | Akamai Technologies, Inc. | Network performance monitoring in a content delivery service |
US6772196B1 (en) * | 2000-07-27 | 2004-08-03 | Propel Software Corp. | Electronic mail filtering system and methods |
US6779021B1 (en) * | 2000-07-28 | 2004-08-17 | International Business Machines Corporation | Method and system for predicting and managing undesirable electronic mail |
US7007299B2 (en) | 2000-08-30 | 2006-02-28 | Citibank, N.A. | Method and system for internet hosting and security |
US20020035566A1 (en) | 2000-09-20 | 2002-03-21 | Choicepoint, Inc. | Method and system for the wireless delivery of images |
US6650890B1 (en) | 2000-09-29 | 2003-11-18 | Postini, Inc. | Value-added electronic messaging services and transparent implementation thereof using intermediate server |
US6757830B1 (en) * | 2000-10-03 | 2004-06-29 | Networks Associates Technology, Inc. | Detecting unwanted properties in received email messages |
US6748422B2 (en) * | 2000-10-19 | 2004-06-08 | Ebay Inc. | System and method to control sending of unsolicited communications relating to a plurality of listings in a network-based commerce facility |
US6963904B2 (en) | 2000-12-27 | 2005-11-08 | Gateway Inc. | Method for correlating an electronic mail message with related messages |
US7647411B1 (en) * | 2001-02-26 | 2010-01-12 | Symantec Corporation | System and method for controlling distribution of network communications |
WO2002069108A2 (en) * | 2001-02-26 | 2002-09-06 | Eprivacy Group, Inc. | System and method for controlling distribution of network communications |
US7590684B2 (en) * | 2001-07-06 | 2009-09-15 | Check Point Software Technologies, Inc. | System providing methodology for access control with cooperative enforcement |
US7047297B2 (en) * | 2001-07-17 | 2006-05-16 | Mcafee, Inc. | Hierarchically organizing network data collected from full time recording machines and efficiently filtering the same |
US7149189B2 (en) | 2001-07-17 | 2006-12-12 | Mcafee, Inc. | Network data retrieval and filter systems and methods |
US7162698B2 (en) * | 2001-07-17 | 2007-01-09 | Mcafee, Inc. | Sliding window packet management systems |
US6769016B2 (en) * | 2001-07-26 | 2004-07-27 | Networks Associates Technology, Inc. | Intelligent SPAM detection system using an updateable neural analysis engine |
US7647376B1 (en) * | 2001-07-26 | 2010-01-12 | Mcafee, Inc. | SPAM report generation system and method |
US7016939B1 (en) * | 2001-07-26 | 2006-03-21 | Mcafee, Inc. | Intelligent SPAM detection system using statistical analysis |
US8880709B2 (en) | 2001-09-12 | 2014-11-04 | Ericsson Television Inc. | Method and system for scheduled streaming of best effort data |
US7545754B2 (en) * | 2001-11-02 | 2009-06-09 | Ntt Docomo, Inc. | Geographically adjacent access router discovery and caching for mobile nodes |
GB2384659B (en) * | 2002-01-25 | 2004-01-14 | F Secure Oyj | Anti-virus protection at a network gateway |
CN1332333C (en) | 2002-02-19 | 2007-08-15 | 波斯蒂尼公司 | E-mail management services |
US7096498B2 (en) * | 2002-03-08 | 2006-08-22 | Cipher Trust, Inc. | Systems and methods for message threat management |
US6941467B2 (en) | 2002-03-08 | 2005-09-06 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues |
US7865554B2 (en) | 2002-03-14 | 2011-01-04 | Microsoft Corporation | Internet e-mail bridge |
CA2380762A1 (en) * | 2002-04-04 | 2003-10-04 | Intrinsyc Software, Inc. | Internet-enabled device provisioning, upgrade and recovery mechanism |
US6772292B2 (en) * | 2002-06-04 | 2004-08-03 | Isaak Garber | Two area stack |
WO2004034645A1 (en) * | 2002-10-11 | 2004-04-22 | Matsushita Electric Industrial Co., Ltd. | Identification information protection method in wlan interconnection |
US7386889B2 (en) * | 2002-11-18 | 2008-06-10 | Trusted Network Technologies, Inc. | System and method for intrusion prevention in a communications network |
US7970832B2 (en) * | 2002-11-20 | 2011-06-28 | Return Path, Inc. | Electronic message delivery with estimation approaches and complaint, bond, and statistics panels |
US6732157B1 (en) * | 2002-12-13 | 2004-05-04 | Networks Associates Technology, Inc. | Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages |
US8380791B1 (en) | 2002-12-13 | 2013-02-19 | Mcafee, Inc. | Anti-spam system, method, and computer program product |
US20040117450A1 (en) | 2002-12-13 | 2004-06-17 | Campbell David T. | Gateway email concentrator |
US7299261B1 (en) | 2003-02-20 | 2007-11-20 | Mailfrontier, Inc. A Wholly Owned Subsidiary Of Sonicwall, Inc. | Message classification using a summary |
US8266215B2 (en) * | 2003-02-20 | 2012-09-11 | Sonicwall, Inc. | Using distinguishing properties to classify messages |
US20040177120A1 (en) * | 2003-03-07 | 2004-09-09 | Kirsch Steven T. | Method for filtering e-mail messages |
US7926104B1 (en) * | 2003-04-16 | 2011-04-12 | Verizon Corporate Services Group Inc. | Methods and systems for network attack detection and prevention through redirection |
US20050015626A1 (en) * | 2003-07-15 | 2005-01-20 | Chasin C. Scott | System and method for identifying and filtering junk e-mail messages or spam based on URL content |
US20050097177A1 (en) * | 2003-10-31 | 2005-05-05 | Mcumber William E. | Business process for improving electronic mail |
US7797443B1 (en) * | 2003-12-03 | 2010-09-14 | Microsoft Corporation | System and method for detecting spam e-mail |
US7917961B2 (en) * | 2004-05-25 | 2011-03-29 | Reflexion Networks, Inc. | System and method for controlling access to an electronic message recipient |
US7668951B2 (en) * | 2004-05-25 | 2010-02-23 | Google Inc. | Electronic message source reputation information system |
US7756930B2 (en) * | 2004-05-28 | 2010-07-13 | Ironport Systems, Inc. | Techniques for determining the reputation of a message sender |
US7917588B2 (en) * | 2004-05-29 | 2011-03-29 | Ironport Systems, Inc. | Managing delivery of electronic messages using bounce profiles |
US7873695B2 (en) * | 2004-05-29 | 2011-01-18 | Ironport Systems, Inc. | Managing connections and messages at a server by associating different actions for both different senders and different recipients |
US7664819B2 (en) * | 2004-06-29 | 2010-02-16 | Microsoft Corporation | Incremental anti-spam lookup and update service |
US7565423B1 (en) * | 2004-06-30 | 2009-07-21 | Google Inc. | System and method of accessing a document efficiently through multi-tier web caching |
US8037527B2 (en) | 2004-11-08 | 2011-10-11 | Bt Web Solutions, Llc | Method and apparatus for look-ahead security scanning |
US8196199B2 (en) * | 2004-10-19 | 2012-06-05 | Airdefense, Inc. | Personal wireless monitoring agent |
US8032594B2 (en) * | 2004-11-10 | 2011-10-04 | Digital Envoy, Inc. | Email anti-phishing inspector |
US7580982B2 (en) * | 2004-12-14 | 2009-08-25 | The Go Daddy Group, Inc. | Email filtering system and method |
US20060149823A1 (en) * | 2005-01-06 | 2006-07-06 | The Go Daddy Group, Inc | Electronic mail system and method |
US7984163B2 (en) * | 2005-01-13 | 2011-07-19 | Flash Networks, Inc. | Method and system for optimizing DNS queries |
US8011003B2 (en) * | 2005-02-14 | 2011-08-30 | Symantec Corporation | Method and apparatus for handling messages containing pre-selected data |
WO2006119506A2 (en) * | 2005-05-05 | 2006-11-09 | Ironport Systems, Inc. | Method of validating requests for sender reputation information |
US7984493B2 (en) * | 2005-07-22 | 2011-07-19 | Alcatel-Lucent | DNS based enforcement for confinement and detection of network malicious activities |
US7895651B2 (en) * | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8769663B2 (en) * | 2005-08-24 | 2014-07-01 | Fortinet, Inc. | Systems and methods for detecting undesirable network traffic content |
US7891001B1 (en) * | 2005-08-26 | 2011-02-15 | Perimeter Internetworking Corporation | Methods and apparatus providing security within a network |
US7774843B1 (en) * | 2005-11-16 | 2010-08-10 | Mcafee, Inc. | System, method and computer program product for preventing the execution of unwanted code |
US7849143B2 (en) | 2005-12-29 | 2010-12-07 | Research In Motion Limited | System and method of dynamic management of spam |
US8601160B1 (en) | 2006-02-09 | 2013-12-03 | Mcafee, Inc. | System, method and computer program product for gathering information relating to electronic content utilizing a DNS server |
-
2001
- 2001-02-20 US US09/785,240 patent/US8219620B2/en not_active Expired - Fee Related
-
2012
- 2012-03-24 US US13/429,338 patent/US20120185549A1/en not_active Abandoned
- 2012-03-24 US US13/429,345 patent/US8838714B2/en not_active Expired - Fee Related
- 2012-03-24 US US13/429,354 patent/US20120185551A1/en not_active Abandoned
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5724567A (en) * | 1994-04-25 | 1998-03-03 | Apple Computer, Inc. | System for directing relevance-ranked data objects to computer users |
US6199103B1 (en) * | 1997-06-24 | 2001-03-06 | Omron Corporation | Electronic mail determination method and system and storage medium |
US6421709B1 (en) * | 1997-12-22 | 2002-07-16 | Accepted Marketing, Inc. | E-mail filter and method thereof |
US6654787B1 (en) * | 1998-12-31 | 2003-11-25 | Brightmail, Incorporated | Method and apparatus for filtering e-mail |
US6370526B1 (en) * | 1999-05-18 | 2002-04-09 | International Business Machines Corporation | Self-adaptive method and system for providing a user-preferred ranking order of object sets |
US6546390B1 (en) * | 1999-06-11 | 2003-04-08 | Abuzz Technologies, Inc. | Method and apparatus for evaluating relevancy of messages to users |
US6460050B1 (en) * | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US7072942B1 (en) * | 2000-02-04 | 2006-07-04 | Microsoft Corporation | Email filtering methods and systems |
US6807566B1 (en) * | 2000-08-16 | 2004-10-19 | International Business Machines Corporation | Method, article of manufacture and apparatus for processing an electronic message on an electronic message board |
US6802012B1 (en) * | 2000-10-03 | 2004-10-05 | Networks Associates Technology, Inc. | Scanning computer files for unwanted properties |
US20020116463A1 (en) * | 2001-02-20 | 2002-08-22 | Hart Matthew Thomas | Unwanted e-mail filtering |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8838714B2 (en) | 2001-02-20 | 2014-09-16 | Mcafee, Inc. | Unwanted e-mail filtering system including voting feedback |
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US10154055B2 (en) | 2003-07-01 | 2018-12-11 | Securityprofiling, Llc | Real-time vulnerability monitoring |
US10104110B2 (en) | 2003-07-01 | 2018-10-16 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US10050988B2 (en) | 2003-07-01 | 2018-08-14 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US10021124B2 (en) | 2003-07-01 | 2018-07-10 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9117069B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Real-time vulnerability monitoring |
US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9225686B2 (en) | 2003-07-01 | 2015-12-29 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US20100263045A1 (en) * | 2004-06-30 | 2010-10-14 | Daniel Wesley Dulitz | System for reclassification of electronic messages in a spam filtering system |
US9961029B2 (en) * | 2004-06-30 | 2018-05-01 | Google Llc | System for reclassification of electronic messages in a spam filtering system |
US20140325007A1 (en) * | 2004-06-30 | 2014-10-30 | Google Inc. | System for reclassification of electronic messages in a spam filtering system |
US8782781B2 (en) * | 2004-06-30 | 2014-07-15 | Google Inc. | System for reclassification of electronic messages in a spam filtering system |
US8601160B1 (en) | 2006-02-09 | 2013-12-03 | Mcafee, Inc. | System, method and computer program product for gathering information relating to electronic content utilizing a DNS server |
US9246860B2 (en) | 2006-02-09 | 2016-01-26 | Mcafee, Inc. | System, method and computer program product for gathering information relating to electronic content utilizing a DNS server |
US20130086635A1 (en) * | 2011-09-30 | 2013-04-04 | General Electric Company | System and method for communication in a network |
US20160142352A1 (en) * | 2014-11-17 | 2016-05-19 | At&T Intellectual Property I, L.P. | System and Method for Cloud Based IP Mobile Messaging Spam Detection and Defense |
US9942182B2 (en) * | 2014-11-17 | 2018-04-10 | At&T Intellectual Property I, L.P. | System and method for cloud based IP mobile messaging spam detection and defense |
US10721197B2 (en) | 2014-11-17 | 2020-07-21 | At&T Intellectual Property I, L.P. | Cloud-based spam detection |
US11038826B2 (en) | 2014-11-17 | 2021-06-15 | At&T Intellectual Property I, L.P. | Cloud-based spam detection |
US11539645B2 (en) | 2014-11-17 | 2022-12-27 | At&T Intellectual Property I, L.P. | Cloud-based spam detection |
Also Published As
Publication number | Publication date |
---|---|
US8219620B2 (en) | 2012-07-10 |
US20120185549A1 (en) | 2012-07-19 |
US20020116463A1 (en) | 2002-08-22 |
US8838714B2 (en) | 2014-09-16 |
US20120185550A1 (en) | 2012-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8219620B2 (en) | Unwanted e-mail filtering system including voting feedback | |
US11601450B1 (en) | Suspicious message report processing and threat response | |
US7664812B2 (en) | Phonetic filtering of undesired email messages | |
US7930351B2 (en) | Identifying undesired email messages having attachments | |
US7853989B2 (en) | System for eliminating unauthorized electronic mail | |
US6453327B1 (en) | Method and apparatus for identifying and discarding junk electronic mail | |
US7406506B1 (en) | Identification and filtration of digital communications | |
US20180027086A1 (en) | Methods, Systems, and Products for Spam Messages | |
US20160301705A1 (en) | Suspicious message processing and incident response | |
WO2016164844A1 (en) | Message report processing and threat prioritization | |
EP1232431A1 (en) | System for eliminating unauthorized electronic mail | |
GB2347053A (en) | Proxy server filters unwanted email | |
US20050044160A1 (en) | Method and software product for identifying unsolicited emails | |
US6810408B1 (en) | Method and apparatus for controlling cascading e-mail distribution | |
EP3699796B1 (en) | Message report processing and threat prioritization | |
CN111510446B (en) | Attack detection method and device, electronic equipment and storage medium | |
US20070061402A1 (en) | Multipurpose internet mail extension (MIME) analysis | |
CN101212419A (en) | Junk message handling method in instant messaging system | |
US20230319076A1 (en) | Method and system for processing data packages | |
WO2001004787A2 (en) | Method and system for classifying users of an electronic network | |
CA2389472A1 (en) | Method for filtering email spam |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |