CA2476349A1 - E-mail management services - Google Patents
E-mail management services Download PDFInfo
- Publication number
- CA2476349A1 CA2476349A1 CA002476349A CA2476349A CA2476349A1 CA 2476349 A1 CA2476349 A1 CA 2476349A1 CA 002476349 A CA002476349 A CA 002476349A CA 2476349 A CA2476349 A CA 2476349A CA 2476349 A1 CA2476349 A1 CA 2476349A1
- Authority
- CA
- Canada
- Prior art keywords
- source
- address
- count
- messages
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract 54
- 238000007726 management method Methods 0.000 claims abstract 45
- 239000011159 matrix material Substances 0.000 claims abstract 11
- 230000005540 biological transmission Effects 0.000 claims abstract 9
- 230000001502 supplementing effect Effects 0.000 claims 20
- 241000700605 Viruses Species 0.000 claims 9
- 239000013589 supplement Substances 0.000 claims 2
Classifications
-
- G06Q50/60—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- G06Q50/40—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/23—Reliability checks, e.g. acknowledgments or fault reporting
Abstract
The present invention provides an electronic message management system (EMS) that includes a real-time feedback loop where data is collected from the electronic messages on incoming connection attempts, outgoing delivery attempts, and message content analysis, and written to a centralized data matrix. A separate process accesses the data matrix and analyzes trends in that data. The detected data patterns, trends or behavior is based on configuration parameters for the recipient. Based on these determinations, the process is able to instruct components in the EMS to accept, redirect, refuse, modify, defer, or otherwise dispose of the connection request, the delivery attempt, or the message. Associated methods for managing the transmission of electronic messages are also disclosed.
Claims (74)
1. A traffic monitor for use with a computer process in managing the transmission of electronic messages from sending mail servers to receiving mail servers, wherein messages sent from the sending mail servers comprise source data associated with the sending mail servers and destination data associated with the receiving mail servers, comprising:
a data matrix for storing the source and destination data for a plurality of incoming electronic messages; and an interface coupled to the matrix and configured to facilitate supplementing of the source and destination data with metadata provided by the computer process and based on the plurality of incoming electronic messages, and to facilitate access to the source and destination data and the metadata for use in processing the plurality of incoming electronic messages.
a data matrix for storing the source and destination data for a plurality of incoming electronic messages; and an interface coupled to the matrix and configured to facilitate supplementing of the source and destination data with metadata provided by the computer process and based on the plurality of incoming electronic messages, and to facilitate access to the source and destination data and the metadata for use in processing the plurality of incoming electronic messages.
2. The traffic monitor as recited in Claim 1, wherein the interface is configured to facilitate access to the source and destination data and metadata for use in generating processing instructions for processing the plurality of incoming electronic messages.
3. The traffic monitor as recited in Claim 2, wherein the processing instructions are disposition instructions for the plurality of incoming electronic messages.
4. The traffic monitor as recited in Claim 3, wherein the disposition instructions are selected from the group consisting of:
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
5. The traffic monitor as recited in Claim 1, wherein the interface is configured to facilitate supplementing of the source and destination data with metadata extrapolated from the plurality of incoming electronic messages using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
6. The traffic monitor as recited in Claim 1, wherein the metadata extrapolated from the plurality of incoming electronic messages is selected from the group consisting of:
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
7. A method for use with a computer process in managing the transmission of electronic messages from sending mail servers to receiving mail servers, wherein messages sent from the sending mail servers comprise source data associated with the sending mail servers and destination data associated with the receiving mail servers, comprising:
storing the source and destination data for a plurality of incoming electronic messages;
supplementing the source and destination data with metadata provided by the computer process and based on the plurality of incoming electronic messages;
and processing in the computer process the plurality of incoming electronic messages based on the source and destination data and the metadata.
storing the source and destination data for a plurality of incoming electronic messages;
supplementing the source and destination data with metadata provided by the computer process and based on the plurality of incoming electronic messages;
and processing in the computer process the plurality of incoming electronic messages based on the source and destination data and the metadata.
8. The method as recited in Claim 7, wherein processing includes generating processing instructions based on the source and destination data and the metadata for use in processing the plurality of incoming electronic messages.
9. The method as recited in Claim 8, wherein generating processing instructions includes generating disposition instructions for the plurality of incoming electronic messages.
10. The method as recited in Claim 9, wherein generating disposition instructions includes generating disposition instructions selected from the group consisting of:
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
11. The method as recited in Claim 7, wherein supplementing includes supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
12. The method as recited in Claim 7, wherein supplementing further includes supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages selected from the group consisting of count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
13. An electronic message management system for use in managing the transmission of electronic messages from sending mail servers to receiving mail servers, wherein messages sent from the sending mail servers comprise source data associated with the sending mail servers and destination data associated with the receiving mail servers, comprising:
a traffic monitor having a data matrix for storing the source and destination data for a plurality of incoming electronic messages, and an interface for facilitating access to the data matrix;
a message handling process coupled to the interface and configured to supplement the source and destination data with metadata extrapolated from the plurality of incoming electronic messages; and an interpreter process coupled to the interface and configured to access the source and destination data and the metadata to generate processing instructions based thereon, the message handling process further configured to process the plurality of incoming electronic messages based on the processing instructions.
a traffic monitor having a data matrix for storing the source and destination data for a plurality of incoming electronic messages, and an interface for facilitating access to the data matrix;
a message handling process coupled to the interface and configured to supplement the source and destination data with metadata extrapolated from the plurality of incoming electronic messages; and an interpreter process coupled to the interface and configured to access the source and destination data and the metadata to generate processing instructions based thereon, the message handling process further configured to process the plurality of incoming electronic messages based on the processing instructions.
14. The electronic message management system as recited in Claim 13, wherein the processing instructions are disposition instructions for the plurality of incoming electronic messages.
15. The electronic message management system as recited in Claim 14, wherein the interpreter process is configured to generate disposition instructions selected from the group consisting of:
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
16. The electronic message management system as recited in Claim 13, wherein the message handling process includes a connection management module configured to extract the source and destination data, and to accept the plurality of incoming electronic messages from the sending mail servers based on the processing instructions.
17. The electronic message management system as recited in Claim 16, further including a connection management table coupled between the interpreter process and the connection management module, and configured to hold the processing instructions.
18. The electronic message management system as recited in Claim 13, wherein the message handling process includes a delivery module configured to deliver the plurality of incoming electronic messages to the receiving mail servers based on the processing instructions.
19. The electronic message management system as recited in Claim 18, wherein the interpreter process is configured to generate processing instructions based on the source and destination data and the metadata in accordance with rules stored in a database.
20. The electronic message management system as recited in Claim 19, further including an administrative access console coupled to the database and configured to establish the rules.
21. The electronic message management system as recited in Claim 13, wherein the message handling process is configured to supplement the source and destination data with metadata extrapolated using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
22. The electronic message management system as recited in Claim 13, wherein the metadata extrapolated from the plurality of incoming electronic messages is selected from the group consisting of count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
23. The electronic message management system as recited in Claim 13, wherein the destination data includes original delivery addresses of the receiving mail servers, the message handling process further configured to intercept the plurality of incoming electronic messages by associating a delivery address of the electronic message management system with the original delivery addresses.
24. A method for managing the transmission of electronic messages from sending mail servers to receiving mail servers, wherein messages sent from the sending mail servers comprise source data associated with the sending mail servers and destination data associated with the receiving mail servers, comprising:
storing the source and destination data for a plurality of incoming electronic messages in a data matrix;
extrapolating metadata from the plurality of incoming electronic messages;
supplementing the source and destination data with the metadata;
accessing the source and destination data and the metadata via an interface;
generating processing instructions based on the source and destination data and the metadata; and processing the plurality of incoming electronic messages based on the processing instructions.
storing the source and destination data for a plurality of incoming electronic messages in a data matrix;
extrapolating metadata from the plurality of incoming electronic messages;
supplementing the source and destination data with the metadata;
accessing the source and destination data and the metadata via an interface;
generating processing instructions based on the source and destination data and the metadata; and processing the plurality of incoming electronic messages based on the processing instructions.
25. The method as recited in Claim 24, wherein generating processing instructions includes generating disposition instructions for the plurality of incoming electronic messages.
26. The method as recited in Claim 25, wherein generating includes generating disposition instructions selected from the group consisting of:
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
27. The method as recited in Claim 24, wherein the processing includes accepting the plurality of incoming electronic messages from the sending mail servers based on the source and destination data and the metadata.
28. The method as recited in Claim 27, wherein generating processing instructions includes generating processing instructions in a connection management table, and the processing includes processing the plurality of incoming electronic messages based on the message processing instruction in the connection management table.
29. The method as recited in Claim 24, wherein the processing includes delivering the plurality of incoming electronic messages to the receiving mail servers based on the source and destination data and the metadata.
30. The method as recited in Claim 24, wherein generating includes generating processing instructions based on the source and destination data and the metadata in accordance with rules stored in a database.
31. The method as recited in Claim 30, wherein generating further includes generating processing instructions in accordance with rules established using an administrative access console coupled to the database.
32. The method as recited in Claim 24, wherein extrapolating includes extrapolating the metadata from the plurality of incoming electronic messages using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
33. The method as recited in Claim 24, wherein extrapolating includes extrapolating metadata selected from the group consisting of count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
34. The method as recited in Claim 24, wherein the destination data includes original delivery addresses of the receiving mail servers, the method further including intercepting the plurality of incoming electronic messages by associating a new delivery address with the original delivery addresses.
35. An electronic message management system for use in managing the transmission of electronic messages from sending mail servers to receiving mail servers, comprising:
a connection management module configured to extract source data associated with the sending mail servers and destination data associated with the receiving mail servers from a plurality of incoming electronic messages;
a data matrix for storing the source and destination data; and an interface coupled between the data matrix and the connection management module and configured to facilitate supplementing of the source and destination data with metadata extrapolated from the plurality of incoming electronic messages, and to facilitate access to the source and destination data and the metadata, the connection management module further configured to accept any of the plurality of incoming electronic messages from the sending mail servers based on the source and destination data and the metadata.
a connection management module configured to extract source data associated with the sending mail servers and destination data associated with the receiving mail servers from a plurality of incoming electronic messages;
a data matrix for storing the source and destination data; and an interface coupled between the data matrix and the connection management module and configured to facilitate supplementing of the source and destination data with metadata extrapolated from the plurality of incoming electronic messages, and to facilitate access to the source and destination data and the metadata, the connection management module further configured to accept any of the plurality of incoming electronic messages from the sending mail servers based on the source and destination data and the metadata.
36. The electronic message management system as recited in Claim 35, further including a connection management table having processing instructions based on the source and destination data and the metadata, the connection management module configured to accept any of the plurality of incoming electronic messages based on the processing instructions.
37. The electronic message management system as recited in Claim 36, wherein the processing instructions are disposition instructions selected from the group consisting of:
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
38. The electronic message management system as recited in Claim 36, wherein the processing instructions are generated in accordance with rules stored in a database.
39. The electronic message management system as recited in Claim 38, further including an administrative access console coupled to the database and configured to establish the rules.
40. The electronic message management system as recited in Claim 35, wherein the metadata is extrapolated from the plurality of incoming messages using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
41. The electronic message management system as recited in Claim 35, wherein the metadata extrapolated from the plurality of incoming electronic messages is selected from the group consisting of:
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
42. The electronic message management system as recited in Claim 35, wherein the destination data includes original delivery addresses of the receiving mail servers, the connection management module further configured to intercept the plurality of incoming electronic messages by associating a delivery address of the electronic message management system with the original delivery addresses.
43. A method for managing the transmission of electronic messages from sending mail servers to receiving mail servers, comprising:
extracting source data associated with the sending mail servers and destination data associated with the receiving mail servers from a plurality of incoming electronic messages;
supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages; and accepting any of the plurality of incoming electronic messages from the sending mail servers based on the source and destination data and the metadata.
extracting source data associated with the sending mail servers and destination data associated with the receiving mail servers from a plurality of incoming electronic messages;
supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages; and accepting any of the plurality of incoming electronic messages from the sending mail servers based on the source and destination data and the metadata.
44. The method as recited in Claim 43, wherein accepting includes accepting any of the plurality of incoming electronic messages based on processing instructions based on the source and destination data and the metadata.
45. The method as recited in Claim 44, wherein the processing instructions are disposition instructions selected from the group consisting of:
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
message accept;
message reject;
message quarantine;
message spool;
message defer;
message throttle;
message redirect;
connection rejection; and black hole.
46. The method as recited in Claim 44, wherein accepting further includes accepting any of the plurality of incoming electronic messages based on processing instructions generated in accordance with rules stored in a database.
47. The method as recited in Claim 46, wherein accepting further includes accepting any of the plurality of incoming electronic messages based on processing instructions generated in accordance with rules stored in a database established using an administrative access console coupled to the database.
48. The method as recited in Claim 43, wherein the supplementing includes supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
49. The method as recited in Claim 43, wherein the supplementing includes supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages selected from the group consisting of:
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
50. The method as recited in Claim 43, wherein the destination data includes original delivery addresses of the receiving mail servers, the method further including intercepting the plurality of incoming electronic messages by associating a new delivery address with the original delivery addresses.
51. An electronic message management system for use in managing the transmission of electronic messages from sending mail servers to receiving mail servers, comprising:
a data matrix for storing source data associated with the sending mail servers and destination data associated with the receiving mail servers for a plurality of incoming electronic messages;
an interface coupled to the data matrix and configured to facilitate supplementing of the source and destination data with metadata extrapolated from the plurality of incoming electronic messages, and to facilitate access to the source and destination data and the metadata; and a delivery management module coupled to the interface and configured to deliver any of the plurality of incoming electronic messages to the receiving mail servers based on the source and destination data and the metadata.
a data matrix for storing source data associated with the sending mail servers and destination data associated with the receiving mail servers for a plurality of incoming electronic messages;
an interface coupled to the data matrix and configured to facilitate supplementing of the source and destination data with metadata extrapolated from the plurality of incoming electronic messages, and to facilitate access to the source and destination data and the metadata; and a delivery management module coupled to the interface and configured to deliver any of the plurality of incoming electronic messages to the receiving mail servers based on the source and destination data and the metadata.
52. The electronic message management system as recited in Claim 51, wherein the delivery management module is configured to deliver any of the plurality of incoming electronic messages to the receiving mail servers based on processing instruction based on the source and destination data and the metadata.
53. The electronic message management system as recited in Claim 52, wherein the delivery management module is configured to deliver any of the plurality of incoming electronic messages to a plurality of receiving mail servers based on loading capabilities of the plurality of receiving mail servers.
54. The electronic message management system as recited in Claim 52, wherein the processing instructions are disposition instructions for the plurality of incoming electronic messages.
55. The electronic message management system as recited in Claim 54, wherein the disposition instructions are selected from the group consisting of:
message deliver;
message defer;
message reject; and message redirect.
message deliver;
message defer;
message reject; and message redirect.
56. The electronic message management system as recited in Claim 51, wherein the processing instructions based on the source and destination data and the metadata are generated in accordance with rules stored in a database.
57. The electronic message management system as recited in Claim 55, further including an administrative access console coupled to the database and configured to establish the rules.
58. The electronic message management system as recited in Claim 51, wherein the metadata is extrapolated from the plurality of incoming electronic messages using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
59. The electronic message management system as recited in Claim 51, wherein the metadata extrapolated is selected from the group consisting of:
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
60. A method for managing the transmission of electronic messages from sending mail servers to receiving mail servers, comprising:
storing source data associated with the sending mail servers and destination data associated with the receiving mail servers from a plurality of incoming electronic messages;
supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages; and delivering any of the plurality of incoming electronic messages to the receiving mail servers based on the source and destination data and the metadata.
storing source data associated with the sending mail servers and destination data associated with the receiving mail servers from a plurality of incoming electronic messages;
supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages; and delivering any of the plurality of incoming electronic messages to the receiving mail servers based on the source and destination data and the metadata.
61. The method as recited in Claim 60, wherein delivering includes delivering any of the plurality of incoming electronic messages to the receiving mail servers based on processing instructions based on the source and destination data and the metadata.
62. The method as recited in Claim 61, wherein delivering includes delivering any of the plurality of incoming electronic messages to a plurality of receiving mail servers based on loading capabilities of the plurality of receiving mail servers.
63. The method as recited in Claim 61, wherein the processing instructions are disposition instructions selected from the group consisting of:
message deliver;
message defer;
message reject; and message redirect.
message deliver;
message defer;
message reject; and message redirect.
64. The method as recited in Claim 61, wherein delivering further includes delivering any of the plurality of incoming electronic messages based on processing instructions generated in accordance with rules stored in a database.
65. The method as recited in Claim 60, wherein delivering further includes delivering any of the plurality of incoming electronic messages based on processing instructions generated in accordance with rules stored in a database established using an administrative access console coupled to the database.
66. The method as recited in Claim 60, wherein the supplementing includes supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
67. The method as recited in Claim 60, wherein the supplementing includes supplementing the source and destination data with metadata extrapolated from the plurality of incoming electronic messages selected from the group consisting of:
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
68. A data structure associated with an electronic messaging network for transmitting a plurality of incoming electronic messages comprising at least a sending mail server and a receiving mail server, the data structure comprising:
source data fields configured to contain source data extracted from the plurality of incoming electronic messages, the source data containing at least data associated with the sending mail server;
destination data fields configured to contain destination data extracted from the plurality of incoming electronic messages, the destination data containing at least data associated with the receiving mail server; and processing fields configured to contain message-processing data for processing the plurality of incoming electronic messages, the message processing data based on the source and destination data and on metadata extrapolated from the plurality of incoming electronic messages.
source data fields configured to contain source data extracted from the plurality of incoming electronic messages, the source data containing at least data associated with the sending mail server;
destination data fields configured to contain destination data extracted from the plurality of incoming electronic messages, the destination data containing at least data associated with the receiving mail server; and processing fields configured to contain message-processing data for processing the plurality of incoming electronic messages, the message processing data based on the source and destination data and on metadata extrapolated from the plurality of incoming electronic messages.
69. The data structure as recited in Claim 68, wherein the message processing data includes message disposition instructions for processing the plurality of incoming electronic messages.
70. The data structure as recited in Claim 69, wherein the disposition instructions are selected from the group consisting of:
message accept;
message reject;
message quarantine;
message spool;
message accept;
message reject;
message quarantine;
message spool;
71 message defer;
message throttle;
message redirect;
connection rejection; and black hole.
71. The data structure as recited in Claim 68, wherein the metadata is extrapolated from the plurality of incoming electronic messages using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
message throttle;
message redirect;
connection rejection; and black hole.
71. The data structure as recited in Claim 68, wherein the metadata is extrapolated from the plurality of incoming electronic messages using program threads for detecting unwanted electronic messages and unwanted electronic message delivery attempts.
72. The data structure as recited in Claim 68, wherein the metadata extrapolated from the plurality of incoming electronic messages is selected from the group consisting of:
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
count of connection attempts from source IP address;
count of current open connections from source IP address;
duration of connections from source IP address;
count of messages from source IP address;
message size;
count of recipients on messages;
count of spam messages from source IP address;
count of virus infected messages from source IP address count of messages from source IP address with unwanted binary attachment;
count of messages from source IP address with unwanted content;
count of messages from source IP address against which the disposition option was blocked, black-holed, spooled, or quarantined;
count of current open connections to destination IP address;
duration of connections to destination IP address;
count of failed connections to destination IP address;
count of temporary deferral errors from destination IP address; and count of unknown user errors from destination IP address.
73. The data structure as recited in Claim 68, wherein the message processing data based on the source and destination data and metadata is generated in accordance with rules stored in a database.
74. The data structure as recited in Claim 73, wherein the rules are established using an administrative access console coupled to the database.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US35789302P | 2002-02-19 | 2002-02-19 | |
US60/357,893 | 2002-02-19 | ||
PCT/US2003/004757 WO2003071390A2 (en) | 2002-02-19 | 2003-02-19 | E-mail management services |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2476349A1 true CA2476349A1 (en) | 2003-08-28 |
CA2476349C CA2476349C (en) | 2010-09-28 |
Family
ID=27757671
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2476349A Expired - Lifetime CA2476349C (en) | 2002-02-19 | 2003-02-19 | E-mail management services |
Country Status (10)
Country | Link |
---|---|
US (5) | US6941348B2 (en) |
EP (2) | EP1476819B1 (en) |
JP (1) | JP4593926B2 (en) |
KR (1) | KR100871581B1 (en) |
CN (1) | CN1332333C (en) |
AT (1) | ATE427608T1 (en) |
AU (1) | AU2003215276B2 (en) |
CA (1) | CA2476349C (en) |
DE (1) | DE60326938D1 (en) |
WO (1) | WO2003071390A2 (en) |
Families Citing this family (350)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US6650890B1 (en) * | 2000-09-29 | 2003-11-18 | Postini, Inc. | Value-added electronic messaging services and transparent implementation thereof using intermediate server |
US20020111937A1 (en) * | 2001-01-29 | 2002-08-15 | Mark Wetherbee | Method and system for permissible internet direct marketing |
US8219620B2 (en) | 2001-02-20 | 2012-07-10 | Mcafee, Inc. | Unwanted e-mail filtering system including voting feedback |
US7243163B1 (en) | 2001-08-07 | 2007-07-10 | Good Technology, Inc. | System and method for full wireless synchronization of a data processing apparatus with a messaging system |
US7743119B2 (en) * | 2001-08-07 | 2010-06-22 | Motorola, Inc. | System and method for mapping identification codes |
US7596565B2 (en) * | 2001-08-07 | 2009-09-29 | Good Technology | System and method for maintaining wireless file folders at a wireless device |
US7962622B2 (en) | 2001-08-07 | 2011-06-14 | Motorola Mobility, Inc. | System and method for providing provisioning and upgrade services for a wireless device |
JP3797937B2 (en) * | 2002-02-04 | 2006-07-19 | 株式会社日立製作所 | Network connection system, network connection method, and network connection device used therefor |
KR100871581B1 (en) * | 2002-02-19 | 2008-12-02 | 포스티니 코포레이션 | E-mail management services |
US20060015942A1 (en) | 2002-03-08 | 2006-01-19 | Ciphertrust, Inc. | Systems and methods for classification of messaging entities |
US8578480B2 (en) | 2002-03-08 | 2013-11-05 | Mcafee, Inc. | Systems and methods for identifying potentially malicious messages |
US7870203B2 (en) * | 2002-03-08 | 2011-01-11 | Mcafee, Inc. | Methods and systems for exposing messaging reputation to an end user |
US7694128B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for secure communication delivery |
US8132250B2 (en) | 2002-03-08 | 2012-03-06 | Mcafee, Inc. | Message profiling systems and methods |
US8561167B2 (en) | 2002-03-08 | 2013-10-15 | Mcafee, Inc. | Web reputation scoring |
US7693947B2 (en) * | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for graphically displaying messaging traffic |
US7458098B2 (en) * | 2002-03-08 | 2008-11-25 | Secure Computing Corporation | Systems and methods for enhancing electronic communication security |
US7903549B2 (en) * | 2002-03-08 | 2011-03-08 | Secure Computing Corporation | Content-based policy compliance systems and methods |
US6941467B2 (en) * | 2002-03-08 | 2005-09-06 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues |
US20030172291A1 (en) | 2002-03-08 | 2003-09-11 | Paul Judge | Systems and methods for automated whitelisting in monitored communications |
US7124438B2 (en) * | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
US7447799B2 (en) * | 2002-04-24 | 2008-11-04 | Good Technology, Inc. | System and method for automatically updating a wireless device |
US20030217094A1 (en) * | 2002-05-17 | 2003-11-20 | Anthony Dean Andrews | Correlation framework |
GB2407735A (en) * | 2002-05-28 | 2005-05-04 | Alan H Teague | Message processing based on address patterns and automated management and control of contact aliases |
GB2391419A (en) | 2002-06-07 | 2004-02-04 | Hewlett Packard Co | Restricting the propagation of a virus within a network |
GB2401280B (en) * | 2003-04-29 | 2006-02-08 | Hewlett Packard Development Co | Propagation of viruses through an information technology network |
US9813514B2 (en) | 2002-06-12 | 2017-11-07 | Good Technology Holdings Limited | Information repository system including a wireless device and related method |
US7310660B1 (en) * | 2002-06-25 | 2007-12-18 | Engate Technology Corporation | Method for removing unsolicited e-mail messages |
US8516034B1 (en) | 2002-07-08 | 2013-08-20 | Good Technology Software, Inc | System and method for modifying application behavior based on network bandwidth |
US7539726B1 (en) | 2002-07-16 | 2009-05-26 | Sonicwall, Inc. | Message testing |
US8396926B1 (en) | 2002-07-16 | 2013-03-12 | Sonicwall, Inc. | Message challenge response |
US7908330B2 (en) * | 2003-03-11 | 2011-03-15 | Sonicwall, Inc. | Message auditing |
US20040015719A1 (en) * | 2002-07-16 | 2004-01-22 | Dae-Hyung Lee | Intelligent security engine and intelligent and integrated security system using the same |
US8924484B2 (en) | 2002-07-16 | 2014-12-30 | Sonicwall, Inc. | Active e-mail filter with challenge-response |
US7870260B2 (en) | 2002-08-09 | 2011-01-11 | Reflexion Networks, Inc. | System and method for controlling access to an electronic message recipient |
US7490128B1 (en) | 2002-09-09 | 2009-02-10 | Engate Technology Corporation | Unsolicited message rejecting communications processor |
US7673058B1 (en) | 2002-09-09 | 2010-03-02 | Engate Technology Corporation | Unsolicited message intercepting communications processor |
US7716351B1 (en) | 2002-09-09 | 2010-05-11 | Engate Technology Corporation | Unsolicited message diverting communications processor |
US8380791B1 (en) | 2002-12-13 | 2013-02-19 | Mcafee, Inc. | Anti-spam system, method, and computer program product |
AU2003300083A1 (en) * | 2002-12-30 | 2004-07-29 | Activestate Corporation | Method and system for feature extraction from outgoing messages for use in categorization of incoming messages |
US7219131B2 (en) * | 2003-01-16 | 2007-05-15 | Ironport Systems, Inc. | Electronic message delivery using an alternate source approach |
JP4344922B2 (en) * | 2003-01-27 | 2009-10-14 | 富士ゼロックス株式会社 | Evaluation apparatus and method |
US20060265459A1 (en) * | 2003-02-19 | 2006-11-23 | Postini, Inc. | Systems and methods for managing the transmission of synchronous electronic messages |
US7958187B2 (en) * | 2003-02-19 | 2011-06-07 | Google Inc. | Systems and methods for managing directory harvest attacks via electronic messages |
US8266215B2 (en) | 2003-02-20 | 2012-09-11 | Sonicwall, Inc. | Using distinguishing properties to classify messages |
US7406502B1 (en) | 2003-02-20 | 2008-07-29 | Sonicwall, Inc. | Method and system for classifying a message based on canonical equivalent of acceptable items included in the message |
US7299261B1 (en) | 2003-02-20 | 2007-11-20 | Mailfrontier, Inc. A Wholly Owned Subsidiary Of Sonicwall, Inc. | Message classification using a summary |
US7856477B2 (en) * | 2003-04-04 | 2010-12-21 | Yahoo! Inc. | Method and system for image verification to prevent messaging abuse |
US7796515B2 (en) * | 2003-04-29 | 2010-09-14 | Hewlett-Packard Development Company, L.P. | Propagation of viruses through an information technology network |
US7653698B2 (en) * | 2003-05-29 | 2010-01-26 | Sonicwall, Inc. | Identifying e-mail messages from allowed senders |
US7814542B1 (en) * | 2003-06-30 | 2010-10-12 | Cisco Technology, Inc. | Network connection detection and throttling |
US7051077B2 (en) * | 2003-06-30 | 2006-05-23 | Mx Logic, Inc. | Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers |
US20050010644A1 (en) * | 2003-07-07 | 2005-01-13 | Brown Scott T. | High performance electronic message delivery engine |
US20050015626A1 (en) * | 2003-07-15 | 2005-01-20 | Chasin C. Scott | System and method for identifying and filtering junk e-mail messages or spam based on URL content |
US7814545B2 (en) | 2003-07-22 | 2010-10-12 | Sonicwall, Inc. | Message classification using classifiers |
US7383306B2 (en) * | 2003-07-31 | 2008-06-03 | Hewlett-Packard Development Company, L.P. | System and method for selectively increasing message transaction costs |
GB2405229B (en) * | 2003-08-19 | 2006-01-11 | Sophos Plc | Method and apparatus for filtering electronic mail |
US7451487B2 (en) * | 2003-09-08 | 2008-11-11 | Sonicwall, Inc. | Fraudulent message detection |
US20050114457A1 (en) * | 2003-10-27 | 2005-05-26 | Meng-Fu Shih | Filtering device for eliminating unsolicited email |
US7620690B1 (en) | 2003-11-20 | 2009-11-17 | Lashback, LLC | Privacy control system for electronic communication |
US9401838B2 (en) * | 2003-12-03 | 2016-07-26 | Emc Corporation | Network event capture and retention system |
US7647379B2 (en) * | 2003-12-19 | 2010-01-12 | International Business Machines Corporation | System and method for re-routing messaging traffic to external resources |
US8886727B1 (en) * | 2004-01-27 | 2014-11-11 | Sonicwall, Inc. | Message distribution control |
US7970831B2 (en) * | 2004-02-02 | 2011-06-28 | The Boeing Company | Intelligent email services |
US9471712B2 (en) | 2004-02-09 | 2016-10-18 | Dell Software Inc. | Approximate matching of strings for message filtering |
US8856239B1 (en) | 2004-02-10 | 2014-10-07 | Sonicwall, Inc. | Message classification based on likelihood of spoofing |
EP1716676B1 (en) * | 2004-02-17 | 2012-06-13 | Cisco Technology, Inc. | Collecting, aggregating, and managing information relating to electronic messages |
US8214438B2 (en) * | 2004-03-01 | 2012-07-03 | Microsoft Corporation | (More) advanced spam detection features |
US20050216587A1 (en) * | 2004-03-25 | 2005-09-29 | International Business Machines Corporation | Establishing trust in an email client |
US9106694B2 (en) | 2004-04-01 | 2015-08-11 | Fireeye, Inc. | Electronic message analysis for malware detection |
US8584239B2 (en) | 2004-04-01 | 2013-11-12 | Fireeye, Inc. | Virtual machine with dynamic data flow analysis |
US8881282B1 (en) | 2004-04-01 | 2014-11-04 | Fireeye, Inc. | Systems and methods for malware attack detection and identification |
US8549638B2 (en) | 2004-06-14 | 2013-10-01 | Fireeye, Inc. | System and method of containing computer worms |
US8566946B1 (en) | 2006-04-20 | 2013-10-22 | Fireeye, Inc. | Malware containment on connection |
US8898788B1 (en) | 2004-04-01 | 2014-11-25 | Fireeye, Inc. | Systems and methods for malware attack prevention |
US8528086B1 (en) | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
US8793787B2 (en) | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
US8171553B2 (en) | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
US7587537B1 (en) | 2007-11-30 | 2009-09-08 | Altera Corporation | Serializer-deserializer circuits formed from input-output circuit registers |
US7640307B2 (en) * | 2004-04-19 | 2009-12-29 | Bigstring Corporation | Universal recallable, erasable, secure and timed delivery email |
US7783706B1 (en) * | 2004-04-21 | 2010-08-24 | Aristotle.Net, Inc. | Filtering and managing electronic mail |
US7647321B2 (en) * | 2004-04-26 | 2010-01-12 | Google Inc. | System and method for filtering electronic messages using business heuristics |
CA2733172C (en) * | 2004-05-07 | 2011-10-25 | Sandvine Incorporated Ulc | A system and method for detecting sources of abnormal computer network messages |
US7756929B1 (en) * | 2004-05-18 | 2010-07-13 | Microsoft Corporation | System and method for processing e-mail |
US7912905B2 (en) * | 2004-05-18 | 2011-03-22 | Computer Associates Think, Inc. | System and method for filtering network messages |
AU2005247504B2 (en) * | 2004-05-25 | 2008-12-18 | Reflexion Networks, Inc. | A system and method for controlling access to an electronic message recipient |
US7668951B2 (en) * | 2004-05-25 | 2010-02-23 | Google Inc. | Electronic message source reputation information system |
US7698369B2 (en) | 2004-05-27 | 2010-04-13 | Strongmail Systems, Inc. | Email delivery system using metadata on emails to manage virtual storage |
US7756930B2 (en) | 2004-05-28 | 2010-07-13 | Ironport Systems, Inc. | Techniques for determining the reputation of a message sender |
US7870200B2 (en) * | 2004-05-29 | 2011-01-11 | Ironport Systems, Inc. | Monitoring the flow of messages received at a server |
US7873695B2 (en) * | 2004-05-29 | 2011-01-18 | Ironport Systems, Inc. | Managing connections and messages at a server by associating different actions for both different senders and different recipients |
US8166310B2 (en) | 2004-05-29 | 2012-04-24 | Ironport Systems, Inc. | Method and apparatus for providing temporary access to a network device |
US7849142B2 (en) * | 2004-05-29 | 2010-12-07 | Ironport Systems, Inc. | Managing connections, messages, and directory harvest attacks at a server |
US7917588B2 (en) * | 2004-05-29 | 2011-03-29 | Ironport Systems, Inc. | Managing delivery of electronic messages using bounce profiles |
US20050289148A1 (en) * | 2004-06-10 | 2005-12-29 | Steven Dorner | Method and apparatus for detecting suspicious, deceptive, and dangerous links in electronic messages |
US20060031318A1 (en) * | 2004-06-14 | 2006-02-09 | Gellens Randall C | Communicating information about the content of electronic messages to a server |
US7748038B2 (en) * | 2004-06-16 | 2010-06-29 | Ironport Systems, Inc. | Method and apparatus for managing computer virus outbreaks |
US8484295B2 (en) | 2004-12-21 | 2013-07-09 | Mcafee, Inc. | Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse |
US7680890B1 (en) | 2004-06-22 | 2010-03-16 | Wei Lin | Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers |
US7953814B1 (en) | 2005-02-28 | 2011-05-31 | Mcafee, Inc. | Stopping and remediating outbound messaging abuse |
US7580981B1 (en) | 2004-06-30 | 2009-08-25 | Google Inc. | System for determining email spam by delivery path |
US7157327B2 (en) * | 2004-07-01 | 2007-01-02 | Infineon Technologies Ag | Void free, silicon filled trenches in semiconductors |
US8671144B2 (en) * | 2004-07-02 | 2014-03-11 | Qualcomm Incorporated | Communicating information about the character of electronic messages to a client |
US20060036690A1 (en) * | 2004-07-12 | 2006-02-16 | O'neil Patrick J | Network protection system |
US7343624B1 (en) * | 2004-07-13 | 2008-03-11 | Sonicwall, Inc. | Managing infectious messages as identified by an attachment |
US9154511B1 (en) | 2004-07-13 | 2015-10-06 | Dell Software Inc. | Time zero detection of infectious messages |
US7634808B1 (en) * | 2004-08-20 | 2009-12-15 | Symantec Corporation | Method and apparatus to block fast-spreading computer worms that use DNS MX record queries |
US20060047758A1 (en) * | 2004-08-26 | 2006-03-02 | Vivek Sharma | Extending and optimizing electronic messaging rules |
US7552179B2 (en) * | 2004-09-20 | 2009-06-23 | Microsoft Corporation | Envelope e-mail journaling with best effort recipient updates |
US7644126B2 (en) * | 2004-09-29 | 2010-01-05 | Qualcomm Incoporated | Message thread handling |
US8495145B2 (en) | 2004-10-14 | 2013-07-23 | Intel Corporation | Controlling receipt of undesired electronic mail |
US8635690B2 (en) | 2004-11-05 | 2014-01-21 | Mcafee, Inc. | Reputation based message processing |
US20060168013A1 (en) * | 2004-11-26 | 2006-07-27 | Invensys Systems, Inc. | Message management facility for an industrial process control environment |
US8738708B2 (en) | 2004-12-21 | 2014-05-27 | Mcafee, Inc. | Bounce management in a trusted communication network |
US9015472B1 (en) | 2005-03-10 | 2015-04-21 | Mcafee, Inc. | Marking electronic messages to indicate human origination |
US9160755B2 (en) | 2004-12-21 | 2015-10-13 | Mcafee, Inc. | Trusted communication network |
US20060168046A1 (en) * | 2005-01-11 | 2006-07-27 | Microsoft Corporaion | Managing periodic electronic messages |
US7716743B2 (en) * | 2005-01-14 | 2010-05-11 | Microsoft Corporation | Privacy friendly malware quarantines |
US7478132B2 (en) | 2005-01-24 | 2009-01-13 | International Business Machines Corporation | Dynamic email content update process |
US8312119B2 (en) * | 2005-03-01 | 2012-11-13 | Microsoft Corporation | IP block activity feedback system |
US10225282B2 (en) * | 2005-04-14 | 2019-03-05 | International Business Machines Corporation | System, method and program product to identify a distributed denial of service attack |
US8583740B2 (en) * | 2005-04-25 | 2013-11-12 | Google Inc. | Actionable quarantine summary |
US7836133B2 (en) * | 2005-05-05 | 2010-11-16 | Ironport Systems, Inc. | Detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources |
US20060253597A1 (en) * | 2005-05-05 | 2006-11-09 | Mujica Technologies Inc. | E-mail system |
US8874658B1 (en) * | 2005-05-11 | 2014-10-28 | Symantec Corporation | Method and apparatus for simulating end user responses to spam email messages |
JP4559295B2 (en) * | 2005-05-17 | 2010-10-06 | 株式会社エヌ・ティ・ティ・ドコモ | Data communication system and data communication method |
US7757288B1 (en) * | 2005-05-23 | 2010-07-13 | Symantec Corporation | Malicious e-mail attack inversion filter |
US7937480B2 (en) | 2005-06-02 | 2011-05-03 | Mcafee, Inc. | Aggregation of reputation data |
US20060277259A1 (en) * | 2005-06-07 | 2006-12-07 | Microsoft Corporation | Distributed sender reputations |
US7552230B2 (en) * | 2005-06-15 | 2009-06-23 | International Business Machines Corporation | Method and apparatus for reducing spam on peer-to-peer networks |
CA2518894C (en) * | 2005-06-23 | 2014-06-10 | Cognos Incorporated | Request routing system for and method of request routing |
CA2510626A1 (en) * | 2005-06-23 | 2006-12-23 | Cognos Incorporated | Request routing system for and method of request routing |
CN1921458B (en) * | 2005-08-23 | 2011-09-28 | 吴刚强 | System and method for uniform switch-in and exchange of enterprise E-mail |
US20070061402A1 (en) * | 2005-09-15 | 2007-03-15 | Microsoft Corporation | Multipurpose internet mail extension (MIME) analysis |
CN1794722B (en) * | 2005-09-19 | 2010-05-05 | 华为技术有限公司 | Method of transfering off-line message and instant message server |
US7636944B2 (en) * | 2005-10-28 | 2009-12-22 | Hewlett-Packard Development Company, L.P. | Method and apparatus for detecting and responding to email based propagation of malicious software in a trusted network |
US8077699B2 (en) * | 2005-11-07 | 2011-12-13 | Microsoft Corporation | Independent message stores and message transport agents |
US8595814B2 (en) * | 2005-12-13 | 2013-11-26 | Google Inc. | TLS encryption in a managed e-mail service environment |
US8601160B1 (en) | 2006-02-09 | 2013-12-03 | Mcafee, Inc. | System, method and computer program product for gathering information relating to electronic content utilizing a DNS server |
US7620392B1 (en) | 2006-02-27 | 2009-11-17 | Good Technology, Inc. | Method and system for distributing and updating software in wireless devices |
US20070220143A1 (en) * | 2006-03-20 | 2007-09-20 | Postini, Inc. | Synchronous message management system |
AU2013200872B2 (en) * | 2006-03-20 | 2014-08-21 | Google Inc. | Synchronous message management system |
CA2659007C (en) * | 2006-03-20 | 2015-06-16 | Google Inc. | Synchronous message management system |
US20070276915A1 (en) * | 2006-04-04 | 2007-11-29 | Wireless Services Corp. | Managing messages between multiple wireless carriers to multiple enterprises using a relatively limited number of identifiers |
US8458261B1 (en) * | 2006-04-07 | 2013-06-04 | Trend Micro Incorporated | Determination of valid email addresses in a private computer network |
US7958557B2 (en) * | 2006-05-17 | 2011-06-07 | Computer Associates Think, Inc. | Determining a source of malicious computer element in a computer network |
US20080034375A1 (en) * | 2006-08-03 | 2008-02-07 | Ferrell Terry L | System and method to provide a message service agent with pluggable functionality |
US20080052284A1 (en) * | 2006-08-05 | 2008-02-28 | Terry Stokes | System and Method for the Capture and Archival of Electronic Communications |
US20080037583A1 (en) * | 2006-08-09 | 2008-02-14 | Postini, Inc. | Unified management policy for multiple format electronic communications |
US8239943B2 (en) * | 2006-08-18 | 2012-08-07 | Microsoft Corporation | Network security page |
US20080082658A1 (en) * | 2006-09-29 | 2008-04-03 | Wan-Yen Hsu | Spam control systems and methods |
US8180835B1 (en) * | 2006-10-14 | 2012-05-15 | Engate Technology Corporation | System and method for protecting mail servers from mail flood attacks |
US8583731B1 (en) | 2006-11-17 | 2013-11-12 | Open Invention Network Llc | System and method for analyzing and filtering journaled electronic mail |
US20080126481A1 (en) * | 2006-11-26 | 2008-05-29 | Al Chakra | Method and system for providing communication context specific formality control |
US20080133571A1 (en) * | 2006-12-05 | 2008-06-05 | International Business Machines Corporation | Modifying Behavior in Messaging Systems According to Organizational Hierarchy |
US8286244B2 (en) * | 2007-01-19 | 2012-10-09 | Hewlett-Packard Development Company, L.P. | Method and system for protecting a computer network against packet floods |
US8214497B2 (en) | 2007-01-24 | 2012-07-03 | Mcafee, Inc. | Multi-dimensional reputation scoring |
US8179798B2 (en) | 2007-01-24 | 2012-05-15 | Mcafee, Inc. | Reputation based connection throttling |
US7949716B2 (en) * | 2007-01-24 | 2011-05-24 | Mcafee, Inc. | Correlation and analysis of entity attributes |
US7779156B2 (en) | 2007-01-24 | 2010-08-17 | Mcafee, Inc. | Reputation based load balancing |
US8763114B2 (en) | 2007-01-24 | 2014-06-24 | Mcafee, Inc. | Detecting image spam |
JP2008210203A (en) * | 2007-02-27 | 2008-09-11 | Digital Arts Inc | Electronic mail processing method and system |
US9083712B2 (en) * | 2007-04-04 | 2015-07-14 | Sri International | Method and apparatus for generating highly predictive blacklists |
CN101072202B (en) * | 2007-05-25 | 2012-03-21 | 腾讯科技(深圳)有限公司 | Electronic mail monitoring method and monitoring system |
US7899870B2 (en) * | 2007-06-25 | 2011-03-01 | Microsoft Corporation | Determination of participation in a malicious software campaign |
US8347286B2 (en) | 2007-07-16 | 2013-01-01 | International Business Machines Corporation | Method, system and program product for managing download requests received to download files from a server |
US8060569B2 (en) * | 2007-09-27 | 2011-11-15 | Microsoft Corporation | Dynamic email directory harvest attack detection and mitigation |
US20090094334A1 (en) * | 2007-10-03 | 2009-04-09 | Anders Eriksson | Gateway with transparent mail relay |
US8185930B2 (en) * | 2007-11-06 | 2012-05-22 | Mcafee, Inc. | Adjusting filter or classification control settings |
US8045458B2 (en) | 2007-11-08 | 2011-10-25 | Mcafee, Inc. | Prioritizing network traffic |
US20090138562A1 (en) * | 2007-11-28 | 2009-05-28 | Loyal Technology Solutions, L.L.C. | Method and system for aggregation of electronic messages |
US20090182818A1 (en) * | 2008-01-11 | 2009-07-16 | Fortinet, Inc. A Delaware Corporation | Heuristic detection of probable misspelled addresses in electronic communications |
US8160975B2 (en) | 2008-01-25 | 2012-04-17 | Mcafee, Inc. | Granular support vector machine with random granularity |
EP2120493A1 (en) * | 2008-03-19 | 2009-11-18 | Nokia Siemens Networks Oy | Mechanism for automated re-configuration of an access network element |
US8589503B2 (en) | 2008-04-04 | 2013-11-19 | Mcafee, Inc. | Prioritizing network traffic |
US10354229B2 (en) | 2008-08-04 | 2019-07-16 | Mcafee, Llc | Method and system for centralized contact management |
US8789185B1 (en) * | 2008-09-15 | 2014-07-22 | Symantec Corporation | Method and apparatus for monitoring a computer system for malicious software |
US8997219B2 (en) | 2008-11-03 | 2015-03-31 | Fireeye, Inc. | Systems and methods for detecting malicious PDF network content |
US20100175103A1 (en) * | 2009-01-07 | 2010-07-08 | Microsoft Corporation | Reactive throttling of inbound messages and ranges |
US8959157B2 (en) * | 2009-06-26 | 2015-02-17 | Microsoft Corporation | Real-time spam look-up system |
KR101043003B1 (en) * | 2009-08-25 | 2011-06-21 | (주)이월리서치 | Zombie PC IP extraction method using a pattern for contents interception |
US9529864B2 (en) * | 2009-08-28 | 2016-12-27 | Microsoft Technology Licensing, Llc | Data mining electronic communications |
US20110055264A1 (en) * | 2009-08-28 | 2011-03-03 | Microsoft Corporation | Data mining organization communications |
US8832829B2 (en) | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
US8484512B2 (en) | 2010-03-31 | 2013-07-09 | Microsoft Corporation | Throttling non-delivery reports based on root cause |
US8621638B2 (en) | 2010-05-14 | 2013-12-31 | Mcafee, Inc. | Systems and methods for classification of messaging entities |
US20120066487A1 (en) * | 2010-09-09 | 2012-03-15 | Novell, Inc. | System and method for providing load balancer visibility in an intelligent workload management system |
US8918467B2 (en) | 2010-10-01 | 2014-12-23 | Clover Leaf Environmental Solutions, Inc. | Generation and retrieval of report information |
US8990316B1 (en) | 2010-11-05 | 2015-03-24 | Amazon Technologies, Inc. | Identifying message deliverability problems using grouped message characteristics |
US8744979B2 (en) | 2010-12-06 | 2014-06-03 | Microsoft Corporation | Electronic communications triage using recipient's historical behavioral and feedback |
CN102821002B (en) * | 2011-06-09 | 2015-08-26 | 中国移动通信集团河南有限公司信阳分公司 | Network flow abnormal detecting method and system |
US8447851B1 (en) * | 2011-11-10 | 2013-05-21 | CopperEgg Corporation | System for monitoring elastic cloud-based computing systems as a service |
US9231899B2 (en) | 2012-01-13 | 2016-01-05 | International Business Machines Corporation | Transmittal of blocked message notification |
US8976648B2 (en) * | 2012-08-09 | 2015-03-10 | Blackberry Limited | Method and apparatus for managing load on service devices in a communication network |
US8995260B2 (en) | 2012-08-09 | 2015-03-31 | Blackberry Limited | Method and apparatus for managing load in a communication network |
US8918473B1 (en) * | 2012-10-09 | 2014-12-23 | Whatsapp Inc. | System and method for detecting unwanted content |
US9729695B2 (en) | 2012-11-20 | 2017-08-08 | Dropbox Inc. | Messaging client application interface |
US9755995B2 (en) | 2012-11-20 | 2017-09-05 | Dropbox, Inc. | System and method for applying gesture input to digital content |
US9935907B2 (en) | 2012-11-20 | 2018-04-03 | Dropbox, Inc. | System and method for serving a message client |
US10572665B2 (en) | 2012-12-28 | 2020-02-25 | Fireeye, Inc. | System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events |
US9195829B1 (en) | 2013-02-23 | 2015-11-24 | Fireeye, Inc. | User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications |
US9367681B1 (en) | 2013-02-23 | 2016-06-14 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application |
US9176843B1 (en) | 2013-02-23 | 2015-11-03 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications |
US9355247B1 (en) | 2013-03-13 | 2016-05-31 | Fireeye, Inc. | File extraction from memory dump for malicious content analysis |
US9104867B1 (en) | 2013-03-13 | 2015-08-11 | Fireeye, Inc. | Malicious content analysis using simulated user interaction without user involvement |
US9626509B1 (en) | 2013-03-13 | 2017-04-18 | Fireeye, Inc. | Malicious content analysis with multi-version application support within single operating environment |
US9430646B1 (en) | 2013-03-14 | 2016-08-30 | Fireeye, Inc. | Distributed systems and methods for automatically detecting unknown bots and botnets |
US9311479B1 (en) | 2013-03-14 | 2016-04-12 | Fireeye, Inc. | Correlation and consolidation of analytic data for holistic view of a malware attack |
US10713358B2 (en) | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
US9413781B2 (en) | 2013-03-15 | 2016-08-09 | Fireeye, Inc. | System and method employing structured intelligence to verify and contain threats at endpoints |
US9495180B2 (en) | 2013-05-10 | 2016-11-15 | Fireeye, Inc. | Optimized resource allocation for virtual machines within a malware content detection system |
US9635039B1 (en) | 2013-05-13 | 2017-04-25 | Fireeye, Inc. | Classifying sets of malicious indicators for detecting command and control communications associated with malware |
CN103281392A (en) * | 2013-06-07 | 2013-09-04 | 潍柴动力股份有限公司 | Method, device and system for monitoring |
US10133863B2 (en) | 2013-06-24 | 2018-11-20 | Fireeye, Inc. | Zero-day discovery system |
US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
US9628507B2 (en) | 2013-09-30 | 2017-04-18 | Fireeye, Inc. | Advanced persistent threat (APT) detection center |
US9294501B2 (en) | 2013-09-30 | 2016-03-22 | Fireeye, Inc. | Fuzzy hash of behavioral results |
US9690936B1 (en) | 2013-09-30 | 2017-06-27 | Fireeye, Inc. | Multistage system and method for analyzing obfuscated content for malware |
US10515214B1 (en) | 2013-09-30 | 2019-12-24 | Fireeye, Inc. | System and method for classifying malware within content created during analysis of a specimen |
US9171160B2 (en) | 2013-09-30 | 2015-10-27 | Fireeye, Inc. | Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses |
US9736179B2 (en) | 2013-09-30 | 2017-08-15 | Fireeye, Inc. | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
US9921978B1 (en) | 2013-11-08 | 2018-03-20 | Fireeye, Inc. | System and method for enhanced security of storage devices |
US9747446B1 (en) | 2013-12-26 | 2017-08-29 | Fireeye, Inc. | System and method for run-time object classification |
US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US9292686B2 (en) | 2014-01-16 | 2016-03-22 | Fireeye, Inc. | Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment |
US9262635B2 (en) | 2014-02-05 | 2016-02-16 | Fireeye, Inc. | Detection efficacy of virtual machine-based analysis with application specific events |
US9584462B1 (en) | 2014-02-06 | 2017-02-28 | Sprint Communications Company L.P. | Universal email failure notification system |
US9712483B1 (en) * | 2014-02-06 | 2017-07-18 | Sprint Communications Company L.P. | Automated check for simple mail transfer protocol email delays |
TWI511060B (en) * | 2014-02-18 | 2015-12-01 | Synology Inc | Device, method and non-transitory computer readable storage medium for performing instant message communication |
US9241010B1 (en) | 2014-03-20 | 2016-01-19 | Fireeye, Inc. | System and method for network behavior detection |
US10242185B1 (en) | 2014-03-21 | 2019-03-26 | Fireeye, Inc. | Dynamic guest image creation and rollback |
US9591015B1 (en) | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
US9223972B1 (en) | 2014-03-31 | 2015-12-29 | Fireeye, Inc. | Dynamically remote tuning of a malware content detection system |
US9432389B1 (en) | 2014-03-31 | 2016-08-30 | Fireeye, Inc. | System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object |
US9973531B1 (en) | 2014-06-06 | 2018-05-15 | Fireeye, Inc. | Shellcode detection |
US9438623B1 (en) | 2014-06-06 | 2016-09-06 | Fireeye, Inc. | Computer exploit detection using heap spray pattern matching |
US9594912B1 (en) | 2014-06-06 | 2017-03-14 | Fireeye, Inc. | Return-oriented programming detection |
US10084813B2 (en) | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
US9398028B1 (en) | 2014-06-26 | 2016-07-19 | Fireeye, Inc. | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
US20150381533A1 (en) * | 2014-06-29 | 2015-12-31 | Avaya Inc. | System and Method for Email Management Through Detection and Analysis of Dynamically Variable Behavior and Activity Patterns |
US10002252B2 (en) | 2014-07-01 | 2018-06-19 | Fireeye, Inc. | Verification of trusted threat-aware microvisor |
US9363280B1 (en) | 2014-08-22 | 2016-06-07 | Fireeye, Inc. | System and method of detecting delivery of malware using cross-customer data |
US10671726B1 (en) | 2014-09-22 | 2020-06-02 | Fireeye Inc. | System and method for malware analysis using thread-level event monitoring |
US10027689B1 (en) | 2014-09-29 | 2018-07-17 | Fireeye, Inc. | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
US9773112B1 (en) | 2014-09-29 | 2017-09-26 | Fireeye, Inc. | Exploit detection of malware and malware families |
US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
US11349790B2 (en) | 2014-12-22 | 2022-05-31 | International Business Machines Corporation | System, method and computer program product to extract information from email communications |
US10075455B2 (en) | 2014-12-26 | 2018-09-11 | Fireeye, Inc. | Zero-day rotating guest image profile |
US9934376B1 (en) | 2014-12-29 | 2018-04-03 | Fireeye, Inc. | Malware detection appliance architecture |
US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
US9690606B1 (en) | 2015-03-25 | 2017-06-27 | Fireeye, Inc. | Selective system call monitoring |
US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
US10623352B2 (en) | 2015-03-30 | 2020-04-14 | International Business Machines Corporation | Modification of electronic messages |
US9438613B1 (en) | 2015-03-30 | 2016-09-06 | Fireeye, Inc. | Dynamic content activation for automated analysis of embedded objects |
US9483644B1 (en) | 2015-03-31 | 2016-11-01 | Fireeye, Inc. | Methods for detecting file altering malware in VM based analysis |
US10474813B1 (en) | 2015-03-31 | 2019-11-12 | Fireeye, Inc. | Code injection technique for remediation at an endpoint of a network |
US10417031B2 (en) | 2015-03-31 | 2019-09-17 | Fireeye, Inc. | Selective virtualization for security threat detection |
US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
US9594904B1 (en) | 2015-04-23 | 2017-03-14 | Fireeye, Inc. | Detecting malware based on reflection |
US10263946B2 (en) | 2015-05-08 | 2019-04-16 | Humana Inc. | Enterprise message management system and method |
US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
US10454950B1 (en) | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
US10715542B1 (en) | 2015-08-14 | 2020-07-14 | Fireeye, Inc. | Mobile application risk analysis |
US10536408B2 (en) * | 2015-09-16 | 2020-01-14 | Litéra Corporation | Systems and methods for detecting, reporting and cleaning metadata from inbound attachments |
US10176321B2 (en) | 2015-09-22 | 2019-01-08 | Fireeye, Inc. | Leveraging behavior-based rules for malware family classification |
US10033747B1 (en) | 2015-09-29 | 2018-07-24 | Fireeye, Inc. | System and method for detecting interpreter-based exploit attacks |
US10817606B1 (en) | 2015-09-30 | 2020-10-27 | Fireeye, Inc. | Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic |
US10210329B1 (en) | 2015-09-30 | 2019-02-19 | Fireeye, Inc. | Method to detect application execution hijacking using memory protection |
US9825976B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Detection and classification of exploit kits |
US10706149B1 (en) | 2015-09-30 | 2020-07-07 | Fireeye, Inc. | Detecting delayed activation malware using a primary controller and plural time controllers |
US9825989B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Cyber attack early warning system |
US10601865B1 (en) | 2015-09-30 | 2020-03-24 | Fireeye, Inc. | Detection of credential spearphishing attacks using email analysis |
US10284575B2 (en) | 2015-11-10 | 2019-05-07 | Fireeye, Inc. | Launcher for setting analysis environment variations for malware detection |
US10447728B1 (en) | 2015-12-10 | 2019-10-15 | Fireeye, Inc. | Technique for protecting guest processes using a layered virtualization architecture |
US10846117B1 (en) | 2015-12-10 | 2020-11-24 | Fireeye, Inc. | Technique for establishing secure communication between host and guest processes of a virtualization architecture |
US10108446B1 (en) | 2015-12-11 | 2018-10-23 | Fireeye, Inc. | Late load technique for deploying a virtualization layer underneath a running operating system |
WO2017116601A1 (en) * | 2015-12-27 | 2017-07-06 | Avanan Inc. | Cloud security platform |
US10133866B1 (en) | 2015-12-30 | 2018-11-20 | Fireeye, Inc. | System and method for triggering analysis of an object for malware in response to modification of that object |
US10565378B1 (en) | 2015-12-30 | 2020-02-18 | Fireeye, Inc. | Exploit of privilege detection framework |
US10621338B1 (en) | 2015-12-30 | 2020-04-14 | Fireeye, Inc. | Method to detect forgery and exploits using last branch recording registers |
US10050998B1 (en) | 2015-12-30 | 2018-08-14 | Fireeye, Inc. | Malicious message analysis system |
US10581874B1 (en) | 2015-12-31 | 2020-03-03 | Fireeye, Inc. | Malware detection system with contextual analysis |
US11552986B1 (en) | 2015-12-31 | 2023-01-10 | Fireeye Security Holdings Us Llc | Cyber-security framework for application of virtual features |
US9824216B1 (en) | 2015-12-31 | 2017-11-21 | Fireeye, Inc. | Susceptible environment detection system |
US10785255B1 (en) | 2016-03-25 | 2020-09-22 | Fireeye, Inc. | Cluster configuration within a scalable malware detection system |
US10671721B1 (en) | 2016-03-25 | 2020-06-02 | Fireeye, Inc. | Timeout management services |
US10601863B1 (en) | 2016-03-25 | 2020-03-24 | Fireeye, Inc. | System and method for managing sensor enrollment |
US10476906B1 (en) | 2016-03-25 | 2019-11-12 | Fireeye, Inc. | System and method for managing formation and modification of a cluster within a malware detection system |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
TWI609378B (en) * | 2016-06-15 | 2017-12-21 | 慧榮科技股份有限公司 | Data storage device and operating method |
US10169585B1 (en) | 2016-06-22 | 2019-01-01 | Fireeye, Inc. | System and methods for advanced malware detection through placement of transition events |
US10462173B1 (en) | 2016-06-30 | 2019-10-29 | Fireeye, Inc. | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
US10592678B1 (en) | 2016-09-09 | 2020-03-17 | Fireeye, Inc. | Secure communications between peers using a verified virtual trusted platform module |
US10491627B1 (en) | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
US10795991B1 (en) | 2016-11-08 | 2020-10-06 | Fireeye, Inc. | Enterprise search |
US10855635B2 (en) | 2016-11-14 | 2020-12-01 | Microsoft Technology Licensing, Llc | Electronic mail (e-mail) system support for messages with different traffic types |
US10587647B1 (en) | 2016-11-22 | 2020-03-10 | Fireeye, Inc. | Technique for malware detection capability comparison of network security devices |
US10581879B1 (en) | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
US10552610B1 (en) | 2016-12-22 | 2020-02-04 | Fireeye, Inc. | Adaptive virtual machine snapshot update framework for malware behavioral analysis |
US10523609B1 (en) | 2016-12-27 | 2019-12-31 | Fireeye, Inc. | Multi-vector malware detection and analysis |
US10904286B1 (en) | 2017-03-24 | 2021-01-26 | Fireeye, Inc. | Detection of phishing attacks using similarity analysis |
US10848397B1 (en) | 2017-03-30 | 2020-11-24 | Fireeye, Inc. | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
US10902119B1 (en) | 2017-03-30 | 2021-01-26 | Fireeye, Inc. | Data extraction system for malware analysis |
US10855700B1 (en) | 2017-06-29 | 2020-12-01 | Fireeye, Inc. | Post-intrusion detection of cyber-attacks during lateral movement within networks |
US10601848B1 (en) | 2017-06-29 | 2020-03-24 | Fireeye, Inc. | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators |
US10503904B1 (en) | 2017-06-29 | 2019-12-10 | Fireeye, Inc. | Ransomware detection and mitigation |
US10893068B1 (en) | 2017-06-30 | 2021-01-12 | Fireeye, Inc. | Ransomware file modification prevention technique |
CN109474509B (en) * | 2017-09-07 | 2022-07-12 | 北京二六三企业通信有限公司 | Junk mail identification method and device |
US10747872B1 (en) | 2017-09-27 | 2020-08-18 | Fireeye, Inc. | System and method for preventing malware evasion |
US10805346B2 (en) | 2017-10-01 | 2020-10-13 | Fireeye, Inc. | Phishing attack detection |
US11108809B2 (en) | 2017-10-27 | 2021-08-31 | Fireeye, Inc. | System and method for analyzing binary code for malware classification using artificial neural network techniques |
US11271955B2 (en) | 2017-12-28 | 2022-03-08 | Fireeye Security Holdings Us Llc | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
US11240275B1 (en) | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
US11005860B1 (en) | 2017-12-28 | 2021-05-11 | Fireeye, Inc. | Method and system for efficient cybersecurity analysis of endpoint events |
US10826931B1 (en) | 2018-03-29 | 2020-11-03 | Fireeye, Inc. | System and method for predicting and mitigating cybersecurity system misconfigurations |
US11558401B1 (en) | 2018-03-30 | 2023-01-17 | Fireeye Security Holdings Us Llc | Multi-vector malware detection data sharing system for improved detection |
US11003773B1 (en) | 2018-03-30 | 2021-05-11 | Fireeye, Inc. | System and method for automatically generating malware detection rule recommendations |
US10956477B1 (en) | 2018-03-30 | 2021-03-23 | Fireeye, Inc. | System and method for detecting malicious scripts through natural language processing modeling |
CN108833258A (en) * | 2018-06-12 | 2018-11-16 | 广东睿江云计算股份有限公司 | A kind of mail service actively discovers abnormal method |
US11314859B1 (en) | 2018-06-27 | 2022-04-26 | FireEye Security Holdings, Inc. | Cyber-security system and method for detecting escalation of privileges within an access token |
US11075930B1 (en) | 2018-06-27 | 2021-07-27 | Fireeye, Inc. | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
US11228491B1 (en) | 2018-06-28 | 2022-01-18 | Fireeye Security Holdings Us Llc | System and method for distributed cluster configuration monitoring and management |
US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
JP2020024503A (en) * | 2018-08-06 | 2020-02-13 | キオクシア株式会社 | Electronic device and data transmission/reception method |
US11182473B1 (en) | 2018-09-13 | 2021-11-23 | Fireeye Security Holdings Us Llc | System and method for mitigating cyberattacks against processor operability by a guest process |
US11763004B1 (en) | 2018-09-27 | 2023-09-19 | Fireeye Security Holdings Us Llc | System and method for bootkit detection |
CN109309613B (en) * | 2018-10-09 | 2021-01-22 | 京东方科技集团股份有限公司 | Mail delivery method, device and system |
US11368475B1 (en) | 2018-12-21 | 2022-06-21 | Fireeye Security Holdings Us Llc | System and method for scanning remote services to locate stored objects with malware |
US11176251B1 (en) | 2018-12-21 | 2021-11-16 | Fireeye, Inc. | Determining malware via symbolic function hash analysis |
US11743290B2 (en) | 2018-12-21 | 2023-08-29 | Fireeye Security Holdings Us Llc | System and method for detecting cyberattacks impersonating legitimate sources |
US11601444B1 (en) | 2018-12-31 | 2023-03-07 | Fireeye Security Holdings Us Llc | Automated system for triage of customer issues |
US11310238B1 (en) | 2019-03-26 | 2022-04-19 | FireEye Security Holdings, Inc. | System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources |
US11677786B1 (en) | 2019-03-29 | 2023-06-13 | Fireeye Security Holdings Us Llc | System and method for detecting and protecting against cybersecurity attacks on servers |
US11636198B1 (en) | 2019-03-30 | 2023-04-25 | Fireeye Security Holdings Us Llc | System and method for cybersecurity analyzer update and concurrent management system |
US11258806B1 (en) | 2019-06-24 | 2022-02-22 | Mandiant, Inc. | System and method for automatically associating cybersecurity intelligence to cyberthreat actors |
US11556640B1 (en) | 2019-06-27 | 2023-01-17 | Mandiant, Inc. | Systems and methods for automated cybersecurity analysis of extracted binary string sets |
US11392700B1 (en) | 2019-06-28 | 2022-07-19 | Fireeye Security Holdings Us Llc | System and method for supporting cross-platform data verification |
US11886585B1 (en) | 2019-09-27 | 2024-01-30 | Musarubra Us Llc | System and method for identifying and mitigating cyberattacks through malicious position-independent code execution |
US11637862B1 (en) | 2019-09-30 | 2023-04-25 | Mandiant, Inc. | System and method for surfacing cyber-security threats with a self-learning recommendation engine |
US11522884B1 (en) | 2019-12-24 | 2022-12-06 | Fireeye Security Holdings Us Llc | Subscription and key management system |
US11838300B1 (en) | 2019-12-24 | 2023-12-05 | Musarubra Us Llc | Run-time configurable cybersecurity system |
US11436327B1 (en) | 2019-12-24 | 2022-09-06 | Fireeye Security Holdings Us Llc | System and method for circumventing evasive code for cyberthreat detection |
US11647002B2 (en) * | 2021-08-09 | 2023-05-09 | Oversec, Uab | Providing a notification system in a virtual private network |
US20230171212A1 (en) * | 2021-11-29 | 2023-06-01 | Virtual Connect Technologies, Inc. | Computerized System For Analysis Of Vertices And Edges Of An Electronic Messaging System |
Family Cites Families (120)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4837798A (en) | 1986-06-02 | 1989-06-06 | American Telephone And Telegraph Company | Communication system having unified messaging |
US4775973A (en) * | 1986-10-22 | 1988-10-04 | Hewlett-Packard Company | Method and apparatus for a packet-switched network communications measurement matrix display |
US5627764A (en) | 1991-10-04 | 1997-05-06 | Banyan Systems, Inc. | Automatic electronic messaging system with feedback and work flow administration |
DE69327192T2 (en) * | 1992-05-11 | 2000-04-27 | Fuji Photo Film Co Ltd | Shaped articles for light-sensitive photographic materials |
US5634005A (en) | 1992-11-09 | 1997-05-27 | Kabushiki Kaisha Toshiba | System for automatically sending mail message by storing rule according to the language specification of the message including processing condition and processing content |
US5740231A (en) | 1994-09-16 | 1998-04-14 | Octel Communications Corporation | Network-based multimedia communications and directory system and method of operation |
US5742905A (en) | 1994-09-19 | 1998-04-21 | Bell Communications Research, Inc. | Personal communications internetworking |
US5619648A (en) | 1994-11-30 | 1997-04-08 | Lucent Technologies Inc. | Message filtering techniques |
US5937162A (en) | 1995-04-06 | 1999-08-10 | Exactis.Com, Inc. | Method and apparatus for high volume e-mail delivery |
DE19681387B4 (en) | 1995-05-08 | 2004-12-09 | Compuserve Inc., Columbus | Rule-based electronic messaging management system |
US5623600A (en) | 1995-09-26 | 1997-04-22 | Trend Micro, Incorporated | Virus detection and removal apparatus for computer networks |
US5889943A (en) | 1995-09-26 | 1999-03-30 | Trend Micro Incorporated | Apparatus and method for electronic mail virus detection and elimination |
US5768505A (en) * | 1995-12-19 | 1998-06-16 | International Business Machines Corporation | Object oriented mail server framework mechanism |
US6101531A (en) * | 1995-12-19 | 2000-08-08 | Motorola, Inc. | System for communicating user-selected criteria filter prepared at wireless client to communication server for filtering data transferred from host to said wireless client |
US5771355A (en) * | 1995-12-21 | 1998-06-23 | Intel Corporation | Transmitting electronic mail by either reference or value at file-replication points to minimize costs |
CN1217800A (en) | 1996-01-26 | 1999-05-26 | 艾尔梅迪尔公司 | System and method for transmission of data |
US6075863A (en) | 1996-02-28 | 2000-06-13 | Encanto Networks | Intelligent communication device |
US5937161A (en) * | 1996-04-12 | 1999-08-10 | Usa.Net, Inc. | Electronic message forwarding system |
US6453327B1 (en) | 1996-06-10 | 2002-09-17 | Sun Microsystems, Inc. | Method and apparatus for identifying and discarding junk electronic mail |
US6014429A (en) | 1996-08-12 | 2000-01-11 | Lucent Technologies, Inc. | Two-way wireless messaging system with transaction server |
US5832208A (en) | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers |
US5905777A (en) | 1996-09-27 | 1999-05-18 | At&T Corp. | E-mail paging system |
US6192407B1 (en) * | 1996-10-24 | 2001-02-20 | Tumbleweed Communications Corp. | Private, trackable URLs for directed document delivery |
US6167520A (en) | 1996-11-08 | 2000-12-26 | Finjan Software, Inc. | System and method for protecting a client during runtime from hostile downloadables |
US5796948A (en) | 1996-11-12 | 1998-08-18 | Cohen; Elliot D. | Offensive message interceptor for computers |
US6146026A (en) | 1996-12-27 | 2000-11-14 | Canon Kabushiki Kaisha | System and apparatus for selectively publishing electronic-mail |
US5987611A (en) | 1996-12-31 | 1999-11-16 | Zone Labs, Inc. | System and methodology for managing internet access on a per application basis for client computers connected to the internet |
US5844969A (en) | 1997-01-23 | 1998-12-01 | At&T Corp. | Communication system, method and device for remotely re-transmitting received electronic mail directed to a destination terminal to a new destination terminal |
EP0963646A4 (en) | 1997-02-25 | 2000-06-07 | Intervoice Lp | E-mail server for message filtering and routing |
US6147987A (en) * | 1997-04-08 | 2000-11-14 | 3Com Corporation | Supporting load sharing across multiple network access servers |
NZ330703A (en) | 1997-06-17 | 2000-03-27 | Telecom Wireless Solutions Inc | Electronic mail system for interconnecting computer networks with digital mobile phone network |
US6061718A (en) | 1997-07-23 | 2000-05-09 | Ericsson Inc. | Electronic mail delivery system in wired or wireless communications system |
DE69841210D1 (en) | 1997-07-24 | 2009-11-12 | Axway Inc | Email Firewall |
US7117358B2 (en) * | 1997-07-24 | 2006-10-03 | Tumbleweed Communications Corp. | Method and system for filtering communication |
US7162738B2 (en) * | 1998-11-03 | 2007-01-09 | Tumbleweed Communications Corp. | E-mail firewall with stored key encryption/decryption |
US7127741B2 (en) * | 1998-11-03 | 2006-10-24 | Tumbleweed Communications Corp. | Method and system for e-mail message transmission |
US6073165A (en) | 1997-07-29 | 2000-06-06 | Jfax Communications, Inc. | Filtering computer network messages directed to a user's e-mail box based on user defined filters, and forwarding a filtered message to the user's receiver |
WO1999006929A2 (en) | 1997-08-03 | 1999-02-11 | At & T Corp. | An extensible proxy framework for e-mail agents |
US6249805B1 (en) * | 1997-08-12 | 2001-06-19 | Micron Electronics, Inc. | Method and system for filtering unauthorized electronic mail messages |
JP3439330B2 (en) * | 1997-09-25 | 2003-08-25 | 日本電気株式会社 | Email server |
US6470386B1 (en) * | 1997-09-26 | 2002-10-22 | Worldcom, Inc. | Integrated proxy interface for web based telecommunications management tools |
US6138146A (en) * | 1997-09-29 | 2000-10-24 | Ericsson Inc. | Electronic mail forwarding system and method |
AU757557B2 (en) * | 1997-11-13 | 2003-02-27 | Intellectual Ventures I Llc | File transfer system |
US6023723A (en) | 1997-12-22 | 2000-02-08 | Accepted Marketing, Inc. | Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms |
US6052709A (en) | 1997-12-23 | 2000-04-18 | Bright Light Technologies, Inc. | Apparatus and method for controlling delivery of unsolicited electronic mail |
US5999932A (en) * | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing |
US5968117A (en) | 1998-01-20 | 1999-10-19 | Aurora Communications Exchange Ltd. | Device and system to facilitate accessing electronic mail from remote user-interface devices |
JP3884851B2 (en) | 1998-01-28 | 2007-02-21 | ユニデン株式会社 | COMMUNICATION SYSTEM AND RADIO COMMUNICATION TERMINAL DEVICE USED FOR THE SAME |
JP4216399B2 (en) * | 1998-04-01 | 2009-01-28 | 株式会社日立製作所 | Packet switch |
US8516055B2 (en) * | 1998-05-29 | 2013-08-20 | Research In Motion Limited | System and method for pushing information from a host system to a mobile data communication device in a wireless data network |
US6301245B1 (en) | 1998-06-09 | 2001-10-09 | Unisys Corporation | Universal Messaging system providing integrated voice, data and fax messaging services to PC/web-based clients, including a large object server for efficiently distributing voice/fax messages to web-based clients |
US6404762B1 (en) | 1998-06-09 | 2002-06-11 | Unisys Corporation | Universal messaging system providing integrated voice, data and fax messaging services to pc/web-based clients, including a session manager for maintaining a session between a messaging platform and the web-based clients |
WO1999065256A2 (en) | 1998-06-10 | 1999-12-16 | Logica, Inc. | System and method for delivering e-mail notification to mobile phones |
JP2000010880A (en) * | 1998-06-22 | 2000-01-14 | Ricoh Co Ltd | Electronic mail transfer device |
US6161130A (en) | 1998-06-23 | 2000-12-12 | Microsoft Corporation | Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set |
US6112227A (en) * | 1998-08-06 | 2000-08-29 | Heiner; Jeffrey Nelson | Filter-in method for reducing junk e-mail |
US6289212B1 (en) * | 1998-09-16 | 2001-09-11 | Openwave Systems Inc. | Method and apparatus for providing electronic mail services during network unavailability |
US6324569B1 (en) * | 1998-09-23 | 2001-11-27 | John W. L. Ogilvie | Self-removing email verified or designated as such by a message distributor for the convenience of a recipient |
US6317751B1 (en) * | 1998-09-28 | 2001-11-13 | Merrill Lynch & Co., Inc. | Compliance archival data process and system |
JP2000148611A (en) * | 1998-11-06 | 2000-05-30 | Nippon Telegraph & Telephone East Corp | Intranet and data base server and method for transferring data |
US6249807B1 (en) | 1998-11-17 | 2001-06-19 | Kana Communications, Inc. | Method and apparatus for performing enterprise email management |
JP2000163341A (en) * | 1998-11-30 | 2000-06-16 | Nec Corp | Mail server and method for automatically disposing of electronic spam mail |
US6546416B1 (en) * | 1998-12-09 | 2003-04-08 | Infoseek Corporation | Method and system for selectively blocking delivery of bulk electronic mail |
US6389276B1 (en) | 1998-12-23 | 2002-05-14 | Bell Atlantic Mobile | Systems and methods for providing voice mail notification from a separate voice mail system to mobile telephone |
US6118856A (en) * | 1998-12-28 | 2000-09-12 | Nortel Networks Corporation | Method and apparatus for automatically forwarding an email message or portion thereof to a remote device |
US6654787B1 (en) | 1998-12-31 | 2003-11-25 | Brightmail, Incorporated | Method and apparatus for filtering e-mail |
KR100285122B1 (en) * | 1999-01-13 | 2001-03-15 | 이수복 | internet email add-on service system |
US6442589B1 (en) | 1999-01-14 | 2002-08-27 | Fujitsu Limited | Method and system for sorting and forwarding electronic messages and other data |
US6574658B1 (en) * | 1999-01-29 | 2003-06-03 | Lucent Technologies Inc. | System and method for secure classification of electronic mail |
GB2347053A (en) | 1999-02-17 | 2000-08-23 | Argo Interactive Limited | Proxy server filters unwanted email |
JP3170491B2 (en) | 1999-03-29 | 2001-05-28 | 松下電送システム株式会社 | Image communication device, server device, and capability exchange method |
US6434601B1 (en) | 1999-03-31 | 2002-08-13 | Micron Technology, Inc. | Pre test electronic mail process |
US6427164B1 (en) * | 1999-06-23 | 2002-07-30 | Mail Registry, Inc. | Systems and methods for automatically forwarding electronic mail when the recipient is otherwise unknown |
US6868498B1 (en) * | 1999-09-01 | 2005-03-15 | Peter L. Katsikas | System for eliminating unauthorized electronic mail |
US6711618B1 (en) * | 1999-09-03 | 2004-03-23 | Cisco Technology, Inc. | Apparatus and method for providing server state and attribute management for voice enabled web applications |
US6513045B1 (en) | 1999-11-17 | 2003-01-28 | International Business Machines Corporation | Method and an apparatus for providing cross product automated user assistance in the planning, configuration, and management of information systems |
US6321267B1 (en) | 1999-11-23 | 2001-11-20 | Escom Corporation | Method and apparatus for filtering junk email |
US7249175B1 (en) * | 1999-11-23 | 2007-07-24 | Escom Corporation | Method and system for blocking e-mail having a nonexistent sender address |
JP4104799B2 (en) * | 1999-11-25 | 2008-06-18 | 株式会社山武 | Network system and communication method |
US6460050B1 (en) * | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
WO2001046867A1 (en) | 1999-12-22 | 2001-06-28 | Setnet Corp. | Industrial capacity clustered mail server system and method |
US7324948B2 (en) * | 2000-01-14 | 2008-01-29 | Carl Teo Balbach | Context-specific contact information |
US7822977B2 (en) * | 2000-02-08 | 2010-10-26 | Katsikas Peter L | System for eliminating unauthorized electronic mail |
US6438215B1 (en) | 2000-02-29 | 2002-08-20 | Ameritech Corporation | Method and system for filter based message processing in a unified messaging system |
US6691156B1 (en) * | 2000-03-10 | 2004-02-10 | International Business Machines Corporation | Method for restricting delivery of unsolicited E-mail |
US6986037B1 (en) * | 2000-04-07 | 2006-01-10 | Sendmail, Inc. | Electronic mail system with authentication/encryption methodology for allowing connections to/from a message transfer agent |
EP1281267A2 (en) * | 2000-05-03 | 2003-02-05 | Daniel Schoeffler | Method of enabling transmission and reception of communication when current destination for recipient is unknown to sender |
US6912564B1 (en) * | 2000-05-04 | 2005-06-28 | America Online, Inc. | System for instant messaging the sender and recipients of an e-mail message |
WO2001089174A2 (en) * | 2000-05-16 | 2001-11-22 | America Online, Inc. | E-mail sender identification |
US6829654B1 (en) * | 2000-06-23 | 2004-12-07 | Cloudshield Technologies, Inc. | Apparatus and method for virtual edge placement of web sites |
JP2002016633A (en) * | 2000-06-30 | 2002-01-18 | Ntt Communications Kk | Method and system for controlling communication state |
US6732185B1 (en) * | 2000-07-24 | 2004-05-04 | Vignette Corporation | Method and system for managing message pacing |
US6779021B1 (en) * | 2000-07-28 | 2004-08-17 | International Business Machines Corporation | Method and system for predicting and managing undesirable electronic mail |
EP1178661B1 (en) * | 2000-08-01 | 2014-02-26 | Canon Kabushiki Kaisha | Communication apparatus and method having electronic mail communication function, and program |
US20020042815A1 (en) * | 2000-09-22 | 2002-04-11 | Arthur Salzfass | Automated system and method for routing undeliverable e-mail messages and otherwise managing e-mail |
US6650890B1 (en) * | 2000-09-29 | 2003-11-18 | Postini, Inc. | Value-added electronic messaging services and transparent implementation thereof using intermediate server |
US7320019B2 (en) * | 2000-11-30 | 2008-01-15 | At&T Delaware Intellectual Property, Inc. | Method and apparatus for automatically checking e-mail addresses in outgoing e-mail communications |
US7054906B2 (en) * | 2000-12-29 | 2006-05-30 | Levosky Michael P | System and method for controlling and organizing Email |
US7092992B1 (en) * | 2001-02-01 | 2006-08-15 | Mailshell.Com, Inc. | Web page filtering including substitution of user-entered email address |
US8219620B2 (en) * | 2001-02-20 | 2012-07-10 | Mcafee, Inc. | Unwanted e-mail filtering system including voting feedback |
AU2002240526A1 (en) * | 2001-02-26 | 2002-09-12 | Eprivacy Group, Inc. | System and method for controlling distribution of network communications |
US7224491B2 (en) * | 2001-03-28 | 2007-05-29 | Minolta Co., Ltd. | Data communication apparatus, data communication system, data communication method, control program, and computer readable storage medium stored with control program |
US20020147780A1 (en) * | 2001-04-09 | 2002-10-10 | Liu James Y. | Method and system for scanning electronic mail to detect and eliminate computer viruses using a group of email-scanning servers and a recipient's email gateway |
GB2374689B (en) * | 2001-04-20 | 2005-11-23 | Eldama Systems Ip Ltd | Communications system |
US7640434B2 (en) * | 2001-05-31 | 2009-12-29 | Trend Micro, Inc. | Identification of undesirable content in responses sent in reply to a user request for content |
US6957259B1 (en) * | 2001-06-25 | 2005-10-18 | Bellsouth Intellectual Property Corporation | System and method for regulating emails by maintaining, updating and comparing the profile information for the email source to the target email statistics |
US6769016B2 (en) * | 2001-07-26 | 2004-07-27 | Networks Associates Technology, Inc. | Intelligent SPAM detection system using an updateable neural analysis engine |
JP2003046576A (en) * | 2001-07-27 | 2003-02-14 | Fujitsu Ltd | Message delivery system, message delivery management server, message distribution management program, and computer-readable recording medium with the program recorded thereon |
US7065588B2 (en) * | 2001-08-10 | 2006-06-20 | Chaavi, Inc. | Method and system for data transformation in a heterogeneous computer system |
US7146402B2 (en) * | 2001-08-31 | 2006-12-05 | Sendmail, Inc. | E-mail system providing filtering methodology on a per-domain basis |
JP3717829B2 (en) * | 2001-10-05 | 2005-11-16 | 日本デジタル株式会社 | Junk mail repelling system |
US7283904B2 (en) * | 2001-10-17 | 2007-10-16 | Airbiquity, Inc. | Multi-sensor fusion |
US7039949B2 (en) * | 2001-12-10 | 2006-05-02 | Brian Ross Cartmell | Method and system for blocking unwanted communications |
US7054907B1 (en) * | 2001-12-26 | 2006-05-30 | Bellsouth Intellectual Property Corporation | Systems and methods for blocking delivery of an electronic communication |
US20030177259A1 (en) * | 2002-02-04 | 2003-09-18 | Wookey Michael J. | Remote services systems data delivery mechanism |
KR100871581B1 (en) * | 2002-02-19 | 2008-12-02 | 포스티니 코포레이션 | E-mail management services |
US7627631B2 (en) * | 2002-05-02 | 2009-12-01 | Bea Systems, Inc. | Systems and methods for collaborative business plug-ins |
US20060265459A1 (en) * | 2003-02-19 | 2006-11-23 | Postini, Inc. | Systems and methods for managing the transmission of synchronous electronic messages |
US20070005970A1 (en) * | 2003-05-21 | 2007-01-04 | Trupp Steven E | E-mail authentication protocol or MAP |
US7818377B2 (en) * | 2004-05-24 | 2010-10-19 | Microsoft Corporation | Extended message rule architecture |
-
2003
- 2003-02-19 KR KR1020047012925A patent/KR100871581B1/en active IP Right Grant
- 2003-02-19 EP EP03711094A patent/EP1476819B1/en not_active Expired - Lifetime
- 2003-02-19 CA CA2476349A patent/CA2476349C/en not_active Expired - Lifetime
- 2003-02-19 AU AU2003215276A patent/AU2003215276B2/en not_active Expired
- 2003-02-19 JP JP2003570219A patent/JP4593926B2/en not_active Expired - Lifetime
- 2003-02-19 DE DE60326938T patent/DE60326938D1/en not_active Expired - Lifetime
- 2003-02-19 WO PCT/US2003/004757 patent/WO2003071390A2/en active Application Filing
- 2003-02-19 EP EP09156770.1A patent/EP2068516B1/en not_active Expired - Lifetime
- 2003-02-19 US US10/370,118 patent/US6941348B2/en not_active Expired - Lifetime
- 2003-02-19 AT AT03711094T patent/ATE427608T1/en not_active IP Right Cessation
- 2003-02-19 CN CNB038087421A patent/CN1332333C/en not_active Expired - Lifetime
-
2005
- 2005-04-26 US US10/908,060 patent/US8769020B2/en active Active
- 2005-04-26 US US10/908,061 patent/US20050182960A1/en not_active Abandoned
-
2006
- 2006-05-03 US US11/416,733 patent/US20060206938A1/en not_active Abandoned
-
2007
- 2007-03-01 US US11/712,675 patent/US8725889B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
ATE427608T1 (en) | 2009-04-15 |
US20050182959A1 (en) | 2005-08-18 |
CN1647061A (en) | 2005-07-27 |
US8725889B2 (en) | 2014-05-13 |
WO2003071390A2 (en) | 2003-08-28 |
EP1476819A4 (en) | 2005-11-02 |
WO2003071390A3 (en) | 2004-06-17 |
KR20040103943A (en) | 2004-12-09 |
CA2476349C (en) | 2010-09-28 |
EP2068516A1 (en) | 2009-06-10 |
US20050182960A1 (en) | 2005-08-18 |
KR100871581B1 (en) | 2008-12-02 |
JP2005518173A (en) | 2005-06-16 |
AU2003215276A1 (en) | 2003-09-09 |
US6941348B2 (en) | 2005-09-06 |
AU2003215276B2 (en) | 2007-09-06 |
CN1332333C (en) | 2007-08-15 |
JP4593926B2 (en) | 2010-12-08 |
US8769020B2 (en) | 2014-07-01 |
EP1476819A2 (en) | 2004-11-17 |
EP2068516B1 (en) | 2018-09-05 |
WO2003071390B1 (en) | 2004-07-29 |
US20060206938A1 (en) | 2006-09-14 |
DE60326938D1 (en) | 2009-05-14 |
US20030158905A1 (en) | 2003-08-21 |
US20070156830A1 (en) | 2007-07-05 |
EP1476819B1 (en) | 2009-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2476349A1 (en) | E-mail management services | |
US7603472B2 (en) | Zero-minute virus and spam detection | |
US8224902B1 (en) | Method and apparatus for selective email processing | |
US20030220978A1 (en) | System and method for message sender validation | |
US20080102799A1 (en) | Method and apparatus for message identification | |
JP2005518173A5 (en) | ||
US7958557B2 (en) | Determining a source of malicious computer element in a computer network | |
US20060265459A1 (en) | Systems and methods for managing the transmission of synchronous electronic messages | |
GB2347053A (en) | Proxy server filters unwanted email | |
CN101247406A (en) | Method for local information classification using global information and junk mail detection system | |
US20090307320A1 (en) | Electronic mail processing unit including silverlist filtering | |
AU2009299539B2 (en) | Electronic communication control | |
WO2005001733A1 (en) | E-mail managing system and method thereof | |
US7958187B2 (en) | Systems and methods for managing directory harvest attacks via electronic messages | |
US20050149479A1 (en) | Electronic message management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20230220 |