US20110219086A1 - Electronic message and data tracking system - Google Patents
Electronic message and data tracking system Download PDFInfo
- Publication number
- US20110219086A1 US20110219086A1 US13/110,266 US201113110266A US2011219086A1 US 20110219086 A1 US20110219086 A1 US 20110219086A1 US 201113110266 A US201113110266 A US 201113110266A US 2011219086 A1 US2011219086 A1 US 2011219086A1
- Authority
- US
- United States
- Prior art keywords
- spam
- service
- commercial anti
- linking object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/234—Monitoring or handling of messages for tracking messages
Definitions
- Various embodiments of the present invention generally relate to tracking and storage of electronic messages, such as email messages.
- embodiments relate to the tracking and storage of messages which have been identified as spam or virus-infected by an appropriate service.
- spam unwanted and unsolicited bulk messages
- Spam can contain viruses or other software that disable or damage the receiver's computer or other electronic equipment.
- the volume of spam may represent a significant load on the traffic handling mechanisms. For example, high volumes of email spam may negatively affect both client computer networks and the Internet itself. As a result, substantial efforts have been devoted to tracking and identifying spam in order to stop the problem at its source.
- GUI Graphic User Interface
- the user's email client can also pose a problem.
- email clients in use and they can vary significantly in functions and features.
- some clients do not support forwarding email messages in their original form as an attachment, rather they are sent after being reformatted, such as lines broken into a fixed number of characters per line, headers removed, etc.
- the message received by the anti-spam system may not be in its original form. This can create difficulties for the anti-spam system and staff in analyzing the email message forwarded by the user.
- the user may not want to forward the entire email message to the anti-spam system because of privacy concerns.
- the user typically cannot submit the signatures of the email, as he or she is not aware of the signatures of the email that mark the email message as spam.
- ISP Internet Service Provider
- Another method of submitting email for spam analysis requires saving the email as a file and transferring the file to the anti-spam system manually or through a file transfer mechanism, such as File Transfer Protocol (FTP).
- FTP File Transfer Protocol
- This process is even more demanding and time consuming for the user than forwarding the original message.
- the email is transformed from one format to another as part of the process and the original content may be lost or damaged, potentially rendering it useless to the anti-spam system.
- a linking object insertion routine identifies an electronic mail (email) message as a candidate for user feedback based on the email message having been previously classified as spam by a real-time email spam scanning routine associated with a commercial anti-spam service.
- the linking object insertion routine facilitates user submission of the user feedback regarding the email message to the commercial anti-spam service by embedding a linking object within the email message.
- the linking object is configured to automate communication of one or more digital signatures of the email message generated by the real-time email spam scanning routine to the commercial anti-spam service by performing out-of-band signaling with the commercial anti-spam service.
- FIG. 1 illustrates a flowchart describing a method of marking spam and user submission of messages in accordance with various embodiments of the present invention
- FIG. 2 illustrates a block diagram showing a network for tracking email messages in accordance with one or more embodiments of the present invention.
- FIG. 3 illustrates an example of a computer system with which embodiments of the present invention may be utilized.
- Embodiments of the present invention relates generally to tracking and storage of electronic messages, such as email messages, for example.
- electronic messages such as email messages, which have been identified as spam or virus-infected by an appropriate service, such as a real-time email spam filter (e.g., FortiGuard antispam subscription service) and/or a real-time email virus scanner (e.g., FortiGuard antivirus subscription service).
- an appropriate service such as a real-time email spam filter (e.g., FortiGuard antispam subscription service) and/or a real-time email virus scanner (e.g., FortiGuard antivirus subscription service).
- Embodiments of the present invention may be provided as a computer program product, which may include a machine-readable medium having stored thereon instructions which may be used to program a computer (or other electronic devices) to perform a process.
- the machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, ROMs, random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions.
- connection or coupling and related terms are used in an operational sense and are not necessarily limited to a direct physical connection or coupling.
- two devices may be coupled directly, or via one or more intermediary media or devices.
- devices may be coupled in such a way that information can be passed there between, while not sharing any physical connection one with another. Based on the disclosure provided herein, one of ordinary skill in the art will appreciate a variety of ways in which connection or coupling exists in accordance with the aforementioned definition.
- linking object generally refers to one or more commands embedded within or otherwise associated with a document, which when accessed/activated by a user, automatically connects to a designated resource.
- linking objects are embedded within certain electronic messages, such as spam, to provide recipients of such messages an easy mechanism for reporting spam to an anti-spam system.
- a linking object may be activated by selecting the linking object with a single action of a user input device, such as a single click of a mouse.
- a linking object may request additional information from the user such as if the user desires the sender to be placed on a whitelist, a blacklist, and/or the like.
- linking objects may be implemented using various available methods.
- a linking object may be a URI embedded in an email message.
- a linking object may be implemented using an embedded java script, an executable file, a visual basic script and the like.
- responsive includes completely or partially responsive.
- spam generally refers to the abuse of any electronic communications medium to send unsolicited messages in bulk.
- spam refers to an unsolicited and unwanted message that is delivered via e-mail.
- spamm includes unwanted, unsolicited messages in a variety of communication media formats. Examples of common communication media include, but are not limited to, e-mail, instant messaging, Usenet newsgroup, wikis, guestbooks, web search engines, weblogs, mobile phone text messaging, and/or the like.
- FIG. 1 illustrates a flowchart 100 describing the method of marking spam and user submission of messages in accordance with various embodiments of the present invention.
- an anti-spam system may be configured to scan incoming emails and determine which messages, if any, should be identified and marked as spam.
- step 10 a determination is made whether the message is spam. If not, the message passes through 16 to the user as per the usual process. If the message is spam, it is marked as spam 12 and a URI (Universal Resource Identifier) is inserted 14 into the message. This URI may be located in the Subject area or in the Body of the email message. The email is then passed on 16 to the user.
- another type of linking object such as a java script, executable file, and/or the like may be inserted into the message.
- the email can then be submitted to the anti-spam system by clicking on the link provided by the URI or other linking object.
- the URI, or other linking object may contain all the necessary information and instructions for contacting the anti-spam system. For example, in one embodiment, a single click of the mouse is all the input required from the user. As such, no additional information needs to be memorized or submitted by the user.
- the URI, or linking object may be encoded with a reference to the original email included as an attachment to the email sent by the URI, or linking object.
- the linking object may be encoded with information including the server address information in order to retrieve the original email directly from the original server.
- the URI, or linking object can contain only the signatures from the email or similar information deemed necessary for spam analysis. Using this latter method has the additional advantage of preserving the privacy of the content of the original email.
- the need for user input in an anti-spam system is to identify false positives, i.e. email messages marked as spam which are not such.
- FIG. 2 illustrates a block diagram 200 showing a network for tracking email messages in accordance with one or more embodiments of the present invention.
- a submission method such as a single-click submission method, may be incorporated into a complete email tracking system.
- the first element is the URI, or linking object, insertion device 20 .
- the linking object insertion device may be configured to encode a linking object, such as a URI, and insert the linking object into a marked electronic message, such as an email.
- this device may be incorporated into an email server, a firewall with email scanning capabilities, communication servers or, more generally, any anti-spam device or system that is capable of scanning electronic messages, such as email messages, and detecting which ones are spam.
- an email submission server 22 to receive email submissions from users who click on the URI may also be provided.
- server 22 may be the destination address encoded into the URI.
- server 22 may also have additional functions.
- the full electronic message or data may be submitted for analysis.
- an email storage server 24 is also required. This server keeps an archive of all emails that have had URIs, or linking object, inserted into them by the insertion device 20 .
- the email submission server 22 can then retrieve the full email message from the email storage server 24 when the corresponding email is received from the user.
- digital signatures of the electronic message or data may be submitted. For example, if only email signatures are collected, then the email storage server 24 is not necessary.
- FIG. 2 also depicts an email client workstation 26 .
- This workstation is where the user runs their email client, such as Microsoft Outlook®.
- Microsoft Outlook® When the user receives a message that is falsely identified as spam, or requires further analysis, they click on the URI, or linking object embedded within the message, and submit an email to the email submission server 22 .
- the email client workstation 26 forms a part of the whole system according to one embodiment, it will typically be provided by the user and not the anti-spam system provider.
- the email storage server 24 can be combined with the insertion device 20 into a single device.
- insertion device 20 may be implemented in hardware, software, and/or a combination thereof.
- insertion device 20 may be associated and/or implemented at a variety of levels.
- insertion device 20 may be implemented by an enterprise, a communications service provider, an end user, and/or the like.
- an anti-virus system can insert a URI, or linking object, into a quarantined email if a virus is present.
- the URI may provide a link for the user to review the email in a protected environment, to release the message from quarantine or to provide feedback to the anti-virus system.
- Embodiments of the present invention include various steps, which have been described above. A variety of these steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, the steps may be performed by a combination of hardware, software, and/or firmware.
- FIG. 3 is an example of a computer system 300 with which embodiments of the present invention may be utilized.
- the computer system includes a bus 31 , at least one processor 32 , at least one communication port 33 , a main memory 34 , a removable storage media 35 a read only memory 36 , and a mass storage 37 .
- Processor(s) 32 can be any know processor, such as, but not limited to, an Intel® Itanium® or Itanium 2 ® processor(s), or AMD® Opteron® or Athlon MP® processor(s), or Motorola ® lines of processors.
- Communication port(s) 33 can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, or a Gigabit port using copper or fiber.
- Communication port(s) 33 may be chosen depending on a network such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the computer system 300 connects.
- LAN Local Area Network
- WAN Wide Area Network
- Main memory 34 can be Random Access Memory (RAM), or any other dynamic storage device(s) commonly known in the art.
- Read only memory 36 can be any static storage device(s) such as Programmable Read Only Memory (PROM) chips for storing static information such as instructions for processor 32 .
- PROM Programmable Read Only Memory
- Mass storage 37 can be used to store information and instructions.
- hard disks such as the Adaptec® family of SCSI drives, an optical disc, an array of disks such as RAID, such as the Adaptec family of RAID drives, or any other mass storage devices may be used.
- Bus 31 communicatively couples processor(s) 32 with the other memory, storage and communication blocks.
- Bus 31 can be a PCI /PCI-X or SCSI based system bus depending on the storage devices used.
- Removable storage media 35 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc-Read Only Memory (CD-ROM), Compact Disc-Re-Writable (CD-RW), Digital Video Disk-Read Only Memory (DVD-ROM).
- CD-ROM Compact Disc-Read Only Memory
- CD-RW Compact Disc-Re-Writable
- DVD-ROM Digital Video Disk-Read Only Memory
- embodiments of the present invention provide novel systems, methods and arrangements for tracking electronic messages. While detailed descriptions of one or more embodiments of the invention have been given above, various alternatives, modifications, and equivalents will be apparent to those skilled in the art without varying from the spirit of the invention. Therefore, the above description should not be taken as limiting the scope of the invention, which is defined by the appended claims.
Abstract
Systems and methods for tracking electronic messages and data are provided. According to one embodiment, a linking object insertion routine identifies an electronic mail (email) message as a candidate for user feedback based on the email message having been previously classified as spam by a real-time email spam scanning routine associated with a commercial anti-spam service. The linking object insertion routine facilitates user submission of the user feedback regarding the email message to the commercial anti-spam service by embedding a linking object within the email message. The linking object is configured to automate communication of one or more digital signatures of the email message generated by the real-time email spam scanning routine to the commercial anti-spam service by performing out-of-band signaling with the commercial anti-spam service.
Description
- The present application is a continuation of U.S. patent application Ser. No. 12/710,342, filed Feb. 22, 2010, which is a continuation of U.S. patent application Ser. No. 11/366,673, filed Mar. 1, 2006, now U.S. Pat. No. 7,668,92012, both of which are hereby incorporated by referenced in their entirety for all purposes.
- Contained herein is material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent disclosure by any person as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights to the copyright whatsoever. Copyright © 2005-2011 Fortinet, Inc.
- Various embodiments of the present invention generally relate to tracking and storage of electronic messages, such as email messages. In particular, embodiments relate to the tracking and storage of messages which have been identified as spam or virus-infected by an appropriate service.
- One of the problems arising with the proliferation of Internet and email usage, as well as other means of electronic communication, is the receiving of unwanted and unsolicited bulk messages, commonly known as “spam”. While similar to the problems associated with physical junk mail, the consequences can be much more severe. Spam can contain viruses or other software that disable or damage the receiver's computer or other electronic equipment. In addition, the volume of spam may represent a significant load on the traffic handling mechanisms. For example, high volumes of email spam may negatively affect both client computer networks and the Internet itself. As a result, substantial efforts have been devoted to tracking and identifying spam in order to stop the problem at its source.
- Currently, anti-spam services rely heavily on user feedback to refine the algorithms used to define and mark spam. This user feedback is important in two ways. First, new spam sources can be identified before they have a chance to proliferate. Second, and potentially more important for end-users, is the identification of false positives, or messages that have been falsely identified as spam by the algorithm.
- Many anti-spam services mark the message header so that the user can readily identify the message as spam once the message is received by the user. The onus is then on the user to submit a misidentified message to a designated email address using their email client program. While this process is in common usage, it suffers from several limitations.
- In the context of email spam, the reliance on the user's email client means that the instructions for submitting emails can be quite extensive and can vary substantially depending on which email client is used. As a result, the user can be discouraged from submitting emails due to the steps involved. This makes it difficult to improve the rate of false positives and refine the algorithms in the anti-spam service.
- Related to this complexity, the user is required to remember the correct email address to submit information about false positive messages. Furthermore, the user is required to go through the process of forwarding the message through their email client. Even in a Graphic User Interface (GUI), this process still requires selecting the spam message, marking it for forwarding, entering the address and sending the forwarded message. This process can take some time, especially if multiple messages are identified and need to be forwarded.
- The user's email client can also pose a problem. There are numerous email clients in use and they can vary significantly in functions and features. In particular, some clients do not support forwarding email messages in their original form as an attachment, rather they are sent after being reformatted, such as lines broken into a fixed number of characters per line, headers removed, etc. As a result, the message received by the anti-spam system may not be in its original form. This can create difficulties for the anti-spam system and staff in analyzing the email message forwarded by the user.
- Additionally, the user may not want to forward the entire email message to the anti-spam system because of privacy concerns. The user typically cannot submit the signatures of the email, as he or she is not aware of the signatures of the email that mark the email message as spam.
- Finally, the user's Internet Service Provider (ISP) may not allow the user to submit spam over its network. Some ISPs drop spam in their outgoing email and if the anti-spam system is not part of their network, the message will not be sent, preventing this existing method of submitting emails from functioning.
- Another method of submitting email for spam analysis requires saving the email as a file and transferring the file to the anti-spam system manually or through a file transfer mechanism, such as File Transfer Protocol (FTP). This process is even more demanding and time consuming for the user than forwarding the original message. Also, the email is transformed from one format to another as part of the process and the original content may be lost or damaged, potentially rendering it useless to the anti-spam system.
- Therefore, there is a need for an anti-spam system that facilitates user submission of information and/or feedback regarding electronic messages marked as spam.
- Systems and methods are described for tracking electronic messages and data. Examples of electronic messages include, but are not limited to, email messages, instant messaging, Usenet newsgroup, wikis, guestbooks, web search engines, weblogs, mobile phone text messaging, and/or the like. According to one embodiment, a linking object insertion routine identifies an electronic mail (email) message as a candidate for user feedback based on the email message having been previously classified as spam by a real-time email spam scanning routine associated with a commercial anti-spam service. The linking object insertion routine facilitates user submission of the user feedback regarding the email message to the commercial anti-spam service by embedding a linking object within the email message. The linking object is configured to automate communication of one or more digital signatures of the email message generated by the real-time email spam scanning routine to the commercial anti-spam service by performing out-of-band signaling with the commercial anti-spam service.
- Other features of embodiments of the present invention will be apparent from the accompanying drawings and from the detailed description that follows.
- In the Figures, similar components and/or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label with a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.
-
FIG. 1 illustrates a flowchart describing a method of marking spam and user submission of messages in accordance with various embodiments of the present invention; -
FIG. 2 illustrates a block diagram showing a network for tracking email messages in accordance with one or more embodiments of the present invention; and -
FIG. 3 illustrates an example of a computer system with which embodiments of the present invention may be utilized. - Various embodiments of the invention both as to organization and method of operation, as well as additional objects and advantages thereof, will become readily apparent from the following detailed description when read in connection with the accompanying drawings.
- Embodiments of the present invention relates generally to tracking and storage of electronic messages, such as email messages, for example. In particular, some embodiments relate to electronic messages, such as email messages, which have been identified as spam or virus-infected by an appropriate service, such as a real-time email spam filter (e.g., FortiGuard antispam subscription service) and/or a real-time email virus scanner (e.g., FortiGuard antivirus subscription service).
- In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent, however, to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
- Embodiments of the present invention may be provided as a computer program product, which may include a machine-readable medium having stored thereon instructions which may be used to program a computer (or other electronic devices) to perform a process. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, ROMs, random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions.
- While, for convenience, embodiments of the present invention are described with reference to a tracking and storage of email messages, embodiments of the present invention are equally applicable to various other types of electronic messages and data.
- For the sake of illustration, various embodiments of the present invention have herein been described in the context of computer programs, physical components, and logical interactions within modern computer networks. Importantly, while these embodiments describe various aspects of the invention in relation to modern computer networks and programs, the method and apparatus described herein are equally applicable to other systems, devices, and networks as one skilled in the art will appreciate. As such, the illustrated applications of the embodiments of the present invention are not meant to be limiting, but instead exemplary. Other systems, devices, and networks to which embodiments of the present invention are applicable include, but are not limited to, other types of communication and computer devices and systems. More specifically, embodiments are applicable to communication systems, services, and devices such as cell phone networks and compatible devices. In addition, embodiments are applicable to all levels of computing from the personal computer to large network mainframes and servers.
- Brief definitions of terms, abbreviations, and phrases used throughout this application are given below.
- The terms “connected” or “coupled” and related terms are used in an operational sense and are not necessarily limited to a direct physical connection or coupling. Thus, for example, two devices may be coupled directly, or via one or more intermediary media or devices. As another example, devices may be coupled in such a way that information can be passed there between, while not sharing any physical connection one with another. Based on the disclosure provided herein, one of ordinary skill in the art will appreciate a variety of ways in which connection or coupling exists in accordance with the aforementioned definition.
- The phrases “in one embodiment,” “according to one embodiment,” and the like generally mean the particular feature, structure, or characteristic following the phrase is included in at least one embodiment of the present invention, and may be included in more than one embodiment of the present invention. Importantly, such phases do not necessarily refer to the same embodiment.
- The phrase “linking object” generally refers to one or more commands embedded within or otherwise associated with a document, which when accessed/activated by a user, automatically connects to a designated resource. In one embodiment, linking objects are embedded within certain electronic messages, such as spam, to provide recipients of such messages an easy mechanism for reporting spam to an anti-spam system. In one embodiment, a linking object may be activated by selecting the linking object with a single action of a user input device, such as a single click of a mouse. In other embodiments, a linking object may request additional information from the user such as if the user desires the sender to be placed on a whitelist, a blacklist, and/or the like. According to some embodiments, linking objects may be implemented using various available methods. For example, in one embodiment, a linking object may be a URI embedded in an email message. In some embodiments, a linking object may be implemented using an embedded java script, an executable file, a visual basic script and the like.
- If the specification states a component or feature “may”, “can”, “could”, or “might” be included or have a characteristic, that particular component or feature is not required to be included or have the characteristic.
- The term “responsive” includes completely or partially responsive.
- The term “spam” generally refers to the abuse of any electronic communications medium to send unsolicited messages in bulk. In one embodiment, the term “spam” refers to an unsolicited and unwanted message that is delivered via e-mail. In other embodiments, the term “spam” includes unwanted, unsolicited messages in a variety of communication media formats. Examples of common communication media include, but are not limited to, e-mail, instant messaging, Usenet newsgroup, wikis, guestbooks, web search engines, weblogs, mobile phone text messaging, and/or the like.
-
FIG. 1 illustrates aflowchart 100 describing the method of marking spam and user submission of messages in accordance with various embodiments of the present invention. According to one embodiment, an anti-spam system may be configured to scan incoming emails and determine which messages, if any, should be identified and marked as spam. Instep 10, a determination is made whether the message is spam. If not, the message passes through 16 to the user as per the usual process. If the message is spam, it is marked asspam 12 and a URI (Universal Resource Identifier) is inserted 14 into the message. This URI may be located in the Subject area or in the Body of the email message. The email is then passed on 16 to the user. In some embodiments, another type of linking object such as a java script, executable file, and/or the like may be inserted into the message. - When the user receives the marked message, the email can then be submitted to the anti-spam system by clicking on the link provided by the URI or other linking object. According to some embodiments, the URI, or other linking object, may contain all the necessary information and instructions for contacting the anti-spam system. For example, in one embodiment, a single click of the mouse is all the input required from the user. As such, no additional information needs to be memorized or submitted by the user.
- According to one embodiment, the URI, or linking object, may be encoded with a reference to the original email included as an attachment to the email sent by the URI, or linking object. In one embodiment, the linking object may be encoded with information including the server address information in order to retrieve the original email directly from the original server. Alternatively, in some embodiments, the URI, or linking object, can contain only the signatures from the email or similar information deemed necessary for spam analysis. Using this latter method has the additional advantage of preserving the privacy of the content of the original email.
- Generally, the need for user input in an anti-spam system is to identify false positives, i.e. email messages marked as spam which are not such.
-
FIG. 2 illustrates a block diagram 200 showing a network for tracking email messages in accordance with one or more embodiments of the present invention. In accordance with various embodiments, a submission method, such as a single-click submission method, may be incorporated into a complete email tracking system. The first element is the URI, or linking object,insertion device 20. In one embodiment, the linking object insertion device may be configured to encode a linking object, such as a URI, and insert the linking object into a marked electronic message, such as an email. According to one embodiment, this device may be incorporated into an email server, a firewall with email scanning capabilities, communication servers or, more generally, any anti-spam device or system that is capable of scanning electronic messages, such as email messages, and detecting which ones are spam. - In accordance with the embodiment depicted, an
email submission server 22 to receive email submissions from users who click on the URI may also be provided. In one embodiment,server 22 may be the destination address encoded into the URI. However, as described below,server 22 may also have additional functions. - In some embodiments, the full electronic message or data may be submitted for analysis. For example, if a full email message is to be submitted for analysis, then an
email storage server 24 is also required. This server keeps an archive of all emails that have had URIs, or linking object, inserted into them by theinsertion device 20. Theemail submission server 22 can then retrieve the full email message from theemail storage server 24 when the corresponding email is received from the user. In other embodiments, digital signatures of the electronic message or data may be submitted. For example, if only email signatures are collected, then theemail storage server 24 is not necessary. -
FIG. 2 also depicts anemail client workstation 26. This workstation is where the user runs their email client, such as Microsoft Outlook®. According to one embodiment, when the user receives a message that is falsely identified as spam, or requires further analysis, they click on the URI, or linking object embedded within the message, and submit an email to theemail submission server 22. While theemail client workstation 26 forms a part of the whole system according to one embodiment, it will typically be provided by the user and not the anti-spam system provider. - For practical purposes, according to one embodiment, the
email storage server 24 can be combined with theinsertion device 20 into a single device. According to some embodiments,insertion device 20 may be implemented in hardware, software, and/or a combination thereof. Furthermore,insertion device 20 may be associated and/or implemented at a variety of levels. For example,insertion device 20 may be implemented by an enterprise, a communications service provider, an end user, and/or the like. - While the above description uses the single-click submission method for detecting spam email messages, it can be effectively used for any application where any electronic message, such as an email message, or its signatures needs to be submitted to a system for analysis. For example, an anti-virus system can insert a URI, or linking object, into a quarantined email if a virus is present. According to one embodiment, the URI may provide a link for the user to review the email in a protected environment, to release the message from quarantine or to provide feedback to the anti-virus system.
- Also, while some applications (and even some anti-spam applications) may require further user input after clicking on the URI, use of the single-click method is still beneficial. By minimizing the user's steps to initiate the process, the likelihood of the user proceeding with the process and providing the necessary information is greatly enhanced.
- Embodiments of the present invention include various steps, which have been described above. A variety of these steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, the steps may be performed by a combination of hardware, software, and/or firmware. As such,
FIG. 3 is an example of acomputer system 300 with which embodiments of the present invention may be utilized. According to the present example, the computer system includes abus 31, at least oneprocessor 32, at least onecommunication port 33, amain memory 34, a removable storage media 35 a read onlymemory 36, and amass storage 37. - Processor(s) 32 can be any know processor, such as, but not limited to, an Intel® Itanium® or Itanium 2® processor(s), or AMD® Opteron® or Athlon MP® processor(s), or Motorola ® lines of processors. Communication port(s) 33 can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, or a Gigabit port using copper or fiber. Communication port(s) 33 may be chosen depending on a network such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the
computer system 300 connects. -
Main memory 34 can be Random Access Memory (RAM), or any other dynamic storage device(s) commonly known in the art. Read onlymemory 36 can be any static storage device(s) such as Programmable Read Only Memory (PROM) chips for storing static information such as instructions forprocessor 32. -
Mass storage 37 can be used to store information and instructions. For example, hard disks such as the Adaptec® family of SCSI drives, an optical disc, an array of disks such as RAID, such as the Adaptec family of RAID drives, or any other mass storage devices may be used. -
Bus 31 communicatively couples processor(s) 32 with the other memory, storage and communication blocks.Bus 31 can be a PCI /PCI-X or SCSI based system bus depending on the storage devices used. -
Removable storage media 35 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc-Read Only Memory (CD-ROM), Compact Disc-Re-Writable (CD-RW), Digital Video Disk-Read Only Memory (DVD-ROM). - The components described above are meant to exemplify some types of possibilities. In no way should the aforementioned examples limit the scope of the invention, as they are only exemplary embodiments.
- In conclusion, embodiments of the present invention provide novel systems, methods and arrangements for tracking electronic messages. While detailed descriptions of one or more embodiments of the invention have been given above, various alternatives, modifications, and equivalents will be apparent to those skilled in the art without varying from the spirit of the invention. Therefore, the above description should not be taken as limiting the scope of the invention, which is defined by the appended claims.
Claims (42)
1. A computer-implemented method of facilitating user feedback regarding an electronic mail (email) message classified as spam by a commercial anti-spam service, the method comprising:
identifying, by a linking object insertion routine, the email message as a candidate for user feedback based on the email message having been previously classified as spam by a real-time email spam scanning routine associated with the commercial anti-spam service;
facilitating, by the linking object insertion routine, user submission of the user feedback regarding the email message to the commercial anti-spam service by embedding a linking object within the email message, wherein the linking object is configured to automate communication of one or more digital signatures of the email message generated by the real-time email spam scanning routine to the commercial anti-spam service by performing out-of-band signaling with the commercial anti-spam service; and
wherein the linking object insertion routine and the real-time email spam scanning routine are implemented in one or more processors and one or more computer-readable storage media of one or more computer systems, the one or more computer-readable storage media having instructions tangibly embodied therein representing the linking object insertion routine and the real-time email spam scanning routine that are executable by the one or more processors.
2. The method of claim 1 , further comprising increasing a likelihood of submission of the user feedback by minimizing the user's steps to initiate and complete the user submission.
3. The method of claim 2 , wherein the user's steps to initiate the user submission consist essentially of a single-click on the linking object.
4. The method of claim 1 , wherein the out-of-band signaling with the commercial anti-spam service does not rely on an email client used by the user.
5. The method of claim 1 , wherein the out-of-band signaling with the commercial anti-spam service comprises a browser-based connection with an email submission server of the commercial anti-spam service.
6. The method of claim 1 , wherein the linking object is configured to automate communication of an entire contents of the email message to the commercial anti-spam service for analysis by the commercial anti-spam service.
7. The method of claim 1 , wherein the linking object is configured to limit communication regarding the email message to the commercial anti-spam service to the one or more digital signatures and other information associated with the email message that is reasonably required to refine one or more algorithms used by the commercial anti-spam service to define spam.
8. The method of claim 7 , wherein the other information comprises an indication to the commercial anti-spam service that the email message has been correctly or falsely identified as spam.
9. The method of claim 1 , wherein the linking object comprises a Universal Resource Identifier (URI).
10. The method of claim 1 , wherein the linking object comprises an embedded java script.
11. The method of claim 1 , wherein the linking object comprises an executable file.
12. The method of claim 1 , wherein the linking object comprises a visual basic script.
13. A computer-implemented method of facilitating user feedback regarding an electronic mail (email) message classified as spam by a commercial anti-virus service, the method comprising:
identifying, by a linking object insertion routine, the email message as a candidate for user feedback based on the email message having been previously classified as virus-infected by a real-time email anti-virus scanning routine associated with the commercial anti-virus service;
facilitating, by the linking object insertion routine, user submission of the user feedback regarding the email message to the commercial anti-virus service by embedding a linking object within the email message, wherein the linking object is configured to automate communication of one or more digital signatures of the email message generated by the real-time email anti-virus scanning routine to the commercial anti-virus service by performing out-of-band signaling with the commercial anti-virus service; and
wherein the linking object insertion routine and the real-time email anti-virus scanning routine are implemented in one or more processors and one or more computer-readable storage media of one or more computer systems, the one or more computer-readable storage media having instructions tangibly embodied therein representing the linking object insertion routine and the real-time email anti-virus scanning routine that are executable by the one or more processors.
14. The method of claim 13 , further comprising increasing a likelihood of submission of the user feedback by minimizing the user's steps to initiate and complete the user submission.
15. The method of claim 14 , wherein the user's steps to initiate the user submission consist essentially of a single-click on the linking object.
16. The method of claim 13 , wherein the out-of-band signaling with the commercial anti-virus service does not rely on an email client used by the user.
17. The method of claim 13 , wherein the out-of-band signaling with the commercial anti-virus service comprises a browser-based connection with an email submission server of the commercial anti-virus service.
18. The method of claim 13 , wherein the linking object is configured to automate communication of an entire contents of the email message to the commercial anti-virus service for analysis by the commercial anti-virus service.
19. The method of claim 13 , wherein the linking object is configured to limit communication regarding the email message to the commercial anti-virus service to the one or more digital signatures and other information associated with the email message that is reasonably required to refine one or more algorithms used by the commercial anti-virus service to define virus-infected email messages.
20. The method of claim 19 , wherein the other information comprises an indication to the commercial anti-virus service that the email message has been correctly or falsely identified as virus-infected.
21. The method of claim 13 , wherein the linking object comprises a Universal Resource Identifier (URI).
22. The method of claim 13 , wherein the linking object comprises an embedded java script.
23. The method of claim 13 , wherein the linking object comprises an executable file.
24. The method of claim 13 , wherein the linking object comprises a visual basic script.
25. A non-transitory computer-readable storage medium tangibly embodying a set of instructions executable by one or more processors of one or more computer systems to perform a method for facilitating user feedback and submission of information regarding electronic mail (email) messages, the method comprising:
identifying, by a linking object insertion routine, an email message as a candidate for user feedback based on the email message having been previously classified as spam by a real-time email spam scanning routine associated with a commercial anti-spam service; and
facilitating, by the linking object insertion routine, user submission of the user feedback regarding the email message to the commercial anti-spam service by embedding a linking object within the email message, wherein the linking object is configured to automate communication of one or more digital signatures of the email message generated by the real-time email spam scanning routine to the commercial anti-spam service by performing out-of-band signaling with the commercial anti-spam service.
26. The computer-readable storage medium of claim 25 , the method further comprises increasing a likelihood of submission of the user feedback by minimizing the user's steps to initiate and complete the user submission.
27. The computer-readable storage medium of claim 26 , wherein the user's steps to initiate the user submission consist essentially of a single-click on the linking object.
28. The computer-readable storage medium of claim 25 , wherein the out-of-band signaling with the commercial anti-spam service does not rely on an email client used by the user.
29. The computer-readable storage medium of claim 25 , wherein the out-of-band signaling with the commercial anti-spam service comprises a browser-based connection with an email submission server of the commercial anti-spam service.
30. The computer-readable storage medium of claim 25 , wherein the linking object is configured to automate communication of an entire contents of the email message to the commercial anti-spam service for analysis by the commercial anti-spam service.
31. The computer-readable storage medium of claim 25 , wherein the linking object is configured to limit communication regarding the email message to the commercial anti-spam service to the one or more digital signatures and other information associated with the email message that is reasonably required to refine one or more algorithms used by the commercial anti-spam service to define spam.
32. The computer-readable storage medium of claim 31 , wherein the other information comprises an indication to the commercial anti-spam service that the email message has been correctly or falsely identified as spam.
33. The computer-readable storage medium of claim 25 , wherein the linking object comprises one or more of a Universal Resource Identifier (URI), an embedded java script, an executable file and a visual basic script.
34. A non-transitory computer-readable storage medium tangibly embodying a set of instructions executable by one or more processors of one or more computer systems to perform a method for facilitating user feedback and submission of information regarding electronic mail (email) messages, the method comprising:
identifying, by a linking object insertion routine, an email message as a candidate for user feedback based on the email message having been previously classified as virus-infected by a real-time email anti-virus scanning routine associated with a commercial anti-virus service; and
facilitating, by the linking object insertion routine, user submission of the user feedback regarding the email message to the commercial anti-virus service by embedding a linking object within the email message, wherein the linking object is configured to automate communication of one or more digital signatures of the email message generated by the real-time email anti-virus scanning routine to the commercial anti-virus service by performing out-of-band signaling with the commercial anti-virus service.
35. The computer-readable storage medium of claim 34 , wherein the method further comprises increasing a likelihood of submission of the user feedback by minimizing the user's steps to initiate and complete the user submission.
36. The computer-readable storage medium of claim 35 , wherein the user's steps to initiate the user submission consist essentially of a single-click on the linking object.
37. The computer-readable storage medium of claim 34 , wherein the out-of-band signaling with the commercial anti-virus service does not rely on an email client used by the user.
38. The computer-readable storage medium of claim 34 , wherein the out-of-band signaling with the commercial anti-virus service comprises a browser-based connection with an email submission server of the commercial anti-virus service.
39. The computer-readable storage medium of claim 34 , wherein the linking object is configured to automate communication of an entire contents of the email message to the commercial anti-virus service for analysis by the commercial anti-virus service.
40. The computer-readable storage medium of claim 34 , wherein the linking object is configured to limit communication regarding the email message to the commercial anti-virus service to the one or more digital signatures and other information associated with the email message that is reasonably required to refine one or more algorithms used by the commercial anti-virus service to define virus-infected email messages.
41. The computer-readable storage medium of claim 40 , wherein the other information comprises an indication to the commercial anti-virus service that the email message has been correctly or falsely identified as virus-infected.
42. The computer-readable storage medium of claim 34 , wherein the linking object comprises one or more of a Universal Resource Identifier (URI), an embedded java script, an executable file and a visual basic script.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/110,266 US20110219086A1 (en) | 2006-03-01 | 2011-05-18 | Electronic message and data tracking system |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/366,673 US7668920B2 (en) | 2006-03-01 | 2006-03-01 | Electronic message and data tracking system |
US12/710,342 US7970848B2 (en) | 2006-03-01 | 2010-02-22 | Electronic message and data tracking system |
US13/110,266 US20110219086A1 (en) | 2006-03-01 | 2011-05-18 | Electronic message and data tracking system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/710,342 Continuation US7970848B2 (en) | 2006-03-01 | 2010-02-22 | Electronic message and data tracking system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110219086A1 true US20110219086A1 (en) | 2011-09-08 |
Family
ID=38472665
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/366,673 Expired - Fee Related US7668920B2 (en) | 2006-03-01 | 2006-03-01 | Electronic message and data tracking system |
US12/710,342 Active US7970848B2 (en) | 2006-03-01 | 2010-02-22 | Electronic message and data tracking system |
US13/110,266 Abandoned US20110219086A1 (en) | 2006-03-01 | 2011-05-18 | Electronic message and data tracking system |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/366,673 Expired - Fee Related US7668920B2 (en) | 2006-03-01 | 2006-03-01 | Electronic message and data tracking system |
US12/710,342 Active US7970848B2 (en) | 2006-03-01 | 2010-02-22 | Electronic message and data tracking system |
Country Status (2)
Country | Link |
---|---|
US (3) | US7668920B2 (en) |
CN (1) | CN101030972A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462062A (en) * | 2014-12-11 | 2015-03-25 | 珠海金山网络游戏科技有限公司 | Text anti-spam method |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7389358B1 (en) * | 2000-09-13 | 2008-06-17 | Fortinet, Inc. | Distributed virtual system to support managed, network-based services |
US7272643B1 (en) | 2000-09-13 | 2007-09-18 | Fortinet, Inc. | System and method for managing and provisioning virtual routers |
US7487232B1 (en) | 2000-09-13 | 2009-02-03 | Fortinet, Inc. | Switch management system and method |
US8250357B2 (en) | 2000-09-13 | 2012-08-21 | Fortinet, Inc. | Tunnel interface for securing traffic over a network |
US7574495B1 (en) * | 2000-09-13 | 2009-08-11 | Fortinet, Inc. | System and method for managing interworking communications protocols |
US7181547B1 (en) | 2001-06-28 | 2007-02-20 | Fortinet, Inc. | Identifying nodes in a ring network |
US7177311B1 (en) | 2002-06-04 | 2007-02-13 | Fortinet, Inc. | System and method for routing traffic through a virtual router-based network switch |
US7161904B2 (en) | 2002-06-04 | 2007-01-09 | Fortinet, Inc. | System and method for hierarchical metering in a virtual router based network switch |
US7203192B2 (en) | 2002-06-04 | 2007-04-10 | Fortinet, Inc. | Network packet steering |
US7376125B1 (en) | 2002-06-04 | 2008-05-20 | Fortinet, Inc. | Service processing switch |
US7096383B2 (en) | 2002-08-29 | 2006-08-22 | Cosine Communications, Inc. | System and method for virtual router failover in a network routing system |
US7266120B2 (en) | 2002-11-18 | 2007-09-04 | Fortinet, Inc. | System and method for hardware accelerated packet multicast in a virtual routing system |
US7720095B2 (en) * | 2003-08-27 | 2010-05-18 | Fortinet, Inc. | Heterogeneous media packet bridging |
US20060031309A1 (en) * | 2004-05-20 | 2006-02-09 | International Business Machines Corporation | Electronic mail attachment management system and method |
US7499419B2 (en) | 2004-09-24 | 2009-03-03 | Fortinet, Inc. | Scalable IP-services enabled multicast forwarding with efficient resource utilization |
US7808904B2 (en) | 2004-11-18 | 2010-10-05 | Fortinet, Inc. | Method and apparatus for managing subscriber profiles |
GB0512744D0 (en) * | 2005-06-22 | 2005-07-27 | Blackspider Technologies | Method and system for filtering electronic messages |
US7375840B2 (en) * | 2005-09-30 | 2008-05-20 | International Business Machines Corporation | Method and system for the management of files and mail attachments |
US7668920B2 (en) * | 2006-03-01 | 2010-02-23 | Fortinet, Inc. | Electronic message and data tracking system |
US7899870B2 (en) * | 2007-06-25 | 2011-03-01 | Microsoft Corporation | Determination of participation in a malicious software campaign |
US20090300012A1 (en) * | 2008-05-28 | 2009-12-03 | Barracuda Inc. | Multilevel intent analysis method for email filtration |
FR2936386B1 (en) * | 2008-09-25 | 2011-09-16 | Alcatel Lucent | METHOD FOR CONTROLLING AT LEAST ONE FUNCTION OF AN INSTANT MESSAGING CLIENT |
US8370440B2 (en) | 2008-09-30 | 2013-02-05 | Microsoft Corporation | Role-independent context exchange |
US20100312702A1 (en) * | 2009-06-06 | 2010-12-09 | Bullock Roddy M | System and method for making money by facilitating easy online payment |
US8117506B2 (en) * | 2010-05-21 | 2012-02-14 | Research In Motion Limited | Apparatus, and associated method, for reporting delayed communication of data messages |
US10694029B1 (en) | 2013-11-07 | 2020-06-23 | Rightquestion, Llc | Validating automatic number identification data |
US9954805B2 (en) * | 2016-07-22 | 2018-04-24 | Mcafee, Llc | Graymail filtering-based on user preferences |
US9847973B1 (en) | 2016-09-26 | 2017-12-19 | Agari Data, Inc. | Mitigating communication risk by detecting similarity to a trusted message contact |
US10805314B2 (en) * | 2017-05-19 | 2020-10-13 | Agari Data, Inc. | Using message context to evaluate security of requested data |
US10880322B1 (en) | 2016-09-26 | 2020-12-29 | Agari Data, Inc. | Automated tracking of interaction with a resource of a message |
US11936604B2 (en) | 2016-09-26 | 2024-03-19 | Agari Data, Inc. | Multi-level security analysis and intermediate delivery of an electronic message |
US11722513B2 (en) | 2016-11-30 | 2023-08-08 | Agari Data, Inc. | Using a measure of influence of sender in determining a security risk associated with an electronic message |
US11044267B2 (en) | 2016-11-30 | 2021-06-22 | Agari Data, Inc. | Using a measure of influence of sender in determining a security risk associated with an electronic message |
US11019076B1 (en) | 2017-04-26 | 2021-05-25 | Agari Data, Inc. | Message security assessment using sender identity profiles |
US11757914B1 (en) | 2017-06-07 | 2023-09-12 | Agari Data, Inc. | Automated responsive message to determine a security risk of a message sender |
US11102244B1 (en) | 2017-06-07 | 2021-08-24 | Agari Data, Inc. | Automated intelligence gathering |
Citations (96)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4667287A (en) * | 1982-10-28 | 1987-05-19 | Tandem Computers Incorporated | Multiprocessor multisystem communications network |
US5490252A (en) * | 1992-09-30 | 1996-02-06 | Bay Networks Group, Inc. | System having central processor for transmitting generic packets to another processor to be altered and transmitting altered packets back to central processor for routing |
US5550816A (en) * | 1994-12-29 | 1996-08-27 | Storage Technology Corporation | Method and apparatus for virtual switching |
US5633866A (en) * | 1995-11-17 | 1997-05-27 | Bay Networks, Inc. | Method and apparatus for routing packets in networks having connection-oriented subnetworks |
US5745778A (en) * | 1994-01-26 | 1998-04-28 | Data General Corporation | Apparatus and method for improved CPU affinity in a multiprocessor system |
US5875290A (en) * | 1997-03-27 | 1999-02-23 | International Business Machines Corporation | Method and program product for synchronizing operator initiated commands with a failover process in a distributed processing system |
US5892924A (en) * | 1996-01-31 | 1999-04-06 | Ipsilon Networks, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
US5920705A (en) * | 1996-01-31 | 1999-07-06 | Nokia Ip, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
US6014382A (en) * | 1996-04-04 | 2000-01-11 | Hitachi, Ltd. | ATM switching system including a switching control portion for distributing call set-up requirement signals |
US6032193A (en) * | 1997-03-20 | 2000-02-29 | Niobrara Research And Development Corporation | Computer system having virtual circuit address altered by local computer to switch to different physical data link to increase data transmission bandwidth |
US6047330A (en) * | 1998-01-20 | 2000-04-04 | Netscape Communications Corporation | Virtual router discovery system |
US6069895A (en) * | 1997-08-29 | 2000-05-30 | Nortel Networks Corporation | Distributed route server |
US6085238A (en) * | 1996-04-23 | 2000-07-04 | Matsushita Electric Works, Ltd. | Virtual LAN system |
US6098110A (en) * | 1996-12-30 | 2000-08-01 | Compaq Computer Corporation | Network switch with a multiple bus structure and a bridge interface for transferring network data between different buses |
US6118791A (en) * | 1995-12-20 | 2000-09-12 | Cisco Technology, Inc. | Adaptive bandwidth allocation method for non-reserved traffic in a high-speed data transmission network, and system for implementing said method |
US6169739B1 (en) * | 1997-01-08 | 2001-01-02 | Nec Corporation | ATM VLAN multi-protocol client-server system using layer-3 header of packets for transporting connectionless and connection-oriented traffic |
US6169793B1 (en) * | 1996-12-24 | 2001-01-02 | Evolving Systems, Inc. | Systems and methods for providing order and service mediation for telecommunications systems |
US6175867B1 (en) * | 1998-03-23 | 2001-01-16 | Mci World Com, Inc. | System and method for managing networks addressed via common network addresses |
US6192051B1 (en) * | 1999-02-26 | 2001-02-20 | Redstone Communications, Inc. | Network router search engine using compressed tree forwarding table |
US6220768B1 (en) * | 1996-06-28 | 2001-04-24 | Sun Microsystems, Inc. | Network asset survey tool for gathering data about node equipment |
US6226788B1 (en) * | 1998-07-22 | 2001-05-01 | Cisco Technology, Inc. | Extensible network management system |
US6243580B1 (en) * | 1995-11-30 | 2001-06-05 | Amsc Subsidiary Corporation | Priority and preemption service system for satellite related communication using central controller |
US6249519B1 (en) * | 1998-04-16 | 2001-06-19 | Mantra Communications | Flow based circuit steering in ATM networks |
US6256295B1 (en) * | 1997-09-25 | 2001-07-03 | Nortel Networks Limited | Method and apparatus for determining multiple minimally-overlapping paths between nodes in a network |
US6260073B1 (en) * | 1996-12-30 | 2001-07-10 | Compaq Computer Corporation | Network switch including a switch manager for periodically polling the network ports to determine their status and controlling the flow of data between ports |
US6260072B1 (en) * | 1997-06-12 | 2001-07-10 | Lucent Technologies Inc | Method and apparatus for adaptive routing in packet networks |
US6266695B1 (en) * | 1997-12-23 | 2001-07-24 | Alcatel Usa Sourcing, L.P. | Telecommunications switch management system |
US6278708B1 (en) * | 1998-04-10 | 2001-08-21 | Cisco Technology, Inc. | Frame relay access device with user-configurable virtual circuit bundling |
US6286038B1 (en) * | 1998-08-03 | 2001-09-04 | Nortel Networks Limited | Method and apparatus for remotely configuring a network device |
US6295297B1 (en) * | 1997-12-29 | 2001-09-25 | Samsung Electronics Co., Ltd. | Gateway for connecting ATM-based access network to existing network |
US6338092B1 (en) * | 1998-09-24 | 2002-01-08 | International Business Machines Corporation | Method, system and computer program for replicating data in a distributed computed environment |
US20020062344A1 (en) * | 1998-09-11 | 2002-05-23 | Tatu Ylonen | Method and arrangement for secure tunneling of data between virtual routers |
US20020066034A1 (en) * | 2000-10-24 | 2002-05-30 | Schlossberg Barry J. | Distributed network security deception system |
US6405262B1 (en) * | 1995-07-14 | 2002-06-11 | Microsoft Corporation | Efficient inter-process object and interface pinging |
US20020071389A1 (en) * | 2000-12-09 | 2002-06-13 | Hyun-Chul Seo | Data structure for implementation of traffic engineering function in multiprotocol label switching system and storage medium for storing the same |
US20020075901A1 (en) * | 2000-12-19 | 2002-06-20 | Bruce Perlmutter | Bandwidth management for tunneling servers |
US6414595B1 (en) * | 2000-06-16 | 2002-07-02 | Ciena Corporation | Method and system for processing alarm objects in a communications network |
US20020097872A1 (en) * | 2001-01-24 | 2002-07-25 | Maliszewski Richard L. | Method of providing secure content-based user experience enhancement within a content protection architecture |
US20020099849A1 (en) * | 2001-01-25 | 2002-07-25 | Crescent Networks, Inc. | Dense virtual router packet switching |
US6434619B1 (en) * | 1998-04-29 | 2002-08-13 | Alcatel Canada Inc. | Internet-enabled service management system and method |
US6449650B1 (en) * | 1999-02-01 | 2002-09-10 | Redback Networks Inc. | Methods and apparatus for deploying quality of service policies on a data communication network |
US20020199095A1 (en) * | 1997-07-24 | 2002-12-26 | Jean-Christophe Bandini | Method and system for filtering communication |
US20030033401A1 (en) * | 1999-04-02 | 2003-02-13 | Matthew W. Poisson | Monitoring a virtual private network |
US6526056B1 (en) * | 1997-12-23 | 2003-02-25 | Cisco Technology, Inc. | Virtual private network employing tag-implemented egress-channel selection |
US6532088B1 (en) * | 1999-09-10 | 2003-03-11 | Alcatel | System and method for packet level distributed routing in fiber optic rings |
US6542466B1 (en) * | 1999-05-20 | 2003-04-01 | Motorola, Inc. | Communication network method and apparatus |
US6553423B1 (en) * | 1999-05-27 | 2003-04-22 | Cisco Technology, Inc. | Method and apparatus for dynamic exchange of capabilities between adjacent/neighboring networks nodes |
US6556544B1 (en) * | 1999-10-22 | 2003-04-29 | Nortel Networks Limited | Method and system for provisioning network resources for dynamic multicast groups |
US20030108041A1 (en) * | 2001-12-07 | 2003-06-12 | Nortell Networks Limited | Tunneling scheme optimized for use in virtual private netwoks |
US20030115308A1 (en) * | 2001-12-19 | 2003-06-19 | Michael Best | Network management system architecture |
US20030117954A1 (en) * | 2001-12-20 | 2003-06-26 | Alcatel | Telecommunications system employing virtual service network architecture |
US20030131228A1 (en) * | 2002-01-10 | 2003-07-10 | Twomey John E. | System on a chip for network storage devices |
US6608816B1 (en) * | 1998-11-18 | 2003-08-19 | Nortel Networks Limited | Method and apparatus for providing differentiated services using a multi-level queuing mechanism |
US6611522B1 (en) * | 1998-06-19 | 2003-08-26 | Juniper Networks, Inc. | Quality of service facility in a device for performing IP forwarding and ATM switching |
US6680922B1 (en) * | 1998-07-10 | 2004-01-20 | Malibu Networks, Inc. | Method for the recognition and operation of virtual private networks (VPNs) over a wireless point to multi-point (PtMP) transmission system |
US6694437B1 (en) * | 1999-06-22 | 2004-02-17 | Institute For Information Technology | System and method for on-demand access concentrator for virtual private networks |
US6697359B1 (en) * | 1999-07-02 | 2004-02-24 | Ancor Communications, Inc. | High performance switch fabric element and switch systems |
US6697360B1 (en) * | 1998-09-02 | 2004-02-24 | Cisco Technology, Inc. | Method and apparatus for auto-configuring layer three intermediate computer network devices |
US20040037379A1 (en) * | 2000-12-07 | 2004-02-26 | Nadim Khlat | Multi-mode radio communications device using a common reference oscillator |
US20040042416A1 (en) * | 2002-08-27 | 2004-03-04 | Ngo Chuong Ngoc | Virtual Local Area Network auto-discovery methods |
US6738371B1 (en) * | 1999-09-28 | 2004-05-18 | Ericsson Inc. | Ingress data queue management in a packet data router |
US6738821B1 (en) * | 1999-01-26 | 2004-05-18 | Adaptec, Inc. | Ethernet storage protocol networks |
US20040095932A1 (en) * | 2002-11-18 | 2004-05-20 | Toshiba America Information Systems, Inc. | Method for SIP - mobility and mobile - IP coexistence |
US20040095934A1 (en) * | 2002-11-18 | 2004-05-20 | Cosine Communications, Inc. | System and method for hardware accelerated packet multicast in a virtual routing system |
US6763236B2 (en) * | 2000-06-30 | 2004-07-13 | Nokia Mobile Phones, Ltd. | Resource allocating and service providing over a wireless network |
US6775267B1 (en) * | 1999-12-30 | 2004-08-10 | At&T Corp | Method for billing IP broadband subscribers |
US6775284B1 (en) * | 2000-01-07 | 2004-08-10 | International Business Machines Corporation | Method and system for frame and protocol classification |
US6778502B2 (en) * | 1999-06-18 | 2004-08-17 | Savvis, Inc. | On-demand overlay routing for computer-based communication networks |
US6785224B2 (en) * | 2000-03-06 | 2004-08-31 | Fujitsu Limited | Ring configuring method and node apparatus used in the ring |
US20050002417A1 (en) * | 2003-07-02 | 2005-01-06 | Kelly Thomas J. | Systems and methods for performing protocol conversions in a work machine |
US6868082B1 (en) * | 1999-08-30 | 2005-03-15 | International Business Machines Corporation | Network processor interface for building scalable switching systems |
US20050081059A1 (en) * | 1997-07-24 | 2005-04-14 | Bandini Jean-Christophe Denis | Method and system for e-mail filtering |
US6883170B1 (en) * | 2000-08-30 | 2005-04-19 | Aspect Communication Corporation | Method and system to maintain a hierarchy of instantiated application objects and to enable recovery from an applications failure |
US6894994B1 (en) * | 1997-11-03 | 2005-05-17 | Qualcomm Incorporated | High data rate wireless packet data communications system |
US20050108340A1 (en) * | 2003-05-15 | 2005-05-19 | Matt Gleeson | Method and apparatus for filtering email spam based on similarity measures |
US6907039B2 (en) * | 2002-07-20 | 2005-06-14 | Redback Networks Inc. | Method and apparatus for routing and forwarding between virtual routers within a single network element |
US6922774B2 (en) * | 2001-05-14 | 2005-07-26 | The United States Of America As Represented By The National Security Agency | Device for and method of secure computing using virtual machines |
US6938097B1 (en) * | 1999-07-02 | 2005-08-30 | Sonicwall, Inc. | System for early packet steering and FIFO-based management with priority buffer support |
US6985438B1 (en) * | 1999-09-20 | 2006-01-10 | Christian Tschudin | Method and apparatus for processing and forwarding data packets |
US6985956B2 (en) * | 2000-11-02 | 2006-01-10 | Sun Microsystems, Inc. | Switching system |
US6990103B1 (en) * | 1999-07-13 | 2006-01-24 | Alcatel Canada Inc. | Method and apparatus for providing distributed communication routing |
US7020143B2 (en) * | 2001-06-18 | 2006-03-28 | Ericsson Inc. | System for and method of differentiated queuing in a routing system |
US20060087969A1 (en) * | 2001-05-04 | 2006-04-27 | Slt Logic Llc | System and method for hierarchical policing of flows and subflows of a data stream |
US7054311B2 (en) * | 2001-07-27 | 2006-05-30 | 4198638 Canada Inc. | Methods and apparatus for storage and processing of routing information |
US7082477B1 (en) * | 2002-04-30 | 2006-07-25 | Cisco Technology, Inc. | Virtual application of features to electronic messages |
US7089293B2 (en) * | 2000-11-02 | 2006-08-08 | Sun Microsystems, Inc. | Switching system method for discovering and accessing SCSI devices in response to query |
US7096495B1 (en) * | 2000-03-31 | 2006-08-22 | Intel Corporation | Network session management |
US7187676B2 (en) * | 2002-06-04 | 2007-03-06 | Sun Microsystems, Inc. | Apparatus and method for steering a communication to an open stream |
US7221945B2 (en) * | 2002-05-03 | 2007-05-22 | Leapstone Systems, Inc. | System and method for establishing and controlling access to network resources |
US7225259B2 (en) * | 2001-02-21 | 2007-05-29 | Nokia Inc. | Service tunnel over a connectionless network |
US20070192855A1 (en) * | 2006-01-18 | 2007-08-16 | Microsoft Corporation | Finding phishing sites |
US7316029B1 (en) * | 2001-10-25 | 2008-01-01 | Sprint Communications Company L.P. | Network security services architecture |
US7324889B2 (en) * | 2006-03-20 | 2008-01-29 | Nissan Motor Co., Ltd. | Intake-air quantity control system of engine |
US20090131020A1 (en) * | 2004-05-24 | 2009-05-21 | Van De Groenendaal Joannes G | Wireless manager and method for configuring and securing wireless access to a network |
US20100146627A1 (en) * | 2006-03-01 | 2010-06-10 | Fortinet, Inc. | Electronic message and data tracking system |
US20110128891A1 (en) * | 2000-09-13 | 2011-06-02 | Fortinet, Inc. | Managing and provisioning virtual routers |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7162738B2 (en) * | 1998-11-03 | 2007-01-09 | Tumbleweed Communications Corp. | E-mail firewall with stored key encryption/decryption |
US6654787B1 (en) * | 1998-12-31 | 2003-11-25 | Brightmail, Incorporated | Method and apparatus for filtering e-mail |
US7325249B2 (en) * | 2001-04-30 | 2008-01-29 | Aol Llc | Identifying unwanted electronic messages |
US20040019651A1 (en) * | 2002-07-29 | 2004-01-29 | Andaker Kristian L. M. | Categorizing electronic messages based on collaborative feedback |
US7831834B2 (en) * | 2005-03-14 | 2010-11-09 | Yahoo! Inc | Associating a postmark with a message to indicate trust |
-
2006
- 2006-03-01 US US11/366,673 patent/US7668920B2/en not_active Expired - Fee Related
- 2006-10-11 CN CNA2006101400350A patent/CN101030972A/en active Pending
-
2010
- 2010-02-22 US US12/710,342 patent/US7970848B2/en active Active
-
2011
- 2011-05-18 US US13/110,266 patent/US20110219086A1/en not_active Abandoned
Patent Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4667287A (en) * | 1982-10-28 | 1987-05-19 | Tandem Computers Incorporated | Multiprocessor multisystem communications network |
US5490252A (en) * | 1992-09-30 | 1996-02-06 | Bay Networks Group, Inc. | System having central processor for transmitting generic packets to another processor to be altered and transmitting altered packets back to central processor for routing |
US5745778A (en) * | 1994-01-26 | 1998-04-28 | Data General Corporation | Apparatus and method for improved CPU affinity in a multiprocessor system |
US5550816A (en) * | 1994-12-29 | 1996-08-27 | Storage Technology Corporation | Method and apparatus for virtual switching |
US6405262B1 (en) * | 1995-07-14 | 2002-06-11 | Microsoft Corporation | Efficient inter-process object and interface pinging |
US5633866A (en) * | 1995-11-17 | 1997-05-27 | Bay Networks, Inc. | Method and apparatus for routing packets in networks having connection-oriented subnetworks |
US6243580B1 (en) * | 1995-11-30 | 2001-06-05 | Amsc Subsidiary Corporation | Priority and preemption service system for satellite related communication using central controller |
US6118791A (en) * | 1995-12-20 | 2000-09-12 | Cisco Technology, Inc. | Adaptive bandwidth allocation method for non-reserved traffic in a high-speed data transmission network, and system for implementing said method |
US5892924A (en) * | 1996-01-31 | 1999-04-06 | Ipsilon Networks, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
US5920705A (en) * | 1996-01-31 | 1999-07-06 | Nokia Ip, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
US6014382A (en) * | 1996-04-04 | 2000-01-11 | Hitachi, Ltd. | ATM switching system including a switching control portion for distributing call set-up requirement signals |
US6085238A (en) * | 1996-04-23 | 2000-07-04 | Matsushita Electric Works, Ltd. | Virtual LAN system |
US6220768B1 (en) * | 1996-06-28 | 2001-04-24 | Sun Microsystems, Inc. | Network asset survey tool for gathering data about node equipment |
US6169793B1 (en) * | 1996-12-24 | 2001-01-02 | Evolving Systems, Inc. | Systems and methods for providing order and service mediation for telecommunications systems |
US6098110A (en) * | 1996-12-30 | 2000-08-01 | Compaq Computer Corporation | Network switch with a multiple bus structure and a bridge interface for transferring network data between different buses |
US6260073B1 (en) * | 1996-12-30 | 2001-07-10 | Compaq Computer Corporation | Network switch including a switch manager for periodically polling the network ports to determine their status and controlling the flow of data between ports |
US6169739B1 (en) * | 1997-01-08 | 2001-01-02 | Nec Corporation | ATM VLAN multi-protocol client-server system using layer-3 header of packets for transporting connectionless and connection-oriented traffic |
US6032193A (en) * | 1997-03-20 | 2000-02-29 | Niobrara Research And Development Corporation | Computer system having virtual circuit address altered by local computer to switch to different physical data link to increase data transmission bandwidth |
US5875290A (en) * | 1997-03-27 | 1999-02-23 | International Business Machines Corporation | Method and program product for synchronizing operator initiated commands with a failover process in a distributed processing system |
US6260072B1 (en) * | 1997-06-12 | 2001-07-10 | Lucent Technologies Inc | Method and apparatus for adaptive routing in packet networks |
US20050081059A1 (en) * | 1997-07-24 | 2005-04-14 | Bandini Jean-Christophe Denis | Method and system for e-mail filtering |
US20020199095A1 (en) * | 1997-07-24 | 2002-12-26 | Jean-Christophe Bandini | Method and system for filtering communication |
US6069895A (en) * | 1997-08-29 | 2000-05-30 | Nortel Networks Corporation | Distributed route server |
US6256295B1 (en) * | 1997-09-25 | 2001-07-03 | Nortel Networks Limited | Method and apparatus for determining multiple minimally-overlapping paths between nodes in a network |
US6894994B1 (en) * | 1997-11-03 | 2005-05-17 | Qualcomm Incorporated | High data rate wireless packet data communications system |
US6266695B1 (en) * | 1997-12-23 | 2001-07-24 | Alcatel Usa Sourcing, L.P. | Telecommunications switch management system |
US6526056B1 (en) * | 1997-12-23 | 2003-02-25 | Cisco Technology, Inc. | Virtual private network employing tag-implemented egress-channel selection |
US6295297B1 (en) * | 1997-12-29 | 2001-09-25 | Samsung Electronics Co., Ltd. | Gateway for connecting ATM-based access network to existing network |
US6047330A (en) * | 1998-01-20 | 2000-04-04 | Netscape Communications Corporation | Virtual router discovery system |
US6175867B1 (en) * | 1998-03-23 | 2001-01-16 | Mci World Com, Inc. | System and method for managing networks addressed via common network addresses |
US6278708B1 (en) * | 1998-04-10 | 2001-08-21 | Cisco Technology, Inc. | Frame relay access device with user-configurable virtual circuit bundling |
US6249519B1 (en) * | 1998-04-16 | 2001-06-19 | Mantra Communications | Flow based circuit steering in ATM networks |
US6434619B1 (en) * | 1998-04-29 | 2002-08-13 | Alcatel Canada Inc. | Internet-enabled service management system and method |
US6611522B1 (en) * | 1998-06-19 | 2003-08-26 | Juniper Networks, Inc. | Quality of service facility in a device for performing IP forwarding and ATM switching |
US6680922B1 (en) * | 1998-07-10 | 2004-01-20 | Malibu Networks, Inc. | Method for the recognition and operation of virtual private networks (VPNs) over a wireless point to multi-point (PtMP) transmission system |
US6226788B1 (en) * | 1998-07-22 | 2001-05-01 | Cisco Technology, Inc. | Extensible network management system |
US6286038B1 (en) * | 1998-08-03 | 2001-09-04 | Nortel Networks Limited | Method and apparatus for remotely configuring a network device |
US6697360B1 (en) * | 1998-09-02 | 2004-02-24 | Cisco Technology, Inc. | Method and apparatus for auto-configuring layer three intermediate computer network devices |
US20020062344A1 (en) * | 1998-09-11 | 2002-05-23 | Tatu Ylonen | Method and arrangement for secure tunneling of data between virtual routers |
US6338092B1 (en) * | 1998-09-24 | 2002-01-08 | International Business Machines Corporation | Method, system and computer program for replicating data in a distributed computed environment |
US6608816B1 (en) * | 1998-11-18 | 2003-08-19 | Nortel Networks Limited | Method and apparatus for providing differentiated services using a multi-level queuing mechanism |
US6738821B1 (en) * | 1999-01-26 | 2004-05-18 | Adaptec, Inc. | Ethernet storage protocol networks |
US6449650B1 (en) * | 1999-02-01 | 2002-09-10 | Redback Networks Inc. | Methods and apparatus for deploying quality of service policies on a data communication network |
US6192051B1 (en) * | 1999-02-26 | 2001-02-20 | Redstone Communications, Inc. | Network router search engine using compressed tree forwarding table |
US20030033401A1 (en) * | 1999-04-02 | 2003-02-13 | Matthew W. Poisson | Monitoring a virtual private network |
US6542466B1 (en) * | 1999-05-20 | 2003-04-01 | Motorola, Inc. | Communication network method and apparatus |
US6553423B1 (en) * | 1999-05-27 | 2003-04-22 | Cisco Technology, Inc. | Method and apparatus for dynamic exchange of capabilities between adjacent/neighboring networks nodes |
US6778502B2 (en) * | 1999-06-18 | 2004-08-17 | Savvis, Inc. | On-demand overlay routing for computer-based communication networks |
US6694437B1 (en) * | 1999-06-22 | 2004-02-17 | Institute For Information Technology | System and method for on-demand access concentrator for virtual private networks |
US20040141521A1 (en) * | 1999-07-02 | 2004-07-22 | Ancor Communications, Inc. | High performance switch fabric element and switch systems |
US6697359B1 (en) * | 1999-07-02 | 2004-02-24 | Ancor Communications, Inc. | High performance switch fabric element and switch systems |
US6938097B1 (en) * | 1999-07-02 | 2005-08-30 | Sonicwall, Inc. | System for early packet steering and FIFO-based management with priority buffer support |
US6990103B1 (en) * | 1999-07-13 | 2006-01-24 | Alcatel Canada Inc. | Method and apparatus for providing distributed communication routing |
US6868082B1 (en) * | 1999-08-30 | 2005-03-15 | International Business Machines Corporation | Network processor interface for building scalable switching systems |
US6532088B1 (en) * | 1999-09-10 | 2003-03-11 | Alcatel | System and method for packet level distributed routing in fiber optic rings |
US6985438B1 (en) * | 1999-09-20 | 2006-01-10 | Christian Tschudin | Method and apparatus for processing and forwarding data packets |
US6738371B1 (en) * | 1999-09-28 | 2004-05-18 | Ericsson Inc. | Ingress data queue management in a packet data router |
US6556544B1 (en) * | 1999-10-22 | 2003-04-29 | Nortel Networks Limited | Method and system for provisioning network resources for dynamic multicast groups |
US6775267B1 (en) * | 1999-12-30 | 2004-08-10 | At&T Corp | Method for billing IP broadband subscribers |
US6775284B1 (en) * | 2000-01-07 | 2004-08-10 | International Business Machines Corporation | Method and system for frame and protocol classification |
US6785224B2 (en) * | 2000-03-06 | 2004-08-31 | Fujitsu Limited | Ring configuring method and node apparatus used in the ring |
US7096495B1 (en) * | 2000-03-31 | 2006-08-22 | Intel Corporation | Network session management |
US6414595B1 (en) * | 2000-06-16 | 2002-07-02 | Ciena Corporation | Method and system for processing alarm objects in a communications network |
US6763236B2 (en) * | 2000-06-30 | 2004-07-13 | Nokia Mobile Phones, Ltd. | Resource allocating and service providing over a wireless network |
US6883170B1 (en) * | 2000-08-30 | 2005-04-19 | Aspect Communication Corporation | Method and system to maintain a hierarchy of instantiated application objects and to enable recovery from an applications failure |
US20110128891A1 (en) * | 2000-09-13 | 2011-06-02 | Fortinet, Inc. | Managing and provisioning virtual routers |
US20020066034A1 (en) * | 2000-10-24 | 2002-05-30 | Schlossberg Barry J. | Distributed network security deception system |
US7089293B2 (en) * | 2000-11-02 | 2006-08-08 | Sun Microsystems, Inc. | Switching system method for discovering and accessing SCSI devices in response to query |
US6985956B2 (en) * | 2000-11-02 | 2006-01-10 | Sun Microsystems, Inc. | Switching system |
US20040037379A1 (en) * | 2000-12-07 | 2004-02-26 | Nadim Khlat | Multi-mode radio communications device using a common reference oscillator |
US20020071389A1 (en) * | 2000-12-09 | 2002-06-13 | Hyun-Chul Seo | Data structure for implementation of traffic engineering function in multiprotocol label switching system and storage medium for storing the same |
US20020075901A1 (en) * | 2000-12-19 | 2002-06-20 | Bruce Perlmutter | Bandwidth management for tunneling servers |
US20020097872A1 (en) * | 2001-01-24 | 2002-07-25 | Maliszewski Richard L. | Method of providing secure content-based user experience enhancement within a content protection architecture |
US20020099849A1 (en) * | 2001-01-25 | 2002-07-25 | Crescent Networks, Inc. | Dense virtual router packet switching |
US7225259B2 (en) * | 2001-02-21 | 2007-05-29 | Nokia Inc. | Service tunnel over a connectionless network |
US20060087969A1 (en) * | 2001-05-04 | 2006-04-27 | Slt Logic Llc | System and method for hierarchical policing of flows and subflows of a data stream |
US7042848B2 (en) * | 2001-05-04 | 2006-05-09 | Slt Logic Llc | System and method for hierarchical policing of flows and subflows of a data stream |
US6922774B2 (en) * | 2001-05-14 | 2005-07-26 | The United States Of America As Represented By The National Security Agency | Device for and method of secure computing using virtual machines |
US7020143B2 (en) * | 2001-06-18 | 2006-03-28 | Ericsson Inc. | System for and method of differentiated queuing in a routing system |
US7054311B2 (en) * | 2001-07-27 | 2006-05-30 | 4198638 Canada Inc. | Methods and apparatus for storage and processing of routing information |
US7316029B1 (en) * | 2001-10-25 | 2008-01-01 | Sprint Communications Company L.P. | Network security services architecture |
US20030108041A1 (en) * | 2001-12-07 | 2003-06-12 | Nortell Networks Limited | Tunneling scheme optimized for use in virtual private netwoks |
US20030115308A1 (en) * | 2001-12-19 | 2003-06-19 | Michael Best | Network management system architecture |
US20030117954A1 (en) * | 2001-12-20 | 2003-06-26 | Alcatel | Telecommunications system employing virtual service network architecture |
US20030131228A1 (en) * | 2002-01-10 | 2003-07-10 | Twomey John E. | System on a chip for network storage devices |
US7082477B1 (en) * | 2002-04-30 | 2006-07-25 | Cisco Technology, Inc. | Virtual application of features to electronic messages |
US7221945B2 (en) * | 2002-05-03 | 2007-05-22 | Leapstone Systems, Inc. | System and method for establishing and controlling access to network resources |
US7187676B2 (en) * | 2002-06-04 | 2007-03-06 | Sun Microsystems, Inc. | Apparatus and method for steering a communication to an open stream |
US6907039B2 (en) * | 2002-07-20 | 2005-06-14 | Redback Networks Inc. | Method and apparatus for routing and forwarding between virtual routers within a single network element |
US20040042416A1 (en) * | 2002-08-27 | 2004-03-04 | Ngo Chuong Ngoc | Virtual Local Area Network auto-discovery methods |
US20040095932A1 (en) * | 2002-11-18 | 2004-05-20 | Toshiba America Information Systems, Inc. | Method for SIP - mobility and mobile - IP coexistence |
US20040095934A1 (en) * | 2002-11-18 | 2004-05-20 | Cosine Communications, Inc. | System and method for hardware accelerated packet multicast in a virtual routing system |
US20050108340A1 (en) * | 2003-05-15 | 2005-05-19 | Matt Gleeson | Method and apparatus for filtering email spam based on similarity measures |
US20050002417A1 (en) * | 2003-07-02 | 2005-01-06 | Kelly Thomas J. | Systems and methods for performing protocol conversions in a work machine |
US20090131020A1 (en) * | 2004-05-24 | 2009-05-21 | Van De Groenendaal Joannes G | Wireless manager and method for configuring and securing wireless access to a network |
US20070192855A1 (en) * | 2006-01-18 | 2007-08-16 | Microsoft Corporation | Finding phishing sites |
US20100146627A1 (en) * | 2006-03-01 | 2010-06-10 | Fortinet, Inc. | Electronic message and data tracking system |
US7970848B2 (en) * | 2006-03-01 | 2011-06-28 | Fortinet, Inc. | Electronic message and data tracking system |
US7324889B2 (en) * | 2006-03-20 | 2008-01-29 | Nissan Motor Co., Ltd. | Intake-air quantity control system of engine |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462062A (en) * | 2014-12-11 | 2015-03-25 | 珠海金山网络游戏科技有限公司 | Text anti-spam method |
Also Published As
Publication number | Publication date |
---|---|
CN101030972A (en) | 2007-09-05 |
US7668920B2 (en) | 2010-02-23 |
US7970848B2 (en) | 2011-06-28 |
US20100146627A1 (en) | 2010-06-10 |
US20070208850A1 (en) | 2007-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7970848B2 (en) | Electronic message and data tracking system | |
US7748038B2 (en) | Method and apparatus for managing computer virus outbreaks | |
US7854007B2 (en) | Identifying threats in electronic messages | |
US7801960B2 (en) | Monitoring electronic mail message digests | |
US8194564B2 (en) | Message filtering method | |
US9648038B2 (en) | Propagation of viruses through an information technology network | |
EP2446411B1 (en) | Real-time spam look-up system | |
US8572190B2 (en) | Method and system for recognizing desired email | |
US20030220978A1 (en) | System and method for message sender validation | |
EP1635524A1 (en) | A method and system for identifying and blocking spam email messages at an inspecting point | |
US8195753B2 (en) | Honoring user preferences in email systems | |
US20070143432A1 (en) | System for processing electronic mail messages with specially encoded addresses | |
US8046624B2 (en) | Propagation of viruses through an information technology network | |
KR20080067352A (en) | Voicemail and fax filtering | |
US20080177843A1 (en) | Inferring email action based on user input | |
KR100927240B1 (en) | A malicious code detection method using virtual environment | |
US20060075099A1 (en) | Automatic elimination of viruses and spam | |
US8260861B1 (en) | System and method for an electronic mail attachment proxy | |
US7437758B2 (en) | Propagation of viruses through an information technology network | |
US7257773B1 (en) | Method and system for identifying unsolicited mail utilizing checksums |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |