Classifying e-mail connections for policy enforcement
First Claim
1. A method for classifying electronic mail message transfer requests for policy enforcement comprising the steps of:
- establishing a set of different message transfer policies, each policy having an association with a different classification of a source of an incoming electronic message;
identifying a source of an incoming electronic message included as part of a message transfer request;
classifying said source as one of a trusted source on condition that the source is located in a table of trusted sources, a suspect source where the source has an IP address that appears in a realtime black hole list on condition that the source is located in a table of suspect sources, a blocked source on condition that the source is present in a table of blocked sources, or an anonymous source on condition that the source is not present in any of the tables;
subsequently selecting a message transfer policy from amongst the set based upon the classification, the policy permitting full satisfaction of the request for a source classified as a trusted source, the policy prohibiting satisfaction of the request for a source classified as blocked and the policy permitting only limited satisfaction of the request for a source classified either as a suspect source or an anonymous source; and
,applying the selected message transfer policy to said incoming electronic message so as to curb transmission of spam without undermining an effectiveness of electronic mail communications.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for the policy-based restriction of electronic mail transmissions. A method for classifying electronic mail message transfer requests for policy enforcement can include identifying a source of an incoming electronic message, classifying the source, and applying a message transfer policy associated with the classification for the source. In particular, the identifying step can include identifying a network address for the source. The classifying step by comparison, can include classifying the source as one of a trusted source, a blocked source, and a suspect source. The classifying step also can include classifying the source as one of an authenticated source and an anonymous source. Finally, the classifying step further can include classifying the source as a blocked source where the source appears in a realtime black hole list.
19 Citations
11 Claims
-
1. A method for classifying electronic mail message transfer requests for policy enforcement comprising the steps of:
-
establishing a set of different message transfer policies, each policy having an association with a different classification of a source of an incoming electronic message; identifying a source of an incoming electronic message included as part of a message transfer request; classifying said source as one of a trusted source on condition that the source is located in a table of trusted sources, a suspect source where the source has an IP address that appears in a realtime black hole list on condition that the source is located in a table of suspect sources, a blocked source on condition that the source is present in a table of blocked sources, or an anonymous source on condition that the source is not present in any of the tables; subsequently selecting a message transfer policy from amongst the set based upon the classification, the policy permitting full satisfaction of the request for a source classified as a trusted source, the policy prohibiting satisfaction of the request for a source classified as blocked and the policy permitting only limited satisfaction of the request for a source classified either as a suspect source or an anonymous source; and
,applying the selected message transfer policy to said incoming electronic message so as to curb transmission of spam without undermining an effectiveness of electronic mail communications. - View Dependent Claims (2, 3, 4, 5, 9, 10, 11)
-
-
6. A system for classifying electronic mail message transfer requests for policy enforcement comprising:
-
a mail server; a memory comprising a set of mail transfer policies, each policy having an association with a corresponding source classification; at least one table of source identities having a particular classification; and
,a classifier coupled to said mail server, said memory and said at least one table, the classifier identifying a source of an incoming electronic message included as part of a message transfer request in the mail server, classifying said source as one of a trusted source on condition that the source is located in a table of trusted sources, a suspect source where the source has an IP address that appears in a realtime black hole list on condition that the source is located in a table of suspect sources, a blocked source on condition that the source is present in a table of blocked sources, or an anonymous source on condition that the source is not present in any of the tables, subsequently selecting in the memory one of the mail transfer policies based upon the classification, the policies permitting full satisfaction of the request for a source classified as a trusted source, the policy prohibiting satisfaction of the request for a source classified as blocked and the policy permitting only limited satisfaction of the request for a source classified either as a suspect source or an anonymous source, and applying the selected one of the mail transfer policies to said incoming electronic message so as to curb transmission of spam without undermining an effectiveness of electronic mail communications.
-
-
7. A machine readable storage comprising a memory device having stored thereon a computer program for classifying electronic mail message transfer requests for policy enforcement, the computer program comprising a routine set of instructions which when executed by a machine cause the machine to perform the steps of:
-
establishing a set of different message transfer policies, each policy having an association with a different classification of a source of an incoming electronic message; identifying a source of an incoming electronic message included as part of a message transfer request; classifying said source as one of a trusted source on condition that the source is located in a table of trusted sources, a suspect source where the source has an IP address that appears in a realtime black hole list on condition that the source is located in a table of suspect sources, a blocked source on condition that the source is present in a table of blocked sources, or an anonymous source on condition that the source is not present in any of the tables; subsequently selecting a message transfer policy from amongst the set based upon the classification, the policy permitting full satisfaction of the request for a source classified as a trusted source, the policy prohibiting satisfaction of the request for a source classified as blocked and the policy permitting only limited satisfaction of the request for a source classified either as a suspect source or an anonymous source; and
,applying the selected message transfer policy to said incoming electronic message so as to curb transmission of spam without undermining an effectiveness of electronic mail communications. - View Dependent Claims (8)
-
Specification