Email address farming mitigation
First Claim
Patent Images
1. A computing apparatus comprising:
- one or more computer readable storage media;
a processing system operatively coupled with the one or more computer readable storage media; and
program instructions stored on the one or more computer readable storage media, that when executed by the processing system, direct the processing system to at least;
receive requests for endpoint information that correspond to email identities included in the requests;
for ones of the requests that indicate invalid email identities, determine responses that conceal validity of the invalid email identities by deriving target endpoint information based at least on the invalid email identities; and
provide the responses that indicate the target endpoint information.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, apparatuses, and software for electronic mail systems and service in computing environments are provided herein. In one example, an email service is provided that receives receive requests for endpoint information that correspond to email identities included in the requests. For ones of the requests that indicate invalid email identities, the email service determines responses that conceal validity of the invalid email identities by deriving target endpoint information based at least on the invalid email identities, and provides the responses that indicate the target endpoint information.
18 Citations
20 Claims
-
1. A computing apparatus comprising:
-
one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media, that when executed by the processing system, direct the processing system to at least; receive requests for endpoint information that correspond to email identities included in the requests; for ones of the requests that indicate invalid email identities, determine responses that conceal validity of the invalid email identities by deriving target endpoint information based at least on the invalid email identities; and provide the responses that indicate the target endpoint information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of operating an email service, the method comprising:
-
receiving requests for endpoint information that correspond to email identities included in the requests; for ones of the requests that indicate invalid email identities, determining responses that conceal validity of the invalid email identities by deriving target endpoint information based at least on the invalid email identities; and providing the responses that indicate the target endpoint information. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computing apparatus comprising:
-
one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media, that when executed by the processing system, direct the processing system to at least; receive requests for mailbox endpoint identities corresponding to invalid email addresses; and provide obfuscated responses that conceal validity of the invalid email addresses by returning identities of mailbox endpoints derived based at least on the invalid email addresses, wherein the identities of mailbox endpoints relate to target endpoints capable of handling authentication attempts for ones of the invalid email addresses. - View Dependent Claims (18, 19, 20)
-
Specification