System and method for managing e-mail message traffic
First Claim
1. A method for detecting the transmission of spam e-mail over a shared access network, the shared access network comprising one or more IP address records and one or more devices connected to the shared access network from which e-mail messages originate, wherein each of the one or more IP address records is uniquely associated with an IP address of one of the one or more devices, the method comprising:
- receiving a proffered outbound e-mail message;
obtaining the IP address of an originating device connected to the shared access network from which the proffered outbound e-mail message originated (the “
originating IP address”
);
determining if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records, calculating a message transmission rate for the originating IP address of the proffered outbound e-mail message and comparing the message transmission rate to a threshold message transmission rate; and
if the message transmission rate exceeds a threshold message transmission rate, identifying the proffered outbound e-mail message as a spam e-mail transmission.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method for managing e-mail traffic originating from a specific IP address. An outbound e-mail message is routed to an e-mail governor where the IP address of the computer from which outbound e-mail message originated is determined. A record associated with the originating IP address is created in a datatstore. Metrics useful to determine an e-mail message rate and an e-mail byte rate are stored in the e-mail record. An e-mail message rate is determined and compared with an e-mail message rate threshold. If the e-mail message rate threshold is exceeded, the originating IP address is sending spam e-mail (spam) and redial action is taken. An e-mail byte rate is also determined and compared with an e-mail byte rate threshold. If the e-mail byte rate threshold is exceeded, the originating IP address is using excess network resources to send e-mail and redial action is taken
105 Citations
59 Claims
-
1. A method for detecting the transmission of spam e-mail over a shared access network, the shared access network comprising one or more IP address records and one or more devices connected to the shared access network from which e-mail messages originate, wherein each of the one or more IP address records is uniquely associated with an IP address of one of the one or more devices, the method comprising:
-
receiving a proffered outbound e-mail message;
obtaining the IP address of an originating device connected to the shared access network from which the proffered outbound e-mail message originated (the “
originating IP address”
);
determining if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records, calculating a message transmission rate for the originating IP address of the proffered outbound e-mail message and comparing the message transmission rate to a threshold message transmission rate; and
if the message transmission rate exceeds a threshold message transmission rate, identifying the proffered outbound e-mail message as a spam e-mail transmission. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for detecting the consumption of excess network resources to send e-mail over a shared access network, the shared access network comprising one or more IP address records and one or more devices connected to the shared access network from which e-mail messages originate, wherein each of the one or more IP address records is uniquely associated with an IP address of one of the one or more devices, the method comprising:
-
receiving a proffered outbound e-mail message;
obtaining the IP address of an originating device connected to the shared access network from which the proffered outbound e-mail message originated (the “
originating IP address”
);
determining if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
if the originating IP address matches one of the one or more IP addresses associated with one of the one or more IP address records, calculating a message size rate for the originating IP address of the proffered outbound e-mail and comparing the message size rate to a threshold message size rate; and
if the message byte rate exceeds a threshold message byte rate, identifying the originating IP address of the proffered outbound e-mail as an excess resource consumer. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for managing e-mail traffic over a shared access network, the method comprising:
-
receiving a proffered outbound e-mail message;
obtaining the IP address of an originating device connected to the shared access network from which the proffered outbound e-mail message originated (the “
originating IP address”
);
if the originating IP address does not match a device IP address in an IP address record, creating an IP address record associated with the IP address of the originating device. - View Dependent Claims (28, 29, 30, 31)
-
-
32. A system for the identifying the transmission of spam e-mail over a shared access network, the system comprising:
-
a network interface adapted to receive an IP message;
a router adapted to;
receive the IP message from the network interface;
identify a proffered outbound e-mail message; and
direct the proffered outbound e-mail message to an e-mail governor; and
one or more devices connected to the shared access network from which e-mail messages originate;
one or more IP address records wherein each of the one or more IP address records is uniquely associated with an IP address of one of the one or more devices, and wherein the IP address record comprises;
a time when the IP address record was created; and
a message count; and
an e-mail governor adapted to;
receive the proffered outbound e-mail message;
obtain the IP address of an originating device connected to the shared access network from which the proffered outbound e-mail message originated (the “
originating IP address”
);
determine if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
if the originating IP address does not match any of the one or more device IP addresses associated with one of the one or more IP address records;
create an IP record associated with the IP address of the originating device;
store the time the IP address record was created in the IP address record; and
set the message count in the IP address record to 1;
if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
timestamp the proffered outbound e-mail message;
increment the message count by one;
calculate a message transmission rate by dividing the message count by the difference between the proffered outbound e-mail timestamp and the time the IP record was created;
compare the message transmission rate to a threshold message transmission rate; and
if the message transmission rate exceeds a threshold message transmission rate, identify the proffered message as a spam e-mail transmission. - View Dependent Claims (33, 34, 35, 36, 37, 38, 45)
-
-
39. A system for the identifying the transmission of spam e-mail over a shared access network, the system comprising:
-
a network interface adapted to receive an IP message;
a router adapted to;
receive the IP message from the network interface;
identify a proffered outbound e-mail message; and
direct the proffered outbound e-mail message to an e-mail governor; and
one or more devices connected to the shared access network from which e-mail messages originate;
one or more IP address records wherein each of the one or more IP address records is uniquely associated with an IP address of one of the one or more devices, and wherein the IP address record comprises;
a time interval; and
a message count; and
an e-mail governor adapted to;
measure time interval;
receive the proffered outbound e-mail message;
obtain the IP address of an originating device connected to the shared access network from which the proffered outbound e-mail message originated (the “
originating IP address”
);
determine if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
if the originating IP address does not match any of the one or more device IP addresses associated with one of the one or more IP address records;
create an IP record associated with the IP address of the originating device;
set the message count in the IP address record to 1;
if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
increment the message count by one, determine if the lapsed time equals or exceeds the time interval;
if the elapsed time is equal to or greater than the time interval, setting the message transmission rate equal to the message count and setting the elapsed time and the message count to zero;
compare the message transmission rate to a threshold message transmission rate; and
if the message transmission rate exceeds a threshold message transmission rate, identify the proffered outbound e-mail message as a spam e-mail transmission. - View Dependent Claims (40, 41, 42, 43, 44)
-
-
46. A system for detecting the consumption of excess network resources to send e-mail over a shared access network, the system comprising:
-
a network interface adapted to receive an IP message;
a router adapted to;
receive the IP message from the network interface;
identify an outbound e-mail message; and
direct the outbound e-mail message to an e-mail governor; and
one or more devices connected to the shared access network from which e-mail messages originate;
one or more IP address records wherein each of the one or more IP address records is uniquely associated with an IP address of one of the one or more devices, and wherein the IP address record comprises;
a time when the IP address record was created; and
a cumulative message size; and
an e-mail governor adapted to;
receive the proffered outbound e-mail message;
obtain the IP address of an originating device connected to the shared access network from which the proffered outbound e-mail message originated (the “
originating IP address”
);
determine if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
if the originating IP address does not match any of the one or more device IP addresses associated with one of the one or more IP address records;
create an IP record associated with the IP address of the originating device;
store the time the IP address record was created in the IP address record; and
set the cumulative message size in the IP address record to the size of the proffered outbound e-mail message;
if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
timestamp the proffered outbound e-mail message, add the size of the proffered outbound e-mail message to the cumulative message size;
calculate a message size rate by dividing the cumulative message size by the difference between the proffered outbound e-mail timestamp and the time the IP address record was created;
compare the message size rate to a threshold message size rate; and
if the message size rate exceeds a threshold message size rate, identify the originating IP address of the proffered outbound e-mail as an excess resource consumer. - View Dependent Claims (47, 48, 49, 50, 51, 52)
-
-
53. A system for detecting the consumption of excess network resources to send e-mail over a shared access network, the system comprising:
-
a network interface adapted to receive an IP message;
a router adapted to;
receive the IP message from the network interface;
identify a proffered outbound e-mail message; and
direct the proffered outbound e-mail message to an e-mail governor; and
one or more devices connected to the shared access network from which e-mail messages originate;
one or more IP address records wherein each of the one or more IP address records is uniquely associated with an IP address of one of the one or more devices, and wherein the IP address record comprises;
a time interval; and
a cumulative message size; and
an e-mail governor adapted to;
measure the time interval;
receive the proffered outbound e-mail message;
obtain the IP address of an originating device connected to the shared access network from which the proffered outbound e-mail message originated (the “
originating IP address”
);
determine if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
if the originating IP address does not match any of the one or more device IP addresses associated with one of the one or more IP address records;
create an IP record associated with the IP address of the originating device; and
set the cumulative message size in the IP address record to the size of the proffered outbound e-mail message;
if the originating IP address matches one of the one or more device IP addresses associated with one of the one or more IP address records;
determine if the lapsed time equals or exceeds the time interval;
if the elapsed time is equal to or greater than the time interval, set the message size rate equal to the cumulative message size and set the elapsed time and the cumulative message size to zero;
compare the message size rate to a threshold message size rate; and
if the message size rate exceeds a threshold message transmission rate, identify the proffered outbound e-mail message as a spam e-mail transmission. - View Dependent Claims (54, 55, 56, 57, 58, 59)
-
Specification