Method For Blocking Unwanted E-Mail Based On Proximity Detection
First Claim
1. A method to block unwanted electronic communication based on proximity detection, said method comprising the steps of:
- a. receiving an initial dialogue regarding an incoming electronic communication from a sending host to a recipient over a network;
b. verifying if said sending host'"'"'s IP address is within at least one predefined proximity value of any one of, or a combination of, the following hosts associated with said sending host;
an MX host, a VWW host, or a DNS server; and
c. blocking said incoming electronic communication if said verification is unsuccessful, else, receiving said incoming e-mail and forwarding said received e-mail to said recipient.
1 Assignment
0 Petitions
Accused Products
Abstract
The abstract must be less than 150 words, or 200 words when no figure is to be published. Proximity detection algorithms are used to determine whether or not the render of the message is authentic, by verifying if the sending host (242) is within proximity of registered MX Hosts 182, WWW Hosts, and/or DNS servers forth alleged sending domain. Proximity detection, combined with Select Reverse DNS lookups (153), provides extremely effective and accurate e-mail source verification system (110,107). As this combination relies solely on the existing Internet Domain Name System for its identifying matrix, an affective anti-SPAM system/method is realized without making any changes to any installed e-mail systems. In addition to proximit detection, Automatic Open Relay Test Administration (AORTA) (124,132) is used to perform Open Relay (118) testing on all servers attempting to send a message.
49 Citations
25 Claims
-
1. A method to block unwanted electronic communication based on proximity detection, said method comprising the steps of:
-
a. receiving an initial dialogue regarding an incoming electronic communication from a sending host to a recipient over a network;
b. verifying if said sending host'"'"'s IP address is within at least one predefined proximity value of any one of, or a combination of, the following hosts associated with said sending host;
an MX host, a VWW host, or a DNS server; and
c. blocking said incoming electronic communication if said verification is unsuccessful, else, receiving said incoming e-mail and forwarding said received e-mail to said recipient. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method to block unwanted e-mail based on proximity detection, said method comprising the steps of:
-
a. receiving an initial dialogue regarding an incoming e-mail from a mail server over a network, said incoming e-mail sent by a sending host intended for a recipient;
b. performing an open relay test on said mail server to identify if said mail server is an open relay server;
c. verifying if said sending host'"'"'s IP address is within at least one predefined proximity value of any one of, or a combination of, the following hosts associated with said sending host;
an MX host, a WWW host, or a DNS server; and
d. blocking said incoming e-mail if said verification in (c) is unsuccessful and/or said mail server is an open relay server, else, receiving said incoming e-mail and forwarding said received e-mail to said recipient. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method to block unwanted e-mail based on proximity detection, said method comprising the steps of:
-
a. receiving an initial dialogue regarding an incoming e-mail from a sender intended for a recipient;
b. identifying a domain association with said sender'"'"'s IP address by performing a selective reverse DNS (SRD) lookup on said sender'"'"'s IP address, said SRD performed exclusively on domains that are predetermined to have proper PTR records;
c. verifying if said sending host'"'"'s IP address is within at least one predefined proximity value of any one of, or a combination of, the following hosts associated with said sending host;
an MX host, a WWW host, or a DNS server; and
d. blocking said incoming e-mail if said verification in (c) is unsuccessful and/or said identified domain in (b) fails to match domain associated with said sender'"'"'s e-mail address, else, receiving said incoming e-mail and forwarding said received e-mail to said recipient. - View Dependent Claims (13, 14, 15)
-
-
16. A plurality of anti-spam devices geographically distributed over at least one network, each of said devices blocking unwanted e-mail based on proximity detection algorithms, each device comprising:
-
a. a network interface to receive, over a network, an initial dialogue regarding an incoming e-mail from a sending host to a recipient;
b. a proximity detection module to extract sending host'"'"'s IP address and verify if said sending host'"'"'s IP address is within at least one predefined proximity value of any one of, or a combination of, the following hosts associated with said sending host;
an MX host, a WWW, host, or a DNS server; and
c. said network interface blocking said incoming e-mail if said verification is unsuccessful, else, said network interface receiving said incoming e-mail and forwarding said received e-mail to said recipient. - View Dependent Claims (17, 18, 19, 20)
-
-
21. An article of manufacture comprising a computer user medium having computer readable program code embodied therein which implements a method to block unwanted electronic communication based on proximity detection, said medium comprising:
-
a. computer readable program code aiding in receiving an initial dialogue regarding an incoming electronic communication from a sending host to a recipient;
b. computer readable program code verifying if said sending host'"'"'s IP address is within proximity of any one of, or a combination of, the following hosts associated with said sending host;
an MX host, a WWW host, or a DNS server; and
c. computer readable program code blocking said incoming electronic communication if said verification is unsuccessful, else, receiving said incoming e-mail and forwarding said received e-mail to said recipient.
-
-
22. A plurality of anti-spam devices geographically distributed over at least one network, each of said devices blocking unwanted e-mail based on proximity detection algorithms, each device comprising:
-
a. a network interface aiding in receiving an initial dialogue regarding an incoming e-mail from a mail server over a network, said incoming e-mail sent by a sending host intended for a recipient;
b. an open relay tester performing an open relay test on said mail server to identify if said mail server is an open relay server;
c. a proximity detection module verifying if said sending host'"'"'s IP address is within 10,752 IP addresses of any one of, or a combination of, the following hosts associated with said sending host;
an MX host, a WWW host, or a DNS server; and
d. a blocking module blocking said incoming e-mail if said verification in said proximity detection module is unsuccessful and/or said open relay tester verifies that said mail server is an open relay server, else, said network interface receiving said incoming e-mail and forwarding said received e-mail to said recipient. - View Dependent Claims (23)
-
-
24. A plurality of anti-spam devices geographically distributed over at least one network, each of said devices blocking unwanted e-mail based on proximity detection algorithms, each device comprising:
-
a. a network interface aiding in receiving an initial dialogue regarding an incoming e-mail from a sender intended for a recipient;
b. an selective reverse DNS unit identifying a domain association with said sender'"'"'s IP address by performing a selective reverse DNS (SRD) lookup on said sender'"'"'s IP address, said SRD performed exclusively on domains that are predetermined to have proper PTR records;
c. a proximity detection module verifying if said sending host'"'"'s IP address is within 10,752 IP addresses of any one of, or a combination of, the following hosts associated with said sending host;
an Mx host, a WWW host, or a DNS server; and
d. a blocking module blocking said incoming e-mail if said proximity detection module unsuccessfully verifies and/or said domain identified by said SRD unit fails to match domain associated with said sender'"'"'s e-mail address, else, said network interface receiving said incoming e-mail and forwarding said received e-mail to said recipient. - View Dependent Claims (25)
-
Specification