PERIMETER MESSAGE FILTERING WITH EXTRACTED USER-SPECIFIC PREFERENCES
First Claim
1. A method for utilizing recipient-specific messaging preferences of messaging recipients residing in a trusted network to bypass content filtering of preferred incoming messages corresponding to each of the recipients as they are received in a perimeter network outside the trusted network, said method comprising:
- extracting messaging preferences from a data store residing in the trusted network;
populating the extracted messaging preferences on a distributed directory service administered within the trusted network;
propagating the messaging preferences to a stand-alone directory service administered within the perimeter network;
providing the messaging preferences information to a content filter residing in the perimeter network; and
excluding preferred messages identified by the messaging preferences from content scanning by the content filter.
2 Assignments
0 Petitions
Accused Products
Abstract
Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.
-
Citations
20 Claims
-
1. A method for utilizing recipient-specific messaging preferences of messaging recipients residing in a trusted network to bypass content filtering of preferred incoming messages corresponding to each of the recipients as they are received in a perimeter network outside the trusted network, said method comprising:
-
extracting messaging preferences from a data store residing in the trusted network; populating the extracted messaging preferences on a distributed directory service administered within the trusted network; propagating the messaging preferences to a stand-alone directory service administered within the perimeter network; providing the messaging preferences information to a content filter residing in the perimeter network; and excluding preferred messages identified by the messaging preferences from content scanning by the content filter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for securely transferring user information from a trusted network for use in controlling an application outside the trusted network, said method comprising:
-
extracting information from users residing in the trusted network; hashing the information extracted from the users; populating the hashed information on a distributed directory service administered within the trusted network; and propagating the hashed information outside the trusted network for use in controlling an application outside the trusted network. - View Dependent Claims (18)
-
-
19. A method for routing messages received by a server outside a trusted network, said received messages being addressed for delivery within the trusted network, said method comprising:
-
receiving messages addressed for delivery to recipients within the trusted network; hashing at least a portion of each recipient address; comparing the hash with an index of hash domains; and routing said messages according to their hashed values. - View Dependent Claims (20)
-
Specification