REAL-TIME SPAM LOOK-UP SYSTEM
First Claim
Patent Images
1. A method of managing unsolicited email sent to an email system over a, the system including a plurality of inbound mail servers, comprising:
- (a) receiving an email message at an inbound mail transfer agent;
(b) determining whether the email message is suspected to be an unsolicited suspect message;
(c) initiating a query for additional information on one or more characteristics of the message, the query returning information on the characteristic based on the network;
(d) receiving a response to at lease one of the searches on the physical characteristic;
(e) determining whether the message is unsolicited bulk email based on the result of the at least one search;
(f) acting on the message as based on the determining step.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method of managing unsolicited email sent to an email system over a network. Email messages are received at an message at an inbound mail transfer agent. A determination is made as to whether the email message is suspected to be an unsolicited suspect message. One or more queries for additional information on one or more characteristics of the message is initiated. Determinations are made based on replies to the queries before issuing a message accepted for delivery indication to a sending server.
-
Citations
20 Claims
-
1. A method of managing unsolicited email sent to an email system over a, the system including a plurality of inbound mail servers, comprising:
-
(a) receiving an email message at an inbound mail transfer agent; (b) determining whether the email message is suspected to be an unsolicited suspect message; (c) initiating a query for additional information on one or more characteristics of the message, the query returning information on the characteristic based on the network; (d) receiving a response to at lease one of the searches on the physical characteristic; (e) determining whether the message is unsolicited bulk email based on the result of the at least one search; (f) acting on the message as based on the determining step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for determining whether to issue a mail accepted for delivery message for an email message received over a network, comprising:
-
determining whether the email message has spam characteristic; issuing a plurality queries one or more components of the message to determine whether the message shares network infrastructure characteristics with messages previously determined to be spam; receiving a reply to one or more of the plurality of queries; determining if the reply received is sufficient to determine whether the message is or is not spam; if the reply received is sufficient to determine whether the message is or is not spam, determining, based on said reply, whether the message is or is not spam, and if not waiting for one or more additional replies; issuing or withholding a message accepted for delivery message based on one or more reply'"'"'s sufficient to determine whether the message is or is not spam. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A messaging system comprising a processing device including code providing instructions to the processing device to implement the steps of;
-
providing a message transfer agent managing connections to the messaging system; an inbound email parsing agent including a mail component extraction module; a suspect email determination module including which includes code performing the steps of; determining whether an email message has spam characteristic; issuing a plurality queries one or more components of the message to determine whether the message shares characteristics with messages previously determined to be spam or not spam based on network infrastructure characteristics are shared by the message; receiving a reply to one or more of the plurality of queries; issuing or withholding a message accepted for delivery message based on one or more reply'"'"'s sufficient to determine whether the message is or is not spam. - View Dependent Claims (19, 20)
-
Specification