REPUTATION-BASED THREAT PROTECTION
First Claim
Patent Images
1. A method for reputation based threat protection, the method comprising:
- maintaining information in memory concerning a plurality of identified threats, the maintained information provided by a plurality of preselected sources;
receiving an e-mail message over a communication network;
executing instructions stored in memory, wherein execution of the instructions by a processor;
separates the received e-mail message into a plurality of components,searches the maintained information to identify a reputation score associated with each of the plurality of components, anddetermines that the e-mail is a threat based on the identified reputation score of each of the plurality of components; and
sending information to a designated recipient regarding the determination that the e-mail is a threat, the information being sent over the communication network.
16 Assignments
0 Petitions
Accused Products
Abstract
Information concerning a plurality of identified threats provided by a plurality of preselected sources is stored in memory. An e-mail message may be received over a communication network. The received e-mail message is separated into a plurality of components. The stored information is searched to identify a reputation score associated with each of the plurality of components. It is then determined whether the e-mail is a threat based on the identified reputation score of each of the plurality of components. The determination is sent to a designated recipient.
-
Citations
19 Claims
-
1. A method for reputation based threat protection, the method comprising:
-
maintaining information in memory concerning a plurality of identified threats, the maintained information provided by a plurality of preselected sources; receiving an e-mail message over a communication network; executing instructions stored in memory, wherein execution of the instructions by a processor; separates the received e-mail message into a plurality of components, searches the maintained information to identify a reputation score associated with each of the plurality of components, and determines that the e-mail is a threat based on the identified reputation score of each of the plurality of components; and sending information to a designated recipient regarding the determination that the e-mail is a threat, the information being sent over the communication network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer-readable storage medium, having embodied thereon a program executable by a processor to perform a method for reputation based threat protection, the method comprising:
-
maintaining information concerning a plurality of identified threats, the maintained information provided by a plurality of preselected sources; receiving an e-mail message; separating the received e-mail message into a plurality of components; searching the maintained information to identify a reputation score associated with each of the plurality of components; determining that the e-mail is a threat based on the identified reputation score of each of the plurality of components; and sending information to a designated recipient regarding the determination that the e-mail is a threat. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification