Method and system for filtering communication
First Claim
1. A method for controlling reception of messages from unknown entities in an e-mail network, each message is associated with a message source, comprising:
- providing a e-mail relay, the e-mail relay interposed along a message communication path associated with a public network and an e-mail server of the e-mail network;
the e-mail relay receiving a message intended for a recipient associated with the e-mail network;
the e-mail relay comparing the message data to message data in a database, the database storing messages previously transmitted to the email-relay and previously flagged as undesirable messages;
the e-mail relay executing at least one predetermined action in response to determining that the message is undesirable; and
the e-mail relay allowing the message to proceed to at least one recipient in response to determining that the message is not undesirable.
3 Assignments
0 Petitions
Accused Products
Abstract
A e-mail relay provides message filtering services to an e-mail network. The e-mail relay monitors incoming communication and intercepts e-mail messages. The e-mail relay compares attributes of the messages to data derived from SPAM messages, which is stored in a SPAM database. The e-mail relay restricts the delivery of message based on the comparison such as by restricting the delivery of messages having attributes close to those of SPAM messages from the SPAM database. The SPAM database is constructed by responding to user or administrator indications as to whether received messages are SPAM messages.
-
Citations
61 Claims
-
1. A method for controlling reception of messages from unknown entities in an e-mail network, each message is associated with a message source, comprising:
-
providing a e-mail relay, the e-mail relay interposed along a message communication path associated with a public network and an e-mail server of the e-mail network; the e-mail relay receiving a message intended for a recipient associated with the e-mail network; the e-mail relay comparing the message data to message data in a database, the database storing messages previously transmitted to the email-relay and previously flagged as undesirable messages; the e-mail relay executing at least one predetermined action in response to determining that the message is undesirable; and the e-mail relay allowing the message to proceed to at least one recipient in response to determining that the message is not undesirable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for filtering unwanted messages to an e-mail network associated with an e-mail relay, comprising:
-
providing a database storing a plurality of unwanted messages, the database storing messages previously transmitted to the email-relay and previously flagged as undesirable messages; providing an e-mail relay interposed along the communication path between the e-mail network and a public network; the e-mail relay intercepting a message from the public network to the e-mail network; the e-mail relay comparing attributes of the intercepted message to attributes of unwanted messages stored in the database to determine whether the intercepted message is an unwanted message; and the e-mail relay blocking message transmission to the e-mail network in response to determining that the intercepted message is an unwanted message.
-
-
32. A system for controlling the reception of undesirable messages by resources associated with a local network, comprising:
-
an e-mail relay interposed along the communication path between the resources and a public network, the e-mail relay intercepting messages transmitted between the resources and the public network; and a database storing data associated with known undesirable messages, the database storing messages previously transmitted to the email-relay and previously flagged as undesirable messages, the e-mail relay employing the database to compare attributed of intercepted messages to attributes of known undesirable messages stored in the database, the e-mail relay comparing the message to message data from the database by performing at least one evaluation related to attributes of the intercepted message, the e-mail relay executing at least one predetermined action if matching between the message attributes and attributes from records in the database exceed a threshold. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 61)
-
-
60. A system for controlling the reception of undesirable messages by resources associated with a local network, comprising:
-
relay means interposed along the communication path between the resources and a public network, the relay means intercepting messages transmitted between the resources and the public network; and storage means for storing data associated with known undesirable messages, the storage means storing messages previously transmitted to the email-relay and previously flagged as undesirable messages, the relay means employing the storage means to compare attributed of intercepted messages to attributes of known undesirable messages stored in the storage means, the relay means restricting the delivery of an intercepted message if a match score, based on comparison of message attributes and attributes of undesirable messages in the storage means, exceeds a threshold level.
-
Specification