×

Identifying unwanted electronic messages

  • US 7,325,249 B2
  • Filed: 01/31/2002
  • Issued: 01/29/2008
  • Est. Priority Date: 04/30/2001
  • Status: Active Grant
First Claim
Patent Images

1. A method of identifying unwanted messages, the method comprising:

  • inspecting a payload portion of an electronic mail message being communicated and identifying characteristics of the payload portion, the electronic mail message including an address of a recipient;

    comparing the characteristics of the inspeceted payload portion of the electronic mail message with stored data indicating characterisitics of at least one other electronic mail message that has been inspected;

    based on comparison results, identifying a first security condition for the electronic mail message from among at least one of acceptable, unacceptable, and indeterminate states; and

    processing the electronic mail message based on the first security condition, wherein processing, the electronic mail message includes;

    rejecting the electronic mail message if the first security condition associated with the electronic mail message reflects the unacceptable state;

    accepting the electronic mail message if the first security condition associated with the electronic mail message reflects the acceptable state; and

    if the first security condition associated with the electronic mail message reflects the indeterminate state, monitoring the electronic mail message by;

    transmitting the electronic mail message based on the address of the electronic mail message;

    tracking a location of the transmitted electronic mail message;

    inspecting at least one other electronic mail message subsequent to transmitting the electronic mail message;

    updating the stored data to indicate characteristics of the at least one other electronic mail message that has been inspected;

    recategorizing the first security condition of the transmitted electronic mail message to a second security condition of the transmitted electronic mail message based on the updated stored data; and

    reprocessing the transmitted electronic mail message based on the second security condition, wherein reprocessing the transmitted electronic mail message includes deleting the transmitted electronic mail message if the second security condition reflects the unacceptable state.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×