Suppression of undesirable network messages
First Claim
1. A system for inhibiting or suppressing delivery of undesirable email messages through vulnerable systems comprising:
- an emulator that emulates one or more vulnerable systems that can be used by spammers to relay, forward or otherwise send undesirable email messages to target systems; and
a module associated with the emulator, the module configured tointercept undesirable email messages that spammers attempt to relay, forward or otherwise send to target systems using one or more of the emulated one or more vulnerable systems, andsend replies back to spammers, in response to spammers'"'"' attempts to relay, forward or otherwise send undesirable email messages to target systems using one or more of the emulated one or more vulnerable systems,wherein at least a majority of intercepted undesirable email messages are prevented from ever being relayed, forwarded or otherwise sent to target systems using one or more of the emulated one or more vulnerable systems, andwherein, in order to make it appear to spammers that undesirable email messages are successfully being relayed, forwarded or other sent to target systems, the replies sent back to spammers emulate what the spammers would expect to receive had the intercepted undesirable email messages been successfully relayed, forwarded or otherwise sent using one or more of the emulated one or more vulnerable systems, even though at least a majority of the intercepted undesirable email messages are never relayed, forwarded or otherwise sent to target systems.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for suppressing delivery of undesirable messages through vulnerable systems. The system includes an emulator that emulates one or more of the vulnerable systems. A module associated with the emulator intercepts undesirable messages, which were originally intended to be sent through a vulnerable system. One embodiment includes plural emulators, which include one or more servers that are part of a network of servers. A controller communicates with one or more servers. In this embodiment, the controller includes a database capable of storing statistics pertaining to undesirable messages blocked by one or more of the servers. The statistics may include information pertaining to the sender(s) of the undesirable messages. Undesirable messages intercepted by the network of servers include email spam.
-
Citations
42 Claims
-
1. A system for inhibiting or suppressing delivery of undesirable email messages through vulnerable systems comprising:
-
an emulator that emulates one or more vulnerable systems that can be used by spammers to relay, forward or otherwise send undesirable email messages to target systems; and a module associated with the emulator, the module configured to intercept undesirable email messages that spammers attempt to relay, forward or otherwise send to target systems using one or more of the emulated one or more vulnerable systems, and send replies back to spammers, in response to spammers'"'"' attempts to relay, forward or otherwise send undesirable email messages to target systems using one or more of the emulated one or more vulnerable systems, wherein at least a majority of intercepted undesirable email messages are prevented from ever being relayed, forwarded or otherwise sent to target systems using one or more of the emulated one or more vulnerable systems, and wherein, in order to make it appear to spammers that undesirable email messages are successfully being relayed, forwarded or other sent to target systems, the replies sent back to spammers emulate what the spammers would expect to receive had the intercepted undesirable email messages been successfully relayed, forwarded or otherwise sent using one or more of the emulated one or more vulnerable systems, even though at least a majority of the intercepted undesirable email messages are never relayed, forwarded or otherwise sent to target systems. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 33)
-
-
23. A system for inhibiting or suppressing delivery of undesirable email messages through vulnerable systems, comprising:
-
an emulator that emulates one or more of the vulnerable systems that can be used by spammers to relay, forward or otherwise send undesirable email messages to target systems; and a module associated with the emulator, the module configured to intercept undesirable email messages that spammers attempt to relay, forward or otherwise send to target systems using one or more of the emulated one or more vulnerable systems, and forward information about the undesirable email messages and/or about systems from which the undesirable email messages are sent, to one or more further systems, so that the one or more further systems can recognize certain email messages as being undesirable; wherein the information about undesirable email messages and/or about systems from which the undesirable email messages are sent, comprises information other than or in additional to information about sending addresses from which undesirable email messages originate, so that the information would enable undesirable email messages to be identified as undesirable by the one or more further systems even if the one or more further systems received the undesirable email messages from different sending addresses. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for inhibiting or suppressing delivery of undesirable email messages through vulnerable systems, comprising:
-
emulating one or more vulnerable systems that can be used by spammers to relay, forward or otherwise send undesirable email messages to target systems; intercepting undesirable email messages that spammers attempt to relay, forward or otherwise send to target systems using one or more of the one or more vulnerable systems being emulated; and forwarding information about the undesirable email messages and/or about systems from which the undesirable email messages are sent, to one or more further systems, so that the one or more further systems can recognize certain email messages as being undesirable; wherein the information about undesirable email messages and/or about systems from which the undesirable email messages are sent, comprises information other than or in additional to information about sending addresses from which undesirable email messages originate, so that the information would enable undesirable email messages to be identified as undesirable by the one or more further systems even if the one or more further systems received the undesirable email messages from different sending addresses. - View Dependent Claims (32)
-
-
34. A method for inhibiting or suppressing delivery of undesirable email messages through vulnerable systems comprising:
-
emulating one or more vulnerable systems that can be used by spammers to relay, forward or otherwise send undesirable email messages to target systems; intercepting undesirable email messages that spammers attempt to relay, forward or otherwise send to target systems using one or more of the emulated one or more vulnerable systems, and sending replies back to spammers, in response to spammers'"'"' attempts to relay, forward or otherwise send undesirable email messages to target systems using one or more of the emulated one or more vulnerable systems; and preventing at least a majority of the intercepted undesirable email messages from ever being relayed, forwarded or otherwise sent to target systems using one or more of the one or more vulnerable systems being emulated; wherein, in order to make it appear to spammers that undesirable email messages are successfully being relayed, forwarded or other sent to target systems, the replies sent back to spammers emulate what the spammers would expect to receive had the intercepted undesirable email messages been successfully relayed, forwarded or otherwise sent using one or more of the emulated one or more vulnerable systems, even though at least a majority of the intercepted undesirable email messages are never relayed, forwarded or otherwise sent to target systems. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42)
-
Specification