Apparatus and method for analyzing and filtering email and for providing web related services
First Claim
1. A method for filtering a content of an email message method comprising:
- connecting an inventive network hardware appliance to an external network within a home network configuration;
including a central processing unit (CPU) on the inventive network hardware appliance;
providing a memory for storing a set of computer-readable instructions executed by the central processing unit (CPU) on the inventive network hardware appliance;
connecting the inventive network hardware appliance to one or more user computers;
installing the inventive network hardware appliance between the external network and the user'"'"'s computer;
passing all network traffic between the user'"'"'s computer and the external network through the inventive network hardware appliance;
arranging the inventive network hardware appliance to intercept an email message;
implementing a remote scanning service at a remote site using a stand-alone server or a plurality of servers configured to communicate with the inventive network hardware appliance to provide information on detected threats;
providing the inventive network hardware appliance, via the remote scanning service, with the processing power required to perform a scanning operation;
generating a request to retrieve email message(s) corresponding to an email service of a user from the user'"'"'s email client software located on the user'"'"'s computer, the user'"'"'s computer being connected to the inventive network hardware appliance;
receiving an email message at the user'"'"'s computer connected to the inventive network hardware appliance;
arranging the inventive network hardware appliance to intercept the user'"'"'s retrieved email message(s);
intercepting the email message by the inventive network hardware appliance;
performing an inspection of the received email message(s) and the received email message'"'"'s attachment(s) upon the interception of the email message(s) by the inventive network hardware appliance from the user'"'"'s computer;
checking a sender of the email message against a blacklist;
checking the sender of the email message against a whitelist;
checking a recipient of the email message against a parental control list;
checking the email message for phishing scam;
checking the email message for SPAM;
generating results based on the checks performed by the inventive network hardware appliance;
accessing the remote scanning service by the inventive network hardware appliance;
performing scanning operations by the remote scanning service in an on-demand manner;
submitting a service request to the remote scanning service from the inventive network hardware appliance;
sending the service request after interception of the email message by the inventive network hardware appliance;
determining if the email message contains an encrypted attachment before sending the service request to the remote scanning service;
sending the service request from the inventive network hardware appliance to the remote scanning service only if the email message does not contain an encrypted attachment;
allowing or denying the email message based on the results and a response from the remote scanning service;
the remote scanning service receiving, through the network interface, a service request from the inventive network hardware appliance,responding to the inventive network hardware appliance by the remote scanning service with a response containing information on any detected threats after completion of the scanning operation by the remote scanning service;
providing information on the detected threats of the email messages by the remote scanning service response to the inventive network hardware appliance; and
in response to detection of at least one threat in the email message, modifying the email message to neutralize the detected threat and forwarding the modified email message to the user.
12 Assignments
0 Petitions
Accused Products
Abstract
The inventive methodology provides an integrated plug and play solution designed to protect home networks against spam, phishing emails, viruses, spyware as well as other similar threats. The described content filtering appliance can be used for processing of web and email traffic implemented and can be deployed as a stand-alone appliance. In one implementation, the content processing appliance utilizes backend content filtering provided by a remote scanning service accessed via a network. The system employs network level analysis and translation of content and executes various procedures to handle the network traffic. In an embodiment of the invention, the appliance is provided with an automatic remote updating capability, wherein the software and data used by the appliance can be updated remotely via a network. Finally, the appliance may also implement parental controls.
-
Citations
13 Claims
-
1. A method for filtering a content of an email message method comprising:
-
connecting an inventive network hardware appliance to an external network within a home network configuration; including a central processing unit (CPU) on the inventive network hardware appliance; providing a memory for storing a set of computer-readable instructions executed by the central processing unit (CPU) on the inventive network hardware appliance; connecting the inventive network hardware appliance to one or more user computers; installing the inventive network hardware appliance between the external network and the user'"'"'s computer; passing all network traffic between the user'"'"'s computer and the external network through the inventive network hardware appliance; arranging the inventive network hardware appliance to intercept an email message; implementing a remote scanning service at a remote site using a stand-alone server or a plurality of servers configured to communicate with the inventive network hardware appliance to provide information on detected threats; providing the inventive network hardware appliance, via the remote scanning service, with the processing power required to perform a scanning operation; generating a request to retrieve email message(s) corresponding to an email service of a user from the user'"'"'s email client software located on the user'"'"'s computer, the user'"'"'s computer being connected to the inventive network hardware appliance; receiving an email message at the user'"'"'s computer connected to the inventive network hardware appliance; arranging the inventive network hardware appliance to intercept the user'"'"'s retrieved email message(s); intercepting the email message by the inventive network hardware appliance; performing an inspection of the received email message(s) and the received email message'"'"'s attachment(s) upon the interception of the email message(s) by the inventive network hardware appliance from the user'"'"'s computer; checking a sender of the email message against a blacklist; checking the sender of the email message against a whitelist; checking a recipient of the email message against a parental control list; checking the email message for phishing scam; checking the email message for SPAM; generating results based on the checks performed by the inventive network hardware appliance; accessing the remote scanning service by the inventive network hardware appliance; performing scanning operations by the remote scanning service in an on-demand manner; submitting a service request to the remote scanning service from the inventive network hardware appliance; sending the service request after interception of the email message by the inventive network hardware appliance; determining if the email message contains an encrypted attachment before sending the service request to the remote scanning service; sending the service request from the inventive network hardware appliance to the remote scanning service only if the email message does not contain an encrypted attachment; allowing or denying the email message based on the results and a response from the remote scanning service; the remote scanning service receiving, through the network interface, a service request from the inventive network hardware appliance, responding to the inventive network hardware appliance by the remote scanning service with a response containing information on any detected threats after completion of the scanning operation by the remote scanning service; providing information on the detected threats of the email messages by the remote scanning service response to the inventive network hardware appliance; and in response to detection of at least one threat in the email message, modifying the email message to neutralize the detected threat and forwarding the modified email message to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An inventive network hardware appliance for filtering a content of an email message sent to a user at a personal computer of the user, the personal computer connected to a home network of the user, the inventive network hardware appliance comprising:
-
a central processing unit (CPU); a remote scanning service; the remote scanning service performing scanning operations in an on-demand manner; a first network interface connected to the personal computer of the user; a second network interface connected to the external network; and a memory storing a set of computer-readable instructions, which, when executed by the CPU cause the CPU to; i. read a email message; ii. cause a sender of the email message to be checked against a blacklist; iii. cause the sender of the email message to be checked against a whitelist; iv. cause a recipient of the email message to be checked against a parental control list; v. cause the email message to be checked for phishing scam; vi. cause the email message to be checked for SPAM content; vii. performing at least one of (ii) through (vi) by the remote scanning service pursuant to a request from the inventive network hardware appliance, the request being sent after receiving of the email and confirming an attachment to the email message by the inventive network hardware appliance; and viii. allow or deny the email message based on results of the (ii) through (vii) and a response from the remote scanning service to a service request from the inventive network hardware appliance, the service request being sent to the remote scanning service after the reading of the email message by the CPU, wherein the personal computer of the user is connected to an external network, wherein the inventive network hardware appliance is connected to the home network and is positioned between the personal computer of the user and the internet, and wherein the remote scanning service performs anti-virus scanning operations on the email message after receiving the service request and before providing a response to the inventive network hardware appliance; wherein the service request includes attachments to the email message and directs the remote scanning service to perform a threat check of the attachments, wherein the response from the remote scanning service to the inventive network appliance includes information on threats detected by the remote scanning service, wherein the inventive network appliance determines whether the email message contains an encrypted attachment before sending the service request to the remote scanning service, wherein the inventive network appliance sends the service request only if the email message does not contain an encrypted attachment, and in response to detection of at least one threat in the email message, modifying the email message to neutralize the detected threat and forwarding the modified email message to the user.
-
Specification