×

Apparatus and method for analyzing and filtering email and for providing web related services

  • US 7,904,518 B2
  • Filed: 02/08/2006
  • Issued: 03/08/2011
  • Est. Priority Date: 02/15/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for filtering a content of an email message method comprising:

  • connecting an inventive network hardware appliance to an external network within a home network configuration;

    including a central processing unit (CPU) on the inventive network hardware appliance;

    providing a memory for storing a set of computer-readable instructions executed by the central processing unit (CPU) on the inventive network hardware appliance;

    connecting the inventive network hardware appliance to one or more user computers;

    installing the inventive network hardware appliance between the external network and the user'"'"'s computer;

    passing all network traffic between the user'"'"'s computer and the external network through the inventive network hardware appliance;

    arranging the inventive network hardware appliance to intercept an email message;

    implementing a remote scanning service at a remote site using a stand-alone server or a plurality of servers configured to communicate with the inventive network hardware appliance to provide information on detected threats;

    providing the inventive network hardware appliance, via the remote scanning service, with the processing power required to perform a scanning operation;

    generating a request to retrieve email message(s) corresponding to an email service of a user from the user'"'"'s email client software located on the user'"'"'s computer, the user'"'"'s computer being connected to the inventive network hardware appliance;

    receiving an email message at the user'"'"'s computer connected to the inventive network hardware appliance;

    arranging the inventive network hardware appliance to intercept the user'"'"'s retrieved email message(s);

    intercepting the email message by the inventive network hardware appliance;

    performing an inspection of the received email message(s) and the received email message'"'"'s attachment(s) upon the interception of the email message(s) by the inventive network hardware appliance from the user'"'"'s computer;

    checking a sender of the email message against a blacklist;

    checking the sender of the email message against a whitelist;

    checking a recipient of the email message against a parental control list;

    checking the email message for phishing scam;

    checking the email message for SPAM;

    generating results based on the checks performed by the inventive network hardware appliance;

    accessing the remote scanning service by the inventive network hardware appliance;

    performing scanning operations by the remote scanning service in an on-demand manner;

    submitting a service request to the remote scanning service from the inventive network hardware appliance;

    sending the service request after interception of the email message by the inventive network hardware appliance;

    determining if the email message contains an encrypted attachment before sending the service request to the remote scanning service;

    sending the service request from the inventive network hardware appliance to the remote scanning service only if the email message does not contain an encrypted attachment;

    allowing or denying the email message based on the results and a response from the remote scanning service;

    the remote scanning service receiving, through the network interface, a service request from the inventive network hardware appliance,responding to the inventive network hardware appliance by the remote scanning service with a response containing information on any detected threats after completion of the scanning operation by the remote scanning service;

    providing information on the detected threats of the email messages by the remote scanning service response to the inventive network hardware appliance; and

    in response to detection of at least one threat in the email message, modifying the email message to neutralize the detected threat and forwarding the modified email message to the user.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×