×

Identifying unwanted electronic messages

  • US 7,954,155 B2
  • Filed: 01/28/2008
  • Issued: 05/31/2011
  • Est. Priority Date: 04/30/2001
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of processing electronic messages in an electronic messaging system that includes multiple local exchanging systems, the method comprising:

  • maintaining first stored data indicating characteristics of electronic messages inspected by a first local exchanging system included in an electronic messaging system, the first local exchanging system configured to exchange messages sent by users located in a first geographic region;

    maintaining second stored data indicating characteristics of electronic messages inspected by a second local exchanging system included in the electronic messaging system, the second local exchanging system being different than the first local exchanging system, wherein the second local exchanging system is configured to exchange messages sent by users located in a second geographic region, the second geographic region being different than the first geographic region;

    receiving, at the first local exchanging system, an electronic message;

    inspecting, at the first local exchanging system, the electronic message to identify characteristics of the electronic message;

    accessing the first stored data indicating characteristics of electronic messages inspected by the first local exchanging system;

    accessing the second stored data indicating characteristics of electronic messages inspected by the second local exchanging system;

    comparing the identified characteristics of the electronic message with the accessed first stored data indicating characteristics of electronic messages inspected by the first local exchanging system and the accessed second stored data indicating characteristics of electronic messages inspected by the second local exchanging system;

    based on comparison results, identifying a security condition for the electronic message; and

    processing the electronic message based on the security condition.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×