Method and apparatus for selective email processing
First Claim
1. A method for processing electronic mail comprising:
- receiving at a network interface electronic mail traffic;
inspecting, at a processor, an internet protocol header of the electronic mail traffic to determine a source network address associated with the electronic mail traffic;
identifying the source network address as an untrusted source, based on comparing the source network address to a stored list of network addresses and based on a threshold and a percentage of unknown recipients associated with the electronic mail traffic;
assigning a trust level to the source network address, wherein the trust level is selected from a plurality of trust levels and is assigned based on the electronic mail traffic, the stored list of network addresses, the threshold and the percentage of unknown recipients associated with the electronic mail traffic;
identifying one of a plurality of message transfer agents, each of the plurality of message transfer agents having an amount of resources, wherein the resources allow for each of the plurality of message transfer agents to be configured to performance levels associated with the plurality of trust levels, the identifying based on the trust level assigned to the source network address and an amount of resources of the one of the plurality of message transfer agents;
wherein the resources comprise a number of transmission control protocol connections;
in response to identifying of the source network address as an untrusted source, forwarding the electronic mail traffic to the one of a plurality of message transfer agents; and
performing virus filtering on the electronic mail traffic, wherein an amount of filtering performed on the electronic mail traffic is based on the trust level.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a system and method for selective email processing. A traffic separator includes an interface for receiving electronic mail traffic from a source network address. The traffic separator also includes a processor for comparing the source network address to a stored list of network addresses to determine a categorization of the network source address. The traffic separator also includes at least one interface for forwarding the electronic mail traffic to one of many message transfer agents (MTAs) based upon said determination. A database stores the list of network addresses. In one embodiment, one or more network addresses in the stored list are network address ranges.
56 Citations
14 Claims
-
1. A method for processing electronic mail comprising:
-
receiving at a network interface electronic mail traffic; inspecting, at a processor, an internet protocol header of the electronic mail traffic to determine a source network address associated with the electronic mail traffic; identifying the source network address as an untrusted source, based on comparing the source network address to a stored list of network addresses and based on a threshold and a percentage of unknown recipients associated with the electronic mail traffic; assigning a trust level to the source network address, wherein the trust level is selected from a plurality of trust levels and is assigned based on the electronic mail traffic, the stored list of network addresses, the threshold and the percentage of unknown recipients associated with the electronic mail traffic; identifying one of a plurality of message transfer agents, each of the plurality of message transfer agents having an amount of resources, wherein the resources allow for each of the plurality of message transfer agents to be configured to performance levels associated with the plurality of trust levels, the identifying based on the trust level assigned to the source network address and an amount of resources of the one of the plurality of message transfer agents; wherein the resources comprise a number of transmission control protocol connections; in response to identifying of the source network address as an untrusted source, forwarding the electronic mail traffic to the one of a plurality of message transfer agents; and performing virus filtering on the electronic mail traffic, wherein an amount of filtering performed on the electronic mail traffic is based on the trust level. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A traffic separator comprising:
-
means for receiving electronic mail traffic from a source network address; means for storing a list of network addresses; means for inspecting an internet protocol header of the electronic mail traffic to determine a source network address associated with the electronic mail traffic; means for identifying the source network address as an untrusted source, based on comparing the source network address to the list of network addresses and based on a threshold and a percentage of unknown recipients associated with the electronic mail traffic; means for assigning a trust level to the source network address, wherein the trust level is selected from a plurality of trust levels and is assigned based on the electronic mail traffic, the stored list of network addresses, the threshold and the percentage of unknown recipients associated with the electronic mail traffic; means for identifying one of a plurality of message transfer agents, each of the plurality of message transfer agents having an amount of resources, wherein the resources allow for each of the plurality of message transfer agents to be configured to performance levels associated with the plurality of trust levels, the identifying based on the trust level assigned to the source network address and an amount of resources of the one of the plurality of message transfer agents; wherein the resources comprise a number of transmission control protocol connections; means for forwarding the electronic mail traffic to the one of a plurality of message transfer agents, the forwarding in response to the identifying of the source network address as an untrusted source; and means for performing virus filtering on the electronic mail traffic, wherein an amount of filtering performed on the electronic mail traffic is based on the trust level. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A traffic separator comprising:
-
an interface configured to receive electronic mail traffic from a source network address; a database configured to store a list of network addresses; a processor configured to inspect an internet protocol header of the electronic mail traffic to determine a source network address associated with the electronic mail traffic, the processor further configured to identify the source network address as an untrusted source, based on comparing the source network address to the list of network addresses and based on a threshold and a percentage of unknown recipients associated with the electronic mail traffic, the processor further configured to assign a trust level to the source network address, wherein the trust level is selected from a plurality of trust levels and is assigned based on the electronic mail traffic, the stored list of network addresses, the threshold and the percentage of unknown recipients associated with the electronic mail traffic, the processor further configured to identify one of a plurality of message transfer agents, wherein each of the plurality of message transfer agents having an amount of resources, and wherein the resources allow for each of the plurality of message transfer agents to be configured to performance levels associated with the plurality of trust levels, based on the trust level assigned to the source network address and an amount of resources of the one of the plurality of message transfer agents; wherein the resources comprise a number of transmission control protocol connections; an interface configured to forward the electronic mail traffic to the one of a plurality of message transfer agents, the forwarding in response to the identifying the source network address as an untrusted source; and a mail transfer agent configured to perform virus filtering on the electronic mail traffic, wherein an amount of filtering performed on the electronic mail traffic is based on the trust level. - View Dependent Claims (13, 14)
-
Specification