×

Suppression of undesirable email messages by emulating vulnerable systems

  • US 8,280,971 B2
  • Filed: 06/27/2011
  • Issued: 10/02/2012
  • Est. Priority Date: 03/09/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for use in inhibiting or suppressing delivery of undesirable email messages through vulnerable systems comprising:

  • (a) using one or more computer systems to emulate one or more vulnerable systems that can be used by other systems to relay, forward or otherwise send undesirable email messages to target systems;

    (b) intercepting, at the one or one or more computer systems used to emulate one or more vulnerable systems, email messages that other systems are attempting to relay, forward or otherwise send to target systems via at least one of the one or more emulated vulnerable systems;

    (c) using the one or more computer systems to automatically identify, as being undesirable, email messages that are intercepted by the one or more computer systems used to emulate the one or more vulnerable systems; and

    (d) using the one or more computer systems to analyze, archive, trap and/or flag at least some of the intercepted undesirable email messages.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×