Suppression of undesirable email messages by emulating vulnerable systems
First Claim
1. A method for use in inhibiting or suppressing delivery of undesirable email messages through vulnerable systems comprising:
- (a) using one or more computer systems to emulate one or more vulnerable systems that can be used by other systems to relay, forward or otherwise send undesirable email messages to target systems;
(b) intercepting, at the one or one or more computer systems used to emulate one or more vulnerable systems, email messages that other systems are attempting to relay, forward or otherwise send to target systems via at least one of the one or more emulated vulnerable systems;
(c) using the one or more computer systems to automatically identify, as being undesirable, email messages that are intercepted by the one or more computer systems used to emulate the one or more vulnerable systems; and
(d) using the one or more computer systems to analyze, archive, trap and/or flag at least some of the intercepted undesirable email messages.
0 Assignments
0 Petitions
Accused Products
Abstract
Provided herein are systems and methods for suppressing delivery of undesirable messages through vulnerable systems. In an embodiment, a system include an emulator emulates one or more vulnerable systems that can be used by spammers to relay, forward or otherwise send undesirable email messages to target systems. The system also includes one or more modules associated with the emulator and configured to automatically identifying, as being undesirable, email messages that are to be relayed, forwarded or otherwise sent to target systems via at least one of the one or more vulnerable systems emulated by the emulator.
116 Citations
21 Claims
-
1. A method for use in inhibiting or suppressing delivery of undesirable email messages through vulnerable systems comprising:
-
(a) using one or more computer systems to emulate one or more vulnerable systems that can be used by other systems to relay, forward or otherwise send undesirable email messages to target systems; (b) intercepting, at the one or one or more computer systems used to emulate one or more vulnerable systems, email messages that other systems are attempting to relay, forward or otherwise send to target systems via at least one of the one or more emulated vulnerable systems; (c) using the one or more computer systems to automatically identify, as being undesirable, email messages that are intercepted by the one or more computer systems used to emulate the one or more vulnerable systems; and (d) using the one or more computer systems to analyze, archive, trap and/or flag at least some of the intercepted undesirable email messages. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for use in inhibiting or suppressing delivery of undesirable email messages through vulnerable systems comprising:
-
one or more computer systems that emulate one or more vulnerable systems that can be used by other systems to relay, forward or otherwise send undesirable email messages to target systems; wherein the one or more computer systems, that emulate one or more vulnerable systems, is/are configured to intercept email messages that other systems are attempting to relay, forward or otherwise send to target systems via the one or more emulated vulnerable systems, automatically identify, as being undesirable, email messages that are intercepted by the one or more computer systems used to emulate the one or more vulnerable systems, and analyze, archive, trap and/or flag at least some of the intercepted undesirable email messages. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium, including instructions stored thereon which when read and executed by one or more computers cause the one or more computers to perform the steps comprising:
-
emulating one or more vulnerable systems that can be used by other systems to relay, forward or otherwise send undesirable email messages to target systems; intercepting email messages that other systems are attempting to relay, forward or otherwise send to target systems via the one or more emulated vulnerable systems; automatically identifying, as being undesirable, email messages that are intercepted; and analyzing, archiving, trapping and/or flagging at least some of the intercepted undesirable email messages. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification