Electronic message manager system, method, and computer scanning an electronic message for unwanted content and associated unwanted sites
First Claim
Patent Images
1. A method, comprising:
- receiving, via a network, a request to scan an electronic message prior to opening the electronic message, the request including at least a portion of the electronic message and information associated with the electronic message, wherein the information includes, at least, an Internet Protocol (IP) address associated with the electronic message, a reputation associated with the electronic message, a history of the electronic message that includes an indication of a number of times an instance of the electronic message has been previously sent to users, and a path by which the electronic message is communicated from a source to a destination;
using the information to determine whether the electronic message was spoofed and therefore not clean from malware;
scanning the electronic message for unwanted content and associated unwanted sites at the server; and
sending a response to the request from the server to the client via the network, wherein the response indicates that the electronic message is not safe to open by a user.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for scanning an electronic message for unwanted content and associated unwanted sites in response to a request. In use, a request is received via a network to scan an electronic message prior to opening the electronic message, utilizing an electronic message manager. In addition, the electronic message is scanned for unwanted content and associated unwanted sites, in response to the request. Further, a response to the request is sent via the network.
-
Citations
23 Claims
-
1. A method, comprising:
-
receiving, via a network, a request to scan an electronic message prior to opening the electronic message, the request including at least a portion of the electronic message and information associated with the electronic message, wherein the information includes, at least, an Internet Protocol (IP) address associated with the electronic message, a reputation associated with the electronic message, a history of the electronic message that includes an indication of a number of times an instance of the electronic message has been previously sent to users, and a path by which the electronic message is communicated from a source to a destination; using the information to determine whether the electronic message was spoofed and therefore not clean from malware; scanning the electronic message for unwanted content and associated unwanted sites at the server; and sending a response to the request from the server to the client via the network, wherein the response indicates that the electronic message is not safe to open by a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product embodied on a non-transitory computer readable medium for performing operations, comprising:
-
receiving, via a network, a request from a client to scan an electronic message prior to opening the electronic message, the request including at least a portion of the electronic message and information associated with the electronic message, wherein the information includes, at least, an Internet Protocol (IP) address associated with the electronic message, a reputation associated with the electronic message, a history of the electronic message that includes an indication of a number of times an instance of the electronic message has been previously sent to users, and a path by which the electronic message is communicated from a source to a destination, wherein the electronic message is scanned for unwanted content and associated unwanted sites at a server in response to the request; and using the information to determine whether the electronic message was spoofed and therefore not clean from malware; generating a response to the request, wherein the response indicates that the electronic message is not safe to open by a user. - View Dependent Claims (21)
-
-
22. A system, comprising:
-
an application program installed on a client for transmitting, via a network, a request to scan an electronic message prior to opening the electronic message, the request including at least a portion of the electronic message and information associated with the electronic message, wherein the information includes, at least, an Internet Protocol (IP) address associated with the electronic message, a reputation associated with the electronic message, a history of the electronic message that includes an indication of a number of times an instance of the electronic message has been previously sent to users, and a path by which the electronic message is communicated from a source to a destination, wherein the information is used to determine whether the electronic message was spoofed and therefore not clean from malware; and a server in communication with the client via the network for receiving the request, scanning the electronic message for unwanted content and associated unwanted sites, and sending a response to the request, wherein the response indicates that the electronic message is not safe to open by a user. - View Dependent Claims (23)
-
Specification