Method and apparatus for selective E-mail processing
First Claim
1. A method for routing electronic mail to a plurality of message transfer agents, each message transfer agent having a respective amount of resources that configures a message transfer agent to a performance level associated with a level of trust, the method comprising:
- receiving electronic mail traffic from a network source address;
comparing the network source address to a stored list of network addresses;
in response to determining that the network source address appears in the stored list of network addresses;
determining a level of trust associated with the network source address;
selecting a first message transfer agent of the plurality of message transfer agents based on the level of trust, each of the plurality of message transfer agents having a respective amount of resources that configures each message transfer agent to a performance level associated with a respective level of trust, androuting the electronic mail traffic to the first message transfer agent; and
in response to determining that the network source address does not appear in the stored list of network addresses;
assigning a particular level of trust to the network source address based on the electronic mail traffic and a threshold and a percentage of unknown recipients associated with previous traffic from the network source address;
selecting a second message transfer agent of the plurality of message transfer agents based on the particular level of trust; and
routing the electronic mail traffic to the second message transfer agent.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a system and method for selective email processing. A traffic separator includes an interface for receiving electronic mail traffic from a source network address. The traffic separator also includes a processor for comparing the source network address to a stored list of network addresses to determine a categorization of the network source address. The traffic separator also includes at least one interface for forwarding the electronic mail traffic to one of many message transfer agents (MTAs) based upon said determination. A database stores the list of network addresses. In one embodiment, one or more network addresses in the stored list are network address ranges.
-
Citations
18 Claims
-
1. A method for routing electronic mail to a plurality of message transfer agents, each message transfer agent having a respective amount of resources that configures a message transfer agent to a performance level associated with a level of trust, the method comprising:
-
receiving electronic mail traffic from a network source address; comparing the network source address to a stored list of network addresses; in response to determining that the network source address appears in the stored list of network addresses; determining a level of trust associated with the network source address; selecting a first message transfer agent of the plurality of message transfer agents based on the level of trust, each of the plurality of message transfer agents having a respective amount of resources that configures each message transfer agent to a performance level associated with a respective level of trust, and routing the electronic mail traffic to the first message transfer agent; and in response to determining that the network source address does not appear in the stored list of network addresses; assigning a particular level of trust to the network source address based on the electronic mail traffic and a threshold and a percentage of unknown recipients associated with previous traffic from the network source address; selecting a second message transfer agent of the plurality of message transfer agents based on the particular level of trust; and routing the electronic mail traffic to the second message transfer agent. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus for routing electronic mail to a plurality of message transfer agents, each message transfer agent having a respective amount of resources that configures a message transfer agent to a performance level associated with a level of trust, the apparatus comprising:
-
a processor; and a memory to store computer program instructions, the computer program instructions when executed on the processor cause the processor to perform operations comprising; receiving electronic mail traffic from a network source address; comparing the network source address to a stored list of network addresses; in response to determining that the network source address appears in the stored list of network addresses; determining a level of trust associated with the network source address; selecting a first message transfer agent of the plurality of message transfer agents based on the level of trust, each of the plurality of message transfer agents having a respective amount of resources that configures each message transfer agent to a performance level associated with a respective level of trust, and routing the electronic mail traffic to the first message transfer agent; and in response to determining that the network source address does not appear in the stored list of network addresses; assigning a particular level of trust to the network source address based on the electronic mail traffic and a threshold and a percentage of unknown recipients associated with previous traffic from the network source address; selecting a second message transfer agent of the plurality of message transfer agents based on the particular level of trust; and routing the electronic mail traffic to the second message transfer agent. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium storing computer program instructions for routing electronic mail to a plurality of message transfer agents, each message transfer agent having a respective amount of resources that configures a message transfer agent to a performance level associated with a level of trust, which, when executed on a processor, cause the processor to perform operations comprising:
-
receiving electronic mail traffic from a network source address; comparing the network source address to a stored list of network addresses; in response to determining that the network source address appears in the stored list of network addresses; determining a level of trust associated with the network source address; selecting a first message transfer agent of the plurality of message transfer agents based on the level of trust, each of the plurality of message transfer agents having a respective amount of resources that configures each message transfer agent to a performance level associated with a respective level of trust, and routing the electronic mail traffic to the first message transfer agent; and in response to determining that the network source address does not appear in the stored list of network addresses; assigning a particular level of trust to the network source address based on the electronic mail traffic and a threshold and a percentage of unknown recipients associated with previous traffic from the network source address; selecting a second message transfer agent of the plurality of message transfer agents based on the particular level of trust; and routing the electronic mail traffic to the second message transfer agent. - View Dependent Claims (14, 16, 17)
-
-
15. The non-transitory computer readable medium of 13, wherein the electronic mail traffic is received from a sending email system, the operations further comprising:
if the network source address does not appear in the stored list of network addresses, timing out a connection with the sending email system.
-
18. The non-transitory computer readable medium of 13, wherein the stored list of network addresses is updated adaptively based on feedback from a message transfer agent of the plurality of message transfer agents.
Specification