×

Systems and methods for message threat management

  • US 8,631,495 B2
  • Filed: 11/28/2011
  • Issued: 01/14/2014
  • Est. Priority Date: 03/08/2002
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving a communication from a first sender destined to a recipient in a network;

    accessing a whitelist specifying approved senders, each of the approved senders having a trust score indicative of a level of trust associated with the respective approved sender, wherein the trust score for each approved sender is based at least in part on a respective frequency with which communications originating within the network are sent to the approved sender, and higher frequencies of communications originating within the network sent to the approved sender correspond with higher levels of trust;

    determining, using at least one data processing apparatus, whether the first sender is one of the approved senders;

    in response to determining that the first sender is not one of the approved senders;

    determining whether a threat level of the communication exceeds a threshold threat level;

    in response to determining that the threat level does not exceed a threshold threat level, delivering the communication to the recipient; and

    in response to determining that the first sender is one of the approved senders;

    determining whether the trust score for the first sender exceeds a threshold trust score;

    in response to determining that the trust score exceeds the threshold trust score, delivering the communication to the recipient; and

    in response to determining that the trust score does not exceed the threshold trust score, selecting one of a plurality of interrogation levels to which the communication will be subjected.

View all claims
  • 13 Assignments
Timeline View
Assignment View
    ×
    ×