×

Reputation based message processing

  • US 8,635,690 B2
  • Filed: 01/25/2008
  • Issued: 01/21/2014
  • Est. Priority Date: 11/05/2004
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving a message through a communications interface, the message comprising information and being a message from and associated with an entity;

    receiving a reputation score that is indicative of a reputation for the entity associated with the message;

    determining that the reputation score is indeterminate of the reputation of the entity, the reputation score being a value that does not provide an accurate indication of the reputation of the entity as being one of reputable or non-reputable, and in response to the determination;

    queuing the message based upon the reputation score being indeterminate, thereby delaying delivery of the message;

    collecting additional information associated with the entity that can be used to determine a reputation of the entity as being one of reputable or non-reputable;

    receiving an updated reputation score that is indicative of the reputation for the entity associated with the message, the updated reputation score classifying the entity as being one of reputable or non-reputable and determined, in part, from the additional information collected, wherein a non-reputable reputation indicates a tendency by an entity to participate in a particular non-legitimate activity; and

    in response to receiving the updated reputation score, processing the queued message based upon updated reputation score, the processing comprising;

    delivering the message in response to the updated reputation score indicating the entity is reputable; and

    sending, in response to the updated reputation score indicating the entity is non-reputable, the message to a dedicated interrogation engine to analyze the message for threats related to the particular non-legitimate activity in which the entity has exhibited a tendency to participate, and wherein a different dedicated interrogation engine is used for each different non-legitimate activity.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×