Managing infectious forwarded messages
First Claim
Patent Images
1. A method of managing messages, the method comprising:
- receiving a first message over a network at a network interface, the first message including an attachment file having a file name and an embedded bit pattern;
executing instructions stored in memory, wherein execution of the instructions by a processor;
determines that the attachment file is executable based on the embedded bit pattern,determines that the attachment file is a text file based on the file name,stores a copy of the first message in memory based on the disparity between the determination that the attachment file is executable and the determination that the attachment file is a text file, andtransmits the first message over the network to a mail server;
receiving a second message over the network at the network interface; and
executing instructions stored in memory, wherein execution of the instructions by a processor;
compares the second message to the copy of the transmitted first message stored in memory,deletes the second message from a local send queue, and sends a cancellation request concerning the transmitted first message to the mail server, the deletion and cancellation request occurring automatically when the second message matches the copy of the transmitted first message in memory.
20 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for managing forwarded infectious messages are provided. Managing electronic message comprises receiving a message, forwarding the message, determining that the forwarded message is infectious after the message has been forwarded and preventing the infectious forwarded message from spreading.
-
Citations
20 Claims
-
1. A method of managing messages, the method comprising:
-
receiving a first message over a network at a network interface, the first message including an attachment file having a file name and an embedded bit pattern; executing instructions stored in memory, wherein execution of the instructions by a processor; determines that the attachment file is executable based on the embedded bit pattern, determines that the attachment file is a text file based on the file name, stores a copy of the first message in memory based on the disparity between the determination that the attachment file is executable and the determination that the attachment file is a text file, and transmits the first message over the network to a mail server; receiving a second message over the network at the network interface; and executing instructions stored in memory, wherein execution of the instructions by a processor; compares the second message to the copy of the transmitted first message stored in memory, deletes the second message from a local send queue, and sends a cancellation request concerning the transmitted first message to the mail server, the deletion and cancellation request occurring automatically when the second message matches the copy of the transmitted first message in memory. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An electronic message management system, comprising:
-
a network interface that; receives a first message over a network, the first message including an attachment file having a file name and an embedded bit pattern, transmits the first message over the network to a mail server, and receives a second message over the network at the network interface after transmitting the first message to the mail server; a memory that stores instructions; and a processor communicatively coupled to the memory and the network interface, wherein execution of the instructions stored in the memory by the processor; determines that the attachment file of the first message is executable based on the embedded bit pattern, determines that the attachment file of the first message is a text file based on the file name, stores a copy of the first message in memory based on the disparity between the determination that the attachment file is executable and the determination that the attachment file is a text file, compares the second message received after transmission of the first message to the copy of the transmitted first message stored in memory, deletes the second message from a local send queue, and sends a cancellation request concerning the transmitted first message to the mail server, the deletion and cancellation request occurring automatically when the second message matches the copy of the transmitted first message in memory. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium, the medium having a computer program embodied thereon, the program executable by a processor to perform a method of managing messages, the method comprising:
-
analyzing a first message received over a network at a network interface, the first message including an attachment file having a file name and an embedded bit pattern, wherein analyzing the first message includes; determining that the attachment file is executable based on the embedded bit pattern, and determining that the attachment file is a text file based on the file name; storing a copy of the first message in memory based on the disparity between the determination that the attachment file is executable and the determination that the attachment file is a text file; transmitting the first message over the network to a mail server; comparing a second message received over the network at the network interface to the copy of the transmitted first message stored in memory; deleting the second message from a local send queue; and sending a cancellation request concerning the transmitted first message to the mail server, the deletion and cancellation request occurring automatically when the second message matches the copy of the transmitted first message in memory. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification