System and method for generic loop detection
First Claim
Patent Images
1. A computer-implemented method for blacklisting an email sender, the computer having at least a processor and a memory, the method comprising:
- inspecting, by an email system, a first inbound email with a first token in the first inbound email;
creating, by the email system, a second token from the first token, the second token having a counter, and inserting the second token in the first inbound email to replace the first token;
receiving, by the email system, a second inbound email with the second token; and
,adding, by the email system, a sender of the second inbound email to a blacklist and storing the blacklist at the email system.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for detecting generic loops is described. In one example, an inbound email is inspected for a loop token. If a loop token is found, then an event identification and a sender identification is extracted. The extracted sender identification and event identification is applied to a loop token record, and the inbound email is conditionally discarded based on the application to the loop token record.
-
Citations
23 Claims
-
1. A computer-implemented method for blacklisting an email sender, the computer having at least a processor and a memory, the method comprising:
-
inspecting, by an email system, a first inbound email with a first token in the first inbound email; creating, by the email system, a second token from the first token, the second token having a counter, and inserting the second token in the first inbound email to replace the first token; receiving, by the email system, a second inbound email with the second token; and
,adding, by the email system, a sender of the second inbound email to a blacklist and storing the blacklist at the email system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium having instructions stored thereon that when executed cause a computer to perform operations comprising:
-
inspecting a first inbound email with a first token in the first inbound email; creating a second token from the first token, the second token having a counter, and inserting the second token in the first inbound email to replace the first token; receiving a second inbound email with the second token; and adding a sender of the second inbound email to a blacklist and storing the blacklist at the email system. - View Dependent Claims (19, 20)
-
-
21. An email application server comprising:
-
a network interface for connection to a plurality of email client terminals to receive an inbound email; and a processing unit includes a memory configured to execute functions of the email application server including to inspect a first Inbound email with a first token In the first inbound email, to create a second token from the first token, the second token having a counter, and insert the second token in the first inbound email to replace the first token, to receive a second inbound email with the second token, and to add a sender of the second inbound email to a blacklist and storing the blacklist at the email system. - View Dependent Claims (22, 23)
-
Specification