×

Zero-minute virus and spam detection

  • US 7,603,472 B2
  • Filed: 10/26/2006
  • Issued: 10/13/2009
  • Est. Priority Date: 02/19/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting unwanted electronic messages at a certain location on an electronic communications network, the method comprising:

  • a) establishing a database for storing metadata associated with electronic message traffic according to at least source addresses of senders of electronic messages;

    b) monitoring electronic message transmissions at the certain location on the electronic communications network;

    c) extracting information from the monitored electronic messages as they are transmitted across the electronic communications network, substantially without imposing a delay on the transmission of the electronic messages;

    c) populating the database with metadata derived from analysis of the monitored electronic messages, the metadata including metadata derived by analyzing the content of the monitored electronic messages;

    d) determining that certain monitored electronic messages are likely to be unwanted by an intended recipient based on an examination of the metadata associated with the source addresses of the senders of the monitored electronic messages and based on the analysis of the content of the monitored electronic messages, and at least in part without reference to a promulgated database of “

    signatures”

    of unwanted electronic messages; and

    e) conditionally delivering electronic messages according to instructions from an interpreter process, the interpreter process communicating with a content-sensing application in logical communication with the interpreter process, such that if the content-sensing application analyzes the monitored electronic messages as likely unwanted by an intended recipient, then the method can, in coordination with the interpreter process and content-sensing application, configure the delivery of the unwanted electronic messages to route them to a message quarantine center, wherein actions of the interpreter process and configuration parameters corresponding to the actions of the interpreter process are logged to an interpreter process database and then later used for the determining that certain monitored electronic messages are likely to be unwanted based on patterns recognized in the traffic monitor.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×