摘要:
Disclosed are systems and methods for detecting unwanted electronic message transmissions on a communications network. These include establishing a database for storing metadata associated with message traffic according to at least the source addresses of the senders of electronic message transmissions. The disclosed principles also include monitoring electronic message transmissions at the certain location on the electronic communications network. Also, included is populating the database with metadata derived from analysis of the monitored electronic messages, where the metadata includes metadata derived by analyzing the contents of the monitored electronic messages. Based upon the populated database, it is determined whether certain received electronic messages are likely to be unwanted based on an examination of the metadata associated with the source addresses of the senders of the received electronic messages and based on the analysis of the content of monitored electronic messages at least in part without reference to a promulgated database of “signatures” of known unwanted electronic messages.
摘要:
Disclosed are systems and methods for use in filtering electronic messages using business heuristics. In one aspect, a method includes determining whether the electronic message is associated with a desirable business, and adjusting the likelihood of delivering the electronic message to an intended recipient of the message if the electronic message is determined to be associated with the desirable business. In a more specific embodiment, the method further includes assigning a spam-score to the electronic message based on a likelihood that the electronic message is not unwanted by the intended recipient, blocking delivery of the electronic message to the intended recipient when the spam-score does not cross an overall threshold, and delivering the electronic message to the intended recipient based on the adjusted likelihood when the electronic message is determined to be associated with the desirable business.
摘要:
Data storage and retrieval systems and related methods are disclosed herein. In one aspect, a system includes data processing servers configured to receive incoming data and transmit the data for storage. The system also includes data storage servers each coupled to one or more data storage units and configured to receive transmitted data for writing to the one or more data storage units, and to read data from the one or more data storage units. Furthermore, the systems may include data retrieval servers coupled to one or more of the data storage servers and configured to retrieve data from the one or more data storage units. The system further includes process modules each associated with one of the data storage servers, where at least two of the process modules are configured to write a portion of the data to corresponding data storage units. In addition, each of the process modules are configured to transmit an acknowledgment associated with each of the corresponding at least two data storage units upon the writing of the data portion in the at least two data storage units. Furthermore, some embodiments may include a key manager coupled to the data processing servers and configured to receive keys that indicate the location of the data portions in the one or more data storage units. Additionally, each data retrieval server may be coupled to the key manager and employ the keys to retrieve data from the one or more data storage units.
摘要:
This disclosure provides for a unified, centralized, preprocessing electronic messaging solution that performs value-added tasks to electronic messages on behalf of the ISP or the end user, before these messages are delivered to the destination e-mail server. In some embodiments, the electronic messaging solution provides a stored user profile, associated with a user to whom an e-mail message is addressed, that has detection parameters for processing e-mail message data. In such embodiments, a processor is also provided for processing the e-mail message data to identify suspect e-mail messages according to the detection parameters in the user profile. A web page accessible by the user to set the detection parameters is also disclosed. Furthermore, various methods associated with various embodiments of the electronic messaging solution disclosed herein are also disclosed.
摘要:
Disclosed herein are filtering systems and methods that employ an electronic message source reputation system. The source reputation system maintains a pool of source Internet Protocol (IP) address information, in the form of a Real-Time Threat Identification Network (“RTIN”) database, which can provide the reputation of source IP addresses, which can be used by customers for filtering network traffic. The source reputation system provides for multiple avenues of access to the source reputation information. Examples of such avenues can include Domain Name Server (DNS)-type queries, servicing routers with router-table data, or other avenues.
摘要:
Disclosed herein are filtering systems and methods that employ an electronic message source reputation system. The source reputation system maintains a pool of source Internet Protocol (IP) address information, in the form of a Real-Time Threat Identification Network (“RTIN”) database, which can provide the reputation of source IP addresses, which can be used by customers for filtering network traffic. The source reputation system provides for multiple avenues of access to the source reputation information. Examples of such avenues can include Domain Name Server (DNS)-type queries, servicing routers with router-table data, or other avenues.
摘要:
Disclosed are systems and methods for detecting unwanted electronic message transmissions on a communications network. These include establishing a database for storing metadata associated with message traffic according to at least the source addresses of the senders of electronic message transmissions. The disclosed principles also include monitoring electronic message transmissions at the certain location on the electronic communications network. Also, included is populating the database with metadata derived from analysis of the monitored electronic messages, where the metadata includes metadata derived by analyzing the contents of the monitored electronic messages. Based upon the populated database, it is determined whether certain received electronic messages are likely to be unwanted based on an examination of the metadata associated with the source addresses of the senders of the received electronic messages and based on the analysis of the content of monitored electronic messages at least in part without reference to a promulgated database of “signatures” of known unwanted electronic messages.
摘要:
Disclosed herein are filtering systems and methods that employ an electronic message source reputation system. The source reputation system maintains a pool of source Internet Protocol (IP) address information, in the form of a Real-Time Threat Identification Network (“RTIN”) database, which can provide the reputation of source IP addresses, which can be used by customers for filtering network traffic. The source reputation system provides for multiple avenues of access to the source reputation information. Examples of such avenues can include Domain Name Server (DNS)-type queries, servicing routers with router-table data, or other avenues.
摘要:
Disclosed herein are systems and methods for applying unified management policies to monitor, store, search and otherwise manage electronic communications, no matter what format those electronic communications take. Such unified management policy or policies are based on an integrated true identity of a user, typically a person. In one embodiment, a policy implementation module for managing electronic communications transmitted across a communications network in multiple communication formats is provided. The module comprises a message filtering process configured to uniformly filter electronic communications transmitted in the multiple communication formats and that are determined to be associated with a true identity of user employing the multiple communication formats. The filtering is done in accordance with unified management policies, and the policy implementation module further comprises a message disposition process configured to uniformly dispose of the filtered electronic communications in accordance with the unified management policies.
摘要:
An improved system for managing synchronous messages between messaging parties is disclosed herein. According to one embodiment, a centralized synchronous message management system is provided as a subscription service to various clients without the need for installation of additional equipment at the client's location. The synchronous message management system is connected to the various client networks, messaging service servers, and third party messagers through a public network, such as the Internet. According to one embodiment, all incoming and outgoing synchronous messages for a client are directed through the synchronous message management system. By doing this, the messages can be processed in real time by the synchronous message management system. Various policies and filtering algorithms can be applied to these messages by the synchronous message management system. According to another embodiment, the synchronous message management system can store policy information on behalf of a enterprise messaging system that resides entirely within a client network. According to yet another embodiment, the synchronous message management system can act as a clearinghouse for the transmission of synchronous messages between various enterprise messaging systems that are located within client networks.