摘要:
Disclosed herein are filtering systems and methods that employ an electronic message source reputation system. The source reputation system maintains a pool of source Internet Protocol (IP) address information, in the form of a Real-Time Threat Identification Network (“RTIN”) database, which can provide the reputation of source IP addresses, which can be used by customers for filtering network traffic. The source reputation system provides for multiple avenues of access to the source reputation information. Examples of such avenues can include Domain Name Server (DNS)-type queries, servicing routers with router-table data, or other avenues.
摘要:
Disclosed herein are systems and methods for applying unified management policies to monitor, store, search and otherwise manage electronic communications, no matter what format those electronic communications take. Such unified management policy or policies are based on an integrated true identity of a user, typically a person. In one embodiment, a policy implementation module for managing electronic communications transmitted across a communications network in multiple communication formats is provided. The module comprises a message filtering process configured to uniformly filter electronic communications transmitted in the multiple communication formats and that are determined to be associated with a true identity of user employing the multiple communication formats. The filtering is done in accordance with unified management policies, and the policy implementation module further comprises a message disposition process configured to uniformly dispose of the filtered electronic communications in accordance with the unified management policies.
摘要:
An improved system for managing synchronous messages between messaging parties is disclosed herein. According to one embodiment, a centralized synchronous message management system is provided as a subscription service to various clients without the need for installation of additional equipment at the client's location. The synchronous message management system is connected to the various client networks, messaging service servers, and third party messagers through a public network, such as the Internet. According to one embodiment, all incoming and outgoing synchronous messages for a client are directed through the synchronous message management system. By doing this, the messages can be processed in real time by the synchronous message management system. Various policies and filtering algorithms can be applied to these messages by the synchronous message management system. According to another embodiment, the synchronous message management system can store policy information on behalf of a enterprise messaging system that resides entirely within a client network. According to yet another embodiment, the synchronous message management system can act as a clearinghouse for the transmission of synchronous messages between various enterprise messaging systems that are located within client networks.
摘要:
Disclosed are methods of managing the delivery, including in certain cases the blocking, of electronic messages based at least in part on an electronic message's IP routing information. Also disclosed are methods of managing electronic messages with an intermediate service and the quarantining and user management of quarantined electronic messages and user profiles for the electronic messaging delivery parameters.
摘要:
Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.
摘要:
Disclosed herein are systems, methods and the like for the management of filtered messages and filtering settings. Embodiments use the interaction of a user and a notification message to execute commands/requests. In one aspect, a notification message is used to notify a computer user of filtered incoming electronic messages that are stored in a quarantine server and database. In one embodiment, the notification message comprises message data having information regarding incoming messages blocked from reaching the destination server and stored in the quarantine server and database. Also in this embodiment, the message includes user interface data selectable by the user to manage the handling of incoming messages. In addition, the message includes action logic associated with the user interface data and configured to execute the selections made by the user by sending commands from the user's computer to the quarantine server and database via a computer network.
摘要:
Disclosed are systems and methods for use in filtering electronic messages using business heuristics. In one aspect, a method includes determining whether the electronic message is associated with a desirable business, and adjusting the likelihood of delivering the electronic message to an intended recipient of the message if the electronic message is determined to be associated with the desirable business. In a more specific embodiment, the method further includes assigning a spam-score to the electronic message based on a likelihood that the electronic message is not unwanted by the intended recipient, blocking delivery of the electronic message to the intended recipient when the spam-score does not cross an overall threshold, and delivering the electronic message to the intended recipient based on the adjusted likelihood when the electronic message is determined to be associated with the desirable business.
摘要:
According to the described embodiments, an intermediate electronic messaging service is inserted into a message delivery path connecting to an e-mail entity such as an ISP. A database is provided in the intermediate service, the database having user profiles associated with the users of the ISP or other e-mail entity. The intermediate service receives email message over the electronic message delivery path into which it has been inserted, where the e-mail messages comprise at least content and IP routing information. Within the intermediate service, at least one of the content and the IP routing information of the received e-mail message is examined, and the e-mail message is then delivered to a destination based on the examination and in accordance with a user profile in the database in the intermediate service.
摘要:
Disclosed are systems and methods for use in filtering electronic messages using business heuristics. In one aspect, a method includes determining whether the electronic message is associated with a desirable business, and adjusting the likelihood of delivering the electronic message to an intended recipient of the message if the electronic message is determined to be associated with the desirable business. In a more specific embodiment, the method further includes assigning a spam-score to the electronic message based on a likelihood that the electronic message is not unwanted by the intended recipient, blocking delivery of the electronic message to the intended recipient when the spam-score does not cross an overall threshold, and delivering the electronic message to the intended recipient based on the adjusted likelihood when the electronic message is determined to be associated with the desirable business.
摘要:
Disclosed are systems and methods for use in filtering electronic messages using business heuristics. In one aspect, a method includes determining whether the electronic message is associated with a desirable business, and adjusting the likelihood of delivering the electronic message to an intended recipient of the message if the electronic message is determined to be associated with the desirable business. In a more specific embodiment, the method further includes assigning a spam-score to the electronic message based on a likelihood that the electronic message is not unwanted by the intended recipient, blocking delivery of the electronic message to the intended recipient when the spam-score does not cross an overall threshold, and delivering the electronic message to the intended recipient based on the adjusted likelihood when the electronic message is determined to be associated with the desirable business.