Perimeter message filtering with extracted user-specific preferences
    2.
    发明授权
    Perimeter message filtering with extracted user-specific preferences 有权
    提取用户特定偏好的周边消息过滤

    公开(公告)号:US08028026B2

    公开(公告)日:2011-09-27

    申请号:US11421367

    申请日:2006-05-31

    IPC分类号: G06F15/16

    摘要: Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.

    摘要翻译: 将一个或多个用户的邮件偏好从收件人邮箱传播到管理电子邮件内容阻止和路由的外部网络。 位于可信网络之外的内容过滤应用从可信网络内接收关于邮件接收者的消息收发偏好信息。 可以利用该消息收发偏好信息来允许来自特定发送者的某些预授权消息来绕过内容过滤。 此外,消息收发偏好信息可以被散列以进一步保护外围网络上的信息,并且加速审查和比较消息收发偏好信息。 此外,可以将其他类型的用户特定信息传播到周边网络以与除消息传送之外的其他应用一起使用。

    FILTERING OF ELECTONIC MAIL MESSAGES DESTINED FOR AN INTERNAL NETWORK
    3.
    发明申请
    FILTERING OF ELECTONIC MAIL MESSAGES DESTINED FOR AN INTERNAL NETWORK 有权
    针对内部网络过滤电子邮件消息

    公开(公告)号:US20110173272A1

    公开(公告)日:2011-07-14

    申请号:US12687259

    申请日:2010-01-14

    IPC分类号: G06F15/16

    CPC分类号: G06Q10/107

    摘要: A perimeter network may be utilized to filter electronic mail messages destined for an internal network. A computer may be utilized to monitor an electronic mail mailbox for changes to a safe recipients list and/or a blocked senders list. The computer may further be utilized to automatically copy the safe recipients list and/or the blocked senders list to a network directory in the internal network. The computer may further be utilized to automatically send the safe recipients list and/or the blocked senders list to a network directory in the perimeter network for utilization by one or more agents executing on a computer in the perimeter network. The one or more agents may be configured to utilize the safe recipients list and/or the blocked senders list to filter electronic mail messages received by the perimeter network which are destined for delivery to the internal network.

    摘要翻译: 外围网络可以用于过滤去往内部网络的电子邮件消息。 可以使用计算机来监视电子邮箱,以改变安全的收件人列表和/或阻止的发件人列表。 该计算机还可用于将安全接收者列表和/或被阻止的发送者列表自动复制到内部网络中的网络目录。 该计算机还可被用于将安全接收者列表和/或被阻止的发送者列表自动发送到外围网络中的网络目录,以供在周边网络中的计算机上执行的一个或多个代理人使用。 一个或多个代理可以被配置为利用安全收件人列表和/或被阻止的发件人列表来过滤由外部网络接收的电子邮件消息,这些邮件消息旨在传送到内部网络。

    System and method for efficiently scanning a file for malware
    4.
    发明授权
    System and method for efficiently scanning a file for malware 有权
    用于高效扫描恶意软件文件的系统和方法

    公开(公告)号:US07861296B2

    公开(公告)日:2010-12-28

    申请号:US11154267

    申请日:2005-06-16

    IPC分类号: G06F11/00

    CPC分类号: G06F21/51 G06F21/566

    摘要: The present invention is directed toward a system, method, and a computer-readable medium for efficiently loading data into memory in order to scan the data for malware. The logic provided in the present invention improves the experience of a user when operating a computer protected with antivirus software. One aspect of the present invention is a method that identifies a pattern in which data in a file is loaded into memory from a computer-readable medium. Then the method identifies a pattern in which data in the file may be loaded into memory in a way that minimizes the time required to read data in the file. When a subsequent scan of the file is scheduled to occur, the method causes data in the file to be loaded in memory using the pattern that minimizes the time required to read data in the file.

    摘要翻译: 本发明涉及一种用于将数据有效地加载到存储器中以便扫描恶意软件的数据的系统,方法和计算机可读介质。 本发明提供的逻辑提高了用户在操作受防病毒软件保护的计算机时的体验。 本发明的一个方面是从计算机可读介质中识别文件中的数据被加载到存储器中的模式的方法。 然后,该方法识别可以以最小化在文件中读取数据所需的时间的方式将文件中的数据加载到存储器中的模式。 当调度文件的后续扫描时,该方法会使文件中的数据使用最小化文件中读取数据所需的时间的模式加载到内存中。

    Smart card with volatile memory file subsystem
    5.
    发明授权
    Smart card with volatile memory file subsystem 有权
    智能卡带有易失性存储器文件子系统

    公开(公告)号:US07689795B2

    公开(公告)日:2010-03-30

    申请号:US11095203

    申请日:2005-03-31

    IPC分类号: G06F13/00

    摘要: An integrated circuit (IC) module allows volatile data generated by applications to be stored within volatile data files in the volatile memory. A file system tracks the location of all data files as residing in either volatile memory or nonvolatile memory and facilitates access to the volatile data files in volatile memory in a similar manner to accessing nonvolatile data files in nonvolatile memory. The file system exposes a set of application program interfaces (APIs) to allow applications to access the data files. The same APIs are used to access both volatile data files and nonvolatile data files. When an application requests access to a data file, the file system initially determines whether the application is authorized to gain access to the data file. If it is, the file system next determines whether the data file resides in volatile memory or nonvolatile memory. Once the memory region is identified, the file system identifies the physical location of the data file.

    摘要翻译: 集成电路(IC)模块允许由应用产生的易失性数据存储在易失性存储器中的易失性数据文件中。 文件系统跟踪驻留在易失性存储器或非易失性存储器中的所有数据文件的位置,并且以与在非易失性存储器中访问非易失性数据文件相似的方式便于访问易失性存储器中的易失性数据文件。 文件系统公开了一组应用程序接口(API),以允许应用程序访问数据文件。 使用相同的API来访问易失性数据文件和非易失性数据文件。 当应用程序请求访问数据文件时,文件系统最初确定应用程序是否被授权访问数据文件。 如果是,则文件系统接下来确定数据文件是驻留在易失性存储器还是非易失性存储器中。 一旦存储区域被识别,文件系统就会识别数据文件的物理位置。

    POST TRANSIT SPAM FILTERING
    6.
    发明申请
    POST TRANSIT SPAM FILTERING 审中-公开
    过帐垃圾邮件过滤

    公开(公告)号:US20080313285A1

    公开(公告)日:2008-12-18

    申请号:US11763256

    申请日:2007-06-14

    申请人: Mihai Costea

    发明人: Mihai Costea

    IPC分类号: G06F15/16

    摘要: A system filters for electronic messages received from recently identified sources of unsolicited spam. A database comprises information regarding electronic messages that were previously received. The information may comprise an identification of the source of the electronic message. A server is programmed to identify sources of unsolicited electronic messages and search the database for electronic messages previously received from the identified source. The server is programmed to attempt to remove the previously received electronic messages originating from the identified source of spam from users' electronic message boxes prior to being viewed by the intended recipients.

    摘要翻译: 系统过滤从最近确定的未经请求的垃圾邮件来源收到的电子信息。 数据库包括关于先前接收的电子消息的信息。 信息可以包括电子消息的来源的标识。 服务器被编程为识别未经请求的电子消息的来源,并且搜索数据库中先前从所识别的源接收到的电子消息。 服务器被编程为在预期的接收者被查看之前尝试从用户的电子消息盒中去除先前接收到的来自所识别的垃圾邮件源的电子消息。

    Email message hygiene stamp
    7.
    发明申请
    Email message hygiene stamp 有权
    电邮留言卫报

    公开(公告)号:US20070050444A1

    公开(公告)日:2007-03-01

    申请号:US11215823

    申请日:2005-08-30

    IPC分类号: G06F15/16

    摘要: Techniques for eliminating duplicate/redundant scanning of email messages while the email message traverses the various servers within an email infrastructure are provided. Some techniques utilize a message hygiene stamp that is transported with the email message as the email message enters an enterprise and is routed within the enterprise until the email message reaches the end user inbox. The filters comprise logic that enables the filters to annotate the result of their filtering or other processing in corresponding message hygiene stamps. The message hygiene stamps allow the filters to determine whether the email message has already been processed by the filter within the email infrastructure.

    摘要翻译: 提供了在电子邮件消息遍历电子邮件基础结构中的各种服务器时消除电子邮件的重复/冗余扫描的技术。 一些技术利用随着电子邮件消息进入企业而被传送的消息卫生信息,并且在企业内路由,直到电子邮件消息到达最终用户收件箱。 滤波器包括逻辑,使得滤波器能够在相应的消息卫生标签中注释其滤波或其他处理的结果。 消息卫生标签允许过滤器确定电子邮件基础结构中的过滤器是否已经处理了电子邮件消息。

    Method and system for dynamic software updates
    8.
    发明申请
    Method and system for dynamic software updates 审中-公开
    用于动态软件更新的方法和系统

    公开(公告)号:US20050257205A1

    公开(公告)日:2005-11-17

    申请号:US10845300

    申请日:2004-05-13

    IPC分类号: G06F9/44 G06F9/445

    CPC分类号: G06F8/65

    摘要: A system and method for dynamically updating digital information, such as a data file, between computing devices in a computer network are provided. The digital information identifier, such as a file name, and a unit identifier, such as a size, of the digital information are provided by a publishing computing device. The publishing computing device receives a request for a delta portion of the identified digital information and, in response to the request, dynamically generates a patch including a copy of the requested information. Once the patch is generated, publishing computing device provides the patch to the party requesting the information.

    摘要翻译: 提供了一种在计算机网络中的计算设备之间动态地更新诸如数据文件之类的数字信息的系统和方法。 诸如文件名的数字信息标识符和诸如数字信息的大小的单元标识符由发布计算设备提供。 发布计算设备接收对所识别的数字信息的增量部分的请求,并且响应于该请求动态地生成包括所请求信息的副本的补丁。 生成补丁后,发布计算设备会向请求信息的一方提供补丁。

    REPUTATIONAL AND BEHAVIORAL SPAM MITIGATION
    9.
    发明申请
    REPUTATIONAL AND BEHAVIORAL SPAM MITIGATION 审中-公开
    宣传和行为防范

    公开(公告)号:US20130018965A1

    公开(公告)日:2013-01-17

    申请号:US13180877

    申请日:2011-07-12

    IPC分类号: G06F15/16

    CPC分类号: G06Q10/107 G06Q50/01

    摘要: One or more techniques and/or systems are provided for identifying abusive message objects (e.g., URLs, email addresses, etc.), abusive infrastructure components and/or abusive users of a message communication medium(s). In particular, abusive message objects may be identified by aggregating abuse reports to assign abuse values to message objects used within messages by reported users identified within the abuse reports. Abusive users may be identified based upon (e.g., unreported) users that have sent messages comprising message objects identified as abusive. Users may also be identified as abusive users based upon account usage patterns within the message communication medium(s) (e.g., a broadcast usage pattern where a user sends a large number of messages, but receives few responses). Additionally, infrastructure components associated with abusive users may be identified as abusive infrastructure components. In this way, abusive content, such as spam, may be identified and/or mitigated within the message communication medium(s).

    摘要翻译: 提供一个或多个技术和/或系统用于识别消息通信介质的滥用消息对象(例如,URL,电子邮件地址等),滥用的基础设施组件和/或滥用用户。 特别地,滥用消息对象可以通过聚合滥用报告来识别,以将滥用值分配给在滥用报告内识别的报告用户在消息内使用的消息对象。 可以基于(例如,未报告的)已经发送消息的用户识别滥用用户,所述消息包括被识别为滥用的消息对象。 用户还可以基于消息通信介质(例如,用户发送大量消息但是接收到很少响应的广播使用模式)中的帐户使用模式被识别为滥用用户。 此外,与滥用用户相关联的基础架构组件可能被识别为滥用的基础架构组件。 以这种方式,可以在消息通信介质内识别和/或缓解诸如垃圾邮件之类的滥用内容。

    Human Interactive Proofs Leveraging Virtual Techniques
    10.
    发明申请
    Human Interactive Proofs Leveraging Virtual Techniques 审中-公开
    人类互动证据利用虚拟技术

    公开(公告)号:US20120154434A1

    公开(公告)日:2012-06-21

    申请号:US12975078

    申请日:2010-12-21

    申请人: Mihai Costea

    发明人: Mihai Costea

    IPC分类号: G09G5/00 G06T11/00

    摘要: Human interactive proofs that leverage virtual techniques are described. In one or more implementations, an object is inserted to be displayed as part of a virtual scene and the virtual scene having the object is exposed as a human interactive proof that includes a question that relates to the inserted object.

    摘要翻译: 描述了利用虚拟技术的人际互动证明。 在一个或多个实现中,插入对象以作为虚拟场景的一部分显示,并且具有对象的虚拟场景作为包含与所插入对象相关的问题的人类交互式证明被公开。