$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/173
출원번호 US-0006527 (1998-01-13)
발명자 / 주소
  • Paul Sunil
출원인 / 주소
  • Bright Light Technologies, Inc.
대리인 / 주소
    Covington & Burling
인용정보 피인용 횟수 : 568  인용 특허 : 7

초록

A system for eliminating unsolicited electronic mail generates and stores a user inclusion list including identification data for identifying e-mail desired by the user. Data from one or more fields of incoming electronic mail messages are compared with the identification data stored in the user inc

대표청구항

[ I claim:] [1.] A method for filtering electronic mail addressed to a user, comprising the steps of:storing a user inclusion list including identification data for identifying e-mail desired by the user;receiving an electronic mail message;comparing data from said received electronic mail message w

이 특허에 인용된 특허 (7)

  1. Hall Robert J., Communications addressing system.
  2. Duvall William S. ; Kendall Matthew, Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering a.
  3. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  4. Post Mark J., Method and apparatus for information stream filtration using tagged information access and action registration.
  5. Nielsen Jakob, Method and apparatus for receiving electronic mail.
  6. Scannell Niamh C. (Mountain View CA) Dawson Stuart D. (Reading GB2) Redmond Anthony J. (Dublin IEX) Himbaut Serge (Antibes FRX) Bares Pascale (Villeneuve Loubet FRX) Clark Alison (Morpeth GB2), Method and system for sorting and prioritizing electronic mail messages.
  7. Cohen Elliot D., Offensive message interceptor for computers.

이 특허를 인용한 특허 (568)

  1. Schlegel, Heather Allison; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Chung, Chris Chih-Shen; Odell, James A.; McNally, Barbara; Enloe, Michael Robert; Wu, Pei-Lin; Richards, Russell William; Inch, Alexis; Cox, David; Zhang, Xiaopeng; Cypes, Gregory; McCormick, David, Account linking.
  2. Shuster,Brian Mark, Addressee-defined mail addressing system and method.
  3. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  4. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  5. Rodgers,Dion; Boggs,Darrell; Merchant,Amit; Kota,Rajesh; Hsu,Rachel, Alteration of functional unit partitioning scheme in multithreaded processor based upon thread statuses.
  6. Spiegel, Evan; Murphy, Robert, Apparatus and method for alternate channel communication initiated through a common message thread.
  7. Spiegel, Evan; Murphy, Robert; Samaranayake, Chamal, Apparatus and method for alternate channel communication initiated through a common message thread.
  8. Murphy, Robert; Spiegel, Evan, Apparatus and method for automated privacy protection in distributed images.
  9. Samaranayake, Chamal, Apparatus and method for dynamically configuring application component tiles.
  10. Spiegel, Evan, Apparatus and method for maintaining a message thread with opt-in permanence for entries.
  11. Spiegel, Evan; Sehn, Timothy, Apparatus and method for maintaining a message thread with opt-in permanence for entries.
  12. Syiek, Bronwyn; Bhanap, Nina; Gowda, Rakesh; Guntha, Ramesh, Apparatus and method for precluding e-mail distribution.
  13. Saito, Kyoji, Apparatus and method for receiving image.
  14. Saito,Kyoji, Apparatus and method for receiving image.
  15. Spiegel, Evan, Apparatus and method for single action control of social network profile access.
  16. Sehn, Timothy, Apparatus and method for supplying content aware photo filters.
  17. Sehn, Timothy, Apparatus and method for supplying content aware photo filters.
  18. Sehn, Timothy, Apparatus and method for supplying content aware photo filters.
  19. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan; Medlar, Art, Apparatus and method for weighted and aging spam filtering rules.
  20. Encinas,Susan; Winarski,Daniel J., Apparatus and method to identify SPAM emails.
  21. Peng, Luosheng, Apparatus and methods for providing coordinated and personalized application and data management for resource-limited mobile devices.
  22. Peng, Luosheng, Apparatus and methods for providing data synchronization by facilitating data synchronization system design.
  23. Peng, Luosheng, Apparatus and methods for providing personalized application search results for wireless devices based on user profiles.
  24. Bates Cary Lee ; Day Paul Reuben, Apparatus, program products and methods utilizing intelligent contact management.
  25. Crandell, Jeffrey L.; Wharton, Brian K., Apparatus, systems and methods for managing incoming and outgoing communication.
  26. Aravamudan Murali ; Henrick Robert F. ; Sundar Rangamani ; Xikes Gregory James, Assignable associate priorities for user-definable instant messaging buddy groups.
  27. Nutkis, Daniel, Auditor system.
  28. Nutkis, Daniel, Auditor system.
  29. Rosenthal, Vivian; Bone, Steven Austin; Rakovitsky, Dmitry, Augmented reality virtual content platform apparatuses, methods and systems.
  30. Rosenthal, Vivian; Bone, Steven Austin; Rakovitsky, Dmitry, Augmented reality virtual content platform apparatuses, methods and systems.
  31. Rosenthal, Vivian; Bone, Steven Austin; Rakovitsky, Dmitry, Augmented reality virtual content platform apparatuses, methods and systems.
  32. Ralston,Geoffrey D.; Nakayama,David H.; Lewin,Matthew E.; Jayachandran,Ravichandran Menon; Woods,Brian R.; Manber,Udi, Automated bulk communication responder.
  33. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Automated response to computer users context.
  34. Robarts, James O.; Newell, Dan; Abbott, Kenneth H., Automated selection of appropriate information based on a computer user's context.
  35. Robarts, James O.; Newell, Dan; Abbott, Kenneth H., Automated selection of appropriate information based on a computer user's context.
  36. Robarts,James O.; Newell,Dan; Abbott,Kenneth H., Automated selection of appropriate information based on a computer user's context.
  37. Robarts,James O.; Newell,Dan; Abbott,Kenneth H., Automated selection of appropriate information based on a computer user's context.
  38. Zheng,Hao; Chu,Bruce Hui der; Kundu,Anirban; Libbey,Miles A.; Nakayama,David H.; Zhu,Jing, Automated solicited message detection.
  39. Caughey,David A., Automatic highlighting of new electronic message address.
  40. Harris, Scott C., Automatic mail rejection feature.
  41. Gilmour, David L.; Epelman-Wang, Hernan; Goldberg, Jonathan M.; Sanders, Richard; Wang, Eric, Automatic management of terms in a user profile in a knowledge management system.
  42. Appelman, Barry, Automatically enabling the forwarding of instant messages.
  43. Appelman, Barry, Automatically enabling the forwarding of instant messages.
  44. Appelman, Barry, Automatically enabling the forwarding of instant messages.
  45. Appelman, Barry, Automatically enabling the forwarding of instant messages.
  46. Appelman, Barry, Automatically enabling the forwarding of instant messages.
  47. Appleman, Barry, Automatically enabling the forwarding of instant messages.
  48. Appleman, Barry, Automatically enabling the forwarding of instant messages.
  49. Johnson, Bruce; Gupta, Anoop; Czerwinski, Mary P.; Curtis, Pavel; McAniff, Richard J.; Ozzie, Raymond E.; Barga, Roger S., Automatically managing incoming communications between sender and recipient, analyzing factors, selectively applying observed behavior, performing designated action.
  50. Lu, Ho-Lung; Chang, Yuan Lung, Base of handheld device having email access function.
  51. McClung, III,Guy L., Business system.
  52. McClung, III, Guy L., Business systems with price guarantee and display.
  53. Kucharewski, Valerie; Traylor, Michael; Buonomo, Michael Anthony; Panzer, John; Mazzeo, Jack, Central people lists accessible by multiple applications.
  54. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timoth T.; Goldman, Phillip Y., Centralized behavioral information system.
  55. Brennan, Todd, Centralized timed analysis in a network security system.
  56. Malik,Dale W.; Daniell,W. Todd, Child protection from harmful email.
  57. Rajan, Vadakkedathu Thomas; Crawford, Jason L.; Wegman, Mark N., Classification of electronic mail into multiple directories based upon their spam-like properties.
  58. Rochelle, Jonathan; Lemonik, Micah; Khosrowshahi, Farzad; Danaher, John Stephen, Collaborative workflow through messaging conversations.
  59. Rochelle, Jonathan; Lemonik, Micah; Khosrowshahi, Farzad; Danaher, John Stephen, Collaborative workflow through messaging conversations.
  60. Rochelle, Jonathan; Lemonik, Micah; Khosrowshahi, Farzad; Danaher, John Stephen, Collaborative workflow through messaging conversations.
  61. Rochelle, Jonathan; Lemonik, Micah; Khosrowshahi, Farzad; Danaher, John Stephen, Collaborative workflow through messaging conversations.
  62. Rochelle, Jonathan; Lemonik, Micah; Khosrowshahi, Farzad; Danaher, John Stephen, Collaborative workflow through messaging conversations.
  63. Rochelle, Jonathan; Lemonik, Micah; Khosrowshahi, Farzad; Danaher, John Stephen, Collaborative workflow through messaging conversations.
  64. Sampson,Scott E., Communication management using a token action log.
  65. Goldfinger, Yair, Communication system and method.
  66. Goldfinger,Yair, Communication system and method.
  67. Goldfinger,Yair, Communication system and method.
  68. Landsman, Richard A., Community messaging lists for authorization to deliver electronic messages.
  69. Pang Stephen Y., Computer code for removing junk e-mail messages.
  70. Sehn, Timothy, Content delivery network for ephemeral objects.
  71. Sehn, Timothy, Content delivery network for ephemeral objects.
  72. Brennan, Todd, Content extractor and analysis system.
  73. Zimerman, Gadi; Sadeh, Ido, Content request by location.
  74. Kohanim, Greg A.; Wiedemann, Jonathan L; Jefson, Christine A.; Snelling, David Aaron Ward, Content searching and configuration of search results.
  75. Kohanim, Greg A; Wiedemann, Jonathan L; Jefson, Christine A.; Snelling, David Aaron Ward, Content searching and configuration of search results.
  76. Robarts, James O.; Matteson, Eric L., Contextual responses based on automated learning techniques.
  77. Sampson, Scott E., Controlling the validity status of communicated messages.
  78. Satish, Sourabh, Countering spam through address comparison.
  79. Al Majid, Newar Husam; Chang, Sheldon; Gong, Yunchao; Ouimet, Kirk; Zhao, Haibo, Customized user-controlled media overlays.
  80. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  81. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  82. Roskind, James A.; Emigh, Aaron T., Detecting and processing suspicious network communications.
  83. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  84. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  85. Longe, Michael R.; Bradford, Ethan R.; Kay, David J.; van Meurs, Pim, Disambiguating ambiguous characters.
  86. Mark Raymond Pace ; Brooks Cash Talley, Distributed content identification system.
  87. Lai, William Y.; Kalki, Jagadeesh, Distributing notifications to multiple recipients via a broadcast list.
  88. Gross,John N.; Gross,Anthony A., Document distribution control system and method based on content.
  89. Johnston, Scott M.; Sladden, Mandy Richau; Gunn, Ian; Cooper, Nicholas, Document processing service for displaying comments included in messages.
  90. Pollack, Jordan B.; Sack, Andy M., Dual-use email system.
  91. Appelman, Barry; Buonviri, Terry Christian; Buonviri, Joseph Paul; Erickson, Andrew Ivar; Jarmolowski, Thomas; Weltman, Robert Eugene, Dynamic identification of other users to an online user.
  92. Appelman, Barry; Erickson, Andrew Ivar; Lu, Larry L.; Weltman, Robert Eugene, Dynamic location of a subordinate user.
  93. Appelman, Barry; Erickson, Andrew Ivar; Lu, Larry L.; Weltman, Robert Eugene, Dynamic online and geographic location of a user.
  94. Abbott, Kenneth H.; Newell, Dan; Robarts, James O.; Swapp, Ken; Freedman, Joshua M., Dynamically determining a computer user's context.
  95. Abbott, Kenneth H.; Newell, Dan; Robarts, James O., Dynamically displaying current status of tasks.
  96. Michael Olivier, Dynamically matching users for group communications based on a threshold degree of matching of sender and recipient predetermined acceptance criteria.
  97. Shuster, Gary Stephen, E-mail authentication.
  98. Shuster, Gary Stephen, E-mail authentication.
  99. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, E-mail filtering services and e-mail service enrollment techniques.
  100. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, E-mail filtering services using Internet protocol routing information.
  101. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, E-mail management services.
  102. Petry,Scott; Irlam,Gordon Raymond; Maggi,Brian, E-mail policy compliance techniques.
  103. Takayama, Norihisa, E-mail transmission apparatus, e-mail transmission method and e-mail transmission program.
  104. Shraim, Ihab; Shull, Mark, Early detection and monitoring of online fraud.
  105. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Efficient use of resources in message classification.
  106. Petry, Scott M.; Irlam, Gordon R.; Maggi, Brian, Electronic document policy compliance techniques.
  107. Martin E. Fishkin, Electronic mail system.
  108. Jennifer M. Botts ; Karen L. Musson ; Elizabeth M. Stites ; Douglas C. Weber ; David A. Wilson, Electronic massage management system.
  109. Appelman, Barry; Hussain, Muhammad Mohsin, Electronic message delivery based on presence information.
  110. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  111. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  112. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  113. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Electronic message system with federation of trusted senders.
  114. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Susan Rayl, Electronic message system with federation of trusted senders.
  115. Odell, James A.; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Bergstrom, Raine; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Electronic messaging using reply telephone numbers.
  116. Maller,Steven T., Email filtering methods and systems.
  117. Maller,Steven T., Email filtering methods and systems.
  118. Owen, Brad; Steiner, Jason, Email filtering system and method.
  119. Gillum, Eliot C., Email trust service.
  120. Green, Mitchell Chapin; Chickering, Roger; Gang, David, Enhanced buddy list interface.
  121. Odell, James A.; Bergstrom, Raine; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Enhanced buddy list using mobile device identifiers.
  122. Odell, James A.; Bergstrom, Raine; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Enhanced buddy list using mobile device identifiers.
  123. Odell, James A.; Bergstrom, Raine; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Enhanced buddy list using mobile device identifiers.
  124. Emigh, Aaron T.; Roskind, James A., Enhanced challenge-response.
  125. Shraim, Ihab; Shull, Mark, Enhanced responses to online fraud.
  126. Allen, Nicholas; Giovannini, Donald; Lin, Chia-Yi; Murphy, Robert; Spiegel, Evan, Ephemeral gallery of ephemeral messages.
  127. Allen, Nicholas; Spiegel, Evan, Ephemeral gallery of ephemeral messages with opt-in permanence.
  128. Elvanoglu, Ferhan; Pierce, Shaun D., Executing dynamically assigned functions while providing services.
  129. Elvanoglu, Ferhan; Pierce, Shaun D., Executing dynamically assigned functions while providing services.
  130. Epelman-Wang, Hernan; Gilmour, David; Goldberg, Jonathan Michael; Hamel, Andrew; Trown, Nicolas; Wang, Eric, Expertise services platform.
  131. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  132. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  133. Heiner, Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  134. Daniell, W. Todd, Filtered email differentiation.
  135. Goldman, Phillip Y.; Landsman, Richard A.; Migliore, Michael R.; Heiner, Jeffrey N.; Logue, Jay, Filtering electronic messages while permitting delivery of solicited electronics messages.
  136. Malik, Dale W., Filtering email messages corresponding to undesirable domains.
  137. Malik,Dale W., Filtering email messages corresponding to undesirable domains.
  138. Seamus Brendan Donohue IR, Filtering incoming e-mail.
  139. Connelly, Michael; Quilici, Alexander E., Filtering incoming mails.
  140. Arthur, Bruce; Marcos, Paul; Christie, Greg; Bellegarda, Jerome R; Silverman, Kim E. A.; Forstall, Scott; Tiene, Kevin, Filtering of data.
  141. Malik, Dale W.; Verren, Theodore; Conner, William, Foreign network SPAM blocker.
  142. Sehn, Timothy, Gallery of messages from individuals with a shared interest.
  143. Sehn, Timothy, Gallery of videos set to an audio time line.
  144. Eck, Charles P.; Kamada, Hiroshi; Comair, Claude, Game machine having wireless communication capability.
  145. Eck,Charles P.; Kamada,Hiroshi; Comair,Claude, Game machine having wireless communication capability.
  146. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Generating and supplying user context data.
  147. Shraim, Ihab; Shull, Mark, Generating phish messages.
  148. Allen, Nicholas Richard; Murphy, Robert Cornelius; Spiegel, Evan, Geo-location based event gallery.
  149. Allen, Nicholas Richard; Murphy, Robert Cornelius; Spiegel, Evan, Geo-location based event gallery.
  150. Spiegel, Evan; Murphy, Robert; Allen, Nick, Geo-location based event gallery.
  151. Chang, Sheldon; Samaranayake, Chamal; Sehn, Timothy Michael; Yan, Rong, Geo-location-based image filters.
  152. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
  153. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  154. Arning,Andreas; Roller,Dieter; Maier,Andreas, Handling of messages in a electronic messaging system.
  155. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  156. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  157. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  158. Yeager William J., High performance message store.
  159. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Host-based intelligent results related to a character stream.
  160. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Host-based intelligent results related to a character stream.
  161. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Host-based intelligent results related to a character stream.
  162. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Host-based intelligent results related to a character stream.
  163. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Host-based intelligent results related to a character stream.
  164. Emigh, Aaron T.; Roskind, James A., Hybrid challenge-response.
  165. Sutton, Jr., Lorin R.; Ben-Yoseph, Roy, Identification and filtration of digital communications.
  166. Ben-Yoseph, Roy, Identifying and using identities deemed to be known to a user.
  167. Ben-Yoseph, Roy, Identifying and using identities deemed to be known to a user.
  168. Alles, David; Moore, George M., Identity-based distributed computing for device resources.
  169. Shono,Hiroki, Image processing apparatus, image processing method, and program for controlling image processing apparatus.
  170. Anderson, Christine; Shahine, Omar; Kikin-Gil, Erez; Yang, Sara Liu; Schnoebelen, Tyler; Bell, Nancy Jane; Chan, Wendy; Stovicek, Thomas Jan; Hirsh, Sandra, Inbox with focused messages according to categories.
  171. Amjadi, Kamran, Incentive network for distributing incentives on a network-wide basis and for permitting user access to individual incentives from a plurality of network servers.
  172. Amjadi, Kamran, Incentive network for distributing incentives on a network-wide basis and for permitting user access to individual incentives from a plurality of network servers.
  173. Amjadi, Kamran, Incentive network for distributing incentives on a network-wide basis and for permitting user access to individual incentives from a plurality of network servers.
  174. Armstrong, Christopher; Keister, Alan; Dunham, Lark; Granito, Jennifer; Greenberg, Steven; Agrawal, Rakesh; Sommers, Michael; Glover, Carol A., Indicating recent content publication activity by a user.
  175. Armstrong, Christopher; Keister, Alan; Dunham, Lark; Granito, Jennifer; Greenberg, Steven; Agrawal, Rakesh; Sommers, Michael; Glover, Carol A., Indicating recent content publication activity by a user.
  176. Armstrong, Christopher; Keister, Alan; Dunham, Lark; Granito, Jennifer; Greenberg, Steven; Agrawal, Rakesh; Sommers, Michael; Glover, Carol A., Indicating recent content publication activity by a user.
  177. Armstrong, Christopher; Keister, Alan; Dunham, Lark; Granito, Jennifer; Greenberg, Steven; Agrawal, Rakesh; Sommers, Michael; Glover, Carol A., Indicating recent content publication activity by a user.
  178. Henry,Steven G; Meyer,Gerald L; Chavez,Martha A, Information caching system and method.
  179. Hashimoto, Hitoshi, Information processing apparatus and time-limit display method.
  180. Rothwell,Anton C.; Jagger,Luke D.; Dennis,William R.; Clarke,David R., Intelligent SPAM detection system using statistical analysis.
  181. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent client capability-based results related to a character stream.
  182. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent community based results related to a character stream.
  183. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent map results related to a character stream.
  184. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent messaging label results related to a character stream.
  185. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results based on database queries.
  186. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results related to a character stream.
  187. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results related to a portion of a search query.
  188. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results using a spelling correction agent.
  189. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results using an assistant.
  190. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent vendor results related to a character stream.
  191. Lee, Chan W.; Hinton, Glenn; Krick, Robert, LRU cache replacement for a partitioned set associative cache.
  192. Noeth, Eric; DeWitt, Zachary; Diepenbrock, Matthew, Location-based messaging.
  193. Noeth, Eric; DeWitt, Zachary; Diepenbrock, Matthew, Location-based messaging.
  194. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Logging and analyzing computer user's context data.
  195. Abbott, Ken; Freedman, Josh; Newell, Dan; Robarts, Jim, Logging and analyzing context attributes.
  196. McQueen, Donald J.; Maxwell, Lachlan A., Machine learning and validation of account names, addresses, and/or identifiers.
  197. Maghsoodnia, Mehdi; Roth, Lewis D; Mangin, Frank; Khodosh, Yuri; Abhyankar, Rahul; Sherstinsky, Alex; Petviashvili, Joseph; Mandel, Eugene; Onusko, John, Management capabilities for real-time messaging networks.
  198. Sampson,Scott E., Managing a message communication and file system.
  199. Mellmer, Joseph Andrew; Young, Russell T.; Perkins, Arn D.; Robertson, John M.; Sabin, Jeffrey Neil; McDonald, Michael C.; Phillips, Douglas; Sheridan, Robert Michael; Nazeer, Nadeem Ahmad; Higley, DeeAnne Barker; Carter, Stephen R.; Earl, Douglas G.; Sonderegger, Kelly E.; Ferguson, Daniel T.; Brough, Farrell Lynn, Managing digital identity information.
  200. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  201. Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing electronic messages.
  202. Ben-Yoseph, Roy, Managing electronic messages based on inference scores.
  203. Odell, James A.; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Bergstrom, Raine; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Managing electronic messages sent to reply telephone numbers.
  204. Landsman,Richard A.; Sullivan,Timothy Thomas; Logue,Jay Dare, Managing electronic messages using contact information.
  205. Odell, James A.; Bergstrom, Raine; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Managing forwarded electronic messages.
  206. Abbott, Kenneth H.; Newell, Dan; Robarts, James O.; Freedman, Joshua M., Managing interactions between computer users' context models.
  207. Klein, Dean A., Managing redundant electronic messages.
  208. Klein, Dean A., Managing redundant electronic messages.
  209. Logue, Jay; Heiner, Jeffrey N.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing self-addressed electronic messages.
  210. Abbott, Kenneth H.; Newell, Dan; Robarts, James O.; Freedman, Joshua M.; Apacible, Johnson, Mediating conflicts in computer users context data.
  211. Emigh, Aaron T.; Roskind, James A., Message authorization.
  212. Odell, James A.; Bergstrom, Raine; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Message delivery control settings.
  213. Shuster, Gary Stephen, Message filtering method.
  214. Shuster, Gary Stephen, Message filtering method.
  215. Shuster, Gary Stephen, Message filtering method.
  216. Spiegel, Evan; Wu, William, Message processor with application prompts.
  217. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  218. Lu, Larry L., Message screening system.
  219. Lu, Larry L., Message screening system.
  220. Lu,Larry L., Message screening system.
  221. Lu, Larry L., Message screening system utilizing supervisory screening and approval.
  222. Lu, Larry L., Message screening system utilizing supervisory screening and approval.
  223. Pelkey, Casey J.; Smith, Darren C., Messaging service for information processing systems.
  224. Pelkey, Casey J.; Smith, Darren C., Messaging service for video game systems.
  225. Pelkey,Casey J.; Smith,Darren C., Messaging service for video game systems with buddy list that displays game being played.
  226. Friskel, James, Messaging system for indicating status of a sender of electronic mail and method and computer program product therefor.
  227. Landsman, Richard A., Messaging systems and methods.
  228. Landsman, Richard A., Messaging systems and methods.
  229. David L. Gilmour, Method and apparatus for assigning a confidence level to a term within a user knowledge profile.
  230. Gilmour, David L., Method and apparatus for assigning a confidence level to a term within a user knowledge profile.
  231. Chin, Ren; Cowings, David; Jensen, Sanford, Method and apparatus for certifying mass emailings.
  232. David L. Gilmour ; Eric Wang, Method and apparatus for constructing and maintaining a user knowledge profile.
  233. Gilmour, David L.; Wang, Eric, Method and apparatus for constructing and maintaining a user knowledge profile.
  234. Gilmour, David L.; Wang, Eric, Method and apparatus for constructing and maintaining a user knowledge profile.
  235. Gilmour, David L.; Wang, Eric, Method and apparatus for constructing and maintaining a user knowledge profile.
  236. Sager, David J., Method and apparatus for controlling the processing priority between multiple threads in a multithreaded processor.
  237. Sager, David J., Method and apparatus for controlling the processing priority between multiple threads in a multithreaded processor.
  238. Dion Rodgers ; Bret Toll ; Aimee Wood, Method and apparatus for disabling a clock signal within a multithreaded processor.
  239. Pollack, Jordan; Cutts, Shaun; Rodriguez, Andres; Stevenson, Jeremy; Umanoff, Zak, Method and apparatus for distributing information to users.
  240. Pollack, Jordan; Cutts, Shaun; Rodriguez, Andres; Stevenson, Jeremy; Umanoff, Zak, Method and apparatus for distributing information to users.
  241. Rudd, Kevin W.; Walterscheidt, Udo, Method and apparatus for ensuring fairness and forward progress when executing multiple threads of execution.
  242. Rodgers, Dion; Boggs, Darrell; Merchant, Amit; Kota, Rajesh; Hsu, Rachel, Method and apparatus for entering and exiting multiple threads within a multithreaded processor.
  243. Pollack, Jordan; Cutts, Shaun; Rodriguez, Andres, Method and apparatus for evaluating relevancy of messages to users.
  244. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan; Medlar, Art, Method and apparatus for filtering E-mail.
  245. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan, Method and apparatus for filtering e-mail.
  246. Gleeson, Matt; Hoogstrate, David; Jensen, Sandy; Mantel, Eli; Medlar, Art; Schneider, Ken, Method and apparatus for filtering email spam using email noise reduction.
  247. Gleeson, Matt; Hoogstrate, David; Jensen, Sandy; Mantel, Eli; Medlar, Art; Schneider, Ken, Method and apparatus for filtering email spam using email noise reduction.
  248. Billmers Meyer Alvin, Method and apparatus for filtering incoming information using a search engine and stored queries defining user folders.
  249. Donaldson Albert L., Method and apparatus for filtering junk email.
  250. Cowings, David; Jensen, Sanford; Wiegner, Carlin, Method and apparatus for maintaining reputation lists of IP addresses to detect email spam.
  251. Boggs,Darrell D.; Weiss,Shlomit, Method and apparatus for managing resources in a multithreaded processor.
  252. Aoki,Norihiro Edwin, Method and apparatus for managing subscription-type messages.
  253. Gilmour, David L., Method and apparatus for managing user profiles including identifying users based on matched query term.
  254. Wang, Xuejun; Acton, Brian; Panchapakesan, Venkat, Method and apparatus for performing a search.
  255. Smith, Lawrence O.; Rodgers, S. Dion, Method and apparatus for processing events in a multithreaded processor.
  256. Gilmour David L., Method and apparatus for querying a user knowledge profile.
  257. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  258. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  259. Sherstinsky, Alex; Petviashvili, Joseph; Mandel, Eugene; Christensen, Jonathan, Method and apparatus for secure IM communications using an IM module.
  260. Cheng, Yun Chian, Method and architecture for blocking email spams.
  261. Wang, Xuejun; Acton, Brian L.; Panchapakesan, Venkat, Method and computer storage medium for search scoring.
  262. Kynast,Andreas; Plumeier,Joerg, Method and device for managing mobile telephone messages.
  263. Pang,Stephen Y., Method and device for removing junk e-mail messages.
  264. Stephen Y. Pang, Method and device for removing junk e-mail messages.
  265. Baluja, Shumeet; Rowley, Henry A., Method and system for activity based email sorting.
  266. Gilmour, David L.; Wang, Hua-Wen; Goldberg, Jonathan M., Method and system for addressing a communication document for transmission over a network based on the content thereof.
  267. Sommerer, Peter, Method and system for automatically updating contact information within a contact database.
  268. Sommerer,Peter, Method and system for automatically updating contact information within a contact database.
  269. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  270. Heikes, Brian Dean; Krantz, Kristine Amber; Mathews, Kelly Monroe; Medeiros, Russell Scott; Ramanathan, Venkatesh; Robinson, Jr., Richard W.; Roman, Perry E. Miranda; Sears, Edward L.; Wick, Andrew L.; Yurow, Deborah Ruth, Method and system for capturing instant messages.
  271. Raanan, Gil; Moran, Tal; Galant, Yaron; El-Hanani, Yuval; Reshef, Eran, Method and system for extracting application protocol characteristics.
  272. Cobb, Christopher Alan, Method and system for filtering electronic messages.
  273. Dröse, Michael; Kozak, Tadeusz; Seggie, Kavan Antony; Sobinov, Dmitry, Method and system for integrating real time communication features in applications.
  274. Dröse, Michael; Kozak, Tadeusz; Seggie, Kavan Antony; Sobinov, Dmitry, Method and system for integrating real time communication features in applications.
  275. Dröse, Michael; Kozak, Tadeusz; Seggie, Kavan Antony; Sobinov, Dmitry, Method and system for integrating real time communication features in applications.
  276. Dean A. Klein, Method and system for managing related electronic messages.
  277. Baumard, Philippe, Method and system for measuring interest levels of digital messages.
  278. Baumard,Philippe, Method and system for measuring interest levels of digital messages.
  279. Bates, Cary Lee; Day, Paul Reuben; Santosuosso, John Matthew, Method and system for predicting and managing undesirable electronic mail.
  280. Fiedotin, Richard Alan; Tangney, Jeffrey Alan; Lee, Thomas Ho, Method and system for providing current industry specific data to physicians.
  281. Fiedotin,Richard Alan; Tangney,Jeffrey Alan; Lee,Thomas Ho, Method and system for providing current industry specific data to physicians.
  282. Forman, Ira Richard; Malik, Nadeem, Method and system for screening electronic messages.
  283. Elkan,Charles, Method and system for selecting documents by measuring document quality.
  284. Greenstein Bret A., Method for blocking all unwanted e-mail (SPAM) using a header-based password.
  285. Jude Gerard Dieterman, Method for controlling the delivery of electronic mail messages.
  286. Cunningham, Brian, Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification.
  287. Quine, Douglas B., Method for providing address change notification in an electronic message forwarding system.
  288. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Method for removing unsolicited e-mail messages.
  289. Drummond, Kirk; Fields, Duane Kimbell; Gregg, Thomas Preston; Kolb, Mark Andrew, Method for restricting delivery of unsolicited E-mail.
  290. Caughey,David A., Method of automatically populating contact information fields for a new contract added to an electronic contact database.
  291. David L. Gilmour, Method of constructing and displaying an entity profile constructed utilizing input from entities other than the owner.
  292. Gilmour, David L., Method of constructing and displaying an entity profile constructed utilizing input from entities other than the owner.
  293. Grauman, Thomas, Method of graphically formatting e-mail message headers.
  294. Armatis, Kathleen C.; Herzberg, Carol E.; Schrader, David B., Method of maintaining database records.
  295. Cacace-Bailey, Melissa; Winkelman, John H.; Vitale, Alberta A.; Beck, Christian A., Method of removing mail from a mailstream using an incoming mail sorting apparatus.
  296. Gruen, Daniel M., Method, system and program product for transmitting electronic communications using automatically formed contact groups.
  297. Alagna, Michael Anthony; Payne, Charles Andrew; Loiodice, Luca; Smith, Todd Allen, Method, system, and computer program product for security within a global computer network.
  298. Kelley, Edward E.; Wilbrink, Tijs Y., Method, system, and storage medium for providing autonomic identification of an important message.
  299. Joyce, James B., Methods and apparatus for heuristic firewall.
  300. Appelman, Barry; Hussain, Muhammad Mohsin, Methods and system for delivering multiple notifications.
  301. Shraim, Ihab; Shull, Mark, Methods and systems for analyzing data related to possible online fraud.
  302. Shraim, Ihab; Shull, Mark, Methods and systems for analyzing data related to possible online fraud.
  303. Shraim,Ihab; Shull,Mark, Methods and systems for analyzing data related to possible online fraud.
  304. Heikes, Brian D.; Krantz, Kristine Amber; Matthews, Kelly Monroe; Medeiros, Russell Scott; Ramanathan, Venkatesh; Robinson, Richard W.; Roman, Perry E.; Sears, Edward L.; Wick, Andrew L.; Yurow, Deborah R., Methods and systems for capturing and managing instant messages.
  305. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  306. Hew, Chin; Kyaw, Thu Rein, Methods and systems for restricting electronic content access based on guardian control decisions.
  307. Heikes, Brian Dean; Krantz, Kristine Amber; Mathews, Kelly Monroe; Medeiros, Russell Scott; Ramanathan, Venkatesh; Robinson, Jr., Richard W.; Roman, Perry E. Miranda; Sears, Edward L.; Wick, Andrew L.; Yurow, Deborah Ruth, Methods for capturing electronic messages based on capture rules relating to user actions regarding received electronic messages.
  308. Heikes, Brian Dean; Krantz, Kristine Amber; Mathews, Kelly Monroe; Medeiros, Russell Scott; Ramanathan, Venkatesh; Robinson, Jr., Richard W.; Roman, Perry E. Miranda; Sears, Edward L.; Wick, Andrew L.; Yurow, Deborah Ruth, Methods for controlling display of electronic messages captured based on community rankings.
  309. Sampson, Scott E., Methods for managing the exchange of communication tokens.
  310. Ben-Yoseph, Roy, Methods of providing access to messages based on degrees of separation.
  311. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  312. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  313. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  314. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  315. Allen, Nicholas Richard; Bell, Nicholas James; Cooper, Andrew; Samaranayake, Chamal; Wu, William, Multichannel system.
  316. Fotta, Keith A.; Boudrieau, Richard P.; Ziemba, Jr., Robert E.; D'Amours, Norman M., Network calling privacy with recording.
  317. Fotta, Keith A.; Boudrieau, Richard P.; Ziemba, Jr., Robert E.; D'Amours, Norman M., Network calling privacy with recording.
  318. Buckingham,Jay T.; Mehr,John D.; Rehfuss,Paul S; Rounthwaite,Robert L., Network domain reputation-based spam filtering.
  319. Schuba, Christoph L.; Krsul, Ivan V.; Zamboni, Diego; Spafford, Eugene H.; Sundaram, Aurobindo M.; Kuhn, Markus G., Network protection for denial of service attacks.
  320. Pelkey, Casey J.; Smith, Darren C., Network server and computer system for providing access to user profiles.
  321. Pelkey, Casey J.; Smith, Darren C., Network server and computer system for providing user status data.
  322. Appelman, Barry; Hussain, Muhammad Mohsin, Notification archive.
  323. Austin-Lane, Christopher Emery, Offline alerts mechanism.
  324. Johnston, Scott; Sladden, Mandy; Gunn, Ian; Cooper, Nick, Online document processing service for displaying comments.
  325. Shraim, Ihab; Shull, Mark, Online fraud solution.
  326. Shraim, Ihab; Shull, Mark; Hepworth, James, Online fraud solution.
  327. Shraim, Ihab; Shull, Mark; Hepworth, James, Online fraud solution.
  328. Buford,John F.; Huang,Xiaolan, Parsing of nested internet electronic mail documents.
  329. Kucharewski, Valerie; Traylor, Michael; Buonomo, Michael Anthony; Panzer, John; Mazzeo, Jack, People lists.
  330. Kucharewski, Valerie; Traylor, Michael; Buonomo, Michael Anthony; Panzer, John; Mazzeo, Jack, People lists.
  331. Yabe, Toshiyasu; Soga, Makoto; Enatsu, Tomoko, Permission-based electronic mail delivery system.
  332. Daniell, W. Todd; Malik, Dale W., Phonetic filtering of undesired email messages.
  333. Smith, Jeffrey C.; Bandini, Jean-Christophe, Policy enforcement in a secure data file delivery system.
  334. Eck, Charles P.; Kamada, Hiroshi; Comair, Claude, Portable device having mobile communication capability.
  335. Eck, Charles P.; Kamada, Hiroshi; Comair, Claude, Portable electronic device having mobile communication capability.
  336. Eck, Charles P.; Kamada, Hiroshi; Comair, Claude, Portable electronic device having mobile communication capability.
  337. Goldman, Phillip Y., Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses.
  338. Appelman, Barry; Erickson, Andrew Ivar; Lu, Larry L.; Weltman, Robert Eugene, Presenting dynamic location of a user.
  339. Goodman, Joshua T.; Rounthwaite, Robert L.; Gillum, Eliot C., Prevention of outgoing spam.
  340. McClung, Guy, Price guarantee methods and systems.
  341. McClung, III, Guy Lamonte, Price guarantee methods and systems.
  342. Sehn, Timothy Michael, Prioritization of messages within a message collection.
  343. Sehn, Timothy Michael, Prioritization of messages within a message collection.
  344. Sehn, Timothy Michael, Prioritization of messages within gallery.
  345. Sehn, Timothy Michael, Prioritization of messages within gallery.
  346. Voticky, Michael; Conner, Joe, Prioritizing electronic messages based on the sender's address.
  347. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  348. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  349. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  350. Byers, Charles Calvin, Priority and security coding system for electronic mail messages.
  351. Sehn, Timothy, Priority based placement of messages in a geo-location based event gallery.
  352. Castelli, Eric L., Privacy control system for electronic communication.
  353. Castelli, Eric L., Privacy control system for electronic communication.
  354. Roseman, Stuart; Kovacs, Peter; Gloudon, Jason; Gloudon, Garvin; Leonov, Dmitri, Processing electronic messages.
  355. Roseman, Stuart; Lange, Kristoffer; Gloudon, Jason; Yanowitz, Jason; Kovacs, Peter, Processing electronic messages.
  356. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of textual electronic communication distributed in bulk.
  357. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic communication.
  358. Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic mail.
  359. Appelman, Barry, Prohibiting mobile forwarding.
  360. Appelman, Barry, Prohibiting mobile forwarding.
  361. Appelman, Barry, Prohibiting mobile forwarding.
  362. Appelman, Barry, Prohibiting mobile forwarding.
  363. Hulten, Geoffrey J; Seshadrinathan, Gopalakrishnan; Goodman, Joshua T.; Mishra, Manav; Pengelly, Robert C J; Rounthwaite, Robert L.; Colvin, Ryan C, Proofs to filter spam.
  364. Giles, Tadd H.; Kromann, Paul K., Rapidly obtaining a subset of message data from a server for filtering.
  365. Appelman, Barry; Hussain, Muhammad Mohsin, Reconfiguring an electronic message to effect an enhanced notification.
  366. Appelman, Barry; Hussain, Muhammad Mohsin, Reconfiguring an electronic message to effect an enhanced notification.
  367. Appelman, Barry; Hussain, Muhammad Mohsin, Reconfiguring an electronic message to effect an enhanced notification.
  368. Goldberg, Jonathan M., Rendering discriminator members from an initial set of result data.
  369. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  370. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  371. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  372. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  373. Gabe, Christopher John, Reputation-based method and system for determining a likelihood that a message is undesired.
  374. Gabe, Christopher John, Reputation-based method and system for determining a likelihood that a message is undesired.
  375. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Requesting computer user's context data.
  376. Toomey, Christopher, Restricting the volume of outbound electronic messages originated by a single entity.
  377. Gangi, Frank Joseph, Retail point-of-transaction system, program products, and related methods to provide a customized set of identification data to facilitate a transaction using electronic coupons.
  378. Garcia-Martin, Miguel A.; Haruna, Adamu, Retrieval of offline instant messages.
  379. Vargas, Garrett R.; Cover, Steven A.; Burgess, Gregory M.; Elmer, Robert C.; Giles, Tadd H., Rules interface for implementing message rules on a mobile computing device.
  380. Jagger, Luke D.; Dennis, William R.; Rothwell, Anton C., SPAM report generation system and method.
  381. Horvitz,Eric J.; Steckler,Paul A.; Pierce,Shaun D.; Fang,Lijiang; Lucovsky,Mark H.; Wu,Winnie C.; Shaw,Rhae Christie; Moore,George M.; Gehlsen,John M.; Sauntry,David M., Schema-based services for identity-based access to device data.
  382. Lucovsky, Mark H.; Pierce, Shaun Douglas; Movva, Ramu; Kalki, Jagadeesh; Auerbach, David Benjamin; Ford, Peter Sewall; Yuan, Yun-Qi; Guu, Yi-Wen; George, Samuel John; Hoffman, William Raymond; Jacobs, Jay Christopher; Steckler, Paul Andrew; Hsueh, Walter C.; Keil, Kendall D.; Gopal, Burra; White, Steven D.; Leach, Paul J.; Ward, Richard B.; Smoot, Philip Michael; Fang, Lijiang; Taylor, Michael B.; Kannan, Suresh; Wu, Winnie C., Schema-based services for identity-based data access.
  383. Lucovsky,Mark H.; Pierce,Shaun Douglas; White,Steven D.; Movva,Ramu; Kalki,Jagadeesh; Auerbach,David Benjamin; Ford,Peter Sewall; Jacobs,Jay Christopher; Steckler,Paul Andrew; Hsueh,Walter C.; Keil,Kendall D.; Gopal,Burra; Kannan,Suresh; Guu,Yi Wen; George,Samuel John; Hoffman,William Raymond; Smoot,Philip Michael; Fang,Lijiang; Taylor,Michael B.; Wu,Winnie C.; Leach,Paul J.; Ward,Richard B.; Yuan,Yun Qi, Schema-based services for identity-based data access.
  384. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  385. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  386. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  387. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  388. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  389. Mehanna, Lara, Search engine utilizing user navigated documents.
  390. Mehanna, Lara, Searching based on user interest.
  391. Armstrong, Christopher; Keister, Alan; Dunham, Lark; Granito, Jennifer; Greenberg, Steven; Agrawal, Rakesh; Sommers, Michael; Glover, Carol A., Searching recent content publication activity.
  392. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  393. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  394. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  395. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  396. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  397. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Self-policing, rate limiting online forums.
  398. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Self-policing, rate limiting online forums.
  399. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Self-policing, rate limiting online forums.
  400. Sehn, Timothy Michael; Son, Aaron, Social graph based co-location of network users.
  401. Nelken, Yoram; Hod, Ronen; Navot, Amir; Michelson, Sam; Jessee, Randy; Shacham, Tsachy; Lanin, Beth; Hajaj, Nissan; Margalit, Avi; Magdalen, Josemina; Cohen, Dani, Software tool for training and testing a knowledge base.
  402. Nelken, Yoram; Hod, Ronen; Navot, Amir; Michelson, Sam; Jessee, Randy; Shacham, Tsachy; Lanin, Beth; Hajaj, Nissan; Margalit, Avi; Magdalen, Josemina; Cohen, Dani, Software tool for training and testing a knowledge base.
  403. Abbott, Kenneth H.; Robarts, James O.; Newell, Dan, Soliciting information based on a computer user's context.
  404. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  405. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  406. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  407. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  408. Goldman, Phillip Y; Landsman, Richard A, Sorting electronic messages using attributes of the sender address.
  409. Goldman,Phillip Y.; Landsman,Richard A., Sorting electronic messages using attributes of the sender address.
  410. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with blocking of TCP connections from sources of electronic messages.
  411. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with router-level filtering of electronic messages.
  412. Mehanna, Lara, Sourcing terms into a search engine.
  413. Sherstinsky, Alex; Petviashvili, Joseph; Young, Eric; Christensen, Jonathan, SpIM blocking and user approval techniques for real-time messaging networks.
  414. Aoki, Norihiro Edwin; Bentov, Shai Itzhak, Spam control based on sender account characteristics.
  415. Harris, Scott C., Spam detector defeating system.
  416. Goodman, Joshua Theodore; Rounthwaite, Robert L., Spam detector with challenges.
  417. Qutub, S. Shehryar; Sharma, Alok, Spam filtering for mobile communication devices.
  418. Bocharov, Alexei V.; Goodman, Joshua T., Spam filtration utilizing sender activity data.
  419. Austin-Lane, Christopher Emery, State change alerts mechanism.
  420. Austin-Lane, Christopher Emery, State change alerts mechanism.
  421. Abbott, III, Kenneth H.; Newell, Dan; Robarts, James O., Storing and recalling information to augment human memories.
  422. Lu, Larry L.; O' Laughlen, Eric; Crowley, John, Supervising user interaction with online services.
  423. Lu, Larry L.; O'Laughlen, Eric; Crowley, John, Supervising user interaction with online services.
  424. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Supplying notifications related to supply and consumption of user context data.
  425. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Supplying notifications related to supply and consumption of user context data.
  426. Stevens, Sue L.; Radel, William; Kolety, Sandhya; Aten, Jr., Allen L.; Morris, Dana P.; Byrne, David M., System and method for an audit tool for communications service providers.
  427. McDougal, Harold Lester; Neidecker, Stan; Gregory, Michael A., System and method for automated routing and processing of telecommunication service orders.
  428. Nelken, Yoram, System and method for automatic task prioritization.
  429. Hall, Robert J., System and method for circumventing spam filters.
  430. Nelken,Israel, System and method for classification of voice signals.
  431. Nelken, Yoram; Hajaj, Nissan; Magdalen, Yosemina; Cohen, Dani, System and method for classifying text.
  432. Feng, Andrew; Bhandari, Atul; Kucharewski, Valerie, System and method for community centric resource sharing based on a publishing subscription model.
  433. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections.
  434. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  435. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  436. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  437. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  438. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  439. McIsaac, Joseph E.; Dahllof, Marcus; Tatarsky, Bruce L.; Vallett, Richard K., System and method for controlling access to an electronic message recipient.
  440. McIsaac, Joseph E.; Dahllof, Marcus; Tatarsky, Bruce L.; Vallett, Richard K., System and method for controlling access to an electronic message recipient.
  441. McIsaac, Joseph E.; Dahllof, Marcus; Tatarsky, Bruce L.; Vallett, Richard K., System and method for controlling access to an electronic message recipient.
  442. McIsaac, Joseph; Dahllof, Marcus; Tatarsky, Bruce; Vallett, Richard, System and method for controlling access to an electronic message recipient.
  443. Foresti, Stefano; Stebbing, William Luke; Lamponi, Paolo, System and method for data transport.
  444. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  445. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  446. Ngan, Tsuen Wan, System and method for detecting content similarity within email documents by sparse subset hashing.
  447. Bunker, Guy Barry Owen; Ngan, Tsuen Wan, System and method for detecting email content containment.
  448. Brown, Michael K.; Brown, Michael S.; Kirkup, Michael G., System and method for determining a security encoding to be applied to outgoing messages.
  449. Brown, Michael K.; Brown, Michael S.; Kirkup, Michael G., System and method for determining a security encoding to be applied to outgoing messages.
  450. Brown, Michael Kenneth; Brown, Michael Stephen; Kirkup, Michael Grant, System and method for determining a security encoding to be applied to outgoing messages.
  451. Brown, Michael Kenneth; Kirkup, Michael Grant; Brown, Michael Stephen, System and method for determining a security encoding to be applied to outgoing messages.
  452. Nelken, Yoram, System and method for determining a set of attributes based on content of communications.
  453. Pettigrew,Nancy; McColgan,Charles, System and method for disaster recovery and management of an email system.
  454. Nelken, Yoram; Hajaj, Nissan; Magdalen, Josemina; Cohen, Dani, System and method for electronic communication management.
  455. Nelken,Yoram; Nelken,Israel; Hajaj,Nissan; Magdalen,Josemina; Bluger,Michael; Cohen,Dani, System and method for electronic communication management.
  456. Nelken,Yoram; Nelken,Israel; Hajaj,Nissan; Magdalen,Josemina; Bluger,Michael; Cohen,Dani, System and method for electronic communication management.
  457. Ahmed, Abbas, System and method for electronic document classification.
  458. Riggins,Mark D., System and method for enabling secure access to services in a computer network.
  459. Labarge,Matthew R.; Bailey,Eric D., System and method for filtering database records.
  460. Lund, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  461. Lung, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  462. Bruno, Mark; Cowings, David; Jensen, Sanford; Morss, Dylan; Schneider, Ken, System and method for filtering fraudulent email messages.
  463. Cowings, David; Hoogstrate, David; Jensen, Sandy; Medlar, Art; Schneider, Ken, System and method for filtering spam messages utilizing URL filtering module.
  464. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
  465. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  466. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  467. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  468. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  469. Kephart, Jeffrey Owen, System and method for hindering undesired transmission or receipt of electronic messages.
  470. Nelken, Yoram; Elliot, Stewart; Swanson, Brian; Hajaj, Nissan, System and method for increasing email productivity.
  471. Fotta, Keith A.; Boudrieau, Richard P., System and method for integrated compliance and contact management.
  472. Wang Baldonado, Michelle Q.; Newman, Paula S.; Janssen, Jr., William C., System and method for managing digests comprising electronic messages.
  473. Dwekat, Zyad Ahmad; Fries, Jeffrey M.; Cheema, Farooq Ijaz; Lowe, John, System and method for managing telecommunication trunk groups.
  474. Nelken, Yoram, System and method for optimizing timing of responses to customer communications.
  475. McDougal, Harold Lester; Neidecker, Stan; Gregory, Michael A., System and method for ordered processing of telecommunicaion service orders.
  476. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  477. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  478. Michael Voticky ; Joe Conner, System and method for prioritizing communications messages.
  479. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  480. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  481. Gabber, Eran; Gibbons, Phillip B.; Kristol, David Morris; Matias, Yossi; Mayer, Alain J., System and method for providing anonymous remailing and filtering of electronic mail.
  482. Malik, Dale W., System and method for regulating electronic messages.
  483. Malik, Dale W., System and method for regulating electronic messages.
  484. Malik, Dale W., System and method for regulating electronic messages.
  485. Malik, Dale W., System and method for regulating electronic messages.
  486. Malik, Dale W., System and method for regulating emails by maintaining, updating and comparing the profile information for the email source to the target email statistics.
  487. Achlioptas, Demetrios; Tribble, Eric D.; Pearson, Malcolm E.; Warman, Leon, System and method for routing messages within a messaging system.
  488. Malik, Dale W., System and method for sorting e-mail.
  489. Malik,Dale W., System and method for sorting e-mail using a vendor registration code and a vendor registration purpose code previously assigned by a recipient.
  490. Larsen, Per Buch, System and method for tailoring of electronic messages.
  491. Larsen,Per Buch, System and method for tailoring of electronic messages.
  492. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Ying,Christine C., System and method for transmitting workspace elements across a network.
  493. Younger, Keith; Smith, Shane M.; Dwyer, Kendra, System and method for voice activated provisioning of telecommunication services.
  494. Sood, Manish Chander; Ruan, Cheng-Rong; Oberrotman, Alain, System and method of dynamically prioritized electronic mail graphical user interface, and measuring email productivity and collaboration trends.
  495. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  496. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  497. Quinlan, Sean M.; Mendez, Daniel J.; Joshi, Rajiv; Ardulov, Yuri, System and methods for asynchronous synchronization.
  498. Quinlan, Sean; Mendez, Daniel J.; Joshi, Rajiv; Ardulov, Yuri, System and methods for asynchronous synchronization.
  499. Quinlan, Sean; Mendez, Daniel J.; Joshi, Rajiv; Ardulov, Yuri, System and methods for asynchronous synchronization.
  500. Meltzer, Jason; Haslup, Jason, System and methods for multiple email services having a common domain.
  501. Schroeder, Kim A.; Jenkins, Aaron; Donnelly, Keric P.; Smith, Greyson; Anderson, Shawn, System for customer contact information management and methods for using same.
  502. Davis, William Robert; Kuo, Jason T.; Larson, Ronald Frank; Sawyer, Albert Joseph; Shelhamer, Kenneth Wayne; Stoa, Larry Phillip; Thompson, Robin Jeffrey, System for expanding a parameter encoding field in a message to allow additional parameters to be added while maintaining compatibility with existing parameter encodings.
  503. Pang, Stephen Y. F., System for policing junk e-mail messages.
  504. Pang,Stephen Y. F., System for policing junk e-mail messages.
  505. Pollack, Jordan; Stevenson, Jeremy; Umanoff, Zak, System for regulating flow of information to user by using time dependent function to adjust relevancy threshold.
  506. Quine, Douglas B.; Blue, Richard D, System for selective delivery of electronic communications.
  507. Bliss, Austin C.; Mack, Robert W.; Kaplan, William B.; Rosenstein, Mark, System for storing and retrieving old and new electronic identifiers.
  508. Davis, Brent; Sellis, Peter; Azmoodeh, Farnaz; Ahmed, Samir; Cohen, Douglas, System to track engagement of media items.
  509. Davis, Brent; Sellis, Peter; Azmoodeh, Farnaz; Ahmed, Samir; Cohen, Douglas, System to track engagement of media items.
  510. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  511. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  512. Kay, Erik Andrew; Moore, David; Willhite, Daniel L.; Upson, Linus, System, method, and computer program product for filtering messages and training a classification module.
  513. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  514. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  515. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  516. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  517. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  518. Smith, Steven J., Systems and methods for automatically updating electronic mail access lists.
  519. Smith, Steven J.; Schmidt, Kenneth A., Systems and methods for automatically updating electronic mail access lists.
  520. Smith, Steven J.; Schmidt, Kenneth A.; Bunshaft, Maxwell H., Systems and methods for automatically updating electronic mail access lists.
  521. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  522. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  523. Maestas, David Edward; Cooper, Brian Louis, Systems and methods for determining a flow of data.
  524. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  525. Smith,Steven J.; Schmidt,Kenneth A., Systems and methods for governing the performance of high volume electronic mail delivery.
  526. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  527. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  528. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fredric L.; Oswall, Michael J., Systems and methods for managing the transmission of electronic messages via message source data.
  529. Judge, Paul, Systems and methods for message threat management.
  530. Judge, Paul, Systems and methods for message threat management.
  531. Judge, Paul, Systems and methods for message threat management.
  532. Judge, Paul, Systems and methods for message threat management.
  533. Judge,Paul, Systems and methods for message threat management.
  534. Judge,Paul, Systems and methods for message threat management.
  535. Smith,Steve; Rayner,Douglas P., Systems and methods for monitoring events associated with transmitted electronic mail messages.
  536. Appelman, Barry; Hussain, Muhammad Mohsin, Systems and methods for notification delivery.
  537. Appelman, Barry; Hussain, Muhammad Mohsin, Systems and methods for notification management and delivery.
  538. Appelman, Barry; Hussain, Muhammad Mohsin, Systems and methods for reconfiguring electronic messages.
  539. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  540. Pavlovskaia, Maria; Spiegel, Evan, Systems and methods for story and sub-story navigation.
  541. Judge,Paul, Systems and methods for upstream threat pushback.
  542. Cheng, Yun-Chian; Yu, Pei-Hsun, Techniques for identifying spam e-mail.
  543. Wexelblat,David Eli, Third party provided transactional white-listing for filtering electronic communications.
  544. Barrett, Joseph G.; Muehl, Mark J.; Palino, Todd M., Throttling electronic communications from one or more senders.
  545. Barrett,Joseph G.; Muehl,Mark J.; Palino,Todd M., Throttling electronic communications from one or more senders.
  546. Appelman, Barry; Hussain, Muhammad Mohsin, Time based electronic message delivery.
  547. Bellegarda, Jerome R.; Forstall, Scott; Silverman, Kim E. A.; Tiene, Kevin; Serlet, Bertrand, Training a computer storage system for automatic filing of data using graphical representations of storage locations.
  548. Patel,Ashvinkumar P.; Woods,Brian R.; Manber,Udi, Unsolicited electronic mail reduction.
  549. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message diverting communications processor.
  550. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message intercepting communications processor.
  551. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message rejecting communications processor.
  552. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Unsolicited message rejecting communications processor.
  553. Hart, Matthew Thomas, Unwanted e-mail filtering system including voting feedback.
  554. Hart, Matthew Thomas, Unwanted e-mail filtering system including voting feedback.
  555. Laliberte, Benoit, User content sharing system and method with location-based external content integration.
  556. Ebsen, Rylee; Jurgenson, Nathan; Marzolph, Ryan; Spiegel, Evan, User interface for accessing media at a geographic location.
  557. Hullfish, Keith C.; Carey, Charles A.; Longe, Michael R.; Parr, Joe, User-defined electronic message preferences.
  558. Mishra, Manav; Murphy, Elissa E. S.; Hulten, Geoffrey J; Goodman, Joshua T.; Yih, Wen-Tau, Using IP address and domain for email spam filtering.
  559. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, Value-added electronic messaging services and transparent implementation thereof using intermediate server.
  560. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, Value-added electronic messaging services having web-based user accessible message center.
  561. Christensen, Scott N., Virtual couponing method and apparatus for use with consumer kiosk.
  562. Chen, Xueyin; Jahangiri, Mehrdad, Visitation tracking system.
  563. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  564. Nelken, Yoram; Jessee, Randy; Kirshner, Steve, Web-based customer service interface.
  565. Gilmour,David; Sanders, Jr.,Richard; Epelman Wang,Hernan; Wang,Eric, Withdrawal of requests of target number of requests responses received.
  566. Gross, John N.; Gross, Anthony A., Word checking tool for controlling the language content in documents using dictionaries with modifyable status fields.
  567. Gross, John N.; Gross, Anthony A., Word checking tool for selectively filtering text documents for undesirable or inappropriate content as a function of target audience.
  568. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fred; Oswall, Michael J., Zero-minute virus and spam detection.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로