$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Apparatus and method for controlling delivery of unsolicited electronic mail 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-001/00
  • H06F-017/30
출원번호 US-0997692 (1997-12-23)
발명자 / 주소
  • Paul Sunil
출원인 / 주소
  • Bright Light Technologies, Inc.
대리인 / 주소
    Covington & Burling
인용정보 피인용 횟수 : 597  인용 특허 : 6

초록

In a system and method and system for controlling delivery of unsolicited electronic mail messages, one or more spam probe e-mail addresses are created and planted at various sites on the communications network in order to insure their inclusion on large-scale electronic junk mail ("spam") mailing l

대표청구항

[ I claim:] [1.] A system for controlling delivery of unsolicited electronic mail, comprising:a communications network;a plurality of user terminals coupled to said communications network, each of said plurality of user terminals having a unique e-mail address, wherein each of said plurality of user

이 특허에 인용된 특허 (6)

  1. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  2. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  3. Bobo ; II Charles R. (569 Elmwood Dr. NE. Atlanta GA 30306), Message storage and delivery system.
  4. Nielsen Jakob, Method and apparatus for receiving electronic mail.
  5. Suarez Larry, Method and architecture for the creation, control and deployment of services within a distributed computer environment.
  6. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H., System for generation of object profiles for a system for customized electronic identification of desirable objects.

이 특허를 인용한 특허 (597)

  1. Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C., (More) advanced spam detection features.
  2. Costea, Mihai; Ryvkin, Konstantin; Pearson, Malcolm E.; Williams, Roy, Access limited EMM distribution lists.
  3. Wilson, Brian, Active e-mail filter with challenge-response.
  4. Wilson, Brian, Active e-mail filter with challenge-response.
  5. Wilson, Brian, Active e-mail filter with challenge-response.
  6. Wilson, Brian, Active e-mail filter with challenge-response.
  7. Rounthwaite, Robert L.; Goodman, Joshua T.; Heckerman, David E.; Platt, John C.; Kadie, Carl M., Adaptive junk message filtering system.
  8. Rounthwaite,Robert L.; Goodman,Joshua T.; Heckerman,David E.; Platt,John C.; Kadie,Carl M., Adaptive junk message filtering system.
  9. Shuster,Brian Mark, Addressee-defined mail addressing system and method.
  10. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  11. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  12. Goodman,Joshua T; Rounthwaite,Robert L; Hulten,Geoffrey J; Deurbrouck,John A; Mishra,Manav; Penta,Anthony P, Advanced URL and IP features.
  13. Starbuck, Bryan T.; Rounthwaite, Robert L.; Heckerman, David E.; Goodman, Joshua T.; Gillum, Eliot C.; Howell, Nathan D.; Aldinger, Kenneth R., Advanced spam detection techniques.
  14. Starbuck, Bryan T.; Rounthwaite, Robert L.; Heckerman, David E.; Goodman, Joshua T.; Gillum, Eliot C.; Howell, Nathan D; Aldinger, Kenneth R., Advanced spam detection techniques.
  15. Rodgers,Dion; Boggs,Darrell; Merchant,Amit; Kota,Rajesh; Hsu,Rachel, Alteration of functional unit partitioning scheme in multithreaded processor based upon thread statuses.
  16. van der Made, Peter A. J., Analytical virtual machine.
  17. van der Made,Peter A. J., Analytical virtual machine.
  18. Narayan, Sharat; Ramarao, Vishwanath Tumkur; Tseng, Belle; Weimer, Markus; Maeng, Young; Shue, Jyh-Shin, Anti-spam transient entity classification.
  19. Sobel,William; McCorkendale,Bruce, Antivirus scanning in a hard-linked environment.
  20. Wang, Bing, Apparatus and method for handling electronic mail.
  21. Wang,Bing, Apparatus and method for handling electronic mail.
  22. Jeong, Wook-Hyun; Kim, Eun-Jung, Apparatus and method for improved electronic mail.
  23. Syiek, Bronwyn; Bhanap, Nina; Gowda, Rakesh; Guntha, Ramesh, Apparatus and method for precluding e-mail distribution.
  24. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan; Medlar, Art, Apparatus and method for weighted and aging spam filtering rules.
  25. Zhao, Wen; Plestio, Thomas Leonard Trevor; Dunk, Craig; Islam, Muhammad Khaledul; Estable, Luis Pablo; Willey, William Daniel, Apparatus and method of controlling unsolicited traffic destined to a wireless communication device.
  26. Zhao, Wen; Plestio, Thomas Leonard Trevor; Dunk, Craig; Islam, Muhammad Khaledul; Estable, Luis Pablo; Willey, William Daniel, Apparatus and method of controlling unsolicited traffic destined to a wireless communication device.
  27. Girouard, Janice Marie; Ratliff, Emily Jane, Apparatus for managing email messages.
  28. Azvine,Benham; Djian,David Philippe; Tsui,Kwok Ching; Wobcke,Wayne Raymond, Apparatus for processing communications.
  29. Willey, William Daniel, Apparatus, and associated method, for alerting user of communication device of entries on a mail message distribution list.
  30. Willey, William Daniel, Apparatus, and associated method, for alerting user of communication device of entries on a mail message distribution list.
  31. Youstra, William N., Authentication of electronic data.
  32. Youstra, William N., Authentication of electronic data.
  33. Youstra, William N., Authentication of electronic data.
  34. Johnson, Anthony E., Autogenerated email summarization process.
  35. Ralston,Geoffrey D.; Nakayama,David H.; Lewin,Matthew E.; Jayachandran,Ravichandran Menon; Woods,Brian R.; Manber,Udi, Automated bulk communication responder.
  36. Buzuloiu,Vasile; Cuic,Mihai; Beuran,Razvan; Grecu,Horia; Drimbarean,Alexandru; Corcoran,Peter; Steinberg,Eran, Automated detection of pornographic images.
  37. Anderson, W. Kyle; Bonhaus, Daryl, Automated identification and clean-up of malicious computer code.
  38. Zheng,Hao; Chu,Bruce Hui der; Kundu,Anirban; Libbey,Miles A.; Nakayama,David H.; Zhu,Jing, Automated solicited message detection.
  39. Valeski, Judson, Automatic categorization of entries in a contact list.
  40. Cooley, Shaun, Automatic generation of disposable e-mail addresses.
  41. Gilmour, David L.; Epelman-Wang, Hernan; Goldberg, Jonathan M.; Sanders, Richard; Wang, Eric, Automatic management of terms in a user profile in a knowledge management system.
  42. Riemers, Bill C., Automatic uniform resource locator-based message filter.
  43. Kennedy,Mark; Sobel,William E.; McCorkendale,Bruce; Nachenberg,Carey, Blocking e-mail propagation of suspected malicious computer code.
  44. Kennedy, Mark; Renert, Charles, Blocking replication of e-mail worms.
  45. Chasin, C. Scott, Bounce management in a trusted communication network.
  46. Hartman, Al; Nachenberg, Carey, Bulk electronic message detection by header similarity analysis.
  47. Hartman, Alfred C.; Nachenberg, Carey S., Bulk electronic message detection by header similarity analysis.
  48. Wang,Myles Thomas; McMorris,Michael, Bulk voicemail.
  49. Vaghar, Shahriar; Wang, Yang; Skakkebaek, Jens, Caching message information in an integrated communication system.
  50. Skakkebaek, Jens; Potze, Willem R. B.; Frifeldt, Heine, Caching user information in an integrated communication system.
  51. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timoth T.; Goldman, Phillip Y., Centralized behavioral information system.
  52. Malik,Dale W.; Daniell,W. Todd, Child protection from harmful email.
  53. Nachenberg, Carey; McCorkendale, Bruce, Circumstantial blocking of incoming network traffic containing code.
  54. Flury, Andrew; Banister, Scott; Sprosts, Craig; Peterson, Patrick R.; Olivier, Michael V., Collecting, aggregating, and managing information relating to electronic messages.
  55. Lazaridis, Mihal, Color differentiating a portion of a text message shown in a listing on a handheld communication device.
  56. Lazaridis, Mihal, Color differentiating a portion of a text message shown in a listing on a handheld communication device.
  57. Landsman, Richard A., Community messaging lists for authorization to deliver electronic messages.
  58. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  59. Simpson, Robert P.; Simpson, Michael J.; Perrello, William S., Computerized docketing system for intellectual property law with automatic due date alert.
  60. Simpson, Robert P.; Simpson, Michael J.; Perrello, William S., Computerized scheduling system and method for comparing two dates and alerting user of impending due date by changing color display of one of the two dates.
  61. Sprosts, Craig; Kennedy, Scot; Quinlan, Daniel; Rosenstein, Larry; Slater, Charles, Controlling a message quarantine.
  62. Horsfall,Peter Richard P.; Jain,Neena; Howorka,Edward R., Conversational dealing system.
  63. Szor,Peter, Countering infections to communications modules.
  64. Szor,Peter; Nachenberg,Carey, Countering malicious code infections to computer files that have been infected more than once.
  65. Sugiyama, Takeshi; Takahashi, Masaru; Yamashita, Masashi; Sugiyama, Kazuo; Oosako, Youji; Jo, Manhee, Data communications system and data communications method for detecting unsolicited communications.
  66. Ariga,Kenichi; Fujiwara,Ryuhei, Data distribution method, system, and apparatus and recording medium recording method.
  67. Bennett, Dominic; Hu, Dan, Database structure and front end.
  68. Wilson, Brian K.; Ng, Kwok H.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A., Declassifying of suspicious messages.
  69. Wilson, Brian K.; Ng, Kwok H.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A., Declassifying of suspicious messages.
  70. Wilson, Brian K.; Ng, Kwok H.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A., Declassifying of suspicious messages.
  71. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  72. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  73. Appelman, Barry, Degrees of separation for handling communications.
  74. Hariharan, Bhasker; Jamal, Naveen; Kundu, Anirban; Ramarao, Vishwanath Tumkur; Risher, Mark E.; Xi, Xiaopeng; Zheng, Lei, Detecting bulk fraudulent registration of email accounts.
  75. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  76. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  77. Tarbotton, Lee Codel Lawson; Gudgion, Kevin Andrew, Detecting malware carried by an E-mail message.
  78. Tarbotton,Lee Codel Lawson; Gudgion,Kevin Andrew, Detecting malware carried by an e-mail message.
  79. Sobel, William E; McCorkendale, Bruce, Detecting spam e-mail with backup e-mail server traps.
  80. Ramarao, Vishwanath Tumkur; Risher, Mark E.; Xi, Xiaopeng, Detecting spam from a bulk registered e-mail account.
  81. Hodgson, Garren G., Detection and prevention of e-mail malware attacks.
  82. Sobel,William, Detection of malicious computer code.
  83. Hariharan, Bhasker; Jamal, Naveen; Kundu, Anirban; Ramarao, Vishwanath Tumkur; Risher, Mark E.; Xi, Xiaopeng; Zheng, Lei, Detection of outbound sending of spam.
  84. Pearson, Malcolm Erik; Costea, Mihai, Determination of participation in a malicious software campaign.
  85. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Diminishing false positive classifications of unsolicited electronic-mail.
  86. Vaghar, Shahriar; Wang, Yang; Skakkebaek, Jens, Distributed cache system.
  87. Mark Raymond Pace ; Brooks Cash Talley, Distributed content identification system.
  88. Weinberger, Kilian Quirin; Langford, John, Distributed spam filtering utilizing a plurality of global classifiers and a local classifier.
  89. Pollack, Jordan B.; Sack, Andy M., Dual-use email system.
  90. Chen, Yen-Fu; Handy-Bosma, John Hans; Walker, Keith Raymond, Duplicate e-mail content detection and automatic doclink conversion.
  91. Sinn, Richard; Libbey, Miles, Dynamic combatting of SPAM and phishing attacks.
  92. Szor,Peter, Dynamic detection of computer worms.
  93. Musat, Claudiu C.; Grigorescu, Ionut; Trifan, Alexandru; Mitrica, Carmen A, Dynamic streaming message clustering for rapid spam-wave detection.
  94. Gough, Michael L., E-mail embedded textual hyperlink object.
  95. William B. McCormick ; David Kopans ; George Stojanoff, E-mail filter and method thereof.
  96. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, E-mail filtering services and e-mail service enrollment techniques.
  97. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, E-mail filtering services using Internet protocol routing information.
  98. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, E-mail management services.
  99. Petry,Scott; Irlam,Gordon Raymond; Maggi,Brian, E-mail policy compliance techniques.
  100. Du,Qiang, E-mail protocol using assumed send and reply address and smart E-mail archiving by addressee and addressor.
  101. Barchi, Ronald S., E-mail usage pattern detection.
  102. Gough, Michael L.; Gough, James J.; Hickman, Paul L., E-mail with discretionary functionality.
  103. Shraim, Ihab; Shull, Mark, Early detection and monitoring of online fraud.
  104. Millard, John, Efficient file scanning using input-output hints.
  105. Kissel,Timo S., Efficient scanning of stream based data.
  106. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Efficient use of resources in message classification.
  107. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Efficient use of resources in message classification.
  108. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Efficient use of resources in message classification.
  109. Petry, Scott M.; Irlam, Gordon R.; Maggi, Brian, Electronic document policy compliance techniques.
  110. Merchant, Sailesh Mansinh, Electronic mail alerting system and method with user options.
  111. Kirsch, Steven T.; Kiraly, Kenneth P., Electronic mail filtering system and methods.
  112. Kowaguchi Satoshi,JPX, Electronic mail system spontaneously forwarding an electronic mail to a receiving communication terminal.
  113. Kowaguchi Satoshi,JPX, Electronic mail system, electronic mail server, and communication terminal.
  114. Banister,Scott; Clegg,Paul; Schlampp,Peter; Peterson,Patrick R., Electronic message delivery using an alternate source approach.
  115. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  116. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  117. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  118. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Electronic message system with federation of trusted senders.
  119. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Susan Rayl, Electronic message system with federation of trusted senders.
  120. Yu, Tonny, Email analysis using fuzzy matching of text.
  121. Yu, Tonny, Email analysis using fuzzy matching of text.
  122. Maller,Steven T., Email filtering methods and systems.
  123. Owen, Brad; Steiner, Jason, Email filtering system and method.
  124. DiPlacido, Marco; Shah, Mehul, Email provider prevention/deterrence of unsolicited messages.
  125. Vitaldevara, Krishna; Saxena, Sanchan Sahai; Gillum, Eliot C.; Zhu, Rebecca Ping; Schnoebelen, Tyler J., Email tags.
  126. Vitaldevara, Krishna; Saxena, Sanchan Sahai; Gillum, Eliot C.; Zhu, Rebecca Ping; Schnoebelen, Tyler J., Email tags.
  127. Satish, Sourabh; Hernacki, Brian, Endpoint management using trust rating data.
  128. Sobel,William E; Vogel,Greg; McCorkendale,Bruce, Enforcement of compliance with network security policies.
  129. Emigh, Aaron T.; Roskind, James A., Enhanced challenge-response.
  130. Shraim, Ihab; Shull, Mark, Enhanced responses to online fraud.
  131. Epelman-Wang, Hernan; Gilmour, David; Goldberg, Jonathan Michael; Hamel, Andrew; Trown, Nicolas; Wang, Eric, Expertise services platform.
  132. Klemm, Reinhard Peter, Facilitating real-time communications in electronic message boards.
  133. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  134. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  135. Rounthwaite, Robert L.; Goodman, Joshua T.; Heckerman, David E.; Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C.; Slawson, Dean A., Feedback loop for spam prevention.
  136. Rounthwaite,Robert L.; Goodman,Joshua T.; Heckerman,David E.; Mehr,John D.; Howell,Nathan D.; Rupersburg,Micah C.; Slawson,Dean A., Feedback loop for spam prevention.
  137. Heiner Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  138. Heiner, Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  139. Daniell, W. Todd, Filtered email differentiation.
  140. Goldman, Phillip Y.; Landsman, Richard A.; Migliore, Michael R.; Heiner, Jeffrey N.; Logue, Jay, Filtering electronic messages while permitting delivery of solicited electronics messages.
  141. Malik, Dale W., Filtering email messages corresponding to undesirable domains.
  142. Malik,Dale W., Filtering email messages corresponding to undesirable domains.
  143. Seamus Brendan Donohue IR, Filtering incoming e-mail.
  144. Carvalho Neto, Mayerber L.; Jain, Chandresh K.; Mehta, Mayank; Costea, Mihai, Filtering of electronic mail messages destined for an internal network.
  145. Mikan, Jeffrey; McNamara, Justin; Cenciarelli, Fulvio; Kefalas, Anastasios L.; Lewis, John Ervin, Filtering spam messages across a communication network.
  146. Malik, Dale W.; Verren, Theodore; Conner, William, Foreign network SPAM blocker.
  147. Malik,Dale; Verren,Theodore; Conner,William, Foreign network SPAM blocker.
  148. McMillan, Bruce A.; Wallace, Andrew J.; Koorland, Neil K.; Wang, Qiang; Attwell, Simon P.; Neely, Samuel J., Framework to enable integration of anti-spam technologies.
  149. Wallace,Andrew J.; Koorland,Neil K.; Wang,Qiang; Neely,Samuel J.; Atwell,Simon P., Framework to enable integration of anti-spam technologies.
  150. Lin, Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  151. Lin,Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  152. Shraim, Ihab; Shull, Mark, Generating phish messages.
  153. Chi,Darren, Generic detection and elimination of marco viruses.
  154. Dowling, Eric Morgan; MacFarlane, Duncan Leo; Anastasi, Mark Nicholas, Geographical web browser, methods, apparatus and systems.
  155. Dowling, Eric Morgan; MacFarlane, Duncan Leo; Anastasi, Mark Nicholas, Geographical web browser, methods, apparatus and systems.
  156. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  157. Arning,Andreas; Roller,Dieter; Maier,Andreas, Handling of messages in a electronic messaging system.
  158. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  159. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  160. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  161. Spiegel,Mark; McCorkendale,Bruce; Sobel,William, Heuristic detection and termination of fast spreading network worm attacks.
  162. Nachenberg,Carey, Heuristic detection of computer viruses.
  163. Szor,Peter, Heuristic detection of malicious computer code by page tracking.
  164. Vitaldevara, Krishna C.; Gillum, Eliot C.; Walter, Jason D.; Bidgoli, Mehrdad, Honoring user preferences in email systems.
  165. Emigh, Aaron T.; Roskind, James A., Hybrid challenge-response.
  166. Choi, Jaesik; Pujara, Jay; Ramarao, Vishwanth Tumkur; Wei, Ke, Identifying IP addresses for spammers.
  167. Ben-Yoseph, Roy, Identifying and using identities deemed to be known to a user.
  168. Diao, Lili; Oliver, Jonathan J., Identifying sensitive expressions in images for languages with large alphabets.
  169. Sprosts, Craig; Kennedy, Scot; Quinlan, Daniel; Rosenstein, Larry; Slater, Charles, Identifying threats in electronic messages.
  170. Sutton, Jr.,Lorin R.; Despeaux,Craig E.; Adamski,Michael K., Identifying unwanted electronic messages.
  171. Amjadi, Kamran, Incentive network for distributing incentives on a network-wide basis and for permitting user access to individual incentives from a plurality of network servers.
  172. Amjadi, Kamran, Incentive network for distributing incentives on a network-wide basis and for permitting user access to individual incentives from a plurality of network servers.
  173. Amjadi, Kamran, Incentive network for distributing incentives on a network-wide basis and for permitting user access to individual incentives from a plurality of network servers.
  174. Murphy, Elissa E.; Goodman, Joshua T; Hazeur, Derek M; Rounthwaite, Robert L; Hulten, Geoffrey J, Incremental anti-spam lookup and update service.
  175. Sinn, Richard; Jiang, Hongyan; Wong, Dudley, Instant messaging malware protection.
  176. Skakkebaek, Jens; Frifeldt, Heine; Potze, Willem R. B., Integrated multi-media communication system.
  177. Frifeldt, Heine; Forney, David; Shaffer, Anthony; Potze, Willem R. B., Integrating messaging server directory service with a communication system voice mail message interface.
  178. Rothwell, Anton C.; Jagger, Luke D.; Dennis, William R.; Clarke, David R., Intelligent SPAM detection system using an updateable neural analysis engine.
  179. Rothwell,Anton C.; Jagger,Luke D.; Dennis,William R.; Clarke,David R., Intelligent SPAM detection system using statistical analysis.
  180. Goodman, Joshua T.; Rounthwaite, Robert L.; Hulten, Geoffrey J.; Hazeur, Derek, Intelligent quarantining for spam prevention.
  181. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system and method.
  182. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system method.
  183. Lee, Chan W.; Hinton, Glenn; Krick, Robert, LRU cache replacement for a partitioned set associative cache.
  184. Majeti, Venkata C.; Pennabadi, Saiprasad; Vyas, Madhur Mohan, Management for information communicated among end user communication devices.
  185. Clegg, Paul J.; Huss, Eric C.; Sprosts, Craig; Chen, Shun; Brahms, Robert; Quinlan, Daniel, Managing connections and messages at a server by associating different actions for both different senders and different recipients.
  186. Clegg, Paul J.; Huss, Eric C.; Sprosts, Craig; Srinivasan, Krishna; Schlampp, Peter; Chen, Shun; Brahms, Robert; Quinlan, Daniel, Managing connections, messages, and directory harvest attacks at a server.
  187. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  188. Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing electronic messages.
  189. Ben-Yoseph, Roy, Managing electronic messages based on inference scores.
  190. Landsman,Richard A.; Sullivan,Timothy Thomas; Logue,Jay Dare, Managing electronic messages using contact information.
  191. Vaithilingam, Gandhi; Ho, Cheng; Pitigoi-Aron, Gruia; Vincent, Ben, Managing potentially phishing messages in a non-web mail client context.
  192. Logue, Jay; Heiner, Jeffrey N.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing self-addressed electronic messages.
  193. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  194. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  195. Worrell, Steven W.; Rogers, Steven K.; Kabrisky, Matthew; Amburn, Philip, Message and user attributes in a message filtering method and system.
  196. Emigh, Aaron T.; Roskind, James A., Message authorization.
  197. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  198. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  199. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  200. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  201. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using allowed items.
  202. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  203. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  204. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  205. Wilson, Brian K.; Ng, Kwok H.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A., Message handling with selective user participation.
  206. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  207. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  208. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  209. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  210. Starbuck, Bryan T.; Rounthwaite, Robert L.; Heckerman, David E.; Goodman, Joshua T., Message rendering for identification of content features.
  211. Starbuck,Bryan T.; Rounthwaite,Robert L.; Heckerman,David E.; Goodman,Joshua T., Message rendering for identification of content features.
  212. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Message testing.
  213. Landsman, Richard A., Messaging systems and methods.
  214. Landsman, Richard A., Messaging systems and methods.
  215. Harding,Michael A., Method and apparatus for applying personalized rules to e-mail messages at an e-mail server.
  216. David L. Gilmour, Method and apparatus for assigning a confidence level to a term within a user knowledge profile.
  217. Gilmour, David L., Method and apparatus for assigning a confidence level to a term within a user knowledge profile.
  218. Hammond, Nicolas J., Method and apparatus for auditing network security.
  219. Malik, Dale W., Method and apparatus for automatically checking E-mail addresses in outgoing E-mail communications.
  220. Malik,Dale W., Method and apparatus for automatically checking e-mail addresses in outgoing e-mail communications.
  221. Chin, Ren; Cowings, David; Jensen, Sanford, Method and apparatus for certifying mass emailings.
  222. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Method and apparatus for classifying electronic messages.
  223. David L. Gilmour ; Eric Wang, Method and apparatus for constructing and maintaining a user knowledge profile.
  224. Gilmour, David L.; Wang, Eric, Method and apparatus for constructing and maintaining a user knowledge profile.
  225. Gilmour, David L.; Wang, Eric, Method and apparatus for constructing and maintaining a user knowledge profile.
  226. Gilmour, David L.; Wang, Eric, Method and apparatus for constructing and maintaining a user knowledge profile.
  227. Sager, David J., Method and apparatus for controlling the processing priority between multiple threads in a multithreaded processor.
  228. Sager, David J., Method and apparatus for controlling the processing priority between multiple threads in a multithreaded processor.
  229. Gilchrist, Rod; Fogel, Richard; Osborne, Robert; Alsop, John, Method and apparatus for controlling unsolicited messaging.
  230. Gilchrist, Rod; Fogel, Richard; Osborne, Robert; Alsop, John, Method and apparatus for controlling unsolicited messaging.
  231. Gilchrist, Rod; Fogel, Richard; Alsop, John, Method and apparatus for controlling unsolicited messaging in real time messaging networks.
  232. Gilchrist, Rod; Fogel, Richard; Alsop, John, Method and apparatus for controlling unsolicited messaging in real time messaging networks.
  233. Gu, Guofei; Porras, Phillip Andrew; Fong, Martin, Method and apparatus for detecting malware infection.
  234. Dion Rodgers ; Bret Toll ; Aimee Wood, Method and apparatus for disabling a clock signal within a multithreaded processor.
  235. Pollack, Jordan; Cutts, Shaun; Rodriguez, Andres; Stevenson, Jeremy; Umanoff, Zak, Method and apparatus for distributing information to users.
  236. Pollack, Jordan; Cutts, Shaun; Rodriguez, Andres; Stevenson, Jeremy; Umanoff, Zak, Method and apparatus for distributing information to users.
  237. Rudd, Kevin W.; Walterscheidt, Udo, Method and apparatus for ensuring fairness and forward progress when executing multiple threads of execution.
  238. Rodgers, Dion; Boggs, Darrell; Merchant, Amit; Kota, Rajesh; Hsu, Rachel, Method and apparatus for entering and exiting multiple threads within a multithreaded processor.
  239. Pollack, Jordan; Cutts, Shaun; Rodriguez, Andres, Method and apparatus for evaluating relevancy of messages to users.
  240. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan; Medlar, Art, Method and apparatus for filtering E-mail.
  241. Weber Rick, Method and apparatus for filtering a notification message from a database.
  242. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan, Method and apparatus for filtering e-mail.
  243. Gleeson, Matt; Hoogstrate, David; Jensen, Sandy; Mantel, Eli; Medlar, Art; Schneider, Ken, Method and apparatus for filtering email spam using email noise reduction.
  244. Gleeson, Matt; Hoogstrate, David; Jensen, Sandy; Mantel, Eli; Medlar, Art; Schneider, Ken, Method and apparatus for filtering email spam using email noise reduction.
  245. Dong, Jianming; Mullaly, John Martin; Tannenbaum, Alan Richard, Method and apparatus for filtering messages in a data processing system.
  246. Cowings, David; Jensen, Sanford; Wiegner, Carlin, Method and apparatus for maintaining reputation lists of IP addresses to detect email spam.
  247. Olivier, Michael; Sprosts, Craig; Kennedy, Scot; Quinlan, Daniel; Rosenstein, Larry; Taylor, Craig, Method and apparatus for managing computer virus outbreaks.
  248. Boggs,Darrell D.; Weiss,Shlomit, Method and apparatus for managing resources in a multithreaded processor.
  249. Aoki,Norihiro Edwin, Method and apparatus for managing subscription-type messages.
  250. Gilmour, David L., Method and apparatus for managing user profiles including identifying users based on matched query term.
  251. Whitehouse, Oliver; Friedrichs, Oliver; Levy, Elias, Method and apparatus for monitoring communications from a communications device.
  252. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  253. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  254. Wang, Xuejun; Acton, Brian; Panchapakesan, Venkat, Method and apparatus for performing a search.
  255. Smith, Lawrence O.; Rodgers, S. Dion, Method and apparatus for processing events in a multithreaded processor.
  256. Harrison, Robert Brian; Jasinskyj, Lonhyn; Clegg, Paul J.; Cottrell, Ben, Method and apparatus for providing temporary access to a network device.
  257. Gilmour David L., Method and apparatus for querying a user knowledge profile.
  258. Krishnamurthy, Balachander, Method and apparatus for reducing unwanted traffic between peer networks.
  259. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  260. Bennett, Dominic; Paczkowski, Remigiusz K., Method and apparatus for responding to request for information-personalization.
  261. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  262. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  263. Khalsa, Gurujiwan; Morss, Dylan, Method and apparatus for simulating end user responses to spam email messages.
  264. Wang, Xuejun; Acton, Brian L.; Panchapakesan, Venkat, Method and computer storage medium for search scoring.
  265. Bocking, Andrew D.; Van Belle, Theodore Benedict, Method and device for hiding messages.
  266. Bocking, Andrew Douglas; Van Belle, Theodore Benedict, Method and device for hiding messages.
  267. Bocking, Andrew Douglas; Van Belle, Theodore Benedict, Method and device for hiding messages.
  268. Bocking, Andrew Douglas; Van Belle, Theodore Benedict, Method and device for hiding messages.
  269. Van Belle, Theodore Benedict; Bocking, Andrew Douglas, Method and device for hiding messages.
  270. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  271. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  272. Gilmour, David L.; Wang, Hua-Wen; Goldberg, Jonathan M., Method and system for addressing a communication document for transmission over a network based on the content thereof.
  273. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  274. Oliver,Jonathan J.; Koblas,David A.; Wilson,Brian K., Method and system for classifying a message based on canonical equivalent of acceptable items included in the message.
  275. Earnest,Jerry Brett, Method and system for comparing information contents.
  276. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  277. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  278. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  279. Schentrup, Philip, Method and system for data usage accounting across multiple communication networks.
  280. Roberge, Brian A.; Asnis, James; Medina, David, Method and system for data usage accounting in a computing device.
  281. Lee, Martin, Method and system for detecting malware containing E-mails based on inconsistencies in public sector “From” addresses and a sending IP address.
  282. Asnis, James, Method and system for enabling data usage accounting.
  283. Asnis, James, Method and system for enabling data usage accounting for unreliable transport communication.
  284. Asnis, James, Method and system for enabling data usage accounting through a relay.
  285. Asnis, James; Peterson, Matthew John; Kelly, Michael, Method and system for enrolling and authenticating computing devices for data usage accounting.
  286. Cobb, Christopher Alan, Method and system for filtering electronic messages.
  287. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  288. DellaFera, Ciaran A.; Rojahn, Tom O., Method and system for managing electronic mail.
  289. DellaFera, Ciaran A.; Rojahn, Tom O., Method and system for managing electronic mail.
  290. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  291. Kirsch, Steven T., Method and system for selectively blocking delivery of bulk electronic mail.
  292. Boisjolie, Darren R.; Ashley, Stephen P.; Balasubramaniam, Gandhi, Method and system for transparent bridging and bi-directional management of network data.
  293. Lee, Martin, Method and system for using spam e-mail honeypots to identify potential malware containing e-mails.
  294. Goulden, David L.; Gilbert, Charles; Zeldin, Craig, Method for attributing and allocating revenue related to embedded software.
  295. Jude Gerard Dieterman, Method for controlling the delivery of electronic mail messages.
  296. Vander Veen, Raymond Paul, Method for disambiguating email recipient fields in an electronic device.
  297. Girouard,Janice Marie; Ratliff,Emily Jane, Method for managing email messages.
  298. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Method for removing unsolicited e-mail messages.
  299. Laumen, Josef; Schmidt, Andreas; Trauberg, Markus, Method for transmitting data via communication networks.
  300. Shmarovoz, Georgii Valentinovich; Kozlov, Alexander Viktorovich; Demyanenko, Anna Aleksandrovna; Latysheva, Iulia Nikolaevna; Ganin, Egor Vladimirovich, Method of and system for constructing a listing of E-mail messages.
  301. David L. Gilmour, Method of constructing and displaying an entity profile constructed utilizing input from entities other than the owner.
  302. Gilmour, David L., Method of constructing and displaying an entity profile constructed utilizing input from entities other than the owner.
  303. Quinlan, Daniel; Wescott, Jeffrey, Method of determining network addresses of senders of electronic mail messages.
  304. Klassen, Gerhard Dietrich, Method of managing inbound communications based on the current location of a wireless communications device.
  305. Beckmann, Mark; Gottschalk, Thomas; Otte, Andreas; Eckert, Michael; Hans, Martin; Schwagmann, Norbert, Method of transmitting data in a communication system.
  306. Arcuri,Michael Philip; Bacioiu,Radu; White,Christopher Cameron; Daley,Paul; Sareen,Chaitanya Dev; Beeman,Anthony Joseph, Method, apparatus, and user interface for managing electronic mail and alert messages.
  307. Gilmour David L., Method, system and apparatus for authorizing access by a first user to a knowledge profile of a second user responsive to an access request from the first user.
  308. Alagna, Michael Anthony; Payne, Charles Andrew; Loiodice, Luca; Smith, Todd Allen, Method, system, and computer program product for security within a global computer network.
  309. Logan, James D.; Call, Charles G, Methods and apparatus for controlling the transmission and receipt of email message.
  310. George, David Alson; Jennings, III, Raymond Byars, Methods and apparatus for identifying spam email.
  311. Shraim, Ihab; Shull, Mark, Methods and systems for analyzing data related to possible online fraud.
  312. Shraim, Ihab; Shull, Mark, Methods and systems for analyzing data related to possible online fraud.
  313. Shraim,Ihab; Shull,Mark, Methods and systems for analyzing data related to possible online fraud.
  314. Yu, Tonny, Methods and systems for analyzing email messages.
  315. Desouza, Francis Aurelio; Sakoda, Jon; Gilliland, Arthur William; Roychowdhary, Anandamoy; Lorenzo, Eric Lyle; Shah, Milan, Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by analyzing message traffic patterns.
  316. Roychowdhary, Anandamoy; Desouza, Francis Aurelio; Sakoda, Jon; Gilliland, Arthur William; Lorenzo, Eric Lyle; Shah, Milan, Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using Bayesian filtering.
  317. Desouza, Francis Aurelio; Sakoda, Jon; Gilliland, Arthur William; Roychowdhary, Anandamoy; Lorenzo, Eric Lyle; Shah, Milan, Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using automated IM users.
  318. Desouza, Francis Aurelio; Sakoda, Jon; Gilliland, Arthur William; Roychowdhary, Anandamoy; Lorenzo, Eric Lyle; Shah, Milan, Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using fictitious buddies.
  319. Zhong,Enci, Methods and systems for determining circular dependency.
  320. Horstmann, Jens U.; Tang, Vincent L.; Rothkopf, Alan; Dayan, Tal; Avnur, Arie; Kitagawa, Justin M.; Boyce, Carolyn B.; Schvartsman, Aleksandr M.; Satrasala, Aswath N.; Giovindarajan, Ajay H., Methods and systems for dispatching messages to mobile devices.
  321. Horstmann, Jens U.; Tang, Vincent L.; Rothkopf, Alan; Dayan, Tal; Avnur, Arie; Kitagawa, Justin M.; Boyce, Carolyn B.; Schvartsman, Aleksandr M.; Satrasala, Aswath N.; Govindarajan, Ajay, Methods and systems for dispatching messages to mobile devices.
  322. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  323. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer.
  324. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer using a delivery point identification key.
  325. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  326. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  327. Cook, Jon L.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing a secure electronic mailbox.
  328. Cook, Jon L.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing a secure electronic mailbox.
  329. Campbell, Leo J.; Cook, Jon L.; Orbke, Wayne H.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing an electronic account to a customer.
  330. Yu, Tonny, Methods and systems for suppressing undesireable email messages.
  331. Ben-Yoseph, Roy, Methods of providing access to messages based on degrees of separation.
  332. Thomas, Carol R.; Reed, Michael L., Mining data from communications filtering request.
  333. Urakawa, Yasutaka; Fujita, Masanori, Mobile communication terminal to identify and report undesirable content.
  334. Takami, Tadao; Urakawa, Yasutaka; Kojima, Hisakazu; Ishii, Kenji; Fujita, Masanori, Mobile communication terminal, detection condition distribution server and detected mail notification receiving server.
  335. Hockey, Alyn, Monitoring electronic mail message digests.
  336. Slater, Charles S.; Clegg, Paul J.; Evans, Brennan H.; Schlampp, Peter, Monitoring the flow of messages received at a server.
  337. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  338. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  339. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  340. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  341. Lin,Feng Hui, Multi-stage email interception method.
  342. Fotta, Keith A.; Boudrieau, Richard P.; Ziemba, Jr., Robert E.; D'Amours, Norman M., Network calling privacy with recording.
  343. Fotta, Keith A.; Boudrieau, Richard P.; Ziemba, Jr., Robert E.; D'Amours, Norman M., Network calling privacy with recording.
  344. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  345. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  346. Porras, Phillip Andrew; Valdes, Alfonso De Jesus, Network surveillance.
  347. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance using long-term and short-term statistical profiles to determine suspicious network activity.
  348. Porras, Phillip Andrew; Fong, Martin Wayne, Network-based alert management.
  349. Porras, Phillip Andrew; Fong, Martin Wayne, Network-based alert management system.
  350. Forney, David; Skakkebaek, Jens; Frifeldt, Heine; Shaffer, Anthony, Networked voicemail.
  351. Goodman, Joshua T.; Rounthwaite, Robert L.; Platt, John C., Obfuscation of spam filter.
  352. Shraim, Ihab; Shull, Mark, Online fraud solution.
  353. Shraim, Ihab; Shull, Mark; Hepworth, James, Online fraud solution.
  354. Shraim, Ihab; Shull, Mark; Hepworth, James, Online fraud solution.
  355. Millard,John; Spiegel,Mark, Opening computer files quickly and safely over a network.
  356. Brezin,Jonathan Paul; Kellogg,Wendy Anne; Laff,Mark Richard; Yu,Philip Shi lung, Optimization of system performance based on communication relationship.
  357. Goodman, Joshua T.; Rounthwaite, Robert L.; Gwozdz, Daniel; Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C.; Starbuck, Bryan T., Origination/destination features and lists for spam prevention.
  358. Goodman,Joshua T.; Rounthwaite,Robert L.; Gwozdz,Daniel; Mehr,John D.; Howell,Nathan D.; Rupersburg,Micah C.; Starbuck,Bryan T., Origination/destination features and lists for spam prevention.
  359. Nachenberg, Carey; Weinstein, Alex, Pattern matching using embedded functions.
  360. Daniell, W. Todd; Malik, Dale W., Phonetic filtering of undesired email messages.
  361. Goldman, Phillip Y., Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses.
  362. McCorkendale, Bruce; Sobel, William E., Presentation of network source and executable characteristics.
  363. Szor,Peter, Preventing e-mail propagation of malicious computer code.
  364. Sobel, William E.; Kennedy, Mark, Preventing unauthorized loading of late binding code into a process.
  365. Goodman, Joshua T.; Rounthwaite, Robert L.; Gillum, Eliot C., Prevention of outgoing spam.
  366. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  367. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  368. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  369. Castelli, Eric L., Privacy control system for electronic communication.
  370. Castelli, Eric L., Privacy control system for electronic communication.
  371. Porter, Swain W., Privacy enhanced methods and apparatuses for conducting electronic communications.
  372. Kissel,Timo S., Proactive protection against e-mail worms and spam.
  373. Bowie, David J.; Buford, John F.; Huang, Xiaolan, Process for automatically handling electronic requests for notification of unsolicited commercial email and other service disruptions.
  374. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of textual electronic communication distributed in bulk.
  375. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic communication.
  376. Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic mail.
  377. Fusejima, Atsushi; Suzuki, Takashi; Yoshida, Toshio; Akizuki, Yasunobu, Processing unit.
  378. Hulten, Geoffrey J; Seshadrinathan, Gopalakrishnan; Goodman, Joshua T.; Mishra, Manav; Pengelly, Robert C J; Rounthwaite, Robert L.; Colvin, Ryan C, Proofs to filter spam.
  379. Millard,John, Protecting a computer coupled to a network from malicious code infections.
  380. Bankert, William E.; Chatelain, Jean-Luc; Ciampossin, Philippe; Rodriguez, Eric; Smith, David Lee; Tewari, Amit, Query Service for electronic documents archived in a multi-dimensional storage space.
  381. Zager, Robert Philip; Picazo, Jr., Jose Jesus; Vempaty, Nageshwara Rao; Ames, William; Duvvoori, Vikram, Rapid identification of message authentication.
  382. Giles, Tadd H.; Kromann, Paul K., Rapidly obtaining a subset of message data from a server for filtering.
  383. Pujara, Jay, Real-time ad-hoc spam filtering of email.
  384. Farmer, F. Randall; Mohsenzadeh, Mohammad; Morningstar, Chip; Sample, Neal J., Real-time asynchronous event aggregation systems.
  385. Dreller, Bryan P.; Colburn, Gregory J.; Bilbrey, George M., Real-time classification of email message traffic.
  386. Jhawar, Amit, Real-time detection and prevention of bulk messages.
  387. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  388. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  389. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  390. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  391. Gabe, Christopher John, Reputation-based method and system for determining a likelihood that a message is undesired.
  392. Gabe, Christopher John, Reputation-based method and system for determining a likelihood that a message is undesired.
  393. Toomey, Christopher, Restricting the volume of outbound electronic messages originated by a single entity.
  394. Gangi, Frank Joseph, Retail point-of-transaction system, program products, and related methods to provide a customized set of identification data to facilitate a transaction using electronic coupons.
  395. Garcia-Martin, Miguel A.; Haruna, Adamu, Retrieval of offline instant messages.
  396. Jagger, Luke D.; Dennis, William R.; Rothwell, Anton C., SPAM report generation system and method.
  397. Martin, Anthony G., Search engine for a computer network.
  398. Chen, Yen-Fu; Handy-Bosma, John Hans; Selvage, Mei Yang; Walker, Keith Raymond, Sectional E-mail transmission.
  399. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  400. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  401. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  402. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  403. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  404. Bregman, Mark; Sobel, William E., Security threat reporting in light of local security tools.
  405. Nachenberg,Carey; Szor,Peter, Selective detection of malicious computer code.
  406. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Self-policing, rate limiting online forums.
  407. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Self-policing, rate limiting online forums.
  408. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Self-policing, rate limiting online forums.
  409. Christensen, Gerald Todd, Sender identification system and method.
  410. Nachenberg,Carey, Signature driven cache extension for stream based scanning.
  411. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  412. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  413. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  414. Wang, Tak Yin; Wong, Patrick, Single use web based passwords for network login.
  415. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  416. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  417. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  418. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  419. Goldman, Phillip Y; Landsman, Richard A, Sorting electronic messages using attributes of the sender address.
  420. Goldman,Phillip Y.; Landsman,Richard A., Sorting electronic messages using attributes of the sender address.
  421. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with blocking of TCP connections from sources of electronic messages.
  422. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with router-level filtering of electronic messages.
  423. Aoki, Norihiro Edwin; Bentov, Shai Itzhak, Spam control based on sender account characteristics.
  424. Mikan, Jeffrey; McNamara, Justin; Cenciarelli, Fulvio; Kafalas, Anastasios L.; Lewis, John Ervin, Spam detection based on an age of a decoy subscriber number.
  425. Goodman, Joshua Theodore; Rounthwaite, Robert L., Spam detector with challenges.
  426. Zheng, Lei; Narayan, Sharat; Risher, Mark E.; Wei, Stanley Ke; Ramarao, Vishwanath Tumkur; Kundu, Anirban, Spam filtering based on statistics and token frequency modeling.
  427. Hulten, Geoffrey J.; Goodman, Joshua T.; Rounthwaite, Robert L.; Mishra, Manav; Murphy, Elissa E.; Mehr, John D., Spam filtering with probabilistic secure hashes.
  428. Bocharov, Alexei V.; Goodman, Joshua T., Spam filtration utilizing sender activity data.
  429. Mandalia, Baiju D., Stand-alone internet mailbox for cable subscribers.
  430. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  431. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  432. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  433. Nachenberg,Carey S.; Guy,Elias E., Stream scanning through network proxy servers.
  434. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse.
  435. Cooley, Shaun P., Suppressing spam using a machine learning based spam filter.
  436. Yu, Tonny, Suppression of undesirable email messages by emulating vulnerable systems.
  437. Yu, Tony, Suppression of undesirable network messages.
  438. Jones, Nathan Robert, System and method for analyzing and filtering journaled electronic mail.
  439. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  440. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  441. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  442. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  443. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  444. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  445. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  446. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  447. Feng, Andrew; Bhandari, Atul; Kucharewski, Valerie, System and method for community centric resource sharing based on a publishing subscription model.
  448. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  449. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  450. Horvitz, Eric J.; Jacobs, Andrew W.; Baribault, Gregory P., System and method for constructing and personalizing a universal information classifier.
  451. Horvitz,Eric J.; Jacobs,Andrew W.; Baribault,Gregory P., System and method for constructing and personalizing a universal information classifier.
  452. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections.
  453. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  454. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  455. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  456. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  457. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  458. Sallam,Ahmed, System and method for correlating network traffic and corresponding file input/output traffic.
  459. Wade, Christopher Michael; Tan, Danilo; Brown, John R.; Krzyzanowski, Paul; Gittleman, Daniel; Dare, Robert M., System and method for creating secure applications.
  460. Foresti, Stefano; Stebbing, William Luke; Lamponi, Paolo, System and method for data transport.
  461. Brown, Jr., Bruce L.; Silberman, Samuel G., System and method for detecting and defeating IP address spoofing in electronic mail messages.
  462. Ngan, Tsuen Wan, System and method for detecting content similarity within email documents by sparse subset hashing.
  463. Bunker, Guy Barry Owen; Ngan, Tsuen Wan, System and method for detecting email content containment.
  464. Lund, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  465. Lung, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  466. Bruno, Mark; Cowings, David; Jensen, Sanford; Morss, Dylan; Schneider, Ken, System and method for filtering fraudulent email messages.
  467. Cowings, David; Hoogstrate, David; Jensen, Sandy; Medlar, Art; Schneider, Ken, System and method for filtering spam messages utilizing URL filtering module.
  468. Landesmann,Mark, System and method for granting deposit-contingent E-mailing rights.
  469. Landesmann, Mark, System and method for granting deposit-contingent e-mailing rights.
  470. Landesmann, Mark; Korba, Randy, System and method for granting deposit-contingent e-mailing rights.
  471. Landesmann,Mark, System and method for granting deposit-contingent e-mailing rights.
  472. Landesmann,Mark; Korba,Randy, System and method for granting deposit-contingent e-mailing rights.
  473. Kephart, Jeffrey Owen, System and method for hindering undesired transmission or receipt of electronic messages.
  474. Osborn, Kevin G., System and method for identifying message propagation.
  475. Fotta, Keith A.; Boudrieau, Richard P., System and method for integrated compliance and contact management.
  476. Fair,Allen M.; Thameen,Omar L., System and method for mailing list mediation.
  477. Zhu,Jing; Hu,George, System and method for managing a trusted email datastore.
  478. Lyle, Ruthie D.; Daniels, Fonda; Schirmer, Andrew L., System and method for managing an electronic storage volume.
  479. Amato, Michael J., System and method for predelivery notifcation using mail image.
  480. Amato, Michael J., System and method for predelivery notification using mail image.
  481. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  482. Hua, Morgan; Rawat, Jai, System and method for preventing screen-scrapers from extracting user screen names.
  483. Hua,Morgan; Rawat,Jai, System and method for preventing screen-scrapers from extracting user screen names.
  484. Bowie,David J.; Buford,John F.; Huang,Xiaolan, System and method for processing customer requests relating to unsolicited commercial email and other service disruptions.
  485. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  486. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  487. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  488. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  489. Shaffer, Anthony; Frifeldt, Heine; Forney, David, System and method for voicemail privacy.
  490. Townshend, Brent, System and method of automatically generating the criteria to identify bulk electronic mail.
  491. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  492. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  493. Krause, Robert G.; Orbke, Wayne H., System and methods for electronic message content identification.
  494. Meltzer, Jason; Haslup, Jason, System and methods for multiple email services having a common domain.
  495. Bennett, Dominic V.; Hu, Dan, System for database reporting.
  496. Yu, Tonny, System for determining degrees of similarity in email message information.
  497. Raghunandan, Hulikunta Prahlad, System for directing e-mail to selected recipients by applying transmission control directives on aliases identifying lists of recipients to exclude or include recipients.
  498. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  499. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  500. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  501. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  502. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  503. Yu, Tonny, System for email processing and analysis.
  504. Pollack, Jordan; Stevenson, Jeremy; Umanoff, Zak, System for regulating flow of information to user by using time dependent function to adjust relevancy threshold.
  505. Quine, Douglas B.; Blue, Richard D, System for selective delivery of electronic communications.
  506. Sobel,William E, System utilizing updated spam signatures for performing secondary signature-based analysis of a held e-mail to improve spam email detection.
  507. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  508. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  509. Amato, Michael J., System, method, and article of manufacture for filtering mail items based upon recipient preference.
  510. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  511. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  512. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  513. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  514. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  515. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  516. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  517. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  518. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  519. Smith, Steven J., Systems and methods for automatically updating electronic mail access lists.
  520. Smith, Steven J.; Schmidt, Kenneth A., Systems and methods for automatically updating electronic mail access lists.
  521. Smith, Steven J.; Schmidt, Kenneth A.; Bunshaft, Maxwell H., Systems and methods for automatically updating electronic mail access lists.
  522. Sherwood,Amy L., Systems and methods for blocking delivery of an electronic communication.
  523. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  524. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  525. Cosoi, Catalin A., Systems and methods for dynamically integrating heterogeneous anti-spam filters.
  526. Cosoi, Catalin A., Systems and methods for electronic fraud prevention.
  527. Chamberlain, Charles R., Systems and methods for electronic postmarking of data including location data.
  528. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  529. Musat, Claudiu C. N.; Cosoi, Catalin A., Systems and methods for generating signatures for electronic communication classification.
  530. Smith,Steven J.; Schmidt,Kenneth A., Systems and methods for governing the performance of high volume electronic mail delivery.
  531. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  532. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  533. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, Systems and methods for managing the transmission of electronic messages through active message date updating.
  534. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fredric L.; Oswall, Michael J., Systems and methods for managing the transmission of electronic messages via message source data.
  535. Judge, Paul, Systems and methods for message threat management.
  536. Judge, Paul, Systems and methods for message threat management.
  537. Judge, Paul, Systems and methods for message threat management.
  538. Judge, Paul, Systems and methods for message threat management.
  539. Judge,Paul, Systems and methods for message threat management.
  540. Judge,Paul, Systems and methods for message threat management.
  541. Smith,Steve; Rayner,Douglas P., Systems and methods for monitoring events associated with transmitted electronic mail messages.
  542. Boisjolie, Darren Ronald; Haadsma, David Kent; Balasubramaniam, Gandhi; Berkemeyer, Jr., Van A.; Cotter, Amy L.; Cotter, Robert B.; Covington, Gary S.; Majoran, Raymond, Systems and methods for multi-layered packet filtering and remote management of network devices.
  543. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  544. Judge,Paul, Systems and methods for upstream threat pushback.
  545. Brahms, Robert; Quinlan, Daniel; Sprosts, Craig, Techniques for determining the reputation of a message sender.
  546. Goulden, David L.; Shevach, Matthew A.; Bennett, Dominic, Techniques for displaying impressions in documents delivered over a computer network.
  547. Nachenberg,Carey S.; Sobel,William E., Temporal access control for computer virus prevention.
  548. Wexelblat,David Eli, Third party provided transactional white-listing for filtering electronic communications.
  549. Barrett, Joseph G.; Muehl, Mark J.; Palino, Todd M., Throttling electronic communications from one or more senders.
  550. Barrett,Joseph G.; Muehl,Mark J.; Palino,Todd M., Throttling electronic communications from one or more senders.
  551. Goodman,Joshua T.; Rounthwaite,Robert L.; Hulten,Geoffrey J.; Yih,Wen tau, Training filters for detecting spasm based on IP addresses and text-related features.
  552. Zaltzman, Ori; Le, Quy Dinh, Trust based moderation.
  553. Zaltzman, Ori; Le, Quy Dinh, Trust based moderation.
  554. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  555. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  556. Skakkebaek, Jens Ulrik; FitzGerald, Cary W., Unified messenging system and method.
  557. Antunes, Marcio Veloso, Universal relationships, system and method to build and operate a repository to manage and share trusted information of entities and their relationships.
  558. Patel,Ashvinkumar P.; Woods,Brian R.; Manber,Udi, Unsolicited electronic mail reduction.
  559. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message diverting communications processor.
  560. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message intercepting communications processor.
  561. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message rejecting communications processor.
  562. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Unsolicited message rejecting communications processor.
  563. Hart, Matthew Thomas, Unwanted e-mail filtering system including voting feedback.
  564. Hart, Matthew Thomas, Unwanted e-mail filtering system including voting feedback.
  565. Martin, Anthony G.; Vandevelde, Scott; Goulden, David L., Updating content of presentation vehicle in a computer network.
  566. Sobel,William E; McCorkendale,Bruce, Use of geo-location data for spam detection.
  567. Meisel,William S., Use of identification codes in the handling and management of communications.
  568. Wang,Bing, User oriented penalty count random rejection of electronic messages.
  569. Pujara, Jay; Ramarao, Vishwanath Tumkur; Xi, Xiaopeng; Zinkevich, Martin; Dasgupta, Anirban; Tseng, Belle; Chu, Wei; Shue, Jyh-Shin Gareth, User trustworthiness.
  570. Isenberg,Henri J., Using a benevolent worm to assess and correct computer security vulnerabilities.
  571. Sallam, Ahmed, Using behavior blocking mobility tokens to facilitate distributed worm detection.
  572. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  573. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  574. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  575. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  576. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  577. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  578. Sallam,Ahmed, Using mobility tokens to observe malicious mobile code.
  579. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, Value-added electronic messaging services and transparent implementation thereof using intermediate server.
  580. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, Value-added electronic messaging services having web-based user accessible message center.
  581. Sobel,William E.; McCorkendale,Bruce, Verification of desired end-state using a virtual machine environment.
  582. Christensen, Scott N., Virtual couponing method and apparatus for use with consumer kiosk.
  583. Skakkebaek, Jens Ulrik; FitzGerald, Cary W., Voicemail filtering and transcription.
  584. Skakkebaek, Jens Ulrik; FitzGerald, Cary W., Voicemail filtering and transcription.
  585. Skakkebaek, Jens Ulrik; FitzGerald, Cary W., Voicemail filtering and transcription.
  586. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  587. Pennell, Mark E.; Zorovic, Aleksandar Sasa; Coleman, Denis R., Web based email control center for monitoring and providing a sumary of the detected event information organized according to relationships between the user and network sites.
  588. Yu,Tonny, Web page filtering including substitution of user-entered email address.
  589. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  590. Castell, William D.; Lewis, Allan D.; Ferguson, Tabitha K.; Yuan, Bill; Patterson, Ian M., Wireless communication system congestion reduction system and method.
  591. Castell, William D.; Lewis, Allan D.; Ferguson, Tabitha K.; Yuan, Bill; Patterson, Ian M., Wireless communication system congestion reduction system and method.
  592. Castell, William David; Lewis, Allan David; Ferguson, Tabitha Kari; Yuan, Bill; Patterson, Ian Michael, Wireless communication system congestion reduction system and method.
  593. Castell,William D.; Lewis,Allan D.; Ferguson,Tabitha K.; Yuan,Bill; Patterson,Ian M., Wireless communication system congestion reduction system and method.
  594. Gilmour,David; Sanders, Jr.,Richard; Epelman Wang,Hernan; Wang,Eric, Withdrawal of requests of target number of requests responses received.
  595. Gross, John N.; Gross, Anthony A., Word checking tool for selectively filtering text documents for undesirable or inappropriate content as a function of target audience.
  596. Steinberg, Eran; Bigioi, Petronel; Raducan, Ilariu, Workflow system for detection and classification of images suspected as pornographic.
  597. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fred; Oswall, Michael J., Zero-minute virus and spam detection.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로