$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for filtering electronic messages 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0921950 (1997-08-26)
발명자 / 주소
  • Cobb Christopher Alan
대리인 / 주소
    Knobbe, Martens, Olson & Bear, LLP
인용정보 피인용 횟수 : 400  인용 특허 : 9

초록

The present invention provides a system and method for filtering unsolicited electronic commercial messages. A system and method according to the present invention for screening out unsolicited commercial messages comprises the steps of receiving a message from a sender, sending a challenge back to

대표청구항

[What is claimed is:] [1.]receiving an electronic message from a sender, the message including an address field containing a sender's address;comparing the sender's address to a list of accepted senders;sending a prompt back to the sender if the sender's address is not contained in the list of accep

이 특허에 인용된 특허 (9)

  1. Davis Derek L., Apparatus and method for providing secured communications.
  2. Hall Robert J., Communications addressing system.
  3. Sundsted Todd, Electronic mail filtering by electronic stamp.
  4. Heiner Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  5. Parker Lance T. ; Tusoni Lawrence D., Internet based training.
  6. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  7. Kaufeld James C. ; Stone Matthew B., Method and system for relaying communications from authorized users.
  8. Scannell Niamh C. (Mountain View CA) Dawson Stuart D. (Reading GB2) Redmond Anthony J. (Dublin IEX) Himbaut Serge (Antibes FRX) Bares Pascale (Villeneuve Loubet FRX) Clark Alison (Morpeth GB2), Method and system for sorting and prioritizing electronic mail messages.
  9. Heyen John G. (Carrollton TX) Kasiraj Chander (Grapevine TX) Wolf Timothy J. (Bedford TX), System using independent attribute lists to show status of shared mail object among respective users.

이 특허를 인용한 특허 (400)

  1. Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C., (More) advanced spam detection features.
  2. Coleman, Keith J.; Shen, Siwei; Harik, Georges; Huang, Kai, Abuse-resistant method of providing invitation codes for registering user accounts with an online service.
  3. Coleman, Keith J.; Shen, Siwei; Harik, Georges; Huang, Kai, Abuse-resistant method of registering user accounts with an online service.
  4. Dukhon, Marina; Harris, Jensen M.; Satterfield, Jesse Clay; Law, Elaine Y.; Mandic, Mirko; Guntaur, Paula, Accessing an out-space user interface for a document editor program.
  5. Dukhon, Marina; Harris, Jensen M.; Satterfield, Jesse Clay; Law, Elaine Y.; Mandic, Mirko; Guntaur, Paula, Accessing an out-space user interface for a document editor program.
  6. Wilson, Brian, Active e-mail filter with challenge-response.
  7. Wilson, Brian, Active e-mail filter with challenge-response.
  8. Wilson, Brian, Active e-mail filter with challenge-response.
  9. Wilson, Brian, Active e-mail filter with challenge-response.
  10. Richard, Philippe, Adaptive data transformation engine.
  11. Richard, Philippe, Adaptive data transformation engine.
  12. Rounthwaite, Robert L.; Goodman, Joshua T.; Heckerman, David E.; Platt, John C.; Kadie, Carl M., Adaptive junk message filtering system.
  13. Rounthwaite,Robert L.; Goodman,Joshua T.; Heckerman,David E.; Platt,John C.; Kadie,Carl M., Adaptive junk message filtering system.
  14. Satterfield, Jesse Clay; Leukart, Richard Hank; Van Tilburg, Martijn E.; Harris, Jensen M.; Avery, William A.; Wiedemann, Bruce D., Adaptive multi-line view user interface.
  15. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  16. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  17. Goodman,Joshua T; Rounthwaite,Robert L; Hulten,Geoffrey J; Deurbrouck,John A; Mishra,Manav; Penta,Anthony P, Advanced URL and IP features.
  18. Starbuck, Bryan T.; Rounthwaite, Robert L.; Heckerman, David E.; Goodman, Joshua T.; Gillum, Eliot C.; Howell, Nathan D.; Aldinger, Kenneth R., Advanced spam detection techniques.
  19. Starbuck, Bryan T.; Rounthwaite, Robert L.; Heckerman, David E.; Goodman, Joshua T.; Gillum, Eliot C.; Howell, Nathan D; Aldinger, Kenneth R., Advanced spam detection techniques.
  20. Rihn, Jennifer; Oliver, Jonathan J., Analyzing traffic patterns to detect infectious messages.
  21. Rihn, Jennifer; Oliver, Jonathan J., Analyzing traffic patterns to detect infectious messages.
  22. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan; Medlar, Art, Apparatus and method for weighted and aging spam filtering rules.
  23. Encinas,Susan; Winarski,Daniel J., Apparatus and method to identify SPAM emails.
  24. Oliver, Jonathan J.; Oliver, Andrew F., Approximate matching of strings for message filtering.
  25. Adkins,Reginald, Authorized email control system.
  26. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Automated response to computer users context.
  27. Robarts, James O.; Newell, Dan; Abbott, Kenneth H., Automated selection of appropriate information based on a computer user's context.
  28. Robarts, James O.; Newell, Dan; Abbott, Kenneth H., Automated selection of appropriate information based on a computer user's context.
  29. Robarts,James O.; Newell,Dan; Abbott,Kenneth H., Automated selection of appropriate information based on a computer user's context.
  30. Robarts,James O.; Newell,Dan; Abbott,Kenneth H., Automated selection of appropriate information based on a computer user's context.
  31. Valeski, Judson, Automatic categorization of entries in a contact list.
  32. Affronti, Michael; Brauninger, Andrew; McCann, Robert Emmett; Edelen, James; Pereira, Jorge, Automatic conversation techniques.
  33. Affronti, Michael; Brauninger, Andrew; Mccann, Robert Emmett; Edelen, James; Pereira, Jorge, Automatic conversation techniques.
  34. Baker,La Veria; Scott,David, Blocking electronic mail content.
  35. Ben Yoseph,Roy; Koschier,Sylvia M., Bulk message identification.
  36. Ben-Yoseph, Roy; Koschier, Sylvia M., Bulk message identification.
  37. Pongsajapan, John, CAPTCHA-based spam control for content creation systems.
  38. Goel, Surendra; Martin, William, Category searching.
  39. Goel, Surendra; Martin, William, Category searching.
  40. Goel,Surendra; Martin,William, Category searching.
  41. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timoth T.; Goldman, Phillip Y., Centralized behavioral information system.
  42. Kraemer, Jeffrey A.; Gladstone, Philip J. S., Challenge protected user queries.
  43. Rajan, Vadakkedathu Thomas; Crawford, Jason L.; Wegman, Mark N., Classification of electronic mail into multiple directories based upon their spam-like properties.
  44. Oliver, Jonathan; Eikenberry, Scott D.; Budman, Gleb; Kim, Brian, Classifying a message based on fraud indicators.
  45. Oliver, Jonathan; Eikenberry, Scott D.; Budman, Gleb; Kim, Brian, Classifying a message based on fraud indicators.
  46. Oliver, Jonathan J.; Koblas, David A., Classifying a message based on likelihood of spoofing.
  47. Dean, Erin Elizabeth; Harris, Jensen M.; Butcher, Aaron Michael; Satterfield, Jesse Clay, Command user interface for displaying multiple sections of software functionality controls.
  48. Dean, Erin Elizabeth; Harris, Jensen M.; Butcher, Aaron Michael; Satterfield, Jesse Clay, Command user interface for displaying multiple sections of software functionality controls.
  49. McCormack, Michael J.; Kenney, Adam Russell; Bryant, Christopher W.; Covington, Clinton Dee; Dickinson, Richard L.; Coggins, Robert E.; Krout, Kelly Michael; Selca, Vitore; Woodall, Zachary P.; Hough, Dan Jacob, Command user interface for displaying selectable functionality controls in a database application.
  50. Harris, Jensen M.; Butcher, Aaron M.; Morton, David A.; Satterfield, Jesse Clay; Denney, Justin, Command user interface for displaying selectable software functionality controls.
  51. Harris, Jensen M.; Butcher, Aaron M.; Morton, David A.; Satterfield, Jesse Clay; Denney, Justin, Command user interface for displaying selectable software functionality controls.
  52. Dukhon, Marina; Gordner, Jonathan Ian; Satterfield, Jesse Clay; Singh, Navjot; Trevino, Maria Fernandez; Alberts, Amy E.; Guntaur, Paula, Communication between a document editor in-space user interface and a document editor out-space user interface.
  53. Gordner, Jonathan Ian; Dukhon, Marina; Satterfield, Jesse Clay; Singh, Navjot; Trevino, Maria Fernandez; Alberts, Amy E.; Guntaur, Paula, Communication between a document editor in-space user interface and a document editor out-space user interface.
  54. Sampson,Scott E., Communication management using a token action log.
  55. Maemura,Koichiro, Communication terminal device, facsimile device, and a method of controlling communication terminal device and facsimile device.
  56. Landsman, Richard A., Community messaging lists for authorization to deliver electronic messages.
  57. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué.
  58. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities.
  59. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects.
  60. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects.
  61. Keohane, Susann Marie; McBrearty, Gerald Francis; Mullen, Shawn Patrick; Murillo, Jessica; Shieh, Johnny Meng-Han, Conditioned delivery of electronic mail.
  62. Keohane, Susann Marie; McBrearty, Gerald Francis; Mullen, Shawn Patrick; Murillo, Jessica; Shieh, Johnny Meng-Han, Conditioned delivery of electronic mail.
  63. Robarts, James O.; Matteson, Eric L., Contextual responses based on automated learning techniques.
  64. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  65. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  66. Reno, James D.; Hamilton, III, Thomas E.; Morrison, Kenneth William Scott, Determining trustworthiness of API requests based on source computer applications' responses to attack messages.
  67. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Diminishing false positive classifications of unsolicited electronic-mail.
  68. Ciurumelea, Mircea Gabriel; Christoph, Stefan, Discovering spam merchants using product feed similarity.
  69. Goel, Surendra; Kellum, David E.; Donaldson, Thomas E., Displaying search results.
  70. Goel, Surendra; Kellum, David E.; Donaldson, Thomas E., Displaying search results.
  71. Goel, Surendra; Kellum, David E.; Donaldson, Thomas E., Displaying search results.
  72. Goel, Surendra; Kellum, David E.; Donaldson, Thomas E., Displaying search results.
  73. Goel,Surendra; Kellum,David E.; Donaldson,Thomas E., Displaying search results.
  74. Mark Raymond Pace ; Brooks Cash Talley, Distributed content identification system.
  75. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Efficient use of resources in message classification.
  76. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Efficient use of resources in message classification.
  77. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Efficient use of resources in message classification.
  78. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Electronic message system with federation of trusted senders.
  79. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Susan Rayl, Electronic message system with federation of trusted senders.
  80. Maller,Steven T., Email filtering methods and systems.
  81. Emigh, Aaron T.; Roskind, James A., Enhanced challenge-response.
  82. Hartwell, Aaron; Pell, Mike, Expanded search and find user interface.
  83. Hartwell, Aaron; Pell, Mike, Expanded search and find user interface.
  84. Hartwell, Aaron; Pell, Mike, Expanded search and find user interface.
  85. Dukhon, Marina; Guntaur, Paula; Satterfield, Jesse Clay; Alberts, Amy E., Exposing non-authoring features through document status information in an out-space user interface.
  86. Kato, Tokunori, Facsimile apparatus.
  87. Advocate, William H.; Samuels, Donald J., Facsimile system, method and program product with junk fax disposal.
  88. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  89. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  90. Rounthwaite, Robert L.; Goodman, Joshua T.; Heckerman, David E.; Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C.; Slawson, Dean A., Feedback loop for spam prevention.
  91. Rounthwaite,Robert L.; Goodman,Joshua T.; Heckerman,David E.; Mehr,John D.; Howell,Nathan D.; Rupersburg,Micah C.; Slawson,Dean A., Feedback loop for spam prevention.
  92. Heiner, Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  93. Goldman, Phillip Y.; Landsman, Richard A.; Migliore, Michael R.; Heiner, Jeffrey N.; Logue, Jay, Filtering electronic messages while permitting delivery of solicited electronics messages.
  94. Donaldson,Thomas E.; Kellum,David E.; Goel,Surendra, Filtering search results.
  95. Reardon, David C, Financial transaction system with integrated electronic messaging, control of marketing data, and user defined charges for receiving messages.
  96. Reardon, David C., Financial transaction system with integrated electronic messaging, control of marketing data, and user defined charges for receiving messages.
  97. Reardon, David C., Financial transaction system with integrated electronic messaging, control of marketing data, and user defined charges for receiving messages.
  98. Radtke, Roland; Satterfield, Jesse Clay; Harris, Jensen M.; Peters, Mark A.; Menon, Deepak; Ligameri, Mark R., Floating command object.
  99. McMillan, Bruce A.; Wallace, Andrew J.; Koorland, Neil K.; Wang, Qiang; Attwell, Simon P.; Neely, Samuel J., Framework to enable integration of anti-spam technologies.
  100. Oliver, Jonathan; Eikenberry, Scott D.; Budman, Gleb; Kim, Brian, Fraudulent message detection.
  101. Oliver,Jonathan; Eikenberry,Scott D.; Budman,Gleb; Kim,Bryan, Fraudulent message detection.
  102. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Generating and supplying user context data.
  103. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  104. Maemura,Kohichiroh, Harassment mail reception suppressing network facsimile.
  105. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  106. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  107. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  108. Zhao, Jason Xiaobo; Guinn, Julie Ann; Hill, Ryan Charles; Pearson, Mark, Hierarchically-organized control galleries.
  109. Zhao, Jason Xiaobo; Guinn, Julie Ann; Hill, Ryan Charles; Pearson, Mark, Hierarchically-organized control galleries.
  110. Bronstein, Alexandre, Human test based on human conceptual capabilities.
  111. Emigh, Aaron T.; Roskind, James A., Hybrid challenge-response.
  112. Oliver, Jonathan J.; Budman, Gleb; Oliver, Andrew F.; Koontz, Eugene; Drake, Christine, Identification of protected content in e-mail messages.
  113. Wieneke, Paul R.; Eikenberry, Scott D.; Nufire, Tim; Koblas, David A.; Wilson, Brian K., Identifying e-mail messages from allowed senders.
  114. Murphy, Elissa E.; Goodman, Joshua T; Hazeur, Derek M; Rounthwaite, Robert L; Hulten, Geoffrey J, Incremental anti-spam lookup and update service.
  115. Singh,Tarvinder P.; Sharma,Vivek, Indirect disposable email addressing.
  116. Rothwell,Anton C.; Jagger,Luke D.; Dennis,William R.; Clarke,David R., Intelligent SPAM detection system using statistical analysis.
  117. Goodman, Joshua T.; Rounthwaite, Robert L.; Hulten, Geoffrey J.; Hazeur, Derek, Intelligent quarantining for spam prevention.
  118. Francis J. Stanbach, Jr. ; Daniel G. Hoffman ; Bruce R. Keiser, Internet hosting system.
  119. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system and method.
  120. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system method.
  121. Leeds, Robert G., Junk electronic mail detector and eliminator.
  122. Leeds, Robert G., Junk electronic mail detector and eliminator.
  123. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Logging and analyzing computer user's context data.
  124. McQueen, Donald J.; Maxwell, Lachlan A., Machine learning and validation of account names, addresses, and/or identifiers.
  125. Richard,Philippe, Managed information transmission of electronic items in a network environment.
  126. Sampson,Scott E., Managing a message communication and file system.
  127. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  128. Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing electronic messages.
  129. Landsman,Richard A.; Sullivan,Timothy Thomas; Logue,Jay Dare, Managing electronic messages using contact information.
  130. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  131. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  132. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  133. Rihn,Jennifer; Oliver,Jonathan J., Managing infectious messages as identified by an attachment.
  134. Abbott, Kenneth H.; Newell, Dan; Robarts, James O.; Freedman, Joshua M., Managing interactions between computer users' context models.
  135. Logue, Jay; Heiner, Jeffrey N.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing self-addressed electronic messages.
  136. Dhanjal, Savraj Singh; Mogilevsky, Alex; Morton, David Andrew; Ramani, Preethi; Luu, Dien Trang; Faller, Eric Michael; Fomichev, Andrew; Chang, Andy Chung-An, Markup based extensibility for user interfaces.
  137. Abbott, Kenneth H.; Newell, Dan; Robarts, James O.; Freedman, Joshua M.; Apacible, Johnson, Mediating conflicts in computer users context data.
  138. Mauseth, Michael Jon; Jones, Jr., Woodrow Arnold; Malik, Rajeev Kumar; Springer, Joel Richard, Merchant scoring system and transactional database.
  139. Worrell, Steven W.; Rogers, Steven K.; Kabrisky, Matthew; Amburn, Philip, Message and user attributes in a message filtering method and system.
  140. Emigh, Aaron T.; Roskind, James A., Message authorization.
  141. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  142. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  143. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  144. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  145. Oliver, Jonathan J.; Koblas, David A., Message classification based on likelihood of spoofing.
  146. Oliver,Jonathan J.; Koblas,David A.; Wilson,Brian K., Message classification using a summary.
  147. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using allowed items.
  148. Oliver, Jonathan J.; Roy, Scott; Eikenberry, Scott D.; Kim, Bryan; Koblas, David A.; Wilson, Brian K., Message classification using classifiers.
  149. Oliver, Jonathan J.; Koblas, David A., Message classification using domain name and IP address extraction.
  150. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  151. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  152. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  153. Oliver, Jonathan J.; Budman, Gleb; Oliver, Andrew F.; Koontz, Eugene; Drake, Christine, Message distribution control.
  154. Oliver, Jonathan J.; Budman, Gleb; Oliver, Andrew F.; Koontz, Eugene; Drake, Christine, Message distribution control.
  155. Shuster, Gary Stephen, Message filtering method.
  156. Shuster, Gary Stephen, Message filtering method.
  157. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  158. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  159. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  160. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  161. Starbuck, Bryan T.; Rounthwaite, Robert L.; Heckerman, David E.; Goodman, Joshua T., Message rendering for identification of content features.
  162. Starbuck,Bryan T.; Rounthwaite,Robert L.; Heckerman,David E.; Goodman,Joshua T., Message rendering for identification of content features.
  163. Lu, Larry L., Message screening system.
  164. Lu, Larry L., Message screening system utilizing supervisory screening and approval.
  165. Lu, Larry L., Message screening system utilizing supervisory screening and approval.
  166. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Message testing.
  167. Landsman, Richard A., Messaging systems and methods.
  168. Landsman, Richard A., Messaging systems and methods.
  169. Chin, Ren; Cowings, David; Jensen, Sanford, Method and apparatus for certifying mass emailings.
  170. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Method and apparatus for classifying electronic messages.
  171. Walden,Jonathan; Danziger,Bruce, Method and apparatus for content based routing of messages.
  172. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan; Medlar, Art, Method and apparatus for filtering E-mail.
  173. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan, Method and apparatus for filtering e-mail.
  174. Regnier, Alain, Method and apparatus for filtering electronic messages.
  175. Gleeson, Matt; Hoogstrate, David; Jensen, Sandy; Mantel, Eli; Medlar, Art; Schneider, Ken, Method and apparatus for filtering email spam using email noise reduction.
  176. Gleeson, Matt; Hoogstrate, David; Jensen, Sandy; Mantel, Eli; Medlar, Art; Schneider, Ken, Method and apparatus for filtering email spam using email noise reduction.
  177. Cowings, David; Jensen, Sanford; Wiegner, Carlin, Method and apparatus for maintaining reputation lists of IP addresses to detect email spam.
  178. Glasser, Alan L.; Lucas, John F.; Spear, Steven W.; Velez-Kohler, Laura, Method and apparatus for selective E-mail processing.
  179. Glasser, Alan L.; Lucas, John F.; Spear, Steven W.; Velez-Kohler, Laura, Method and apparatus for selective email processing.
  180. Liu, Guoming, Method and device for transferring messages.
  181. McElligott, Adrian, Method and software product for identifying unsolicited emails.
  182. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  183. Cartmell, Brian R.; Elliott, Cameron S., Method and system for blocking unwanted communications.
  184. Cartmell,Brian Ross; Elliott,Cameron Scott, Method and system for blocking unwanted communications.
  185. Oliver,Jonathan J.; Koblas,David A.; Wilson,Brian K., Method and system for classifying a message based on canonical equivalent of acceptable items included in the message.
  186. Libbey, Miles; Fenkel, Len; Zhu, Jing; Yoshimoto, Steven Kenichi, Method and system for image verification to prevent messaging abuse.
  187. Berstis, Viktors; Van Leeuwen, George Willard; Pritko, Steven Michael; Shaheen, Amal Ahmed, Method and system for providing control accesses between a device on a non-proprietary bus and a device on a proprietary bus.
  188. Hepworth,James L.; Shah,Faisal, Method and system for searching and monitoring internet trademark usage.
  189. Kirsch, Steven T., Method and system for selectively blocking delivery of bulk electronic mail.
  190. Kirsch,Steven T., Method and system for selectively blocking delivery of bulk electronic mail.
  191. Kirsch,Steven T., Method and system for selectively blocking delivery of electronic mail.
  192. Cunningham, Brian, Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification.
  193. Walters, Glen R., Method for preventing deep linking into a web site.
  194. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Method for removing unsolicited e-mail messages.
  195. Drummond, Kirk; Fields, Duane Kimbell; Gregg, Thomas Preston; Kolb, Mark Andrew, Method for restricting delivery of unsolicited E-mail.
  196. Brogne, Nicolas; Kelles, Jean Pierre; Sutter, Emmanuel; Lemke, Andreas C., Method of manipulating an already sent e-mail and a corresponding server.
  197. Cowan, Mathew, Method, medium, and system for online fraud prevention.
  198. Cowan, Mathew, Method, medium, and system for online fraud prevention based on user physical location data.
  199. Alagna, Michael Anthony; Payne, Charles Andrew; Loiodice, Luca; Smith, Todd Allen, Method, system, and computer program product for security within a global computer network.
  200. Rhoads, Geoffrey B.; Levy, Kenneth L., Methods and systems employing digital content.
  201. Horstmann, Jens U.; Tang, Vincent L.; Rothkopf, Alan; Dayan, Tal; Avnur, Arie; Kitagawa, Justin M.; Boyce, Carolyn B.; Schvartsman, Aleksandr M.; Satrasala, Aswath N.; Giovindarajan, Ajay H., Methods and systems for automatically presenting users with option to call sender responsive to email message.
  202. Horstmann, Jens U.; Tang, Vincent L.; Rothkopf, Alan; Dayan, Tal; Avnur, Arie; Kitagawa, Justin M.; Boyce, Carolyn B.; Schvartsman, Aleksandr M.; Satrasala, Aswath N.; Giovindarajan, Ajay H., Methods and systems for dispatching messages to mobile devices.
  203. Horstmann, Jens U.; Tang, Vincent L.; Rothkopf, Alan; Dayan, Tal; Avnur, Arie; Kitagawa, Justin M.; Boyce, Carolyn B.; Schvartsman, Aleksandr M.; Satrasala, Aswath N.; Govindarajan, Ajay, Methods and systems for dispatching messages to mobile devices.
  204. Shah,Milan M.; Lau,Keith K.; Stamerjohn,Jeffrey C., Methods and systems for end-users extensible electronic mail.
  205. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  206. Horstmann, Jens U.; Giovindarajan, Ajay H.; Rothkopf, Alan; Dayan, Tal; Avnur, Arie; Kitagawa, Justin M.; Boyce, Carolyn B.; Schvartsman, Aleksandr M.; Satrasala, Aswath N.; Tang, Vincent L., Methods and systems for filtering, sorting, and dispatching messages to wired and wireless devices.
  207. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer.
  208. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer using a delivery point identification key.
  209. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  210. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  211. Campbell, Leo J.; Cook, Jon L.; Orbke, Wayne H.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing an electronic account to a customer.
  212. Sampson, Scott E., Methods for managing the exchange of communication tokens.
  213. Jakobsson, Bjorn Markus; Mueller, Joy Colette, Methods of protecting against spam electronic mail.
  214. Ben-Yoseph, Roy, Methods of providing access to messages based on degrees of separation.
  215. Silverbrook, Kia; Lapstun, Paul, Mobile device for enabling interaction with a printed email document.
  216. Garg, Anupam; Patterson, Eric W., Modifying and formatting a chart using pictorially provided chart elements.
  217. Garg, Anupam; Patterson, Eric W., Modifying and formatting a chart using pictorially provided chart elements.
  218. Garg, Anupam; Patterson, Eric W., Modifying and formatting a chart using pictorially provided chart elements.
  219. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  220. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  221. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  222. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  223. Jeyaraman, Raghav; Maheswaran, Arjun; Chen, Erdong, Multi-tiered anti-spamming systems and methods.
  224. Taboada, Roberto C.; Fernandes, Bertille N.; Jones, Brian M.; Yap, Joe K., Navigating messages within a thread.
  225. Lee, Ja-Youn; Lee, Jong-Seong; Han, Beom-Ku, Navigation unit for automobile.
  226. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity.
  227. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving use.
  228. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Obfuscating identity of a source entity affiliated with a communiqué in accordance with conditional directive provided by a receiving entity.
  229. Goodman, Joshua T.; Rounthwaite, Robert L.; Platt, John C., Obfuscation of spam filter.
  230. Goodman, Joshua T.; Rounthwaite, Robert L.; Gwozdz, Daniel; Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C.; Starbuck, Bryan T., Origination/destination features and lists for spam prevention.
  231. Goodman,Joshua T.; Rounthwaite,Robert L.; Gwozdz,Daniel; Mehr,John D.; Howell,Nathan D.; Rupersburg,Micah C.; Starbuck,Bryan T., Origination/destination features and lists for spam prevention.
  232. Bura, Christopher J.; DeMartini, David A., Policing internet domains.
  233. Smith, Jeffrey C.; Bandini, Jean-Christophe, Policy enforcement in a secure data file delivery system.
  234. Goldman, Phillip Y., Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses.
  235. Goodman, Joshua T.; Rounthwaite, Robert L.; Gillum, Eliot C., Prevention of outgoing spam.
  236. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  237. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  238. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  239. Wieneke, Paul R.; Eikenberry, Scott D.; Nufire, Tim; Koblas, David A.; Wilson, Brian K., Probability based whitelist.
  240. Wieneke, Paul R.; Eikenberry, Scott D.; Nufire, Tim; Koblas, David A.; Wilson, Brian K., Probability based whitelist.
  241. Oliver, Jonathan J.; Koblas, David A., Processing a message based on a boundary IP address and decay variable.
  242. Hulten, Geoffrey J; Seshadrinathan, Gopalakrishnan; Goodman, Joshua T.; Mishra, Manav; Pengelly, Robert C J; Rounthwaite, Robert L.; Colvin, Ryan C, Proofs to filter spam.
  243. Arnady, Shashanka; Doddamani, Chetan; Krishnappa, PrasannaBabu, Provide insensitive summary for an encrypted document.
  244. Russell Falla,Adrian Peter; Hanson,Andrew Bard, Rating and controlling access to emails.
  245. Atkinson, Robert George; Goodman, Joshua T.; Lyon, James M.; Williams, Roy; Ahmed, Khaja E.; Katz, Harry Simon; Rounthwaite, Robert L.; Goldberg, Andrew V.; Dwork, Cynthia, Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles.
  246. Atkinson,Robert George; Goodman,Joshua T.; Lyon,James M.; Williams,Roy; Ahmed,Khaja E.; Katz,Harry Simon; Rounthwaite,Robert L., Reducing unwanted and unsolicited electronic messages by preventing connection hijacking and domain spoofing.
  247. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  248. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  249. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  250. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  251. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Requesting computer user's context data.
  252. Jagger, Luke D.; Dennis, William R.; Rothwell, Anton C., SPAM report generation system and method.
  253. Goel, Surendra, Searching content on web pages.
  254. Goel,Surendra, Searching content on web pages.
  255. Murphy, Elissa E. S.; Hulten, Geoffrey J; Mishra, Manav; Rounthwaite, Robert L., Secure safe sender list.
  256. Murphy, Elissa E. S.; Hulten, Geoffrey J; Mishra, Manav; Rounthwaite, Robert L., Secure safe sender list.
  257. Wei, Min; Sharma, Vivek; Wang, Qiang, Securely and efficiently extending data processing pipeline functionality.
  258. Wei, Min; Sharma, Vivek; Wang, Qiang, Securely extending data processing pipeline functionality.
  259. Hill, Brian; Bjordahl, Hans, Side-by-side shared calendars.
  260. Hill, Brian; Bjordahl, Hans, Side-by-side shared calendars.
  261. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  262. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  263. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  264. Liew, Jeremy, Social networking permissions.
  265. Abbott, Kenneth H.; Robarts, James O.; Newell, Dan, Soliciting information based on a computer user's context.
  266. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  267. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  268. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  269. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  270. Goldman, Phillip Y; Landsman, Richard A, Sorting electronic messages using attributes of the sender address.
  271. Goldman,Phillip Y.; Landsman,Richard A., Sorting electronic messages using attributes of the sender address.
  272. Sherstinsky, Alex; Petviashvili, Joseph; Young, Eric; Christensen, Jonathan, SpIM blocking and user approval techniques for real-time messaging networks.
  273. Goodman, Joshua Theodore; Rounthwaite, Robert L., Spam detector with challenges.
  274. Gagnon, Jean; Lagassey, Paul J., Spam filtering system and method.
  275. Hulten, Geoffrey J.; Goodman, Joshua T.; Rounthwaite, Robert L.; Mishra, Manav; Murphy, Elissa E.; Mehr, John D., Spam filtering with probabilistic secure hashes.
  276. Bocharov, Alexei V.; Goodman, Joshua T., Spam filtration utilizing sender activity data.
  277. Oliver, Jonathan J.; Roy, Scott; Eikenberry, Scott D.; Kim, Bryan; Koblas, David A.; Wilson, Brian K., Statistical message classifier.
  278. Oliver, Jonathan J.; Roy, Scott; Eikenberry, Scott D.; Kim, Bryan; Koblas, David A.; Wilson, Brian K., Statistical message classifier.
  279. Oliver, Jonathan J; Roy, Scott; Eikenberry, Scott D.; Kim, Bryan; Koblas, David A.; Wilson, Brian K., Statistical message classifier.
  280. Abbott, III, Kenneth H.; Newell, Dan; Robarts, James O., Storing and recalling information to augment human memories.
  281. Wallis, Robert J.; Whitaker, James D., Strong confirmation mechanism for manipulation of sensitive configuration data.
  282. Lu, Larry L.; O' Laughlen, Eric; Crowley, John, Supervising user interaction with online services.
  283. Lu, Larry L.; O'Laughlen, Eric; Crowley, John, Supervising user interaction with online services.
  284. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Supplying notifications related to supply and consumption of user context data.
  285. Abbott, Kenneth H.; Freedman, Joshua M.; Newell, Dan; Robarts, James O., Supplying notifications related to supply and consumption of user context data.
  286. McCann, Robert Emmett; Affronti, Michael Anthony; Brauninger, Andrew Russell; Pereira, Jorge; Edelen, IV, James J., Synchronized conversation-centric message list and message reading pane.
  287. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  288. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  289. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  290. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  291. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  292. Isaacs, Ellen; Nardi, Bonnie A.; Whittaker, Stephen, System and method for analyzing communications.
  293. Feng, Andrew; Bhandari, Atul; Kucharewski, Valerie, System and method for community centric resource sharing based on a publishing subscription model.
  294. McIsaac, Joseph E.; Dahllof, Marcus; Tatarsky, Bruce L.; Vallett, Richard K., System and method for controlling access to an electronic message recipient.
  295. McIsaac, Joseph E.; Dahllof, Marcus; Tatarsky, Bruce L.; Vallett, Richard K., System and method for controlling access to an electronic message recipient.
  296. McIsaac, Joseph E.; Dahllof, Marcus; Tatarsky, Bruce L.; Vallett, Richard K., System and method for controlling access to an electronic message recipient.
  297. McIsaac, Joseph; Dahllof, Marcus; Tatarsky, Bruce; Vallett, Richard, System and method for controlling access to an electronic message recipient.
  298. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  299. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  300. Reshef, Eran; Hirsh, Amir, System and method for deterring rogue users from attacking protected legitimate users.
  301. Rissanen,Jussi; Tanskanene,Erkki; Makipaa,Mikko; Pakkala,Timo; Hannula,Esko, System and method for displaying information included in predetermined messages automatically.
  302. Eichstaedt, Matthias; Emens, Michael Lawrence; Kraft, Reiner, System and method for dynamically limiting robot access to server data.
  303. Bruno, Mark; Cowings, David; Jensen, Sanford; Morss, Dylan; Schneider, Ken, System and method for filtering fraudulent email messages.
  304. Cowings, David; Hoogstrate, David; Jensen, Sandy; Medlar, Art; Schneider, Ken, System and method for filtering spam messages utilizing URL filtering module.
  305. Landesmann,Mark, System and method for granting deposit-contingent E-mailing rights.
  306. Landesmann, Mark, System and method for granting deposit-contingent e-mailing rights.
  307. Landesmann, Mark; Korba, Randy, System and method for granting deposit-contingent e-mailing rights.
  308. Landesmann,Mark, System and method for granting deposit-contingent e-mailing rights.
  309. Landesmann,Mark; Korba,Randy, System and method for granting deposit-contingent e-mailing rights.
  310. Kephart, Jeffrey Owen, System and method for hindering undesired transmission or receipt of electronic messages.
  311. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  312. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  313. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  314. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  315. Chang, William I.; Carlson, Josiah, System and method for providing filtering email messages.
  316. Gilhuly, Barry J.; Van, Ngoc Anh; Rahn, Steven M.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information between a host system and a mobile data communication device.
  317. Lazaridis, Mihal; Mousseau, Gary P., System and method for pushing information from a host system to a mobile communication device.
  318. Gilhuly, Barry J.; Van, Ngog Anh; Rahn, Steven M.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device.
  319. Mousseau, Gary P.; Lazaridis, Mihal, System and method for redirecting message attachments between a host system and a mobile data communication device.
  320. Reardon, David C.; Henson, Timothy L., System and method for two-way transfer of funds and electronic content between summa account users with gathering of behavioral metrics and management of multiple currencies and escrow accounts.
  321. Lazaridis, Mihal; Mousseau, Gary P., System and method for using trigger events and a redirector flag to redirect messages.
  322. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  323. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  324. Krause, Robert G.; Orbke, Wayne H., System and methods for electronic message content identification.
  325. Niemi, Frederick Eldin, System for characterizing information from an information producer.
  326. Silverbrook, Kia; Lapstun, Paul, System for composition and transmission of an e-mail message.
  327. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  328. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  329. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  330. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  331. Pang, Stephen Y. F., System for policing junk e-mail messages.
  332. Pang, Stephen Y. F., System for policing junk e-mail messages.
  333. Pang, Stephen Y. F., System for policing junk e-mail messages.
  334. Pang,Stephen Y. F., System for policing junk e-mail messages.
  335. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  336. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  337. Kay, Erik Andrew; Moore, David; Willhite, Daniel L.; Upson, Linus, System, method, and computer program product for filtering messages and training a classification module.
  338. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  339. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  340. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  341. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  342. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  343. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  344. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  345. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  346. Smith, Steven J., Systems and methods for automatically updating electronic mail access lists.
  347. Smith, Steven J.; Schmidt, Kenneth A., Systems and methods for automatically updating electronic mail access lists.
  348. Smith, Steven J.; Schmidt, Kenneth A.; Bunshaft, Maxwell H., Systems and methods for automatically updating electronic mail access lists.
  349. Sherwood,Amy L., Systems and methods for blocking delivery of an electronic communication.
  350. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  351. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  352. Marvin, Kyle; Remy, David; Bau, David; Chavez, Roderick A.; Read, David, Systems and methods for creating network-based software services using source code annotations.
  353. Chamberlain, Charles R., Systems and methods for electronic postmarking of data including location data.
  354. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  355. Horvitz,Eric J., Systems and methods for estimating and integrating measures of human cognitive load into the behavior of computational applications and services.
  356. Horvitz,Eric J., Systems and methods for estimating and integrating measures of human cognitive load into the behavior of computational applications and services.
  357. Smith,Steven J.; Schmidt,Kenneth A., Systems and methods for governing the performance of high volume electronic mail delivery.
  358. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  359. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  360. Judge, Paul, Systems and methods for message threat management.
  361. Judge, Paul, Systems and methods for message threat management.
  362. Judge, Paul, Systems and methods for message threat management.
  363. Judge, Paul, Systems and methods for message threat management.
  364. Judge,Paul, Systems and methods for message threat management.
  365. Judge,Paul, Systems and methods for message threat management.
  366. Smith,Steve; Rayner,Douglas P., Systems and methods for monitoring events associated with transmitted electronic mail messages.
  367. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  368. Judge,Paul, Systems and methods for upstream threat pushback.
  369. Cooley, Shaun, Thwarting phishing attacks by using pre-established policy files.
  370. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  371. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  372. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  373. Rihn, Jennifer; Oliver, Jonathan J., Time zero detection of infectious messages.
  374. Rihn, Jennifer; Oliver, Jonathan J., Time zero detection of infectious messages.
  375. Goodman,Joshua T.; Rounthwaite,Robert L.; Hulten,Geoffrey J.; Yih,Wen tau, Training filters for detecting spasm based on IP addresses and text-related features.
  376. Hendricks,Melanie, Transfer of mail folders between e-mail users.
  377. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message diverting communications processor.
  378. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message intercepting communications processor.
  379. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message rejecting communications processor.
  380. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Unsolicited message rejecting communications processor.
  381. Hart, Matthew Thomas, Unwanted e-mail filtering system including voting feedback.
  382. Himberger, Andrew M.; Gauthier, Tracey M.; Butcher, Aaron M.; Harris, Jensen M.; Satterfield, Jesse Clay, User interface for displaying a gallery of formatting options applicable to a selected object.
  383. Himberger, Andrew M.; Gauthier, Tracey M.; Butcher, Aaron M.; Harris, Jensen M.; Satterfield, Jesse Clay, User interface for displaying a gallery of formatting options applicable to a selected object.
  384. Radtke, Roland; Butcher, Aaron M.; Harris, Jensen M.; Morrow, Catherine R.; Satterfield, Jesse Clay, User interface for displaying selectable software functionality controls that are contextually relevant to a selected object.
  385. Satterfield, Jesse Clay; Butcher, Aaron M.; Morton, David A.; Harris, Jensen M.; Denney, Justin, User interface for displaying selectable software functionality controls that are relevant to a selected object.
  386. Satterfield, Jesse Clay; Butcher, Aaron M.; Morton, David A.; Harris, Jensen M.; Denney, Justin, User interface for displaying selectable software functionality controls that are relevant to a selected object.
  387. Satterfield, Jesse Clay; Butcher, Aaron M.; Morton, David A.; Harris, Jensen M.; Denney, Justin, User interface for displaying selectable software functionality controls that are relevant to a selected object.
  388. Leukart, Richard H.; Frankel, Glenn L.; Jensen, Stephen D.; Savastano, Hernan; Williams, Cheryl L., User interface for providing task management and calendar information.
  389. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  390. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  391. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  392. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  393. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  394. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  395. Gourevitch, Gregory; Luttinen, Todd; Boctor, Victor; De Graaf, Wilbert; Zhao, Lizhuang, Using e-mail message characteristics for prioritization.
  396. Gourevitch, Gregory; Luttinen, Todd; Boctor, Victor; De Graaf, Wilbert; Zhao, Lizhuang, Using e-mail message characteristics for prioritization.
  397. Downey, Brandon A.; Patel, Amit J.; Yu, Chris, Verifying access rights to a network account having multiple passwords.
  398. Eric Horvitz, Waiting prior to engaging in action for enhancement of automated service.
  399. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  400. Gross, John N.; Gross, Anthony A., Word checking tool for selectively filtering text documents for undesirable or inappropriate content as a function of target audience.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로