$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for filtering unauthorized electronic mail messages 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 US-0909811 (1997-08-12)
발명자 / 주소
  • Fleming
  • III Hoyt A.
출원인 / 주소
  • Micron Electronics, Inc.
대리인 / 주소
    Dorsey & Whitney LLP
인용정보 피인용 횟수 : 145  인용 특허 : 4

초록

A computer system and method for filtering unauthorized electronic mail messages that are sent by senders to a user. The system includes a list of the identifications of the senders who are authorized to send an electronic mail message to the user. When an electronic mail message is received, the sy

대표청구항

[ What is claimed is:] [1.]1. A method in a computer system for filtering unauthorized received messages, each received message having a sender, the computer system having a default location for storing received messages the method comprising:for each of a plurality of messages,determining whether t

이 특허에 인용된 특허 (4)

  1. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  2. Nielsen Jakob, Method and apparatus for receiving electronic mail.
  3. Scannell Niamh C. (Mountain View CA) Dawson Stuart D. (Reading GB2) Redmond Anthony J. (Dublin IEX) Himbaut Serge (Antibes FRX) Bares Pascale (Villeneuve Loubet FRX) Clark Alison (Morpeth GB2), Method and system for sorting and prioritizing electronic mail messages.
  4. Heyen John G. (Carrollton TX) Kasiraj Chander (Grapevine TX) Wolf Timothy J. (Bedford TX), System using independent attribute lists to show status of shared mail object among respective users.

이 특허를 인용한 특허 (145)

  1. Girouard, Janice Marie; Ratliff, Emily Jane, Apparatus for managing email messages.
  2. Hanson, James E; Kephart, Jeffrey O, Apparatus for preventing automatic generation of a chain reaction of messages if a prior extracted message is similar to current processed message.
  3. Caughey,David A., Automatic highlighting of new electronic message address.
  4. Davis, John Fred; Himberger, Kevin David; Jeffries, Clark Debs; Jeremiah, Garreth Joseph, Blocking of spam e-mail at a firewall.
  5. Chasin, C. Scott, Bounce management in a trusted communication network.
  6. Ben Yoseph,Roy; Koschier,Sylvia M., Bulk message identification.
  7. Ben-Yoseph, Roy; Koschier, Sylvia M., Bulk message identification.
  8. Brennan, Todd, Centralized timed analysis in a network security system.
  9. Malik,Dale W.; Daniell,W. Todd, Child protection from harmful email.
  10. Rajan, Vadakkedathu Thomas; Crawford, Jason L.; Wegman, Mark N., Classification of electronic mail into multiple directories based upon their spam-like properties.
  11. Brennan, Todd, Content extractor and analysis system.
  12. Karamchedu,Murali M.; Sponaugle,Jeffrey B., Customized electronic messaging.
  13. Vorobiev, Andrei G., Data organization and management system and method.
  14. Mansour, Peter M.; Sherman, Roman, Database clean-up system.
  15. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  16. Weik, Hartmut, Device for automatically processing incoming electronic mail (=e-mail).
  17. Mark Raymond Pace ; Brooks Cash Talley, Distributed content identification system.
  18. Pollack, Jordan B.; Sack, Andy M., Dual-use email system.
  19. Gough, Michael L., E-mail embedded textual hyperlink object.
  20. William B. McCormick ; David Kopans ; George Stojanoff, E-mail filter and method thereof.
  21. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, E-mail filtering services and e-mail service enrollment techniques.
  22. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, E-mail filtering services using Internet protocol routing information.
  23. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, E-mail management services.
  24. Petry,Scott; Irlam,Gordon Raymond; Maggi,Brian, E-mail policy compliance techniques.
  25. Gough, Michael L.; Gough, James J.; Hickman, Paul L., E-mail with discretionary functionality.
  26. Petry, Scott M.; Irlam, Gordon R.; Maggi, Brian, Electronic document policy compliance techniques.
  27. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  28. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  29. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  30. Owen, Brad; Steiner, Jason, Email filtering system and method.
  31. Emigh, Aaron T.; Roskind, James A., Enhanced challenge-response.
  32. Daniell, W. Todd, Filtered email differentiation.
  33. Malik, Dale W., Filtering email messages corresponding to undesirable domains.
  34. Malik,Dale W., Filtering email messages corresponding to undesirable domains.
  35. Malik, Dale W.; Verren, Theodore; Conner, William, Foreign network SPAM blocker.
  36. Malik,Dale; Verren,Theodore; Conner,William, Foreign network SPAM blocker.
  37. Lin, Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  38. Lin,Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  39. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
  40. Emigh, Aaron T.; Roskind, James A., Hybrid challenge-response.
  41. Leeds, Robert G., Junk electronic mail detector and eliminator.
  42. Leeds, Robert G., Junk electronic mail detector and eliminator.
  43. Robert G. Leeds, Junk electronic mail detector and eliminator.
  44. McQueen, Donald J.; Maxwell, Lachlan A., Machine learning and validation of account names, addresses, and/or identifiers.
  45. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  46. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  47. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  48. Emigh, Aaron T.; Roskind, James A., Message authorization.
  49. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  50. Friskel, James, Messaging system for indicating status of a sender of electronic mail and method and computer program product therefor.
  51. Pollack, Jordan; Cutts, Shaun; Rodriguez, Andres; Stevenson, Jeremy; Umanoff, Zak, Method and apparatus for distributing information to users.
  52. Pollack, Jordan; Cutts, Shaun; Rodriguez, Andres; Stevenson, Jeremy; Umanoff, Zak, Method and apparatus for distributing information to users.
  53. Pollack, Jordan; Cutts, Shaun; Rodriguez, Andres, Method and apparatus for evaluating relevancy of messages to users.
  54. Wang, Xuejun; Acton, Brian; Panchapakesan, Venkat, Method and apparatus for performing a search.
  55. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  56. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  57. Gough, Michael L., Method and article of manufacture for an automatically executed application program associated with an electronic message.
  58. Wang, Xuejun; Acton, Brian L.; Panchapakesan, Venkat, Method and computer storage medium for search scoring.
  59. Sommerer, Peter, Method and system for automatically updating contact information within a contact database.
  60. Sommerer,Peter, Method and system for automatically updating contact information within a contact database.
  61. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  62. Beyda, William J.; Shaffer, Shmuel; Bonomo, Paul, Method and system for management of message attachments.
  63. Girouard,Janice Marie; Ratliff,Emily Jane, Method for managing email messages.
  64. Cunningham, Brian, Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification.
  65. Drummond, Kirk; Fields, Duane Kimbell; Gregg, Thomas Preston; Kolb, Mark Andrew, Method for restricting delivery of unsolicited E-mail.
  66. Caughey,David A., Method of automatically populating contact information fields for a new contract added to an electronic contact database.
  67. Wood, Stephen, Method of throttling unwanted network traffic on a server.
  68. Wood, Stephen, Method of throttling unwanted network traffic on a server.
  69. Jakobsson, Bjorn Markus; Mueller, Joy Colette, Methods of protecting against spam electronic mail.
  70. Fanebost, Lars; Rojahn, Tom; Sorensen, Tryggve E.; Stokkedal, Tore, Methods, systems, and computer program products for collaborative junk mail filtering.
  71. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  72. Daniell, W. Todd; Malik, Dale W., Phonetic filtering of undesired email messages.
  73. Castelli, Eric L., Privacy control system for electronic communication.
  74. Castelli, Eric L., Privacy control system for electronic communication.
  75. Porter, Swain W., Privacy enhanced methods and apparatuses for conducting electronic communications.
  76. Gabe, Christopher John, Reputation-based method and system for determining a likelihood that a message is undesired.
  77. Gabe, Christopher John, Reputation-based method and system for determining a likelihood that a message is undesired.
  78. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with blocking of TCP connections from sources of electronic messages.
  79. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with router-level filtering of electronic messages.
  80. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  81. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  82. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  83. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse.
  84. Feng, Andrew; Bhandari, Atul; Kucharewski, Valerie, System and method for community centric resource sharing based on a publishing subscription model.
  85. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  86. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  87. Ahmed, Abbas, System and method for electronic document classification.
  88. Riggins,Mark D., System and method for enabling secure access to services in a computer network.
  89. Brydon, Antony; Patterson, Jeff, System and method for enforcing privacy in social networks.
  90. Lund, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  91. Lung, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  92. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
  93. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  94. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  95. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  96. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  97. Landesmann, Mark, System and method for granting deposit-contingent e-mailing rights.
  98. Kephart, Jeffrey Owen, System and method for hindering undesired transmission or receipt of electronic messages.
  99. Mulhearn, Patrick F. X.; Hearn, Jr., Francis J., System and method for machine-to-machine privacy and security brokered transactions.
  100. Agrawal, Rakesh; Bayardo, Roberto Javier; Gunopulos, Dimitrios; Ho, Ching-Tien Howard; Sarawagi, Sunita; Shafer, John Christopher; Srikant, Ramakrishnan, System and method for organizing repositories of semi-structured documents such as email.
  101. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  102. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  103. Gilhuly, Barry J.; Van, Ngoc Anh; Rahn, Steven M.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information between a host system and a mobile data communication device.
  104. Lazaridis, Mihal; Mousseau, Gary P., System and method for pushing information from a host system to a mobile communication device.
  105. Gilhuly, Barry J.; Van, Ngog Anh; Rahn, Steven M.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device.
  106. Mousseau, Gary P.; Lazaridis, Mihal, System and method for redirecting message attachments between a host system and a mobile data communication device.
  107. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Ying,Christine C., System and method for transmitting workspace elements across a network.
  108. Brydon, Antony; Patterson, Jeff, System and method for using social networks to facilitate business processes.
  109. Lazaridis, Mihal; Mousseau, Gary P., System and method for using trigger events and a redirector flag to redirect messages.
  110. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  111. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  112. Quinlan, Sean M.; Mendez, Daniel J.; Joshi, Rajiv; Ardulov, Yuri, System and methods for asynchronous synchronization.
  113. Quinlan, Sean; Mendez, Daniel J.; Joshi, Rajiv; Ardulov, Yuri, System and methods for asynchronous synchronization.
  114. Quinlan, Sean; Mendez, Daniel J.; Joshi, Rajiv; Ardulov, Yuri, System and methods for asynchronous synchronization.
  115. Meltzer, Jason; Haslup, Jason, System and methods for multiple email services having a common domain.
  116. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  117. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  118. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  119. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  120. Benjamin,Dennis Andrew; Rodda,Nicholas Alan, System for handling electronic mail.
  121. Pang, Stephen Y. F., System for policing junk e-mail messages.
  122. Pang, Stephen Y. F., System for policing junk e-mail messages.
  123. Pang,Stephen Y. F., System for policing junk e-mail messages.
  124. Klos,Thomas John; Moore,D. Suzanne, System for processing electronic mail messages with specially encoded addresses.
  125. Pollack, Jordan; Stevenson, Jeremy; Umanoff, Zak, System for regulating flow of information to user by using time dependent function to adjust relevancy threshold.
  126. Davis, John Fred; Himberger, Kevin David; Jeffries, Clark Debs; Jeremiah, Garreth Joseph, System, method and program to limit rate of transferring messages from suspected spammers.
  127. Kay, Erik Andrew; Moore, David; Willhite, Daniel L.; Upson, Linus, System, method, and computer program product for filtering messages and training a classification module.
  128. Smith, Steven J., Systems and methods for automatically updating electronic mail access lists.
  129. Smith, Steven J.; Schmidt, Kenneth A., Systems and methods for automatically updating electronic mail access lists.
  130. Smith, Steven J.; Schmidt, Kenneth A.; Bunshaft, Maxwell H., Systems and methods for automatically updating electronic mail access lists.
  131. Smith,Steven J.; Schmidt,Kenneth A., Systems and methods for governing the performance of high volume electronic mail delivery.
  132. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fredric L.; Oswall, Michael J., Systems and methods for managing the transmission of electronic messages via message source data.
  133. Smith,Steve; Rayner,Douglas P., Systems and methods for monitoring events associated with transmitted electronic mail messages.
  134. Wexelblat,David Eli, Third party provided transactional white-listing for filtering electronic communications.
  135. Bellegarda, Jerome R.; Forstall, Scott; Silverman, Kim E. A.; Tiene, Kevin; Serlet, Bertrand, Training a computer storage system for automatic filing of data using graphical representations of storage locations.
  136. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  137. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  138. McDonough, Timothy A.; Ledbetter, Carl J.; Plank, Robert Scott; Fisher, Steven W.; Kaneko, Steven T.; Bathiche, Steven, User notification system with an illuminated computer input device.
  139. McDonough, Timothy A.; Ledbetter, Carl J.; Plank, Robert Scott; Fisher, Steven W.; Kaneko, Steven T.; Bathiche, Steven, User notification system with an illuminated computer input device.
  140. McDonough, Timothy A.; Ledbetter, Carl J.; Plank, Robert Scott; Fisher, Steven W.; Kaneko, Steven T.; Bathiche, Steven, User notification system with an illuminated computer input device.
  141. Horvitz, Eric J., Utility-based archiving.
  142. Horvitz,Eric J., Utility-based archiving.
  143. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, Value-added electronic messaging services and transparent implementation thereof using intermediate server.
  144. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, Value-added electronic messaging services having web-based user accessible message center.
  145. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fred; Oswall, Michael J., Zero-minute virus and spam detection.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로