$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for filtering junk email 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0447590 (1999-11-23)
발명자 / 주소
  • Donaldson Albert L.
출원인 / 주소
  • ESCOM Corporation
대리인 / 주소
    Blank Rome Comisky & McCauley LLP
인용정보 피인용 횟수 : 447  인용 특허 : 14

초록

An Active Filtering proxy filters electronic junk mail (also known as spam, bulk mail, or advertising) received at a Message Transfer Agent from remote Internet hosts using the Simple Mail Transfer Protocol (SMTP). The proxy actively probes remote hosts that attempt to send mail to the protected mai

대표청구항

[ I claim:] [1.]1. A system for detecting and selectively preventing reception of an electronic message to a local message transfer agent (MTA), the electronic message having an address identifying a sender and transferred over a connection from a remote host, the system comprising:a dialup filter d

이 특허에 인용된 특허 (14)

  1. Chen Chia-Hwang ; Luo Chih-Ken, Anti-virus agent for use with databases and mail servers.
  2. Milewski Allen E. ; Smith Thomas M., Communications system and method of operation for electronic messaging using structured response objects and virtual ma.
  3. Lee Eugene H. ; Adler Michael ; Dalton Lisa A. ; Wright David A., Directory with options for access to and display of email addresses.
  4. Doggett John (Brookline MA) Jaffe Frank A. (Sharon MA) Anderson Milton M. (Fair Haven NJ), Electronic funds transfer instruments.
  5. Hussey Peter, Electronic mail interface for a network server.
  6. Mulligan Geoffrey C. ; Chasin Scott ; Street John W. ; Beazley Mary M., Electronic message forwarding system.
  7. Gross Kevin C. (Belmont MA) Digate Charles J. (Boston MA) Lee Eugene H. (Cambridge MA), Event-driven rule-based messaging system.
  8. Knowles Kimberly A. ; Lewis David Dolan, Finding an e-mail message to which another e-mail message is a response.
  9. Krishnan Kalyan ; Keyworth ; II George A., Intelligent communication device.
  10. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  11. Nielsen Jakob, Method and apparatus for receiving electronic mail.
  12. McCormick William B. ; Kopans David, Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms.
  13. Paul Sunil, System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing.
  14. Ji Shuang (Foster City CA) Chen Eva (Cupertino CA), Virus detection and removal apparatus for computer networks.

이 특허를 인용한 특허 (447)

  1. Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C., (More) advanced spam detection features.
  2. Wilson, Brian, Active e-mail filter with challenge-response.
  3. Wilson, Brian, Active e-mail filter with challenge-response.
  4. Wilson, Brian, Active e-mail filter with challenge-response.
  5. Wilson, Brian, Active e-mail filter with challenge-response.
  6. Rounthwaite,Robert L.; Goodman,Joshua T.; Heckerman,David E.; Platt,John C.; Kadie,Carl M., Adaptive junk message filtering system.
  7. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  8. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  9. Goodman,Joshua T; Rounthwaite,Robert L; Hulten,Geoffrey J; Deurbrouck,John A; Mishra,Manav; Penta,Anthony P, Advanced URL and IP features.
  10. Starbuck, Bryan T.; Rounthwaite, Robert L.; Heckerman, David E.; Goodman, Joshua T.; Gillum, Eliot C.; Howell, Nathan D.; Aldinger, Kenneth R., Advanced spam detection techniques.
  11. Starbuck, Bryan T.; Rounthwaite, Robert L.; Heckerman, David E.; Goodman, Joshua T.; Gillum, Eliot C.; Howell, Nathan D; Aldinger, Kenneth R., Advanced spam detection techniques.
  12. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  13. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  14. Chandra Sekhar, Bharath Kumar; Li, Jianda; Liu, Shuosen Robert; Kodukula, Narasimham, Anti-spam implementations in a router at the network layer.
  15. Wang, Bing, Apparatus and method for handling electronic mail.
  16. Wang,Bing, Apparatus and method for handling electronic mail.
  17. Syiek, Bronwyn; Bhanap, Nina; Gowda, Rakesh; Guntha, Ramesh, Apparatus and method for precluding e-mail distribution.
  18. Girouard, Janice Marie; Ratliff, Emily Jane, Apparatus for managing email messages.
  19. Willey, William Daniel, Apparatus, and associated method, for alerting user of communication device of entries on a mail message distribution list.
  20. Willey, William Daniel, Apparatus, and associated method, for alerting user of communication device of entries on a mail message distribution list.
  21. Dawson, Devon L.; Britt, Steven V.; Cowham, Adrian, Application of fuzzy logic to response and unsolicited information.
  22. Schneider, James P., Aspect services.
  23. Lalonde, Chris; Abbott, Marty; Sanford, Kirk; Isaacs, Greg, Authenticating electronic communications.
  24. Ralston,Geoffrey D.; Nakayama,David H.; Lewin,Matthew E.; Jayachandran,Ravichandran Menon; Woods,Brian R.; Manber,Udi, Automated bulk communication responder.
  25. Zheng,Hao; Chu,Bruce Hui der; Kundu,Anirban; Libbey,Miles A.; Nakayama,David H.; Zhu,Jing, Automated solicited message detection.
  26. Baker,La Veria; Scott,David, Blocking electronic mail content.
  27. Chasin, C. Scott, Bounce management in a trusted communication network.
  28. Ben Yoseph,Roy; Koschier,Sylvia M., Bulk message identification.
  29. Ben-Yoseph, Roy; Koschier, Sylvia M., Bulk message identification.
  30. Wallace,Andrew; Koorland,Neil K.; Hedberg,Erik; Wang,Qiang; Neely,Samuel J.; Morris,Max G.; Noursalehi,Saeed, Challenge response messaging solution.
  31. Malik,Dale W.; Daniell,W. Todd, Child protection from harmful email.
  32. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  33. Lazaridis, Mihal, Color differentiating a portion of a text message shown in a listing on a handheld communication device.
  34. Lazaridis, Mihal, Color differentiating a portion of a text message shown in a listing on a handheld communication device.
  35. Gellens, Randall Coleman, Communicating information about the character of electronic messages to a client.
  36. Sampson,Scott E., Communication management using a token action log.
  37. Farris, Jack, Communication system having message encryption.
  38. Tsuda, Masayuki; Naganuma, Takefumi; Nagasawa, Hideyuki; Oseki, Eriko; Maeda, Fukiko; Watanabe, Nobuyuki; Asai, Mao; Kondo, Takashi; Yamada, Kazuhiro; Kamiya, Dai, Communications module execution control system, communications module execution control method, application execution control system, and application execution control method.
  39. Stewart, Walter Mason; Carrera, Marcelo; Hook, Robert G., Computer virus protection.
  40. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  41. Helferich, Richard J., Content provision to subscribers via wireless transmission.
  42. Hernacki, Brian, Correlating network DNS data to filter content.
  43. Satish, Sourabh, Countering spam through address comparison.
  44. Shigezumi,Makiba, DNS server filter checking for abnormal DNS packets.
  45. Wittman, Brian Albert, Data traffic filtering indicator.
  46. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  47. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  48. Sekhar, Bharath Kumar Chandra; Kodukula, Narasimham, Detecting anonymized data traffic.
  49. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  50. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  51. Hodgson, Garren G., Detection and prevention of e-mail malware attacks.
  52. Schier,John E, Device, system, and method for capturing email borne viruses.
  53. Mark Raymond Pace ; Brooks Cash Talley, Distributed content identification system.
  54. Parsons, Robert R., Domain name hijack protection.
  55. Parsons, Robert R., Domain name hijack protection.
  56. Parsons, Robert R., Domain name hijack protection.
  57. Loughmiller,Scott; Olson,Mike; Ready,Jeff; Maedge,Ehren; White,Phil; Collier,Jason, Dynamic message filtering.
  58. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, E-mail filtering services and e-mail service enrollment techniques.
  59. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, E-mail filtering services using Internet protocol routing information.
  60. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, E-mail management services.
  61. Brown, Scott T.; Wanser, Kelly A., E-mail messaging system and method for enhanced rich media delivery.
  62. Brown, Scott T.; Wanser, Kelly A., E-mail messaging system and method for enhanced rich media delivery.
  63. Brown, Scott T.; Wanser, Kelly A., E-mail messaging system and method for enhanced rich media delivery.
  64. Brown, Scott T.; Wanser, Kelly A., E-mail messaging system and method for enhanced rich media delivery.
  65. Petry,Scott; Irlam,Gordon Raymond; Maggi,Brian, E-mail policy compliance techniques.
  66. Yang,Ping Fai, Efficient implementation of wildcard matching on variable-sized fields in content-based routing.
  67. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Efficient use of resources in message classification.
  68. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Efficient use of resources in message classification.
  69. Petry, Scott M.; Irlam, Gordon R.; Maggi, Brian, Electronic document policy compliance techniques.
  70. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  71. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  72. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Electronic message source reputation information system.
  73. Yu, Tonny, Email analysis using fuzzy matching of text.
  74. Yu, Tonny, Email analysis using fuzzy matching of text.
  75. Akimoto, Masao, Email communication system naming using a specific identification character in addition to a complete address for performing a predetermined process.
  76. Gillum, Eliot C., Email trust service.
  77. Toyota,Kiyoshi; Murata,Matsutoshi; Akimoto,Masao, Encrypted mail transmission system.
  78. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  79. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  80. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  81. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  82. Rounthwaite, Robert L.; Goodman, Joshua T.; Heckerman, David E.; Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C.; Slawson, Dean A., Feedback loop for spam prevention.
  83. Rounthwaite,Robert L.; Goodman,Joshua T.; Heckerman,David E.; Mehr,John D.; Howell,Nathan D.; Rupersburg,Micah C.; Slawson,Dean A., Feedback loop for spam prevention.
  84. Daniell, W. Todd, Filtered email differentiation.
  85. Malik, Dale W., Filtering email messages corresponding to undesirable domains.
  86. Malik,Dale W., Filtering email messages corresponding to undesirable domains.
  87. Connelly, Michael; Quilici, Alexander E., Filtering incoming mails.
  88. Malik, Dale W.; Verren, Theodore; Conner, William, Foreign network SPAM blocker.
  89. Malik,Dale; Verren,Theodore; Conner,William, Foreign network SPAM blocker.
  90. McMillan, Bruce A.; Wallace, Andrew J.; Koorland, Neil K.; Wang, Qiang; Attwell, Simon P.; Neely, Samuel J., Framework to enable integration of anti-spam technologies.
  91. Wallace,Andrew J.; Koorland,Neil K.; Wang,Qiang; Neely,Samuel J.; Atwell,Simon P., Framework to enable integration of anti-spam technologies.
  92. Lin, Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  93. Lin,Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  94. Lee, Jin-Shi, Generation of debug information for debugging a network security appliance.
  95. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  96. Rowley, Peter A., Graphical spam detection and filtering.
  97. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  98. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  99. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  100. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  101. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  102. Haghpassand, Joshua, Highly accurate security and filtering software.
  103. Hippelainen, Lassi, IP address management.
  104. Sutton, Jr., Lorin R.; Ben-Yoseph, Roy, Identification and filtration of digital communications.
  105. Sutton, Jr.,Lorin R.; Ben Yoseph,Roy, Identification and filtration of digital communications.
  106. Lee, Frank; Liang, Jeremy G.; Chen, Eva; Lin, Yi Jing, Identification of undesirable content in responses sent in reply to a user request for content.
  107. Wieneke, Paul R.; Eikenberry, Scott D.; Nufire, Tim; Koblas, David A.; Wilson, Brian K., Identifying e-mail messages from allowed senders.
  108. Murphy, Elissa E.; Goodman, Joshua T; Hazeur, Derek M; Rounthwaite, Robert L; Hulten, Geoffrey J, Incremental anti-spam lookup and update service.
  109. Ooi,Junji, Information processing apparatus and method, recording medium product, and program.
  110. Srivastava,Alok Kumar; Saggi,Dipak; Hamadani,Babak; Mishra,Sambit, Infrastructure for verifying configuration and health of a multi-node computer system.
  111. Goodman, Joshua T.; Rounthwaite, Robert L.; Hulten, Geoffrey J.; Hazeur, Derek, Intelligent quarantining for spam prevention.
  112. Hasegawa,Masakazu, Junk mail rejection system.
  113. Makinson,Graham Arthur; Baulk,Eamonn John; Wolff,Daniel Joseph, Malware scanning using a network bridge.
  114. Sampson,Scott E., Managing a message communication and file system.
  115. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  116. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  117. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  118. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  119. Oliver, Jonathan J.; Wilson, Brian K.; Uyeda, Damon K.; Eikenberry, Scott D.; Koblas, David A.; Nufire, Tim, Message challenge response.
  120. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  121. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  122. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  123. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  124. Starbuck, Bryan T.; Rounthwaite, Robert L.; Heckerman, David E.; Goodman, Joshua T., Message rendering for identification of content features.
  125. Starbuck,Bryan T.; Rounthwaite,Robert L.; Heckerman,David E.; Goodman,Joshua T., Message rendering for identification of content features.
  126. Gardner, Jon S.; Wang, Juin J.; Scott, Matthew V., Messaging and document management system and method.
  127. Gardner,Jon S., Messaging and document management system and method.
  128. Schneider, James Paul, Method and an apparatus to generate message authentication codes at a proxy server for validating a web session.
  129. Schneider, James Paul, Method and an apparatus to validate a web session in a proxy server.
  130. Prince, Matthew B., Method and apparatus for a non-revealing do-not-contact list system.
  131. Prince, Matthew B., Method and apparatus for a non-revealing do-not-contact list system.
  132. Lalonde, Chris; Abbott, Marty; Sanford, Kirk; Isaacs, Greg, Method and apparatus for authenticating electronic communication.
  133. Malik, Dale W., Method and apparatus for automatically checking E-mail addresses in outgoing E-mail communications.
  134. Malik,Dale W., Method and apparatus for automatically checking e-mail addresses in outgoing e-mail communications.
  135. Huang, Yennun; Lin, Chih Mei; Yajnik, Shalini; Wang, Chung Yih, Method and apparatus for content-based routing and filtering at routers using channels.
  136. Granoff, Mark H.; Brown, Jr., Bruce L.; Silberman, Samuel G., Method and apparatus for detecting abusive email based on number of hops.
  137. Granoff, Mark H.; Brown, Jr., Bruce L.; Silberman, Samuel G., Method and apparatus for detecting abusive email based on number of hops.
  138. Krishnamurthy, Balachander; Spatscheck, Oliver; Van Der Merwe, Jacobus; Ramachandran, Anirudh, Method and apparatus for identifying phishing websites in network traffic using generated regular expressions.
  139. Krishnamurthy, Balachander; Spatscheck, Oliver; Van Der Merwe, Jacobus; Ramachandran, Anirudh, Method and apparatus for identifying phishing websites in network traffic using generated regular expressions.
  140. Cowings, David; Jensen, Sanford; Wiegner, Carlin, Method and apparatus for maintaining reputation lists of IP addresses to detect email spam.
  141. Aoki,Norihiro Edwin, Method and apparatus for managing subscription-type messages.
  142. Todd A. Schwartz ; Vaughn S. Iverson, Method and apparatus for private and restricted-use electronic addresses.
  143. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  144. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  145. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  146. Faynberg, Igor; Lu, Hui-Lan; Perlman, Richard; Zeltsan, Zachary, Method and apparatus for reducing e-mail spam and virus distribution in a communications network by authenticating the origin of e-mail messages.
  147. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  148. Haverkos, Todd David, Method and apparatus for scoring unsolicited e-mail.
  149. Glasser, Alan L.; Lucas, John F.; Spear, Steven W.; Velez-Kohler, Laura, Method and apparatus for selective E-mail processing.
  150. Glasser, Alan L.; Lucas, John F.; Spear, Steven W.; Velez-Kohler, Laura, Method and apparatus for selective email processing.
  151. Bhat,Vasudev, Method and apparatus for source-based message authorization and rejection.
  152. Borella,Michael S.; Beser,Nurettin B., Method and application programming interface for assigning multiple network addresses.
  153. Yamakami, Toshihiko, Method and device for processing electronic mail undesirable for user.
  154. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  155. Kirsch,Steven T., Method and system for categorizing and processing e-mails.
  156. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  157. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  158. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  159. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  160. Granoff, Mark H.; Brown, Jr., Bruce L.; Silberman, Samuel G., Method and system for detecting abusive email based on number of hops.
  161. Ye, Jingjun; Ma, Xiaolong; Wang, Congzhi; Wang, Hao, Method and system for determining junk information.
  162. Ullmann,Lorin Evan; Kubik,Joseph, Method and system for e-mail chain group.
  163. Paulsen, Jr.,Robert C.; Wright, Jr.,Cornell G., Method and system for selective email acceptance via encoded email identifiers.
  164. Pham, Quang D.; Henley, Mathew Gene; Brown, Andrew Millard; Edberg, Jeremy B., Method and system for tracking fraudulent activity.
  165. Pham, Quang D.; Henley, Mathew Gene; Brown, Andrew Millard; Edberg, Jeremy B., Method and system for tracking fraudulent activity.
  166. Boisjolie, Darren R.; Ashley, Stephen P.; Balasubramaniam, Gandhi, Method and system for transparent bridging and bi-directional management of network data.
  167. Lukaszyk, Szymon; Jablonski, Dawid, Method and system of transferring electronic messages.
  168. Murray,David J.; Kirsch,Steven T., Method for creating a whitelist for processing e-mails.
  169. Helferich, Richard J., Method for integrating audio and visual messaging.
  170. Girouard,Janice Marie; Ratliff,Emily Jane, Method for managing email messages.
  171. Cunningham, Brian, Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification.
  172. Falk, Rainer; Kohlmayer, Florian, Method for processing messages and message processing device.
  173. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Method for removing unsolicited e-mail messages.
  174. Rosenblum,David S., Method for sending and receiving a Boolean function over a network.
  175. Rosenblum, David S., Method for storing Boolean functions to enable evaluation, modification, reuse, and delivery over a network.
  176. Klaghofer,Karl; M��ller,Harald; Totzke,J��rgen; Volkmann,Gerald, Method for the transmission of data in a packet-oriented data network.
  177. Lin,Po Ching; Lin,Ying Dar; Liu,Ming Dao, Method for web content filtering.
  178. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  179. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  180. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  181. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  182. Bajko, Gábor; Niemi, Aki; Niemi, Valtteri, Method of communication.
  183. Feng, Junlan; Torres, Valerie; Sheleheda, Daniel G., Method of detecting potential phishing by analyzing universal resource locators.
  184. Feng, Junlan; Torres, Valerie; Sheleheda, Daniel G., Method of detecting potential phishing by analyzing universal resource locators.
  185. Brogne, Nicolas; Kelles, Jean Pierre; Sutter, Emmanuel; Lemke, Andreas C., Method of manipulating an already sent e-mail and a corresponding server.
  186. Scott,Mark; Wong,William; Cheng,Anita; Ho,Simon; Irimescu,George; Voineag,Dorel; Yao,Min; Zadeh,Row J., Method, system, and computer program product for managing database servers and service.
  187. Scott, Mark; Wong, William; Cheng, Anita; Ho, Simon; Irimescu, George; Voineag, Dorel; Yao, Min; Zadeh, Row J., Method, system, and computer program product for managing routing servers and services.
  188. Campbell, Alexander Wade; Dolsen, Lee Thomas; Ositis, Vilis; Smith, Cameron Charles, Methods and apparatus for blocking unwanted software downloads.
  189. Campbell, Alexander Wade; Dolsen, Lee Thomas; Ositis, Vilis; Smith, Cameron Charles, Methods and apparatus for blocking unwanted software downloads.
  190. Logan, James D.; Call, Charles G, Methods and apparatus for controlling the transmission and receipt of email message.
  191. Lim, Jing Yee; Cutts, Matthew Daniell; Golub, Seth, Methods and apparatus for detecting spam messages in an email system.
  192. George, David Alson; Jennings, III, Raymond Byars, Methods and apparatus for identifying spam email.
  193. Doherty, James M.; Adams, Thomas Lee; Mueller, Steve, Methods and apparatus for maintaining connectivity with an internet protocol phone operating behind a firewall.
  194. Yu, Tonny, Methods and systems for analyzing email messages.
  195. Nachenberg, Carey; Spertus, Michael; Satish, Sourabh; Egan, Gerry, Methods and systems for creating and updating approved-file and trusted-domain databases.
  196. Horstmann, Jens U.; Tang, Vincent L.; Rothkopf, Alan; Dayan, Tal; Avnur, Arie; Kitagawa, Justin M.; Boyce, Carolyn B.; Schvartsman, Aleksandr M.; Satrasala, Aswath N.; Giovindarajan, Ajay H., Methods and systems for dispatching messages to mobile devices.
  197. Horstmann, Jens U.; Tang, Vincent L.; Rothkopf, Alan; Dayan, Tal; Avnur, Arie; Kitagawa, Justin M.; Boyce, Carolyn B.; Schvartsman, Aleksandr M.; Satrasala, Aswath N.; Govindarajan, Ajay, Methods and systems for dispatching messages to mobile devices.
  198. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  199. Cook, Jon L.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing a secure electronic mailbox.
  200. Cook, Jon L.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing a secure electronic mailbox.
  201. Yu, Tonny, Methods and systems for suppressing undesireable email messages.
  202. Sampson, Scott E., Methods for managing the exchange of communication tokens.
  203. Helferich, Richard J., Methods of performing actions in a cell phone based on message parameters.
  204. Sievers,A. Kent; Parker,Jay; Stephenson,Preston D.; Fletcher,Samuel F., Methods, data structures, and systems to remotely validate a message.
  205. Hockey, Alyn, Monitoring electronic mail message digests.
  206. Slater, Charles S.; Clegg, Paul J.; Evans, Brennan H.; Schlampp, Peter, Monitoring the flow of messages received at a server.
  207. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  208. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  209. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  210. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  211. Lin,Feng Hui, Multi-stage email interception method.
  212. Fotta, Keith A.; Boudrieau, Richard P.; Ziemba, Jr., Robert E.; D'Amours, Norman M., Network calling privacy with recording.
  213. Fotta, Keith A.; Boudrieau, Richard P.; Ziemba, Jr., Robert E.; D'Amours, Norman M., Network calling privacy with recording.
  214. Buckingham,Jay T.; Mehr,John D.; Rehfuss,Paul S; Rounthwaite,Robert L., Network domain reputation-based spam filtering.
  215. Kawano, Shinichi; Aoki, Yukihiko; Adachihara, Tadashi; Araki, Shoji, Network system and communication method, information processing apparatus and method, and program.
  216. Dong, Qijiang; Sun, Yongming, Network-based method and apparatus for filtering junk messages.
  217. Goodman, Joshua T.; Rounthwaite, Robert L.; Platt, John C., Obfuscation of spam filter.
  218. Alspector, Joshua; Kolcz, Aleksander, Online adaptive filtering of messages.
  219. Alspector, Joshua; Kolcz, Aleksander, Online adaptive filtering of messages.
  220. Alspector, Joshua; Kolcz, Aleksander, Online adaptive filtering of messages.
  221. Goodman, Joshua T.; Rounthwaite, Robert L.; Gwozdz, Daniel; Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C.; Starbuck, Bryan T., Origination/destination features and lists for spam prevention.
  222. Goodman,Joshua T.; Rounthwaite,Robert L.; Gwozdz,Daniel; Mehr,John D.; Howell,Nathan D.; Rupersburg,Micah C.; Starbuck,Bryan T., Origination/destination features and lists for spam prevention.
  223. Fukasawa, Ryota; Higashizono, Aya; Hashisaka, Natsu; Okamoto, Masayoshi; Kurashige, Kiyoshi; Tsuda, Hiroshi; Katayama, Yoshinori; Kozakura, Fumihiko; Mochizuki, Shinichi, Outgoing email check system, check data providing apparatus, check data inspecting apparatus, and outgoing email check method.
  224. Helferich, Richard J., Paging transceivers and methods for selectively retrieving messages.
  225. Helferich, Richard J., Paging transceivers and methods for selectively retrieving messages.
  226. Wolff, Gregory J.; McFarland, Max; Barrus, John W.; Piersol, Kurt W., Paper-based upload and tracking system.
  227. Buford,John F.; Huang,Xiaolan, Parsing of nested internet electronic mail documents.
  228. Goodman, Joshua T.; Rehfuss, Paul S; Rounthwaite, Robert L.; Mishra, Manav; Hulten, Geoffrey J; Richards, Kenneth G; Averbuch, Aaron H; Penta, Anthony P.; Deyo, Roderic C, Phishing detection, prevention, and notification.
  229. Goodman, Joshua T.; Rehfuss, Paul S; Rounthwaite, Robert L.; Mishra, Manav; Hulten, Geoffrey J; Richards, Kenneth G; Averbuch, Aaron H; Penta, Anthony P.; Deyo, Roderict C., Phishing detection, prevention, and notification.
  230. Daniell, W. Todd; Malik, Dale W., Phonetic filtering of undesired email messages.
  231. Smith, Jeffrey C.; Bandini, Jean-Christophe, Policy enforcement in a secure data file delivery system.
  232. Goodman, Joshua T.; Rounthwaite, Robert L.; Gillum, Eliot C., Prevention of outgoing spam.
  233. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  234. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  235. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  236. Castelli, Eric L., Privacy control system for electronic communication.
  237. Castelli, Eric L., Privacy control system for electronic communication.
  238. Brennan, III, Charles Joseph, Private domain name registration.
  239. Wieneke, Paul R.; Eikenberry, Scott D.; Nufire, Tim; Koblas, David A.; Wilson, Brian K., Probability based whitelist.
  240. Wieneke, Paul R.; Eikenberry, Scott D.; Nufire, Tim; Koblas, David A.; Wilson, Brian K., Probability based whitelist.
  241. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of textual electronic communication distributed in bulk.
  242. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic communication.
  243. Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic mail.
  244. Hulten, Geoffrey J; Seshadrinathan, Gopalakrishnan; Goodman, Joshua T.; Mishra, Manav; Pengelly, Robert C J; Rounthwaite, Robert L.; Colvin, Ryan C, Proofs to filter spam.
  245. Vogt,David, Provision of transparent proxy services to a user of a client device.
  246. Parsons, Robert R.; Rechterman, Barbara J.; Coffman, Joshua T., Proxy email method and system.
  247. Parsons, Robert R.; Rechterman, Barbara J.; Coffman, Joshua T., Proxy email method and system.
  248. Rechterman, Barbara J.; Coffman, Joshua T.; Parsons, Robert R., Proxy email method and system.
  249. Sasaki,Wataru; Noda,Tatsuo; Nagayama,Tokimune; Hori,Kiyoshi; Yoshioka,Tetsuya, Push type scanner apparatus and image data transmitting and receiving system.
  250. Sasaki, Wataru; Noda, Tatsuo; Nagayama, Tokimune; Hori, Kiyoshi; Yoshioka, Tetsuya, Push type scanner apparatus for transmitting over a network.
  251. Walter, Jason D.; Gillum, Eliot C.; Vitaldevara, Krishna C.; Colvin, Ryan Charles; Bidgoli, Mehrdad; Mills, Chad W.; Korb, Joshua David; McCann, Robert Lee; Hines, Douglas John; Davis, Malcolm Hollis; Drinic, Milenko, Real-time spam look-up system.
  252. Atkinson, Robert George; Goodman, Joshua T.; Lyon, James M.; Williams, Roy; Ahmed, Khaja E.; Katz, Harry Simon; Rounthwaite, Robert L.; Goldberg, Andrew V.; Dwork, Cynthia, Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles.
  253. Atkinson,Robert George; Goodman,Joshua T.; Lyon,James M.; Williams,Roy; Ahmed,Khaja E.; Katz,Harry Simon; Rounthwaite,Robert L., Reducing unwanted and unsolicited electronic messages by preventing connection hijacking and domain spoofing.
  254. Bouckaert, Philippe; Azouz, Nadia; Macheboeuf, Guy, Relating to communications.
  255. Kim,Do K.; Pearce,Christopher L.; Constantine,Jeffrey J., Remote e-mail scanning system and method.
  256. Doherty, James M.; Adams, Thomas Lee; Mueller, Steve, Remote location VOIP roaming behind firewalls.
  257. Mayer, Georg; Obermaier, Richard; Straulino, Heiko, Representation of Boolean expressions for specifying filters using XML.
  258. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  259. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  260. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  261. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  262. Gabe, Christopher John, Reputation-based method and system for determining a likelihood that a message is undesired.
  263. Gabe, Christopher John, Reputation-based method and system for determining a likelihood that a message is undesired.
  264. Toomey, Christopher, Restricting the volume of outbound electronic messages originated by a single entity.
  265. Wang, Yi-Min; Ma, Ming, Search ranger system and double-funnel model for search spam analyses and browser protection.
  266. Conner, James A.; Connolly, Jeremiah J.; Marinus, Dennis; Sethi, Tushaar, Secure inter-zone data communication.
  267. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  268. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  269. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  270. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  271. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  272. Yamasaki, Yuji; Pu, Samuel; Chang, Pender; Lee, Andrew; Chen, Descartes; Yang, Jill; Yu, Charles; Chen, Vincent; Chang, Jayce, Security management device, communication system, and access control method.
  273. Waterson, David Lynch, Security methods and systems.
  274. Salada, Charles R.; Neto, Mayerber Carvalho; Chung, Charlie; Mehta, Mayank, Signed ephemeral email addresses.
  275. Sebes, E. John, Solidifying the executable software set of a computer.
  276. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with blocking of TCP connections from sources of electronic messages.
  277. Lund, Peter K.; Petry, Scott M.; Croteau, Craig S.; Okumura, Kenneth K.; Carroll, Dorion A., Source reputation information system with router-level filtering of electronic messages.
  278. Aoki, Norihiro Edwin; Bentov, Shai Itzhak, Spam control based on sender account characteristics.
  279. Harris, Scott C., Spam detector defeating system.
  280. Goodman, Joshua Theodore; Rounthwaite, Robert L., Spam detector with challenges.
  281. Hulten, Geoffrey J.; Goodman, Joshua T.; Rounthwaite, Robert L.; Mishra, Manav; Murphy, Elissa E.; Mehr, John D., Spam filtering with probabilistic secure hashes.
  282. Bocharov, Alexei V.; Goodman, Joshua T., Spam filtration utilizing sender activity data.
  283. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  284. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  285. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  286. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse.
  287. Yu, Tonny, Suppression of undesirable email messages by emulating vulnerable systems.
  288. Yu, Tony, Suppression of undesirable network messages.
  289. St. Pierre,Robert P., System and method for a priority messaging protocol for a shared display device.
  290. Presley,Darryl Lee, System and method for actively managing an enterprise of configurable components.
  291. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  292. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  293. Feng, Andrew; Bhandari, Atul; Kucharewski, Valerie, System and method for community centric resource sharing based on a publishing subscription model.
  294. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections.
  295. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  296. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  297. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  298. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  299. Fotta, Keith A.; Boudrieau, Richard P., System and method for control of communications connections and notifications.
  300. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  301. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  302. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  303. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  304. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  305. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  306. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  307. Helferich,Richard J., System and method for delivering information to a transmitting and receiving device.
  308. Brown, Jr., Bruce L.; Silberman, Samuel G., System and method for detecting and defeating IP address spoofing in electronic mail messages.
  309. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  310. Cunningham, Brian D., System and method for detecting and filtering unsolicited and undesired electronic messages.
  311. Cox, Alan, System and method for domain name filtering through the domain name system.
  312. Nair, Sandeep R; Chow, Kingsum; Deeter, Ken T; Tjaden, Brian C, System and method for efficient and adaptive web accesses filtering.
  313. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  314. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  315. Lund, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  316. Lung, Peter K.; Petry, Scott M.; Titus, Jason H., System and method for filtering electronic messages using business heuristics.
  317. Bruno, Mark; Cowings, David; Jensen, Sanford; Morss, Dylan; Schneider, Ken, System and method for filtering fraudulent email messages.
  318. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  319. Singer,David S., System and method for identifying spoofed email by modifying the sender address.
  320. Neyman,Vitaly; Carmona,Itshak; Rotschield,Ofer, System and method for increasing heuristics suspicion levels in analyzed computer code.
  321. Fotta, Keith A.; Boudrieau, Richard P., System and method for integrated compliance and contact management.
  322. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  323. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  324. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  325. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  326. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  327. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  328. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  329. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  330. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  331. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  332. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  333. Chess, David Michael; Kephart, Jeffrey Owen; Morar, John Frederick; Pring, Edward John; White, Steve Richard, System and method for managing files in a distributed system using prioritization.
  334. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  335. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  336. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  337. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  338. Lewis, John Ervin, System and method for password protecting a distribution list.
  339. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  340. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  341. Cunningham, Brian; Kim, Leslie J., System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison.
  342. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  343. Lu, Haw-minn; White, Richard Paul, System and method for protecting mail servers from mail flood attacks.
  344. Libenzi,Davide, System and method for providing dynamic screening of transient messages in a distributed computing environment.
  345. Duncan,William E.; Hwang,Vincent, System and method for providing expandable proxy firewall services.
  346. Donzis, Lewis T.; Donzis, Henry M.; Baron, Peter W.; Murphy, John A., System and method for providing redirections.
  347. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  348. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  349. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  350. Malik, Dale W., System and method for regulating electronic messages.
  351. Malik, Dale W., System and method for regulating electronic messages.
  352. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  353. Davis,Donald T.; Martin,Elizabeth A.; Hostetter,Mathew J.; Kranz,David A., System and method for specifying access to resources in a mobile code system.
  354. Raneri, Michael; Chisaki, Paul; Funk, John, System and method for verified delivery of e-mail messages.
  355. Raneri, Michael; Chisaki, Paul; Funk, John, System and method for verified delivery of e-mail messages.
  356. Drell, David, System and method for videoconferencing across networks separated by a firewall.
  357. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  358. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  359. Davis,Donald T.; Kranz,David A.; Martin,Elizabeth A., System and methods for securely permitting mobile code to access resources over a network.
  360. Schneider, James P., System comprising a proxy server including a rules engine, a remote application server, and an aspect server for executing aspect services remotely.
  361. Yu, Tonny, System for determining degrees of similarity in email message information.
  362. Golub, Seth, System for determining email spam by delivery path.
  363. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  364. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  365. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  366. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  367. Yu, Tonny, System for email processing and analysis.
  368. Brown, Jr., Bruce L.; Silberman, Samuel G.; Granoff, Mark H.; Chaube, Rajesh P.; Fleischman, Robert M.; Zraly, Michael S., System for managing e-mail traffic.
  369. Brown, Jr., Bruce L.; Silberman, Samuel G.; Granoff, Mark H.; Chaube, Rajesh P.; Fleischman, Robert M.; Zraly, Michael S., System for managing e-mail traffic.
  370. Warner, Craig; Stone, Luke; Fenenbock, Elysa Wesley; Kassis, Ronit; O'Connor, Timothy Wong, System for managing extension modifications to web pages.
  371. Waterson, David Lynch, System for preventing keystroke logging software from accessing or identifying keystrokes.
  372. Quine, Douglas B.; Blue, Richard D, System for selective delivery of electronic communications.
  373. Patron, David; Yarkoni, Erez; Lewis, John Ervin, System for the centralized storage of wireless customer information.
  374. Lewis, John Ervin; Lai, Danh Tan; McNamara, Justin; Schlieber, Karl J., System for the storage and retrieval of messages.
  375. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  376. Sargent, John, System, method and computer program product for gathering information relating to electronic content utilizing a DNS server.
  377. Schmidt, Jonathan E.; Murphy, John A.; Donzis, Henry M.; Donzis, Lewis T.; Baron, Peter W.; Frey, Rodney D., System, method and computer readable medium for processing unsolicited electronic mail.
  378. Schmidt, Jonathan E.; Murphy, John A.; Donzis, Henry M.; Donzis, Lewis T.; Baron, Peter W.; Frey, Rodney D., System, method and computer readable medium for processing unsolicited electronic mail.
  379. Schmidt, Jonathan E.; Murphy, John A.; Donzis, Henry M.; Donzis, Lewis T.; Baron, Peter W.; Frey, Rodney D., System, method and computer readable medium for processing unsolicited electronic mail.
  380. Schmidt, Jonathan E.; Murphy, John A.; Donzis, Henry M.; Donzis, Lewis T.; Baron, Peter W.; Frey, Rodney D., System, method and computer readable medium for processing unsolicited electronic mail.
  381. Schmidt, Jonathan E.; Murphy, John A.; Donzis, Henry M.; Donzis, Lewis T.; Baron, Peter W.; Frey, Rodney D., System, method and computer readable medium for processing unsolicited electronic mail.
  382. Kay, Erik Andrew; Moore, David; Willhite, Daniel L.; Upson, Linus, System, method, and computer program product for filtering messages and training a classification module.
  383. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  384. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  385. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  386. Helferich, Richard J., Systems and methods for adding information to a directory stored in a mobile device.
  387. Boss, Gregory J.; Dawson, Christopher J.; Graham, Barry M.; Hamilton, II, Rick A., Systems and methods for alerting administrators about suspect communications.
  388. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  389. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  390. Sherwood,Amy L., Systems and methods for blocking delivery of an electronic communication.
  391. Spivack, Ira Victor; White, Richard Paul; Huang, Alan; Lu, Haw-minn, Systems and methods for blocking unsolicited electronic mail messages.
  392. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  393. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  394. Toscano, Francis; Merces, Joseph; Braun, Joachim H.; Kamens, Samuel N., Systems and methods for communicating documents.
  395. Toscano, Francis; Merces, Joseph; Braun, Joachim H.; Kamens, Samuel N., Systems and methods for communicating documents.
  396. Parsons, Robert R.; Rechterman, Barbara J.; Coffman, Joshua T., Systems and methods for domain name registration by proxy.
  397. Parsons,Robert R.; Coffman,Joshua T.; Rechterman,Barbara J., Systems and methods for domain name registration by proxy.
  398. Helferich, Richard J., Systems and methods for downloading information to a mobile device.
  399. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  400. Toscano, Francis; Moletteri, Felix, Systems and methods for generating and communicating enhanced portable document format files.
  401. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  402. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  403. Rajput, Nitendra; Shrivastava, Kundan, Systems and methods for improving quality of user generated audio content in voice applications.
  404. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, Systems and methods for managing the transmission of electronic messages through active message date updating.
  405. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fredric L.; Oswall, Michael J., Systems and methods for managing the transmission of electronic messages via message source data.
  406. Judge, Paul, Systems and methods for message threat management.
  407. Judge, Paul, Systems and methods for message threat management.
  408. Judge, Paul, Systems and methods for message threat management.
  409. Judge, Paul, Systems and methods for message threat management.
  410. Judge,Paul, Systems and methods for message threat management.
  411. Judge,Paul, Systems and methods for message threat management.
  412. Boisjolie, Darren Ronald; Haadsma, David Kent; Balasubramaniam, Gandhi; Berkemeyer, Jr., Van A.; Cotter, Amy L.; Cotter, Robert B.; Covington, Gary S.; Majoran, Raymond, Systems and methods for multi-layered packet filtering and remote management of network devices.
  413. Zhu, Yunzhou; Jiang, Xuebin, Systems and methods for preventing spam.
  414. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  415. Judge,Paul, Systems and methods for upstream threat pushback.
  416. Rybalko, Roman V., Systems and methods of probing data transmissions for detecting spam bots.
  417. Helferich, Richard J., Systems and methods providing advertisements to a cell phone based on location and external temperature.
  418. Jordan, Jr.,Royce D., Systems methods to selectively control forwarding of electronic mail.
  419. Wexelblat,David Eli, Third party provided transactional white-listing for filtering electronic communications.
  420. Barrett, Joseph G.; Muehl, Mark J.; Palino, Todd M., Throttling electronic communications from one or more senders.
  421. Barrett,Joseph G.; Muehl,Mark J.; Palino,Todd M., Throttling electronic communications from one or more senders.
  422. Goodman,Joshua T.; Rounthwaite,Robert L.; Hulten,Geoffrey J.; Yih,Wen tau, Training filters for detecting spasm based on IP addresses and text-related features.
  423. Adler, Mitchell D.; Brouwer, Michael Lambertus Hubertus; Sauerwald, Conrad, Trust exception management.
  424. Zou, Fei; Guo, Jianxin, Trust network to reduce e-mail spam.
  425. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  426. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  427. Patel,Ashvinkumar P.; Woods,Brian R.; Manber,Udi, Unsolicited electronic mail reduction.
  428. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message diverting communications processor.
  429. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message intercepting communications processor.
  430. White, Richard Paul; Huang, Alan; Lu, Haw-minn; Spivack, Ira Victor, Unsolicited message rejecting communications processor.
  431. White,Richard Paul; Huang,Alan; Lu,Haw minn; Spivack,Ira Victor, Unsolicited message rejecting communications processor.
  432. Hart, Matthew Thomas, Unwanted e-mail filtering system including voting feedback.
  433. Hart, Matthew Thomas, Unwanted e-mail filtering system including voting feedback.
  434. Wang,Bing, User oriented penalty count random rejection of electronic messages.
  435. Schneider, James P., Using distributed aspects to reorder online application workflows.
  436. Irlam, Gordon Raymond; Maggi, Brian; Petry, Scott, Value-added electronic messaging services and transparent implementation thereof using intermediate server.
  437. Irlam,Gordon Raymond; Maggi,Brian; Petry,Scott, Value-added electronic messaging services and transparent implementation thereof using intermediate server.
  438. Petry,Scott M.; Irlam,Gordon R.; Maggi,Brian, Value-added electronic messaging services having web-based user accessible message center.
  439. Yu,Tonny, Web page filtering including substitution of user-entered email address.
  440. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  441. Helferich, Richard J., Wireless messaging and content provision systems and methods.
  442. Helferich, Richard J., Wireless messaging system.
  443. Helferich, Richard J., Wireless messaging system.
  444. Helferich, Richard J., Wireless messaging systems and methods.
  445. Marino, Joseph P.; Fortin, Jonathan, Wireless router remote firmware upgrade.
  446. Marino, Joseph P.; Fortin, Jonathan, Wireless router remote firmware upgrade.
  447. Petry, Scott M.; Akamine, Shinya; Lund, Peter K.; Cox, Fred; Oswall, Michael J., Zero-minute virus and spam detection.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로