$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Identifying unwanted electronic messages 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 US-0059147 (2002-01-31)
등록번호 US-7325249 (2008-01-29)
발명자 / 주소
  • Sutton, Jr.,Lorin R.
  • Despeaux,Craig E.
  • Adamski,Michael K.
출원인 / 주소
  • AOL LLC
대리인 / 주소
    Fish & Richardson P.C.
인용정보 피인용 횟수 : 77  인용 특허 : 51

초록

An unwanted message may be identified by inspecting the payload portion of a message being communicated, comparing the characteristics of the payload portion with stored data indicating characteristics of other messages, and identifying a security condition based on a comparison of the message inspe

대표청구항

What is claimed is: 1. A method of identifying unwanted messages, the method comprising: inspecting a payload portion of an electronic mail message being communicated and identifying characteristics of the payload portion, the electronic mail message including an address of a recipient; comparing t

이 특허에 인용된 특허 (51)

  1. Paul Sunil, Apparatus and method for controlling delivery of unsolicited electronic mail.
  2. McCollum Tab ; Jury Thomas W., Assigning security levels to particular documents on a document by document basis in a database.
  3. Hellman Martin E., Authentication using random challenges.
  4. Iketani Akira (Higashiosaka JPX) Mizuki Hiromasa (Tokushima JPX), Block error detector.
  5. Papierniak Karen A. ; Thaisz James E. ; Chiang Luo-Jen, Computer architecture and method for validating and collecting and metadata and data about the internet and electronic commerce environments (data discoverer).
  6. Siefert David M., Computer system for management of resources.
  7. Sammon ; Jr. Thomas M. ; Scurlock Bradley W., Consumer profiling system with analytic decision processor.
  8. Farber David A. ; Lachman Ronald D., Data processing system using substantially unique identifiers to identify data items, whereby identical data items hav.
  9. Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Tuchman Walter L. (Woodstock NY), Digital signature system and apparatus.
  10. Marsh, David, E-mail virus detection utility.
  11. Ono, Takatoshi; Saijo, Takeshi, ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, CRYPTOGRAPHY SYSTEM, COMPUTER-READABLE RECORDING MEDIUM STORING ENCRYPTION PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM .
  12. Kirsch, Steven T.; Kiraly, Kenneth P., Electronic mail filtering system and methods.
  13. Hyde-Thomson Henry C. A. (11 North Terrace London SW3 2BA GB2), Electronic mail system having integrated voice messages.
  14. Maller,Steven T., Email filtering methods and systems.
  15. Pinard Deborah L. (Kanata CAX) Peres Eliana M. O. (Kanata CAX) Evans Ronald A. (Kanata CAX), Human machine interface for telephone feature invocation.
  16. McBrearty, Gerald Francis; Mullen, Shawn Patrick; Shieh, Johnny Meng-Han, Indicator to show that a cached file is being displayed on a client system.
  17. Wheeler ; Jr. David F. (Silver Spring MD), Intelligent peripheral in video dial tone network.
  18. David Montville ; Adam Montville, Interoperable full-featured web-based and client-side e-mail system.
  19. Robert G. Leeds, Junk electronic mail detector and eliminator.
  20. Chaney Garnet R. ; Richardson Robert F., Language independent phrase extraction.
  21. McDonough, John C.; McDonough, Suzanne K.; O'Brien, Erin D., Message passing over secure connections using a network server.
  22. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan, Method and apparatus for filtering e-mail.
  23. Movalli, Michael; Movalli, Brian, Method and apparatus for generating secure endorsed transactions.
  24. Ellis Michael D. (Boulder CO) Dunn Stephen M. (Boulder CO) Fellinger Michael W. (Boulder CO) Younglove Fancy B. (Boulder CO) James David M. (Fort Collins CO) Clifton David L. (Boulder CO) Land Richar, Method and apparatus for producing a signature characterizing an interval of a video signal while compensating for pictu.
  25. Wang Wu ; Chiu Chan ; Morris Steve ; Kongara Prasad, Method and apparatus for transferring digital images on a network.
  26. Wang Wu ; Kongara Prasad, Method and apparatuses for transferring data for multiple applications through a single communication link in response to authentication information.
  27. Robert P. Morris, Method and system allowing a client computer to access a portable digital image capture unit over a network.
  28. Mayle Neil L. ; Rose David L., Method and system for creating messages including image information.
  29. David Mosberger ; James D. Salehi, Method and system for managing accesses to a data service system that supports persistent connections.
  30. Wolff Richard S. (West Caldwell NJ) Gifford Warren S. (Holmdel NJ) Kramer Michael (Bronx NJ) Miller David S. (Bedminster NJ) Ramirez Gerardo (Bridgewater NJ) Turock David L. (Highland Park NJ), Method and system for managing telecommunications such as telephone calls.
  31. Hartman Peri ; Bezos Jeffrey P. ; Kaphan Shel ; Spiegel Joel, Method and system for placing a purchase order via a communications network.
  32. Kim, Do K.; Pearce, Christopher L.; Constantine, Jeffrey J., Method and system for protecting a computer using a remote e-mail scanning device.
  33. Greenstein Bret A., Method for blocking all unwanted e-mail (SPAM) using a header-based password.
  34. Drummond, Kirk; Fields, Duane Kimbell; Gregg, Thomas Preston; Kolb, Mark Andrew, Method for restricting delivery of unsolicited E-mail.
  35. Joyce, James B., Methods and apparatus for heuristic firewall.
  36. Khosla Aditya ; Lei James ; Narayen Shantanu ; Morris Steve ; Wang Wu, Methods and apparatuses for creating a collection of media.
  37. Morris Steve ; Lei James ; Narayen Shantanu ; Khosla Aditya, Methods and apparatuses for presenting a collection of digital media in a media container.
  38. Chiu Chan ; Morris Steve ; Wang Wu, Methods and apparatuses for transferring data between data processing systems which transfer a representation of the data before transferring the data.
  39. Cotten William D., Preventing delivery of unwanted bulk e-mail.
  40. Olkin, Terry M.; Moreh, Jahanshah, Secure e-mail system.
  41. William J. Bolosky ; John R. Douceur ; Scott M. Cutshall ; Richard F. Rashid ; Nathan P. Myhrvold ; David A. Goebel, Single instance store for file systems.
  42. Smith, Jeffrey C.; Bandini, Jean-Christophe, Solicited authentication of a specific user.
  43. Tang John ; Isaacs Ellen ; Morris Trevor ; Rodriguez Thomas ; Ruberg Alan ; Levenson Rick, System and method providing a computer user interface enabling access to distributed workgroup members.
  44. Burge Gary L. ; Luddy William A., System for customizing computer displays in accordance with user preferences.
  45. Vance ; Jr. Robert B. ; Pampuch John C. ; MacNaughton Bruce A., System for integrating access to proprietary and internet resources.
  46. Davis Jason O'Neal ; Gold Brian Keith, Systems, methods and computer program products for updating hypertext documents via electronic mail.
  47. Horvitz Eric ; Heckerman David E. ; Dumais Susan T. ; Sahami Mehran ; Platt John C., Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set.
  48. Ng, David Way, Third-party e-mail authentication service provider using checksum and unknown pad characters with removal of quotation indents.
  49. Patel,Ashvinkumar P.; Woods,Brian R.; Manber,Udi, Unsolicited electronic mail reduction.
  50. Yu,Tonny, Web page filtering including substitution of user-entered email address.
  51. Gilchrist, Raymond T.; Ness, Leonard J., Zero backlash assembly.

이 특허를 인용한 특허 (77)

  1. Mahaffey, Kevin, Analyzing data gathered through different protocols.
  2. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Assessing a security state of a mobile communications device to determine access to specific tasks.
  3. Mahaffey, Kevin Patrick; Golombek, David; Evans, Daniel Lee; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Lineberry, Anthony McKay; Barton, Kyle, Assessing an application based on application data associated with the application.
  4. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Evans, Daniel Lee; Ong, Emil Barker; Strazzere, Timothy; LaMantia, Matthew John Joseph; Buck, Brian James, Assessing application authenticity and performing an action in response to an evaluation result.
  5. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Assessing the security state of a mobile communications device.
  6. Wyatt, Timothy Micheal; Anbalagapandian, Anbu; Mandal, Ayan, Client activity DNS optimization.
  7. Bodin, William K; Jaramillo, David; McConnell, Kevin C., Community based measurement of capabilities and availability.
  8. Wyatt, Timothy Micheal; Mahaffey, Kevin; Halliday, Derek Joseph, Component analysis of software applications on computing devices.
  9. Wyatt, Timothy M.; Strazzere, Tim; Mahaffey, Kevin Patrick; Swami, Yogesh, Crawling multiple markets and correlating.
  10. Sugiyama, Takeshi; Takahashi, Masaru; Yamashita, Masashi; Sugiyama, Kazuo; Oosako, Youji; Jo, Manhee, Data communications system and data communications method for detecting unsolicited communications.
  11. Richardson, David; Farrakha, Ahmed Mohamed; Robinson, William Neil; Buck, Brian James, Determining source of side-loaded software.
  12. Richardson, David; Farrakha, Ahmed Mohamed; Robinson, William Neil; Buck, Brian James, Determining source of side-loaded software using signature of authorship.
  13. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Buck, Brian James; Hering, John Gunther; Gupta, Amit; Abey, Alex Cameron, Distributed monitoring, evaluation, and response for multiple devices.
  14. Gillum, Eliot C.; Kafka, Steven D., Email addresses relevance determination and uses.
  15. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Enforcing security based on a security state assessment of a mobile device.
  16. Mahaffey, Kevin Patrick, Evaluating whether data is safe or malicious.
  17. Mahaffey, Kevin; Hering, John G.; Burgess, James, Event-based security state assessment and display for mobile devices.
  18. Wyatt, Timothy Micheal; Mahaffey, Kevin; Halliday, Derek Joseph; Richardson, David, Expressing intent to control behavior of application components.
  19. Buck, Brian James; Wang, Jinggang, Method and apparatus for auxiliary communications with mobile communications device.
  20. Buck, Brian James, Method and system for protecting privacy and enhancing security on an electronic device.
  21. Grkov, Vance; Richardson, David; Mandal, Ayan; Mangat, Cherry; Mahaffey, Kevin Patrick, Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer.
  22. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David; Grkov, Vance; Richardson, David Luke; Mandal, Ayan; Mangat, Cherry; Buck, Brian James; Robinson, William, Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such.
  23. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James David; Grubb, Jonathan Pantera; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Wyatt, Timothy Micheal, Methods and systems for blocking the installation of an application to improve the functioning of a mobile communications device.
  24. Mahaffey, Kevin Patrick; Buck, Brian James; Robinson, William; Hering, John G.; Burgess, James David; Wyatt, Timothy Micheal; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Salomon, Ariel; Grubb, Jonathan Pantera; Wootton, Bruce; Strazzere, Timothy; Swami, Yogesh, Methods and systems for sharing risk responses between collections of mobile communications devices.
  25. Mahaffey, Kevin Patrick; Buck, Brian James; Robinson, William; Hering, John G.; Burgess, James David; Wyatt, Timothy Micheal; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Salomon, Ariel; Grubb, Jonathan Pantera; Wootton, Bruce; Strazzere, Timothy; Swami, Yogesh, Methods and systems for sharing risk responses to improve the functioning of mobile communications devices.
  26. Salomon, Ariel; Mahaffey, Kevin Patrick, Mobile communications device payment method utilizing location information.
  27. Wyatt, Timothy Micheal; Anbalagapandian, Anbu; Mandal, Ayan, Mobile device DNS optimization.
  28. Mahaffey, Kevin Patrick, Mobile device geolocation.
  29. Buck, Brian James; Mahaffey, Kevin Patrick, Modifying mobile device settings for resource conservation.
  30. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Evans, Daniel Lee; Ong, Emil Barker; Strazzere, Timothy; LaMantia, Matthew John Joseph; Buck, Brian James, Monitoring installed applications on user devices.
  31. Mahaffey, Kevin Patrick; Richardson, David Luke; Salomon, Ariel; Croy, R. Tyler; Walker, Samuel Alexander; Buck, Brian James; Marcin Gorrino, Sergio Ivan; Golombek, David, Multi-factor authentication and comprehensive login system for client-server networks.
  32. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Providing access levels to services based on mobile device security state.
  33. Jhawar, Amit, Real-time detection and prevention of bulk messages.
  34. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Buck, Brian James; Hering, John Gunther; Gupta, Amit; Abey, Alex Cameron, Response generation after distributed monitoring and evaluation of multiple devices.
  35. Mahaffey, Kevin; Hering, John G.; Burgess, James, Security status and information display system.
  36. Mahaffey, Kevin; Hering, John G.; Burgess, James, Security status assessment using mobile device security information database.
  37. DeLuca, Michael Joseph; Hill, Thomas Casey, Selective delivery of social network messages within a social network.
  38. Mahaffey, Kevin Patrick, Server-assisted analysis of data for a mobile device.
  39. Smith, Joseph B.; Spivey, John T.; Saretto, Cesare J., Strategies for ensuring that executable content conforms to predetermined patterns of behavior (“inverse virus checking”).
  40. Wootton, Bruce; Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal, System and method for a scanning API.
  41. Mahaffey, Kevin Patrick; Golombek, David; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Hering, John G., System and method for adverse mobile application identification.
  42. Mahaffey, Kevin Patrick; Golombek, David; Evans, Daniel Lee; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Lineberry, Anthony McKay; Barton, Kyle, System and method for assessing an application based on data from multiple devices.
  43. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James David; Grubb, Jonathan Pantera; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Wyatt, Timothy Micheal, System and method for assessing an application to be installed on a mobile communications device.
  44. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for assessing data objects on mobile communications devices.
  45. Mahaffey, Kevin Patrick, System and method for attack and malware prevention.
  46. Mahaffey, Kevin Patrick, System and method for attack and malware prevention.
  47. Mahaffey, Kevin Patrick, System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects.
  48. Wyatt, Timothy Micheal; Mahaffey, Kevin Patrick; Richardson, David Luke; Buck, Brian James; Rogers, Marc William, System and method for creating and assigning a policy for a mobile communications device based on personal data.
  49. Walker, Samuel Alexander; Mandal, Ayan Kanti; Senapati, Devesh; Mahaffey, Kevin Patrick; Richardson, David Luke; Buck, Brian James, System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security.
  50. Hering, John G.; Mahaffey, Kevin; Burgess, James, System and method for identifying and assessing vulnerabilities on a mobile communication device.
  51. Hering, John G.; Mahaffey, Kevin; Burgess, James, System and method for identifying and assessing vulnerabilities on a mobile communications device.
  52. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David; Grubb, Jonathan Pantera; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Wyatt, Timothy Micheal, System and method for mobile communication device application advisement.
  53. Salomon, Ariel; Mahaffey, Kevin Patrick, System and method for mobile device push communications.
  54. Mahaffey, Kevin Patrick; Burgess, James David; Hering, John G, System and method for mobile device replacement.
  55. Mahaffey, Kevin, System and method for monitoring and analyzing multiple interfaces and multiple protocols.
  56. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for preventing malware on a mobile communication device.
  57. Mahaffey, Kevin Patrick; Burgess, James David; Hering, John Gunther, System and method for providing offers for mobile devices.
  58. Kane, John P., System and method for reducing antivirus false positives.
  59. Mahaffey, Kevin; Hering, John G.; Bergess, James, System and method for remotely securing or recovering a mobile device.
  60. Grkov, Vance; Richardson, David; Mandal, Ayan; Mangat, Cherry; Mahaffey, Kevin, System and method for remotely-initiated audio communication.
  61. Mahaffey, Kevin Patrick; Golombek, David; Evans, Daniel Lee; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Lineberry, Anthony McKay; Barton, Kyle, System and method for security data collection and analysis.
  62. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled application re-analysis.
  63. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled application re-analysis to obtain characterization assessment.
  64. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment.
  65. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled malware prevention.
  66. Buck, Brian James; Mahaffey, Kevin Patrick; Yerra, Kesava Abhinav; LaMantia, Matthew John Joseph, System and method for uploading location information based on device movement.
  67. Walker, Samuel Alexander; Mandal, Ayan Kanti; Senapati, Devesh; Mahaffey, Kevin Patrick; Richardson, David Luke; Buck, Brian James, System and method for using context models to control operation of a mobile communications device.
  68. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for applying a security policy to a device based on a comparison of locations.
  69. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for applying a security policy to a device based on location.
  70. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for device broadcast of location information when battery is low.
  71. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for displaying location information of a device.
  72. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for locking and disabling a device in response to a request.
  73. Kvache,Alexander; Weintraub,Michael, Systems and methods for providing filtered message delivery.
  74. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for remotely controlling a lost mobile communications device.
  75. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for transmitting a communication based on a device leaving or entering an area.
  76. Cockerill, Aaron; Richardson, David; Thanos, Daniel; Robinson, William Neil; Buck, Brian James; Mahaffey, Kevin Patrick, Use of device risk evaluation to manage access to services.
  77. Mahaffey, Kevin; Buck, Brian James; Nguyen, Thomson Van, User classification based on data gathered from a computing device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로