$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for maintaining reputation lists of IP addresses to detect email spam

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0157326 (2005-06-20)
등록번호 US8010609 (2011-08-15)
발명자 / 주소
  • Cowings, David
  • Jensen, Sanford
  • Wiegner, Carlin
출원인 / 주소
  • Symantec Corporation
대리인 / 주소
    Meyertons, Hood, Kivlin, Kowert & Goetzel, P.C.
인용정보 피인용 횟수 : 5  인용 특허 : 95

초록

A method and system to maintain lists of IP addresses for detection of email spam are described. In one embodiment, the method includes receiving email messages from senders associated with Internet Protocol (IP) addresses, filtering the email messages to identify spam, and sending statistics pertai

대표청구항

We claim: 1. A method comprising:a computer system receiving, from a server, a safe list of safe IP addresses, wherein the computer system is configured to accept email messages having IP addresses included in the safe list;the computer system receiving, from the server, a suspect list of suspect IP

이 특허에 인용된 특허 (95)

  1. Hill Douglas W. ; Lynn James T., Adaptive system and method for responding to computer network security attacks.
  2. Goodman,Joshua T; Rounthwaite,Robert L; Hulten,Geoffrey J; Deurbrouck,John A; Mishra,Manav; Penta,Anthony P, Advanced URL and IP features.
  3. Paul Sunil, Apparatus and method for controlling delivery of unsolicited electronic mail.
  4. Ji Shuang ; Chen Eva ; Liang Yung-Chang ; Tsai Warren,TWX, Apparatus and method for electronic mail virus detection and elimination.
  5. Reitz Carl A. (8820 Deer Run Dr. Indianapolis IN 46256), Apparatus and method for organizing timeline data.
  6. Hanson, James E; Kephart, Jeffrey O, Apparatus for preventing automatic generation of a chain reaction of messages if a prior extracted message is similar to current processed message.
  7. Mack Keith A. ; Onyema Kenneth, Automated code generating translator for testing telecommunication system devices and method.
  8. Arnold William C. (Mahopac NY) Chess David M. (Mohegan Lake NY) Kephart Jeffrey O. (Yorktown Heights NY) White Steven R. (New York NY), Automatic immune system for computers and computer networks.
  9. Amy Rice ; Julie Hsu, Automatic message interpretation and routing system.
  10. Hall Robert J., Communications addressing system.
  11. Adler Alfred ; Hyder Robert Lee, Communications system with radio device and server.
  12. Gordon, Bryson P.; Ekle, Thor Ivar, Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages.
  13. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, Computer cleaning system, method and computer program product.
  14. Ji Shuang, Computer network malicious code scanner method and apparatus.
  15. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  16. Alexandros Biliris ; Gisli Hjalmtysson ; Hosagrahar Visvesvaraya Jagadish ; Mark Alan Jones ; Dongwon Lee ; Inderpal Singh Mumick ; Euthimios Panagos ; Divesh Srivastava ; Dimitra Vista, Declarative message addressing.
  17. Schuetze Robert Charles,CAX, Device and system to facilitate accessing electronic mail from remote user-interface devices.
  18. William B. McCormick ; David Kopans ; George Stojanoff, E-mail filter and method thereof.
  19. Woltz Robert Thomas ; Nemazi John E., E-mail paging system and method.
  20. Owens Stephen J. H. ; Finney Michael S. ; Snider Michael L. ; Wright Randall S. ; Paynter James W. ; Bard Robin R., Electronic mail distribution system for integrated electronic communication.
  21. Sundsted Todd, Electronic mail filtering by electronic stamp.
  22. Hussey Peter, Electronic mail interface for a network server.
  23. Kawamata Jiro,JPX, Electronic mail server in which electronic mail is processed.
  24. Shaw David E. ; Ardai Charles E. ; Marsh Brian D. ; Moraes Mark A. ; Rudolph Dana B. ; Mc Auliffe Jon D., Electronic mail system for displaying advertisement at local computer received from remote system while the local compu.
  25. Michel M. Ranger CA; Paul C. Van Oorschot CA, Encryption and decryption system and method with content analysis provision.
  26. Heiner Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  27. Narasimhan Anand ; Shemesh Yaacov ; Flannery Jude M. ; Thaxter Jason, Filtering computer network messages directed to a user's e-mail box based on user defined filters, and forwarding a filtered message to the user's receiver.
  28. Knowles Kimberly A. ; Lewis David Dolan, Finding an e-mail message to which another e-mail message is a response.
  29. Johnson,James Edward, Flade gas turbine engine with fixed geometry inlet.
  30. Leung, Philip C.; Lavelle, Michael G.; Ing, Elena M., Frame buffer addressing scheme.
  31. Oliver,Jonathan; Eikenberry,Scott D.; Budman,Gleb; Kim,Bryan, Fraudulent message detection.
  32. Foladare Mark Jeffrey ; Goldman Shelley B. ; Silverman David Phillip ; Weber Roy Philip ; Westrich Robert S., Intelligent pager for remotely managing E-Mail messages.
  33. Rogowitz Bernice Ellen ; Rabenhorst David Alan ; Treinish Lloyd Alan, Interactive rule based system with selection feedback that parameterizes rules to constrain choices for multiple operati.
  34. Camaisa Allan J. ; Wadkins E. Tracy ; Gayda Karen M., Interactive visual ordering system.
  35. Duvall William S. ; Kendall Matthew, Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering a.
  36. Strasnick, Steven L., Level-based network access restriction.
  37. Blair Steven Cameron ; Hassinger Sebastian ; Hurley ; II William W. ; Smith William Meyer ; Turek John J. E., Lightweight authentication system and method for validating a server access request.
  38. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  39. Bobo ; II Charles R. (569 Elmwood Dr. NE. Atlanta GA 30306), Message storage and delivery system.
  40. Moon Billy G. ; Bankler Brian ; Wooldridge Tammy A. ; Baratt Manon A., Messaging application having a plurality of interfacing capabilities.
  41. Nielsen Jakob, Method and apparatus for altering sent electronic mail messages.
  42. David L. Gilmour, Method and apparatus for assigning a confidence level to a term within a user knowledge profile.
  43. Lalonde,Chris; Abbott,Marty; Sanford,Kirk; Isaacs,Greg, Method and apparatus for authenticating electronic mail.
  44. Wang David Shan-Ming ; Hsu P. Robert, Method and apparatus for certified electronic mail messages.
  45. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan, Method and apparatus for filtering e-mail.
  46. Billmers Meyer Alvin, Method and apparatus for filtering incoming information using a search engine and stored queries defining user folders.
  47. Donaldson Albert L., Method and apparatus for filtering junk email.
  48. Vinberg,Anders, Method and apparatus for filtering messages based on context.
  49. Dong, Jianming; Mullaly, John Martin; Tannenbaum, Alan Richard, Method and apparatus for filtering messages in a data processing system.
  50. Post Mark J., Method and apparatus for information stream filtration using tagged information access and action registration.
  51. Nielsen Jakob, Method and apparatus for managing subscriptions to distribution lists.
  52. Walsh James E. ; Altberg Ebbe H. A., Method and apparatus for protecting data files on a computer from virus infection.
  53. Nielsen Jakob, Method and apparatus for receiving electronic mail.
  54. Kirsch Steven T., Method and apparatus for redirection of server external hyper-link reference.
  55. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  56. Steven T. Kirsch ; Christopher J. Lindblad, Method and apparatus for redirection of server external hyper-link references.
  57. Suarez Larry, Method and architecture for the creation, control and deployment of services within a distributed computer environment.
  58. Kirsch,Steven T., Method and system for categorizing and processing e-mails.
  59. Cobb Christopher Alan, Method and system for filtering electronic messages.
  60. McCormick William B. ; Kopans David, Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms.
  61. Beyda, William J.; Shaffer, Shmuel; Bonomo, Paul, Method and system for management of message attachments.
  62. John D. W. Brothers, Method and system for redirecting web page requests on a TCP/IP network.
  63. Sampath Srivats ; Balasubramaniam Chandrasekar ; Lingarkar Ravi ; Katchapalayam Babu ; Kannan Ravi, Method and system for securing, managing or optimizing a personal computer.
  64. Kirsch, Steven T., Method and system for selectively blocking delivery of bulk electronic mail.
  65. Scannell Niamh C. (Mountain View CA) Dawson Stuart D. (Reading GB2) Redmond Anthony J. (Dublin IEX) Himbaut Serge (Antibes FRX) Bares Pascale (Villeneuve Loubet FRX) Clark Alison (Morpeth GB2), Method and system for sorting and prioritizing electronic mail messages.
  66. Ogilvie, John W. L.; Ogilvie, Genie L., Method for including a self-removing indicator in a self-removing message.
  67. Alagna,Michael Tony; Obrecht,Mark; Payne,Andy; Norwood,Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  68. Trostle Jonathan, Networked workstation intrusion detection system.
  69. Cohen Elliot D., Offensive message interceptor for computers.
  70. Goodman,Joshua T.; Rounthwaite,Robert L.; Gwozdz,Daniel; Mehr,John D.; Howell,Nathan D.; Rupersburg,Micah C.; Starbuck,Bryan T., Origination/destination features and lists for spam prevention.
  71. Roberts,Guy William Welch; Cole,Andrew Lewis; Baulk,Eamonn John, Predictive malware scanning of internet data.
  72. Zenchelsky Daniel N. ; Dutta Partha P. ; London Thomas B. ; Vrsalovic Dalibor F. ; Siil Karl Andres, Session cache and rule caching method for a dynamic filter.
  73. Ushiku Toyohiko,JPX, System and apparatus for selectively publishing electronic-mail.
  74. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for database access control.
  75. Finney Michael S. ; Snider Michael L. ; Wright Randall S. ; Paynter James W. ; Bard Robin R., System and method for distributing electronic messages in accordance with rules.
  76. Reifman Jeffrey B. (Seattle WA) DelBene Kurt D. (Bellevue WA) Tobey Chris E. (Seattle WA) Marceau Rene (Seattle WA), System and method for facsimile cover page storage and use.
  77. Paul Sunil, System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing.
  78. Lentz Stephen A. (5726 N. 10th St. ; #11 Phoenix AZ 85014), System and method for protecting integrity of computer data and software.
  79. Gregory D. Linden ; Michael D. McDaniel ; Ryan J. Snodgrass ; Joel R. Spiegel, System and method for providing secure URL-based access to private resources.
  80. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for restricting user access rights on the internet based on rating information stored in a relational.
  81. Matsuo Akira (Yokohama JPX), System for automatically sending mail message by storing rule according to the language specification of the message inc.
  82. Uchida Wataru,JPX ; Nozaki Tsutomu,JPX, System for broadcasting electronic mails that separately stores and sends a portion of electronic mails with an access code for filtering and retrieving purpose.
  83. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H., System for generation of object profiles for a system for customized electronic identification of desirable objects.
  84. Sheymov,Victor I., Systems and methods for creating a code inspection system.
  85. Birrell Andrew D. ; Wobber Edward P. ; Schroeder Michael ; Melling Christopher,GBX ; Jaffer Simon,GBX, Technique for dynamically generating an address book in a distributed electronic mail system.
  86. Horvitz Eric ; Heckerman David E. ; Dumais Susan T. ; Sahami Mehran ; Platt John C., Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set.
  87. Mase Hisao (Hirakata JPX) Namba Yasuharu (Yao JPX) Koyama Sachiko (Okazaki JPX) Kiyama Tadahiro (Ichikawa JPX) Tsuji Hiroshi (Itami JPX), Text retrieval method and apparatus based on a handwritten keyword.
  88. Barton,Christopher Andrew; Clarke,Graham Andrew; Crowe,Simon, Transferring data via a secure network connection.
  89. Miller Craig A. (Tomball TX) Dhareshwar Yatin (Bombay TX INX) Heller Edmund G. (Spring TX) Garrett Michael R. (Houston TX), Transparent, secure computer virus detection method and apparatus.
  90. Freeman Martin, Verification of software agents and agent activities.
  91. Cowlard James,GB3, Virus protection in computer systems.
  92. Pak, Michael C.; Kouznetsov, Victor; Palmer, David W., Virus scanning on thin client devices using programmable assembly language.
  93. Bates, Cary Lee; Day, Paul Reuben; Santosuosso, John Matthew, Web server apparatus and method for virus checking.
  94. Rosenberg,Jonathan B.; Harrison,John C.; Remy,David L.; Creighton, Jr.,Neal L., Web site identity assurance.
  95. Birrell, Andrew D.; Wobber, Edward P.; Schroeder, Michael, Web-based electronic mail server apparatus and method using full text and label indexing.

이 특허를 인용한 특허 (5)

  1. Oliver, Jonathan; Eikenberry, Scott D.; Budman, Gleb; Kim, Brian, Classifying a message based on fraud indicators.
  2. Oliver, Jonathan; Eikenberry, Scott D.; Budman, Gleb; Kim, Brian, Classifying a message based on fraud indicators.
  3. Oliver, Jonathan; Eikenberry, Scott D.; Budman, Gleb; Kim, Brian, Classifying a message based on fraud indicators.
  4. Morss, Dylan; Cassidy, Emmet, Method and apparatus for creating predictive filters for messages.
  5. Cooley, Shaun; Ramzan, Zulfikar, Referrer context identification for remote object links.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트