Patent application number | Description | Published |
20090300012 | MULTILEVEL INTENT ANALYSIS METHOD FOR EMAIL FILTRATION - A method for filtering email which contains links to uniform resource identifiers which disguise the content and identity of spam sites by multiple serial redirection. | 12-03-2009 |
20100005146 | FACILITATING TRANSMISSION OF EMAIL BY CHECKING EMAIL PARAMETERS WITH A DATABASE OF WELL BEHAVED SENDERS - Facilitating email transmission by extracting email parameters, requesting data in the form of a dns query, and receiving a sender reputation as an IP address. Querying a database by sending a plurality of arguments concatenated to a dns request and receiving an IP address in reply. Operating a remote database as a dns server, receiving queries as domains and transmitting replies in the format of IPv4 or IPv6 addresses. Filtering email by querying a database with email parameters comprising an IP address and a domain of an email sender which may be extracted from an email header in the HELO, EHLO, MAIL FROM, or RETURN PATH. The smtp session is continued, modified or interrupted according to the result of the query submitted to a database operating as a dns server. | 01-07-2010 |
20100005191 | REQUESTING A SERVICE OR TRANSMITTING CONTENT AS A DOMAIN NAME SYSTEM RESOLVER - Requesting a service such as querying a database or communicating content by sending a plurality of arguments concatenated to a dns request and receiving a reply in the form of text or an IPv4 or an IPv6 address. | 01-07-2010 |
20100011420 | OPERATING A SERVICE ON A NETWORK AS A DOMAIN NAME SYSTEM SERVER - Operating a service such as a remote database as a dns server, receiving inputs such as queries as domain names and transmitting replies in the format of IPv4 or IPv6 addresses. | 01-14-2010 |
20100049893 | LINK BALANCER APPARATUS WITH LOW PROFILE PLURAL PORT INPUT / OUTPUT CARD - A space-conscious system utilizes a low profile expansion card for providing a physical and electrical interface between a larger scale board, such as a motherboard, and a plurality of external components. The expansion card is mounted in a perpendicular orientation relative to the larger scale board, despite dimensional limitations with regard to such an orientation. The expansion card includes an input/output circuit board and a plurality of “signal-conduction extenders” for enabling coupling a plurality of ports to an external wall of the housing in which the expansion card and larger scale board are contained. In one possible embodiment, the housing is compatible with the 1U standard, the expansion card is an Ethernet card, and there is an adapter board at the front wall of the housing for routing connections from the expansion card to a plurality of exposed ports. The invention allows more than two of the expansion cards to be mounted in parallel within the same container. | 02-25-2010 |
20100121981 | AUTOMATED VERIFICATION OF DNS ACCURACY - Disclosed is a method, a computer system, and a computer readable media product that contains a set of computer executable software instructions for directing the computer to execute a process for independent confirmation of DNS replies to foil DNS cache poisoning attacks. The process comprises comparing a plurality of DNS replies for an exact or predefined “close enough” match as a condition for blocking or forwarding a DNS reply to a resolver. The tangible beneficial result is to prevent the success of a dns cache poisoning attack from diverting a user to a malicious site on the internet. | 05-13-2010 |
20100131646 | POLICY-MANAGED DNS SERVER FOR TO CONTROL NETWORK TRAFFIC - Disclosed is a method, a computer system, and a computer-readable media product that contains a set of computer executable software instructions for directing the computer to execute a process for policy-based operation of a DNS server apparatus to manage traffic due to undesirable mail or requests for electronic documents. The policies operate according to owners, regions, or countries controlling source IP addresses and deterministically select from a plurality of non-equivalent replies to be sent to the source IP address. Accumulating previous activity records may assist in determining which traffic may be usefully deferred or suppressed. The process includes withholding certain information from certain DNS servers seeking IP addresses to improve overall security and integrity of the Internet. | 05-27-2010 |
20100146260 | TANDEM ENCRYPTION CONNECTIONS TO PROVIDE NETWORK TRAFFIC SECURITY METHOD AND APPARATUS - Security measures are applied to encrypted data exchanges by enabling content decryption, rule application, and content re-encryption at a network location. A certificate, self-signed or authenticated by an official Certificate Authority is obtained for and installed within the secure proxy apparatus. A link to a secure page is replaced with a link to a page having a fully qualified domain name of the proxy apparatus as the suffix. An encrypted session between the client is established between the client and the proxy apparatus without deceit in the later case. A first encryption-enabled connection is established from the first node to a content filter, while a second encryption-enabled connection is established from the content filter to the second node. Following decryption, a determination is made as to whether the content includes Undesired Data. Restricted material is blocked, while unrestricted material is re-encrypted and delivered to the destination node. For a self-signed certificate, the destination node comprises a private security system-signed root certificate installed in the destination node's Trusted Root Certification Authorities certificate store. In another aspect of the invention, at least one of encrypted Instant Messages, e-mail messages and web pages are decrypted and recorded at a location between sources and destinations of the transmissions. The look and feel is maintained of a single encrypted link between the requestor and the external source by the inventive use of a wildcard certificate within the network local to the requestor. | 06-10-2010 |
20100174829 | APPARATUS FOR TO PROVIDE CONTENT TO AND QUERY A REVERSE DOMAIN NAME SYSTEM SERVER - An apparatus is disclosed for to provide content to and query a reverse domain name system (DNS) server without depending on the kindness of domain name system registrars, registrants. DNS replies are observed by firewalls or filters, analyzed, and transmitted to a reverse domain name system server. An embodiment of the present invention can be within a DNS server or SMTP server. | 07-08-2010 |
20100180027 | CONTROLLING TRANSMISSION OF UNAUTHORIZED UNOBSERVABLE CONTENT IN EMAIL USING POLICY - A system, method, and apparatus is disclosed to control mail server in handling encrypted messages. | 07-15-2010 |
20100325240 | QUERYING A DATABASE AS A DOMAIN NAME SYSTEM RESOLVER - Querying a database by sending a plurality of arguments concatenated to a Domain Name System request and receiving a reply in the form of text or encoded as an IPv4 or an IPv6 address. | 12-23-2010 |
20110022670 | FACILITATING TRANSMISSION OF EMAIL BY CHECKING EMAIL PARAMETERS WITH A DATABASE OF WELL BEHAVED SENDERS - Facilitating email transmission by extracting email parameters, requesting data in the form of a dns query, and receiving a sender reputation as an IP address. Querying a database by sending a plurality of arguments concatenated to a dns request and receiving an IP address in reply. Operating a remote database as a dns server, receiving queries as domains and transmitting replies in the format of IPv4 or IPv6 addresses. Filtering email by querying a database with email parameters comprising an IP address and a domain of an email sender which may be extracted from an email header in the HELO, EHLO, MAIL FROM, or RETURN PATH. The smtp session is continued, modified or interrupted according to the result of the query submitted to a database operating as a dns server. | 01-27-2011 |
20110225244 | TRACING DOMAINS TO AUTHORITATIVE SERVERS ASSOCIATED WITH SPAM - The invention provides a method and system for filtering email which may contain links to a large number of rapidly synthesized domains serving spam content by referencing a database of categorized authoritative servers, querying a domain name system server for an authoritative server associated with domain names embedded in email, and accessing the database of categorized authoritative servers for a match. | 09-15-2011 |
20110258201 | MULTILEVEL INTENT ANALYSIS APPARATUS & METHOD FOR EMAIL FILTRATION - A method for filtering email which contains links to uniform resource identifiers which disguise the content and identity of spam sites by multiple serial redirection. | 10-20-2011 |
20110258272 | FACILITATING TRANSMISSION OF AN EMAIL OF A WELL BEHAVED SENDER BY EXTRACTING EMAIL PARAMETERS AND QUERYING A DATABASE - Facilitating email transmission by extracting email parameters, requesting data in the form of a dns query, and receiving a sender reputation as an IP address. Querying a database by sending a plurality of arguments concatenated to a dns request and receiving an IP address in reply. Filtering email by querying a database with email parameters comprising an IP address and a domain of an email sender which may be extracted from an packet headers in the SMTP sequence up to and including the MAIL command and prior to the DATA command. The smtp session is continued, modified or interrupted according to the result of the query submitted to a database operating as a dns server. | 10-20-2011 |
20120272319 | Apparatus, and system for determining and cautioning users of Internet connected clients of potentially malicious software and method for operating such - A system at a central server and at a plurality of web filters is installed to observe traffic and to protect users from attempting connection to suspicious, malicious, and/or infectious targets. Targets are defined as Uniform Resource Identifiers (URI) and Internet Protocol (IP) addresses. Traffic is collected, analyzed, and reported for further analysis. Behavior is analyzed for each client attempting a connection to an uncategorized target. IP addresses and URIs are evaluated toward placement in either a Trusted target store or an Anomalous target store. The accumulated content of Anomalous target store is provided back to the Network Service Subscriber Clients. Warnings and tools are presented when appropriate. | 10-25-2012 |
20130112445 | Tool caddy integrated within or attachable to a housing of a portable power tool for magnetic or mechanical support for screws, screwbits, and drillbits - An enhanced housing for portable power tools provides a magazine for accessories and consumables which conveniently holds screws, rapidly interchangeable screw bits, drill bits, and other light tools substantially on the power tool itself. A magnetic field generating module attached to, attachable, or integrated with a battery charger, a removable battery, or a handholdable powered drill or driver whereby one hand may support the power tool, various screws, screw bits, and drill bits while the other hand places or replaces screws, the screw bits, or drill bits without requiring a reachable shelf, table, garment, or pocket. | 05-09-2013 |