Patent application number | Description | Published |
20090300012 | MULTILEVEL INTENT ANALYSIS METHOD FOR EMAIL FILTRATION - A method for filtering email which contains links to uniform resource identifiers which disguise the content and identity of spam sites by multiple serial redirection. | 12-03-2009 |
20100005146 | FACILITATING TRANSMISSION OF EMAIL BY CHECKING EMAIL PARAMETERS WITH A DATABASE OF WELL BEHAVED SENDERS - Facilitating email transmission by extracting email parameters, requesting data in the form of a dns query, and receiving a sender reputation as an IP address. Querying a database by sending a plurality of arguments concatenated to a dns request and receiving an IP address in reply. Operating a remote database as a dns server, receiving queries as domains and transmitting replies in the format of IPv4 or IPv6 addresses. Filtering email by querying a database with email parameters comprising an IP address and a domain of an email sender which may be extracted from an email header in the HELO, EHLO, MAIL FROM, or RETURN PATH. The smtp session is continued, modified or interrupted according to the result of the query submitted to a database operating as a dns server. | 01-07-2010 |
20100005191 | REQUESTING A SERVICE OR TRANSMITTING CONTENT AS A DOMAIN NAME SYSTEM RESOLVER - Requesting a service such as querying a database or communicating content by sending a plurality of arguments concatenated to a dns request and receiving a reply in the form of text or an IPv4 or an IPv6 address. | 01-07-2010 |
20100011420 | OPERATING A SERVICE ON A NETWORK AS A DOMAIN NAME SYSTEM SERVER - Operating a service such as a remote database as a dns server, receiving inputs such as queries as domain names and transmitting replies in the format of IPv4 or IPv6 addresses. | 01-14-2010 |
20100146260 | TANDEM ENCRYPTION CONNECTIONS TO PROVIDE NETWORK TRAFFIC SECURITY METHOD AND APPARATUS - Security measures are applied to encrypted data exchanges by enabling content decryption, rule application, and content re-encryption at a network location. A certificate, self-signed or authenticated by an official Certificate Authority is obtained for and installed within the secure proxy apparatus. A link to a secure page is replaced with a link to a page having a fully qualified domain name of the proxy apparatus as the suffix. An encrypted session between the client is established between the client and the proxy apparatus without deceit in the later case. A first encryption-enabled connection is established from the first node to a content filter, while a second encryption-enabled connection is established from the content filter to the second node. Following decryption, a determination is made as to whether the content includes Undesired Data. Restricted material is blocked, while unrestricted material is re-encrypted and delivered to the destination node. For a self-signed certificate, the destination node comprises a private security system-signed root certificate installed in the destination node's Trusted Root Certification Authorities certificate store. In another aspect of the invention, at least one of encrypted Instant Messages, e-mail messages and web pages are decrypted and recorded at a location between sources and destinations of the transmissions. The look and feel is maintained of a single encrypted link between the requestor and the external source by the inventive use of a wildcard certificate within the network local to the requestor. | 06-10-2010 |
20100250579 | RECALLING SPAM EMAIL OR VIRUSES FROM INBOXES - A method for operating an apparatus to recall email which has already passed through a spam filter to user mailboxes. An apparatus stores a highly efficient database for a brief period of time after an email is received, filtered, and transmitted to an email server. Message id, recipient, connecting IP address and other spam attributes are stored in a searchable format. After receiving updated spam attributes, a spam filter apparatus under software control queries the database for messages that were not detected as spam before transmittal to the email clients and servers, and sends spam recall messages. Improved email clients and servers adapted by software instructions, move or modify email user mailboxes upon receipt of the spam recall. | 09-30-2010 |
20100251372 | DEMAND SCHEDULED EMAIL VIRUS AFTERBURNER APPARATUS, METHOD, AND SYSTEM - Queuing and rescanning email for most recently detected virus signatures. An apparatus comprising a first virus scanning circuit operating on received email and a second virus scanning circuit operating on the outbound email queue and quarantine store. Rescanning for viruses while delivering email to downstream email server or viewing quarantine with virus signatures not previously known when the virus was first introduced to the wild. A circuit determines that an email server or an email client is active and ready to retrieve or read emails from quarantine or from the output queue of a an anti-virus, anti-spam appliance. Upon that condition, one or more virus signatures are read from a most recently discovered virus signature syndication server. Emails in the output queue, or quarantine or rescanned before transmission to the destination email server. | 09-30-2010 |
20100325240 | QUERYING A DATABASE AS A DOMAIN NAME SYSTEM RESOLVER - Querying a database by sending a plurality of arguments concatenated to a Domain Name System request and receiving a reply in the form of text or encoded as an IPv4 or an IPv6 address. | 12-23-2010 |
20110022670 | FACILITATING TRANSMISSION OF EMAIL BY CHECKING EMAIL PARAMETERS WITH A DATABASE OF WELL BEHAVED SENDERS - Facilitating email transmission by extracting email parameters, requesting data in the form of a dns query, and receiving a sender reputation as an IP address. Querying a database by sending a plurality of arguments concatenated to a dns request and receiving an IP address in reply. Operating a remote database as a dns server, receiving queries as domains and transmitting replies in the format of IPv4 or IPv6 addresses. Filtering email by querying a database with email parameters comprising an IP address and a domain of an email sender which may be extracted from an email header in the HELO, EHLO, MAIL FROM, or RETURN PATH. The smtp session is continued, modified or interrupted according to the result of the query submitted to a database operating as a dns server. | 01-27-2011 |
20110258201 | MULTILEVEL INTENT ANALYSIS APPARATUS & METHOD FOR EMAIL FILTRATION - A method for filtering email which contains links to uniform resource identifiers which disguise the content and identity of spam sites by multiple serial redirection. | 10-20-2011 |
20110258272 | FACILITATING TRANSMISSION OF AN EMAIL OF A WELL BEHAVED SENDER BY EXTRACTING EMAIL PARAMETERS AND QUERYING A DATABASE - Facilitating email transmission by extracting email parameters, requesting data in the form of a dns query, and receiving a sender reputation as an IP address. Querying a database by sending a plurality of arguments concatenated to a dns request and receiving an IP address in reply. Filtering email by querying a database with email parameters comprising an IP address and a domain of an email sender which may be extracted from an packet headers in the SMTP sequence up to and including the MAIL command and prior to the DATA command. The smtp session is continued, modified or interrupted according to the result of the query submitted to a database operating as a dns server. | 10-20-2011 |
20120023112 | Method for measuring similarity of diverse binary objects comprising bit patterns - An apparatus, system, and method for measuring the similarity of diverse binary objects, such as files, is disclosed. The method comprises determining a plurality of digital signatures in each of a plurality of dissimilar objects, for each digital signature, accessing a location in a store which has object identifiers for each object which also exhibits at least one instance of the digital signature, writing into the store the object identifiers of all the objects which have the corresponding pattern and the number of times the pattern is found, and making a list of all the objects which share a pattern found in each object. Analyzing the list determines the degree of similarity of a particular object with each of a plurality of diverse binary objects. | 01-26-2012 |
20130019092 | System to Embed Enhanced Security / Privacy Functions Into a User ClientAANM LEVOW; ZACHARYAACI MOUNTAIN VIEWAAST CAAACO USAAGP LEVOW; ZACHARY MOUNTAIN VIEW CA US - A system and method for provisioning enhanced security/privacy functions into a user client to detect, warn, and avoid man in the middle attacks and to improve privacy and security of data transmitted across the Internet without certificate authorities. | 01-17-2013 |