WO2005081109A1 - Electronic message management system with risk based message processing - Google Patents

Electronic message management system with risk based message processing Download PDF

Info

Publication number
WO2005081109A1
WO2005081109A1 PCT/US2005/004607 US2005004607W WO2005081109A1 WO 2005081109 A1 WO2005081109 A1 WO 2005081109A1 US 2005004607 W US2005004607 W US 2005004607W WO 2005081109 A1 WO2005081109 A1 WO 2005081109A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
messages
attributed
lowest
highest
Prior art date
Application number
PCT/US2005/004607
Other languages
French (fr)
Inventor
James Kott
David Weld
Original Assignee
Messagegate, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Messagegate, Inc. filed Critical Messagegate, Inc.
Publication of WO2005081109A1 publication Critical patent/WO2005081109A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Definitions

  • provisional application 60/544,636 entitled “Agent Monitoring/Reporting/Dynamic resource Allocation Instructions", filed on February 13, 2004, and provisional application 60/544,774, entitled “Dynamic/Intelligent Resource Allocation Using Agents and/or Other Operating Instructions", filed on February 13, 2004.
  • provisional application 60/544,774 entitled “Dynamic/Intelligent Resource Allocation Using Agents and/or Other Operating Instructions”, filed on February 13, 2004.
  • the present application claims priority to said provisional applications, and incorporates their specifications by reference, to the extent the '636 and '774 specifications are consistent with the specification of this non-provisional application.
  • Embodiments of the present invention relate generally, but not limited, to the fields of data processing and data communication.
  • embodiments of the present invention relate to risk based processing of electronic messages.
  • Figure 1 illustrates an overview of an electronic message management system, suitable for practicing the invention, in accordance with some embodiments
  • Figure 2 illustrates a boundary mail server of Figure 1 in further detail, in accordance with some embodiments
  • Figure 3 illustrates the mail management server of Figure 1 in further detail, in accordance with some embodiments
  • Figure 4 illustrates a portion of the operational flow of the identifier/classifier of Figure 2, in accordance with some embodiments
  • Figure 5 illustrates a portion of the operational flow of the data store of Figure 3, in accordance with some embodiments.
  • Figure 6 illustrates a portion of the operational flow of message processor of
  • Illustrative embodiments of the present invention include, but are not limited to, an electronic message management system, including e.g. a central mail management server, and a number of boundary mail servers, adapted to manage electronic messages, including risk based processing of messages (or contributing to).
  • an electronic message management system including e.g. a central mail management server, and a number of boundary mail servers, adapted to manage electronic messages, including risk based processing of messages (or contributing to).
  • Various aspects of the illustrative embodiments will be described using terms commonly employed by those skilled in the art to convey the substance of their work to others skilled in the art. However, it will be apparent to those skilled in the art that alternate embodiments may be practiced with only some of the described aspects. For purposes of explanation, specific numbers, materials, and configurations are set forth in order to provide a thorough understanding of the illustrative embodiments. However, it will be apparent to one skilled in the art that alternate embodiments may be practiced without the specific details. In other instances, well-known features are omitted or
  • FIG. 1 an overview of an electronic message management system, in accordance with some embodiments, is shown.
  • the electronic message management system is particularly suitable for large enterprises, handling millions of electronic messages per day, utilizing numerous geographically dispersed servers.
  • electronic mail is the most predominant form of electronic messages, for ease of understanding, the remaining descriptions will primary be presented in the context of electronic mail management.
  • the present invention may be practiced to manage all types of electronic messages, including but not limited to electronic mails. Further, the present invention may be practiced in computing environments having other architectures.
  • electronic message management system 101 includes a central mail management server 114 and a number of distributed mail servers 104.
  • distributed mail servers 104 are placed on a number of devices, such as firewalls 102, located at a number of boundary points of enterprise computing environment 100.
  • the mail servers need not be placed on the same machine as the firewall.
  • the firewall machines may sit on separate hardware from the mail servers, just in front of them and modulating access to them by servers outside the enterprise computing environment 100.
  • the zone into which the perimeter mail servers are placed is usually called a "DMZ" (demilitarized zone), and is typically reserved for those few boundary servers (e.g.
  • boundary mail servers 104 are operatively coupled to central mail management server 114, through e.g. Intranet fabric 106.
  • Intranet fabric 106 represents a collection of one or more networking devices, such as routers, switches and the like, to provide the operative coupling between boundary mail servers 104 and mail management server
  • boundary mail server 104 includes a mail transfer agent (MTA) component 202 and a message identification and classify combination 204 ( Figure 2).
  • MTA 202 is adapted to receive emails from electronic mail senders (which may be outside or within enterprise computing environment 100) using e.g. the Simple Mail Transfer Protocol (SMTP) and its extensions defined by the Internet Engineering Task Force (IETF) in [RFC2822] and related specifications.
  • Message identification and classify combination 204 is adapted to identify sender types for external senders of inbound messages, if possible, and classify the inbound messages into message classes, reflective of their perceived security risks (to computing environment 100, and/or its "owner" entity).
  • the classifications are based at least in part on the results of the identification operation(s).
  • An example of a suitable MTA is Sendmail, available from Sendmail, Inc. of Emeryville, CA, in particular, versions that support the Milter Application Programming Interface.
  • Sendmail available from Sendmail, Inc. of Emeryville, CA, in particular, versions that support the Milter Application Programming Interface.
  • the term “perceived security risk” shall be used (including in the claims) in its "short” form (i.e. without repeated qualification on the entity with the risk exposure), however, unless specified otherwise, or the context clearly dictates a different meaning, the term should be construed to mean the "security risk as perceived to computing environment 100 and/or its "owner” entity). "Owner” shall have a general, and not a legalistically precise meaning.
  • central mail management server 114 includes a message store 302, store manager 310 and message processors (e.g. mail filter) 312.
  • message store 302 and store manager 310 are adapted to collaborate to facilitate storing of messages with associated perceived security risks.
  • message processors (e.g. mail filter) 312 are adapted to process (e.g. filter) the stored messages in a manner that takes into consideration of their perceived security risks.
  • message processors 312 are adapted to process the messages in an order that that takes into consideration of their perceived security risks. As a result, messages with lower perceived security risks are generally processed with a lower average wait time. In particular, messages with the lowest perceived security risks are processed with a lowest average wait time, whereas messages with the highest perceived security risks are processed with a highest average wait time, when compared to messages of other perceived security risk levels. [0020] In various embodiments, message processors 312 are adapted to process the messages with a scrutiny level that that takes into consideration of their perceived security risks. As a result, messages with lower perceived security risks are processed with lesser amount of scrutiny. In particular, messages with the lowest perceived security risks are processed with the least amount of scrutiny, and messages with the highest perceived security risks are processed with a highest amount of scrutiny, when compared to messages of other perceived security risk levels.
  • enterprise computing environment 100 is coupled to the external world, e.g. to various external mail senders, relays or receivers 120, through public network 122.
  • External mail senders, relays or receivers 120 represent a broad range of these elements known in the art.
  • Public network 122 may comprise one or more interconnected public networks, including but are not limited to the famous Internet.
  • firewall 102 (including mail server 104 are coupled to other internal servers, such as the earlier described mail management server 114 and internal mail servers 110, and mail clients 112, through a number of internal networks, including but not limited to intranet 106 and local area networks 108.
  • mail server 104 includes MTA 202 and message identification and classification combination 204.
  • MTA 202 is adapted to send and receive electronic mails to and from other mail senders/receivers or relays 120/110 (internal or external to enterprise computing environment 100)
  • message identification and classification combination 204 is adapted to identify sender types for external senders of inbound messages, if possible, and then classify the inbound messages into message classes, reflective of their perceived security risks, based at least in part on the results of the identification operation(s).
  • message identification and classification combination 204 is adapted to identify the sender type of a sender of a message by performing one or more validation operations.
  • validation operations refers to operations that attempt to validate the sender based at least in part on protocol and/or data extensions. Examples of validation operations include, but are not limited to, comparison of the sender's internet protocol address against lists of previously classified internet addresses, reverse domain name lookup operations, sender permitted from determination operations, domain level decryption operations, and so forth.
  • message identification and classification combination 204 is alternatively or additionally adapted to identify the sender type of a sender of a message by performing one or more authentication operations.
  • authentication operations refers to operations that attempt to authenticate the sender based at least in part on sender level cryptography. Examples of validation operations include, but are not limited to, authenticating digital signatures and the like.
  • message identification and classification combination 204 is adapted to classify the messages into appropriate message classes that are reflective of the perceived security risks, based at least in part on the results of the identification operations.
  • message identification and classification combination 204 is adapted to classify the messages into - a privileged entity class (for messages originating from e.g. "privileged" business partners); a key entity class (for messages originating from e.g. "key” business partners; - a known entity class (for messages originating from e.g. known entities, such as known corporations); - known recipient partners class (for messages originating from e.g. other known messaging partners of the recipients); and an unidentified sender class (for messages originating from senders/domains that cannot be otherwise identified).
  • a boundary mail server 104 may further include management databases 222 for storing various data 224 employed by message identification and classification combination 204 to perform its identification and classification operations.
  • data 224 may comprise the network addresses of a number of domain name services.
  • data 224 may comprise one or more decryption keys.
  • data 224 may comprise one or more lists of previously categorized internet addresses.
  • mail server 104 also includes one or more persistent storage units (or storage media) 212, employed to store the earlier described management databases 202 and working data.
  • mail server 104 includes one or more processors and associated non-persistent storage (such as random access memory) 214, coupled to storage medium 212, to execute MTA 202 and message identification and classification combination 204.
  • MTA 202 and message identification and classification combination 204 are implemented in software.
  • MTA 202 and message identification and classification combination 204 may be implemented in hardware, in part or in whole. Portions of the operational flow of MTA 202 and message identification and classification combination 204 will be further described below.
  • mail management server 114 includes a data store 302 and store manager 310 to facilitate storing messages with attributed perceived security risks, e.g. as reflective by their assigned message classifications.
  • data store 302 includes a number of message queues 304 having associated processing priorities.
  • messages are stored into prioritized queues 304 based at least in part on their attributed perceived security risks.
  • mail management server 114 further includes one or more message processors (e.g.
  • mail filter 312 adapted to process the messages in a manner that takes in consideration of their perceived security risk.
  • one or more message processors (e.g. mail filter) 312 are adapted to process messages with lower perceived security risks with lower average wait times.
  • messages with the lowest perceived security risks are processed with the lowest average wait time, and messages with the highest perceived security risks are processed with the highest average wait time.
  • Various implementation schemes may be employed to provide the desired processing prioritization.
  • the messages are processed in order of their perceived security risk with the lowest perceived security risk messages (stored in the message queue with the highest processing priority) processed first, before messages of the next higher perceived security risk (stored in the message queue with the next lower processing priority) are processed. This technique may also be augmented with some guaranteed processing for messages of higher perceived security risks.
  • different message processors may be employed to process messages with different perceived security risks, with the message processor employed to process messages with lower perceived security risk (e.g. stored in the message queue with higher processing priority) being given more resources (e.g. more power processor, more memory, and so forth,), as compared to resources given to other message processors.
  • the queues may be physically distinct, or logically distinct (e.g. by virtue of the priorities accorded them). Such broad meaning (i.e. physical or logical distinct) are intended for the term "queue", as it is used hereinafter, including their usage in the claims.
  • the message processor employs to process messages with the lowest perceived security risk (e.g.
  • resources of computing environment 100 in particular, electronic message management system 101, may be more efficiently employed to process electronic messages, in favor of the authentic business related electronic messages.
  • message processors 312 are adapted to process messages with lower perceived security risks with lower level of scrutiny.
  • messages with the lowest perceived security risks are processed with the lowest amount of scrutiny
  • messages with the highest perceived security risks are processed with the highest amount of scrutiny.
  • messages with the lowest perceived security risks may be processed for virus detection only, and applying a most liberal attachment policy
  • messages with the highest perceived security risks may be processed for spam as well as virus detection, and applying a least liberal attachment policy.
  • mail management server 114 further includes one or more persistent storage units (storage medium) 342, employed to stored management databases 302. Further, mail management server 114 includes one or more processors and associated non- persistent storage (such as random access memory) 344, coupled to storage medium 342, to execute store manager 310 and message processors (e.g. mail filter) 312.
  • store manager 310 and message processors (e.g. mail filter) 312 are implemented in software. In alternate embodiments, store manager 310 and message processors (e.g. mail filter) 312 may be implemented in hardware, in part or in whole.
  • Figure 4 illustrates a portion of the operational flow of message identification and classification combination 204, in accordance with some embodiments.
  • message identification and classification combination 204 attempts to identify the message, if possible, block 402.
  • message identification and classification combination 204 performs one or more validation operations.
  • message identification and classification combination 204 may alternatively or additionally, perform one or more authentication operations. Refer to earlier description for examples of validation and authentication operations.
  • message identification and classification combination 204 classifies the message into one of the message classifications, reflective of the perceived security risk, based at least in part on the result of the identification operation(s), block 404. For example, if the message is originated from a privileged business partner, message identification and classification combination 204 classifies the message into the privileged entity class having the lowest perceived security risk, or if the message's origination is unidentified, message identification and classification combination 204 classifies the message into the unidentified message class, having the highest perceived security risk. Other messages are classified into appropriate message classes, in like manner, reflective of their perceived security risks. The granularity, i.e. number of intermediate message classes having intermediate perceived security risk levels, may vary from embodiments to embodiments.
  • message identification and classification combination 204 annotates the message with the classification information accordingly, and then forwards the identified/classified message to store manager 310 for storage, and subsequent processing by message processors 312, block 406.
  • Figure 5 illustrates a portion of the operational flow of store manager 310, in accordance with some embodiments.
  • store manager 310 on receipt of a message annotated with its perceived security risk, causes the message to be stored into message store 302 accordingly, based at least in part on the message's perceived security risk, block 502.
  • the message is annotated with a message class reflective of its perceived security risk
  • store manager 310 causes the message to be stored into a message queue with appropriate processing priority (commensurate to the perceived security risk).
  • Figure 6 illustrates a portion of the operational flow of message processor(s) 312, in accordance with some embodiments.
  • message processor(s) 312 selects messages of a security risk level for processing, block 602.
  • message processor(s) 312 selects messages stored in a message queue of a particular priority for processing.
  • message processor(s) 312 selects and processes messages one security risk level (e.g. one message queue) at a time, from the lowest security risk (highest processing priority) to the highest security risk (lowest processing priority).
  • message processor(s) 312 On selection of messages of a perceived security risk (message queue of a particular priority), message processor(s) 312 retrieves one of the messages, block 604 and processes (e.g. filters) it accordingly, block 606. As described earlier, in various embodiments, message processor(s) 312 applies a level of scrutiny that is commensurate to the perceived security risk. In particular, message processor(s) 312 applies a lowest level of scrutiny for messages with the lowest perceived security risk (e.g. those stored in a message queue with the highest processing priority), and applies a highest level of scrutiny for messages with the highest perceived security risk (e.g. those stored in a message queue with the lowest processing priority). Refer to earlier description for examples
  • message processor(s) 312 On processing a message, message processor(s) 312 returns to block 604 and continues processing from there, if there are additional messages to be processed for the selected perceived security risk level (e.g. the selected message queue). For the embodiments, if all messages of the selected perceived security risk level (e.g. the selected message queue) have been processed, but there remains other messages of higher perceived security risk level to be processed, message processor(s) 312 returns to block 602, and continues processing from there. If all messages of all perceived security risk levels (e.g. of all message queues) have been processed, processing terminates.
  • the selected perceived security risk level e.g. the selected message queue
  • the electronic message management system 101 is particularly suitable for managing unwelcome or undesirable electronic messages for an enterprise computing environment 100 and for expediting the processing and delivery of electronic messages that are important or valuable.
  • System 101 enables the enterprise to manage the policies for electronic message management from a central location, which in turn enables the enterprise to manage electronic message acceptance/rejection uniformly, even if their equipment is geographically dispersed.
  • Resources of computing environment 100, in particular, electronic message management system 101 may be more efficiently employed to process electronic messages, in favor of the authentic business related electronic messages.
  • system 101 enables messages from of higher business importance, e.g. those from privileged business partners to be processed/attended to first.

Abstract

An electronic message management system, including an embodiment, having a boundary server endowed with an identification and classification combination, and a management server having a message store and one or more processors, is disclosed. The elements are adapted to collectively facilitate processing of messages in a manner that takes into consideration perceived security risks of the messages.

Description

Electronic Message Management System With Risk Based Message Processing
RELATED APPLICATIONS
[0001] The present application is a non-provisional application of provisional application 60/544,636, entitled "Agent Monitoring/Reporting/Dynamic resource Allocation Instructions", filed on February 13, 2004, and provisional application 60/544,774, entitled "Dynamic/Intelligent Resource Allocation Using Agents and/or Other Operating Instructions", filed on February 13, 2004. The present application claims priority to said provisional applications, and incorporates their specifications by reference, to the extent the '636 and '774 specifications are consistent with the specification of this non-provisional application. TECHNICAL FIELD
[0002] Embodiments of the present invention relate generally, but not limited, to the fields of data processing and data communication. In particular, embodiments of the present invention relate to risk based processing of electronic messages.
BACKGROUND
[0003] With advances in computing and networking technology, electronic messaging, such as email, has become ubiquitous. It is used for personal as well as business communication. However, in recent years, the effectiveness of electronic messaging is undermined due to the rise and proliferation of spam mails (i.e. uninvited and/or solicitation commercial or non-commercial electronic messages) and viruses (i.e. malicious code). [0004] Large enterprises, such as multi-national corporations, handle millions of electronic messages each day, employing multiple geographically dispersed servers, to serve their far flung constituent clients. The problem of unwelcome or undesirable electronic messages is especially difficult for them, and creates a significant hurdle to timely processing and routing important business communications.
BRIEF DESCRIPTION OF THE DRAWINGS
[0005] The present invention will be described by way of exemplary embodiments, but not limitations, illustrated in the accompanying drawings in which like references denote similar elements, and in which:
[0006] Figure 1 illustrates an overview of an electronic message management system, suitable for practicing the invention, in accordance with some embodiments;
[0007] Figure 2 illustrates a boundary mail server of Figure 1 in further detail, in accordance with some embodiments; [0008] Figure 3 illustrates the mail management server of Figure 1 in further detail, in accordance with some embodiments;
[0009] Figure 4 illustrates a portion of the operational flow of the identifier/classifier of Figure 2, in accordance with some embodiments;
[0010] Figure 5 illustrates a portion of the operational flow of the data store of Figure 3, in accordance with some embodiments; and
[0011] Figure 6 illustrates a portion of the operational flow of message processor of
Figure 3, in accordance with some embodiments.
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
[0012] Illustrative embodiments of the present invention include, but are not limited to, an electronic message management system, including e.g. a central mail management server, and a number of boundary mail servers, adapted to manage electronic messages, including risk based processing of messages (or contributing to). [0013] Various aspects of the illustrative embodiments will be described using terms commonly employed by those skilled in the art to convey the substance of their work to others skilled in the art. However, it will be apparent to those skilled in the art that alternate embodiments may be practiced with only some of the described aspects. For purposes of explanation, specific numbers, materials, and configurations are set forth in order to provide a thorough understanding of the illustrative embodiments. However, it will be apparent to one skilled in the art that alternate embodiments may be practiced without the specific details. In other instances, well-known features are omitted or simplified in order not to obscure the illustrative embodiments.
[0014] The phrase "in one embodiment" is used repeatedly. The phrase generally does not refer to the same embodiment; however, it may. The terms "comprising", "having" and "including" are synonymous, unless the context dictates otherwise. The term "server" may be a hardware or a software implementation, unless the context clearly indicates one implementation over the other.
[0015] Referring now to Figure 1, wherein an overview of an electronic message management system, in accordance with some embodiments, is shown. As will be apparent to those skilled in the art, the electronic message management system is particularly suitable for large enterprises, handling millions of electronic messages per day, utilizing numerous geographically dispersed servers. Since electronic mail is the most predominant form of electronic messages, for ease of understanding, the remaining descriptions will primary be presented in the context of electronic mail management. However, one skilled in the art will appreciate that the present invention may be practiced to manage all types of electronic messages, including but not limited to electronic mails. Further, the present invention may be practiced in computing environments having other architectures.
[0016] As illustrated, for the embodiments, electronic message management system 101 includes a central mail management server 114 and a number of distributed mail servers 104. For the embodiments, distributed mail servers 104 are placed on a number of devices, such as firewalls 102, located at a number of boundary points of enterprise computing environment 100. In alternate embodiments, the mail servers need not be placed on the same machine as the firewall. The firewall machines may sit on separate hardware from the mail servers, just in front of them and modulating access to them by servers outside the enterprise computing environment 100. The zone into which the perimeter mail servers are placed is usually called a "DMZ" (demilitarized zone), and is typically reserved for those few boundary servers (e.g. email, http, etc.) that need to provide network services that connect directly to external clients on the Internet (e.g. email senders, web browsers, etc.). Accordingly, distributed mail servers 104, whether it is placed directly on the same hardware with the firewall, or on separate hardware behind the firewall, in a DMZ, may also be referred to as boundary mail servers 104. Further, for the embodiments, boundary mail servers 104 are operatively coupled to central mail management server 114, through e.g. Intranet fabric 106. Intranet fabric 106 represents a collection of one or more networking devices, such as routers, switches and the like, to provide the operative coupling between boundary mail servers 104 and mail management server
114.
[0017] As will be described in more detail below, in various embodiments, boundary mail server 104 includes a mail transfer agent (MTA) component 202 and a message identification and classify combination 204 (Figure 2). In particular, MTA 202 is adapted to receive emails from electronic mail senders (which may be outside or within enterprise computing environment 100) using e.g. the Simple Mail Transfer Protocol (SMTP) and its extensions defined by the Internet Engineering Task Force (IETF) in [RFC2822] and related specifications. Message identification and classify combination 204, on the other hand, is adapted to identify sender types for external senders of inbound messages, if possible, and classify the inbound messages into message classes, reflective of their perceived security risks (to computing environment 100, and/or its "owner" entity). In various embodiments, the classifications are based at least in part on the results of the identification operation(s). An example of a suitable MTA is Sendmail, available from Sendmail, Inc. of Emeryville, CA, in particular, versions that support the Milter Application Programming Interface. Hereinafter, for ease of understanding, the term "perceived security risk" shall be used (including in the claims) in its "short" form (i.e. without repeated qualification on the entity with the risk exposure), however, unless specified otherwise, or the context clearly dictates a different meaning, the term should be construed to mean the "security risk as perceived to computing environment 100 and/or its "owner" entity). "Owner" shall have a general, and not a legalistically precise meaning. [0018] Continuing to refer to Figure 1, central mail management server 114 includes a message store 302, store manager 310 and message processors (e.g. mail filter) 312. Message store 302 and store manager 310 are adapted to collaborate to facilitate storing of messages with associated perceived security risks. And message processors (e.g. mail filter) 312, on the other hand, are adapted to process (e.g. filter) the stored messages in a manner that takes into consideration of their perceived security risks.
[0019] In various embodiments, message processors 312 are adapted to process the messages in an order that that takes into consideration of their perceived security risks. As a result, messages with lower perceived security risks are generally processed with a lower average wait time. In particular, messages with the lowest perceived security risks are processed with a lowest average wait time, whereas messages with the highest perceived security risks are processed with a highest average wait time, when compared to messages of other perceived security risk levels. [0020] In various embodiments, message processors 312 are adapted to process the messages with a scrutiny level that that takes into consideration of their perceived security risks. As a result, messages with lower perceived security risks are processed with lesser amount of scrutiny. In particular, messages with the lowest perceived security risks are processed with the least amount of scrutiny, and messages with the highest perceived security risks are processed with a highest amount of scrutiny, when compared to messages of other perceived security risk levels.
[0021] Still referring to Figure 1, enterprise computing environment 100 is coupled to the external world, e.g. to various external mail senders, relays or receivers 120, through public network 122. External mail senders, relays or receivers 120 represent a broad range of these elements known in the art. Public network 122 may comprise one or more interconnected public networks, including but are not limited to the famous Internet.
[0022] Within enterprise computing environment 100, firewall 102 (including mail server 104 are coupled to other internal servers, such as the earlier described mail management server 114 and internal mail servers 110, and mail clients 112, through a number of internal networks, including but not limited to intranet 106 and local area networks 108.
[0023] Referring now to Figure 2, wherein a boundary mail server 104 is illustrated in further detail, in accordance to various embodiments. As alluded to earlier, mail server 104 includes MTA 202 and message identification and classification combination 204. As described earlier, MTA 202 is adapted to send and receive electronic mails to and from other mail senders/receivers or relays 120/110 (internal or external to enterprise computing environment 100), and message identification and classification combination 204 is adapted to identify sender types for external senders of inbound messages, if possible, and then classify the inbound messages into message classes, reflective of their perceived security risks, based at least in part on the results of the identification operation(s).
[0024] In various embodiments, message identification and classification combination 204 is adapted to identify the sender type of a sender of a message by performing one or more validation operations. The term "validation operations" as used herein refers to operations that attempt to validate the sender based at least in part on protocol and/or data extensions. Examples of validation operations include, but are not limited to, comparison of the sender's internet protocol address against lists of previously classified internet addresses, reverse domain name lookup operations, sender permitted from determination operations, domain level decryption operations, and so forth.
[0025] In various embodiments, message identification and classification combination 204 is alternatively or additionally adapted to identify the sender type of a sender of a message by performing one or more authentication operations. The term "authentication operations" as used herein refers to operations that attempt to authenticate the sender based at least in part on sender level cryptography. Examples of validation operations include, but are not limited to, authenticating digital signatures and the like [0026] In various embodiments, message identification and classification combination 204 is adapted to classify the messages into appropriate message classes that are reflective of the perceived security risks, based at least in part on the results of the identification operations. In various embodiments, message identification and classification combination 204 is adapted to classify the messages into - a privileged entity class (for messages originating from e.g. "privileged" business partners); a key entity class (for messages originating from e.g. "key" business partners; - a known entity class (for messages originating from e.g. known entities, such as known corporations); - known recipient partners class (for messages originating from e.g. other known messaging partners of the recipients); and an unidentified sender class (for messages originating from senders/domains that cannot be otherwise identified). [0027] For the embodiments, a boundary mail server 104 may further include management databases 222 for storing various data 224 employed by message identification and classification combination 204 to perform its identification and classification operations. The exact natures of these data are implementation dependent. For example, if reverse domain name lookup operation is performed to validate a sender, data 224 may comprise the network addresses of a number of domain name services. As another example, if domain or recipient level decryption is supported to authentic a sender, data 224 may comprise one or more decryption keys. As another example, if internet address comparison is used to validate a sender, data 224 may comprise one or more lists of previously categorized internet addresses. [0028] For the embodiments, mail server 104 also includes one or more persistent storage units (or storage media) 212, employed to store the earlier described management databases 202 and working data. Further, mail server 104 includes one or more processors and associated non-persistent storage (such as random access memory) 214, coupled to storage medium 212, to execute MTA 202 and message identification and classification combination 204. For these embodiments, MTA 202 and message identification and classification combination 204 are implemented in software. In alternate embodiments, MTA 202 and message identification and classification combination 204 may be implemented in hardware, in part or in whole. Portions of the operational flow of MTA 202 and message identification and classification combination 204 will be further described below.
[0029] Referring now to Figure 3, wherein mail management server 114 is illustrated in further detail, in accordance with various embodiments. As illustrated, for the embodiments, mail management server 114 includes a data store 302 and store manager 310 to facilitate storing messages with attributed perceived security risks, e.g. as reflective by their assigned message classifications. For the illustrated embodiments, data store 302 includes a number of message queues 304 having associated processing priorities. For the illustrated embodiments, messages are stored into prioritized queues 304 based at least in part on their attributed perceived security risks. [0030] As described earlier, for the illustrated embodiments, mail management server 114 further includes one or more message processors (e.g. mail filter) 312 adapted to process the messages in a manner that takes in consideration of their perceived security risk. In particular, one or more message processors (e.g. mail filter) 312 are adapted to process messages with lower perceived security risks with lower average wait times. In particular, messages with the lowest perceived security risks are processed with the lowest average wait time, and messages with the highest perceived security risks are processed with the highest average wait time. [0031] Various implementation schemes may be employed to provide the desired processing prioritization. In various embodiments, the messages are processed in order of their perceived security risk with the lowest perceived security risk messages (stored in the message queue with the highest processing priority) processed first, before messages of the next higher perceived security risk (stored in the message queue with the next lower processing priority) are processed. This technique may also be augmented with some guaranteed processing for messages of higher perceived security risks.
[0032] In alternate embodiments, different message processors may be employed to process messages with different perceived security risks, with the message processor employed to process messages with lower perceived security risk (e.g. stored in the message queue with higher processing priority) being given more resources (e.g. more power processor, more memory, and so forth,), as compared to resources given to other message processors. The queues may be physically distinct, or logically distinct (e.g. by virtue of the priorities accorded them). Such broad meaning (i.e. physical or logical distinct) are intended for the term "queue", as it is used hereinafter, including their usage in the claims. In particular, the message processor employs to process messages with the lowest perceived security risk (e.g. stored in the message queue with the highest processing priority) being given the most amount of resources, and message processor employs to process messages with the highest perceived security risk (e.g. stored in the message queue with the lowest processing priority) being given the least amount of resources. Accordingly, resources of computing environment 100, in particular, electronic message management system 101, may be more efficiently employed to process electronic messages, in favor of the authentic business related electronic messages.
[0033] In various embodiments, message processors (e.g. mail filter) 312 are adapted to process messages with lower perceived security risks with lower level of scrutiny. In particular, messages with the lowest perceived security risks are processed with the lowest amount of scrutiny, and messages with the highest perceived security risks are processed with the highest amount of scrutiny. For examples, messages with the lowest perceived security risks may be processed for virus detection only, and applying a most liberal attachment policy, and messages with the highest perceived security risks may be processed for spam as well as virus detection, and applying a least liberal attachment policy.
[0034] Continuing to refer to Figure 3, for the illustrated embodiments, mail management server 114 further includes one or more persistent storage units (storage medium) 342, employed to stored management databases 302. Further, mail management server 114 includes one or more processors and associated non- persistent storage (such as random access memory) 344, coupled to storage medium 342, to execute store manager 310 and message processors (e.g. mail filter) 312. For these embodiments, store manager 310 and message processors (e.g. mail filter) 312 are implemented in software. In alternate embodiments, store manager 310 and message processors (e.g. mail filter) 312 may be implemented in hardware, in part or in whole.
[0035] We refer now to Figures 4-6 to further describe message identification and classification combination 204, store manager 310 and message processors (e.g. mail filter) 312, more specifically, the relatively more relevant portions of their operational flow.
[0036] Figure 4 illustrates a portion of the operational flow of message identification and classification combination 204, in accordance with some embodiments. As illustrated, on receipt of a message, in particular, an inbound message, message identification and classification combination 204, attempts to identify the message, if possible, block 402. As described earlier, in various embodiments, message identification and classification combination 204 performs one or more validation operations. In various embodiments, message identification and classification combination 204, may alternatively or additionally, perform one or more authentication operations. Refer to earlier description for examples of validation and authentication operations.
[0037] On completion of identification, whether successful or not, message identification and classification combination 204, classifies the message into one of the message classifications, reflective of the perceived security risk, based at least in part on the result of the identification operation(s), block 404. For example, if the message is originated from a privileged business partner, message identification and classification combination 204 classifies the message into the privileged entity class having the lowest perceived security risk, or if the message's origination is unidentified, message identification and classification combination 204 classifies the message into the unidentified message class, having the highest perceived security risk. Other messages are classified into appropriate message classes, in like manner, reflective of their perceived security risks. The granularity, i.e. number of intermediate message classes having intermediate perceived security risk levels, may vary from embodiments to embodiments.
[0038] On classifying the message, for the illustrated embodiments, message identification and classification combination 204 annotates the message with the classification information accordingly, and then forwards the identified/classified message to store manager 310 for storage, and subsequent processing by message processors 312, block 406.
[0039] Figure 5 illustrates a portion of the operational flow of store manager 310, in accordance with some embodiments. As illustrated, on receipt of a message annotated with its perceived security risk, store manager 310 causes the message to be stored into message store 302 accordingly, based at least in part on the message's perceived security risk, block 502. As described earlier, in various embodiments, the message is annotated with a message class reflective of its perceived security risk, store manager 310 causes the message to be stored into a message queue with appropriate processing priority (commensurate to the perceived security risk).
[0040] Figure 6 illustrates a portion of the operational flow of message processor(s) 312, in accordance with some embodiments. As illustrated, when invoked, message processor(s) 312 selects messages of a security risk level for processing, block 602. In various embodiments, where messages of a particular security risk level are stored in a message queue having a commensurate processing priority, message processor(s) 312 selects messages stored in a message queue of a particular priority for processing. In various embodiments, message processor(s) 312 selects and processes messages one security risk level (e.g. one message queue) at a time, from the lowest security risk (highest processing priority) to the highest security risk (lowest processing priority).
[0041] On selection of messages of a perceived security risk (message queue of a particular priority), message processor(s) 312 retrieves one of the messages, block 604 and processes (e.g. filters) it accordingly, block 606. As described earlier, in various embodiments, message processor(s) 312 applies a level of scrutiny that is commensurate to the perceived security risk. In particular, message processor(s) 312 applies a lowest level of scrutiny for messages with the lowest perceived security risk (e.g. those stored in a message queue with the highest processing priority), and applies a highest level of scrutiny for messages with the highest perceived security risk (e.g. those stored in a message queue with the lowest processing priority). Refer to earlier description for examples
[0042] On processing a message, message processor(s) 312 returns to block 604 and continues processing from there, if there are additional messages to be processed for the selected perceived security risk level (e.g. the selected message queue). For the embodiments, if all messages of the selected perceived security risk level (e.g. the selected message queue) have been processed, but there remains other messages of higher perceived security risk level to be processed, message processor(s) 312 returns to block 602, and continues processing from there. If all messages of all perceived security risk levels (e.g. of all message queues) have been processed, processing terminates.
[0043] Accordingly, the electronic message management system 101 is particularly suitable for managing unwelcome or undesirable electronic messages for an enterprise computing environment 100 and for expediting the processing and delivery of electronic messages that are important or valuable. System 101 enables the enterprise to manage the policies for electronic message management from a central location, which in turn enables the enterprise to manage electronic message acceptance/rejection uniformly, even if their equipment is geographically dispersed. Resources of computing environment 100, in particular, electronic message management system 101, may be more efficiently employed to process electronic messages, in favor of the authentic business related electronic messages. Resultantly, system 101 enables messages from of higher business importance, e.g. those from privileged business partners to be processed/attended to first.
[0044] Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that a wide variety of alternate and/or equivalent implementations may be substituted for the specific embodiments shown and described, without departing from the scope of the present invention. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that this invention be limited only by the claims and the equivalents thereof.

Claims

What is claimed is:
1. An electronic message management server comprising: a message identification unit adapted to identify a sender type for a sender of a message, if possible; and a message classifier coupled to the message identification unit, and adapted to classify the message into a message class, based at least in part on the result of said identification, the message class being reflective of a perceived security risk of the message.
2. The server of claim 1, wherein the message identification unit is adapted to identify the sender type of a sender by performing one or more sender validation operations or one or more sender authentication operations.
3. The server of claim 2, wherein the one or more sender validation operations are selected from the group consisting of l - a reverse domain name system lookup operation, - a comparison of an electronic address of the sender against lists of previously classified electronic addresses, - a sender permitted from determination operation, and a domain level decryption operation.
4. The server of claim 2, wherein the one or more sender authentication operations are selected from the group consisting of - a digital signature authentication operation, and - a sender level decryption operation.
5. The server of claim 1 , wherein the message class is selected from the group consisting of an entity level partner class, a lαiown entity class, a sender level partner class, and an unidentified class.
6. A method of operation on an electronic message management server comprising: identifying a sender type for a sender of a message, if possible; and classifying the message into a message class, based at least in part on the result of said identification, the message class being reflective of a perceived security risk of the message.
7. The method of claim 6, wherein the identifying comprises performing one or more sender validation operations or one or more sender authentication operations.
8. The method of claim 7, wherein the one or more sender validation operations are selected from the group consisting of a reverse domain name system lookup operation, - a comparison of an electronic address of the sender against lists of previously classified electronic addresses, , a sender permitted from determination operation, and a domain level decryption operation.
9. The method of claim 7, wherein the one or more sender authentication operations are selected from the group consisting of - a digital signature authentication operation, and a sender level decryption operation.
10. The method of claim 6, wherein the message class is selected from the group consisting of an entity level partner class, a known entity class, a sender level partner class, and an unidentified class.
11. An electronic message management server comprising: a message store adapted to store a plurality of messages that have attributed perceived security risks; and one or more message processors operatively coupled to the message store, and adapted to process the stored messages in a manner that takes into consideration the attributed perceived security risks.
12. The server of claim 11, wherein the message store comprises a plurality of message queues having associated processing priorities, and the messages are stored into the message queues, based at least in part on their attributed perceived security risks.
13. The server of claim 12, wherein the messages have message classifications that are reflective of their attributed perceived security risks, and the messages are stored into the prioritized message queues, based at least in part on their message classifications.
14. The server of claim 13, wherein the message queues comprise a first message queue having either a highest or a lowest associated processing priority, compared to associated processing priorities of other message queues; the message classifications comprise a first message classification that is reflective of either a lowest or a highest attributed perceived security risk, compared to other message classifications; and messages having the first message classification are stored in the first message queue if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk, or the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
15. The server of claim 14, wherein the one or more message processors are adapted to (a) process the messages stored in the first message queue with a lowest average wait time, compared to messages stored in other message queues, if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk; or (b) process the messages stored in the first message queue with a highest average wait time, compared to messages stored in other message queues, if the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
16. The server of claim 14, wherein the one or more processors are adapted to (a) process the messages stored in the first message queue with a least amount of scrutiny, compared to messages stored in other message queues, if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk; or (b) process the messages stored in the first message queue with a most amount of scrutiny, if the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
17. The server of claim 16, wherein the one or more processors are adapted to (a) process the messages stored in the first message queue for virus detection only, if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk; or (b) process the messages stored in the first message queue for at least virus and spam detection, if the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
18. The server of claim 16, wherein the one or more processors are adapted to (a) process the messages stored in the first message queue, applying a most liberal attachment policy, compared to attachment policies applied to processing of messages stored in other message queues, if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk; or (b) process the messages stored in the first message queue, applying a most stringent attachment policy, compared to attachment policies applied to processing of messages stored in other message queues, if the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
19. A method of operation on an electronic message management server, comprising: storing a plurality of messages that have attributed perceived security risks, into a message store; and processing the stored messages in a manner that takes into consideration the attributed perceived security risks.
20. The method of claim 19, wherein the storing comprises storing the messages into a plurality of message queues having associated processing priorities, based at least in part on their attributed perceived security risks.
21. The method of claim 20, wherein the messages have message classifications that are reflective of their attributed perceived security risks, and the storing comprises storing the messages into the prioritized message queues, based at least in part on their message classifications.
22. The method of claim 21 , wherein the message queues comprise a first message queue having either a highest associated processing priority or a lowest associated processing priority, compared to associated processing priorities of other message queues; the message classifications comprise a first message classification that is reflective of either a lowest attributed perceived security risk or a highest attributed perceived security risk, compared to other message classifications; and the storing comprises storing messages having the first message classification in the first message queue, if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk, or the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
23. The method of claim 22, wherein the processing comprises at least one of (a) processing the messages stored in the first message queue with a lowest average wait time, compared to messages stored in other message queues, if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk, and (b) processing the messages stored in the first message queue with a highest average wait time, compared to messages stored in other message queues, if the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
24. The method of claim 22, wherein the processing comprises at least one of (a) processing the messages stored in the first message queue with a least amount of scrutiny, compared to messages stored in other message queues, if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk, and (b) processing the messages stored in the first message queue with a most amount of scrutiny, compared to messages stored in other message queues, if the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
25. The method of claim 24, wherein the processing comprises at least one of (a) processing the messages stored in the first message queue for virus detection only, if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk, and (b) processing the messages stored in the first message queue for at least virus and spam detection, if the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
26. The method of claim 24, wherein the processing comprises at least one of (a) processing the messages stored in the first message queue, applying a most liberal attacliment policy, compared to attachment policies applied to processing of messages stored in other message queues, if the first message queue has a highest associated processing priority and the message classification reflects a lowest attributed perceived security risk, and (b) processing the messages stored in the first message queue, applying a most liberal attachment policy, compared to attachment policies applied to processing of messages stored in other message queues, if the first message queue has a lowest associated processing priority and the message classification reflects a highest attributed perceived security risk.
27. An electronic message management system comprising: a boundary mail server including a sender identification and classification combination adapted to identify sender types for senders of messages, if possible, and classify the messages into message classes, based at least in part on the results of the identifications, the message classes being reflective of perceived security risks of the messages; and a mail management server coupled to the boundary mail server including a message store to store the classified messages, and one or more message processors adapted to process the stored messages in a manner that takes into consideration the perceived security risks.
28. The system of claim 27, wherein the message store comprises a plurality of message queues having associated processing priorities, and the messages are stored into the message queues, based at least in part on their assigned message classes.
29. The system of claim 28, wherein the message queues comprise a first message queue having either a highest or a lowest associated processing priority, compared to associated processing priorities of other message queues; the message classes comprise a first message class that is reflective of either a lowest or a highest attributed perceived security risk, compared to other message classes; and messages having the first message class are stored in the first message queue if the first message queue has a highest associated processing priority and the message class reflects a lowest attributed perceived security risk, or the first message queue has a lowest associated processing priority and the message class reflects a highest attributed perceived security risk.
30. The server of claim 29, wherein the one or more message processors are adapted to (a) process the messages stored in the first message queue with a lowest average wait time, compared to messages stored in other message queues, if the first message queue has a highest associated processing priority and the message class reflects, a lowest attributed perceived security risk; or (b) process the messages stored in the first message queue with a highest average wait time, compared to messages stored in other message queues, if the first message queue has a lowest associated processing priority and the message class reflects a highest attributed perceived security risk.
PCT/US2005/004607 2004-02-13 2005-02-14 Electronic message management system with risk based message processing WO2005081109A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US54463604P 2004-02-13 2004-02-13
US54477404P 2004-02-13 2004-02-13
US60/544,774 2004-02-13
US60/544,636 2004-02-13

Publications (1)

Publication Number Publication Date
WO2005081109A1 true WO2005081109A1 (en) 2005-09-01

Family

ID=34890474

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/004607 WO2005081109A1 (en) 2004-02-13 2005-02-14 Electronic message management system with risk based message processing

Country Status (1)

Country Link
WO (1) WO2005081109A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1965547A1 (en) * 2007-02-28 2008-09-03 Humboldt Universität zu Berlin A computer implemented system and a method for detecting abuse of an electronic mail infrastructure in a computer network
US20220417159A1 (en) * 2021-06-24 2022-12-29 Zipwhip, Inc. Dynamic communication system registry traffic control on a communication network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6212636B1 (en) * 1997-05-01 2001-04-03 Itt Manufacturing Enterprises Method for establishing trust in a computer network via association
US6609196B1 (en) * 1997-07-24 2003-08-19 Tumbleweed Communications Corp. E-mail firewall with stored key encryption/decryption
US6654787B1 (en) * 1998-12-31 2003-11-25 Brightmail, Incorporated Method and apparatus for filtering e-mail
US6757830B1 (en) * 2000-10-03 2004-06-29 Networks Associates Technology, Inc. Detecting unwanted properties in received email messages

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6212636B1 (en) * 1997-05-01 2001-04-03 Itt Manufacturing Enterprises Method for establishing trust in a computer network via association
US6609196B1 (en) * 1997-07-24 2003-08-19 Tumbleweed Communications Corp. E-mail firewall with stored key encryption/decryption
US6654787B1 (en) * 1998-12-31 2003-11-25 Brightmail, Incorporated Method and apparatus for filtering e-mail
US6757830B1 (en) * 2000-10-03 2004-06-29 Networks Associates Technology, Inc. Detecting unwanted properties in received email messages

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1965547A1 (en) * 2007-02-28 2008-09-03 Humboldt Universität zu Berlin A computer implemented system and a method for detecting abuse of an electronic mail infrastructure in a computer network
US20220417159A1 (en) * 2021-06-24 2022-12-29 Zipwhip, Inc. Dynamic communication system registry traffic control on a communication network
US11695701B2 (en) * 2021-06-24 2023-07-04 Zipwhip, Llc Dynamic communication system registry traffic control on a communication network

Similar Documents

Publication Publication Date Title
AU2003215276B2 (en) E-mail management services
US7603472B2 (en) Zero-minute virus and spam detection
US7962558B2 (en) Program product and system for performing multiple hierarchical tests to verify identity of sender of an e-mail message and assigning the highest confidence value
US8347095B2 (en) System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison
US20060004896A1 (en) Managing unwanted/unsolicited e-mail protection using sender identity
JP2005518173A5 (en)
JP2009527058A (en) How to verify the intended recipient of an electronic message before delivery, and how to dynamically generate message content upon confirmation
US20060265459A1 (en) Systems and methods for managing the transmission of synchronous electronic messages
JP2009515426A (en) High reliability communication network
US7958187B2 (en) Systems and methods for managing directory harvest attacks via electronic messages
EP1922631B1 (en) System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison
US20050149479A1 (en) Electronic message management system
WO2005081109A1 (en) Electronic message management system with risk based message processing
US20050188034A1 (en) Electronic message management system with header analysis
Lieven et al. Filtering spam email based on retry patterns
JP2009505216A (en) System and method for detecting and filtering unsolicited electronic messages
US20050188040A1 (en) Electronic message management system with entity risk classification
Ludeman et al. Algorithmically determining store-and-forward mta relays using domainkeys
JP2012069125A (en) System and method for detecting and filtering unsolicited and undesired electronic messages

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase