Challenge response systems
    1.
    发明申请
    Challenge response systems 有权
    挑战响应系统

    公开(公告)号:US20060031338A1

    公开(公告)日:2006-02-09

    申请号:US10914325

    申请日:2004-08-09

    CPC classification number: G06Q20/3674 H04L51/12

    Abstract: Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.

    Abstract translation: 公开了有助于确保在挑战 - 响应系统中使用的通信信道的系统和方法,以减轻垃圾邮件发送者入侵或欺骗。 系统和方法使用可以添加到源自发件人,收件人和第三方服务器的出站邮件的唯一ID。 ID可以根据相关方关联。 因此,例如,发送者可以向输出消息添加签名的ID。 向该发送者发送的针对该特定消息的挑战可以回显与原始ID相同的ID或新的ID,以允许发送方验证该挑战是否对应于实际的消息。 ID可以包括cookie,以便于消息的相关性,并且一旦发送者被确定为合法,便于检索消息。

    Proofs to filter spam
    2.
    发明授权
    Proofs to filter spam 有权
    过滤垃圾邮件的证明

    公开(公告)号:US08065370B2

    公开(公告)日:2011-11-22

    申请号:US11265842

    申请日:2005-11-03

    CPC classification number: H04L51/12 G06Q10/00

    Abstract: Embodiments of proofs to filter spam are presented herein. Proofs are utilized to indicate a sender used a set amount of computer resources in sending a message in order to demonstrate the sender is not a “spammer”. Varying the complexity of the proofs, or the level of resources used to send the message, will indicate to the recipient the relative likelihood the message is spam. Higher resource usage indicates that the message may not be spam, while lower resource usage increases the likelihood a message is spam. Also, if the recipient requires a higher level of proof than received, the receiver may request the sender send additional proof to verify the message is not spam.

    Abstract translation: 这里介绍了过滤垃圾邮件的示例的实施例。 证明用于指示发送者在发送消息时使用一定数量的计算机资源,以证明发件人不是“垃圾邮件发送者”。 改变证据的复杂性或用于发送消息的资源的级别将向接收者指示消息是垃圾邮件的相对可能性。 更高的资源使用率表示该邮件可能不是垃圾邮件,而较低的资源使用量增加了邮件是垃圾邮件的可能性。 另外,如果接收方需要比接收的更高级别的证明,则接收者可以请求发送者发送附加证明来验证该消息不是垃圾邮件。

    Challenge response systems
    4.
    发明授权
    Challenge response systems 有权
    挑战响应系统

    公开(公告)号:US07904517B2

    公开(公告)日:2011-03-08

    申请号:US10914325

    申请日:2004-08-09

    CPC classification number: G06Q20/3674 H04L51/12

    Abstract: Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.

    Abstract translation: 公开了有助于确保在挑战 - 响应系统中使用的通信信道的系统和方法,以减轻垃圾邮件发送者入侵或欺骗。 系统和方法使用可以添加到源自发件人,收件人和第三方服务器的出站邮件的唯一ID。 ID可以根据相关方关联。 因此,例如,发送者可以向输出消息添加签名的ID。 向该发送者发送的针对该特定消息的挑战可以回显与原始ID相同的ID或新的ID,以允许发送方验证该挑战是否对应于实际的消息。 ID可以包括cookie,以便于消息的相关性,并且一旦发送者被确定为合法,便于检索消息。

    Finding phishing sites
    5.
    发明申请
    Finding phishing sites 有权
    寻找钓鱼网站

    公开(公告)号:US20070192855A1

    公开(公告)日:2007-08-16

    申请号:US11335902

    申请日:2006-01-18

    CPC classification number: H04L63/1483 G06F17/30887 H04L63/08 H04L63/1441

    Abstract: Described is a technology by which phishing-related data sources are processed into aggregated data and a given site evaluated the aggregated data using a predictive model to automatically determine whether the given site is likely to be a phishing site. The predictive model may be built using machine learning based on training data, e.g., including known phishing sites and/or known non-phishing sites. To determine whether an object corresponding to a site is likely a phishing-related object are described, various criteria are evaluated, including one or more features of the object when evaluated. The determination is output in some way, e.g., made available to a reputation service, used to block access to a site or warn a user before allowing access, and/or used to assist a hand grader in being more efficient in evaluating sites.

    Abstract translation: 描述了一种将钓鱼相关数据源处理为聚合数据的技术,给定的站点使用预测模型评估聚合数据,以自动确定给定站点是否可能是钓鱼站点。 可以使用基于训练数据的机器学习来构建预测模型,例如包括已知的网络钓鱼站点和/或已知的非网络钓鱼站点。 为了确定对应于站点的对象是否可能是与钓鱼相关的对象,评估了各种标准,包括评估时对象的一个​​或多个特征。 该确定以某种方式输出,例如可用于信誉服务,用于阻止对站点的访问或在允许访问之前警告用户,和/或用于帮助平手机更有效地评估站点。

    Identification of email forwarders
    7.
    发明授权
    Identification of email forwarders 有权
    电子邮件转发器的识别

    公开(公告)号:US07908328B1

    公开(公告)日:2011-03-15

    申请号:US11023293

    申请日:2004-12-27

    CPC classification number: H04L51/12

    Abstract: Identification of email forwarders is described. In an implementation, a method includes using heuristics to identify email forwarders for use in a reputation system for locating spammers. In another implementation, a method includes determining a likelihood that a particular Internet Protocol (IP) address corresponds to an email forwarder and processing email originating from the particular IP address based on the determined likelihood. In a further implementation, a method includes collecting heuristic data that describes characteristics of emails sent from one or more Internet Protocol (IP) addresses and constructing a model from the heuristic data for identifying whether at least one of the IP address is an email forwarder. In yet a further implementation, a method includes identifying that a particular Internet Protocol (IP) address likely corresponds to an email forwarder and processing email from the particular IP address based on an implied sender of the email.

    Abstract translation: 描述电子邮件转发器的识别。 在一个实现中,一种方法包括使用启发式方法来识别在信誉系统中用于定位垃圾邮件发送者的电子邮件转发器。 在另一实施方式中,一种方法包括确定特定因特网协议(IP)地址对应于电子邮件转发器的可能性,以及基于所确定的可能性处理来自该特定IP地址的电子邮件。 在另一实现中,一种方法包括收集启发式数据,该启发式数据描述从一个或多个因特网协议(IP)地址发送的电子邮件的特征,并根据启发式数据构建模型,用于识别IP地址中的至少一个是电子邮件转发器。 在又一个实现中,一种方法包括识别特定的因特网协议(IP)地址可能对应于电子邮件转发器,并且基于电子邮件的隐含发送者从特定IP地址处理电子邮件。

Patent Agency Ranking