Patent
1996-09-18
2000-06-06
Lall, Parshotam S.
39518701, G06F 1300
Patent
active
060729422
ABSTRACT:
A system and method for filtering electronic mail messages is described. A message is received an processed through a one or more filter flows. Each filter flow is comprised of one or more self-contained nodes which can be combined in whatever order is required to enforce a given security policy. Node independence provides a policy-neutral environment for constructing filter flows. A filter flow may be as simple as forwarding the mail to the intended recipient, or may perform one or more checks where it decides whether to forward, reject, return (or some combination thereof) the message. Certain node types are also able to append information on to a mail message, while others are able to modify certain parts of a mail message. Several of the node types are able to generate audit or log messages in concert with processing a mail message.
REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4584639 (1986-04-01), Hardy
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4648031 (1987-03-01), Jenner
patent: 4661951 (1987-04-01), Segarra
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4870571 (1989-09-01), Frink
patent: 4885789 (1989-12-01), Burger et al.
patent: 4914568 (1990-04-01), Kodosky et al.
patent: 4914590 (1990-04-01), Loatman et al.
patent: 5093914 (1992-03-01), Coplien et al.
patent: 5204961 (1993-04-01), Barlow
patent: 5272754 (1993-12-01), Boebert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5305385 (1994-04-01), Schanning et al.
patent: 5311593 (1994-05-01), Carmi
patent: 5333266 (1994-07-01), Boaz et al.
patent: 5377349 (1994-12-01), Motomura
patent: 5377354 (1994-12-01), Scannell et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5418951 (1995-05-01), Damashek
patent: 5485460 (1996-01-01), Schrier et al.
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5550984 (1996-08-01), Gelb
patent: 5555346 (1996-09-01), Gross et al.
patent: 5586260 (1996-12-01), Hu
patent: 5606668 (1997-02-01), Shwed
patent: 5619648 (1997-04-01), Canale et al.
patent: 5623601 (1997-04-01), Vu
patent: 5632011 (1997-05-01), Landfield et al.
patent: 5634084 (1997-05-01), Malsheen
patent: 5644571 (1997-07-01), Seaman
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5699513 (1997-12-01), Feigen et al.
patent: 5706507 (1998-01-01), Schloss
patent: 5715466 (1998-02-01), Flanagan
patent: 5717913 (1998-02-01), Driscoll
patent: 5720035 (1998-02-01), Allegre et al.
patent: 5781550 (1998-07-01), Templin et al.
International Search Report , PCT Application No. PCT/US 95/12681, 8 p., (mailed Apr. 9, 1996).
Cobb, S., "Establishing Firewall Policy", IEEE, 198-205, (1996).
"100% of Hackers Failed to Break Into One Internet Site Protected by Sidewinder", News Release, Secure Computing Corporation (Feb. 16, 1995).
"Internet Security System Given `Product of the Year` Award", News Release, Secure Computing Corporation (Mar. 28, 1995).
"Satan No Threat to Sidewinder.TM.", News Release, Secure Computing Corporation (Apr. 26, 1995).
"Answers to Frequently Asked Questions About Network Security", Secure Computing Corporation, 41 p. (1994).
"Sidewinder Internals", Secure Computing Corporation, 16 p. (Date Unavailable).
Adam, J.A., "Meta-matrices", IEEE Spectrum, 26-27 (Oct. 1992).
Adam, J.A., "Playing on the Net", IEEE Spectrum, 29 (Oct. 1992).
Ancilotti, P., et al., "Language Features for Access Control", IEEE Transactions on Software Engineering, SE-9, 16-25 (Jan. 1983).
Baclace, P.E., "Competitive Agents for Information Filtering", Communications of the ACM, 35, 50 (Dec. 1992).
Badger, L., et al., "Practical Domain and Type Enforcement for UNIX", Proceedings of the 1995 IEEE Symposium on Security and Privacy, Oakland, CA, 66-77 (May 8-10, 1995).
Belkin, N.J., et al., "Information Filtering and Information Retrieval: Two Sides of the Same Coin?", Communications of the ACM, 35, 29-38 (Dec. 1992).
Bellovin, S.M., et al., "Network Firewalls", IEEE Communications Magazine, 32, 50-57 (Sep. 1994).
Bevier, W.R., et al., "Connection Policies and Controlled Interference", Proceedings of the 8th IEEE Computer Security Foundations Workshop, Kenmare, County Kerry, Ireland, 167-176 (Jun. 13-15, 1995).
Bowen, T.F., et al., "The Datacycle Architecture", Communications of the ACM, 35, 71-81 (Dec. 1992).
Bryan, J., "Firewalls For Sale", BYTE, pp. 99-100, 102 and 104 (Apr. 1995).
Damashek, M., "Gauging Similarity with n-Grams: Language-Independent Categorization of Text", Science, 267, 843-848 (Feb. 10, 1995).
Fine, T., et al., "Assuring Distributed Trusted Mach", Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 206-218 (1993).
Foltz, P.W., et al., "Personalized Information Delivery: An Analysis of Information Filtering Methods", Communications of the ACM, 35, 51-60 (Dec. 1992).
Goldberg, D., et al., "Using Collaborative Filtering to Weave an Information Tapestry", Communications of the ACM, 35, 61-70 (Dec. 1992).
Grampp, F.T., "UNIX Operating System Security", AT&T Bell Laboratories Technical Journal, 63, 1649-1672 (Oct. 1984).
Haigh, J.T., et al., "Extending the Non-Interference Version of MLS for SAT", Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland, CA, 232-239 (Apr. 7-9, 1986).
Kent, S.T., "Internet Privacy Enhanced Mail", Communications of the ACM, 36, 48-60 (Apr. 1993).
Lee, K.-C., et al., "A Framework for Controlling Cooperative Agents", Computer, 8-16, (Jul. 1993).
Loeb, S., "Architecting Personalized Delivery of Multimedia Information", Communications of the ACM, 35, 39-50 (Dec. 1992).
Loeb, S., et al., "Information Filtering," Communications of the ACM, 35, 26-28 (Dec. 1992).
Merenbloom, P., "Network `Fire Walls` Safeguard LAN Data from Outside Intrusion", InfoWorld, p. 69 (Jul. 25, 1994).
Obraczka, K., et al., "Internet Resource Discovery Services", Computer, 26, 8-22 (Sep. 1993).
Press, L., "The Net: Progress and Opportunity", Communications of the ACM, 35, 21-25 (Dec. 1992).
Schwartz, M.F., "Internet Resource Discovery at the University of Colorado", Computer, 26, 25-35 (Sep. 1993).
Smith, R.E., "Sidewinder: Defense in Depth Using Type Enforcement", International Journal of Network Management, 219-229, (Jul.-Aug. 1995).
Stadnyk I., et al., "Modelling Users' Interests in Information Filters", Communications of the ACM, 35, 49 (Dec. 1992).
Stevens, C., "Automating the Creation of Information Filters", Communications of the ACM, 35, 48 (Dec. 1992).
Thomsen, D., "Type Enforcement: The New Security Model", Proceedings of the SPIE, Multimedia: Full-Service Impact on Business, Education and the Home, vol. 2617, Philadelphia, PA, 143-150 (Oct. 23-24, 1995).
Warrier, U.S., et al., "A Platform for Heterogeneous Interconnection Network Management", IEEE Journal on Selected Areas in Communications, 8, 119-126 (Jan. 1990).
Smith, R.E., "Constructing a High Assurance Mail Guard", Proceedings of the 17th National Computer Security Conference, pp. 247-253 (Oct. 1994).
"Special Report: Secure Computing Corporation and Network Security", Computer Select, 13 p. (Dec. 1995).
Atkinson, R., "IP Authentication Header", Network Working Group, Request For Comment No. 1826, http//ds.internic.net/rfc/rfc1826.txt, 11 p. (Aug. 1995).
Atkinson, R., "IP Encapsulating Security Payload (ESP)", Network Working Group, Request For Comment No. 1827, http//ds.internic.net/rfc/rfc1827.txt, 12 p. (Aug. 1995).
Atkinson, R., "Security Architecture for the Internet Protocol", Network Working Group, Reqest for Comment No. 1825, http//ds.internic.net/rfc/rfc1825.txt, 21 p. (Aug. 1995).
Gassman, B., "Internet Security, and Firewalls Protection on the Internet", IEEE, 93-107 (1996).
Greenwald, M., et al., "Designing an Academic Firewall: Policy, Practice, and Experience with Surf", IEEE, 79-92 (1996).
Karn, P., et al
Greve Paula Budig
Stockwell Edward B.
Lall Parshotam S.
Secure Computing Corporation
Vu Viet
LandOfFree
System and method of electronic mail filtering using interconnec does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method of electronic mail filtering using interconnec, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of electronic mail filtering using interconnec will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2221608