1
Craig Sprosts, Scot Kennedy, Daniel Quinlan, Larry Rosenstein, Charles Slater: Identifying threats in electronic messages. Ironport Systems, Hickman Palermo Truong & Becker, December 14, 2010: US07854007 (111 worldwide citation)

Early detection of computer viruses and other message-borne threats is provided by applying heuristic tests to message content and examining sender reputation information when no virus signature information is available. As a result, a messaging gateway can suspend delivery of messages early in a vi ...


2
Craig Sprosts, Scot Kennedy, Daniel Quinlan, Larry Rosenstein, Charles Slater: Controlling a message quarantine. IronPort Systems, Hickman Palermo Truong & Becker, May 4, 2010: US07712136 (95 worldwide citation)

Controlling a message quarantine is disclosed. A message scanning method is described in which early exit from parsing and scanning can occur by matching threat rules only to selected message elements and stopping rule matching as soon as a match on one message element exceeds a threat threshold.


3
Paul J Clegg, Eric C Huss, Craig Sprosts, Krishna Srinivasan, Peter Schlampp, Shun Chen, Robert Brahms, Daniel Quinlan: Managing connections, messages, and directory harvest attacks at a server. Ironport Systems, Hickman Palermo Truong & Becker, December 7, 2010: US07849142 (47 worldwide citation)

A method and apparatus for managing connections, email messages, and directory harvest attacks at a server is disclosed. The server maintains a count of a parameter and compares the count to a specified maximum value, such that when the specified maximum value is met or exceeded, an action is taken ...


4
Michael Olivier, Craig Sprosts, Scot Kennedy, Daniel Quinlan, Larry Rosenstein, Craig Taylor: Method and apparatus for managing computer virus outbreaks. IronPort Systems, Hickman Palermo Truong & Becker, June 29, 2010: US07748038 (45 worldwide citation)

Early detection of computer viruses is provided by collecting information about suspicious messages and generating virus outbreak information. In one embodiment, a method comprises receiving the virus outbreak information that has been determined by receiving message information for messages that ha ...


5
Robert Brahms, Daniel Quinlan, Craig Sprosts: Techniques for determining the reputation of a message sender. IronPort Systems, Hickman Palermo Truong & Becker, July 13, 2010: US07756930 (22 worldwide citation)

Techniques are provided for determining a reputation of a message sender by obtaining two or more lists from two or more list providers; determining which lists of the two or more lists indicate the message sender; and determining a reputation score for the message sender based on which lists of the ...


6
Daniel Quinlan: Evaluating electronic mail messages based on probabilistic analysis. Hickman Palermo Truong & Becker, April 5, 2011: US07921063 (14 worldwide citation)

A computer system can evaluate electronic messages based on probabilistic analysis, including Bayesian analysis. In one embodiment, a data processing system comprises logic configured for perform training a probabilistic filter using first properties of one or more first network resource identifiers ...


7
Paul J Clegg, Eric C Huss, Craig Sprosts, Shun Chen, Robert Brahms, Daniel Quinlan: Managing connections and messages at a server by associating different actions for both different senders and different recipients. Ironport Systems, Hickman Palermo Truong & Becker, January 18, 2011: US07873695 (12 worldwide citation)

A method and apparatus for managing connections and messages at a server by associating different actions for both different senders and different recipients is disclosed. The server manages connections from different senders by receiving incoming connections from the different senders and determini ...


8
Daniel Quinlan, Jason Kehl, Jeffrey Wescott: Detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources. Ironport Systems, Hickman Palermo Truoung & Becker, November 16, 2010: US07836133 (9 worldwide citation)

In one embodiment, detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources comprises receiving a whitelist and a blocklist each having a plurality of network resource identifiers that have appeared in prior messages; retrieving a particular network resourc ...


9
Daniel Quinlan: Method of validating requests for sender reputation information. Ironport Systems, Hickman Palermo Truong & Becker, January 25, 2011: US07877493 (5 worldwide citation)

A method of validating queries for reputation scores of message senders comprises receiving, from a first host computer, a DNS format query to obtain a reputation score associated with a second host computer, wherein the query includes an authentication code; validating the authentication code; and ...


10
Daniel Quinlan, Jeffrey Wescott: Method of determining network addresses of senders of electronic mail messages. IronPort Systems, Hickman Palermo Truong & Becker, June 16, 2009: US07548544 (3 worldwide citation)

In one embodiment, a method comprises computer-implemented steps of receiving a plurality of electronic mail messages containing sender address information that is non-trusted. For each electronic mail message, information about the message is stored, and one or more receiving node identifiers in as ...