Communication abuse prevention

作者: Eileen S. Hash , Joseph Andrew Bono , Dan Wu , Thomas R. Bauman , Jeffrey E. Steinbok

DOI:

关键词:

摘要: Communication abuse prevention techniques are described. In an implementation, a reputation level for communication is determined based on relation information sender and intended recipient of the communication. A challenge invoked that to be completed by before sent. The selected caused available access successful completion challenge. Access inhibited in response subsequent determination indicates has changed new prior being accessed recipient. additional associated with

参考文章(11)
Michael Del Monte, Email authentication system ,(2002)
Peter K. Lyons, Matthew P. Chant, Classifying e-mail connections for policy enforcement ,(2004)
Vincent J. Schiavone, David I. Brussin, James H. Koenig, System and method for controlling distribution of network communications ,(2007)
Arapaut V. Sivaprasad, Manish K. Goel, Adesh K. Goel, Electronic message authentication ,(2006)
Adam S. Dawes, Kenneth K. Okumura, Scott M. Petry, Peter K. Lund, Carl S. Gutekunst, James Cunningham, Erik S. Chen, Dmitriy Y. Larin, Zero-hour quarantine of suspect electronic messages ,(2008)