Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43 results about "Simple Mail Transfer Protocol" patented technology

The Simple Mail Transfer Protocol (SMTP) is a communication protocol for electronic mail transmission. As an Internet standard, SMTP was first defined in 1982 by RFC 821, and updated in 2008 by RFC 5321 to Extended SMTP additions, which is the protocol variety in widespread use today. Mail servers and other message transfer agents use SMTP to send and receive mail messages. Proprietary systems such as Microsoft Exchange and IBM Notes and webmail systems such as Outlook.com, Gmail and Yahoo! Mail may use non-standard protocols internally, but all use SMTP when sending to or receiving email from outside their own systems. SMTP servers commonly use the Transmission Control Protocol on port number 25.

E-mail firewall with stored key encryption/decryption

An e-mail firewall (105) applies policies to e-mail messages (204) between a first site and a plurality of second sites in accordance with a plurality of administrator selectable policies (216). The firewall comprises a simple mail transfer protocol (SMTP) relay (202) for causing the e-mail messages (204) to be transmitted between the first site and selected ones of the second sites. A plurality of policy managers (216) enforce administrator selectable policies. The policies, such as encryption and decryption policies, comprise at least a first source / destination policy (218), at least a first content policy (202) and at least a first virus policy (224). The policies are characterized by a plurality of administrator selectable criteria (310), a plurality of administrator selectable exceptions (312) to the criteria and a plurality of administrator selectable actions (314, 316, 322) associated with the criteria and exceptions. The policy managers comprise an access manager (218) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the source / destination policy (218). The policy managers (216) further comprise a content manager (220) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the content policy (220), and a virus manager (224) for restriction transmission of e-mail messages (204) between the first site and the second sites in accordance with the virus policy (224).
Owner:TUMBLEWEED COMM CORP

Inter-carrier short text message delivery

A method is provided for routing mobile telephone short text messages between different mobile telephone messaging networks, including mobile telephone messaging networks operated by a single carrier (i.e., intra-carrier messaging) or by different carriers (i.e., inter-carrier messaging). The method includes receiving a short text message at a mobile telephone short message gateway operated by a first mobile telephone carrier, the short text message having a destination directory number (DN). The short message gateway determines that the destination directory number (DN) is associated with one of two or more mobile telephone networks. The two or more mobile telephone networks may be operated by the first mobile telephone carrier alone or by the first mobile telephone carrier and another carrier. The short text message is then routed to the appropriate mobile telephone network based upon its destination directory number (DN). In a particular implementation, the short text message is a Short Message Service (SMS) message, and the short message gateway is a Short Message Peer to Peer (SMPP) gateway. The routing of the SMS includes reformatting it to include a Simple Mail Transfer Protocol (SMTP) address of an SMPP gateway of the mobile telephone messaging network to which the SMS message is directed. The SMS message is then sent as an SMTP message over the Internet.
Owner:AT&T WIRELESS SERVICES

E-mail firewall with stored key encryption/decryption

An e-mail firewall (105) applies policies to e-mail messages (204) between a first 5 site and a plurality of second sites in accordance with a plurality of administrator selectable policies (216). The firewall comprises a simple mail transfer protocol (SMTP) relay (202) for causing the e-mail messages (204) to be transmitted between the first site and selected ones of the second sites. A plurality of policy managers (216) enforce—administrator selectable policies. The policies, such as encryption and decryption policies, comprise at least a first source / destination policy (218), at least a first content policy (202) and at least a first virus policy (224). The policies are characterized by a plurality of administrator selectable criteria (310), a plurality of administrator selectable exceptions (312) to the criteria and a plurality of administrator selectable actions (314, 316, 322) associated with the criteria and exceptions. The policy managers comprise an access manager (218) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the source / destination policy (218). The policy managers (216) further comprise a content manager (220) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the content policy (220), and a virus manager (224) for restriction transmission of e-mail messages (204) between the first site and the second sites in accordance with the virus policy (224).
Owner:AXWAY

Bot-Network Detection Based on Simple Mail Transfer Protocol (SMTP) Characteristics of E-Mail Senders Within IP Address Aggregates

A method and system for determining whether an IP address is part of a bot-network are provided. The IP-address-aggregate associated with the IP address of an e-mail sender is determined. The IP-address-aggregate is associated with an IP-address-aggregate-category based on the current SMTP traffic characteristics of the IP-address-aggregate and the known SMTP traffic characteristics of an IP-address-aggregate-category. A bot-likelihood score of the IP-address-aggregate-category is then associated with IP-address-aggregate. IP-address-aggregate-categories can be established based on historical SMTP traffic characteristics of the IP-address-aggregates. The IP-address-aggregates are grouped based on SMTP characteristics, and the IP-address-aggregate-categories are defined based on a selection of IP-address-aggregates with similar SMTP traffic characteristics that are diagnostic of spam bots vs. non-botnet-controllers spammers. Bot likelihood scores are determined for the resulting IP-address-aggregate-categories based on historically known bot IP addresses.
Owner:AT&T INTPROP I L P

E-mail firewall with stored key encryption/decryption

An e-mail firewall (105) applies policies to e-mail messages (204) between a first 5 site and a plurality of second sites in accordance with a plurality of administrator selectable policies (216). The firewall comprises a simple mail transfer protocol (SMTP) relay (202) for causing the e-mail messages (204) to be transmitted between the first site and selected ones of the second sites. A plurality of policy managers (216) enforce-administrator selectable policies. The policies, such as encryption and decryption policies, comprise at least a first source / destination policy (218), at least a first content policy (202) and at least a first virus policy (224). The policies are characterized by a plurality of administrator selectable criteria (310), a plurality of administrator selectable exceptions (312) to the criteria and a plurality of administrator selectable actions (314, 316, 322) associated with the criteria and exceptions. The policy managers comprise an access manager (218) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the source / destination policy (218). The policy managers (216) further comprise a content manager (220) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the content policy (220), and a virus manager (224) for restriction transmission of e-mail messages (204) between the first site and the second sites in accordance with the virus policy (224).
Owner:AXWAY

System and method for recording voice data and converting voice data to a text file

The present invention relates to recording voice data using a voice communication device connected to a communication network and converting the voice data into a text file for delivery to a text communication device. In accordance with the present invention, the voice communication device may transfer the voice data in real-time or store the voice data on the device to be transmitted at a later time. Transcribing the voice data into a text file may be accomplished by automated computer software, either speaker-independent or speaker-dependent or by a human who transcribes the voice data into a text file. After transcribing the voice data into a text file, the text file may be delivered to a text communication device in a number of ways, such as email, file transfer protocol (FTP), or hypertext transfer protocol (HTTP).
Owner:T MOBILE INNOVATIONS LLC

Test and evaluation community network (TECNET)

Test and Evaluation Community Network (TECNET) is a set of software and safeguards that operates on a standard UNIX based computer to provide the following capabilities in a secure fashion via the World Wide Web operating over the Internet: Simple Mail Transfer Protocol (SMTP), Multimedia Internet Mail Extension (MIME) compliant electronic mail with many user features. Reflector configured bulletin board capabilities as a logical extension of the above electronic mail system for group sharing. Hierarchical file repositories allowing binary upload, copying, and download for Internet store and forward capability. Protected File Transfer Protocol (FTP) areas supplant the above file repository capability.
Owner:THE UNITED STATES OF AMERICA AS REPRESETNED BY THE SEC OF THE AIR FORCE +1

E-mail firewall

An e-mail firewall (105) applies policies to e-mail messages (204) between a first site and a plurality of second sites in accordance with a plurality of administrator selectable policies (216). The firewall comprises a simple mail transfer protocol (SMTP) relay (202) for causing the e-mail messages (204) to be transmitted between the first site and selected ones of the second sites. A plurality of policy managers (216) enforce-administrator selectable policies. The policies, such as encryption and decryption policies, comprise at least a first source / destination policy (218), at least a first content policy (202) and at least a first virus policy (224). The policies are characterized by a plurality of administrator selectable criteria (310), a plurality of administrator selectable exceptions (312) to the criteria and a plurality of administrator selectable actions (314, 316, 322) associated with the criteria and exceptions. The policy managers comprise an access manager (218) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the source / destination policy (218). The policy managers (216) further comprise a content manager (220) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the content policy (220), and a virus manager (224) for restriction transmission of e-mail messages (204) between the first site and the second sites in accordance with the virus policy (224).
Owner:AXWAY

IOS (internetwork operating system) based visualization voice mailbox communication method and system

The invention relates to an IOS (internetwork operating system) based visualization voice mailbox communication method and system. The method includes: encapsulating a voice message given to a called party by a calling party into a voice mail through an IVR (interactive voice response) telephone access module and transferring the voice mail to an IMAP (internet mail access protocol) mail server by adopting an SMTP (simple mail transfer protocol) so as to allow the IMAP mail server to have the voice mailbox stored; when a new voice mail available to the called party is detected, a message delivery management module sends a SMS (short messaging service) message and an MWI (message waiting indication) message to the called party by adopting an SMS mode so as to enable the called party to be connected to the IMAP mail server through a voice mail access message in the MWI message and download the corresponding voice mail from the IMAP mail server, wherein the called party refers to a mobile terminal based on the IOS system. Under the condition that the method and the system conforms to related provisions of the Apple Inc and through reasonable and effective means of a technology, voice mailbox service can also be used in a China telecom operator network.
Owner:广州市讯飞樽鸿信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products