A distribution list is a list of members to whom an electronic mail message (EMM) delivered to the distribution list is passed on to. A distribution list allows a user to efficiently send an EMM to a list of addresses. An EMM may include, for example, an email, an instant message (IM), a short message service (SMS) message, multimedia content, hyperlinks to remote content, a meeting request, a task, or an appointment. In operation, the user prepares a single EMM, addresses it to the distribution list, and sends it. When the EMM is delivered to the distribution list, the EMM is forwarded to the addresses in the distribution list. The owners corresponding to the addresses in a distribution list typically share a common trait such as a political interest, a common business purpose, or a common set of friends. In a business setting, distribution lists are typically created for an entire company, each department of the company, each project group, and joint development projects including employees inside of the company and partners outside of the company.
Distribution lists are categorized as external or internal based on whether the addresses in the list are inside or outside of an enterprise associated with the list. An enterprise may be any computer networking structure such as a domain, collection of domains, or other organization. An example of an enterprise is the computer network of a company. Internal addresses are addresses inside of the enterprise associated with the distribution list, and external addresses are addresses outside of the enterprise associated with the distribution list. An internal distribution list has only internal addresses. An external list has at least one external address and may include any number of internal and external addresses. Some embodiments of an enterprise may store an authoritative list of domains in the enterprise and/or a global address list (GAL). To determine whether an address is internal or external to the enterprise, the enterprise may compare the address to the authoritative list of domains and/or the GAL. For example, the domain of an internal address would be found in the authoritative list of domains, and the complete address would be found in the GAL.
Distribution lists are also categorized as open or closed based on the availability of the distribution list to senders outside of an enterprise (i.e., owners of addresses external to the enterprise) associated with the distribution list. An open distribution list is available to senders outside of the enterprise (e.g., addresses outside of the company can send EMM to the distribution list). A closed distribution list is a distribution list that is denied to senders outside of the enterprise (e.g., addresses outside of the company cannot send EMM to the distribution list). In existing EMM systems, internal distribution lists are typically closed, and external distribution lists are typically open.
Open distribution lists can be used to distribute unwanted EMM (i.e., spam) because anyone on the Internet can send EMM to the list. In existing EMM systems, some external distribution lists are closed to reduce spamming, but this means that owners of external addresses on the distribution list cannot send EMM to the distribution list.
Some existing EMM systems use access control lists to limit access to distribution lists. An access control list is a list associated with a file, such as a distribution list, that contains information about which users or groups have permission to access or modify the file. Access control lists are generated and modified by system administrators to control user access to network resources, such as servers, directories, and files. Users other than administrators do not typically have permission to modify access control lists and even if they did have such permission, most users are not able to manipulate an access control list to achieve the desired results (e.g., changing which owners of addresses in a distribution list are allowed to send EMM to the distribution list or modify the access control list).
Embodiments of the present invention allow users and administrators to limit which external users can send EMM to an otherwise open external distribution list. In particular, embodiments of the invention include systems and methods for processing EMM received at a server of an enterprise from a sending address outside of the enterprise addressed to a distribution list of the enterprise. The enterprise stores a plurality of safe sender lists, each corresponding to an external distribution list of the enterprise, wherein each safe sender list identifies external addresses authorized to send EMM to its corresponding external distribution list. The server receives the EMM, and determines whether the addressed distribution is internal or external. If the distribution list is internal (i.e., has only internal addresses), then the EMM is blocked from being delivered to the distribution list. In some embodiments, if the distribution list is external (i.e., has at least one external address) and the sending address is on a safe sender list corresponding to the addressed distribution list, then the EMM is delivered to the distribution list.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Other features will be in part apparent and in part pointed out hereinafter.
Corresponding reference characters indicate corresponding parts throughout the drawings.
In one embodiment, the invention includes a system for processing an EMM received at an enterprise. In particular, the invention includes a system for processing an EMM addressed to a particular distribution list of the enterprise from a sending address outside of the enterprise wherein the particular distribution list is one of a plurality of distribution lists of the enterprise including internal distribution lists having only internal addresses and external distribution lists having internal and external addresses. The system blocks the EMM if the particular distribution list does not have external addresses. The system delivers the EMM to the distribution list without filtering the EMM based on content if the sending address is on a safe sender list corresponding to the particular distribution list.
Referring to
A synchronization utility 110 copies the user created (or modified) distribution list 106 and corresponding safe sender list 108 to servers (e.g. mailbox database server 112 and edge server 114) of the enterprise 116. The enterprise 116 may contain any number of edge servers, mailbox database servers, administrators, user computers, and users, as well as other computer network components, and the enterprise 116 may be composed of any number of domains. The synchronization utility 110 may or may not update information on the mailbox database server 112 and edge server 114 in real time as a user 102 or administrator 126 modifies the distribution and safe sender lists. Alternatively, the user 102 or administrator 126 may create the distribution list and its corresponding safe sender list on the edge server 114 directly such that synchronization is not necessary.
If the synchronization utility 110 does not operate in real time, then a corresponding distribution list 118 and safe sender list 120 on the mailbox database server 112, and a corresponding distribution list 122 and safe sender list 124 on the edge server 114 may not be exact copies of the distribution list 106 and safe sender list 108 on the user computer 104 at all times. In one embodiment, the synchronization utility 110 updates the mailbox database server 112 and the edge server 114 on a daily basis. In other embodiments, the synchronization utility 110 updates the servers more frequently including in real time. In still other embodiments, the mailbox database server 112 is updated in real time, but the synchronization utility 110 updates the edge server 114 on a periodic basis. In one embodiment of the invention, one server performs all of the functions of both the edge server 114 and the mailbox database server 112, such that the system 100 consists of only user computers, such as user computer 104, and a server.
In one embodiment of the invention, only the user 102 who created the distribution list 106 and safe sender list 108 is authorized to modify the lists. The system 100 prevents unauthorized individuals from making any changes. In another embodiment of the invention, the user 102 who created the lists and the administrator 126 are authorized to modify the lists. In still another embodiment, the user 102, the administrator 126, and the other owners of addresses in the distribution list 106 are authorized to make changes to the lists.
The system 100 of
In operation of the system 100, a sender outside of the enterprise 116 sends an EMM 128 addressed to the distribution list 106. The edge server 114 receives the EMM 128. The edge server 114 may optionally authenticate the address of the sender (i.e., sending address) via authentication methods known in the art (e.g., senderID and certificates). A set of instructions 130 executed by the edge server 114 determine whether the edge server's local copy of the distribution list 122 includes any external addresses. If the distribution list 122 does not include any external addresses, then the edge server 114 blocks delivery of the EMM 128 to the distribution list 118. The edge server 114 may generate an error message and return it to the sending address, a server associated with the sending address may be instructed by the edge server 114 to generate an error message and provide it to the sending address, or the edge server 114 may take no action such that no status message is providing to the sending address. The administrator 126 of the system 100 may be notified of the blocked EMM 128 so that the administrator 126 can determine whether a denial of service attack or other EMM related malicious behavior is occurring.
If the EMM 128 is not blocked, then the instructions 130 determine whether the sender (i.e., sending address) is authorized to send EMM to the distribution list 106 by searching for the sending address in the copy of the safe sender list 124 on the edge server 114. If the sending address is on the safe sender list 124, then the EMM 128 is delivered to the distribution list 118 without being filtered based on content by a content filter 132 on the mailbox database server 112. If the sending address is not on the safe sender list 124, then the EMM 128 is blocked from being delivered to the distribution list 118. Optionally, instead of immediately blocking the EMM 128 from a sending address not on the safe sender list 124, the EMM 128 may be processed by the content filter 132. The content filter 132 examines the contents of the EMM 128, and the EMM 128 is either blocked from the distribution list 118 or delivered to the distribution list 118 based on the examined contents and the rules of the content filter 132. The rules of the content filter 132 are set by the administrator 126 based on the needs of the organization. The rules may be designed to only reduce spam, or to prevent material inappropriate in the context of the particular enterprise 116 from reaching users in the enterprise 116.
In another embodiment of the invention, the edge server 114 determines whether the distribution list 122 includes external addresses and either blocks the EMM 128 if the distribution list 122 does not have any external addresses, or forwards the EMM to the mailbox database server 112 if the distribution list 122 has an external address. The mailbox database server 112 searches the safe sender list 120 for the sending address and delivers the EMM 128 if the sending address is on the safe sender list 120. If the sending address is not on the safe sender list 120, then the EMM 128 is either blocked by the mailbox database server 112 or filtered based on content by the content filter 132. This configuration frees resources on the edge server 114 such that the system 100 is less susceptible to denial of service attacks.
If the EMM 128 is delivered to the distribution list 118, then it is sent to all of the addresses on the distribution list 118 whether they are internal or external to the enterprise 116.
Referring next to
If the sending address is authenticated at 206 or no authentication is undertaken, then at 208 the server determines whether the distribution list includes any external addresses (i.e., is an external distribution list). In one embodiment, the server may determine whether the distribution list is external by comparing the addresses in the distribution list to an authoritative domain list of the enterprise or a global authoritative list of the enterprise, or by checking a field of the distribution list. If the distribution list does not have any external addresses, then at 210 the EMM is blocked from being delivered to the distribution list. If the distribution list is an external distribution list, then at 212 the server determines whether the sending address is on the safe sender list corresponding to the distribution list. If the sending address is on the safe sender list, then at 214 the EMM is delivered to addresses of the distribution list. If the sending address is not on the safe sender list, then the EMM is either blocked from being delivered to the distribution list at 210 or examined for content at 216. Based on the content of the EMM and predetermined rules applied to the content to determine whether the content is approved to be delivered or not, it may be delivered to the distribution list at 214 or blocked at 210.
When an EMM is blocked at 210, an administrator associated with the enterprise may be notified of the blocked EMM. Additionally, the server of the enterprise may generate and send a status message to the sending address, the server may generate and send a notification to a server associated with the sending address so that the server associated with the sending address generates a status message and provides it to the sending address, or the server of the enterprise may take no action so that no status message is provided to the sending address.
In operation, a computer executes the computer-executable instructions 130 such as those illustrated in the figures to implement aspects of the invention.
As discussed above, embodiments of the invention include methods for creating and maintaining a plurality of safe sender lists, each corresponding to an external distribution list of an enterprise. In one embodiment, a computer receives a distribution list in response to an event such as a user creating the distribution list or a user sending an EMM to the distribution list. The computer compares the addresses in the received distribution list to an address list of the enterprise (e.g. an authoritative domain list or a GAL) to identify any external addresses in the distribution list. The computer copies the identified external addresses to a safe sender list corresponding to the received distribution list. The computer creates a safe sender list corresponding to the distribution list if it does not already exist.
The computer may modify a distribution list or safe sender list in response to input received from a user. The user input may be in the form of an EMM sent to the distribution list by a user or generated by an interface for modifying the lists. Additionally, permission to alter the distribution list and/or corresponding safe sender list may be limited to the user that created the distribution list, or any owner of an address on the lists may have such permission.
The order of execution or performance of the operations in embodiments of the invention illustrated and described herein is not essential, unless otherwise specified. That is, the operations may be performed in any order, unless otherwise specified, and embodiments of the invention may include additional or fewer operations than those disclosed herein. For example, it is contemplated that executing or performing a particular operation before, contemporaneously with, or after another operation is within the scope of aspects of the invention.
Embodiments of the invention may be implemented with computer-executable instructions. The computer-executable instructions may be organized into one or more computer-executable components or modules. Aspects of the invention may be implemented with any number and organization of such components or modules. For example, aspects of the invention are not limited to the specific computer-executable instructions or the specific components or modules illustrated in the figures and described herein. Other embodiments of the invention may include different computer-executable instructions or components having more or less functionality than illustrated and described herein.
When introducing elements of aspects of the invention or the embodiments thereof, the articles “a,” “an,” “the,” and “said” are intended to mean that there are one or more of the elements. The terms “comprising,” “including,” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements.
Having described aspects of the invention in detail, it will be apparent that modifications and variations are possible without departing from the scope of aspects of the invention as defined in the appended claims. As various changes could be made in the above constructions, products, and methods without departing from the scope of aspects of the invention, it is intended that all matter contained in the above description and shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense.
Number | Name | Date | Kind |
---|---|---|---|
5872930 | Masters et al. | Feb 1999 | A |
6052709 | Paul | Apr 2000 | A |
6073142 | Geiger et al. | Jun 2000 | A |
6163809 | Buckley | Dec 2000 | A |
6167434 | Pang | Dec 2000 | A |
6208720 | Curtis et al. | Mar 2001 | B1 |
6393464 | Dieterman | May 2002 | B1 |
6421709 | McCormich et al. | Jul 2002 | B1 |
6480885 | Olivier | Nov 2002 | B1 |
6542075 | Barker et al. | Apr 2003 | B2 |
6553425 | Shah et al. | Apr 2003 | B1 |
6636965 | Beyda et al. | Oct 2003 | B1 |
6678828 | Pham et al. | Jan 2004 | B1 |
6691156 | Drummond et al. | Feb 2004 | B1 |
6704772 | Ahmed et al. | Mar 2004 | B1 |
6751657 | Zothner | Jun 2004 | B1 |
6760420 | Heilmann et al. | Jul 2004 | B2 |
6779021 | Bates et al. | Aug 2004 | B1 |
6816884 | Summers | Nov 2004 | B1 |
6868498 | Katsikas | Mar 2005 | B1 |
6931532 | Davis et al. | Aug 2005 | B1 |
6941459 | Hind et al. | Sep 2005 | B1 |
6961849 | Davis et al. | Nov 2005 | B1 |
6978367 | Hind et al. | Dec 2005 | B1 |
7007067 | Azvine et al. | Feb 2006 | B1 |
7027463 | Mathew et al. | Apr 2006 | B2 |
7181017 | Nagel et al. | Feb 2007 | B1 |
7206814 | Kirsch | Apr 2007 | B2 |
7249162 | Rounthwaite et al. | Jul 2007 | B2 |
7249175 | Donaldson | Jul 2007 | B1 |
7299261 | Oliver et al. | Nov 2007 | B1 |
7340438 | Nordman et al. | Mar 2008 | B2 |
7395314 | Smith et al. | Jul 2008 | B2 |
7454195 | Lewis et al. | Nov 2008 | B2 |
7516182 | Goldman | Apr 2009 | B2 |
7522908 | Hrastar | Apr 2009 | B2 |
7546348 | Wilson et al. | Jun 2009 | B2 |
7571220 | Ng | Aug 2009 | B1 |
7613776 | Ben-Yoseph | Nov 2009 | B1 |
7756930 | Brahms et al. | Jul 2010 | B2 |
20010032245 | Fodor | Oct 2001 | A1 |
20020023135 | Shuster | Feb 2002 | A1 |
20020048369 | Ginter et al. | Apr 2002 | A1 |
20020087646 | Hickey et al. | Jul 2002 | A1 |
20020120711 | Bantz et al. | Aug 2002 | A1 |
20030009385 | Tucciarone et al. | Jan 2003 | A1 |
20030149888 | Yadav | Aug 2003 | A1 |
20030182379 | Henry | Sep 2003 | A1 |
20030187937 | Yao et al. | Oct 2003 | A1 |
20030196116 | Troutman | Oct 2003 | A1 |
20030212680 | Bates et al. | Nov 2003 | A1 |
20030233418 | Goldman | Dec 2003 | A1 |
20040006747 | Tyler | Jan 2004 | A1 |
20040039786 | Horvitz et al. | Feb 2004 | A1 |
20040083269 | Cummins | Apr 2004 | A1 |
20040148359 | Ahmed et al. | Jul 2004 | A1 |
20040260778 | Banister et al. | Dec 2004 | A1 |
20050015456 | Martinson, Jr. | Jan 2005 | A1 |
20050033810 | Malcolm | Feb 2005 | A1 |
20050055410 | Landsman et al. | Mar 2005 | A1 |
20050080642 | Daniell | Apr 2005 | A1 |
20050080855 | Murray | Apr 2005 | A1 |
20050083915 | Mathew et al. | Apr 2005 | A1 |
20050091320 | Kirsch et al. | Apr 2005 | A1 |
20050091323 | Smith et al. | Apr 2005 | A1 |
20050114453 | Hardt | May 2005 | A1 |
20050198159 | Kirsch | Sep 2005 | A1 |
20050198579 | Perepa et al. | Sep 2005 | A1 |
20050251675 | Marcjan et al. | Nov 2005 | A1 |
20050256931 | Follmeg et al. | Nov 2005 | A1 |
20050278620 | Baldwin et al. | Dec 2005 | A1 |
20060036701 | Bulfer et al. | Feb 2006 | A1 |
20060168059 | Chang et al. | Jul 2006 | A1 |
20060253597 | Mujica | Nov 2006 | A1 |
20070067394 | Adams et al. | Mar 2007 | A1 |
20070100701 | Bocoon-Gibod et al. | May 2007 | A1 |
20070177731 | Spies et al. | Aug 2007 | A1 |
20080060080 | Lim | Mar 2008 | A1 |
20080126951 | Sood et al. | May 2008 | A1 |
20080222127 | Bergin | Sep 2008 | A1 |
Number | Date | Country |
---|---|---|
1143665 | Oct 2001 | EP |
Number | Date | Country | |
---|---|---|---|
20080034042 A1 | Feb 2008 | US |