The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 04, 2015

Filed:

Jan. 29, 2010
Applicants:

Malcolm H Davis, Kirkland, WA (US);

Aravind K Ramachandran, Redmond, WA (US);

Geoffrey J Hulten, Lynnwood, WA (US);

Ivan Osipkov, Bellevue, WA (US);

Milenko Drinic, Bellevue, WA (US);

Eliot C. Gillum, Mountain View, CA (US);

Krishna C. Vitaldevara, Fremont, CA (US);

Jason D. Walter, San Jose, CA (US);

Mehrdad Bidgoli, San Francisco, CA (US);

Robert L. Mccann, Fall City, WA (US);

Inventors:

Malcolm H Davis, Kirkland, WA (US);

Aravind K Ramachandran, Redmond, WA (US);

Geoffrey J Hulten, Lynnwood, WA (US);

Ivan Osipkov, Bellevue, WA (US);

Milenko Drinic, Bellevue, WA (US);

Eliot C. Gillum, Mountain View, CA (US);

Krishna C. Vitaldevara, Fremont, CA (US);

Jason D. Walter, San Jose, CA (US);

Mehrdad Bidgoli, San Francisco, CA (US);

Robert L. McCann, Fall City, WA (US);

Assignee:
Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); G06F 15/16 (2006.01); H04L 29/06 (2006.01); G06F 15/173 (2006.01); G06F 21/00 (2013.01);
U.S. Cl.
CPC ...
G06F 15/16 (2013.01); G06F 15/173 (2013.01); G06F 21/00 (2013.01); H04L 63/0236 (2013.01); H04L 63/1425 (2013.01);
Abstract

The filtering of activities generated by nodes of a network while interacting with a device may be performed by evaluating the desirability of the activities (e.g., a spam or not-spam determination of email messages sent by the node) and assigning a trust rating to the node. However, nodes are often identified by network address, and an operator of a node sending undesirable activities may reassign the network address of the node in order to avoid heavy filtering. Instead, nodes may be identified as being controlled by a network entity (e.g., an autonomous system identified in a border gateway protocol routing table.) The network entity is assigned a network entity trust rating based on the trust ratings of the nodes controlled thereby, and an appropriate level of activity filtering based on the network entity trust rating may be selected for subsequent activities received from all nodes controlled by the network entity.


Find Patent Forward Citations

Loading…