Activity
-
Our milestones are your milestones. We’re excited to announce that for the first time, we’ve won the Microsoft Global Partner of the Year award!…
Our milestones are your milestones. We’re excited to announce that for the first time, we’ve won the Microsoft Global Partner of the Year award!…
Liked by Scott Chasin
-
We are sincerely honored to be the recipient of Microsoft's Global Partner of the Year award. I want to give a huge thank you to our outstanding…
We are sincerely honored to be the recipient of Microsoft's Global Partner of the Year award. I want to give a huge thank you to our outstanding…
Shared by Scott Chasin
Patents
-
Marking electronic messages to indicate human origination
Issued US 9,015,472
Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message is human originated are received. Then, the fact that the electronic message is human originated is conveyed to one or more recipients of the electronic message by associating with the electronic message a human origination indication.
-
Bounce management in a trusted communication network
Issued US 8,738,708
An embodiment of a method handles bounced messages in a private network processing hub that is configured to handle messages submitted by a plurality of member networks that are registered with the private network processing hub, and wherein the private network processing hub and the plurality of member networks form a private network. The method may include receiving a first message from a member network or from an unregistered network within the private network processing hub, and determining…
An embodiment of a method handles bounced messages in a private network processing hub that is configured to handle messages submitted by a plurality of member networks that are registered with the private network processing hub, and wherein the private network processing hub and the plurality of member networks form a private network. The method may include receiving a first message from a member network or from an unregistered network within the private network processing hub, and determining whether the first message is a bounced message generated in response to an original message sent by the private network processing hub by searching the first message for a tracking identifier that was generated by the private network processing hub and inserted into the original message. The determining operation may include searching for the tracking identifier among a plurality of stored tracking identifiers.
-
Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse
Issued US 8,484,295
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow…
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts.
-
Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
Issued US 7,680,890
Systems and methods for classifying e-mail messages as spam by combining outputs of a plurality of spam classifiers or classification tools using a fuzzy logic voting algorithm or formula are provided. According to one embodiment, a first classification value associated with an e-mail message and a second classification value associated with the e-mail message are received. The first classification value and the second classification value being indicative of whether the e-mail message is spam.…
Systems and methods for classifying e-mail messages as spam by combining outputs of a plurality of spam classifiers or classification tools using a fuzzy logic voting algorithm or formula are provided. According to one embodiment, a first classification value associated with an e-mail message and a second classification value associated with the e-mail message are received. The first classification value and the second classification value being indicative of whether the e-mail message is spam. Then, a single, aggregated classification value for the e-mail message is generated by combining the first classification value and the second classification value using a fuzzy logic-based voting mechanism.
-
Stopping and remediating outbound messaging abuse
Issued US 7,953,814
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow…
Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.
-
Electronic message forwarding system
Issued US 5,937,161
A telecommunications system (100) includes a service provider node (116) that is capable of forwarding electronic mail messages addressed to a user of the service provider node. The forwarding process is controlled by a message transfer agent (202), a subscriber database analyzer (204), a queue directory (206), and a message queue agent (208). The subscriber database analyzer performs a comparison between data that the user has provided and the message content. The subscriber database causes…
A telecommunications system (100) includes a service provider node (116) that is capable of forwarding electronic mail messages addressed to a user of the service provider node. The forwarding process is controlled by a message transfer agent (202), a subscriber database analyzer (204), a queue directory (206), and a message queue agent (208). The subscriber database analyzer performs a comparison between data that the user has provided and the message content. The subscriber database causes the message queue agent to forward the message to a user-defined telecommunications address based upon the message content and the results of the comparison.
More activity by Scott
-
Very happy to share I have provisionally passed the CISSP!
Very happy to share I have provisionally passed the CISSP!
Liked by Scott Chasin
-
If you spend your time chasing butterflies, they’ll fly away. But if you spend time making a beautiful garden, the butterflies will come. I was…
If you spend your time chasing butterflies, they’ll fly away. But if you spend time making a beautiful garden, the butterflies will come. I was…
Liked by Scott Chasin
-
We love the numbers here at Pax8. Here is one for you: 20 Why 20? - Over 1,500 MSPs joined us for our Sophomore album of #Pax8Beyond... - 2,500+…
We love the numbers here at Pax8. Here is one for you: 20 Why 20? - Over 1,500 MSPs joined us for our Sophomore album of #Pax8Beyond... - 2,500+…
Liked by Scott Chasin
-
🚀 We stand on the verge of an unprecedented technological evolution with AI! 📣 This week, at the Pax8 Beyond 2024 event in Denver, there is no…
🚀 We stand on the verge of an unprecedented technological evolution with AI! 📣 This week, at the Pax8 Beyond 2024 event in Denver, there is no…
Liked by Scott Chasin
-
We were delighted to win the MVP Productivity EMEA award at Pax8 Beyond 2024 in Denver last Friday. The Pax8 awards program recognises partners who…
We were delighted to win the MVP Productivity EMEA award at Pax8 Beyond 2024 in Denver last Friday. The Pax8 awards program recognises partners who…
Liked by Scott Chasin
-
HUGE NEWS: We are now officially LIVE! 🎉 Experience the Pax8 Marketplace and redefine how you manage your business with powerful tools to capitalise…
HUGE NEWS: We are now officially LIVE! 🎉 Experience the Pax8 Marketplace and redefine how you manage your business with powerful tools to capitalise…
Liked by Scott Chasin
-
I’m excited that Pax8 is organizing this year’s must-attend event for MSPs. Here’s why! This June we took partners from EMEA to #Pax8Beyond in…
I’m excited that Pax8 is organizing this year’s must-attend event for MSPs. Here’s why! This June we took partners from EMEA to #Pax8Beyond in…
Liked by Scott Chasin
-
Congratulations Scott Chasin, Nick Heddy, John Street, and the entire Pax8 team on delivering an exceptional “Beyond”event! Witnessing firsthand the…
Congratulations Scott Chasin, Nick Heddy, John Street, and the entire Pax8 team on delivering an exceptional “Beyond”event! Witnessing firsthand the…
Liked by Scott Chasin
-
Congrats to everyone that worked to make #Pax8Beyond such a rousing success! A big personal shout out to my teams for their contributions to this…
Congrats to everyone that worked to make #Pax8Beyond such a rousing success! A big personal shout out to my teams for their contributions to this…
Liked by Scott Chasin
-
#Pax8Beyond 2024 was inspiring, empowering, and agenda-packed. Here are the formal video recaps: https://lnkd.in/gqjwckFK and…
#Pax8Beyond 2024 was inspiring, empowering, and agenda-packed. Here are the formal video recaps: https://lnkd.in/gqjwckFK and…
Liked by Scott Chasin
-
I'm still amazed by the incredible event Beyond 24 that took place this week. It was a fantastic opportunity to learn from you, network within our…
I'm still amazed by the incredible event Beyond 24 that took place this week. It was a fantastic opportunity to learn from you, network within our…
Liked by Scott Chasin
-
As I'm getting caught up from a couple days at #pax8beyond in Denver, I am thinking about my key takeaways 1. This really felt like an old school…
As I'm getting caught up from a couple days at #pax8beyond in Denver, I am thinking about my key takeaways 1. This really felt like an old school…
Liked by Scott Chasin
-
At Pax8, we strive to provide our partners with valuable, actionable content and connections at our Pax8 Beyond conferences. This year, we also…
At Pax8, we strive to provide our partners with valuable, actionable content and connections at our Pax8 Beyond conferences. This year, we also…
Liked by Scott Chasin
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Scott Chasin
3 others named Scott Chasin are on LinkedIn
See others named Scott Chasin