Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
IDENTIFYING USER BEHAVIOR IN A DISTRIBUTED COMPUTING SYSTEM
Document Type and Number:
WIPO Patent Application WO/2017/146959
Kind Code:
A1
Abstract:
A list of electronic mail (e-mail) accounts is extracted from an electronic mail system. A list of electronic mail accounts, with forwarding enabled, are identified as a set of collection accounts. A dropbox account is identified, from the collection accounts, as a destination e-mail account for the forwarded collection accounts. The collection accounts that forward to the dropbox account that has in excess of a threshold number of collection accounts forwarding to it, are identified as malicious e-mail collection accounts and are forwarded to a resolution system, for resolution.

Inventors:
MOREAU-COOK AARON J (US)
TRIM SAMUEL TERRENCE (US)
XU YUXIANG (US)
JOHN ABY (US)
Application Number:
PCT/US2017/018019
Publication Date:
August 31, 2017
Filing Date:
February 16, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
MICROSOFT TECHNOLOGY LICENSING LLC (US)
International Classes:
G06Q10/10; H04L12/58
Other References:
TIM MCMICHAEL: "Office 365: Determine accounts that have forwarding enabled.", TECHNET, 19 April 2015 (2015-04-19), XP055367126, Retrieved from the Internet [retrieved on 20170425]
ANONYMOUS: "Quick Tip Mapping mailboxes to forwarding contacts - www.telnetport25.com", 26 September 2015 (2015-09-26), XP055367131, Retrieved from the Internet [retrieved on 20170425]
Attorney, Agent or Firm:
MINHAS, Sandip et al. (US)
Download PDF:
Claims:
CLAIMS

1. A computing system, comprising:

dropbox account identification logic that obtains electronic mail (e-mail) data

indicative of a set of forwarding e-mail accounts, that are configured to forward messages to another e-mail account and identifies a dropbox e-mail account as an account that is a destination of forwarded messages from a threshold number of the forwarding e-mail accounts;

malicious collection account identifying logic that is configured to identify

malicious collection e-mail accounts, based on the e-mail data identifying a subset of the forwarding e-mail accounts that forward messages to the identified dropbox e-mail account, and generate a malicious collection account identifier identifying the malicious collection e-mail accounts; and a resolution system that receives the malicious collection account identifier and performs a resolution action to resolve the malicious collection e-mail accounts based on the malicious collection account identifier.

2. The computing system of claim 1 and further comprising:

collection account identifying logic that accesses the e-mail data in a user account data store and identifies the set of forwarding e-mail accounts, as a set of collection accounts, based on the accessed data.

3. The computing system of claim 2 wherein the collection account identifying logic accesses forwarding status information associated with e-mail accounts identified in the e- mail data to identify the set of forwarding e-mail accounts.

4. The computing system of claim 2 and further comprising:

boundary identifying logic that is configured to identify a boundary in the user account data store that stores the e-mail data, the boundary delineating e- mail data in the user account data store that is accessed by the collection account identifying logic in identifying the set of collection accounts.

5. The computing system of claim 3 and further comprising:

threshold setting logic that is configured to identify a dropbox forwarding account threshold indicative of the threshold number of forwarding e-mail accounts.

6. The computing system of claim 5 wherein the threshold setting logic is configured to identify the dropbox forwarding account threshold based on a ratio of a number of e- mail accounts in the set of forwarding e-mail accounts to a number of dropbox e-mail accounts identified in the boundary.

7. The computing system of claim 6 wherein the threshold setting logic is configured to identify the dropbox forwarding account threshold based on a ratio of a total number of e-mail accounts in the boundary to a total number of forwarding e-mail accounts in the boundary.

8. The computing system of claim 7 wherein the threshold setting logic is configured to identify the dropbox forwarding account threshold based on a threshold number of unique dropbox e-mail accounts identified in the boundary.

9. The computing system of claim 1 wherein the resolution system comprises:

an account suspension system that is configured to automatically suspend the malicious collection e-mail accounts.

10. The computing system of claim 1 wherein the resolution system comprises:

an e-mail filtering configuration system that is configured to automatically reconfigure filtering information corresponding to the malicious collection e- mail accounts to inhibit forwarding of messages from the malicious collection e-mail accounts.

11. The computing system of claim 1 wherein the resolution system comprises:

a forwarding status removal system that is configured to automatically remove forwarding status information corresponding to the malicious collection e- mail accounts to inhibit forwarding of messages from the malicious collection e-mail accounts.

12. A computer implemented method, comprising:

obtaining electronic mail (e-mail) data indicative of a set of forwarding e-mail accounts, that are configured to forward messages to another e-mail account;

identifying a dropbox e-mail account as an account that is a destination of

forwarded messages from a threshold number of the forwarding e-mail accounts;

identifying malicious collection e-mail accounts, based on the e-mail data

identifying a subset of the forwarding e-mail accounts that forward messages to the identified dropbox e-mail account;

generating a malicious collection account identifier identifying the malicious collection e-mail accounts; and

performing a resolution action to resolve the malicious collection e-mail accounts based on the malicious collection account identifier. The computer implemented method of claim 12 and further comprising:

accesses forwarding status information associated with e-mail accounts identified in the e-mail data the e-mail data in a user account data store; and identifying the set of forwarding e-mail accounts, as a set of collection accounts, based on the accessed data.

The computer implemented method of claim 13 and further comprising:

identifying a boundary in the user account data store that stores the e-mail data, the boundary delineating e-mail data in the user account data store that is accessed in identifying the set of collection accounts.

A computing system, comprising:

collection account identifying logic that accesses electronic mail (e-mail) data in a user account data store and identifies a set of forwarding e-mail accounts, that are configured to forward messages to another e-mail account, as a set of collection accounts, based on the accessed data and generates a collection account identifier output indicative of the set of collection accounts;

dropbox account identification logic that obtains the collection account identifier and identifies a dropbox e-mail account as an account that is a destination of forwarded messages from a threshold number of the forwarding e-mail accounts in the set of collection accounts;

malicious collection account identifying logic that is configured to identify

malicious collection e-mail accounts, based on the e-mail data identifying a subset of the forwarding e-mail accounts that forward messages to the identified dropbox e-mail account, and generate a malicious collection account identifier identifying the malicious collection e-mail accounts; and a resolution system that receives the malicious collection account identifier and performs a resolution action to resolve the malicious collection e-mail accounts based on the malicious collection account identifier.

Description:
IDENTIFYING USER BEHAVIOR IN A DISTRIBUTED COMPUTING SYSTEM

BACKGROUND

[0001] Computer systems are currently in wide use. Some computer systems provide on-line web services to a plurality of different users.

[0002] One example of such a computing system is an electronic mail system. Electronic mail (e-mail) systems often allow users to create electronic mail accounts by entering user-specific data, or other data, and to set various properties or functional characteristics of the account. By way of example, when a user sets up an e-mail account, the user may be provided with the ability to not only use the e-mail account for sending and receiving messages, but also to set various filtering and forwarding options. The filtering options may allow the user to set filter settings so that messages can be processed differently, depending on whether they meet filter criteria in the filter settings. For instance, the user may be able to set up an e-mail account and then set a forwarding option so that the newly- created e-mail account will forward all messages (or filtered messages, which are messages that pass any filter settings the user has set) to a second e-mail account.

[0003] There can be some incentives to use such a system maliciously. For instance, some networks (such as social networks) may require a user to have a unique e-mail account in order to set up a social network account. However, there may be incentives for a user to have multiple different social network accounts. Therefore, there may be an incentive for a single user to create multiple different e-mail accounts so the user can have multiple different social network accounts. If the number of multiple different e-mail accounts is a relatively large number of accounts, it can be difficult for the user to manage those accounts. Therefore, there may also be incentive for the user to forward all of those multiple e-mail accounts to a single e-mail account. The multiple accounts that are forwarded to the single account are referred to herein as collection accounts. The destination account that receives the forwarded messages from the collection accounts is referred to herein as a dropbox account.

[0004] Recently, spammers and abusers have created millions of malicious collection accounts and forwarded them to a relatively small number of dropbox accounts. The creation of these malicious collection accounts and dropbox accounts impacts the electronic mail services provided by service providers. Just setting up the accounts utilizes server system resources. Also, the forwarded messages from the collection accounts to the dropbox accounts can number many millions of e-mails messages. This increases the latency in an e-mail service offered by the service provider. This can cause delays in delivering e-mails for millions of legitimate users.

[0005] The discussion above is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter.

SUMMARY

[0006] A list of electronic mail (e-mail) accounts is extracted from an electronic mail system. A list of electronic mail accounts, with forwarding enabled, are identified as a set of collection accounts. A dropbox account is identified, from the collection accounts, as a destination e-mail account for the forwarded collection accounts. The collection accounts that forward to the dropbox account that has in excess of a threshold number of collection accounts forwarding to it, are identified as malicious e-mail collection accounts and are forwarded to a resolution system, for resolution.

[0007] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.

BRIEF DESCRIPTION OF THE DRAWINGS

[0008] FIG. 1 is a block diagram illustrating one example of how collection accounts operate relative to dropbox accounts.

[0009] FIG. 2 is a block diagram of one example of a distributed computing system

(e.g., an electronic mail (e-mail) computing system) architecture.

[0010] FIG. 3 is a flow diagram illustrating one example of the operation of the architecture shown in FIG. 2.

[0011] FIG. 4 is a block diagram illustrating one example of the architecture shown in FIG. 2, deployed in a cloud computing architecture.

[0012] FIGS. 5-7 illustrate various mobile devices that can be used in the architectures shown in the previous figures.

[0013] FIG. 8 is a block diagram of one example of a computing system environment that can be used in the architectures shown in the previous figures.

DETAILED DESCRIPTION

[0014] FIG. 1 is a block diagram of one example of an electronic mail (e-mail) system configuration 100. Configuration 100 shows a plurality of e-mail accounts (referred to as collection accounts) 102, 104 and 106. Accounts 102-106 are illustratively e-mail accounts that are configured to forward to a single destination (or dropbox) e-mail account 108. The arrows 110, 112 and 114 indicate that the collection accounts 102-106 have their forwarding status set to forward e-mails that are received at e-mail accounts 102-106 (or those received emails that pass a user-defined filter set by the creator of the collection account) to dropbox account 108.

[0015] It will be noted that, in one example, the collection accounts 102-106 and dropbox account 108 are all associated with the same domain. However, the collection accounts 102-106 may be associated with one domain, while dropbox account 108 is associated a different domain. Similarly, it may be that the collection accounts 102-106 are associated with different domains as well.

[0016] It can be seen from FIG. 1 that, if a single user sets up a plurality of different collection accounts 102-106, all of which forward to a relatively small number of dropbox accounts 108, this can deleteriously affect the operation of the computational resources that are providing the e-mail services. It is not unprecedented for a relatively small set of users to set up millions of malicious collection accounts that all forward to a very small number of dropbox accounts. Thus, the number of forwarded messages, that are forwarded from malicious collection accounts, can be tens of millions.

[0017] FIG. 2 shows one example of a computing system architecture (e.g., an e-mail computing system architecture) 120. Architecture 120 includes e-mail computing system 122, malicious account processing system 124, and malicious account resolution system 126. The systems are illustratively connected to one another either directly, or over a network 128. It should also be noted that systems 124 and 126 can be combined, and they can also be combined with system 122. However, the three systems are shown separately, and connected to one another, for the sake of example only.

[0018] In the example shown in FIG. 2, e-mail computing system 122 is shown generating e-mail user interfaces 130 with user input mechanisms 132 for interaction by user 134. User 134 can illustratively interact with user input mechanisms 132 in order to control and manipulate e-mail computing system 122. This can include, for instance, setting up e-mail accounts on system 122, using the e-mail accounts to send and receive messages, and setting various operational properties corresponding to those accounts. For instance, it may include setting the forwarding status of an e-mail account to forward to another, destination account. FIG. 2 also shows that, in one example, user 134 directly accesses e-mail system 122. However, user 134 can also utilize a user system (or client system) to access e-mail system 122 either directly, or over network 128.

[0019] FIG. 2 also shows that, in one example, one or more users 142 that use malicious account processing system 124 and malicious account resolution system 126 can access those systems through malicious account processing/resolution user interfaces 140. Interfaces 140 can also have user input mechanisms that are accessed by user 142 in order to control and manipulate one or more systems 124 and 126.

[0020] Before describing the operation of architecture 120 in more detail, some of the items in the various systems will first be described. FIG. 2 shows that, in one example, e-mail computing system 122 includes user account data store 144, one or more servers or processors 146, a set of user interface logic 148, and other electronic mail system functionality 150. User account data store 144 illustratively stores user account e-mail information for users of system 122, such as e-mail addresses 152, e-mail account information 154, and it can store other items 156 as well. The e-mail account information can include forwarding status information 158 that indicates whether the particular e-mail account is to forward messages. It can also include a destination address 160 that identifies the particular e-mail address that the e-mail account is to forward messages to. It can of course include a wide variety of other e-mail account information 162 as well.

[0021] In the example shown in FIG. 2, malicious account processing system 124 illustratively includes one or more processors or servers 164, threshold setting logic 166, boundary identifying logic 168, collection account identifying logic 170, dropbox account identifying logic 172, malicious collection account identifying logic 174, user interface logic 176, and it can include other items 178. As a brief overview, threshold setting logic 166 allows a user 142 to set various thresholds used in identifying malicious collection accounts (or it can automatically set those thresholds). Boundary identification logic 168 allows the user to identify a boundary of various e-mails (such as a domain name) that will be processed together with one another (or it can automatically identify the boundary). Collection account identifying logic 170 identifies e-mail accounts in e-mail computing system 122 that are set to forward messages to other accounts (referred to herein as collection accounts). Dropbox identifying logic 172 identifies dropbox accounts that receive forwarded messages from collection accounts. It will be noted that not all collection accounts (e-mail accounts with forwarding set) are considered to be malicious. Therefore, malicious collection account identifying logic identifies which of the collection accounts identified by logic 170 are considered to be malicious. User interface logic 176 illustratively generates user interfaces and responds to user inputs.

[0022] Malicious account resolution system 126 illustratively includes one or more servers or processors 180, account suspension system 182, e-mail filtering configuration system 184, forwarding status removal system 186, user interface logic 188, and it can include a wide variety of other items 190. Again, by way of overview, account suspension system 182 can be used to automatically or manually suspend malicious collection accounts identified by logic 174. E-mail filtering configuration system 184 can be used to automatically or manually reconfigure the malicious collection accounts so that the e-mails that they are forwarding, are filtered out, or are never sent. Forwarding status removal system 186 can be used to automatically or manually remove the forwarding status of the malicious collection accounts identified by logic 174, so they do not forward messages. All of these are only examples of different types of resolution actions that can be taken to resolve issues related to malicious collection accounts. A wide variety of others can be used as well.

[0023] FIG. 3 is a flow diagram illustrating one example of the operation of architecture 120, shown in FIG. 2, in identifying and resolving malicious collection accounts. This can take a wide variety of different forms. In one example, boundary identifying logic 168 first identifies a boundary of interest for analysis. This is indicated by block 200. By way of example, the boundary of interest may be a domain name associated with a set of e-mail accounts, in data store 144. This is indicated by block 202. The boundary can be any other boundary that can be set to identify a set of e-mails (or e-mail data) from one or more user account data stores 144 that are to be analyzed for malicious accounts. This is indicated by block 204.

[0024] Threshold setting logic 168 can then initiate the setting of a set of malicious account identification thresholds. This is indicated by block 206 in FIG. 3. For instance, threshold setting logic 166 can analyze the e-mail accounts within the identified boundary, in order to set a plurality of different thresholds. The thresholds can be set manually or automatically (or a combination of manually and automatically) and are used in identifying malicious accounts.

[0025] The thresholds can take a wide variety of different forms. For instance, in one example, a static threshold (referred to herein as ST) is a static variable that identifies a bottom threshold for the number of unique e-mail dropboxes that are identified within the domain. This is indicated by block 208. In one example, this number is no lower than 1, but it may be set to a higher value as well, based on the particular application, customer needs, etc. [0026] Another threshold value may be an account differential (AE) threshold. This is a value indicative of the total number of e-mail accounts in the boundary (e.g., the domain), divided by the number of accounts that have forwarding enabled. This is indicated by block

210.

[0027] Another value that is used in setting the thresholds may be the forwarding e-mail accounts value (UE). This is the number of e-mail accounts that currently have e-mail forwarding enabled, with the boundary. This is indicated by block 212. It will be noted that the UE value is used in setting the account differential (AE) value 210.

[0028] Another value that can be used in setting the thresholds is the distinct e-mail dropboxes (DE) value. This is the number of distinct e-mail dropboxes where the user accounts are forwarding to. This is indicated by block 214.

[0029] Once the values 208, 210, 212 and 214 are obtained or calculated, they can be used in setting a dropbox forwarding account threshold (referred to herein as AAn). This is indicated by block 216. The AAn threshold can be calculated as follows:

UE

[0031] Where GR = ^

[0032] Of course, this is only one example of how the AAn threshold can be set. A variety of other values or other thresholds can be calculated or set as well, and this is indicated by block 218 in FIG. 3.

[0033] Malicious account processing system 124 then determines whether it is time to analyze the information in the boundary identified in e-mail computing system 122 to identify malicious accounts and perform malicious account resolution. This is indicated by block 220 in FIG. 3. In one example, the operation is run, substantially continuously. In another example, it is run intermittently, or when various processing criteria are met. For example, the response time of e-mail system 122 can be monitored, and when it falls below a given threshold metric value, the malicious account processing can be performed. These are only examples.

[0034] Once it is time to perform the processing, then malicious account processing system 124 accesses user account data store 144 through servers or processors 146 in e-mail computing system 122. It accesses the account information for the electronic mail accounts within the identified boundary (e.g., within the domain name identified at block 200 above). Accessing this information is indicated by block 222 in FIG. 3. Collection account identifying logic 170 then extracts a list of e-mail accounts for which the forwarding status 158 indicates that forwarding in enabled. This is indicated by block 224 in FIG. 3. This can be done by executing a query against the user e-mail data store 144 to identify the information. This is indicated by block 226. The results returned can include the e-mail address of the e-mail account that is forwarding e-mails, and the address of the destination e-mail account as well. This is indicated by block 228. Of course, the list can be extracted in other ways 230 as well.

[0035] Table 1 shows one example of a set of results that can be returned.

[0036] Of course, Table 1 is only one example of the information that might be returned. Others can be used as well.

[0037] Dropbox account identifying logic 172 then identifies the number of dropbox e-mail accounts identified in the extracted list. This is indicated by block 232. For instance, it may execute a query against the extracted list of e-mail accounts (which may be referred to as the inputDataSet) to identify how many accounts are associated with e-mail accounts (or dropboxes) that exceed the threshold AAn. Executing the query is indicated by block 234. Identifying destination e-mail accounts with more than AAn other accounts forwarding to them is indicated by block 236. The number of dropbox e-mail accounts can be identified in other ways 138 as well.

[0038] Table 2 shows one example of a code snippet which will identify the dropbox accounts.

TABLE 2

SELECT forwardingAddress,COUNT(*) AS count FROM inputDataSet GROUP BY forwardingAddress

HAVING COUNT(*) > AAn

ORDER BY count DESC

[0039] Again, of course, this is only one example. Other mechanisms can be used instead.

[0040] Once the identified dropbox e-mail accounts are identified, then the malicious collection account identifying logic 174 identifies which of the collection accounts are considered to be malicious collection accounts, from the accounts forwarding to the identified dropbox e-mail accounts. This is indicated by block 240 in FIG. 3. In one example, it executes a query against the list of dropbox e-mail accounts to identify all collection e-mail accounts that are forwarding to the dropbox e-mail accounts. Recall that the dropbox e-mail accounts have been defined as those that are receiving forwarded messages from a number of collection accounts that is greater than the threshold AAn. Assume, for the sake of example, that AAn is set to 50. The dropbox accounts would be identified as those e-mail accounts that are receiving forwarded messages from in excess of 50 other e-mail accounts. Malicious collection account identifying logic 174 thus identifies the collection e-mail accounts that are forwarding to dropbox accounts. This is indicated by block 242. The malicious collection accounts can be identified in other ways 244 as well.

[0041] Table 3 is one example of a code snippet that can be used to identify the malicious collection accounts, from the identified dropbox accounts.

TABLE 3

SELECT emailAddress FROM inputDataSet

WHERE forwardingAddress IN

(SELECT forwardingAddress

FROM inputDataSet

GROUP BY forwardingAddress

HAVING COUNT(*) > AAn)

[0042] Malicious collection account identifying logic 174 then outputs the identity of the malicious collection accounts to malicious account resolution system 126, that can resolve those accounts in a wide variety of different ways. This is indicated by block 246 in FIG. 3.

[0043] For example, an identifier identifying the malicious accounts can be sent to account suspension system 182, e-mail filtering system 184, forwarding status removal system 186, or other resolution system 110. [0044] The malicious accounts are then resolved, as indicated by block 248. Account suspension system 182 can receive the identity of a malicious e-mail account and automatically suspend it within e-mail computing system 122. This is indicated by block 250. E-mail filtering configuration system 184 can receive the identity of a malicious e- mail account and automatically set filtering for the forwarded messages from that account, so that they are not sent. This is indicated by block 252. Forwarding status removal system 186 can receive the identity of a malicious account, and change the forwarding status information 158 associated with that account, so that it no longer forwards its messages. This is indicated by block 254. The identity of the malicious e-mail accounts can also be surfaced or output in other ways for further analysis or processing by other systems. This is indicated by block 256. Resolution can be accomplished in still other ways as well, and this is indicated by block 258.

[0045] It will be noted that the system can also be applied iteratively. For instance, the value of threshold AAn can be changed and applied iteratively to the data in data store 144.

[0046] It can be seen that the processing described herein that identifies and resolves malicious e-mail accounts greatly enhances the security and reliability of the e-mail system itself. It also greatly reduces the latency of the operation of the e-mail system, because it can have a very beneficial effect on the overall network bandwidth used by the e-mail system in sending messages. It greatly enhances the ability to reduce abuses of the system and thus increases customer experience and trust in the system as well.

[0047] It should also be noted that, while the present discussion has proceeded with respect to malicious e-mail accounts, it could just as easily be applied in other contexts. For instance, it can be applied to a computing system where other accounts can be obtained and used by users such as distributed computing systems, where IP addresses are obtained and used and where that usage can be malicious. It can be used in a wide variety of other ways as well.

[0048] The present discussion has mentioned processors and servers. In one embodiment, the processors and servers include computer processors with associated memory and timing circuitry, not separately shown. They are functional parts of the systems or devices to which they belong and are activated by, and facilitate the functionality of the other components or items in those systems.

[0049] It will be noted that the above discussion has described a variety of different systems, components and/or logic. It will be appreciated that such systems, components and/or logic can be comprised of hardware items (such as processors and associated memory, or other processing components, some of which are described below) that perform the functions associated with those systems, components and/or logic. In addition, the systems, components and/or logic can be comprised of software that is loaded into a memory and is subsequently executed by a processor or server, or other computing component, as described below. The systems, components and/or logic can also be comprised of different combinations of hardware, software, firmware, etc., some examples of which are described below. These are only some examples of different structures that can be used to form the systems, components and/or logic described above. Other structures can be used as well.

[0050] The present description has also used the term "automatically" when referring to performing a corresponding step or function. In one example, this means that the corresponding step or function is performed without further user input, except perhaps to authorize or initiate the step or function.

[0051] Also, a number of user interface displays have been discussed. They can take a wide variety of different forms and can have a wide variety of different user actuatable input mechanisms disposed thereon. For instance, the user actuatable input mechanisms can be text boxes, check boxes, icons, links, drop-down menus, search boxes, etc. They can also be actuated in a wide variety of different ways. For instance, they can be actuated using a point and click device (such as a track ball or mouse). They can be actuated using hardware buttons, switches, a joystick or keyboard, thumb switches or thumb pads, etc. They can also be actuated using a virtual keyboard or other virtual actuators. In addition, where the screen on which they are displayed is a touch sensitive screen, they can be actuated using touch gestures. Also, where the device that displays them has speech recognition components, they can be actuated using speech commands.

[0052] A number of data stores have also been discussed. It will be noted they can each be broken into multiple data stores. All can be local to the systems accessing them, all can be remote, or some can be local while others are remote. All of these configurations are contemplated herein.

[0053] Also, the figures show a number of blocks with functionality ascribed to each block. It will be noted that fewer blocks can be used so the functionality is performed by fewer components. Also, more blocks can be used with the functionality distributed among more components.

[0054] FIG. 4 is a block diagram of architecture 120, shown in FIG. 2, except that its elements are disposed in a cloud computing architecture 500. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location or configuration of the system that delivers the services. In various embodiments, cloud computing delivers the services over a wide area network, such as the internet, using appropriate protocols. For instance, cloud computing providers deliver applications over a wide area network and they can be accessed through a web browser or any other computing component. Software or components of architecture 120 as well as the corresponding data, can be stored on servers at a remote location. The computing resources in a cloud computing environment can be consolidated at a remote data center location or they can be dispersed. Cloud computing infrastructures can deliver services through shared data centers, even though they appear as a single point of access for the user. Thus, the components and functions described herein can be provided from a service provider at a remote location using a cloud computing architecture. Alternatively, they can be provided from a conventional server, or they can be installed on client devices directly, or in other ways.

[0055] The description is intended to include both public cloud computing and private cloud computing. Cloud computing (both public and private) provides substantially seamless pooling of resources, as well as a reduced need to manage and configure underlying hardware infrastructure.

[0056] A public cloud is managed by a vendor and typically supports multiple consumers using the same infrastructure. Also, a public cloud, as opposed to a private cloud, can free up the end users from managing the hardware. A private cloud may be managed by the organization itself and the infrastructure is typically not shared with other organizations. The organization still maintains the hardware to some extent, such as installations and repairs, etc.

[0057] In the example shown in FIG. 4, some items are similar to those shown in FIG. 2 and they are similarly numbered. FIG. 4 specifically shows that e-mail system 122, malicious account processing system 124 and malicious account resolution system 126 can all be located in cloud 502 (which can be public, private, or a combination where portions are public while others are private). Therefore, users 134 and 142 can use user devices 504 and 506 to access those systems through cloud 502.

[0058] FIG. 4 also depicts another example of a cloud architecture. FIG. 4 shows that it is also contemplated that some elements of architecture 120 are disposed in cloud 502 while others are not. By way of example, data store 144 can be disposed outside of cloud 502, and accessed through cloud 502. In another example, either or both of systems 124 and 126 can be outside of cloud 502. Regardless of where they are located, they can be accessed directly by device 504, through a network (either a wide area network or a local area network), they can be hosted at a remote site by a service, or they can be provided as a service through a cloud or accessed by a connection service that resides in the cloud. All of these architectures are contemplated herein.

[0059] It will also be noted that architecture 120, or portions of it, can be disposed on a wide variety of different devices. Some of those devices include servers, desktop computers, laptop computers, tablet computers, or other mobile devices, such as palm top computers, cell phones, smart phones, multimedia players, personal digital assistants, etc.

[0060] FIG. 5 is a simplified block diagram of one illustrative example of a handheld or mobile computing device that can be used as a user's or client's hand held device 16, in which the present system (or parts of it) can be deployed. FIGS. 6-7 are examples of handheld or mobile devices.

[0061] FIG. 5 provides a general block diagram of the components of a client device

16 that can run components of architecture 120 or that interacts with architecture 120, or both. In the device 16, a communications link 13 is provided that allows the handheld device to communicate with other computing devices and under some embodiments provides a channel for receiving information automatically, such as by scanning. Examples of communications link 13 include an infrared port, a serial/USB port, a cable network port such as an Ethernet port, and a wireless network port allowing communication though one or more communication protocols including General Packet Radio Service (GPRS), LTE, HSPA, HSPA+ and other 3G and 4G radio protocols, lXrtt, and Short Message Service, which are wireless services used to provide cellular access to a network, as well as Wi-Fi protocols, and Bluetooth protocol, which provide local wireless connections to networks.

[0062] In other examples, applications or systems are received on a removable Secure Digital (SD) card that is connected to a SD card interface 15. SD card interface 15 and communication links 13 communicate with a processor 17 (which can also embody processors from FIG. 2) along a bus 19 that is also connected to memory 21 and input/output (I/O) components 23, as well as clock 25 and location system 27.

[0063] I/O components 23, in one embodiment, are provided to facilitate input and output operations. I/O components 23 for various embodiments of the device 16 can include input components such as buttons, touch sensors, multi-touch sensors, optical or video sensors, voice sensors, touch screens, proximity sensors, microphones, tilt sensors, and gravity switches and output components such as a display device, a speaker, and or a printer port. Other I/O components 23 can be used as well. [0064] Clock 25 illustratively comprises a real time clock component that outputs a time and date. It can also, illustratively, provide timing functions for processor 17.

[0065] Location system 27 illustratively includes a component that outputs a current geographical location of device 16. This can include, for instance, a global positioning system (GPS) receiver, a LORAN system, a dead reckoning system, a cellular triangulation system, or other positioning system. It can also include, for example, mapping software or navigation software that generates desired maps, navigation routes and other geographic functions.

[0066] Memory 21 stores operating system 29, network settings 31, applications 33, application configuration settings 35, data store 37, communication drivers 39, and communication configuration settings 41. Memory 21 can include all types of tangible volatile and non-volatile computer-readable memory devices. It can also include computer storage media (described below). Memory 21 stores computer readable instructions that, when executed by processor 17, cause the processor to perform computer-implemented steps or functions according to the instructions. Similarly, device 16 can have a client system 24 which can run various business applications or embody parts or all of architecture 120. Processor 17 can be activated by other components to facilitate their functionality as well.

[0067] Examples of the network settings 31 include things such as proxy information, Internet connection information, and mappings. Application configuration settings 35 include settings that tailor the application for a specific enterprise or user. Communication configuration settings 41 provide parameters for communicating with other computers and include items such as GPRS parameters, SMS parameters, connection user names and passwords.

[0068] Applications 33 can be applications that have previously been stored on the device 16 or applications that are installed during use, although these can be part of operating system 29, or hosted external to device 16, as well.

[0069] FIG. 6 shows one example in which device 16 is a tablet computer 600. In

FIG. 6, computer 600 is shown with user interface display screen 602. Screen 602 can be a touch screen (so touch gestures from a user's finger can be used to interact with the application) or a pen-enabled interface that receives inputs from a pen or stylus. It can also use an on-screen virtual keyboard. Of course, it might also be attached to a keyboard or other user input device through a suitable attachment mechanism, such as a wireless link or USB port, for instance. Computer 600 can also illustratively receive voice inputs as well. [0070] Additional examples of devices 16 can be used as well. Device 16 can be, a feature phone, smart phone or mobile phone. The phone can include a set of keypads for dialing phone numbers, a display capable of displaying images including application images, icons, web pages, photographs, and video, and control buttons for selecting items shown on the display. The phone can include an antenna for receiving cellular phone signals such as General Packet Radio Service (GPRS) and lXrtt, and Short Message Service (SMS) signals. In some examples the phone also includes a Secure Digital (SD) card slot that accepts a SD card.

[0071] The mobile device can also be a personal digital assistant or a multimedia player or a tablet computing device, etc. (hereinafter referred to as a PDA). The PDA can include an inductive screen that senses the position of a stylus (or other pointers, such as a user' s finger) when the stylus is positioned over the screen. This allows the user to select, highlight, and move items on the screen as well as draw and write. The PDA can also include a number of user input keys or buttons which allow the user to scroll through menu options or other display options which are displayed on the display, and allow the user to change applications or select user input functions, without contacting the display. The PDA can also include an internal antenna and an infrared transmitter/receiver that allow for wireless communication with other computers as well as connection ports that allow for hardware connections to other computing devices. Such hardware connections are typically made through a cradle that connects to the other computer through a serial or USB port. As such, these connections are non-network connections.

[0072] FIG. 7 shows that the device can be a smart phone 71. Smart phone 71 has a touch sensitive display 73 that displays icons or tiles or other user input mechanisms 75. Mechanisms 75 can be used by a user to run applications, make calls, perform data transfer operations, etc. In general, smart phone 71 is built on a mobile operating system and offers more advanced computing capability and connectivity than a feature phone.

[0073] Note that other forms of the devices 16 are possible.

[0074] FIG. 8 is one example of a computing environment in which architecture

120, or parts of it, (for example) can be deployed. With reference to FIG. 8, an example system for implementing some embodiments includes a general-purpose computing device in the form of a computer 810. Components of computer 810 may include, but are not limited to, a processing unit 820 (which can comprise processors from previous FIGS.), a system memory 830, and a system bus 821 that couples various system components including the system memory to the processing unit 820. The system bus 821 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus. Memory and programs described with respect to FIG. 2 can be deployed in corresponding portions of FIG. 8.

[0075] Computer 810 typically includes a variety of computer readable media.

Computer readable media can be any available media that can be accessed by computer 810 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media is different from, and does not include, a modulated data signal or carrier wave. It includes hardware storage media including both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 810. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a transport mechanism and includes any information delivery media. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.

[0076] The system memory 830 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 831 and random access memory (RAM) 832. A basic input/output system 833 (BIOS), containing the basic routines that help to transfer information between elements within computer 810, such as during start-up, is typically stored in ROM 831. RAM 832 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 820. By way of example, and not limitation, FIG. 8 illustrates operating system 834, application programs 835, other program modules 836, and program data 837.

[0077] The computer 810 may also include other removable/non-removable volatile/nonvolatile computer storage media. By way of example only, FIG. 8 illustrates a hard disk drive 841 that reads from or writes to non-removable, nonvolatile magnetic media, and an optical disk drive 855 that reads from or writes to a removable, nonvolatile optical disk 856 such as a CD ROM or other optical media. Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like. The hard disk drive 841 is typically connected to the system bus 821 through a nonremovable memory interface such as interface 840, and optical disk drive 855 are typically connected to the system bus 821 by a removable memory interface, such as interface 850.

[0078] Alternatively, or in addition, the functionality described herein can be performed, at least in part, by one or more hardware logic components. For example, and without limitation, illustrative types of hardware logic components that can be used include Field-programmable Gate Arrays (FPGAs), Program-specific Integrated Circuits (ASICs), Program-specific Standard Products (ASSPs), System-on-a-chip systems (SOCs), Complex Programmable Logic Devices (CPLDs), etc.

[0079] The drives and their associated computer storage media discussed above and illustrated in FIG. 8, provide storage of computer readable instructions, data structures, program modules and other data for the computer 810. In FIG. 8, for example, hard disk drive 841 is illustrated as storing operating system 844, application programs 845, other program modules 846, and program data 847. Note that these components can either be the same as or different from operating system 834, application programs 835, other program modules 836, and program data 837. Operating system 844, application programs 845, other program modules 846, and program data 847 are given different numbers here to illustrate that, at a minimum, they are different copies.

[0080] A user may enter commands and information into the computer 810 through input devices such as a keyboard 862, a microphone 863, and a pointing device 861, such as a mouse, trackball or touch pad. Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 820 through a user input interface 860 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A visual display 891 or other type of display device is also connected to the system bus 821 via an interface, such as a video interface 890. In addition to the monitor, computers may also include other peripheral output devices such as speakers 897 and printer 896, which may be connected through an output peripheral interface 895.

[0081] The computer 810 is operated in a networked environment using logical connections to one or more remote computers, such as a remote computer 880. The remote computer 880 may be a personal computer, a hand-held device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 810. The logical connections depicted in FIG. 8 include a local area network (LAN) 871 and a wide area network (WAN) 873, but may also include other networks. Such networking environments are commonplace in offices, enterprise- wide computer networks, intranets and the Internet.

[0082] When used in a LAN networking environment, the computer 810 is connected to the LAN 871 through a network interface or adapter 870. When used in a WAN networking environment, the computer 810 typically includes a modem 872 or other means for establishing communications over the WAN 873, such as the Internet. The modem 872, which may be internal or external, may be connected to the system bus 821 via the user input interface 860, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 810, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation, FIG. 8 illustrates remote application programs 885 as residing on remote computer 880. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.

[0083] It should also be noted that the different embodiments described herein can be combined in different ways. That is, parts of one or more embodiments can be combined with parts of one or more other embodiments. All of this is contemplated herein.

[0084] Example 1 is a computing system, comprising:

[0085] dropbox account identification logic that obtains electronic mail (e-mail) data indicative of a set of forwarding e-mail accounts, that are configured to forward messages to another e-mail account and identifies a dropbox e-mail account as an account that is a destination of forwarded messages from a threshold number of the forwarding e-mail accounts;

[0086] malicious collection account identifying logic that is configured to identify malicious collection e-mail accounts, based on the e-mail data identifying a subset of the forwarding e-mail accounts that forward messages to the identified dropbox e-mail account, and generate a malicious collection account identifier identifying the malicious collection e-mail accounts; and

[0087] a resolution system that receives the malicious collection account identifier and performs a resolution action to resolve the malicious collection e-mail accounts based on the malicious collection account identifier.

[0088] Example 2 is the computing system of any or all previous examples and further comprising:

[0089] collection account identifying logic that accesses the e-mail data in a user account data store and identifies the set of forwarding e-mail accounts, as a set of collection accounts, based on the accessed data.

[0090] Example 3 is the computing system of any or all previous examples wherein the collection account identifying logic accesses forwarding status information associated with e-mail accounts identified in the e-mail data to identify the set of forwarding e-mail accounts.

[0091] Example 4 is the computing system of any or all previous examples and further comprising:

[0092] boundary identifying logic that is configured to identify a boundary in the user account data store that stores the e-mail data, the boundary delineating e-mail data in the user account data store that is accessed by the collection account identifying logic in identifying the set of collection accounts.

[0093] Example 5 is the computing system of any or all previous examples and further comprising:

[0094] threshold setting logic that is configured to identify a dropbox forwarding account threshold indicative of the threshold number of forwarding e-mail accounts.

[0095] Example 6 is the computing system of any or all previous examples wherein the threshold setting logic is configured to identify the dropbox forwarding account threshold based on a ratio of a number of e-mail accounts in the set of forwarding e-mail accounts to a number of dropbox e-mail accounts identified in the boundary.

[0096] Example 7 is the computing system of any or all previous examples wherein the threshold setting logic is configured to identify the dropbox forwarding account threshold based on a ratio of a total number of e-mail accounts in the boundary to a total number of forwarding e-mail accounts in the boundary. [0097] Example 8 is the computing system of any or all previous examples wherein the threshold setting logic is configured to identify the dropbox forwarding account threshold based on a threshold number of unique dropbox e-mail accounts identified in the boundary.

[0098] Example 9 is the computing system of any or all previous examples wherein the resolution system comprises:

[0099] an account suspension system that is configured to automatically suspend the malicious collection e-mail accounts.

[00100] Example 10 is the computing system of any or all previous examples wherein the resolution system comprises:

[00101] an e-mail filtering configuration system that is configured to automatically re-configure filtering information corresponding to the malicious collection e-mail accounts to inhibit forwarding of messages from the malicious collection e-mail accounts.

[00102] Example 11 is the computing system of any or all previous examples wherein the resolution system comprises:

[00103] a forwarding status removal system that is configured to automatically remove forwarding status information corresponding to the malicious collection e-mail accounts to inhibit forwarding of messages from the malicious collection e-mail accounts.

[00104] Example 12 is a computer implemented method, comprising:

[00105] obtaining electronic mail (e-mail) data indicative of a set of forwarding e- mail accounts, that are configured to forward messages to another e-mail account;

[00106] identifying a dropbox e-mail account as an account that is a destination of forwarded messages from a threshold number of the forwarding e-mail accounts;

[00107] identifying malicious collection e-mail accounts, based on the e-mail data identifying a subset of the forwarding e-mail accounts that forward messages to the identified dropbox e-mail account;

[00108] generating a malicious collection account identifier identifying the malicious collection e-mail accounts; and

[00109] performing a resolution action to resolve the malicious collection e-mail accounts based on the malicious collection account identifier.

[00110] Example 13 is the computer implemented method of any or all previous examples and further comprising:

[00111] accesses forwarding status information associated with e-mail accounts identified in the e-mail data the e-mail data in a user account data store; and

[00112] identifying the set of forwarding e-mail accounts, as a set of collection accounts, based on the accessed data.

[00113] Example 14 is the computer implemented method of any or all previous examples and further comprising:

[00114] identifying a boundary in the user account data store that stores the e-mail data, the boundary delineating e-mail data in the user account data store that is accessed in identifying the set of collection accounts.

[00115] Example 15 is the computer implemented method of any or all previous examples and further comprising:

[00116] identifying a dropbox forwarding account threshold indicative of the threshold number of forwarding e-mail accounts.

[00117] Example 16 is the computer implemented method of any or all previous examples wherein identifying the dropbox forwarding account threshold comprises:

[00118] determining a first ratio of a number of e-mail accounts in the set of forwarding e-mail accounts to a number of dropbox e-mail accounts identified in the boundary, a second ratio of a total number of e-mail accounts in the boundary to a total number of forwarding e-mail accounts in the boundary, and a threshold number of unique dropbox e-mail accounts identified in the boundary; and

[00119] identifying the dropbox forwarding account threshold based on the first threshold, the second threshold and the threshold number of unique dropbox e-mail accounts identified in the boundary.

[00120] Example 17 is the computer implemented method of any or all previous examples wherein performing a resolution action comprises at least one of:

[00121] automatically suspending the malicious collection e-mail accounts;

[00122] automatically re-configuring filtering information corresponding to the malicious collection e-mail accounts to inhibit forwarding of messages from the malicious collection e-mail accounts; or

[00123] automatically removing forwarding status information corresponding to the malicious collection e-mail accounts to inhibit forwarding of messages from the malicious collection e-mail accounts.

[00124] Example 18 is a computing system, comprising:

[00125] collection account identifying logic that accesses electronic mail (e-mail) data in a user account data store and identifies a set of forwarding e-mail accounts, that are configured to forward messages to another e-mail account, as a set of collection accounts, based on the accessed data and generates a collection account identifier output indicative of the set of collection accounts;

[00126] dropbox account identification logic that obtains the collection account identifier and identifies a dropbox e-mail account as an account that is a destination of forwarded messages from a threshold number of the forwarding e-mail accounts in the set of collection accounts;

[00127] malicious collection account identifying logic that is configured to identify malicious collection e-mail accounts, based on the e-mail data identifying a subset of the forwarding e-mail accounts that forward messages to the identified dropbox e-mail account, and generate a malicious collection account identifier identifying the malicious collection e-mail accounts; and

[00128] a resolution system that receives the malicious collection account identifier and performs a resolution action to resolve the malicious collection e-mail accounts based on the malicious collection account identifier.

[00129] Example 19 is the computing system of any or all previous examples and further compri sing :

[00130] boundary identifying logic that is configured to identify a boundary in the user account data store that stores the e-mail data, the boundary delineating e-mail data in the user account data store that is accessed by the collection account identifying logic in identifying the set of collection accounts; and

[00131] threshold setting logic that is configured to identify a dropbox forwarding account threshold indicative of the threshold number of forwarding e-mail accounts.

[00132] Example 20 is the computing system of any or all previous examples wherein the resolution system comprises at least one of:

[00133] an account suspension system that is configured to automatically suspend the malicious collection e-mail accounts;

[00134] an e-mail filtering configuration system that is configured to automatically re-configure filtering information corresponding to the malicious collection e-mail accounts to inhibit forwarding of messages from the malicious collection e-mail accounts; or

[00135] a forwarding status removal system that is configured to automatically remove forwarding status information corresponding to the malicious collection e-mail accounts to inhibit forwarding of messages from the malicious collection e-mail accounts.

[00136] Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.