Delivery of an Electronic Message Using a Machine Learning Policy

ABSTRACT

According to some embodiments, a method performed by a classification scanner comprises receiving an electronic message and determining whether the electronic message includes an express indication from the user indicating that a classification applies to the electronic message. In response to determining that the electronic message does not include the express indication that the classification applies to the electronic message, the message further comprises sending the electronic message to a machine learning scanner. The machine learning scanner is adapted to use a machine learning policy to determine whether the classification applies to the electronic message.

TECHNICAL FIELD

Certain embodiments of the present disclosure relate generally todelivery of an electronic message and more particularly delivery of anelectronic message using a machine learn policy.

BACKGROUND

In a computer network, a sender may transmit files, email messages, andother data to a recipient. When sending the data, the sender may requestthat the data be handled in a certain way. As an example, the sender mayrequest that the data be encrypted. Various techniques exist forencrypting data. As one example, public key encryption is a techniquethat may be used to encrypt data. In public key encryption, two separatekeys are associated with the recipient, a public key and a correspondingprivate key. The sender obtains the recipient's public key, encrypts thedata using the public key, and transmits the encrypted data to therecipient. The recipient decrypts the encrypted data using itscorresponding private key. This technique protects the data fromunauthorized recipients that do not possess the private key.

SUMMARY

According to certain embodiments, a method is disclosed for use in aclassification scanner. The method comprises receiving an electronicmessage and determining a classification that applies to the electronicmessage. The classification is determined based on an express indicationfrom a user. The method further comprises providing a machine learningtrainer with the electronic message and an identification of theclassification that applies to the electronic message. The machinelearning trainer is adapted to determine a machine learning policy thatassociates attributes of the electronic message with the classification.

According to certain embodiments, a classification scanner is disclosed.The classification scanner comprises one or more interfaces andprocessing circuitry. The processing circuitry is operable to receive anelectronic message via the one or more interfaces and determine aclassification that applies to the electronic message. Theclassification is determined based on an express indication from a user.The processing circuitry is further operable to provide the electronicmessage and an identification of the classification that applies to theelectronic message to a machine learning trainer via the one or moreinterfaces. The machine learning trainer is adapted to determine amachine learning policy that associates attributes of the electronicmessage with the classification.

According to certain embodiments, one or more non-transitorycomputer-readable media are disclosed. The non-transitorycomputer-readable media comprise logic that, when executed by processingcircuitry, cause the processing circuitry to receive an electronicmessage and determine a classification that applies to the electronicmessage. The classification is determined based on an express indicationfrom a user. The logic causes the processing circuitry to provide amachine learning trainer with the electronic message and anidentification of the classification that applies to the electronicmessage. The machine learning trainer is adapted to determine a machinelearning policy that associates attributes of the electronic messagewith the classification.

Certain embodiments of the above-described method, classificationscanner, and/or logic may each include additional features, such as anyone or more of the following features:

In some embodiments, the express indication comprises a flag configuredby the user.

In some embodiments, the express indication comprises a keyword that theclassification scanner associates with enabling the classification.

In some embodiments, the express indication comprises administratorfeedback.

In some embodiments, the machine learning policy is enabled based ondetermining that a threshold number of electronic messages having beenprovided to the machine learning trainer.

In some embodiments, the classification indicates whether at least oneof the following applies to the electronic message: encryption,quarantine, archive, brand.

In some embodiments, the classification indicates that best mode ofdelivery encryption applies to the electronic message.

In some embodiments, the machine learning policy corresponds to one of aplurality of machine learning policies determined by the machinelearning trainer, and an indication of which of the machine learningpolicies to train with the electronic message is provided to the machinelearning trainer.

In certain embodiments, an indication is provided to the machinelearning trainer to train the same machine learning policy based onelectronic messages received from different users that have one or morecharacteristics in common.

According to certain embodiments, a method is disclosed for use in aclassification scanner. The method comprises receiving an electronicmessage and determining whether the electronic message includes anexpress indication from the user indicating that a classificationapplies to the electronic message. In response to determining that theelectronic message does not include the express indication that theclassification applies to the electronic message, the method sends theelectronic message to a machine learning scanner. The machine learningscanner is adapted to use a machine learning policy to determine whetherthe classification applies to the electronic message.

According to certain embodiments, a classification scanner is disclosed.The classification scanner comprises one or more interfaces andprocessing circuitry. The processing circuitry is operable to receive anelectronic message via the one or more interfaces and determine whetherthe electronic message includes an express indication from the userindicating that a classification applies to the electronic message. Inresponse to determining that the electronic message does not include theexpress indication that the classification applies to the electronicmessage, the processing circuitry is operable to send the electronicmessage to a machine learning scanner via the one or more interfaces.The machine learning scanner is adapted to use a machine learning policyto determine whether the classification applies to the electronicmessage.

According to certain embodiments, one or more non-transitorycomputer-readable media are disclosed. The non-transitorycomputer-readable media comprise logic that, when executed by processingcircuitry, cause the processing circuitry to receive an electronicmessage and determine whether the electronic message includes an expressindication from the user indicating that a classification applies to theelectronic message. In response to determining that the electronicmessage does not include the express indication that the classificationapplies to the electronic message, the logic causes the processingcircuitry to send the electronic message to a machine learning scanner.The machine learning scanner is adapted to use a machine learning policyto determine whether the classification applies to the electronicmessage.

Certain embodiments of the above-described method, classificationscanner, and/or logic may each include additional features, such as anyone or more of the following features:

In some embodiments, the machine learning scanner to which theelectronic message is sent is further adapted to send the electronicmessage to an enforcer adapted to apply the classification if theclassification applies to the electronic message and to bypass theenforcer if the classification does not apply to the electronic message.

In some embodiments, a second electronic message is received and adetermination is made whether the second electronic message includes anexpress indication from the user indicating that a classificationapplies to the second electronic message. In response to determiningthat the second electronic message includes the express indication thatthe classification applies to the second electronic message, the secondelectronic message is sent to an enforcer adapted to apply theclassification.

In some embodiments, the electronic message is sent to the machinelearning scanner further in response to determining that at least athreshold number of electronic messages have been provided to a machinelearning trainer adapted to determine the machine learning policy usedby the machine learning scanner.

In some embodiments, the machine learning scanner is instructed to applythe machine learning policy to electronic messages associated with asecond user in response to determining that one or more characteristicsassociated with the second user match one or more characteristicsassociated with the user.

In some embodiments, the express indication comprises a flag configuredby the user.

In some embodiments, the express indication comprises a keyword that theclassification scanner associates with enabling the classification.

In some embodiments, the express indication comprises administratorfeedback.

Some embodiments of the disclosure may provide one or more technicaladvantages. A technical advantage of certain embodiments may includeeliminating user error by applying machine learning to elements ofelectronic messages the user is unlikely or unable to review, includingbut not limited to files and attachments, metadata, hyperlinks and theircontent, and other electronic messages being transmitted within thenetwork or by similar users outside the network. For example, one usermay attach a large file to an electronic message that on its face doesnot appear to need encryption. The machine leaning scanner is operableto scan the large file much faster than a human user and can determinethat the file does need encryption. The machine learning scanner canthen send that electronic message to an enforcer configured to apply theproper encryption before the electronic message reaches its intendedrecipient. In certain embodiments, the machine learning scanner mayinstruct the enforcer that more than one classification applies to asingle electronic message. For example, the machine learning scanner maydetermine that an electronic message needs to be both encrypted andquarantined. Thus, certain embodiments may reduce the risk of humanerror by automatically applying the required classification orclassifications to an electronic message. Additionally, in certainembodiments, the use of machine learning enables a lexicon to bedynamically built. In the past, users had to create or purchase custom,stagnant lexicons. Machine learning allows for a lexicon to learn fromand adapt to different user preferences over time, eliminating the needto update a static lexicon at regular intervals.

Some embodiments may benefit from some, none, or all of theseadvantages. Other technical advantages may be readily ascertained by oneof ordinary skill in the art.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention and itsfeatures and advantages, reference is now made to the followingdescription, taken in conjunction with the accompanying drawings, inwhich:

FIG. 1 illustrates an example of a computer network for delivery of anelectronic message, in accordance with certain embodiments.

FIGS. 2A-2B illustrate an example of components that may be included inthe computer network and that may facilitate generating a machinelearning policy, in accordance with certain embodiments.

FIGS. 3A-3C illustrate an example of components that may be included inthe computer network and that may facilitate applying a machine learningpolicy, in accordance with certain embodiments.

FIG. 4 illustrates an example that combines components from FIGS. 2A-2Bwith components from FIGS. 3A-3C, in accordance with certainembodiments.

FIG. 5 illustrates examples of elements that may be included in one ormore components of the computer network described with respect to FIGS.1-4, in accordance with certain embodiments.

FIG. 6 illustrates an example of a method for creating a machinelearning policy based on express indicators, in accordance with certainembodiments.

FIG. 7 illustrates an example of a method for delivery of an electronicmessage using a machine learning policy, in accordance with certainembodiments.

DETAILED DESCRIPTION

Embodiments of the present invention are described in FIGS. 1-7 of thedrawings, like numerals being used for like and corresponding parts ofthe various drawings.

When sending an electronic message to a recipient, a sender may requestthat the electronic message be handled in a certain way. In some cases,instructions for handling the electronic message may be providedmanually. For example, a user may provide instructions for handling themessage via an interface that allows the user to type a command, click abutton, select a menu item, etc. However, errors can occur when relyingon the user to manually provide such instructions. For example, the usermay occasionally forget to provide instructions or may inadvertentlyprovide incorrect instructions. To address this problem, computingsystems may implement policies that provide rules for handlingelectronic messages. As an example, a policy may indicate thatelectronic messages containing certain key words are to be encrypted.Developing robust policies can be difficult. Different users may havedifferent preferences as to which characteristics should cause anelectronic message to be handled in a particular way. Additionally, thecharacteristics that should cause an electronic message to be handled ina particular way may change over time, which means the policies maybecome outdated.

Certain embodiments of the present disclosure provide techniques fordeveloping robust policies and ensuring that the policies areup-to-date. According to certain embodiments, machine learning can beused to build policies for handling electronic messages. As an example,a user may electronically indicate electronic messages that need to beencrypted. Machine learning can be used to classify the electronicmessages and determine which attributes of the electronic messages toinclude in an encryption policy. The encryption policy may then beapplied to future electronic messages. The future electronic messagesmay be scanned for attributes that the policy associates with encryptionto determine whether the future electronic messages should be encrypted.

Users may use any suitable technique to electronically indicate whichelectronic messages need to be encrypted. As an example, prior tosending the electronic message, a user may configure a flag indicatingthat the electronic message should be encrypted. The flag may beconfigured in any suitable manner, such as by typing a command, clickinga button, selecting a menu item, etc. In some embodiments, if the flagindicates that the electronic message should be encrypted, a header maybe added to the electronic message to ensure that the electronic messageis sent to an encryption module. As another example, prior to sendingthe electronic message, the user can prepare the electronic message in amanner that the user knows will invoke encryption. In some embodiments,customers can build keyword policies that will cause an electronicmessage to be encrypted. Customers often use these types of policies toallow users to specify which emails need to be encrypted, often bywatching for the word “Encrypt” in a subject line. As another example,after sending the electronic message, a user (such as an administrator)can provide feedback indicating that the electronic message containsattributes that warrant encryption. In some embodiments, theadministrator can mark archived messages as “encrypt” or “not encrypt”messages. Examples of products that enable a user to indicate that anelectronic message needs to be encrypted include ZixSelect and ZixDLP(which support Encrypt & Send flags) and ZixArchive (which supportsadministrator feedback).

Once electronic messages have been identified as requiring (or notrequiring) encryption based on the express indication of the user, theelectronic messages may be fed to a machine learning engine. Consider anemail, for example. The email subject, body, attachment types,attachment text, metadata, and whether the email should be encrypted maybe fed into a machine learning engine, like scikit or TensorFlow. Themachine learning engine would create and train a classification modelbased on the information given in order to develop a machine learningpolicy that identifies whether the email should be encrypted. Once themachine learning engine has been provided with enough data to reach arelatively high level of accuracy, potentially thousands of emails, newemails that are not flagged or otherwise explicitly marked as encryptedmay be scanned according to the machine learning policy to see if any ofthem should be encrypted.

FIG. 1 illustrates an example of a computer network for delivery of anelectronic message, in accordance with certain embodiments. The computernetwork may include a plurality of clients 102 operable to send andreceive electronic messages via an interconnecting network 110. Eachclient 102 may include any suitable combination of hardware and/orsoftware, such as one or more interfaces, processing circuitry, and/orone or more memories, examples of which are described in more detailwith respect to FIG. 5 below. In certain embodiments, client 102 mayrefer to a user device (e.g., a laptop computer, desktop computer,mobile phone, etc.) or an application of the user device through which auser accesses the user's mailbox to compose outbound emails, viewinbound emails, and so on, such as Microsoft Outlook®, Lotus Notes®,Google Gmail®, a secure mail plug-in, etc. The user may refer to anysuitable user, such as the sender of the message or an administrator(e.g., an information technology specialist authorized to managecomputing resources or services used by the sender of the message).

In certain embodiments, the computing network includes one or more maildelivery servers 104 and gateways 106 to facilitate communicating emailbetween clients 102 via network 110. A mail delivery server 104 mayrefer to a server that delivers email to the user's mailbox. As oneexample, a Microsoft Exchange® server may be used as mail deliveryserver 104. In some embodiments, mail delivery server 104 may correspondto a particular domain. For example, mail delivery server 104A maycorrespond to Company A and may deliver emails to and from the domain@CompanyA.com. Mail delivery server 104B may deliver emails within adifferent domain, such as @CompanyB.com, and may deliver emails to andfrom mail applications associated with Company B.

Gateway 106 may refer to a mail relay positioned between a privatenetwork (such as Company A's network) and an outside network (such asthe Internet or Company B's network). In some embodiments, gateway 106may be positioned at the edge of the private network. As an example,gateway 106A may receive email from mail delivery server 104A, applypolicies for sending email to the outside network, and then forward theemail to the outside network (e.g., via network 110). Similarly, gateway106A may receive email from the outside network (e.g., via network 110),apply policies for receiving email from the outside network, and thenforward the email to mail delivery server 104A for delivery to theappropriate mailbox. In some embodiments, redundant gateways may be usedto provide load balancing, disaster recovery, or other redundancy. Forexample, gateway 106A′ may operate as a redundant gateway for gateway106A. In embodiments in which gateway 106A maintains a local copy of amachine learning policy, redundant gateway 106A′ may also maintain alocal copy of the machine learning policy so that either gateway isprepared to apply the policy to email.

In the example shown in FIG. 1, clients 102A_(1-N), mail delivery server104A, and gateway 106A are associated with premises 100A, and clients102B_(1-N), mail delivery server 104B, and gateway 106B are associatedwith premises 100B. A premises 100 may refer to a private network ordomain associated with an entity, such as Company A or Company B. Insome embodiments, premises 100A may comprise computing equipment, suchas mail delivery server 104A and gateway 106A, physically locatedon-site in a building of Company A. As further discussed below, incertain embodiments, on-premises computing equipment may be used toprovide some or all of the functionality associated with generating andapplying machine learning policies. In addition, or in the alternative,a host 120 may be used to provide some or all of the functionalityassociated with generating and applying machine learning policies.

As shown in FIG. 1, the computer network may optionally include one ormore hosts 120, depending on the embodiment. Host 120 may providecomputing services to clients 102 via network 110. For example, network110 may comprise all or a portion of one or more of the following: apublic switched telephone network (PSTN), a public or private datanetwork, a local area network (LAN), a metropolitan area network (MAN),a wide area network (WAN), a local, regional, or global communication orcomputer network such as the Internet, a wireline or wireless network,an enterprise intranet, other suitable communication link, or anycombination of any of the preceding. In some embodiments, host 120 maybe administered by a third party (e.g., a party other than Company A orCompany B), such as a third-party encryption service. Host 120 mayprovide computing services to any of clients 120A_(1-N) associated withCompany A, clients 120B_(1-N) associated with Company B, and/or clients102C_(1-N) (which need not be associated with a particular company andneed not be delivered through mail delivery server 104 and gateway 106).In certain embodiments, host 120 may comprise a secure webmail deliveryportal, such as a ZixPort®, that provides secure webmail accounts tousers.

In some embodiments, the components of the computer network illustratedin FIG. 1 may communicate using a shared protocol, such as Simple MailTransfer Protocol (SMTP). In other embodiments, certain components maycommunicate using different protocols in which case protocol convertersmay be included to convert between the different protocols.

FIGS. 2A-2B, 3A-3C, and 4 illustrate examples of components that may beincluded in the computer network of FIG. 1. The components may beincluded in any suitable location within the computer network, such aswithin client 102, mail delivery server 104, gateway 106, and/or host120. For example, in certain embodiments, the components may be locatedwithin a gateway 106. In other embodiments, the components may belocated within host 120. In other embodiments, the components may bedistributed throughout the network. For example, some of the componentsmay be located within a gateway 106 and other components may be locatedwithin host 120.

FIGS. 2A-2B illustrate an example of components that may be included inthe computer network and that may facilitate generating a machinelearning policy, in accordance with certain embodiments. The componentsillustrated in FIGS. 2A-2B include a classification scanner 202, amachine learning trainer 204, a policy repository 206, and an enforcer208.

Classification scanner 202 receives an electronic message 200 from auser via client 102. In certain embodiments, the user from whomelectronic message 200 is received may be a sender of electronic message200 or an administrator authorized to manage electronic message 200.Examples of electronic message 200 may include an email, SMTP message,text message, instant message, voice message, and/or an attachment to asecondary electronic message. Classification scanner 202 determineswhether the user has expressly indicated that a classification appliesto electronic message 200. For example, classification scanner 202 mayinclude one or more scanners adapted to scan the electronic message todetermine whether the user has expressly indicated that a certainclassification applies. In some embodiments, a classification may beused to ensure that the electronic message complies with a policy, arule, a user preference, or other compliance criteria associated withthe classification. Examples of classifications that may apply toelectronic message 200 include encryption (or non-encryption),quarantine (or non-quarantine), archive (or non-archive), and/or brand(or non-brand) classifications. Accordingly, classification scanner 202may include an encryption scanner, a quarantine scanner, an archivescanner, a brand scanner, and/or other suitable scanner(s).

The encryption scanner determines whether the user has expresslyindicated that the electronic message is to be encrypted. The quarantinescanner determines whether the user has expressly indicated that theelectronic message is to be quarantined. As an example, a user mayindicate to quarantine certain electronic messages in order to performsecurity procedures, such as malware detection and remediation. Thearchive scanner determines whether the user has expressly indicated thatthe message is to be archived. As an example, a user may indicate toarchive an important electronic message in a database or file managementsystem for future reference. The brand scanner determines whether theuser has expressly indicated that the message is to be branded. As anexample, a user may indicate to brand the electronic message with abusiness logo or trade dress, a designation (e.g., “confidential,”“proprietary,” “draft”), a watermark (e.g., recipient's name, date,etc.), or other information.

Classification scanner 202 may include various types of scanners withinthe same scanner (as shown in FIGS. 2A-2B), or different types ofscanners may be provided in separate classification scanners 202. Anysuitable number of scanners may be used, and certain types of scannersmay be added or omitted, depending on the embodiment. Additionally,certain scanners may be configured to scan outbound electronic messages,certain scanners may be configured to scan inbound electronic messages,and certain scanners may be configured to scan both outbound and inboundelectronic messages.

As described above, classification scanner 202 determines whether theuser has expressly indicated that a classification applies to electronicmessage 200. When sending electronic message 200, the user may expresslyindicate that a classification applies by typing a command, clicking abutton, selecting a menu item, or using any other suitable technique toconfigure a flag indicating that a classification applies, or the usermay include a keyword that classification scanner 202 associates withenabling the classification (such as including the word “encrypt” in thesubject line of an email to enable an encryption classification).Additionally, certain embodiments enable a user (sender oradministrator) to provide feedback that expressly indicates that apreviously sent electronic message 200 should be used to train machinelearning trainer 204 with respect to the classification. As an example,an administrator may review archived electronic messages 200 and mayexpressly indicate how machine learning trainer 204 should classify thearchived electronic messages 200.

Classification scanner 202 provides electronic message 200 to machinelearning trainer 204 and, if the user has expressly indicated that aclassification applies, classification 202 also provides machinelearning trainer 204 with an identification of the classification thatapplies to the electronic message 200.

Machine learning trainer 204 may comprise a machine learning engine,like scikit or TensorFlow, adapted to determine (e.g., generate orupdate) a machine learning (ML) policy by associating attributes of theelectronic message 200 with the applicable classification. The machinelearning engine may use any suitable classification model or machinelearning algorithm (including any deep learning algorithms or neuralnetwork tools) to determine a machine learning policy. A machinelearning policy may be determined for a particular type ofclassification (such as encryption) or a combination of classifications.As an example, a machine learning policy may include a rule that anelectronic message with attributes A, B, and C should be encrypted andarchived, and the machine learning policy may include another rule thatan electronic message with attributes A, B, and D should be encryptedand branded.

Examples of attributes that may be included in a machine learning policyinclude the presence or absence of certain words or phrases, thefrequency with which certain words or phrases appear in the electronicmessage, the sender of the electronic message, the recipient of theelectronic message, the domain of the sender, the domain of therecipient, message size, whether the electronic message includes certainattachments, whether the electronic message includes links to certaindata, whether the electronic message is associated with certainmetadata, whether the electronic message or its contents are associatedwith certain computing resources (such as a private/classified portionof a network or storage media), the date of the electronic message,other suitable attributes, or any combination of the preceding. As oneexample, if machine learning trainer 204 detects that the user hasexpressly indicated to encrypt at least a threshold number or thresholdpercentage of messages containing the word “confidential” in the subjectline, machine learning trainer 204 may determine a machine learningpolicy that causes future messages containing the word “confidential” inthe subject line to be encrypted.

Machine learning trainer 204 may communicate with policy repository 206to store and retrieve one or more machine learning policies, such as MLpolicy A, ML policy B, . . . and ML policy N. Policy repository 206 maycomprise any suitable computer-readable storage medium, such as localmemory of machine learning trainer 204, an external database thatmachine learning trainer 204 may access via a network, or othercomputer-readable storage medium. Each ML policy may be associated witheither a particular user or with a group of users having one or morecharacteristics in common. As an example, an ML policy may be associatedwith all of the employees of Company A, with all of the members ofdepartment X within Company A, with all of the customers of host 120that belong to the same industry (e.g., an ML policy for the medicalindustry may be trained to recognize and encrypt electronic messagescontaining patient records, and that ML policy could be applied todifferent customers in the medical industry, such as Hospital A andHospital B), or any other group.

When machine learning trainer 204 receives electronic message 200 fromclassification scanner 202, machine learning trainer 204 may generate anew machine learning policy to be stored in policy repository 206 or maytrain an existing machine learning policy retrieved from policyrepository 206. In certain embodiments, classification scanner 202indicates to machine learning trainer 204 which machine learning policyshould be trained based on electronic message 200 (e.g., ML policy A, B,. . . or N). In certain embodiments, electronic messages 200 fromdifferent users having one or more characteristics in common may be usedto train the same machine learning policy. In certain embodiments, oneelectronic message 200 may be used to train multiple machine learningpolicies. For example, if the sender of electronic message 200 is amember of department X of Company A, electronic message 200 may be usedto train both a first policy associated with department X and a secondpolicy associated with Company A.

Optionally, electronic message 200 may be sent to an enforcer 208adapted to apply one or more classifications. For example, FIG. 2Aillustrates an example in which classification scanner 202 receiveselectronic message 200A from the user, determines that the user hasexpressly indicated one or more classifications that apply to electronicmessage 200A, and provides machine learning trainer 204 with electronicmessage 200A and an indication of which classification(s) apply. Machinelearning trainer 204 uses electronic message 200A to train one or moremachine learning policies. Machine learning trainer also providesenforcer 208 with electronic message 200A and an indication of whichclassification(s) apply. Enforcer 208 applies the indicatedclassifications. For example, enforcer 208 may encrypt, quarantine,archive, and/or brand electronic message 200A depending on whichclassification(s) apply.

FIG. 2B illustrates an example of bypassing enforcer 208. In FIG. 2B,classification scanner 202 receives electronic message 200B from theuser, determines that the user has not expressly indicated anyclassifications that apply to electronic message 200B, and providesmachine learning trainer 204 with electronic message 200B and anindication that the classifications do not apply. Machine learningtrainer 204 uses electronic message 200B to train one or more machinelearning policies. Machine learning trainer also sends electronicmessage 200B to the intended recipient of electronic message 200B,bypassing enforcer 208, because electronic message 200B does not need tobe encrypted, quarantined, archived, branded, or otherwise treated byenforcer 208.

Although FIGS. 2A and 2B illustrate examples in which machine learningtrainer 204 sends electronic message 200 to the intended recipient(either directly or via enforcer 208), in other embodiments machinelearning trainer need not send electronic message 200 to the intendedrecipient. For example, in certain embodiments, classification scanner202 may send one copy of electronic message 200 to machine learningtrainer 204 in order to train a machine learning policy, andclassification scanner 202 may send another copy of electronic message200 to the intended recipient (either directly or via enforcer 208,e.g., depending on whether the user has expressly indicated anyclassification to apply to electronic message 200). As another example,in certain embodiments, classification scanner 202 may provide machinelearning trainer 204 with archived/previously sent electronic messages200 for training purposes. Such archived/previously sent electronicmessages 200 need not be sent to the recipient.

FIGS. 3A-3C illustrate an example of components that may be included inthe computer network and that may facilitate applying a machine learningpolicy, in accordance with certain embodiments. FIGS. 3A-3C include aclassification scanner 202, machine learning scanner 304, policyrepository 206, and enforcer 208. Classification scanner 202, policyrepository 206, and enforcer 208 may be similar to those described withrespect to FIGS. 2A-2C. As further explained below, machine learningscanner 304 uses a machine learning policy to determine whether aclassification applies to the electronic message.

In FIG. 3A, classification scanner 202 receives electronic message 300Afrom a user. Classification scanner 202 scans message 300A to determinewhether the user has expressly indicated that a classification applies.As described above, classification scanner 202 may include a singlescanner or multiple scanners (e.g., encryption, quarantine, archive,and/or brand scanners). For ease of explanation, suppose classificationscanner 202 includes only an encryption scanner. In response todetermining that the user has not expressly indicated that aclassification (e.g., encryption) applies, classification scanner 202sends message 300A to machine learning scanner 304. Machine learningscanner 304 is adapted to use a machine learning policy obtained frompolicy repository 206 to determine whether a classification (e.g.,encryption) applies to electronic message 300A. In some embodiments,machine learning scanner 304 receives information from classificationscanner 202 that enables machine learning scanner 304 to determine whichof a plurality of machine learning policies to apply. For example,classification scanner 202 may send machine learning scanner 304 anidentifier associated with a particular machine learning policy. Asanother example, classification scanner 202 may send machine learningscanner 304 information that enables machine learning scanner 304 toidentify the sender or a group to which the sender belongs, and machinelearning scanner 304 may map electronic message 300A to a machinelearning policy associated with the sender/group.

In the example illustrated in FIG. 3A, machine learning scanner 304determines that a classification (e.g., encryption) applies toelectronic message 300A. Machine learning scanner 304 provides enforcer208 with electronic message 300A and an indication of whichclassification applies. Enforcer 208 applies the classification andsends the classified message 300A to the intended recipient. As anexample, a machine learning policy may indicate that message with theword “confidential” in the subject line should be encrypted. In responseto detecting the word “confidential” in the subject line of electronicmessage 300A, machine learning scanner 304 sends enforcer 208 anindication to encrypt electronic message 300A. Enforcer 208 performsencryption before sending electronic message 300A to the intendedrecipient.

Turning now to an example in which classification scanner 202 includesmultiple scanners (e.g., encryption, quarantine, archive, and/or brandscanners). In certain embodiments, classification scanner 202 maydetermine that the user has expressly indicated that certainclassifications apply (such as encryption) but has not expresslyindicated whether or not the other classifications apply. In this case,classification scanner 202 may send message 300A to machine learningscanner 304 with an indication that encryption does apply and aninstruction to scan electronic message 300A according to a machinelearning policy to determine if any other classifications apply. Machinelearning scanner 304 provides electronic message 300A to enforcer 208with an indication to apply encryption and any other classificationsthat the machine learning scanner 304 determines should be appliedaccording to the machine learning policy.

FIG. 3B is similar to FIG. 3A except that machine learning scanner 304determines that the machine learning policy does not require applyingany classification to electronic message 300B. Accordingly, machinelearning scanner 304 bypasses enforcer 208 and sends electronic message300B to the intended recipient without anyencryption/quarantine/archiving/branding.

FIG. 3C is similar to FIGS. 3B and 3A except that classification scanner202 determines that the user has expressly indicated how to classifyelectronic message 300C. Accordingly, classification scanner 202bypasses machine learning scanner 304 and sends electronic message 300Cdirectly to enforcer 208. Classification scanner 202 instructs enforcer208 to apply classification (e.g., encrypt, quarantine, archive, and/orbrand) to electronic message 300C according to the express indication ofthe user. Enforcer 208 applies the classification and sends electronicmessage 300C to the intended recipient.

FIG. 4 illustrates an example that combines components from FIGS. 2A-2Bwith components from FIGS. 3A-3C, in accordance with certainembodiments. The example in FIG. 4 includes both a machine learningtrainer 204 and a machine learning scanner 304, which may both receiveelectronic messages from classification scanner 202. For example,classification scanner 202 may send an electronic message to machinelearning trainer 204. Machine learning trainer 204 may determine amachine learning policy that associates attributes of the electronicmessage with the applicable classification and may generate a newmachine learning policy to be stored in policy repository 206 or maytrain an existing machine learning policy already stored in policyrepository 206. Classification scanner 202 may also send an electronicmessage to machine learning scanner 304. Machine learning scanner 304 isadapted to use a machine learning policy obtained from policy repository206 to determine whether a classification applies to electronic message300. Thus, machine learning trainer 204 may continue to generate and/orupdate machine learning policies while machine learning scanner 304scans electronic messages according to available machine learningpolicies.

FIG. 5 illustrates examples of elements that may be included in one ormore components of the computer network described with respect to FIGS.1-4, in accordance with certain embodiments. For example, any of clients102, mail delivery servers 104, gateways 106, host 120, classificationscanner 202, machine learning trainer 204, machine learning scanner 304,policy repository, and/or enforcer 208 may include an interface 502,processing circuitry 504, memory 506, and/or any other suitableelements. Interface 502 receives input, sends output, processes theinput and/or output, and/or performs other suitable operation. Interface502 may comprise hardware and/or software.

Processing circuitry 504 performs the operations of the component, forexample, executes instructions to generate output from input. Processingcircuitry 504 may include hardware, software, and/or other processingcircuitry. Processing circuitry 504 may be encoded in one or moretangible media and may preform operations when executed by a computer.Certain processing circuitry, such as a processor, may manage theoperation of a component. Examples of processing circuitry (or aprocessing unit) include one or more computers, one or moremicroprocessors, one or more applications, and/or other processingcircuitry. In particular embodiments, the operations of the embodimentsmay be performed by one or more computer readable media encoded with acomputer program, software, computer executable instructions, and/orinstructions capable of being executed by a computer. In particularembodiments, the operations of the embodiments may be performed by oneor more computer readable media storing, embodied with, and/or encodedwith a computer program and/or having a stored and/or an encodedcomputer program.

Memory 506 (or memory unit) stores information. Memory 506 may compriseone or more non-transitory, tangible, computer-readable, and/orcomputer-executable storage media. Examples of memory 506 includecomputer memory (for example, Random Access Memory (RAM) or Read OnlyMemory (ROM), mass storage media (for example, a Compact Disk (CD) or aDigital Video Disk (DVD)), database, and/or network storage (forexample, a server), and/or other computer-readable medium.

FIG. 6 illustrates an example of a method for creating a machinelearning policy based on express indicators, in accordance with certainembodiments. In certain embodiments, the method may be performed byclassification scanner 202. The method may begin at step 602 byreceiving an electronic message. For example, classification scanner 202may receive message 200.

At step 604, the method determines a classification that applies to theelectronic message at classification scanner 202 based on an expressindicator from a user (such as a sender of the electronic message or anadministrator). Examples of express indicators include a flag configuredby the user (e.g., by typing a command, clicking a button, or selectinga menu item) or a keyword that the classification scanner associateswith enabling the classification (such as the presence of the word“encrypt” in the subject line). The user may provide the expressindicator when sending the electronic message to an intended recipient.In addition, or in the alternative, the user may provide the expressindication as feedback associated with an electronic message that waspreviously sent (e.g., an administrator may select certain archivedmessages to train machine learning trainer 204). As described above,examples of classifications that may apply to an electronic messageinclude encryption, quarantine, archive, and/or brand applies toelectronic message 200.

In certain embodiments, the classification may indicate that best modeof delivery encryption applies to electronic message 200. Best mode ofdelivery encryption may be used to select among a number of possibleencryption modes. For example, suppose that enforcer 208 is capable ofencrypting the electronic message according to any of encryption modesA, B, C, D, or E. The encryption modes are prioritized in order with Ahaving the highest priority (e.g., strongest encryption mode) and Ehaving the lowest priority (e.g., weakest encryption mode). If theintended recipient of the electronic message only supports encryptionmodes B, D, and E, enforcer 208 encrypts the electronic messageaccording to encryption mode B, which is the best mode available.

At step 606, the method provides machine learning trainer 204 withelectronic message 200 and an identification of the classification thatapplies to electronic message 200. Machine learning trainer 204 isadapted to determine a machine learning policy that associatesattributes of electronic message 200 with the classification and tostore the machine learning policy in policy repository 206. As describeabove, determining a machine learning policy may comprise generating anew policy or updating an existing policy. In certain embodiments,machine learning trainer 204 the machine learning policy to begenerated/updated corresponds to one of a plurality of machine learningpolicies, and classification scanner 202 indicates to machine learningtrainer 204 which of the machine learning policies to train with theelectronic message. Additionally, in certain embodiments, classificationscanner 2002 may indicate to train multiple machine learning policieswith the electronic message.

In certain embodiments, the method further determines when at least athreshold number of electronic messages associated with a machinelearning policy have been provided to machine learning trainer 204. Thethreshold number may be selected so that the machine learning trainer204 receives enough training input, such as thousands of electronicmessages, to ensure sufficient accuracy of the machine learning policy.In response to determining that at least the threshold number ofelectronic messages associated with the machine learning policy havebeen provided to machine learning trainer 204, the machine learningpolicy may be enabled. For example, the machine learning policy may bemade available to machine learning scanner 304. Machine learning scanner304 may use the machine learning policy to determine whether aclassification (e.g., encryption, quarantine, archive, brand) should beapplied to an electronic message for which the user did not expresslyindicate to apply the classification. Meanwhile, machine learningtrainer 204 may continue to receive electronic messages and dynamicallyupdate the machine learning policy in order to improve accuracy andensure the machine learning policy is up-to-date.

FIG. 7 illustrates an example of a method for delivery of an electronicmessage using a machine learning policy, in accordance with certainembodiments. In certain embodiments, the method may be performed byclassification scanner 202. The method may begin at step 702 byreceiving an electronic message. For example, classification scanner 202may receive message 200 from a user.

At step 704, the method determines whether the electronic messageincludes an express indication from the user indicating that aclassification (e.g., encrypt, quarantine, archive, and/or brand)applies to the electronic message. In some embodiments, the expressindicator may include a flag configured by the user, a keyword thatclassification scanner 202 associates with enabling the classification,or administrator feedback. In certain embodiments, the classificationmay indicate that best mode of delivery encryption applies to electronicmessage 200.

At step 706, the method, in response to determining that electronicmessage 200 does not include the express indication that theclassification applies to electronic message 200, sends electronicmessage 200 to machine learning scanner 304. Machine learning scanner304 is adapted to use a machine learning policy stored in policyrepository 206 to determine whether the classification applies toelectronic message 200. In certain embodiments, machine learning scanner304 is further adapted to determine whether to send the electronicmessage to enforcer 208 (see e.g., FIG. 3A) or bypass enforcer 208 (seee.g., FIG. 3B) depending on whether the machine learning policyindicates classification applies to the electronic message. Enforcer 208is adapted to apply the classification.

In certain embodiments, the method is further operable to receive asecond electronic message, determining whether the second electronicmessage includes an express indication from the user indicating that aclassification applies to the second electronic message, and, inresponse to determining that the second electronic message includes theexpress indication that the classification applies to the secondelectronic message, send the second electronic message to enforcer 208.An example is provided with respect to FIG. 3C above in whichclassification scanner 202 bypasses machine learning scanner 304 if theelectronic message includes an express indication from the user.

Certain embodiments of the present disclosure may provide one or moreadvantages. As an example, an advantage of certain embodiments allowsfor improving the accuracy of policies that determine whether to encryptor otherwise classify an electronic message. For example, in the past,companies would hire encryption service providers to develop a lexiconof words that would trigger encryption. These lexicons may be vulnerableto inaccuracies. For example, the encryption service providers would notnecessarily be aware of all the industry-specific terminology (such asmedical jargon) or company-specific terminology (such as secret projectnames within a company) that would warrant encrypting the electronicmessage. Additionally, the lexicon may become outdated, for example, ifthe company routinely generates secret project names but fails to addthe new secret project names to the lexicon. By contrast, embodiments ofthe present disclosure allow for using machine learning to continuallytrain classification models based on express indications from users thatare in a good position to know which attributes of an electronic messagewarrant a particular classification.

As another example, an advantage of certain embodiments allows fortraining and applying policies in a multi-tenant, hosted environment.For example, information can be gathered about the type of customer thatsent an electronic message in the hosted environment. This way, similarcustomers can be tied together. For example, the same machine learningpolicy can be applied to both customers, or similar customers may eachhave their own machine learning policy based on the same machinelearning policy (e.g., the same machine learning policy may be used as abaseline for similar customers and may be further trained for a specificcustomer, or some or all of the features from one customer's policiesmay be copied to a machine learning policy for a similar customer). Inother words, in a hosted environment, it may be possible to identifysimilar customers and use them to train the classification models foreach other, without affecting other customers. As an example, Hospital Aand Hospital B may be similar customers in a hosted environment. Amachine learning policy maintained by the host may learn to identifymedical terms associated with electronic messages that Hospital Aexpressly indicates to encrypt. The host may apply the machine learningpolicy to Hospital B so that electronic messages from Hospital Bcontaining the same medical terms will be encrypted even though HospitalB did not expressly request encryption, thereby providing increasedsecurity to electronic messages of Hospital B. In some embodiments,customers would be presented with an option of opting-in or opting-outof sharing a machine learning policy with other customers.

Modifications, additions, or omissions may be made to the systems andapparatuses disclosed herein without departing from the scope of theinvention. For example, although certain embodiments have describedusing encrypting, quarantining, archiving, and/or branding as examplesof classifications, other embodiments may use other classifications toensure that the electronic message complies with one or more policies,rules, user preferences, and/or other compliance criteria associatedwith the classification.

The components of the systems and apparatuses may be integrated orseparated. Moreover, the operations of the systems and apparatuses maybe performed by more, fewer, or other components. Additionally,operations of the systems and apparatuses may be performed using anysuitable logic comprising software, hardware, and/or other logic. Asused in this document, “each” refers to each member of a set or eachmember of a subset of a set.

Modifications, additions, or omissions may be made to the methodsdisclosed herein without departing from the scope of the invention. Themethods may include more, fewer, or other steps. Additionally, steps maybe performed in any suitable order.

Although this disclosure has been described in terms of certainembodiments, alterations and permutations of the embodiments will beapparent to those skilled in the art. Accordingly, the above descriptionof the embodiments does not constrain this disclosure. Other changes,substitutions, and alterations are possible without departing from thespirit and scope of this disclosure, as defined by the following claims.

What is claimed is:
 1. A method performed by a classification scanner,the method comprising: receiving an electronic message; determiningwhether the electronic message includes an express indication from theuser indicating that a classification applies to the electronic message;and in response to determining that the electronic message does notinclude the express indication that the classification applies to theelectronic message, sending the electronic message to a machine learningscanner, the machine learning scanner adapted to use a machine learningpolicy to determine whether the classification applies to the electronicmessage.
 2. The method of claim 1, wherein the machine learning scanneris adapted to send the electronic message to an enforcer adapted toapply the classification if the classification applies to the electronicmessage and to bypass the enforcer if the classification does not applyto the electronic message.
 3. The method of claim 1, further comprising:receiving a second electronic message; determining whether the secondelectronic message includes an express indication from the userindicating that a classification applies to the second electronicmessage; and in response to determining that the second electronicmessage includes the express indication that the classification appliesto the second electronic message, sending the second electronic messageto an enforcer adapted to apply the classification.
 4. The method ofclaim 1, wherein sending the electronic message to the machine learningscanner is further in response to determining that at least a thresholdnumber of electronic messages have been provided to a machine learningtrainer adapted to determine the machine learning policy used by themachine learning scanner.
 5. The method of claim 1, further comprising,in response to determining that one or more characteristics associatedwith a second user match one or more characteristics associated with theuser, instructing the machine learning scanner to apply the machinelearning policy to electronic messages associated with the second user.6. The method of claim 1, wherein the express indication comprises aflag configured by the user.
 7. The method of claim 1, wherein theexpress indication comprises a keyword that the classification scannerassociates with enabling the classification.
 8. The method of claim 1,wherein the express indication comprises administrator feedback.
 9. Oneor more non-transitory computer-readable media comprising logic that,when executed by processing circuitry, causes the processing circuitryto: receive an electronic message; determine whether the electronicmessage includes an express indication from the user indicating that aclassification applies to the electronic message; and in response todetermining that the electronic message does not include the expressindication that the classification applies to the electronic message,send the electronic message to a machine learning scanner, the machinelearning scanner adapted to use a machine learning policy to determinewhether the classification applies to the electronic message.
 10. Thenon-transitory computer-readable media of claim 9, wherein the machinelearning scanner is adapted to send the electronic message to anenforcer adapted to apply the classification if the classificationapplies to the electronic message and to bypass the enforcer if theclassification does not apply to the electronic message.
 11. Thenon-transitory computer-readable media of claim 9, the processingcircuitry further operable to: receive a second electronic message;determine whether the second electronic message includes an expressindication from the user indicating that a classification applies to thesecond electronic message; and in response to determining that thesecond electronic message includes the express indication that theclassification applies to the second electronic message, send the secondelectronic message to an enforcer adapted to apply the classification.12. The non-transitory computer-readable media of claim 9, whereinsending the electronic message to the machine learning scanner isfurther in response to determining that at least a threshold number ofelectronic messages have been provided to a machine learning traineradapted to determine the machine learning policy used by the machinelearning scanner.
 13. The non-transitory computer-readable media ofclaim 9, the logic further operable to, in response to determining thatone or more characteristics associated with a second user match one ormore characteristics associated with the user, instruct the machinelearning scanner to apply the machine learning policy to electronicmessages associated with the second user.
 14. The non-transitorycomputer-readable media of claim 9, wherein the express indicationcomprises at least one of: a flag configured by the user, a keyword thatthe classification scanner associates with enabling the classification,or administrator feedback.
 15. An apparatus, comprising: one or moreinterfaces; and processing circuitry operable to: receive an electronicmessage; determine whether the electronic message includes an expressindication from the user indicating that a classification applies to theelectronic message; and in response to determining that the electronicmessage does not include the express indication that the classificationapplies to the electronic message, send the electronic message to amachine learning scanner via the one or more interfaces, the machinelearning scanner adapted to use a machine learning policy to determinewhether the classification applies to the electronic message.
 16. Theapparatus of claim 15, wherein the machine learning scanner is adaptedto send the electronic message to an enforcer adapted to apply theclassification if the classification applies to the electronic messageand to bypass the enforcer if the classification does not apply to theelectronic message.
 17. The apparatus of claim 15, the processingcircuitry further operable to: receive a second electronic message;determine whether the second electronic message includes an expressindication from the user indicating that a classification applies to thesecond electronic message; and in response to determining that thesecond electronic message includes the express indication that theclassification applies to the second electronic message, send the secondelectronic message to an enforcer adapted to apply the classification.18. The apparatus of claim 15, wherein the electronic message is sent tothe machine learning scanner further in response to determining that atleast a threshold number of electronic messages have been provided to amachine learning trainer adapted to determine the machine learningpolicy used by the machine learning scanner.
 19. The apparatus of claim15, the processing circuitry further operable to, in response todetermining that one or more characteristics associated with a seconduser match one or more characteristics associated with the user,instruct the machine learning scanner to apply the machine learningpolicy to electronic messages associated with the second user.
 20. Theapparatus of claim 15, wherein the express indication comprises at leastone of: a flag configured by the user, a keyword that the classificationscanner associates with enabling the classification, or administratorfeedback.