Messaging spam detection
First Claim
1. A method for detecting an unsolicited message, comprising:
- detecting a call to action pattern in a message received according one of a plurality of communication protocols;
determining that the call to action pattern is included in a number of other received messages that exceeds a threshold number;
temporarily preventing the message from being delivered; and
notifying a human operator to review the message to determine whether the message comprises an unsolicited message.
2 Assignments
0 Petitions
Accused Products
Abstract
Detecting unsolicited messages (spam) by aggregating information across multiple recipients and/or across the same or differing messaging protocols. Multiple messages are analyzed to detect a call to action pattern that specifies a target communication address with which the recipients are requested to communicate, such as an email address, an Internet address, a telephone number, and the like. Once a frequency threshold of messages containing the call to action pattern is reached, subsequent messages are temporarily quarantined for evaluation by a human operator. If the human determines that the messages are not spam, the human can release the quarantined messages, and indicate that future messages with the call to action pattern are not to be delayed. Conversely, if the human determines that the messages are spam, the human can delete the messages in quarantine, and indicate that all future messages with that call to action pattern are to be deleted automatically.
174 Citations
20 Claims
-
1. A method for detecting an unsolicited message, comprising:
-
detecting a call to action pattern in a message received according one of a plurality of communication protocols;
determining that the call to action pattern is included in a number of other received messages that exceeds a threshold number;
temporarily preventing the message from being delivered; and
notifying a human operator to review the message to determine whether the message comprises an unsolicited message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for detecting an unsolicited message, comprising:
-
a processor;
a communication interface in communication with the processor and in communication with at least one network conforming to at least one of a plurality of communication protocols;
a user interface in communication with the processor and enabling a human operator to review and input information; and
a memory in communication with the processor and storing data and instructions that cause the processor to perform a plurality of operations including;
detecting a call to action pattern in a message received according the at least one of the plurality of communication protocols;
determining that the call to action pattern is included in a number of other received messages that exceeds a threshold number;
temporarily preventing the message from being delivered; and
notifying a human operator to review the message to determine whether the message comprises an unsolicited message. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A system for detecting spam, comprising:
-
a message receiver that can receive a message according to at least one of a plurality of communication protocols;
a spam filter in communication with the message receiver and detecting a call to action pattern in the message and in at least one other message; and
a quarantine module that enables a human operator to determine whether the message is spam. - View Dependent Claims (20)
-
Specification