DETECTION OF UNSOLICITED ELECTRONIC MESSAGES
First Claim
1. A method for detecting an unsolicited electronic message, comprising the steps of:
- receiving a plurality of electronic messages, including a first electronic message and a second electronic message, each electronic message including a header portion and a body portion;
tokenizing the body portion of the first electronic message;
searching the body portion of the first electronic message for pre-formatted text indicative of point-of-contact information;
searching at least a subset of the plurality of electronic messages, the subset including the second electronic message, for the pre-formatted text at the message server;
identifying the second electronic message as including the pre-formatted text based upon the searching of at least the subset of the electronic messages;
comparing the first electronic message to the second electronic message;
comparing the pre-formatted text to an unauthorized database;
subjecting the first electronic message to a manual review;
generating a delete signal and the unauthorized database based upon the manual review; and
flagging the first electronic message as unsolicited based at least upon the identifying of the second electronic message, the comparing of the first electronic message to the second electronic message, the comparing of the pre-formatted text to the unauthorized database, and/or the generating of the delete signal.
1 Assignment
0 Petitions
Accused Products
Abstract
The detection of unsolicited electronic messages is provided for by searching for pre-formatted text indicative of point-of-contact information in the body of an electronic message. A plurality of electronic messages is received, including a first electronic message and a second electronic message, each electronic message including a header portion and a body portion. The body portion of the first electronic message is searched for pre-formatted text indicative of point-of-contact information, and at least a subset of the plurality of electronic messages, the subset including the second electronic message, is searched for the pre-formatted text. The second electronic message is identified as including the pre-formatted text based upon the searching of at least the subset of the plurality of electronic messages, and the first electronic message is flagged as unsolicited based at least upon the identifying of the second electronic message.
-
Citations
36 Claims
-
1. A method for detecting an unsolicited electronic message, comprising the steps of:
-
receiving a plurality of electronic messages, including a first electronic message and a second electronic message, each electronic message including a header portion and a body portion;
tokenizing the body portion of the first electronic message;
searching the body portion of the first electronic message for pre-formatted text indicative of point-of-contact information;
searching at least a subset of the plurality of electronic messages, the subset including the second electronic message, for the pre-formatted text at the message server;
identifying the second electronic message as including the pre-formatted text based upon the searching of at least the subset of the electronic messages;
comparing the first electronic message to the second electronic message;
comparing the pre-formatted text to an unauthorized database;
subjecting the first electronic message to a manual review;
generating a delete signal and the unauthorized database based upon the manual review; and
flagging the first electronic message as unsolicited based at least upon the identifying of the second electronic message, the comparing of the first electronic message to the second electronic message, the comparing of the pre-formatted text to the unauthorized database, and/or the generating of the delete signal.
-
-
2. A method for detecting an unsolicited electronic message, comprising the steps of:
-
receiving a plurality of electronic messages, including a first electronic message and a second electronic message, each electronic message including a header portion and a body portion;
searching the body portion of the first electronic message for pre-formatted text indicative of point-of-contact information;
searching at least a subset of the plurality of electronic messages, the subset including the second electronic message, for the pre-formatted text;
identifying the second electronic message as including the pre-formatted text based upon the searching of at least the subset of the plurality of electronic messages; and
flagging the first electronic message as unsolicited based at least upon the identifying of the second electronic message. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A device for detecting an unsolicited electronic message, comprising:
-
a receiver module configured to receive a plurality of electronic messages, including a first electronic message and a second electronic message, each electronic message including a header portion and a body portion;
a search module configured to search the body portion of the first electronic message for pre-formatted text indicative of point-of-contact information, search at least a subset of the plurality of electronic messages, the subset including the second electronic message, for the pre-formatted text, and further configured to identify the second electronic message as including the pre-formatted text based upon the searching of at least the subset of the plurality of messages; and
an indicator module configured to flag the first electronic message as unsolicited based at least upon the identifying of the second electronic message. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A system for detecting an unsolicited electronic message, comprising:
-
a central database server, further comprising;
a central database receiver module configured to receive a first electronic message, a manual review module configured to manually review the first electronic message, a central database indicator module configured to generate the delete signal and an unauthorized database based upon the manual review of the first electronic message, and a central database transmitter module configured to transmit the delete signal and the unauthorized database; and
a message server, further comprising;
a message server receiver module configured to receive the unauthorized database, the delete signal, and a plurality of electronic messages, including the first electronic message and a second electronic message, each electronic message including a header portion and a body portion, a tokenizer module configured to tokenize the body portion of the first electronic message, a search module configured to search the body portion of the first electronic message for pre-formatted text indicative of point-of-contact information, search at least a subset of the plurality of electronic messages, the subset including the second electronic message, for the pre-formatted text, and further configured to identify the second electronic message as including the pre-formatted text based upon the searching of at least the subset of the plurality of electronic messages and finding the pre-formatted text in the body of the second electronic message, a comparison module configured to compare the first electronic message to the second electronic message, an automated review module configured compare the pre-formatted text to the unauthorized database, a message server indicator module configured to flag the first electronic message as unsolicited based at least upon the identifying of the second electronic message, upon the comparing of the first electronic message to the second electronic message, upon the comparing the pre-formatted text to the unauthorized database, and/or upon receiving the delete signal, and a message server transmitter module configured to transmit the first electronic message to said central database server.
-
-
32. A computer program product, tangibly stored on a computer-readable medium, for detecting an unsolicited electronic message, the product comprising instructions for permitting a computer to perform:
-
a receiving step for receiving a plurality of electronic messages, including a first electronic message and a second electronic message, each electronic message including a header portion and a body portion;
a first searching step for searching the body portion of the first electronic message for pre-formatted text indicative of point-of-contact information;
a second searching step for searching at least a subset of the plurality of electronic messages, the subset including the second electronic message, for the pre-formatted text;
an identifying step for identifying the second electronic message as including the pre-formatted text based upon the searching of at least the subset of the plurality of electronic messages; and
a flagging step for flagging the first electronic message as unsolicited based at least upon the identifying of the second electronic message. - View Dependent Claims (33, 34, 35, 36)
-
Specification