Undesirable email determination
First Claim
Patent Images
1. A method for preventing spam dissemination, comprising:
- monitoring an Internet communication by a user;
determining whether the monitored Internet communication includes spam-related data; and
in response to determining that the monitored Internet communication includes spam-related data, determining whether the user is a probable victim by determining whether the user is communicating via an infected device.
1 Assignment
0 Petitions
Accused Products
Abstract
Included is a method for preventing spam dissemination. The method can include monitoring an Internet communication by a user, determining whether the monitored Internet communication includes a spam-related communication, and determining whether the user is a probable victim by determining whether the user is communicating via an infected device.
-
Citations
20 Claims
-
1. A method for preventing spam dissemination, comprising:
-
monitoring an Internet communication by a user;
determining whether the monitored Internet communication includes spam-related data; and
in response to determining that the monitored Internet communication includes spam-related data, determining whether the user is a probable victim by determining whether the user is communicating via an infected device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A traffic analyzer configured to monitor communications for spam-related data, the traffic analyzer comprising:
-
logic configured to monitor an Internet communication by a user;
logic configured to determine whether the monitored Internet communication includes spam-related data; and
logic configured to, in response to determining that the monitored Internet communication includes spam-related data, determine whether the user is a probable victim by determining whether the user is communicating via an infected device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer readable medium for preventing the dissemination of spam, comprising:
-
logic configured to monitor an Internet communication associated with a user;
logic configured to determine whether the monitored Internet communication includes spam-related data; and
logic configured to, in response to determining that the monitored Internet communication includes spam-related data, determine whether the user is a probable victim by determining whether the user is communicating via an infected device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification