SPAM DETECTION
First Claim
1. A method of filtering spam messages for cellular network subscribers, comprising:
- receiving a message at a decoy subscriber number; and
determining that the message received at the decoy subscriber number is spam.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems of filtering spam messages for cellular network subscribers are provided that may include receiving a message from a decoy subscriber number. The method and systems may further be adapted to determine whether the message at the decoy subscriber number may be spam. If the message at the decoy number tends to be spam, the message may be output to a filtering service for further analysis. In the final analysis if a message is determined to be spam, then new rules may be created and distributed to front end spam and/or virus engines to restrict such traffic from reaching subscribers.
-
Citations
17 Claims
-
1. A method of filtering spam messages for cellular network subscribers, comprising:
-
receiving a message at a decoy subscriber number; and determining that the message received at the decoy subscriber number is spam. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A spam filter component for filtering spam messages on a cellular network, comprising:
-
a first decoy module, wherein the first decoy module receives one or more messages from a decoy subscriber number; a spam library module adapted to store information for determining whether a message is spam, wherein the spam library module comprises one or more rules; a spam processor component in operative communication with the first decoy module and the spam library module, wherein the spam processor component compares information in the message received by the first decoy module with the rules in the spam library module and, if the message includes information corresponding to the rules, outputs the message as spam. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method of determining whether a message is spam, comprising:
-
receiving a message from a decoy subscriber number; comparing information in the received message to one or more rules stored in a spam library; flagging the received message as spam if information in the received message corresponds to the rules stored in the spam library; and outputting the flagged message to a spam filtering service. - View Dependent Claims (14, 15, 16, 17)
-
Specification