HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF UNWANTED E-MAIL
First Claim
Patent Images
1. A mail server, comprising:
- one or more hash memories configured to store count values associated with a plurality of hash values; and
a hash processor configured to;
receive an e-mail message,hash one or more portions of the e-mail message to generate hash values, as generated hash values,increment the count values corresponding to the generated bash values, as incremented count values, anddetermine whether the e-mail message is a potentially unwanted e-mail message based on the incremented count values.
1 Assignment
0 Petitions
Accused Products
Abstract
A system (120) detects transmission of potentially unwanted e-mail messages. The system (120) may receive e-mail messages and generate hash values based on one or more portions of the e-mail messages. The system (120) may then determine whether the generated hash values match hash values associated with prior e-mail messages. The system (120) may determine that one of the e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the e-mail message match one or more of the hash values associated with the prior e-mail messages.
-
Citations
30 Claims
-
1. A mail server, comprising:
-
one or more hash memories configured to store count values associated with a plurality of hash values; and a hash processor configured to; receive an e-mail message, hash one or more portions of the e-mail message to generate hash values, as generated hash values, increment the count values corresponding to the generated bash values, as incremented count values, and determine whether the e-mail message is a potentially unwanted e-mail message based on the incremented count values. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A mail server, comprising:
-
one or more hash memories configured to store count values associated with a plurality of hash values; and a hash processor configured to; receive e-mail messages, hash one or more portions of the received e-mail messages to generate hash values, as generated hash values, increment the count values corresponding to the generated hash values, as incremented count values, and generate suspicion scores for the received e-mail messages based on the incremented count values. - View Dependent Claims (27, 28, 29, 30)
-
Specification