REPUTATIONAL AND BEHAVIORAL SPAM MITIGATION
First Claim
1. A method for identifying abusive message objects used within messages, comprising:
- defining a message object list comprising one or more message objects used within messages of a message communication medium, a message object within the message object list associated with an abuse value;
for respective abuse reports associated with one or more users of the message communication medium;
determining a reported user associated with an abuse report;
identifying one or more messages sent by the reported user, an identified message comprising at least one message object; and
incrementing one or more abuse values within the message object list for message objects associated with one or more identified messages sent by the reported user; and
defining an abusive message object list based upon message objects within the message object list having abuse values above a threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
One or more techniques and/or systems are provided for identifying abusive message objects (e.g., URLs, email addresses, etc.), abusive infrastructure components and/or abusive users of a message communication medium(s). In particular, abusive message objects may be identified by aggregating abuse reports to assign abuse values to message objects used within messages by reported users identified within the abuse reports. Abusive users may be identified based upon (e.g., unreported) users that have sent messages comprising message objects identified as abusive. Users may also be identified as abusive users based upon account usage patterns within the message communication medium(s) (e.g., a broadcast usage pattern where a user sends a large number of messages, but receives few responses). Additionally, infrastructure components associated with abusive users may be identified as abusive infrastructure components. In this way, abusive content, such as spam, may be identified and/or mitigated within the message communication medium(s).
-
Citations
20 Claims
-
1. A method for identifying abusive message objects used within messages, comprising:
-
defining a message object list comprising one or more message objects used within messages of a message communication medium, a message object within the message object list associated with an abuse value; for respective abuse reports associated with one or more users of the message communication medium; determining a reported user associated with an abuse report; identifying one or more messages sent by the reported user, an identified message comprising at least one message object; and incrementing one or more abuse values within the message object list for message objects associated with one or more identified messages sent by the reported user; and defining an abusive message object list based upon message objects within the message object list having abuse values above a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer readable medium comprising computer executable instructions that when executed via a processing unit perform a method for identifying an abusive user of a message communication medium, comprising:
-
assigning an abuse value to a user based upon a broadcast usage pattern of the user within a message communication medium, the broadcast usage pattern indicating that the user sends a number of messages without action by recipient users above a threshold; and identifying the user as an abusive user based upon the abuse value being above a threshold. - View Dependent Claims (14, 15, 16)
-
-
17. A system for identifying abusive message objects used within messages by users of a message communication medium, comprising:
-
a message object identifier configured to; define a message object list comprising one or more message objects used within messages of a message communication medium, a message object within the message object list associated with an abuse value; an abusive message object identifier configured to; for respective abuse reports associated with one or more users of the message communication medium; determine a reported user associated with an abuse report; identify one or more messages sent by the reported user, an identified message comprising at least one message object; and increment one or more abuse values within the message object list for message objects associated with one or more identified messages sent by the reported user; and define an abusive message object list based upon message objects within the message object list having abuse values above a threshold. - View Dependent Claims (18, 19, 20)
-
Specification