Email filtering methods and systems
First Claim
1. A computer-implemented email filtering method comprising:
- defining at least one heuristic that determines whether an incoming email message likely constitutes unsolicited email by considering an established delivery pattern that such unsolicited email typically exhibits when it is sent, wherein the at least one heuristic is independent of a message conveyed by any content of the email message, including content of the sender address field, subject field and message field, and wherein the pattern is associated with a percentage of specified recipient addresses of the email message that are invalid specified addresses;
applying the at least one heuristic to the email message; and
redirecting the email message if application of the at least one heuristic indicates that the email message likely constitutes unsolicited email, wherein redirecting comprises placing a copy of the email message at a location not dedicated to storage of just one user'"'"'s email.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments of the invention address two critical problems that current email service providers face. First, there is the problem of maintaining high levels of customer service when email server systems are inundated with spam. Second, there is the problem of reducing the system-wide impact that spam has on the email delivery system. Current embodiments are directed to determining whether an email message is an unwanted bulk email message without necessarily considering the message that is conveyed by any portion of the email message. Through analyses of patterns of delivery of these email messages, profiles are built that allow an email server to ascertain whether there is a likelihood that any one particular email message constitutes an unwanted email message. If an email message is determined to likely constitute an unwanted email message, then memory-saving measures are implemented. In preferred embodiments, one copy of the email message is saved at a central, shared location that can be accessed by each of the intended recipients. This avoids having to replicate the email message across the system for each of the recipients.
-
Citations
19 Claims
-
1. A computer-implemented email filtering method comprising:
-
defining at least one heuristic that determines whether an incoming email message likely constitutes unsolicited email by considering an established delivery pattern that such unsolicited email typically exhibits when it is sent, wherein the at least one heuristic is independent of a message conveyed by any content of the email message, including content of the sender address field, subject field and message field, and wherein the pattern is associated with a percentage of specified recipient addresses of the email message that are invalid specified addresses; applying the at least one heuristic to the email message; and redirecting the email message if application of the at least one heuristic indicates that the email message likely constitutes unsolicited email, wherein redirecting comprises placing a copy of the email message at a location not dedicated to storage of just one user'"'"'s email. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer-readable storage media comprising computer-executable instructions that, when executed, perform acts comprising:
-
defining one or more heuristics to determine whether an email message likely constitutes unsolicited email by considering one or more established delivery patterns that such unsolicited email typically exhibits when it is sent, wherein at least one of the heuristics is independent of the message conveyed by any content of the email message, including content of the email message'"'"'s sender address field, subject field and message field, and wherein at least one of the heuristics determines a percentage of specified recipient addresses of the email message that are invalid; applying the one or more heuristics to the email message; and redirecting the incoming email message if application of the one or more heuristics indicates that that the email message likely constitutes unsolicited email, wherein redirecting comprises placing a copy of the email message at a location not dedicated to storage of just one user'"'"'s email. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer-implemented method comprising:
-
receiving an email message at an email server that maintains inboxes for individual recipients; calculating a score for the email message at the server based on one or more parameters having parameter values associated with the likelihood of whether an email message constitutes an unwanted email message; comparing the score with a threshold value that defines a likelihood of whether an email message constitutes an unwanted email message, wherein the parameters and the threshold value are adjustable, wherein the score is based at least in part on one or both of; a number of invalid specified recipients of the email message, or a percentage of specified recipient addresses of the email message that are invalid; responsive to the email message exceeding the threshold value, placing a copy of the email message at a first location other than an individual storage location dedicated to an individual intended recipient of the email message; and sending a notification to intended recipients of the email message that a copy of an email message that was intended for them has been placed at the first location. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification