Method and system for employing phone number analysis to detect and prevent spam and e-mail scams
First Claim
1. A computing system implemented process for identifying scam e-mails using phone number analysis comprising:
- defining one or more potential scam e-mail identification rules;
storing data representing the one or more potential scam e-mail identification rules in a data storage device;
defining one or more phone number detection parameters;
storing data representing the one or more phone number detection parameters in a data storage device;
using one or more processors associated with at least one computing system to scan e-mails directed to a given computing system using the one or more phone number detection parameters to identify any potential phone numbers in the e-mails directed to the given computing system;
identifying one or more potential phone numbers in at least one of the e-mails directed to the given computing system;
using the one or more processors associated with at least one computing system to normalize the identified one or more potential phone numbers in at least one of the e-mails directed to the given computing system;
using the one or more processors associated with at least one computing system to analyze the normalized one or more potential phone numbers in at least one of the e-mails directed to the given computing system using the data representing the one or more potential scam e-mail identification rules to identify potential scam phone numbers of the one or more potential phone numbers in at least one of the e-mails directed to the given computing system; and
applying the one or more potential scam e-mail identification rules to the at least one of the e-mails directed to the given computing system that includes the identified potential scam phone numbers to transform a status of the at least one of the e-mails directed to the given computing system that includes the identified potential scam phone numbers to the status of potential scam e-mail.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for identifying scam e-mails using phone number analysis whereby a set of potential scam e-mail identification rules is created and data representing the potential scam e-mail identification rules is stored in a data storage device. Incoming e-mails are then scanned under the direction of one or more processors by an e-mail security system to detect phone numbers present in the incoming e-mails using one or more phone number detection parameters. Any potential phone numbers detected using the one or more phone number detection parameters are then normalized. In one embodiment, the normalized potential phone numbers are then analyzed using the potential scam e-mail identification rules to identify potential scam phone numbers. The e-mails including the identified potential scam phone numbers then have their status transformed to that of potential scam e-mails.
54 Citations
20 Claims
-
1. A computing system implemented process for identifying scam e-mails using phone number analysis comprising:
-
defining one or more potential scam e-mail identification rules; storing data representing the one or more potential scam e-mail identification rules in a data storage device; defining one or more phone number detection parameters; storing data representing the one or more phone number detection parameters in a data storage device; using one or more processors associated with at least one computing system to scan e-mails directed to a given computing system using the one or more phone number detection parameters to identify any potential phone numbers in the e-mails directed to the given computing system; identifying one or more potential phone numbers in at least one of the e-mails directed to the given computing system; using the one or more processors associated with at least one computing system to normalize the identified one or more potential phone numbers in at least one of the e-mails directed to the given computing system; using the one or more processors associated with at least one computing system to analyze the normalized one or more potential phone numbers in at least one of the e-mails directed to the given computing system using the data representing the one or more potential scam e-mail identification rules to identify potential scam phone numbers of the one or more potential phone numbers in at least one of the e-mails directed to the given computing system; and applying the one or more potential scam e-mail identification rules to the at least one of the e-mails directed to the given computing system that includes the identified potential scam phone numbers to transform a status of the at least one of the e-mails directed to the given computing system that includes the identified potential scam phone numbers to the status of potential scam e-mail. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for identifying scam e-mails using phone number analysis comprising:
-
a user computing system; a security system associated with the user computing system; a security system provider computing system; a least one processor associated with the security system provider computing system, the at least one processor associated with the security system provider computing system executing at least part of a computing system implemented process for identifying scam e-mails using phone number analysis, the computing system implemented process for identifying scam e-mails using phone number analysis comprising; defining one or more potential scam e-mail identification rules; storing data representing the one or more potential scam e-mail identification rules in a data storage device; defining one or more phone number detection parameters; storing data representing the one or more phone number detection parameters in a data storage device; using the at least one processor associated with the security service provider computing system to scan e-mails directed to the user computing system using the one or more phone number detection parameters to identify any potential phone numbers in the e-mails directed to the user computing system; identifying one or more potential phone numbers in at least one of the e-mails directed to the user computing system; using the at least one processor associated with the security system provider computing system to normalize the identified one or more potential phone numbers in at least one of the e-mails directed to the user computing system; using the at least one processor associated with the security system provider computing system to analyze the normalized one or more potential phone numbers in at least one of the e-mails directed to the user computing system using the data representing the one or more potential scam e-mail identification rules to identify potential scam phone numbers of the one or more potential phone numbers in at least one of the e-mails directed to the user computing system; and applying the one or more potential scam e-mail identification rules to the at least one of the e-mails directed to the user computing system that includes the identified potential scam phone numbers to transform a status of the at least one of the e-mails directed to the user computing system that includes the identified potential scam phone numbers to the status of potential scam e-mail. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system for identifying scam e-mails using phone number analysis comprising:
-
a user computing system; a least one processor associated with the user computing system, the at least one processor associated with the user computing system executing at least part of a computing system implemented process for identifying scam e-mails using phone number analysis, the computing system implemented process for identifying scam e-mails using phone number analysis comprising; defining one or more potential scam e-mail identification rules; storing data representing the one or more potential scam e-mail identification rules in a data storage device; defining one or more phone number detection parameters; storing data representing the one or more phone number detection parameters in a data storage device; using the at least one processor associated with the user computing system to scan e-mails directed to the user computing system using the one or more phone number detection parameters to identify any potential phone numbers in the e-mails directed to the user computing system; identifying one or more potential phone numbers in at least one of the e-mails directed to the user computing system; using the at least one processor associated with the user computing system to normalize the identified one or more potential phone numbers in at least one of the e-mails directed to the user computing system; using the at least one processor associated with the user computing system to analyze the normalized one or more potential phone numbers in at least one of the e-mails directed to the user computing system using the data representing the one or more potential scam e-mail identification rules to identify potential scam phone numbers of the one or more potential phone numbers in at least one of the e-mails directed to the user computing system; and applying the one or more potential scam e-mail identification rules to the at least one of the e-mails directed to the user computing system that includes the identified potential scam phone numbers to transform a status of the at least one of the e-mails directed to the user computing system that includes the identified potential scam phone numbers to the status of potential scam e-mail. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification