Method and apparatus for detecting spam in email messages and email attachments
First Claim
Patent Images
1. A method comprising:
- a computer system receiving an email message;
the computer system performing a plurality of demangling operations on the received email message, wherein each demangling operation identifies a different type of obfuscation technique, and wherein said performing includes modifying content of the received email message;
the computer system counting a number of the performed plurality of demangling operations that indicate a presence of noise in the received email message; and
the computer system utilizing the counted number of demangling operations to determine whether the email message is indicative of spam.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for a character-based document comparison are described. In one embodiment, the method includes receiving an email message and determining a level of noise present in the message. The level of noise present in the email message is then utilized to determine whether the message is indicative of spam.
193 Citations
23 Claims
-
1. A method comprising:
-
a computer system receiving an email message; the computer system performing a plurality of demangling operations on the received email message, wherein each demangling operation identifies a different type of obfuscation technique, and wherein said performing includes modifying content of the received email message; the computer system counting a number of the performed plurality of demangling operations that indicate a presence of noise in the received email message; and the computer system utilizing the counted number of demangling operations to determine whether the email message is indicative of spam. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system comprising:
-
a processor; a memory storing program instructions executable by the processor to; receive an email message; perform a plurality of demangling operations on the received email message, including modifying content of the received email message, wherein each demangling operation identifies a different type of obfuscation technique; count a number of the performed plurality of demangling operations that indicate a presence of noise in the received email message; and utilize the counted number of demangling operations to determine whether the email message is indicative of spam. - View Dependent Claims (17, 18, 19)
-
-
11. A non-transitory computer readable storage medium storing program instructions that are executable to:
-
receive an email message; perform a plurality of demangling operations on the received email message, wherein each demangling operation identifies a different type of obfuscation technique, and wherein one or more of the demangling operations modifies the received email message; count a number of the performed plurality of demangling operations that indicate a presence of noise in the received email message; and utilize the counted number of demangling operations to determine whether the email message is indicative of spam. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
20. A non-transitory computer readable storage medium storing program instructions that are executable to:
-
count a number of different obfuscation techniques present in a received email message; assign a first spam weight value in response to the counted number being within a first range; and determine whether the received email message is a spam email message, including by utilizing the first spam weight value. - View Dependent Claims (21, 22, 23)
-
Specification