×

Method to detect spam over internet telephony (SPIT)

  • US 8,141,152 B1
  • Filed: 12/18/2007
  • Issued: 03/20/2012
  • Est. Priority Date: 12/18/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for filtering unsolicited calls, comprising:

  • receiving a message addressed to an intended recipient;

    extracting, by a microprocessor, a plurality of feature vectors from content of the message, each of the plurality of feature vectors describing message content, wherein at least two of the plurality of feature vectors comprise different threshold distances;

    incorporating each of the extracted plurality of feature vectors into feature vectors from content of previously identified spam messages;

    calculating a first distance from a first of the plurality of feature vectors to each feature vector in an associated spam feature database;

    identifying a first feature vector in the associated spam feature database that is closest to the first of the plurality of feature vectors;

    determining the first distance to be a distance from the first identified feature vector to the first of the plurality of feature vectors;

    setting the first distance as a first threshold associated with the first of the plurality of feature vectors for determining that other features vectors are similar to the first of the plurality of feature vectors;

    calculating a second distance from a second of the plurality of feature vectors to each feature vector in the associated spam feature database;

    identifying a second feature vector in the associated spam feature database that is closest to the second of the plurality of feature vectors;

    determining the second distance to be a distance from the second identified feature vector to the second of the plurality of feature vectors; and

    setting the second distance as a second threshold associated with the second of the plurality of feature vectors for determining that other features vectors are similar to the second of the plurality of feature vectors, wherein the first and second thresholds are different;

    comparing, by the microprocessor, the extracted plurality of feature vectors to the feature vectors from the content of the previously identified spam messages;

    determining, by the microprocessor, whether each of the extracted plurality of feature vectors are within a threshold distance from at least one spam feature vector; and

    applying, by the microprocessor, following rules to results of the determining step;

    (i) in an event that each of the extracted plurality of feature vectors are within the threshold distance from at least one spam feature vector, adding the message to a list of previously identified spam messages; and

    (ii) in an event that the plurality of feature vectors are not within the threshold distance from at least one spam feature vector, allowing the message to be forwarded to the intended recipient.

View all claims
  • 22 Assignments
Timeline View
Assignment View
    ×
    ×