System and method for filtering spam messages utilizing URL filtering module
First Claim
Patent Images
1. A method, comprising:
- a computer system receiving a message identified as being a spam message;
the computer system extracting, from the received message, a first uniform resource locator (URL), wherein the first URL includes a host component and a path component;
the computer system generating a first hash value based on the host component, but not the path component, of the first URL;
the computer system generating a second hash value based on the host component and the path component of the first URL;
the computer system using the generated first hash value to create a first spam filter, wherein the first spam filter is usable to determine whether a subsequently received message includes the host component of the first URL; and
the computer system using the generated second hash value to create a second spam filter, wherein the second spam filter is usable to determine whether the subsequently received message includes the host component and the path component of the first URL.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for filtering spam messages utilizing a URL filtering module are described. In one embodiment, the method includes detecting, in an incoming message, data indicative of a URL and comparing the URL from the incoming message with URLs characterizing spam. The method further includes determining whether the incoming message is spam based on the comparison of the URL from the incoming message with the URLs characterizing spam.
-
Citations
16 Claims
-
1. A method, comprising:
-
a computer system receiving a message identified as being a spam message; the computer system extracting, from the received message, a first uniform resource locator (URL), wherein the first URL includes a host component and a path component; the computer system generating a first hash value based on the host component, but not the path component, of the first URL; the computer system generating a second hash value based on the host component and the path component of the first URL; the computer system using the generated first hash value to create a first spam filter, wherein the first spam filter is usable to determine whether a subsequently received message includes the host component of the first URL; and the computer system using the generated second hash value to create a second spam filter, wherein the second spam filter is usable to determine whether the subsequently received message includes the host component and the path component of the first URL. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium having program instructions stored thereon that are executable by a computer system to cause the computer system to perform operations comprising:
-
receiving a message identified as being a spam message; extracting, from the received message, a first uniform resource locator (URL), wherein the first URL includes a host component and a path component; generating a first hash value based on the host component, but not the path component, of the first URL; generating a second hash value based on the host component and the path component of the first URL; using the generated first hash value to create a first spam filter, wherein the first spam filter is usable to determine whether a subsequently received message includes the host component of the first URL; and using the generated second hash value to create a second spam filter, wherein the second spam filter is usable to determine whether the subsequently received message includes the host component and the path component of the first URL. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification