Diminishing false positive classifications of unsolicited electronic-mail
First Claim
Patent Images
1. A method for diminishing false positive classifications of unsolicited electronic-mail, the method comprising:
- maintaining a database of signatures in memory, each of the signatures associated with unsolicited electronic-mail to be excluded from an end-user mail client and based on at least a set of message classifiers used to identify distinguishing properties, at least a portion of the signatures generated based on one of the distinguishing properties using a transformation method;
intercepting an electronic-mail message at a network appliance coupled to an electronic-mail server, the electronic-mail message intercepted prior to receipt of the electronic-mail message by the electronic-mail server; and
executing instructions stored in memory, wherein execution of the instructions by a processor;
applies a set of message classifiers to the electronic-mail message, the set of message classifiers comprising;
at least one rule-based heuristic;
at least one content filter used to identify non-essential and decoy information; and
user-generated feedback; and
generates one or more signatures using the transformation method, wherein one or more signatures are indicative of unsolicited electronic-mail based on at least the set of message classifiers applied to the electronic-mail message, and wherein-the one or more signatures are applied to subsequent incoming electronic-mail messages, wherein unsolicited electronic-mail may be identified and false positive identifications of normal electronic-mail messages are reduced.
23 Assignments
0 Petitions
Accused Products
Abstract
A system and method for diminishing false positive classifications of unsolicited electronic-mail is disclosed. An electronic-mail message is received whereby a set of message classifiers are applied the message. One or more signatures indicative of unsolicited electronic-mail based on at least the application of the aforementioned classifiers is generated. The one or more signatures are applied to subsequently incoming electronic-mail messages whereby unsolicited electronic-mail may be more accurately identified and false positive identification of normal electronic-mail messages are reduced.
-
Citations
19 Claims
-
1. A method for diminishing false positive classifications of unsolicited electronic-mail, the method comprising:
-
maintaining a database of signatures in memory, each of the signatures associated with unsolicited electronic-mail to be excluded from an end-user mail client and based on at least a set of message classifiers used to identify distinguishing properties, at least a portion of the signatures generated based on one of the distinguishing properties using a transformation method; intercepting an electronic-mail message at a network appliance coupled to an electronic-mail server, the electronic-mail message intercepted prior to receipt of the electronic-mail message by the electronic-mail server; and executing instructions stored in memory, wherein execution of the instructions by a processor; applies a set of message classifiers to the electronic-mail message, the set of message classifiers comprising; at least one rule-based heuristic; at least one content filter used to identify non-essential and decoy information; and user-generated feedback; and generates one or more signatures using the transformation method, wherein one or more signatures are indicative of unsolicited electronic-mail based on at least the set of message classifiers applied to the electronic-mail message, and wherein-the one or more signatures are applied to subsequent incoming electronic-mail messages, wherein unsolicited electronic-mail may be identified and false positive identifications of normal electronic-mail messages are reduced. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for diminishing false positive classifications of unsolicited electronic-mail, the system comprising:
-
a database of signatures, each of the signatures associated with unsolicited electronic-mail to be excluded from an end-user mail client and based on at least a set of message classifiers used to identify distinguishing properties, at least a portion of the signatures generated based on one of the distinguishing properties using a transformation method; an electronic-mail server coupled to a network appliance, the network appliance configured to intercept unsolicited electronic-mail as identified by a signature from the database of signatures prior to receipt of the electronic-mail by the mail server; and an end-user mail client coupled to the electronic-mail server, the electronic-mail server configured to receive electronic-mail not identified as unsolicited electronic-mail by one or more of the signatures from the database of signatures. - View Dependent Claims (18)
-
-
19. A non-transitory computer-readable storage medium having embodied thereon at least one program, the at least one program being executable by a computer to perform a method for diminishing false positive message classification of unsolicited electronic-mail, the method comprising:
-
maintaining a database of signatures, each of the signatures associated with unsolicited electronic-mail to be excluded from an end-user mail client and based on at least a set of message classifiers used to identify distinguishing properties, at least a portion of the signatures generated based on one of the distinguishing properties using a transformation method; applying a set of message classifiers to an electronic-mail message intercepted prior to receipt of the electronic-mail message by an electronic-mail server, the set of message classifiers comprising; at least one rule-based heuristic, at least one content filter used to identify non-essential and decoy information, and user-generated feedback; generating one or more signatures using the transformation method, wherein the one or more signatures are indicative of unsolicited electronic-mail based on at least the set of message classifiers applied to the electronic-mail message; and applying the one or more signatures to subsequent incoming electronic-mail messages, wherein unsolicited electronic-mail may be identified and false positive identifications of normal electronic-mail messages are reduced.
-
Specification