Apparatus and method for performing spam detection and filtering using an image history table
First Claim
1. A computer-implemented method for detecting spam images within a stream of messages comprising:
- extracting email messages having images with specified characteristics from the stream and performing the following operations only for those email messages;
generating a generic signature and an image-specific signature for a first images within the stream messages;
determining if the generic signature of the first image matches a generic signature of a second image;
determining if the first and second images with matching generic signatures have different image-specific signatures; and
including the matching generic signatures of the first and second images and one or more additional images in a spam filtering engine if a number of images with matching generic signatures but different image-specific signatures including the first and second images reaches a specified threshold value.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method are described for using different types of image fingerprints to detect spam. Specifically, one embodiment of the invention dynamically calculates both an image-specific signature (e.g., MD5 checksum) and a generic signature for each image and, if a specified number of images have the same generic signature but different image-specific signatures, then a feature is fired within a spam engine to indicate that the images are spam. By way of example, a computer-implemented method is described for detecting spam images within a stream of messages comprising: generating generic signatures and image-specific signatures for images within the stream of messages; determining if two or more images with matching generic signatures have different image-specific signatures; and updating a spam filtering engine to include the matching generic signatures if the number of images with matching generic signatures but different image-specific signatures reach a specified threshold value.
-
Citations
20 Claims
-
1. A computer-implemented method for detecting spam images within a stream of messages comprising:
-
extracting email messages having images with specified characteristics from the stream and performing the following operations only for those email messages; generating a generic signature and an image-specific signature for a first images within the stream messages; determining if the generic signature of the first image matches a generic signature of a second image; determining if the first and second images with matching generic signatures have different image-specific signatures; and including the matching generic signatures of the first and second images and one or more additional images in a spam filtering engine if a number of images with matching generic signatures but different image-specific signatures including the first and second images reaches a specified threshold value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for detecting spam images within a stream of messages, the system comprising a memory for storing program code and a processor for processing code to perform the operations of:
-
extracting email messages having images with specified characteristics from the stream and performing the following operations only for those email messages; generating a generic signature and an image-specific signature for a first images within the stream of messages; determining if the generic signature of the first image matches a generic signature of a second image; determining if the first and second images with matching generic signatures have different image-specific signatures; and including the matching generic signatures of the first and second images and one or more additional images in a spam filtering engine if a number of images with matching generic signatures but different image-specific signatures including the first and second images reaches a specified threshold value. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory machine-readable medium having stored thereon sequences of instructions which, when executed by a machine, causes the machine to perform the operations of:
-
extracting email messages having images with specified characteristics from the stream and performing the following operations only for those email messages; generating a generic signature and an image-specific signature for a first images within the stream of messages; determining if the generic signature of the first image matches a generic signature of a second image; determining if the first and second images with matching generic signatures have different image-specific signatures; and including the matching generic signatures of the first and second images and one or more additional images in a spam filtering engine if a number of images with matching generic signatures but different image-specific signatures including the first and second images reaches a specified threshold value. - View Dependent Claims (18, 19, 20)
-
Specification