×

Systems and methods for distributing spam signatures

  • US 8,458,268 B1
  • Filed: 02/22/2010
  • Issued: 06/04/2013
  • Est. Priority Date: 02/22/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for distributing spam signatures, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying a set of spam emails;

    identifying a plurality of clients, each client in the plurality of clients having received at least one email in the set of spam emails;

    identifying at least one probable mailing list by analyzing email patterns in information received from the plurality of clients to identify at least one group of clients within the plurality of clients that have received a subset of the set of spam emails;

    receiving, from a client on the at least one probable mailing list, a request to pre-fetch spam signatures;

    in response to the request to pre-fetch spam signatures, creating a set of recipient-specific spam signatures specific to the client by identifying a set of spam emails sent to one or more additional clients on the at least one probable mailing list, wherein creating the set of recipient-specific spam signatures comprises;

    identifying a subset of clients in the plurality of clients that belong to the at least one probable mailing list;

    determining that the subset of clients have received an additional spam email;

    including the additional spam email in the set of spam emails such that a signature of the additional spam email is included in the set of recipient-specific spam signatures;

    transmitting the set of recipient-specific spam signatures to the client such that the client is enabled to filter spam messages sent to the one or more additional clients and skip making individual queries for emails identified within the set of recipient-specific spam signatures, wherein;

    at least one of the identifying, receiving, creating, and transmitting steps are performed by the computing device comprising the at least one processor.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×