Systems and methods for distributing spam signatures
First Claim
1. A computer-implemented method for distributing spam signatures, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- identifying a set of spam emails;
identifying a plurality of clients, each client in the plurality of clients having received at least one email in the set of spam emails;
identifying at least one probable mailing list by analyzing email patterns in information received from the plurality of clients to identify at least one group of clients within the plurality of clients that have received a subset of the set of spam emails;
receiving, from a client on the at least one probable mailing list, a request to pre-fetch spam signatures;
in response to the request to pre-fetch spam signatures, creating a set of recipient-specific spam signatures specific to the client by identifying a set of spam emails sent to one or more additional clients on the at least one probable mailing list, wherein creating the set of recipient-specific spam signatures comprises;
identifying a subset of clients in the plurality of clients that belong to the at least one probable mailing list;
determining that the subset of clients have received an additional spam email;
including the additional spam email in the set of spam emails such that a signature of the additional spam email is included in the set of recipient-specific spam signatures;
transmitting the set of recipient-specific spam signatures to the client such that the client is enabled to filter spam messages sent to the one or more additional clients and skip making individual queries for emails identified within the set of recipient-specific spam signatures, wherein;
at least one of the identifying, receiving, creating, and transmitting steps are performed by the computing device comprising the at least one processor.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for distributing spam signatures may include identifying a set of spam e-mails. The computer-implemented method may also include identifying a plurality of clients, each client in the plurality of clients having received at least one e-mail in the set of spam e-mails. The computer-implemented method may further include identifying at least one mailing list by identifying at least one group of clients within the plurality of clients that have received a subset of the set of spam e-mails. The computer-implemented method may additionally include identifying at least one additional spam e-mail sent via the mailing list. The computer-implemented method may also include transmitting information identifying the additional spam e-mail to at least one client on the mailing list. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
19 Claims
-
1. A computer-implemented method for distributing spam signatures, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
identifying a set of spam emails; identifying a plurality of clients, each client in the plurality of clients having received at least one email in the set of spam emails; identifying at least one probable mailing list by analyzing email patterns in information received from the plurality of clients to identify at least one group of clients within the plurality of clients that have received a subset of the set of spam emails; receiving, from a client on the at least one probable mailing list, a request to pre-fetch spam signatures; in response to the request to pre-fetch spam signatures, creating a set of recipient-specific spam signatures specific to the client by identifying a set of spam emails sent to one or more additional clients on the at least one probable mailing list, wherein creating the set of recipient-specific spam signatures comprises; identifying a subset of clients in the plurality of clients that belong to the at least one probable mailing list; determining that the subset of clients have received an additional spam email; including the additional spam email in the set of spam emails such that a signature of the additional spam email is included in the set of recipient-specific spam signatures; transmitting the set of recipient-specific spam signatures to the client such that the client is enabled to filter spam messages sent to the one or more additional clients and skip making individual queries for emails identified within the set of recipient-specific spam signatures, wherein; at least one of the identifying, receiving, creating, and transmitting steps are performed by the computing device comprising the at least one processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for distributing spam signatures, the system comprising:
-
an identification module programmed to; identify a set of spam emails; identify a plurality of clients, each client in the plurality of clients having received at least one email in the set of spam emails; an association module programmed to; identify at least one probable mailing list by analyzing email patterns in information received from the plurality of clients to identify at least one group of clients within the plurality of clients that have received a subset of the set of spam emails; receive, from a client on the at least one probable mailing list, a request to pre-fetch spam signatures; in response to the request to pre-fetch spam signatures, create a set of recipient-specific spam signatures specific to the client by identifying a set of spam emails sent to one or more additional clients on the at least one probable mailing list, wherein the association module is programmed to create the set of recipient-specific spam signatures by; identifying a subset of clients in the plurality of clients that belong to the at least one probable mailing list; determining that the subset of clients have received an additional spam email; including the additional spam email in the set of spam emails such that a signature of the additional spam email is included in the set of recipient-specific spam signatures; a transmission module programmed to transmit the set of recipient-specific spam signatures to the client such that the client is enabled to filter spam messages sent to the one or more additional clients and skip making individual queries for emails identified within the set of recipient-specific spam signatures; at least one processor configured to execute the identification module, the association module, and the transmission module. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify a set of spam emails; identify a plurality of clients, each client in the plurality of clients having received at least one email in the set of spam emails; identify at least one probable mailing list by analyzing email patterns in information received from the plurality of clients to identify at least one group of clients within the plurality of clients that have received a subset of the set of spam emails; receive, from a client on the at least one probable mailing list, a request to pre-fetch spam signatures; in response to the request to pre-fetch spam signatures, create a set of recipient-specific spam signatures specific to the client by identifying a set of spam emails sent to one or more additional clients on the at least one probable mailing list, wherein creating the set of recipient-specific spam signatures comprises; identifying a subset of clients in the plurality of clients that belong to the at least one probable mailing list; determining that the subset of clients have received an additional spam email; including the additional spam email in the set of spam emails such that a signature of the additional spam email is included in the set of recipient-specific spam signatures; transmit the set of recipient-specific spam signatures to the client such that the client is enabled to filter spam messages sent to the one or more additional clients and skip making individual queries for emails identified within the set of recipient-specific spam signatures. - View Dependent Claims (19)
-
Specification