System, method, and computer program product for reacting based on a frequency in which a compromised source communicates unsolicited electronic messages
First Claim
Patent Images
1. A method, comprising:
- identifying a source of at least two unsolicited electronic messages as compromised, wherein the source is identified as compromised based, at least, on a speed of a network connection associated with an Internet protocol (IP) address of the source, which communicated the at least two unsolicited electronic messages;
determining whether the network connection being used by the source is associated with a cable network connection, a digital subscriber line (DSL) network connection, or a dial-up network connection;
wherein a source is not identified as being compromised if the network connection is associated with a dial-up network connection;
calculating a frequency in which the source communicated the unsolicited electronic messages; and
reacting based on the calculated frequency, wherein the reacting includes displaying an image of a world map reflecting a location associated with the source.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for reacting based on a frequency in which a compromised source communicates unsolicited electronic messages. In use, a source of at least two unsolicited electronic messages is identified as compromised. Additionally, a frequency in which the source communicated the unsolicited electronic messages is calculated. Furthermore, a reaction is performed based on the calculated frequency.
48 Citations
21 Claims
-
1. A method, comprising:
- identifying a source of at least two unsolicited electronic messages as compromised, wherein the source is identified as compromised based, at least, on a speed of a network connection associated with an Internet protocol (IP) address of the source, which communicated the at least two unsolicited electronic messages;
determining whether the network connection being used by the source is associated with a cable network connection, a digital subscriber line (DSL) network connection, or a dial-up network connection;
wherein a source is not identified as being compromised if the network connection is associated with a dial-up network connection;
calculating a frequency in which the source communicated the unsolicited electronic messages; and
reacting based on the calculated frequency, wherein the reacting includes displaying an image of a world map reflecting a location associated with the source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 21)
- identifying a source of at least two unsolicited electronic messages as compromised, wherein the source is identified as compromised based, at least, on a speed of a network connection associated with an Internet protocol (IP) address of the source, which communicated the at least two unsolicited electronic messages;
-
18. A computer program product embodied on a tangible non-transitory computer readable medium, comprising:
- computer code for identifying a source of at least two unsolicited electronic messages as compromised, wherein the source is identified as compromised based, at least, on a speed of a network connection associated with an Internet protocol (IP) address of the source, which communicated the at least two unsolicited electronic messages;
determining whether the network connection being used by the source is associated with a cable network connection, a digital subscriber line (DSL) network connection, or a dial-up network connection;
wherein a source is not identified as being compromised if the network connection is associated with a dial-up network connection;
computer code for calculating a frequency in which the source communicated the unsolicited electronic messages; and
computer code for reacting based on the calculated frequency, wherein the reacting includes displaying an image of a world map reflecting a location associated with the source.
- computer code for identifying a source of at least two unsolicited electronic messages as compromised, wherein the source is identified as compromised based, at least, on a speed of a network connection associated with an Internet protocol (IP) address of the source, which communicated the at least two unsolicited electronic messages;
-
19. A system, comprising:
- a processor coupled to a memory and operable to cooperate such that the system can exchange information in a network, the system being configured for;
identifying a source of at least two unsolicited electronic messages as compromised, wherein the source is identified as compromised based, at least, on a speed of a network connection associated with an Internet protocol (IP) address of the source, which communicated the at least two unsolicited electronic messages;
determining whether the network connection being used by the source is associated with a cable network connection, a digital subscriber line (DSL) network connection, or a dial-up network connection;
wherein a source is not identified as being compromised if the network connection is associated with a dial-up network connection;
calculating a frequency in which the source communicated the unsolicited electronic messages, and reacting based on the calculated frequency, wherein the reacting includes displaying an image of a world map reflecting a location associated with the source. - View Dependent Claims (20)
- a processor coupled to a memory and operable to cooperate such that the system can exchange information in a network, the system being configured for;
Specification