Method and system for handling unwanted email messages
First Claim
1. A method, comprising:
- scanning, in response to a determination that a first time period has ended, email messages from an email address of a sender previously identified as a source of spam;
placing the email address of the sender in a clean list such that scanning software is subsequently prevented from performing a full scan of additional messages from the email address of the sender, the placing performed in response to a determination that a count of the email messages that are clean has exceeded a threshold over a second time period, the second time period similar or less than the first time period; and
placing the email address of the sender in a spammers list in response to a determination that a count of the email messages that are spam has exceeded a threshold over a third time period greater than the second time period, wherein the spammers list is replicated to another server.
9 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and computer program product for scanning incoming emails reduces the server resources needed, which improves server throughput and reduces costs. A method for processing incoming email messages comprised the steps of scanning incoming email messages to obtain an address of a sender of each incoming email message and to determine whether the email message is spam, for each email message that is determined to be spam, incrementing a count of email messages that are spam for a sender of the email message, determining that a count of email messages that are spam for a sender of an email message has exceeded a threshold, and thereafter, discarding all incoming email messages from the sender for which the count of email messages that are spam for a sender of an email message has exceeded a threshold without scanning the email messages to determine whether they are spam.
75 Citations
24 Claims
-
1. A method, comprising:
-
scanning, in response to a determination that a first time period has ended, email messages from an email address of a sender previously identified as a source of spam; placing the email address of the sender in a clean list such that scanning software is subsequently prevented from performing a full scan of additional messages from the email address of the sender, the placing performed in response to a determination that a count of the email messages that are clean has exceeded a threshold over a second time period, the second time period similar or less than the first time period; and placing the email address of the sender in a spammers list in response to a determination that a count of the email messages that are spam has exceeded a threshold over a third time period greater than the second time period, wherein the spammers list is replicated to another server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
scanning email messages from an email address of a sender previously identified as a source of spam; determining that a count of the email messages that are clean has exceeded a threshold over a predefined time period; placing the email address of the sender in a clean list such that scanning software is subsequently prevented from performing a full scan of additional messages from the email address of the sender; obtaining respective email addresses for each of a plurality of email messages; evaluating a spam list and the clean list of a database to determine whether the respective email addresses are present in either of the lists; discarding a first group of the plurality of email messages based on the first group having corresponding email addresses that are present on the spam list; and delivering a second group of the plurality of email messages based on the second group having corresponding email addresses that are present on the clean list.
-
-
9. One or more non-transitory, computer-readable storage media storing instructions that, when executed, cause a computing device to perform a method, the method comprising:
-
scanning, in response to a determination that a first time period has ended, email messages from an email address of a sender previously identified as a source of spam; placing the email address of the sender in a clean list such that scanning software is subsequently prevented from performing a full scan of additional messages from the email address of the sender, the placing performed in response to a determination that a count of the email messages that are clean has exceeded a threshold over a second time period, the second time period similar or less than the first time period; and placing the email address of the sender in a spammers list in response to a determination that a count of the email messages that are spam has exceeded a threshold over a third time period greater than the second time period, wherein the spammers list is replicated to another server. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. One or more non-transitory, computer-readable storage media storing instructions that, when executed, cause a computing device to perform a method, the method comprising:
-
scanning email messages from an email address of a sender previously identified as a source of spam; determining that a count of the email messages that are clean has exceeded a threshold over a predefined time period; placing the email address of the sender in a clean list such that scanning software is subsequently prevented from performing a full scan of additional messages from the email address of the sender; obtaining respective email addresses for each of a plurality of email messages; evaluating a spam list and the clean list of a database to determine whether the respective email addresses are present in either of the lists; discarding a first group of the plurality of email messages based on the first group having corresponding email addresses that are present on the spam list; and delivering a second group of the plurality of email messages based on the second group having corresponding email addresses that are present on the clean list.
-
-
17. A server, comprising:
-
a processor; and a memory coupled to the processor, wherein the server is configured to perform a scanning, in response to a determination that a first time period has ended, email messages from an email address of a sender previously identified as a source of spam; place the email address of the sender in a clean list such that scanning software is subsequently prevented from performing a full scan of additional messages from the email address of the sender, the email address placed in the clean list in response to a determination that a count of the email messages that are clean has exceeded a threshold over a second time period, the second time period similar or less than the first time period; and place the email address of the sender in a spammers list in response to a determination that a count of the email messages that are spam has exceeded a threshold over a third time period greater than the second time period, wherein the spammers list is replicated to another server. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A server, comprising:
-
a processor; and a memory coupled to the processor, wherein the server is configured to scan email messages from an email address of a sender previously identified as a source of spam; determine that a count of the email messages that are clean has exceeded a threshold over a predefined time period; place the email address of the sender in a clean list such that scanning software is subsequently prevented from performing a full scan of additional messages from the email address of the sender; obtain respective email addresses for each of a plurality of email messages; evaluate a spam list and the clean list of a database to determine whether the respective email addresses are present in either of the lists; discard a first group of the plurality of email messages based on the first group having corresponding email addresses that are present on the spam list; and deliver a second group of the plurality of email messages based on the second group having corresponding email addresses that are present on the clean list.
-
Specification