System and method for crowd-sourcing mobile messaging spam detection and defense
First Claim
1. A method comprising:
- receiving, at a virtual machine associated with a particular user, a notification from a mobile device associated with the particular user identifying that a message received at the mobile device is determined to be an unwanted message based on;
identification of the message as a potential unwanted message by an unwanted message detection algorithm; and
the message being confirmed by the particular user to be the unwanted message in response to presenting the particular user with the message, the message presented with a date and time the message was sent highlighted to indicate that the date and time were considered in identifying the message as the potential unwanted message;
transmitting information pertaining to the notification to a global virtual machine;
receiving an updated set of global classification rules from the global virtual machine, the updated set of global classification rules based on information pertaining to the notification, information pertaining to notifications from a plurality of other user devices associated with the global virtual machine, a number of users that identified a particular message as unwanted, and information pertaining to training messages;
updating, at the virtual machine, a copy of the unwanted message detection algorithm associated with the particular user, based on the notification, the updated set of global classification rules, and a set of personalized classification rules, the updating to generate an updated copy of the unwanted message detection algorithm; and
transmitting the updated copy of the unwanted message detection algorithm to the mobile device associated with the particular user.
1 Assignment
0 Petitions
Accused Products
Abstract
A crowd-sourced mobile messaging spam detection and defense system includes an application running on a mobile device. The application uses an unwanted message detection algorithm to analyze and classify messages as potential unwanted messages. The potential unwanted messages are presented to a user for confirmation that the messages are unwanted messages. In response to confirmation, the mobile device transmits a notification to a virtual machine associated with the user. The virtual machine uses the notification to update the unwanted message detection algorithm which may then be transmitted to the mobile device. The virtual machine may also transmit the notification to a global virtual machine. The global virtual machine may use the notification to update a set of classification rules maintained by the global virtual machine and transmit the set of classification rules as necessary to the multiple virtual machines for use in updating the unwanted message detection algorithm.
25 Citations
13 Claims
-
1. A method comprising:
-
receiving, at a virtual machine associated with a particular user, a notification from a mobile device associated with the particular user identifying that a message received at the mobile device is determined to be an unwanted message based on; identification of the message as a potential unwanted message by an unwanted message detection algorithm; and the message being confirmed by the particular user to be the unwanted message in response to presenting the particular user with the message, the message presented with a date and time the message was sent highlighted to indicate that the date and time were considered in identifying the message as the potential unwanted message; transmitting information pertaining to the notification to a global virtual machine; receiving an updated set of global classification rules from the global virtual machine, the updated set of global classification rules based on information pertaining to the notification, information pertaining to notifications from a plurality of other user devices associated with the global virtual machine, a number of users that identified a particular message as unwanted, and information pertaining to training messages; updating, at the virtual machine, a copy of the unwanted message detection algorithm associated with the particular user, based on the notification, the updated set of global classification rules, and a set of personalized classification rules, the updating to generate an updated copy of the unwanted message detection algorithm; and transmitting the updated copy of the unwanted message detection algorithm to the mobile device associated with the particular user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus comprising:
-
a processor; and a memory to store computer program instructions, the computer program instructions when executed on the processor cause the processor to perform operations comprising; receiving a notification from a mobile device associated with a particular user identifying that a message received at the mobile device is determined to be an unwanted message based on; identification of the message as an unwanted message by an unwanted message detection algorithm; and the message being confirmed by the particular user to be the unwanted message in response to presenting the particular user with the message, the message presented with a date and time the message was sent highlighted to indicate that the date and time were considered in identifying the message as the potential unwanted message; transmitting information pertaining to the notification to a global virtual machine; receiving an updated set of global classification rules from the global virtual machine, the updated set of global classification rules based on information pertaining to the notification, information pertaining to notifications from a plurality of other user devices associated with the global virtual machine, a number of users that identified a particular message as unwanted, and information pertaining to training messages; updating a copy of the unwanted message detection algorithm associated with the particular user, based on the notification, the updated set of global classification rules, and a set of personalized classification rules, the updating to generate an updated copy of the unwanted message detection algorithm; and transmitting the updated copy of the unwanted message detection algorithm to the mobile device associated with the particular user. - View Dependent Claims (7, 8, 9)
-
-
10. A non-transitory computer readable medium storing computer program instructions, which, when executed on a processor, cause the processor to perform operations comprising:
-
receiving, at a virtual machine associated with a particular user, a notification from a mobile device associated with the particular user identifying that a message received at the mobile device is determined to be an unwanted message based on; identification of the message as a potential unwanted message by an unwanted message detection algorithm; and the message being confirmed by the particular user to be the unwanted message in response to presenting the particular user with the message, the message presented with a date and time the message was sent highlighted to indicate that the date and time were considered in identifying the message as the potential unwanted message; transmitting information pertaining to the notification to a global virtual machine; receiving an updated set of global classification rules from the global virtual machine, the updated set of global classification rules based on information pertaining to the notification, information pertaining to notifications from a plurality of other user devices associated with the global virtual machine, a number of users that identified a particular message as unwanted, and information pertaining to training messages; updating, at the virtual machine, a copy of the unwanted message detection algorithm associated with the particular user, based on the notification, the updated set of global classification rules, and a set of personalized classification rules, the updating to generate an updated copy of the unwanted message detection algorithm; and transmitting the updated copy of the unwanted message detection algorithm to the mobile device associated with the particular user. - View Dependent Claims (11, 12, 13)
-
Specification