Redundant email address detection and capture system
First Claim
1. An apparatus for automatically detecting unwanted messages in real time in a system that includes a message server for routing incoming message files to a directory, the apparatus comprising:
- a redundant email address detection and capture system (READACS), said READACS comprising a computer implemented program comprising;
a process for accessing said directory and for identifying said message files;
a process for locating any of an address-of-origin, subject, or other specified criteria within each said message file;
a process for identifying whether each said message file should be considered spam;
a process for separating said spam and non-spam message files logically; and
a process for any of physically moving and renaming said message files in a predetermined fashion.
1 Assignment
0 Petitions
Accused Products
Abstract
A mechanism for automatically detecting such unwanted messages in real time, which is referred to herein as the Redundant Email Address Detection And Capture System (READACS) is disclosed. The READACS program assumes that incoming mail files have been written to disk in a file format that is somewhat consistent and/or predictable by the programmer. The task of READACS is to identify those email message files, locate an address-of-origin within those files, identify whether the email message should be considered spam, separate spam and non-spam email messages logically, and physically move or rename (or both) those email messages as desired by the programmer.
111 Citations
16 Claims
-
1. An apparatus for automatically detecting unwanted messages in real time in a system that includes a message server for routing incoming message files to a directory, the apparatus comprising:
a redundant email address detection and capture system (READACS), said READACS comprising a computer implemented program comprising;
a process for accessing said directory and for identifying said message files;
a process for locating any of an address-of-origin, subject, or other specified criteria within each said message file;
a process for identifying whether each said message file should be considered spam;
a process for separating said spam and non-spam message files logically; and
a process for any of physically moving and renaming said message files in a predetermined fashion. - View Dependent Claims (2, 3)
-
4. A method for automatically detecting unwanted messages in real time in a system that includes a message server for routing incoming message files to a directory, the method comprising the steps of:
-
accessing said directory and for identifying said message files;
locating any of an address-of-origin, subject, or other specified criteria within each said message file;
identifying whether each said message file should be considered spam;
separating said spam and non-spam message files logically; and
any of physically moving and renaming said message files in a predetermined fashion. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. A method for automatically detecting unwanted messages in real time in a system that includes a message server for routing incoming message files to a directory, the method comprising the steps of:
-
receiving a message file at a host system;
routing said message file to said directory;
writing said message file with a prefix and/or suffix that allows it to be identified as a new message;
identifying all message files in said directory that are spam; and
any of renaming and moving said message files. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An apparatus for redundant email address detection and capture, comprising:
-
a plurality of sending entities for originating email messages;
a public network for routing said email messages to a destination;
a destination mail server;
a mechanism at said mail server for identifying newly arrived messages;
a directory to which are newly arrived messages re routed; and
a mechanism for examining messages in said directory and for classifying said messages as spam or non-spam based upon a number of messages received from an identified sending address within a specific interval;
wherein non-spam messages are routed to appropriate destinations in accordance with previously established routing instructions; and
wherein spam is sent to one or more predetermined destinations.
-
Specification