SYSTEM AND METHOD FOR DETECTING EMAIL CONTENT CONTAINMENT
First Claim
1. A method, comprising:
- generating a first set of hash values corresponding to a first email document, wherein the first set includes a respective hash value corresponding to each of a plurality of character sequences of the first email document;
generating a second set of hash values corresponding to a second email document, wherein the second set includes a respective hash value corresponding to each of a plurality of character sequences of the second email document; and
determining whether the first set of hash values forms a smaller subset of the second set of hash values.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for detecting email content containment are disclosed. In one embodiment, a method comprises generating a first set of hash values corresponding to a first email document, wherein the first set includes a respective hash value corresponding to each of a plurality of character sequences of the first email document. The method further comprises generating a second set of hash values corresponding to a second email document, wherein the second set include a respective hash value corresponding to each of a plurality of character sequences of the second email document, and determining whether the first set of hash values is a subset of the second set of hash values.
33 Citations
20 Claims
-
1. A method, comprising:
-
generating a first set of hash values corresponding to a first email document, wherein the first set includes a respective hash value corresponding to each of a plurality of character sequences of the first email document; generating a second set of hash values corresponding to a second email document, wherein the second set includes a respective hash value corresponding to each of a plurality of character sequences of the second email document; and determining whether the first set of hash values forms a smaller subset of the second set of hash values. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-readable memory medium storing program instructions that are computer-executable to:
-
generate a first set of hash values corresponding to a first email document, wherein the first set includes a respective hash value corresponding to each of a plurality of character sequences of the first email document; generate a second set of hash values corresponding to a second email document, wherein the second set includes a respective hash value corresponding to each of a plurality of character sequences of the second email document; and determine whether the first set of hash values forms a smaller subset of the second set of hash values. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system, comprising:
-
one or more processors memory storing program instructions that are computer-executable by the one or more processors to; generate a first set of hash values corresponding to a first email document, wherein the first set includes a respective hash value corresponding to each of a plurality of character sequences of the first email document; generate a second set of hash values corresponding to a second email document, wherein the second set includes a respective hash value corresponding to each of a plurality of character sequences of the second email document; and determine whether the first set of hash values forms a smaller subset of the second set of hash values. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification