System and method for detecting unwanted content
First Claim
1. A processor-implemented method of detecting distribution of unwanted content, the method comprising:
- receiving from a first user an electronic message having one or more addressees;
for each addressee in the one or more addressees, updating a peer symmetry metric to reflect whether the first user is included in an address book of the addressee;
updating a message rate reflecting a rate at which the first user is sending electronic messages;
comparing the updated message rate to one or more threshold message rates;
if the updated message rate exceeds a first message rate threshold, preventing the user from sending additional electronic messages; and
if the updated message rate exceeds a second message rate threshold, but not the first message rate threshold, placing the first user in a watch list.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for detecting unwanted electronic content, such as spam. As a user operates an application to send messages, several metrics are tracked to allow the system to analyze her activity. Illustrative metrics may include, but are not limited to, block count (e.g., how many other users have blocked her), block rate (e.g., the rate at which other users block her), peer symmetry (e.g., percentage of her messages that are to other users that have her in their address book), message uniqueness (e.g., how unique her messages are from each other), peer uniqueness (e.g., how unique the addressees of her messages are), message rate (e.g., the rate at which she sends messages). Periodically, metrics may be compared to corresponding thresholds. Depending on whether a threshold is crossed, and which threshold is crossed, she may be banned from using the application or placed on a watch list.
36 Citations
21 Claims
-
1. A processor-implemented method of detecting distribution of unwanted content, the method comprising:
-
receiving from a first user an electronic message having one or more addressees; for each addressee in the one or more addressees, updating a peer symmetry metric to reflect whether the first user is included in an address book of the addressee; updating a message rate reflecting a rate at which the first user is sending electronic messages; comparing the updated message rate to one or more threshold message rates; if the updated message rate exceeds a first message rate threshold, preventing the user from sending additional electronic messages; and if the updated message rate exceeds a second message rate threshold, but not the first message rate threshold, placing the first user in a watch list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform a method of detecting distribution of unwanted content, the method comprising:
-
receiving from a first user an electronic message having one or more addressees; for each addressee in the one or more addressees, updating a peer symmetry metric to reflect whether the first user is included in an address book of the addressee; updating a message rate reflecting a rate at which the first user is sending electronic messages; comparing the updated message rate to one or more threshold message rates; if the updated message rate exceeds a first message rate threshold, preventing the user from sending additional electronic messages; and if the updated message rate exceeds a second message rate threshold, but not the first message rate threshold, placing the first user in a watch list. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An apparatus, comprising:
-
at least one processor; and memory storing instructions that, when executed by the at least one processor, cause the apparatus to; receive from a first user an electronic message having one or more addressees; for each addressee in the one or more addressees, update a peer symmetry metric to reflect whether the first user is included in an address book of the addressee; update a message rate reflecting a rate at which the first user is sending electronic messages; compare the updated message rate to one or more threshold message rates; if the updated message rate exceeds a first message rate threshold, prevent the user from sending additional electronic messages; and if the updated message rate exceeds a second message rate threshold, but not the first message rate threshold, place the first user in a watch list.
-
Specification