会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Spam filtering based on statistics and token frequency modeling
    • 基于统计和令牌频率建模的垃圾邮件过滤
    • US08364766B2
    • 2013-01-29
    • US12328723
    • 2008-12-04
    • Lei ZhengSharat NarayanMark E. RisherStanley Ke WeiVishwanath Tumkur RamaraoAnirban Kundu
    • Lei ZhengSharat NarayanMark E. RisherStanley Ke WeiVishwanath Tumkur RamaraoAnirban Kundu
    • G06F15/16
    • H04L51/12G06N7/005
    • Embodiments are directed towards classifying messages as spam using a two phased approach. The first phase employs a statistical classifier to classify messages based on message content. The second phase targets specific message types to capture dynamic characteristics of the messages and identify spam messages using a token frequency based approach. A client component receives messages and sends them to the statistical classifier, which determines a probability that a message belongs to a particular type of class. The statistical classifier further provides other information about a message, including, a token list, and token thresholds. The message class, token list, and thresholds are provided to the second phase where a number of spam tokens in a given message for a given message class are determined. Based on the threshold, the client component then determines whether the message is spam or non-spam.
    • 实施例针对使用两阶段方法将消息分类为垃圾邮件。 第一阶段采用统计分类器根据消息内容分类消息。 第二阶段针对特定的消息类型来捕获消息的动态特征,并使用基于令牌频率的方法识别垃圾邮件。 客户端组件接收消息并将其发送到统计分类器,该分类器确定消息属于特定类型的类的概率。 统计分类器还提供关于消息的其他信息,包括令牌列表和令牌阈值。 消息类别,令牌列表和阈值被提供给第二阶段,其中给定消息类别的给定消息中的多个垃圾邮件令牌被确定。 基于阈值,客户端组件然后确定消息是垃圾邮件还是非垃圾邮件。
    • 2. 发明申请
    • SPAM FILTERING BASED ON STATISTICS AND TOKEN FREQUENCY MODELING
    • 基于统计和TOKEN频率建模的垃圾邮件过滤
    • US20100145900A1
    • 2010-06-10
    • US12328723
    • 2008-12-04
    • Lei ZhengSharat NarayanMark E. RisherStanley Ke WeiVishwanath Tumkur RamaraoAnirban Kundu
    • Lei ZhengSharat NarayanMark E. RisherStanley Ke WeiVishwanath Tumkur RamaraoAnirban Kundu
    • G06N5/02G06F15/16
    • H04L51/12G06N7/005
    • Embodiments are directed towards classifying messages as spam using a two phased approach. The first phase employs a statistical classifier to classify messages based on message content. The second phase targets specific message types to capture dynamic characteristics of the messages and identify spam messages using a token frequency based approach. A client component receives messages and sends them to the statistical classifier, which determines a probability that a message belongs to a particular type of class. The statistical classifier further provides other information about a message, including, a token list, and token thresholds. The message class, token list, and thresholds are provided to the second phase where a number of spam tokens in a given message for a given message class are determined. Based on the threshold, the client component then determines whether the message is spam or non-spam.
    • 实施例针对使用两阶段方法将消息分类为垃圾邮件。 第一阶段采用统计分类器根据消息内容分类消息。 第二阶段针对特定的消息类型来捕获消息的动态特征,并使用基于令牌频率的方法识别垃圾邮件。 客户端组件接收消息并将其发送到统计分类器,该分类器确定消息属于特定类型的类的概率。 统计分类器还提供关于消息的其他信息,包括令牌列表和令牌阈值。 消息类别,令牌列表和阈值被提供给第二阶段,其中给定消息类别的给定消息中的多个垃圾邮件令牌被确定。 基于阈值,客户端组件然后确定消息是垃圾邮件还是非垃圾邮件。
    • 7. 发明申请
    • REPORTING ON SPOOFED E-MAIL
    • 报告电子邮件
    • US20090216842A1
    • 2009-08-27
    • US12035941
    • 2008-02-22
    • Mark E. RisherMark DelanyAnirban KunduMiles A. Libbey, IVMasumi Taketomi
    • Mark E. RisherMark DelanyAnirban KunduMiles A. Libbey, IVMasumi Taketomi
    • G06F15/16
    • G06Q10/107H04L51/12H04L51/28
    • Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may ten be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.
    • 实施例旨在检测和报告诸如DomainKeys(DK)和/或DomainKeys Identified Mail(DKIM)之类的消息认证机制的域的使用,并且部分地基于其使用来启用消息的后续阻塞。 当入站消息服务器接收到消息时,确定消息的消息源。 在一个实施例中,消息源是与消息的发送者相关联的域名。 记录关于消息的统计信息,包括消息源,消息是否可疑,包括伪造的源标识符,使用DK / DKIM消息认证等。 然后可以将报告发送到各种消息源,以使它们能够确定DK / DKIM消息认证的使用程度,并且部分地基于DK / DKIM消息认证的使用来选择性地阻止,重新引导或转发消息, DKIM消息认证机制。
    • 8. 发明授权
    • Blocking of spoofed E-mail
    • 阻止欺骗性电子邮件
    • US08381262B2
    • 2013-02-19
    • US12034602
    • 2008-02-20
    • Mark E. RisherMark DelanyAnirban KunduMiles A. Libbey, IVMasumi Taketomi
    • Mark E. RisherMark DelanyAnirban KunduMiles A. Libbey, IVMasumi Taketomi
    • H04L29/06
    • H04L51/12H04L63/126
    • Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may then be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.
    • 实施例旨在检测和报告诸如DomainKeys(DK)和/或DomainKeys Identified Mail(DKIM)之类的消息认证机制的域的使用,并且部分地基于其使用来启用消息的后续阻止。 当入站消息服务器接收到消息时,确定消息的消息源。 在一个实施例中,消息源是与消息的发送者相关联的域名。 记录关于消息的统计信息,包括消息源,消息是否可疑,包括伪造的源标识符,使用DK / DKIM消息认证等。 然后可以将报告发送到各种消息源,以使它们能够确定DK / DKIM消息认证的使用程度,并且部分地基于DK / DKIM消息认证的使用来选择性地阻止,重新引导或转发消息, DKIM消息认证机制。
    • 9. 发明授权
    • Reporting on spoofed e-mail
    • 报告欺骗性的电子邮件
    • US07950047B2
    • 2011-05-24
    • US12035941
    • 2008-02-22
    • Mark E. RisherMark DelanyAnirban KunduMiles A. Libbey, IVMasumi Taketomi
    • Mark E. RisherMark DelanyAnirban KunduMiles A. Libbey, IVMasumi Taketomi
    • G06F7/04G06F15/16G06F17/30H04L29/06
    • G06Q10/107H04L51/12H04L51/28
    • Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may ten be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.
    • 实施例旨在检测和报告诸如DomainKeys(DK)和/或DomainKeys Identified Mail(DKIM)之类的消息认证机制的域的使用,并且部分地基于其使用来启用消息的后续阻止。 当入站消息服务器接收到消息时,确定消息的消息源。 在一个实施例中,消息源是与消息的发送者相关联的域名。 记录关于消息的统计信息,包括消息源,消息是否可疑,包括伪造的源标识符,使用DK / DKIM消息认证等。 然后可以将报告发送到各种消息源,以使它们能够确定DK / DKIM消息认证的使用程度,并且部分地基于DK / DKIM消息认证的使用来选择性地阻止,重新引导或转发消息, DKIM消息认证机制。
    • 10. 发明申请
    • BLOCKING OF SPOOFED E-MAIL
    • 封闭的电子邮件
    • US20090210501A1
    • 2009-08-20
    • US12034602
    • 2008-02-20
    • Mark E. RisherMark DelanyAnirban KunduMiles A. Libbey, IVMasumi Taketomi
    • Mark E. RisherMark DelanyAnirban KunduMiles A. Libbey, IVMasumi Taketomi
    • G06F15/16
    • H04L51/12H04L63/126
    • Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may then be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.
    • 实施例旨在检测和报告诸如DomainKeys(DK)和/或DomainKeys Identified Mail(DKIM)之类的消息认证机制的域的使用,并且部分地基于其使用来启用消息的后续阻止。 当入站消息服务器接收到消息时,确定消息的消息源。 在一个实施例中,消息源是与消息的发送者相关联的域名。 记录关于消息的统计信息,包括消息源,消息是否可疑,包括伪造的源标识符,使用DK / DKIM消息认证等。 然后可以将报告发送到各种消息源,以使它们能够确定DK / DKIM消息认证的使用程度,并且部分地基于DK / DKIM消息认证的使用来选择性地阻止,重新引导或转发消息, DKIM消息认证机制。