Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for spam detection using character histograms

A technology of spam and characters, applied in the direction of digital transmission systems, transmission systems, electrical components, etc., can solve problems affecting productivity, boredom and interruption, occupation, etc.

Active Publication Date: 2017-08-25
BITDEFENDER IPR MANAGEMENT
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Spam takes up valuable hardware resources, affects productivity, and is considered annoying and intrusive by many users of communication services and / or the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for spam detection using character histograms
  • Systems and methods for spam detection using character histograms
  • Systems and methods for spam detection using character histograms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In the following description, it should be understood that all stated connections between structures may be direct operative connections or indirect operative connections through intermediate structures. A set of elements contains one or more elements. Any statement about an element should be understood as referring to at least one element. A plurality of elements includes at least two elements. Unless otherwise required, the steps of any described method do not necessarily have to be performed in the particular order illustrated. A first element (eg, data) derived from a second element encompasses the first element equal to the second element, as well as the first element produced by processing the second element and (optionally) other data. Making a determination or decision based on parameters encompasses making a determination or decision based on parameters and optionally other data. Unless otherwise specified, an indicator of a certain amount / data may be the am...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The described spam detection technique comprising steps of string identification, pre-filtering, and character histogram and timestamp comparison facilitates accurate, computationally efficient detection of rapidly changing spam arriving in short continuous waves. In some embodiments, a computer system extracts a target string from an electronic communication, such as a blog comment, transmits it to an anti-spam server, and receives from the anti-spam server whether the corresponding electronic communication is spam or not spam. indicator. The anti-spam server determines whether the electronic communication is spam or not spam based on certain characteristics of the character histogram of the target string. Some embodiments also perform unsupervised clustering of incoming target strings into clusters where all members of the cluster have similar character histograms.

Description

Background technique [0001] The present invention relates to methods and systems for classifying electronic communications, and in particular to systems and methods for filtering unsolicited commercial electronic communications (spam). [0002] Unsolicited commercial electronic communications (also known as spam) form a significant portion of all communications traffic worldwide, affecting computer and telephone messaging services. Spam can take many forms, from unsolicited email communications to spam messages posing as user comments on various Internet sites, such as blogs and social networking sites. Spam takes up valuable hardware resources, affects productivity, and is considered annoying and intrusive by many users of communication services and / or the Internet. [0003] In the case of email spam, software running on the user's or email service provider's computer system can be used to classify email messages as spam or not spam, and even Distinguish (e.g., product offe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58
CPCH04L51/212H04L63/0263H04L9/3297H04L51/00
Inventor 达尼埃尔·迪基乌Z·卢奇安·卢普赛斯库
Owner BITDEFENDER IPR MANAGEMENT