Patent classifications
H04L51/212
Spam detection
A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.
Spam detection
A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.
Automatic document classification
A method to automatically classify emails may include generating multiple entity data objects using entities identified in receiver and sender fields of emails and categorizing the multiple entity data objects into a first set of data objects and a second set of data objects. The method may also include extracting all tokens from each email and searching the extracted tokens for tokens associated with the data objects of the first set of data objects. The method may further include identifying the emails that include the extracted tokens that are associated with the data objects of the first set of data objects, identifying a particular data object of the first set of data objects to which an identified email corresponds, and automatically classifying the identified email in the first category in response to identifying the particular data object of the first set of data objects to which an identified email corresponds.
Automatic document classification
A method to automatically classify emails may include generating multiple entity data objects using entities identified in receiver and sender fields of emails and categorizing the multiple entity data objects into a first set of data objects and a second set of data objects. The method may also include extracting all tokens from each email and searching the extracted tokens for tokens associated with the data objects of the first set of data objects. The method may further include identifying the emails that include the extracted tokens that are associated with the data objects of the first set of data objects, identifying a particular data object of the first set of data objects to which an identified email corresponds, and automatically classifying the identified email in the first category in response to identifying the particular data object of the first set of data objects to which an identified email corresponds.
Location based content system for mobile applications
Disclosed are systems and methods for improving interactions with and between computers in content searching, hosting and/or providing systems supported by or configured with devices, servers and/or platforms. The disclosed systems and methods provide a novel framework for providing users with electronic retrieval capabilities that are activated upon the users' determined locations respective to real-world locations associated with a message providing entity. The disclosed technology combines the previously separate systems of mail extraction, geo-fencing and content delivery (e.g., notification) into a single system that efficiently manages a user's inbox in order to provide the user with content the user has expressly indicated is of interest to that user. The disclosed systems and methods effectively realize a location-aware mail experience that provides functionality for delivering location (and timing) specific content to a user when the user is actually capable of acting on/interacting with the content in real-time.
CLOUD EMAIL MESSAGE SCANNING WITH LOCAL POLICY APPLICATION IN A NETWORK ENVIRONMENT
A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.
MESSAGE PROCESSING METHOD AND APPARATUS
The present disclosure provides a message processing method and apparatus. The method includes: obtaining, by a computing terminal associated with the social-network application, a message-reception threshold of a group, the computing terminal including a memory and at least a processor coupled to the memory; obtaining, by the computing terminal, group behavior information of the group, the group behavior information including at least a number of messages received by the group over a preset time duration; and setting, by the computing terminal, the group to a do-not-disturb mode when the number of messages received by the group over the preset time duration exceeds the message-reception threshold, so as to stop sending notification in real time for any new message received by the group.
SYSTEM PERFORMANCE LOGGING OF COMPLEX REMOTE QUERY PROCESSOR QUERY OPERATIONS
Described are methods, systems and computer readable media for performance logging of complex query operations.
SURFACING ATTACHMENTS IN EMAIL SEARCH SUGGESTION DROPDOWN
Presenting search suggestions within a messaging application that include attachments without searching messages for the attachments is provided. Messages are received at a computer and managed by a messaging application. A query for suggestions is received via the messaging application. The query is performed by the messaging application without querying the messages that have been received through the messaging application. Suggested search results are provided by the messaging application. The suggestions include attachments that were received via a message through the messaging application. In one or more aspects, the suggested search results also provide other attachments that were received by other than the messaging application.
Instant Messaging Private Tags
Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided.