Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_1fb5c3c353cf699c90425f9b4b36c838 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-145 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-1085 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-105 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-40 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L51-212 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-102 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1408 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-108 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L43-00 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F15-16 |
filingDate |
2006-10-26^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate |
2009-10-13^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_2148d68c7b676b0981a179cb06234efc http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_984466a2f43cbb3dcf9a52c138839782 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_e61b0f8acd2b883cb513e6240c461b1d http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_4a08c9c96a57805bb2906034b0a464ae http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_5257f475240caa4b989d5e40e5c8c662 |
publicationDate |
2009-10-13^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
US-7603472-B2 |
titleOfInvention |
Zero-minute virus and spam detection |
abstract |
Disclosed in this application are systems and methods for detecting unwanted electronic message transmissions at a certain location on an electronic communications network. The disclosed principles include establishing a database for storing metadata associated with message traffic according to at least the source addresses of the senders of electronic message transmissions. The disclosed principles also include monitoring electronic message transmissions at the certain location on the electronic communications network. Also, included is populating the database with metadata derived from analysis of the monitored electronic messages, where the metadata includes metadata derived by analyzing the contents of the monitored electronic messages. Based upon the populated database, it is determined whether certain received electronic messages are likely to be unwanted based on an examination of the metadata associated with the source addresses of the senders of the received electronic messages and based on the analysis of the content of monitored electronic messages at least in part without reference to a promulgated database of “signatures” of known unwanted electronic messages. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2009182818-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8108476-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8713665-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2009240780-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2008271117-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2010095377-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7640589-B1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2010241713-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8327430-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8726347-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-9686262-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8272043-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8272041-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2008320581-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2008320580-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-9094393-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2008320584-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2012331541-A1 |
priorityDate |
2003-02-19^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |