$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Message classification using allowed items 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 UP-0927497 (2007-10-29)
등록번호 US-7562122 (2009-07-27)
발명자 / 주소
  • Oliver, Jonathan J.
  • Koblas, David A.
  • Wilson, Brian K.
출원인 / 주소
  • SonicWALL, Inc.
대리인 / 주소
    Carr & Ferrell LLP
인용정보 피인용 횟수 : 74  인용 특허 : 50

초록

A system and method are disclosed for classifying a message. The method includes receiving the message, identifying all items of a certain type in the message, determining whether each of the items meets a criterion, and in the event that all the items are determined to meet the criterion, determin

대표청구항

What is claimed is: 1. A method for classifying an e-mail message, the method comprising: tracking one or more user designations concerning validity of the e-mail message; determining a probability of validity based on the tracked user designations concerning the validity of the e-mail message; det

이 특허에 인용된 특허 (50)

  1. Paul Sunil, Apparatus and method for controlling delivery of unsolicited electronic mail.
  2. Riemers, Bill C., Automatic uniform resource locator-based message filter.
  3. Teague,Alan H., Communication system using alias management rules for automatically changing sender alias in a message based on group that includes recipient address.
  4. Steele,Nick; Hawkins,Stan; Maranville,Joe; Bradnan,Andrew, Consumer-controlled limited and constrained access to a centrally stored information account.
  5. William B. McCormick ; David Kopans ; George Stojanoff, E-mail filter and method thereof.
  6. Sheldon, Valentine D'Arcy; Kagan, Jeremy; Palmarini, Nancy, E-mail messaging system.
  7. Kirsch, Steven T.; Kiraly, Kenneth P., Electronic mail filtering system and methods.
  8. Kamakura Akira,JPX ; Tanaka Hideki,JPX, Electronic mail processing system with bonus point tracking.
  9. Heiner Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  10. Kocher, Paul C., Leak-resistant cryptographic indexed key update.
  11. Martin C. Buskirk, Jr. ; Frederick J. Damerau ; David H. Johnson ; Marguerite Raaen, Machine learning based electronic messaging system.
  12. Worrell, Steven W.; Rogers, Steven K.; Kabrisky, Matthew; Amburn, Philip, Message and user attributes in a message filtering method and system.
  13. Oliver,Jonathan J.; Koblas,David A.; Wilson,Brian K., Message classification using a summary.
  14. Meyer,David; Bernstein,Steven Miller, Meta-content analysis and annotation of email and other electronic documents.
  15. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan, Method and apparatus for filtering e-mail.
  16. Jakob Nielsen, Method and apparatus for identifying and discarding junk electronic mail.
  17. Cheong,Leslie; Mason,Jeffrey A.; Vogt,David A., Method and apparatus for surrogate control of network-based electronic transactions.
  18. Kirsch,Steven T., Method and system for categorizing and processing e-mails.
  19. Oliver,Jonathan J.; Koblas,David A.; Wilson,Brian K., Method and system for classifying a message based on canonical equivalent of acceptable items included in the message.
  20. Newman,Paula S., Method and system for display of electronic mail.
  21. Cobb Christopher Alan, Method and system for filtering electronic messages.
  22. Bates, Cary Lee; Day, Paul Reuben; Santosuosso, John Matthew, Method and system for predicting and managing undesirable electronic mail.
  23. Kirsch, Steven T., Method and system for selectively blocking delivery of bulk electronic mail.
  24. Greenstein Bret A., Method for blocking all unwanted e-mail (SPAM) using a header-based password.
  25. Drummond, Kirk; Fields, Duane Kimbell; Gregg, Thomas Preston; Kolb, Mark Andrew, Method for restricting delivery of unsolicited E-mail.
  26. Buford,John F.; Huang,Xiaolan, Parsing of nested internet electronic mail documents.
  27. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of textual electronic communication distributed in bulk.
  28. Ralston, Geoffrey D.; Nakayama, David H.; Lewin, Matthew E.; Jayachandran, Ravichandran Menon; Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic communication.
  29. Woods, Brian R.; Manber, Udi, Processing of unsolicited bulk electronic mail.
  30. Garib, Marco Aurelio, Secret key messaging.
  31. Marks, Michael A., Shared shopping basket management system.
  32. Steele,Nick; Hawkins,Stan; Maranville,Joe; Bradnan,Andrew, Single sign-on for access to a central data repository.
  33. Hall, Robert J., System and method for counteracting message filtering.
  34. Kephart, Jeffrey Owen, System and method for hindering undesired transmission or receipt of electronic messages.
  35. Bolle, Rudolf Maarten; Connell, Jonathan Hudson; Ratha, Nalini K., System and method for liveness authentication using an augmented challenge/response scheme.
  36. Frank,Scott M.; Beckham,Carol T.; Arena,Christopher M.; Evans,Sandra J.; McLendon,Martin L.; Short,Shannon M.; Bishop,Michael; Meadows,Vernon; Delgado,Marcus; Lantz,Harrison; Sherwood,Amy L., System and method for selecting and protecting intellectual property assets.
  37. Zondervan,Quinton Yves, System and method for selectively transmitting electronic messages.
  38. Townshend, Brent, System and method of automatically generating the criteria to identify bulk electronic mail.
  39. Stockwell Edward B. ; Greve Paula Budig, System and method of electronic mail filtering using interconnected nodes.
  40. Katsikas, Peter L., System for eliminating unauthorized electronic mail.
  41. Sobel,William E, System utilizing updated spam signatures for performing secondary signature-based analysis of a held e-mail to improve spam email detection.
  42. Bagley, David T.; Fearing, Roger N., Systems and methods for communicating across various communication applications using single address strings.
  43. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, Systems and methods for managing the transmission of electronic messages through active message date updating.
  44. Horvitz Eric ; Heckerman David E. ; Dumais Susan T. ; Sahami Mehran ; Platt John C., Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set.
  45. Ng, David Way, Third-party e-mail authentication service provider using checksum and unknown pad characters with removal of quotation indents.
  46. Patel,Ashvinkumar P.; Woods,Brian R.; Manber,Udi, Unsolicited electronic mail reduction.
  47. Irlam, Gordon Raymond; Maggi, Brian; Petry, Scott, Value-added electronic messaging services and transparent implementation thereof using intermediate server.
  48. Paresh Patel GB; Ku Lee ; Roger Reider ; Drew Kittel ; Lolo Lasida, Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system.
  49. Pella John P. ; DeWolf Quentin ; Acker Peter C. ; Hale Charles A. ; April Renee Louise ; Cortese Jason T. ; Bondi Victor J., Virtual challenge system and method for teaching a language.
  50. Goodman Marc I., World wide web link referral system and method for generating and providing related links for links identified in web pages.

이 특허를 인용한 특허 (74)

  1. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  2. Skrenta, Rich; Dole, Bryn Robert; Markson, Michael; Peters, Keith; Saliba, Robert Michael; Truel, Robert N.; Lindahl, Gregory B., Combinators.
  3. Skrenta, Rich; Dole, Bryn Robert; Markson, Michael; Peters, Keith; Saliba, Robert Michael; Truel, Robert N.; Lindahl, Gregory B., Combinators.
  4. Peters, Keith; Dole, Bryn Robert; Markson, Michael; Saliba, Robert Michael; Skrenta, Rich; Truel, Robert N.; Lindahl, Gregory B., Combinators to build a search engine.
  5. Naaman, Mor; Davis, Marc E., Context server for associating information based on context.
  6. Churchill, Elizabeth F.; Jones, M. Cameron; Athsani, Athellina, Customizable content for distribution in social networks.
  7. Skrenta, Rich; Dole, Bryn Robert; Markson, Michael; Peters, Keith; Saliba, Robert Michael; Truel, Robert N.; Lindahl, Gregory B., Dedicating disks to reading or writing.
  8. Ramzan, Zulfikar; Satish, Sourabh; Friedrichs, Oliver, Detecting email fraud through fingerprinting.
  9. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Diminishing false positive classifications of unsolicited electronic-mail.
  10. Yu, Tonny, Email analysis using fuzzy matching of text.
  11. Dole, Bryn R.; Lindahl, Gregory B.; Markson, Michael; Peters, Keith; Saliba, Robert Michael; Skrenta, Rich; Truel, Robert N., Hierarchical diff files.
  12. Peters, Keith; Dole, Bryn Robert; Markson, Michael; Saliba, Robert Michael; Skrenta, Rich; Truel, Robert N.; Lindahl, Gregory B., Hierarchical diff files.
  13. Vitaldevara, Krishna; Walter, Jason; Vemula, Vasantha K., Identifying first contact unsolicited communications.
  14. Vitaldevara, Krishna; Walter, Jason; Vemula, Vasantha K., Identifying first contact unsolicited communications.
  15. Vitaldevara, Krishna; Walter, Jason; Vemula, Vasantha K., Identifying first contact unsolicited communications.
  16. Davis, Marc E.; Higgins, Christopher W.; O'Sullivan, Joseph; Athsani, Athellina; Jaffe, Christopher S.; Martinez, Ron, Interest mapping system.
  17. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  18. Karnik, Neeran, Managing electronic messages.
  19. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  20. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  21. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Method and apparatus for classifying electronic messages.
  22. Higgins, Christopher William; Davis, Marc; O'Sullivan, Joseph, Method and apparatus for social network marketing with advocate referral.
  23. Higgins, Christopher William; Davis, Marc; O'Sullivan, Joseph, Method and apparatus for social network marketing with brand referral.
  24. Higgins, Christopher William; Davis, Marc; O'Sullivan, Joseph, Method and apparatus for social network marketing with consumer referral.
  25. Martinez, Ronald; Davis, Marc; Hayashi, Nathanael Joe; Kalaboukis, Chris, Method, system and apparatus for using user profile electronic device data in media delivery.
  26. Yu, Tonny, Methods and systems for analyzing email messages.
  27. Yu, Tonny, Methods and systems for analyzing email messages.
  28. Kalaboukis, Chris; Davis, Marc; Martinez, Ron, Methods and systems for pre-caching information on a mobile computing device.
  29. Yu, Tonny, Methods and systems for suppressing undesireable email messages.
  30. Martinez, Ronald; Davis, Marc, Methods, systems and apparatus for delivery of media.
  31. Kalaboukis, Chris; Higgins, Christopher William; Davis, Marc Eliot; Martinez, Ronald; Nair, Rahul; King, Simon P.; Burgener, Carrie; Valz, Duane R., Personal data platform.
  32. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  33. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  34. Jaffe, Alexander B.; Naaman, Mor; Davis, Marc E., Summarization of media object collections.
  35. Yu, Tonny, Suppression of undesirable email messages by emulating vulnerable systems.
  36. Adjaoute, Akli, System administrator behavior analysis.
  37. Martinez, Ronald; Higgins, Christopher William; O'Sullivan, Joseph James; Davis, Marc Eliot, System and method for URL based query for retrieving data related to a context.
  38. Martinez, Ronald; Davis, Marc Eliot; Higgins, Christopher William; O'Sullivan, Joseph James, System and method for addressing communications.
  39. Higgins, Christopher William; Davis, Marc Eliot, System and method for automated service recommendations.
  40. Davis, Marc Eliot; Boerries, Marco; Higgins, Christopher William; O'Sullivan, Joseph James; Martinez, Ronald; Trout, Robert Carter, System and method for conditional delivery of messages.
  41. Davis, Marc Eliot; Boerries, Marco; Higgins, Christopher William; O'Sullivan, Joseph James; Martinez, Ronald; Trout, Robert Carter, System and method for conditional delivery of messages.
  42. Higgins, Christopher William; Davis, Marc Eliot; Paretti, Christopher T; King, Simon P; Nair, Rahul; Burgener, Carrie, System and method for context based query augmentation.
  43. Higgins, Christopher William; Davis, Marc Eliot; Martinez, Ronald; O'Sullivan, Joseph James; Paretti, Christopher T.; Kalaboukis, Chris; Athsani, Athellina, System and method for context enhanced mapping.
  44. Athsani, Athellina; Paretti, Christopher T.; O'Sullivan, Joseph James; Martinez, Ronald; Davis, Marc Eliot; Higgins, Christopher William; Kalaboukis, Christopher, System and method for context enhanced mapping within a user interface.
  45. Martinez, Ronald; Davis, Marc Eliot; Spiegelman, Michael; Paretti, Christopher T; Ghezzi, Nicola Stefano; Higgins, Christopher William; Kalaboukis, Chris, System and method for context enhanced messaging.
  46. Davis, Marc Eliot; Herendeen, Julie; Boerries, Marco; Higgins, Christopher William; O'Sullivan, Joseph James; Martinez, Ronald; Trout, Robert Carter, System and method for contextual addressing of communications on a network.
  47. Nair, Rahul; Davis, Marc Eliot; Higgins, Christopher William; King, Simon P, System and method for data privacy in URL based context queries.
  48. Nair, Rahul; Davis, Marc Eliot; Higgins, Christopher William; King, Simon P., System and method for deriving income from URL based context queries.
  49. Kalaboukis, Chris; Higgins, Christopher W.; Davis, Marc; O'Sullivan, Joseph; Athsani, Athellina; Martinez, Ronald; Paretti, Christopher T., System and method for determination and display of personalized distance.
  50. Hayashi, Nathaniel Joseph; Boerries, Marco; Davis, Marc Eliot; Higgins, Christopher William; Martinez, Ronald; O'Sullivan, Joseph James; Trout, Robert Carter, System and method for disambiguating non-unique identifiers using information obtained from disparate communication channels.
  51. Martinez, Ronald; Davis, Marc Eliot; Spiegelman, Michael; Paretti, Christopher T.; Ghezzi, Nicola Stefano; Higgins, Christopher William; Kalaboukis, Chris, System and method for distributing media related to a location.
  52. Nair, Rahul; Davis, Marc Eliot; Higgins, Christopher William; King, Simon P, System and method for generation of URL based context queries.
  53. Higgins, Christopher William; Davis, Marc Eliot; Martinez, Ronald; O'Sullivan, Joseph James; Athsani, Athellina; Kalaboukis, Chris; Paretti, Christopher T., System and method for improved mapping and routing.
  54. Higgins, Christopher W.; Paretti, Christopher T.; Ghezzi, Nicola Stefano; Spiegelman, Michael; Martinez, Ronald; Davis, Marc; Kalaboukis, Chris, System and method for location based media delivery.
  55. Davis, Marc Eliot; Wroblewski, Luke; O'Sullivan, Joseph James; Callan, Paul, System and method for message clustering.
  56. Martinez, Ronald; Davis, Marc Eliot; Higgins, Christopher William; O'Sullivan, Joseph James, System and method for modeling relationships between entities.
  57. Martinez, Ronald; Davis, Marc Eliot; Higgins, Christopher William; O'Sullivan, Joseph James, System and method for optimizing the storage of data.
  58. Tendjoukian, Meher; Davis, Marc Eliot; Higgins, Christopher William, System and method for precaching information on a mobile device.
  59. Higgins, Christopher W.; Paretti, Christopher T.; Ghezzi, Nicola Stefano; Spiegelman, Michael; Martinez, Ronald; Davis, Marc; Kalaboukis, Chris, System and method for presentation of media related to a context.
  60. Higgins, Christopher W.; Paretti, Christopher T.; Ghezzi, Nicola Stefano; Spiegelman, Michael; Martinez, Ronald; Davis, Marc; Kalaboukis, Chris, System and method for presentation of media related to a context.
  61. Higgins, Christopher W.; Paretti, Christopher T.; Ghezzi, Nicola Stefano; Spiegelman, Michael; Martinez, Ronald; Davis, Marc; Kalaboukis, Chris, System and method for presentation of media related to a context.
  62. Davis, Marc Eliot; Spiegelman, Michael; Kalaboukis, Chris; Martinez, Ronald; Ghezzi, Nicola Stefano; Paretti, Christopher T.; Higgins, Christopher William, System and method for reporting and analysis of media consumption data.
  63. Davis, Marc Eliot; Grinstead, George; Parry, Lee J.; Boerries, Marco; Higgins, Christopher William; O'Sullivan, Joseph James; Martinez, Ronald; Trout, Robert Carter, System and method for synchronizing data on a network.
  64. King, Simon P; Davis, Marc Eliot; Higgins, Christopher William, System and method for verified monetization of commercial campaigns.
  65. King, Simon P; Davis, Marc Eliot; Higgins, Christopher William, System and method for verified presence tracking.
  66. Higgins, Christopher William; Davis, Marc; O'Sullivan, Joseph; Martinez, Ronald, System and method for word-of-mouth advertising.
  67. Vuong, Thanh, System and method of dynamic management of spam.
  68. Yu, Tonny, System for email processing and analysis.
  69. Martinez, Ronald; Davis, Marc Eliot; Higgins, Christopher William; O'Sullivan, Joseph James, Systems and methods of mapping attention.
  70. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  71. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  72. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  73. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  74. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로