HK1069232A - 使能集成反垃圾邮件技术的框架 - Google Patents

使能集成反垃圾邮件技术的框架 Download PDF

Info

Publication number
HK1069232A
HK1069232A HK05101733.5A HK05101733A HK1069232A HK 1069232 A HK1069232 A HK 1069232A HK 05101733 A HK05101733 A HK 05101733A HK 1069232 A HK1069232 A HK 1069232A
Authority
HK
Hong Kong
Prior art keywords
confidence level
spam
threshold
spam confidence
message
Prior art date
Application number
HK05101733.5A
Other languages
English (en)
Inventor
Andrew J. Wallace
Neil K. Koorland
Qiang Wang
Samuel J. Neely
Simon P. Attwell
Original Assignee
微软公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 微软公司 filed Critical 微软公司
Publication of HK1069232A publication Critical patent/HK1069232A/zh

Links

HK05101733.5A 2003-01-09 2005-03-01 使能集成反垃圾邮件技术的框架 HK1069232A (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US339508 2003-01-09

Publications (1)

Publication Number Publication Date
HK1069232A true HK1069232A (zh) 2005-05-13

Family

ID=

Similar Documents

Publication Publication Date Title
US7171450B2 (en) Framework to enable integration of anti-spam technologies
US7533148B2 (en) Framework to enable integration of anti-spam technologies
JP4335582B2 (ja) 迷惑電子メールを検出するシステムおよび方法
US7155738B2 (en) System and method for managing a trusted email datastore
US20110246584A1 (en) Personalized Email Interactions Applied To Global Filtering
US7447744B2 (en) Challenge response messaging solution
US7603422B2 (en) Secure safe sender list
US20250294003A1 (en) Methods for managing spam communication and devices thereof
US7599993B1 (en) Secure safe sender list
HK1069232A (zh) 使能集成反垃圾邮件技术的框架
HK1086654B (zh) 能夠使反垃圾技術集成的結構
Guo et al. Research on the comprehensive anti-spam filter
RU2828611C1 (ru) Система и способ классификации писем электронной почты
EP1965547B1 (en) A computer implemented system and a method for detecting abuse of an electronic mail infrastructure in a computer network