摘要:
A method is disclosed, for recognizing whether some electronic data is the digital representation of a piece of text and, if so, in which character encoding it has been encoded. A fingerprint is constructed from the data, wherein the fingerprint comprises, for each of a plurality of predetermined character encoding schemes, at least one confidence value, representing a confidence that the data was encoded using said character encoding scheme. The fingerprint also comprises a frequency value for each of a subset of byte values, each frequency value representing the frequency of occurrence of a respective byte value in the data. A statistical classification of the data is then performed based on the fingerprint. The method may be applied to spam classification.
摘要:
A method of analysing the properties of an electronic file, especially to detect a packed executable file. A neural network is used to determine if a given file is a packed executable from analysis of byte distributions within the file without unpacking the fiel from its compressed form.
摘要:
A method of applying a policy comprises receiving a text and applying the policy to the text. If the policy is violated, the method further comprises redacting the text; reapplying the policy to the redacted text. In response to a result of reapplying the policy to the redacted text action is taken as determined by the policy.
摘要:
A method of processing a received image file, comprises receiving the image file; and detecting a match between the received image file and a previously received image file, if (a) the received image file differs from the previously received image file, and (b) an image represented by the received image file is visually identical to an image represented by the previously received image file.
摘要:
An email policy is applied in a policy manager, running on a mail server in a local area network, to determine whether an outgoing email message should be allowed to be transmitted to a destination address outside the local area network, for example over the internet. A digital signature is used in the policy manager, to determine if the sender is the sender indicated in the message itself. If so, a sender-dependent policy is applied.
摘要:
In a communications network, policies are applied to electronic mail messages by determining a plurality of routes for electronic mail messages, each route being defined by at least one sender and at least one recipient, and determining a policy to be applied to electronic mail messages on each route. At least one tag is associated with each of a plurality of servers in the communications network, and at least one of the tags is associated with each of the plurality of routes. Each of the plurality of servers identifies the or each route that is associated with a tag that is associated with the server, and then applies the respective policy to electronic mail messages on the or each identified route. This allows policy to be defined on the basis of the role of the server and the policy features that it supports.
摘要:
A method of applying a policy to a text comprises searching the text for data having a predefined form; and searching a dataset for additional data associated with any data having the predefined form found in the text. A supplementary search query is generated using said additional data; and the text is searched using the supplementary search query. The policy is then applied based on a result of the search using the supplementary search query.
摘要:
A method of controlling a system of monitoring messages in a network is described. A message sent by a user of the network to one or more recipients is received and a weight is applied to any text from any previous message that appears in the message. A measure of language content used in the message is formed and stored in one or more data stores. Information identifying the sender of the message is also stored. The stored measure of the language content and the stored information identifying the sender is reported to an administrator of the system.
摘要:
A method for retrieving a resource such as a data file includes determining an email address of a user requesting the retrieval, and checking whether a characteristic condition associated with said resource is satisfied. If the characteristic condition is not satisfied, for example if the size of the resource exceeds a threshold, a message is returned to the user indicating that said request for retrieval of said resource has been received, and the request is placed in a queue. The queue is processed on the basis of a rule, and the resource retrieved when said queue has been sufficiently processed, when the user can be notified by means of the email address that the resource has been retrieved. Also disclosed is a similar process for uploading data files in response to a request.
摘要:
When data is stored on a computer, or subsequently, originator preferences relating to the data are stored in a database, for example in a network. When another user subsequently makes a request for processing of the received data, or a modified copy of the data, it is determined whether the requested processing is consistent with any stored originator preferences, and the requested processing is permitted only if it is consistent with the stored originator preferences. The preferences may relate to saving, copying or retransmitting the data. The originator may be notified of any processing operations that are carried out.