Data processing: speech signal processing – linguistics – language – Linguistics
Patent
1996-09-18
2000-11-07
Chang, Vivian
Data processing: speech signal processing, linguistics, language
Linguistics
704 9, G06F 1720, G06F 1727
Patent
active
061449342
ABSTRACT:
An electronic message filtering system and method is described. A message is received as input to the filter and decomposed into a set of components. The set of components is then processed through a pattern matching algorithm to determine if the message contents contains patterns inherent in a specified pattern, such as a natural language. The results of the pattern match analysis are output by the filter.
REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4584639 (1986-04-01), Hardy
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4648031 (1987-03-01), Jenner
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4870571 (1989-09-01), Frink
patent: 4885789 (1989-12-01), Burger et al.
patent: 4914568 (1990-04-01), Kodosky et al.
patent: 4914590 (1990-04-01), Loatman et al.
patent: 5251131 (1993-10-01), Massand et al.
patent: 5272754 (1993-12-01), Boebert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5276789 (1994-01-01), Besaw et al.
patent: 5303303 (1994-04-01), White
patent: 5333266 (1994-07-01), Boaz et al.
patent: 5355474 (1994-10-01), Thuraisngham et al.
patent: 5377349 (1994-12-01), Motomura
patent: 5377354 (1994-12-01), Scannell et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5418951 (1995-05-01), Damashek
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5548507 (1996-08-01), Martino et al.
patent: 5555346 (1996-09-01), Gross et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5619648 (1997-04-01), Canale et al.
patent: 5632011 (1997-05-01), Landfield et al.
patent: 5634084 (1997-05-01), Malsheen et al.
patent: 5644571 (1997-07-01), Seaman
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5715466 (1998-02-01), Flanagan et al.
patent: 5717913 (1998-02-01), Driscoll
patent: 5720035 (1998-02-01), Allegre et al.
patent: 5781550 (1998-07-01), Templin et al.
Boebert, W.E., et al., "Secure Ada Target: Issues, System Design, and Verification", Proceedings of the Symposium on Security and Privacy, Oakland, California, pp. 59-66, (1985).
Boebert, W.E., et al., "Secure Computing: The Secure Ada Target Approach", Sci. Honeyweller, 6 (2), 17 pages, (Apr. 1985).
Smith, R.E., "Constructing a High Assurance Mail Guard", Proceedings of the 17th National Computer Security Conference, p. 247-253 (Oct. 1994).
Gassman, B., "Internet Security, and Firewalls Protection on the Internet", IEEE, 93-107 (1996).
Greenwald, M., et al., "Designing an Academic Firewall: Policy, Practice, and Experience with SURF", IEEE, 79-92 (1996).
Karn, P., et al., "The ESP DES-CBC Transform", Network Working Group, Request for Comment No. 1829, http//ds.internic.net/rfc/rfc1829.txt, 9 p. (Aug. 1995).
Lampson, B.W., et al., "Dynamic Protection Structures", AFIPS Conference Proceedings, 35, 1969 Fall Joint Computer Conference, Las Vegas, NV, 27-38 (Nov. 18-20, 1969).
Merenbloom, P., "Network `Fire Walls` Safeguard LAN Data from Outside Intrusion", Infoworld, p. 69 & addnl page (Jul. 25, 1994).
Metzger, P., et al., "IP Authentication using Keyed MD5", Network Working Group, Request for Comments. No. 1828, http//ds.internic.net/rfc/rfc1828.txt, 5 p. (Aug. 1995).
Peterson, L.L., et al., In: Computer Networks, Morgan Kaufmann Publishers, Inc., San Francisco, CA, p. 218-221, 284-286 (1996).
Press, L., "The Net: Progress and Opportunity", Communications of the ACM, 35, 21-25 (Dec. 1992).
Stempel, S., "IpAccess--An Internet Service Access System for Firewall Installations", IEEE, 31-41 (1995).
White, L.J., et al., "A Firewall Concept for Both Control-Flow and Data-Flow in regression Integration Testing", IEEE, 262-271 (1992).
Wolfe, A., "Honeywell Builds Hardware for Computer Security", Electronics, 14-15 (Sep. 2, 1985).
"Answers to Frequently Asked Questions About Network Security", Secure Computing Corporation, 41 p. (1994).
Adam, J.A., "Meta-matrices", IEEE Spectrum, 26-27 (Oct. 1992).
Adam, J.A., "Playing on the Net", IEEE Spectrum, 29 (Oct. 1992).
Ancilotti, P., et al., "Language Features for Access Control", IEEE Transactions on Software Engineering, SE-9, 16-25 (Jan. 1983).
Baclace, P.E., "Competitive Agents for Information Filtering", Communications of the ACM, 35, 50 (Dec. 1992).
Belkin, N.J., et al., "Information Filtering and Information Retrieval: Two Sides of the Same Coin?",Communications of the ACM, 35, 29-38 (Dec. 1992).
Bellovin, S.M. et al., "Network Firewalls", IEEE Communications Magazine, 32, 50-57 (Sep. 1994).
Bevier, W.R., et al., "Connection Policies and Controlled Interference", Proceedings of the 8th IEEE Computer Security Foundations Workshop, Kenmare, County Kerry, Ireland, 167-176 (Jun. 13-15, 1995).
Bryan, J., "Firewalls For Sale", BYTE, p. 99-100, 102 and 104 (Apr. 1995).
Damashek, M., "Gauging Similarity with n-Grams: Language--Independent Categorization of Text", Science, 267, 843-848 (Feb. 10, 1995).
Foltz, P.W., et al., "Personalized Information Delivery: An Analysis of Information Filtering Methods", Communications of the ACM, 35, 51-60 (Dec. 1992).
Goldberg, D., et al., "Using Collaborative Filtering to Weave an Information Tapestry", Communications of the ACM, 35, 61-70 (Dec. 1992).
Grampp, F.T., "UNIX Operating System Security", AT &T Bell Laboratories Technical Journal, 63, 1649-1672 (Oct. 1984).
Haigh, J.T., et al., "Extending the Non-Interference Version of MLS for SAT" Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland, CA, 232-239 (Apr. 7-9, 1986).
Kent, S.T., "Internet Privacy Enhanced Mail", Communications of the ACM, 36, 48-60 (Apr. 1993).
Lee, K.-C., et al., "A Framework for Controlling Cooperative Agents", Computer, 8-16 (Jul. 1993).
Loeb, S., "Architecting Personalized Delivery of Multimedia Information", Communications of the ACM, 35, 39-50 (Dec. 1992).
Loeb, S., et al., "Information Filtering," Communications of the ACM, 35, 26-28 (Dec. 1992).
Smith, R.E., "Sidewinder: Defense in Depth Using Type Enforcement", International Journal of Network Management, 219-229 (Jul.-Aug. 1995).
Stadnyk I., et al., "Modelling Users' Interests in Information Filters", Communications of the ACM, 35, 49 (Dec. 1992).
Stevens, C., "Automating the Creation of Information Filters", Communications of the ACM, 35, 48 (Dec. 1992).
Thomsen, D., "Type Enforcement: The New Security Model", Proceedings of the SPIE, Multimedia: Full-Service Impact on Business, Education and the Home, vol. 2617, Philadelphia, Pa, 143-150 (Oct. 23-24, 1995).
Warrier, U.S., et al., "A Platform for Heterogeneous Interconnection Network Management", IEEE Journal on Selected Areas in Communications, 8, 119-126, (Jan. 1990).
Boebert William E.
Stockwell Edward B.
Vanyo Heidi A.
Chang Vivian
Edouard Patrick N.
Secure Computing Corporation
LandOfFree
Binary filter using pattern recognition does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Binary filter using pattern recognition, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Binary filter using pattern recognition will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1651405