CN101194248A - System, method and device for trapping mass-delivery electronic messages - Google Patents

System, method and device for trapping mass-delivery electronic messages Download PDF

Info

Publication number
CN101194248A
CN101194248A CNA2006800169719A CN200680016971A CN101194248A CN 101194248 A CN101194248 A CN 101194248A CN A2006800169719 A CNA2006800169719 A CN A2006800169719A CN 200680016971 A CN200680016971 A CN 200680016971A CN 101194248 A CN101194248 A CN 101194248A
Authority
CN
China
Prior art keywords
message
electronic information
electronic
filtrator
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006800169719A
Other languages
Chinese (zh)
Inventor
马克·E·狄龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN101194248A publication Critical patent/CN101194248A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

System and method for substantially preventing mass-delivery and/or unsolicited electronic messages from reaching an end user's electronic message address. A filter is used to either pass or fail a message, to recognize a pass-phrase, to deliver electronic messages to a first mailbox of an end user when the pass-phrase is identified or when the message passes the filter criteria, and to send the message to an alternative mailbox when the pass-phrase is not identified and the message fails said filter criteria. The alternative mailbox has a mailbox name different than the first mailbox name, and has a reply address set to a different electronic message address. The alternative mailbox is configured to receive electronic messages delivered through the filter and send a reply containing a human instruction to the electronic message address of the received electronic message, the human instruction indicating a pass-phrase. This invention offers a method of ensuring compatibility among all active spam handling systems thereby avoiding feedback loops and allowing massdeployment of such systems regardless of the specific method used.

Description

Be used to catch system, the method and apparatus of the electronic information of mass-sending
Technical field
The present invention relates to a kind ofly be used to prevent that mass-sending and/or uncalled electronic information (" spam (spam) " or " spam ") from arriving the novel method of final user's electronic information (" email ") address.This technology relates to the mixed method of a kind of server end and user side filtering technique and " spam is caught trap " new principle, is used to distinguish Email that computing machine produces and from the Email of human transmit leg.This technology provides a kind of and has guaranteed that legitimate email can be by having eliminated the reliable method that need check the spam warehouse owing to erroneous judgement (legal Email is erroneously identified as spam) simultaneously.Described method does not require that the user's download Email filters it, can be applied to all users' Email acquisition point thus under the situation that does not have Add-ons or configuration.This system uses the hommization method to avoid erroneous judgement.Can understand instruction with the mankind and confirm the message of being filtered so that walk around described filtrator; Such as " use the 3rd speech of this sentence in your subject line resends your message ".Be easy to by human intelligible, this statement basically can not be by decryption computer under the situation of current techniques.
Background technology
The mail exchange (mail exchange, MX) record is the clauses and subclauses that are used to discern mail server in the dns database, described mail server is responsible for handling the Email of this domain name.In case received by the MX main frame, just have two kinds of basic skills to come the disposal of refuse mail: server end or user side filter.Server end filters when being that the MX main frame provides built-in twit filter, and described built-in twit filter can be handled described spam before spam arrives user's inbox.The MX logic of Denver company is the company that is used for providing to the user this service, and their MX record of wherein said subscriber authorisation comes route via the server of the said firm.The method has limited spam and has been applied to all acquisition point simultaneously, but does not guarantee to prevent the reliable method of judging by accident, so the user must often monitor that " spam " file does not miss legal Email so that be sure of him or she.The Earthlink of Atlanta GA provides the service of a kind of being called as " spamBlocker ", is used to provide three-level protective: close, middle (" known spam stops ") and the highest (" suspicious Email and known spam piece ").Middle rank stops known spam and highest stopping except that all transmit legs user's white list.The superlative degree is described as on their site by Earthlink: " (the highest protection) suspicious e-mail blocking---want by 100% protection veritably? filter from all mails that are not in transmit leg among you personal address book.You can at any time read message in your suspect email file, perhaps EarthLink can send summary every day of suspect message to you ".Earthlink uses " the transmit leg application form of permission " that the query message system is provided.This sure response technology is effective, but it is and unreliable, this is because they depend on the user and take to move so that allow definite transmission pass through, and promptly it requires the user to monitor erroneous judgement and manages legal transmit leg, and this is all to be identical because it handles all unknown transmit legs." the transmit leg application form of permission " is heavy especially for the commercial user, and described commercial user usually receives Email and do not wish the time flower on monitoring Junk E-Mail folder or authorization requests responded from the transmit leg of the unknown.
Use resident programs such as those user terminal systems that can obtain from the Symantec company of the Qurb company of San Mateo CA and Cupertino CA, described resident program is handled the Email that is received, and in typical case it is moved on in the file so that the user checks after a while.User terminal system can also use " sure response " technology to isolate suspicious message and respond to querying message up to transmit leg, and Email is released from quarantine and to the user as seen at that point.Although Qurb uses the query method, however it does not rely on human the explanation and walk around filtrator, neededly just simply reply.Its shortcoming of user terminal system is to require email download to the user so that handle.If use sure response method, so also require uplink time to be used for sending in addition and query message.This may be expensive for low bandwidth or mobile subscriber.Must on each acquisition point, use the system of these types in addition.For example in work, be in and from the user that notebook PC receives Email also configuration software (comprising white list and blacklist) may be installed all on all three machines in when tourism.If use any other acquisition point such as the common terminal in the Internet cafe, if perhaps obtain Email from the different platform such as hand-held PDA or mobile phone, so this user may be not protected fully.
Two types system all uses based on the method for exploratory, statistical and prestige and uses criterion and the rule that is used for determining Email validity, makes it pass through or not pass through.Usually provide and to make the user filtrator sensitivity be set to low, middle or high by the setting of user's adjustment.The user can create " white list " and " blacklist " (accept all the time or reject all the time) in typical case.Some systems even can provide " training " method to pass and the accuracy of improved filter in time.
Use some systems for security purpose and transmit human understandable message.For example, the America Online of Dulles VA uses by the stylized image that pass through phrase (pass phase) of user interpretation so that reset their beginning password under the situation that 2 login attempts are failed.Yet this principle and shall not be applied to is used for filtering the electronic information of the Email processing system form of spam and sends.This application is non-obvious, as the anti-spam technologies alliance technology and the strategy suggestion (Anti-Spam Technical Alliance Technology And Policy Proposal) (on June 22nd, 2004) of being prepared by anti-rubbish mail alliance (Anti-Spam Alliance). , Comcast etc.) this group that the expert formed fail method of the present invention is thought to challenge the method for spam problem.
The method of the SolidBlue Software of Ontario Canada is used the method for the positive response of EarthLink, but they provide this method via themselves the site that is linked to their MX main frame.Transmit leg utilizes network link to receive query message; In that they read the key that stylizes and its e-mail address together with them are input in the site after described link.The mail of transmit leg is delivered to the user then.This is a fabulous system, but it requires the user to re-route their MX record via the server of company.Owing to expect that all want to avoid the proprietary MX main frame of Email User use of spam is unpractical, so this requires to be subjected to self restriction for widespread deployment.
As the EarthLink system, SolidBlue user can not control key thus can not balance diversity by the phrase system, promptly many classifications, interim, child's protection etc.Add that must be input to the website to your e-mail address is that most of user who is sick of spam is reluctant the thing done.In fact, send out spam one and can lure that implicit E-mail receiver/send person verifies that their address is so that increase target into to use this type of query message of forging.Concerning this is not a problem by the phrase method; There is not extraneous link and finally is that the user judges to use on the Email that whether formerly sends and passes through phrase.
All sure response methods all have common flaw: influencing each other between them is uncertain.Therefore this does not guarantee compatibility, if the Earthlink user who sends message to SolidBlue user is used as spam and stops that the query message of returning from SolidBlue may be spam by the Earthlink system identification equally so.The result produces feedback cycle and origination message can pass through never.
Summary of the invention
My accident has been found a kind of fruitful method that is used to catch spam, and this method does not also require that the user monitors " garbage files (junkfile) " and guarantees that legal transmit leg can exceedingly not filtered.In addition, can the new system of operated from a distance, therefore needn't consume user's bandwidth and it is applied to all acquisition point and platform simultaneously.Described method utilization utilizes human language and comprehension as the instrument of filtering electronic mail.The user is provided for importing the rule of the electronic information such as Email, makes that comprising the message of determining by phrase (preferably in subject line) is accepted all the time.Indicating them how to use to the auto answer meeting that stops transmit leg walks around this by phrase and catches trap.The user can change described by phrase and white list and blacklist can be set when needs.And do not require Email route or MX record is changed.
Can use an arbitrary number favorable service device end disposal system in the present invention, as long as described system can reject the Email that is filtered, it is transferred to another address and acceptance is used for transmitting automatically the rule that comprises specified Email by phrase (preferably at subject line).In addition, in case system of the present invention is deployed in the public utilities, it is to rise in another user's of this system the device of auto answer that mail server also requires to be used to detect given message.Otherwise the instruction message that comprises by phrase information may be identified as spam by mistake, produces new query message thus in the feedback cycle of Email.A straightforward procedure avoiding this point is that the SMTP server of transmit leg was remained on the record of subject line in the database in a period.When sending command information, user's auto answer template may make original subject line keep intact.So the mail server of transmit leg will the subject line that reaches Email with send database and compare---coupling is passed through.Programming realizes that this point is simple and can be readily incorporated in any Email processing system.As selection,, be used for setting up unique recognition element (" UIE ") or other other method of measuring can be used as " fingerprint " according to initiating a message in order to filter purpose.
The XO Communications of Reston VA provides the part of favorable service device end filtration capacity as their Email Hosting service.Can use the user terminal system of many types,, be used to provide rule is set so that handle and reply the ability that reaches Email such as MS Outlook.The Email that the present invention uses the computing machine of appointment to receive continuously to be filtered also responds to it.If " zombie process (zombie) " is used to spue the computing machine of (spew) spam, so new system is " an anti-zombie process "---be designed to gulp down into (devour) spam.This anti-zombie process is accepted the Email that filtered and is responded with auto answer message.Described message interpretation the process and the indication original sender of filtering how to defeat filtrator.
Next what take place depend on that original transmitting terminal is people or silicon.Transmit leg obtains the message of picture " your Email is used as spam by my PC and is filtered, and please use in your subject line the 4th speech of this sentence to resend your message " and so on.If Email is received by the mankind, they can know institute's " filtration " speech is inserted in the subject line so, and their mail can be given the user by route automatically when resending.If original Email is a spam, what can not take place or can be can't delivery notification returning to come so, for example 55x SMTP error code.(anti-for this reason zombie process uses independently return address.) optionally, can make it possible to control in addition email disposal to concrete word or the preposition subject line that adds (prepend) at institute's filtering electronic mail of phrase thus.For example, the user tag for the message have by phrase in case make when described message by the time legitimate sender adding white list is convenient to carry out.Certainly, enabling other filtration and disposal route also is conspicuous concerning those skilled in the art.Equally, logical changes also is fine, and such as the indication original sender instruction Email is transferred to the user rather than resends their origination message.Rule of response can be automatically appending in the subject line so that simplify the process of walking around of transmit leg by phrase is preposition like this.
The present invention has described a kind of desirable spam and has caught trap, it does not require that the user's download Email is so that filter it, it is applied to all acquisition point and platform simultaneously, it provides a kind of and has been used for depending on human commands by use and catches trap and avoid the reliable mechanism of judging by accident to walk around, it does not require and re-routes the MX record, and it can be positioned on the Internet Anywhere.Be most importantly, owing to not requiring that the user monitors Junk E-Mail folder for erroneous judgement or takes measures so that can be sent from the Email of unknown transmit leg, so the present invention is that described system operates under uncared for situation and can not bring any burden to the user reliably.Because the final difference of transmit leg of being filtered is whether they are human, so even if but this system allows also can arrive described user at the transmit leg that does not have the unknown under the situation of user interactions lacks the bulk electronic mail that stops that computing machine produces.This is a particular importance to the commercial user who usually receives Email there from the individual, and described individual is not known to the described commercial user.
The present invention can be set to the independence " black box " for the user, and wherein said " black box " is attached on user's the network, and perhaps the present invention can be to service that the user provided via the Internet.It in addition can be integrated in the hardware, such as circuit board in the PC or microprocessor chip.The present invention can also directly be attached to Email and obtain in the software application so that provide and be easy to the interface that disposes and manage.The software interface of estimating this system can provide such as the parts in the white list that user's contact data base is input on the server end filtrator.
Estimate that further the present invention can be applied to the communication of other type except that traditional POP3, IMAP or MS exchange Email, such as instant message (" IM "), short message service (" SMS "), HTML (Hypertext Markup Language) (" HTTP "), WLAN (wireless local area network) (" LAN ") connection, dedicated calculation machine network or other electronic communication protocol (in general " electronic information ") or the simulating signal such as radio.In this case, query or instruction message can be the human understandable signal of any kind of in case avoid judging by accident and described message can by based on or non-any communication network based on the Internet send.The present invention can be applied to the cell phone safety practice so that prevent by robotization or unwarranted blocker steal mobile phone data.
The invention provides and be used for the unified approach that compatible system produces unique recognition element (" UIE ").UIE is produced by the SMTP application program, is recorded on the server end filtrator, and is used as a part of accepting tabulation in a period.Compatible system also returns the UIE from other transmit leg without change, makes to use identical method by any other compatible system.Utilize this technology, avoided feedback mechanism, and when the time, be used for initiatively stopping that the method for any adaptation of spam all is effective with all other transmit leg interactions basically.
An embodiment makes the SMTP server keep the record of transmit leg subject line in a period.The auto answer template of current with compatible mutually spam disposal system may make original subject line be kept perfectly when sending when it queries message.So the mail server of transmit leg will the subject line that reaches Email with send database and compare---make coupling query message and pass through in view of the above by allowing thus.Programming realizes that this point is simple and can be readily incorporated in any Email processing system.As selection,, be used for setting up UIE or other other method of measuring can be used as " fingerprint " according to initiating a message in order to be used to filter purpose.
A kind of form of UIE be verification and.Utilize the MD5 method of verification and calculating to belong to the professor Ronald L.Rivest of MIT.The MD5 algorithm the message of random length as input and 128 " fingerprint " or " eap-message digest " that generate described input as exporting.It is infeasible on calculating infer to generate any message that two message with identical message summary or generation have the given eap-message digest of intended target in advance.Can find the open-source that is used for based on verification and the application of MS Windows and other OS at www.fastsum.com and http://www.turkpiogrammer.com/20q5/01/md5-hash-algorithm_23.htm l.This system is used for digital signature applications in typical case.For the present invention, simple utility routine can according to the main body of sending Email produce verification and.Described verification and can being included in the subject line is complementary with interim white list then.As an alternative, independently unit-unit that it can be used as described message usually transmits, such as the specific fields in stem (header).Compatible system may comprise have produce without change and be in and the same field that received in the UIE of any query message.Estimate UIE or verification and can be encrypted so that the efficient that increases security or intercepted.
Send out spam one side and depend on response from very little number percent in a large amount of message so that effort is worth economically.If still have only very the message of small scale to pass through, Xiang Ying number becomes infinitely small so.Therefore, be extensive use of the present invention can eliminate spam fully in some day existence; If this is to receive spam owing to have no talent basically, the economic motivation that sends this spam so may rapidly disappear.The present invention may be the spam needed " efficient weapon (silver bullet) " that terminates forever.
In addition, the present invention can be applied to the communication of other type except that Email, such as instant message (" IM "), short message service (" SMS "), HTML (Hypertext Markup Language) (" HTTP "), WLAN (wireless local area network) (" LAN ") connection, dedicated calculation machine network or other electronic communication protocol (stack up is called " electronic information ").
Description of drawings
Fig. 1 is the process flow diagram according to " spam is caught trap " of the present invention system.
Fig. 2 is the synoptic diagram according to the preferred embodiments of the present invention.
Fig. 3 is the process flow diagram with the user's of " spam is caught trap " of the present invention of second system's interaction of transmit leg first system, the SMTP server of wherein said second system produces and also writes down unique recognition element (" UIE "), and is set to discern described UIE and transmits described auto answer message from the filtrator that user's of the present invention auto answer instruction message returns this UIE and wherein said second system.
Fig. 4 is the process flow diagram according to " spam is caught trap " of the present invention system, wherein indicates described transmit leg to pass on and queries message rather than resend origination message, returns UIE thus.Preferably original mail is included in the response message.
Fig. 5 is first system with the user's of the second activity system interaction of transmit leg any movable spam disposal system, the SMTP server of wherein said second system produces also record UIE, and is set to discern described UIE and transmits described auto answer message from the filtrator that the auto answer instruction message of first system returns this UIE and wherein said second system without change.
Embodiment
Referring to accompanying drawing, Fig. 1 shows the process flow diagram that is used to utilize " spam the is caught trap " system that maybe can be configured to the electronic information processing server.The electronic information processing server for example can comprise computing machine.Such as the Email that is used for mailbox (as an example, such as employed [email protected] in process flow diagram) reach that electronic information writes down by MX that main frame (for example, XO communication) receives and according to setting up in advance and/or adjustable criterion is filtered.In this example, the electronic information processing server comprises e-mail server, and is delivered to the user by the Email of server end test.Fail to be suspended to subject line by word in advance " spam " and be transferred to candidate's mailbox then, such as [email protected]|JunkMail by the Email of testing (optionally).Anti-zombie process is set to obtain Email and respond with template message (for example filtered.oft) from [email protected] address of replying that initiates a message is set to independently e-mail address, such as [email protected] anti-zombie process uses independently, and electronic mail account (for example, [email protected]) obtains and deletes querying any response of message.When in response to the notice that can't send of having queried message sink; the described notice that can't send is sent to (for example catches trap; [email protected]), thus run off in the Email circulation and the bandwidth that are not having under the situation of effective return address the protection user avoid the notice of returning from transmit leg undeliverable and can not occur being rejected.
The electronic information that is filtered, the Email such as in this example is sent back to transmit leg, and described transmit leg is understanded instruction then and is revised the subject line of their original electronic mail and resend to use by phrase.On server, rule is set and has all Emails by phrase (" filtration " use asterisk wildcard (* ' s) be that * filtered* makes that the location independent of speech in subject line is critical) in this case, Anywhere in the subject line so that be received in.When the message of being revised is walked around filtrator after being resend, utilize preposition its theme that appends to of speech " (Trapped) that catch ".In this manner, automatically warning transmit leg to walk around to the user catches trap and can make the other processing such as adding white or blacklist be convenient to carry out.
With reference to Fig. 2, shown schematic illustration equipment of the present invention.In this preferred embodiment, network interface unit (NIC) provides being connected of the Internet and subscriber computer, the CPU (central processing unit) of described subscriber computer (CPU) is carried out evaluation work, and the preferred storage of e-mails of non-volatile memory apparatus (for example hard disk drive) is obtained software and operating system.Optionally, video processor and the human interface device such as keyboard and mouse that is used for figure output can be used for customer interaction.As selection, can provide user capture by the web browser of standard so that carry out Remote configuration and maintenance.
With reference to Fig. 3, show the process flow diagram with the system of the present invention (user) of second system (transmit leg) interaction, described second system is configured to produce UIE and it is included in the message.The mail host of transmit leg keeps the record of UIE in a period, such as subject line or other unique identifier or measure.UIE carries and takes back the auto answer that comprises human commands via custom system; And the filtrator on the transmit leg mail server is configured to make any message of comprising UIE by having avoided opposite response potential between two or more users of the present invention thus and/or this response is minimized, otherwise it may form the feedback cycle of Email.
Following example of the present invention also is not intended to restriction, can change these designs and process under the situation that does not break away from wide in range inventive principle of the present invention.For example, anti-stiff (anti-zombie) process needs not to be independently or special-purpose machine, but this may be preferential the selection.It can be the background process on the custom system.Although this may utilized bandwidth and processing power, yet it can be set to occur in the non-peak hours or between other function.As selection, it can be set to operate thus continuously working load is distributed in a whole day.In addition, in fact anti-zombie process system does not need to be positioned on user's the network.Can carry out Anywhere can of access to the Internet.Can expect to use anti-zombie process group to provide filtering services to many long-distance users.
In addition, instruction message can be human language or vision or the combination of the two, such as image that adds cat and indication recipient animal species is inserted in the subject line so that pass through filter test.In the case, can use several automatic acceptance rules, promptly " cat ", " cat family ", " Felis " etc. in case guarantee by.Creative user can use the method for infinite range, such as simple logic puzzle, joke, the rhythm or " filling a vacancy " statement.In addition or as selecting, can send spoken command by the form that adopts audio file equally and use audible instructions.Optionally audible instructions can use alone or with one or more other packings of orders, such as vision or sound instruction.All these technology are easy to be understanded by the mankind, but can not be deciphered by modern computer basically.
In addition, a plurality of or dynamically can be used for different transmit leg classes by phrase, such as " the Uncle Joe " that be always kinsfolk's work.Can also be set to after scheduled time slot expiration by phrase and further strengthen communications security thus.Interim or disposablely may be particularly useful for making the user under the situation of Email their e-mail address to be input in the site needn't worrying to obtain outside the time limit of determining not want by phrase.Can control by keeper who wishes management company communication or the relevant father and mother that their child's Email contact is controlled by phrase.Even can expect may be useful in the reciprocal process of transmission: web interface indication sender-selected " individual " or " enterprise ", name that requires GrandmaNini and another request user's enterprises registration trade mark by phrase.Existence can be by the human many kinds possibilities of filtering of the dependence that the present invention realizes.Human mind's versatility and creativeness are to being used for transmitting to wanting transmit leg unique restriction of the method for passing through phrase.
Can utilize and to make up total system by the user by the interface that the web browser of standard visits.Therefore do not require complete computer with man-machine interface.Perhaps the most autonomous individual components, it can be positioned on user's the network does not have keyboard or monitor as simple " black box ".Owing to catch trap and in fact do not open its handled any Email, so this equipment even can not need virus scanning software.Can expect that it can be card or processor in the PC.Can expect that the present invention can be configured to " catching on the chip trap ".From the software viewpoint, described system can be used as the ingredient that Email obtains application and provides, and makes it be easy to add white list, blacklist, change by phrase etc. thus.
Though it is unlikely, but because sensitivity set on the server end filtrator is depended in the present invention, so may there be erroneous judgement (spam is unrecognized to be spam) in the present invention---because unlikely meeting erroneous judgement described sensitivity concerning user of the present invention can be set to higher.But however send out spam one and can in their subject line, use the correct phrase that passes through accidentally.It is contemplated that sending out spam one can be to resist the present invention by the arrival several users of jumping in the subject line that speech at random is inserted into their spam.Make in this way if send out spam one side, owing to there is restriction (being 256 characters) in the size to subject line in MS Outlook, the very delivery rate at the end can only be arranged so so send out spam one side.
Expectation can balance the present invention to the change of electronic information foundation structure, for example by especially in electronic information, creating specified field by phrase and/or unique recognition element, the subject line and the main body of one or more this fields and message are separated.Can change frequently by phrase and/or by using the complicated phrase (numeral, symbol and character, case sensitive etc.) that pass through, the present invention uses the human nature method of exquisiteness can reduce the possibility that spam often arrives the user sharp.Sending out the response that spam one side depends on from the very little number percent of a large amount of message is worth it economically; If but have only very the message of small scale often to pass through, Xiang Ying number just becomes infinitely small so.Thereby, be extensive use of the present invention and can eliminate the existence of spam fully in some day, if this be since basically nobody receive spam, the economic motivation that sends this spam so may rapidly disappear.The present invention may be the spam needed " efficient weapon " that terminates forever.
In addition, the present invention can be applied to the communication of other type except that Email, such as instant message (" IM "), short message service (" SMS "), HTML (Hypertext Markup Language) (" HTTP "), WLAN (wireless local area network) (" LAN ") connection, dedicated calculation machine network or other electronic communication protocol (stack up is called " electronic information ") or simulating signal.In this case, to query message can be the human understandable signal of any kind of so as to avoid judging by accident and described message can by based on or non-any communication network based on the Internet send.Utilize the method, server can be the accumulator of any kind of, comprises the message screening device that can reject or accept message according to predetermined criterion.Accumulator arrives the end receiving platform to the transfer of messages of being accepted then; And the transfer of messages of being rejected is stood to affirmation.Confirm then that the station adds and human understandablely avoid judging by accident signal (that is, passing through phrase) and the message of being rejected is replied.
Example 1:
From XO server in communication end system by following setting:
POP3:****.silon.com
SMTP:****.silon.com
Filtrator is provided with: centre-Gao (adding 34 regular white lists)
Rule that no thoroughfare:
1) preposition additional: spam (optional)
2) pass on: [email protected]|JunkMail
By rule:
1) if " * filtered* " arranged in the theme, it is preposition additional to utilize " [Trapped] " to come so
2) be delivered to the user
Anti-zombie process (P4 Dell Dimension 8100 PC operation Windows ME):
MS?Outlook?2000:
Checked e-mails every 5 minutes
Acceptance is from the Email of [email protected]|JunkMail
The return address is set: [email protected]
Application rule: utilize filtered.oft MS Outlook template file to come auto answer (referring to adjunct 2)
Application rule: deletion message
Acceptance is from the Email of [email protected]
Application rule: deletion message
Deletion rule is not set to " permanent delet ", makes the user can follow the tracks of how many Emails and is filtered and catches.This can be user-defined preference, makes the user can monitor the activity of catching trap.
Annex 3 shows by replying of receiving of filtration transmit leg ([email protected]) and by the final modification message that receives of user ([email protected]).
Catch trap in case realize spam described above, the inventor has just experienced the rapid and surprising minimizing in reception spam amount.Annex 4 shows the E-mail communication business diary of user at 24 general hours periods.Following table has been summarized the result:
Spam is caught the result of trap
The Email that is delivered to 24 hours
[email protected]|JunkMail ?115
[email protected] ?82
[email protected] ?6
Expressed more than that 115 message are blocked (wherein about 82 do not have effective return address) and the Email of 6 involution methods is delivered to the user.(number of invalid return address is similar to, and this is can be to sent the response of query before shown 24 hours periods because some of [email protected] are reached Email.Yet this Email should be offset by the similar message number to the transmission invalid address, but nearly do not return as yet in 24 hours period ends again, and this is because general activity rank several days in place of representing user and system in whole cycle).Equal total message (115) of being filtered by XO server end filtrator by the Email that [email protected]|JunkMail received, it may require manually to check before handling at last.In [email protected], be collected in first by the time or after revising, be delivered to user's Email (6 message).
Outlook sending item file shows except that revising and walk around subsequently not erroneous judgement a piece of news of catching trap in the side of being sent out manually checking of anti-zombie process.There is not erroneous judgement.
Another preferred embodiment of the present invention is that the SMTP server uses common methods that UIE is attached to mail and returns UIE without change from the query message that is received to all compatible mutually E-mail service, makes that any sure response or the active methods that are used to detect spam can be compatible mutually with all other methods.They may all make the response of the UIE that comprises nearest send Email be passed back by their filtrator.If since do not find the take over party so after several days Email be generally considered to be and can't send, so server can be removed record termly and make it to keep very little thus from the UIE database.Programming is to realize that this point is simply and not can form computation burden.
Because UIE rises in and sends Email, so there is the potential abuse of sending out spam one side hardly.The method may provide general basic in order to avoid feedback cycle each other to movable spam, and still is other sure response technology no matter their use by phrase.
Turn to accompanying drawing, Fig. 4 shows my process flow diagram of " spam is caught trap " system of application co-pending in the lump, and this system's utilization maybe can be configured to the electronic information processing server.The electronic information processing server for example can comprise computing machine.A kind of computing machine is carried out evaluation work, and the preferred storage of e-mails of nonvolatile memory device (for example, hard disk drive) is obtained software and operating system.Optionally, video processor and the human interface device such as keyboard and mouse that is used for figure output can be used for customer interaction.As selection, can provide user capture by the web browser of standard so that carry out Remote configuration and maintenance.
With reference to Fig. 5, shown process flow diagram is the movable spam disposal system (user) with second system (transmit leg) interaction, and described second system all is configured to use mutual compatible UIE system.The mail host of transmit leg keeps the record of UIE in a period, such as subject line or other unique identifier or measure.UIE carries and takes back the auto answer of querying message via custom system; And the filtrator on the transmit leg mail server is configured to transmit any message that comprises UIE and has avoided opposite response potential between two or more users of any movable spam disposal system thus.
Expectation can balance the present invention to the change of electronic information foundation structure, and for example by being the specified field of UIE establishment especially, the subject line and the main body of this field and message are separated.In addition, data can be analyzed, handle and be inserted in the specific field in message header or other metadata part.
Following example of the present invention also is not intended to restriction, can change these designs and process under the situation that does not break away from wide in range inventive principle of the present invention.Though described the present invention, yet instructions is illustrative and is not interpreted as limiting the scope of the invention with reference to specific embodiment.Under the situation of the spirit and scope of the invention of describing and being defined by the following claims not breaking away from here, those skilled in the art can expect various modifications and change.
Example 2:
The server end post-processing system is by following setting:
POP3:pop3.spamtrap-az.com
SMTP:smtp.spamtrap-az.com
Filtrator is provided with: centre-Gao (adding white list)
Rule that no thoroughfare:
1) preposition additional: spam (optional)
2) pass on: [email protected]|JunkMail
By rule:
1) if " * filtered* " arranged in the theme, it is preposition additional to utilize " [Trapped] " to come so
2) if the subject line coupling is resided UIE database (following), so preposition additional " [query] "
3) be delivered to the user
Resident data base:
1) record sends subject line
2) carry out coupling and pass through algorithm
3) after 5 days, remove record
I am the movable spam disposal system of application co-pending in the lump:
MS?Outlook?2000:
1) checked e-mails every 5 minutes
2) acceptance is from the Email of mark@_spamtrap-az.com|JunkMail
3) return address is set: [email protected]
4) application rule: utilize filtered.oft MS Outlook template to come auto answer (remain unchanged referring to annex 5-subject line, in replying, comprise origination message)
5) application rule: deletion message
6) acceptance is from the Email of [email protected]
7) application rule: deletion message
The system of transmit leg:
1) record sends subject line in volatile data base,
2) identification reaches the content of subject line and it is compared with database and passes through for the permission of mating,
3) in any query message that movable spam disposal system is produced by transmit leg, return the subject line that reaches message as at least a portion of its subject line.
Example 3:
Additional application is used electronic information to send main frame and is moved subroutine (" subroutine A ") in the email application such as MS Outlook, and described electronic information sends main frame use activity spam disposal system.Subroutine A produce such as the MD5 verification and UIE add (or insertion) when clicking when sending button in the subject line that initiates a message described UIE is preposition then.Optionally, it can be encrypted UIE or intercept it for simplicity, and perhaps flag data is to be convenient to identification (be preposition additional and add specified symbol or symbols).
The SMTP server uses another subroutine (" subroutine B ") to discern UIE and it is input in the database together with timestamp.The filtering system of mail server is used subroutine (" subroutine C ") so that the clauses and subclauses that reach Email from the beginning and its are sent that database is compared and in order to filter purpose they are worked.When mating, subroutine C by described message just look like it to be in user's white list the same.Another subroutine (" subroutine D ") storehouse record that clears data after one group of period such as 5 days.Optionally, subroutine D or another subroutine can be input to the e-mail address of institute's acknowledged in the permanent white list, make automatically to accept the message of all future from this transmit leg.In addition, subroutine B, C﹠amp; D can make up in a software application or can operate independently or be in the son group.
The additional application that is used for moving subroutine A also is identified in the UIE that any part comprised that reaches message and in same part, return them without change, makes other user of compatible system can automatically accept the query message that the user sent by operation subroutine A.
Though described the present invention, yet instructions is illustrative and is not interpreted as limiting the scope of the invention with reference to specific embodiment.Under the situation of the spirit and scope of the invention of describing and being defined by the following claims not breaking away from here, those skilled in the art can expect various modifications and change.

Claims (25)

1. one kind is used for preventing fully mass-sending and/or uncalled electronic information arrives the system of final user's electronic message address, described system comprises the electronic information processing server, described system also comprises filtrator, be used for making message pass through or not pass through according to one group of criterion, and be configured to discern and pass through phrase, make when identifying describedly during by phrase or when described message has been passed through described filter criteria, electronic information is delivered to final user's first mailbox, and describedly send described message to candidate's mailbox during not by described filter criteria by phrase and described message when not identifying; Described candidate's mailbox has the box name that is different from described first box name, and has the address of replying that is configured to different electronic message address; Described candidate's mailbox is configured to receive the electronic information via described filter delivery, and comprises replying of human commands to the electronic message address transmission of reception electronic information; And wherein said human commands has been indicated and has been passed through phrase.
2. the system as claimed in claim 1, wherein said electronic information processing server keeps according to outer generating unique recognition element that sub-message derived, and comprise described the replying that the mankind can understand instruction and also comprise described unique recognition element, described filtrator is configured to accept to comprise automatically the electronic information of described unique recognition element.
3. the system as claimed in claim 1 comprises following one or more or all parts:
A. filter bypass, described filter bypass comprises the tabulation of approving transmit leg, electronic message address from these approval transmit legs can pass through described filtrator, and no matter whether exist described phrase or the described message passed through whether not by described filter criteria in the described message;
B. wherein by to identification the designator of the message by described filtrator respond and comprise the tabulation of described approval transmit leg at least in part, wherein said response is added described user's electronic message address to described approval transmit leg and is tabulated;
C. wherein said human commands comprises relevant described literal, figure or sound instruction or its combination of passing through the use of phrase, makes electronic information can pass through described filtrator when being sent to described user's first mailbox;
D. described system comprises the self-contained separate unit that has or do not have direct human interface components, and described unit is set to carry out electronic communication with user's electronic information processing server; And
E. described system comprises that the electronic information processing server via the Internet and user carries out the long-range processing unit of being positioned at of electronic communication.
4. one kind is used for preventing fully mass-sending and/or uncalled electronic information arrives the method for final user's electronic message address, and described method comprises:
A., electronic information processing server computing machine is provided;
B., first mailbox with first electronic message address is provided;
C. be provided for coming the filtrator of filtering electronic messages content according to one group of criterion;
D., described filtrator is set discerns, to allow electronic information by described filtrator by phrase;
E. electronic information is compared by phrase with described, to discern the described phrase that passes through;
F. describedly send described electronic information to final user's first mailbox during by described filter criteria during by phrase or when electronic information when identifying, and go out describedly to send described electronic information to candidate's mailbox during not by described filter criteria by phrase and electronic information when unidentified, described candidate's mailbox has the box name that is different from described first box name, and has the address of replying that is set to the electronic message address different with described first mailbox;
G. utilize described candidate's mailbox to receive the electronic information of sending via described filtrator;
H. use the described different address of replying of described candidate's mailbox to come to comprise replying of human commands to the electronic message address transmission of reception electronic information, described human commands has been indicated and has been passed through phrase.
I. comprise from sent described electronic message address by phrase to it receive electronic information, to utilize described filtrator to discern described by phrase, and the step of sending electronic information to described final user's first mailbox.
5. method as claimed in claim 4, wherein said electronic information processing server keeps the unique recognition element from the sub-message of outer generating, and comprise described the replying that the mankind can understand instruction and also comprise described unique recognition element, and described filtrator is configured to accept to comprise automatically the electronic information of described unique recognition element.
6. method as claimed in claim 4 comprises following one or more or all features:
A. by being compared and walk around the step of described filtrator with the tabulation of approval transmit leg in the address of the described electronic information that described filtrator received, can arrive described first mailbox and no matter whether have the described phrase that passes through in the described message by described filtrator from the electronic message address of described approval transmit leg;
B. be used for pointing out that message that when described first mailbox is received previous by described filtrator and produce the step that the electronic message address of approving transmit leg is tabulated with ing, the electronic message address of described approval transmit leg can be passed through described filtrator, and no matter described by phrase whether be present in the described message or described message whether not by described filter criteria;
C. wherein said human commands comprises relevant described literal, figure or sound instruction or its combination of passing through the use of phrase, makes electronic information can pass through described filtrator when being sent to described user's first mailbox; And
D. receive any electronic information notice that can't send in response to comprising replying of described human commands, and generate the step that electronic message address is tabulated from this electronic information notice that can't send, thereby automatic fitration goes out the electronic information of all future from this electronic message address.
7. one kind is used to reduce the mass-sending electronic information sent to receiving terminal station by communication network and/or the method for undesired electronic interconnection, and described method comprises:
A. provide first receiving station to described network, comprise being configured to distinguish rejection message and accept message and be feasible message screening device according to predetermined criterion;
B., the affirmation station that is configured to receive and send electronic information is provided;
C., the rejection message confirmation signal is provided; Use described filtration unit to judge that at least one reaches message is to accept or reject;
D. the forwards of being accepted is arrived described receiving terminal station;
E. the forwards of being rejected is arrived described affirmation station;
F. use described affirmation station to send response message to rejection message;
G. described response message comprises the human understandable signal of avoiding judging by accident, and making when receive described response message can be according to the response that the human understandable identification of avoiding judging by accident signal and realization is sent to the response message that is received.
8. method as claimed in claim 7, wherein said receiving station is configured to discern according to outer generating unique recognition element that sub-message derived, and comprise the described response message that the mankind can understand instruction and also comprise described unique recognition element, and described filtrator is configured to accept to comprise automatically the electronic information of described unique recognition element.
9. one kind is used for preventing fully mass-sending and/or uncalled electronic information arrives the method for final user's electronic message address, and described method is used:
A. server end filtrator, be used for that the electronic information of being rejected is transferred to candidate site and electronic information that at least one user-defined rule accepts to be delivered to described station address automatically is provided and
B. take over party's computing machine is used to receive and is sent to electronic information described candidate site, that filtered by server, and utilizes human understandable instruction message to come to how using described rule to walk around described filtrator to make with automatic acceptance and replying.
10. method as claimed in claim 9, wherein said electronic information processing server keeps the unique recognition element from the sub-message of outer generating, and comprise described the replying that the mankind can understand instruction and also comprise described unique recognition element, and described filtrator is configured to accept to comprise automatically the electronic information of described unique recognition element.
11. method as claimed in claim 9 comprises following one or more or all features:
A. wherein said take over party's computing machine handle return address different with described station address is used for described instruction message, makes described user not receive and replys;
B. wherein said server end filtrator can carry out sensitivity adjustment by described user;
C. wherein said server end filtrator can be accepted white list and blacklist;
D. wherein can train described server end filtrator by using the rule that is customized according to user's practice;
E. wherein use optional label to come mark by the handled electronic information of described automatic acceptance rule, therefore described User Recognition goes out described electronic information and just is hunted down at first, and the chance of transmit leg being added to white list or blacklist is provided thus;
F. wherein take over party's computing machine service regeulations after handling are deleted the electronic information that is filtered;
G. wherein take over party's computing machine also obtains electronic information from the return address of described instruction message, makes described user not receive that the conduct that generates in response to described instruction message is replied or electronic information that can't delivery notification;
H. wherein said server end filtrator can carry out sensitivity adjustment by described user, and wherein said server end filtrator can be accepted white list and blacklist, and use optional label to come mark by the handled electronic information of described automatic acceptance rule, therefore described User Recognition goes out described electronic information and is hunted down, and wherein said take over party's computing machine also obtains electronic information from the return address of described instruction message, makes described user not receive that the conduct that generates in response to described instruction message is replied or electronic information that can't delivery notification;
I. it provides via the Internet is long-range fully; And
J. it provides as hardware system independently.
12. an equipment of being made up of computer system is used to receive and handle the electronic information as the filter process result, described computer system is configured to utilize and relies on human instruction how described electronic information auto answer is walked around described filter process.
13. method as claimed in claim 12, comprise the electronic information processing server, be used to keep unique recognition element from the sub-message of outer generating, and comprise described the replying that the mankind can understand instruction and also comprise described unique recognition element, and described filtrator is configured to accept to comprise automatically the electronic information of described unique recognition element.
14. equipment as claimed in claim 12 comprises following one or more or all parts:
A. wherein can be by the filtration that is applied to described electronic information and the processing rule of final user's customization;
B. wherein said computer system can be by remote access;
C. wherein said computing machine uses the configuration based on the described customization processing rule of interface cause of webpage; And
D. wherein after handling, delete the electronic information that institute sent and received.
15. a business affairs method that is used for providing to the Internet user service, described service comprises:
A. reduce the mass-sending electronic information of sending to subscriber computer by the Internet, described method comprises:
B., first mailbox with first electronic message address is provided;
C. be provided for coming the filtrator of filtering electronic messages content according to one group of criterion;
D., the user-defined phrase that passes through is provided;
E., the user-defined query message that can provide the mankind can understand instruction is provided, and described instruction comprises relevant described literal, figure or sound instruction or its combination of passing through the use of phrase;
F. use the return address different to send described user-defined query message to the electronic message address of reception electronic information with described station address; And
G. to final user's first mailbox send electronic information during by described filter criteria when described when being identified or when described electronic information by phrase.
16. business affairs method as claimed in claim 15 comprises that the unique recognition element that uses in the sub-message of outer generating makes to accept from the replying by described filtrator of other user of described method.
17. system as claimed in claim 2 comprises following one or more or all parts:
A. filter bypass, described filter bypass comprises the tabulation of approving transmit leg, electronic message address from these approval transmit legs can pass through described filtrator, and no matter whether exist described phrase or the described message passed through whether not by described filter criteria in the described message;
B. wherein by to identification the designator of the message by described filtrator respond and comprise the tabulation of approve transmit leg at least in part, wherein said response is added described user's electronic message address to described approval transmit leg and is tabulated;
C. wherein said human commands comprises relevant described literal, figure or sound instruction or its combination of passing through the use of phrase, makes electronic information can pass through described filtrator when being sent to described user's first mailbox;
D. described system comprises the self-contained separate unit that has or do not have direct human interface components, and described unit is set to carry out electronic communication with user's electronic information processing server; And
E. described system comprises that the electronic information processing server via the Internet and user carries out the long-range processing unit of being positioned at of electronic communication.
18. method as claimed in claim 5 comprises following one or more or all features:
A. by being compared and walk around the step of described filtrator with the tabulation of approval transmit leg in the address of the electronic information that described filtrator received, can arrive described first mailbox and no matter whether have the described phrase that passes through in the described message by described filtrator from the electronic message address of described approval transmit leg;
B. be used for pointing out that message that when described first mailbox is received previous by described filtrator and generate the step that the electronic message address of approving transmit leg is tabulated with ing, the electronic message address of described approval transmit leg can be passed through described filtrator, and no matter described by phrase whether be present in the described message or described message whether not by described filter criteria;
C. wherein said human commands comprises relevant described literal, figure or sound instruction or its combination of passing through the use of phrase, makes electronic information can pass through described filtrator when being sent to described user's first mailbox; And
D. receive in response to any electronic information notice that can't send of replying that comprises described human commands, and generate the step that electronic message address is tabulated from this electronic information notice that can't send, thereby automatic fitration goes out the electronic information of all future from this electronic message address.
19. method as claimed in claim 10 comprises following one or more or all features:
A. wherein said take over party's computing machine handle return address different with station address is used for described instruction message, makes described user not receive and replys;
B. wherein said server end filtrator can carry out sensitivity adjustment by described user;
C. wherein said server end filtrator can be accepted white list and blacklist;
D. wherein can train described server end filtrator by using the rule that is customized according to user's practice;
E. wherein use optional label to come mark by the handled electronic information of described automatic acceptance rule, therefore described User Recognition goes out described electronic information and just is hunted down at first, and the chance of described transmit leg being added to white list or blacklist is provided thus;
F. wherein said take over party's computing machine service regeulations after handling are deleted the electronic information that is filtered;
G. wherein said take over party's computing machine also obtains electronic information from the return address of described instruction message, makes described user not receive that the conduct that generates in response to described instruction message is replied or electronic information that can't delivery notification;
H. wherein said server end filtrator can carry out sensitivity adjustment by described user, and wherein said server end filtrator can be accepted white list and blacklist, and use optional label to come mark by the handled electronic information of described automatic acceptance rule, therefore described User Recognition goes out described electronic information and is hunted down, and wherein said take over party's computing machine also obtains electronic information from the return address of described instruction message, makes described user not receive that the conduct that generates in response to described instruction message is replied or electronic information that can't delivery notification;
I. it provides via the Internet is long-range fully; And
J. it provides as hardware system independently.
20. equipment as claimed in claim 13 comprises following one or more or all parts:
A. the filtration and the processing rule that wherein are applied to described electronic information can be by described final user's customizations;
B. wherein said computer system can be by remote access;
C. wherein said computing machine uses the configuration based on the described customization processing rule of interface cause of webpage; And
D. wherein after handling, delete the electronic information that institute sent and received.
21. method as claimed in claim 7 further comprises being used to utilize and human understandablely avoids judging by accident signal and come step that institute's rejection message is replied.
22. one kind is used for preventing fully mass-sending and/or uncalled electronic information arrives the system of final user's electronic message address, described system comprises the electronic information processing server, described system also comprises filtrator, this filtrator according to one group of criterion make message by or not by and be set to identification and pass through phrase, make describedly electronic information to be delivered to first destination of distributing to the final user during by described filter criteria during by phrase or when described message, and go out describedly to send described message to the candidate destination during not by described filter criteria by phrase and described message when unidentified when identifying; Described candidate destination has the title that is different from the described first destination title, and has the address of replying on the various objectives of being set to ground; Described candidate destination is configured to receive send via the electronic information of described filter delivery and to the destination-address of reception electronic information and comprises replying of human commands; And phrase is passed through in wherein said human commands indication.
23. one kind is used for preventing fully mass-sending and/or uncalled electronic information arrives the method for final user's electronic message address, a kind of system that comprises the spam disposal system of two or more activities that provides is provided described method, each movable spam disposal system be configured to generate as outer hair quality doubt message a part one or more UIE and as the described UIE that when compatible system is returned, is identified in the response message, make each system can discern by any other response of being generated of spam disposal system of the activity of compatibility mutually to query message.
24. one kind is used for preventing fully mass-sending and/or uncalled electronic information arrives the system of final user's electronic message address, described system comprises being used for generating as outer hair quality and doubts at least one UIE of a message part and when the device of the UIE of identification response message when compatible system is returned, makes each system can discern by any other response to query message of being generated of spam disposal system of the activity of compatibility mutually.
25. one kind is used for preventing fully mass-sending and/or uncalled electronic information arrives the equipment of final user's electronic message address, described equipment comprises computing machine, described computing machine is configured to be used to generate at least one UIE that doubts a message part as outer hair quality, and described computing machine is configured to as the UIE that is identified in when compatible system is returned the response message, described compatible system also is configured to be used to generate the one or more UIE that doubt a message part as outer hair quality, and wherein said generation system and receiving system are configured to be used to discern by any other response to query message of being generated of spam disposal system of compatible activity mutually.
CNA2006800169719A 2005-03-17 2006-03-17 System, method and device for trapping mass-delivery electronic messages Pending CN101194248A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US8227205A 2005-03-17 2005-03-17
US11/082,272 2005-03-17
US60/694,206 2005-06-27

Publications (1)

Publication Number Publication Date
CN101194248A true CN101194248A (en) 2008-06-04

Family

ID=39488290

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006800169719A Pending CN101194248A (en) 2005-03-17 2006-03-17 System, method and device for trapping mass-delivery electronic messages

Country Status (2)

Country Link
CN (1) CN101194248A (en)
ZA (1) ZA200708938B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220213A (en) * 2013-04-23 2013-07-24 国网信息通信有限公司 E-mail filtering method and device thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220213A (en) * 2013-04-23 2013-07-24 国网信息通信有限公司 E-mail filtering method and device thereof
CN103220213B (en) * 2013-04-23 2016-08-03 国家电网公司 A kind of mail filtering method and device

Also Published As

Publication number Publication date
ZA200708938B (en) 2009-11-25

Similar Documents

Publication Publication Date Title
US11019079B2 (en) Detection of email spoofing and spear phishing attacks
CN100527117C (en) Method and system for determining information in system containing multiple modules against offal mail
CN101495969B (en) Identifying threats in electronic messages
US20030236845A1 (en) Method and system for classifying electronic documents
US20090044006A1 (en) System for blocking spam mail and method of the same
US20050044160A1 (en) Method and software product for identifying unsolicited emails
CN101087259A (en) A system for filtering spam in Internet and its implementation method
AU2009299539B2 (en) Electronic communication control
CN106453249A (en) Monitoring method of network mail business
JP2008538267A (en) System, method, and apparatus for capturing a large volume of distributed electronic messages
KR20050002320A (en) E-mail managing system and method thereof
US20020147783A1 (en) Method, device and e-mail server for detecting an undesired e-mail
JP6247490B2 (en) Fraud mail determination device and program
JP2006251882A (en) Unsolicited mail handling system, unsolicited mail handling method and program
CN101194248A (en) System, method and device for trapping mass-delivery electronic messages
JP3984869B2 (en) E-mail communication system
JP2018018542A (en) Improper email determination device and program
KR101399037B1 (en) Method and device for processing spam mail using ip address of sender
JP6643511B2 (en) Unauthorized mail judging device and program
ES2558740T3 (en) System implemented in computer and procedure to detect the improper use of an email infrastructure in a computer network
KR100784194B1 (en) System for blocking spam mail and method of the same
JP2017054533A (en) Illegal mail determination device and program
KR20140143122A (en) Method for Managing Mail by using Messaging
KR20140006731A (en) Method for forwarding mail by using messaging
JP2021056664A (en) Mail transmission control device and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080604