CN101977111B - Anti-spam method based on privacy protection - Google Patents

Anti-spam method based on privacy protection Download PDF

Info

Publication number
CN101977111B
CN101977111B CN2010105157928A CN201010515792A CN101977111B CN 101977111 B CN101977111 B CN 101977111B CN 2010105157928 A CN2010105157928 A CN 2010105157928A CN 201010515792 A CN201010515792 A CN 201010515792A CN 101977111 B CN101977111 B CN 101977111B
Authority
CN
China
Prior art keywords
main body
voice mailbox
sub voice
mailbox
email address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010105157928A
Other languages
Chinese (zh)
Other versions
CN101977111A (en
Inventor
何泾沙
徐晶
张玉强
徐菲
马书南
张旸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN2010105157928A priority Critical patent/CN101977111B/en
Publication of CN101977111A publication Critical patent/CN101977111A/en
Application granted granted Critical
Publication of CN101977111B publication Critical patent/CN101977111B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an anti-spam method based on privacy protection, belonging to the computer network security field. The method is applicable to internet in which email address information needs to be protected. In the method, the frequently-used email address of a user is protected as privacy information without disclosure on the premise of guaranteeing smooth network interaction; and a sub-email address code with term of validity which can be flexibly controlled by the user replaces the frequently-used email address, and the frequently-used email address of the user is hidden as the privacy information, wherein, the sub-email address code is generated according to the email address, the system time and the random number of an interaction party and only used in the case of one-on-one communication between the specific interaction party and the user. The anti-spam method of the invention can keep the frequently-used email address of the user unpublished, emphasize autonomy of the user, and help the user independently judge and identify a spam and stop sending the spam from a source.

Description

A kind of method of the anti-rubbish mail based on secret protection
Technical field
The present invention proposes a kind of under network environment, not only can well protect the subscriber mailbox privacy information, and can effectively prevent the interference of spam and be easy to find the method in the source of spam.Achievement of the present invention is based on anti-rubbish mail model and the method for protecting user's email address commonly used as privacy information, can be used in the Internet network application that need protect and spam and source are stoped and search email address information.
Background technology
Existing anti-rubbish mail method is a kind of to be to utilize to make laws and regulations to retrain the spam transmit leg; Another kind takes technological means to filter in mail server side or user side exactly; And underground oneself the email address of user also is a kind of method, but the strick precaution that this user self has no control under existing interactive mode weak tendency also influences mutual carrying out to a certain extent very much; In case there is certain network interaction side to obtain user's email address commonly used; The insecurity of network has been easy to cause the permanent leakage of user address commonly used, and in a single day leak user's address commonly used, and the user does not just have other way to let it become security information again; User self does not just have ability to reject spam again, and all hope can only be placed on the anti-spam technologies that service provider takes.
Taking technological means is the main method of present anti-rubbish mail, how to find otherwise effective technique to come fundamentally to address this problem to be main research direction now.The technology of present anti-rubbish mail is the Spam filtering technology of starting with from server end basically, from two aspect classification the filtering technique of distinguishing from the role is arranged, and comprises MAT filtering technique, MDA filtering technique, MIJA filtering technique; From the filtering technique that method is distinguished, comprise filtering technique based on key character, technological based on the filtering technique of blacklist, inverse dns nailing technology, rule-based filtering technique, content-based filtering technique and other filtrating mails based on the filtering technique of white list.These technology have solved a large amount of problem of transmission of spam to a certain extent; But the spam transmit leg also should have new anti-filtering technique to occur mutually; As long as user's email address is arranged, always sending, spam have way to break through the blockade in delivery of mail process, arrive the destination.
To fundamentally solve the problem that spam spreads unchecked; Effective method is exactly to protect user's email address as privacy information; Do not leak to any network interaction side, certainly, this will guarantee under the prerequisite that network interaction can normally carry out; Meaningful to user's mailbox commonly used ability of maintaining secrecy, but email address as privacy information protect into the method for the research anti-rubbish mail on basis now also seldom.The present invention realizes a kind of anti-rubbish mail model and method based on secret protection from this source research.
Summary of the invention
The objective of the invention is to utilize a kind of new method for secret protection; Effectively protect user's email address commonly used as privacy information; Through change network service interactive mode, and adopt the sub voice mailbox address code to replace the method protection user of user's email address commonly used to use email address, these sub voice mailbox address codes of the flexible control that the user can be autonomous always; So that autonomous the examination confirmed spam; Find the sender of spam easily, and effectively stop the reception of spam, in time report the spammer.This method is guaranteeing under the prerequisite that network interaction carries out smoothly, on the basis of effectively having protected user privacy information, fundamentally solution spam problem, as shown in Figure 1.
Set membership mailbox tactic pattern is adopted in global design of the present invention.Mailbox commonly used is laid special stress on protecting as user privacy information, carries out in user and other people or other website when mutual, as if the email address that the user need be provided; The user just logins its mailbox server commonly used, and as father's mailbox, application generates a sub-email address code mailbox commonly used; When only supplying user and specific other people or website mutual, this sub voice mailbox address code uses; Flexibility is strong, not only comprises the email address with other people or website of user interactions, also comprises random number information and current time in system; And security parameters such as the valid expiration date that can be provided with according to the mutual situation of both sides, cipher mode, digital signature; After the sub voice mailbox address code generated, its contained information was bound the sub voice mailbox address code that user uncle's mailbox obtains generating by the storage of father's mailbox and with father's mailbox; Pass to mutual side; So mutual side just also can exchange with the user through this sub voice mailbox address code under the prerequisite that does not obtain user's email address commonly used, and father's mailbox is when generating sub voice mailbox address code and storage, and the user can independently select the function of this sub voice mailbox address code to open or close; And change sub voice mailbox address code valid expiration date, even cancel this sub voice mailbox address code.Find not only to send the service of some customization to the user through the mutual with it website of this sub voice mailbox address code as the user; Also send the unwanted at all spam of some users; The user can close this mailbox or cancel; Like this, not only be easy to confirm the source of spam, this spam incident of processing that can also independent and flexible.When the user finds that the mail that receives through certain sub voice mailbox address code is the unwanted spam of user; The user can know easily that this is and the sub voice mailbox address code of which mutual website, has also just known it is the spam that send which website, like this; If the service that the user also needs this website to provide; That just can be linked up with this website, hopes that they do not send the spam except that customize services to the user again, and linking up successfully, this sub voice mailbox continues to use; Avoided the influence of spam; Get nowhere if link up, that user can independently cancel or close this sub voice mailbox address code function, even can be to anti-garbage mail system or department's this website behavior of report.
In the network interaction process, user's Website login often need be filled in user's email address with other user interactions, in our convenient interchange, has also produced a lot of problems, like the leakage of spam, email address.Design a kind of novel mailbox secret protection model at this, adopted this model fundamentally to address this problem.
The present invention has taked following technical scheme.Based on the anti-rubbish mail method of secret protection, the whole framework of realizing this method comprises the owner user of mailbox commonly used, mailbox server and with other people or website of user interactions.The owner user of mailbox commonly used is a main body A, with other people or website of user interactions be object B, mailbox server is C,, this method overall procedure such as Fig. 2 may further comprise the steps:
(1) main body A need be carried out alternately with other people or website object B, and B needs the email address of A to communicate.
(2) main body A detects the email address of whether having known object B.Divide two types of situation I and II.
I. detect successfully, main body A obtains the email address of object B.
1) main body A signs in to mail server C, according to email address and random number and the current time in system of object B, uses the SHA-1 algorithm to produce eap-message digest, and uses RSA Algorithm that summary is carried out digital signature, generates the sub voice mailbox address code.
2) main body A obtains the sub voice mailbox address code that mail server C generates according to application information; The mailbox commonly used of sub voice mailbox address code and main body A is bound; And in mailbox commonly used, preserve all sub voice mailbox information; Making things convenient for main body A according to mutual situation this sub voice mailbox to be managed afterwards with in the object B reciprocal process, and this sub voice mailbox tentatively is provided with: the security parameters such as abbreviation, interactive service keyword and cipher mode, digital signature that the term of validity, the sub voice mailbox of sub voice mailbox are set.
3) main body A sends to object B to this sub voice mailbox address code, with this as only supplying between A, B the mutual means of communication of using.
4) object B posts a letter to main body A through the sub voice mailbox address code.
5) main body A verifies to the mail sender's through the communication of sub voice mailbox address code ID whether sender's email address is identical with the email address of object B, is, the mail that sends to the sub voice mailbox address code is received by master mailbox, otherwise, be rejected.
So just realized and have only main body A and object B to use this sub voice mailbox address code to carry out alternately.The mail that mails to object B from main body A also sends through the sub voice mailbox address, but in communication process concerning main body A the sub voice mailbox address code be transparent.The mail sender who shows at the terminal of object B is the sub voice mailbox address code, rather than the mailbox commonly used of main body A.
II. detect failure, main body A is not known the email address of object B.
1) main body A signs in to mail server C; To use the SHA-1 algorithm to produce eap-message digest according to random number and current time in system under the situation of the email address of default object B, and use RSA Algorithm that summary is carried out digital signature; Generate special sub voice mailbox address code; Simultaneously the mailbox commonly used of special sub voice mailbox address code and main body A is bound, and the information of in mailbox commonly used, preserving all special sub voice mailbox, to make things convenient for main body A this sub voice mailbox is managed.Main body A is open with special sub voice mailbox address code.
2) main body A obtains the special sub voice mailbox address code that mail server C generates according to application information, and special sub voice mailbox tentatively is provided with: the security parameters such as abbreviation, interactive service keyword and cipher mode, digital signature that the term of validity, the sub voice mailbox of sub voice mailbox are set.
3) main body A is told object B special sub voice mailbox address code.
4) object B posts a letter to main body A through special sub voice mailbox address code.
5) mailbox commonly used that a prompting message is given main body A will be sent in special sub voice mailbox address, and this prompting message comprises sender, mail matter topics, sends out part time and mail size, information such as mail keyword.
6) main body A is checked prompting message.Interested in the mail; In mailbox commonly used, collect this mail; Main body A has just obtained the email address of mutual with it object B like this; To repeat above-mentioned I process, main body A sends to B to sub-email address code of mail server C application, and this sub voice mailbox address code only supplies to use alternately between A and the B.Main body A is lost interest in to prompting message, thinks that spam just blacklists it, and mail will be deleted automatically.
Use this method that email address commonly used is had a following characteristic as what user privacy information was protected:
1) different with traditional approach; When user and website are mutual among the present invention; Need not directly tell mutual website the email address commonly used of oneself, but utilize the address code of sub voice mailbox flexibly of a special use to replace email address commonly used, through this sub voice mailbox address; User's mutual website directly sends to user's required service information user's mailbox commonly used, has so not only protected user's email address commonly used but also has accomplished whole interactive service process.
2) design of antithetical phrase email address code is customer-centric, has characteristics such as provisional, managerial flexibility, and sub voice mailbox is to be generated by user's mailbox commonly used, replace user's email address commonly used to come receiving and dispatching mail, but it has specificity.
3) the present invention is main body with user, considers the difference preference of different user and to different the defining of spam, autonomous spam is positioned and handles flexibly, and according to the mutual situation flexible management sub voice mailbox address code of website.
Description of drawings
Fig. 1 overall application procedure chart of the present invention
The main frame structure applicating flow chart of Fig. 2 the present invention
Embodiment
Explain with an example how the present invention is guaranteeing under the mutual smoothly prerequisite of accomplishing in user and website user and site for service in reciprocal process below; Protected user's email address information not obtained by irrelevant third party; Explain and utilize the present invention can well solve the spam problem; And know easily and the source of spam can effectively solve the spam problem from the source.Three instance entity are arranged, main body A-user, object B-weather forecast service website, mailbox server C-Netease mailbox server, flow process and step such as Fig. 2 in this example.
1) user A logins weather forecast service website B, customizes the weather forecast information of half a year, and weather forecast website B needs user A that his email address commonly used is provided, so that send to subscriber mailbox to the weather forecast information of customization on time.
2) user A from the weather forecast website B know email address to network address, but do not want to inform this website to email address commonly used, let out it to prevent this website, perplexed by problems such as spam.
3) just login its email address commonly used place mailbox server C of Netease; According to email address, random number, the current time in system of weather forecast service website B; Use the SHA-1 algorithm to produce eap-message digest, and use RSA Algorithm that summary is carried out digital signature, generate a sub-email address code.
4) user A obtains the sub voice mailbox address code that mail server C generates according to application information; Bundle email address code and user A mailbox commonly used is bound; And in mailbox commonly used, preserve all sub voice mailbox information, according to mutual situation this sub voice mailbox is managed afterwards with in the object B reciprocal process to make things convenient for main body A.This sub voice mailbox tentatively is provided with: sub voice mailbox valid expiration date is 6 months, sub voice mailbox abbreviate the weather forecast mailbox as, the customize services keyword is a weather, cipher mode adopts des encryption, uses information such as digital signature.
5) user A sends to weather forecast service website B to this sub voice mailbox address code, with this as only supplying between A, B the mutual means of communication of using.
6) weather forecast website B sends weather forecast information through the sub voice mailbox address code and gives user A.
7) user A verifies the mail sender's through the communication of sub voice mailbox address code ID; Whether sender's email address is identical with the email address of weather forecast website B, is, the mail that sends to the sub voice mailbox address code is received by master mailbox; Otherwise, be rejected.So just realized and have only user A and weather forecast website B to use this sub voice mailbox address code to carry out alternately.The mail that mails to weather forecast website B from user A also sends through the sub voice mailbox address, but in communication process concerning user A the sub voice mailbox address code be transparent.
8) the mail sender that the terminal of B shows in the weather forecast website is the sub voice mailbox address code, rather than the mailbox commonly used of user A.
After this, the user can basis and change and the setting of the mutual situation in weather forecast website through the flexible management completion antithetical phrase mailbox functions of sub voice mailbox.
The present invention uses the secret protection technology; Make that the user can be according to the privacy needs of oneself; Antithetical phrase email address code is managed flexibly; Can find the sender of spam fast and accurately, fundamentally stop the generation of spam incident, protect user's mailbox privacy information commonly used.
Above instance is merely one of the present invention and implements for example; Only be used for better explaining function of the present invention and flow process; Do not represent the present invention to only limit to this exemplary application; All in spirit of the present invention, principle and technical scope, the modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (1)

1. method based on the anti-rubbish mail of secret protection is characterized in that:
The owner user of mailbox commonly used is a main body A, with other people or website of user interactions be object B, mail server is C; Overall procedure technology performing step is following:
(1) main body A need be carried out alternately with other people or website object B, and B needs the email address of A to communicate;
(2) main body A detects the email address of whether having known object B; Divide following two types of situation I and II.
I. when detecting successfully, main body A obtains the email address of object B:
A) main body A signs in to mail server C, and mail server C uses the SHA-1 algorithm to produce eap-message digest according to email address and random number and the current time in system of object B, uses RSA Algorithm that summary is carried out digital signature, generates the sub voice mailbox address code;
B) main body A obtains the sub voice mailbox address code that mail server C generates according to application information; Mail server C binds the mailbox commonly used of sub voice mailbox address code and main body A, and in mailbox commonly used, preserves all sub voice mailbox information, according to mutual situation this sub voice mailbox is managed afterwards with in the object B reciprocal process to make things convenient for main body A; Main body A tentatively is provided with this sub voice mailbox: the term of validity, abbreviation, interactive service keyword and the cipher mode of sub voice mailbox, these security parameters of digital signature that sub voice mailbox is set at least;
C) main body A sends to object B to this sub voice mailbox address code, with this as only supplying between A, B the mutual means of communication of using;
D) object B posts a letter to main body A through the sub voice mailbox address code;
E) main body A verifies to the mail sender's through the communication of sub voice mailbox address code ID whether sender's email address is identical with the email address of object B, is, the mail that sends to the sub voice mailbox address code is received by master mailbox, otherwise, be rejected;
If II. detect failure, main body A is not known the email address of object B:
1) main body A signs in to mail server C; Mail server C will be according to random number and current time in system under the situation of the email address of default object B; Produce eap-message digest; And summary carried out digital signature, and generating special sub voice mailbox address code, mail server C binds the mailbox commonly used of special sub voice mailbox address code and main body A simultaneously; And the information of in mailbox commonly used, preserving all special sub voice mailbox, to make things convenient for main body A this sub voice mailbox is managed; Main body A is open with special sub voice mailbox address code;
2) main body A obtains the special sub voice mailbox address code that mail server C generates according to application information, and special sub voice mailbox tentatively is provided with: the term of validity, abbreviation, interactive service keyword and the cipher mode of sub voice mailbox, these security parameters of digital signature that sub voice mailbox is set at least;
3) main body A is told object B special sub voice mailbox address code;
4) object B posts a letter to main body A through special sub voice mailbox address code;
5) mailbox commonly used that a prompting message is given main body A will be sent in special sub voice mailbox address, and this prompting message comprises sender, mail matter topics, sends out part time and mail size, mail keyword;
6) main body A is checked prompting message; If it is interested in the mail; In mailbox commonly used, collect this mail; Main body A has just obtained the email address of mutual with it object B like this; To repeat above-mentioned I process, main body A sends to B to sub-email address code of mail server C application, and this sub voice mailbox address code only supplies to use alternately between A and the B; If main body A is lost interest in to prompting message, think that spam just blacklists it, mail will be deleted automatically.
CN2010105157928A 2010-10-15 2010-10-15 Anti-spam method based on privacy protection Expired - Fee Related CN101977111B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105157928A CN101977111B (en) 2010-10-15 2010-10-15 Anti-spam method based on privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105157928A CN101977111B (en) 2010-10-15 2010-10-15 Anti-spam method based on privacy protection

Publications (2)

Publication Number Publication Date
CN101977111A CN101977111A (en) 2011-02-16
CN101977111B true CN101977111B (en) 2012-08-15

Family

ID=43576960

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105157928A Expired - Fee Related CN101977111B (en) 2010-10-15 2010-10-15 Anti-spam method based on privacy protection

Country Status (1)

Country Link
CN (1) CN101977111B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5639511B2 (en) * 2011-03-18 2014-12-10 株式会社沖データ Information processing apparatus, composite apparatus, image reading apparatus, and information processing method
CN102663321B (en) * 2012-04-24 2016-01-13 百度在线网络技术(北京)有限公司 For security enhancement system and the method for software
CN102843313B (en) * 2012-09-27 2015-05-20 深圳中兴网信科技有限公司 Safety management system of e-mail address and safety management method
CN104660485B (en) * 2013-11-22 2019-12-13 腾讯科技(深圳)有限公司 Message processing method, device and system
CN104463605A (en) * 2014-12-19 2015-03-25 百度在线网络技术(北京)有限公司 Coupon code anti-cheating method and device
CN107743111A (en) * 2016-10-27 2018-02-27 腾讯科技(深圳)有限公司 A kind of E-mail processing method, device and system
CN108737443B (en) * 2018-06-14 2020-06-02 北京大学 Method for hiding mail address based on cryptographic algorithm
CN111049738B (en) * 2019-12-24 2022-04-22 杭州安司源科技有限公司 E-mail data security protection method based on hybrid encryption

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1601540A (en) * 2004-10-25 2005-03-30 汤溪蔚 Method of preventing electronic refuse mail
CN1794284A (en) * 2005-12-26 2006-06-28 上海洲信信息技术有限公司 Method and system of realizing single account multiuser of electron mail box

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040193685A1 (en) * 2003-03-31 2004-09-30 Sony Corporation/Sony Electronics, Inc. Method and apparatus for managing and sharing personal identities in a peer-to-peer environment
US20090259725A1 (en) * 2008-04-14 2009-10-15 Case Western Reserve University Email consumer reputation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1601540A (en) * 2004-10-25 2005-03-30 汤溪蔚 Method of preventing electronic refuse mail
CN1794284A (en) * 2005-12-26 2006-06-28 上海洲信信息技术有限公司 Method and system of realizing single account multiuser of electron mail box

Also Published As

Publication number Publication date
CN101977111A (en) 2011-02-16

Similar Documents

Publication Publication Date Title
CN101977111B (en) Anti-spam method based on privacy protection
Hall How to avoid unwanted email
US8090788B2 (en) Method and system for filtering electronic messages
US7711786B2 (en) Systems and methods for preventing spam
US8751808B2 (en) Method and system for sharing trusted contact information
US8572696B1 (en) Contextual data aided security protection
CN1535424A (en) Web-based communications addressing system and method
US20070233610A1 (en) An improved institutional electronic messaging system
CN102918810A (en) Trusted e-mail communication in a multi-tenant environment
WO2009097151A1 (en) A system and method for providing security via a top level domain
US20060053202A1 (en) Method and system implementing secure email
Ioannidis Fighting Spam by Encapsulating Policy in Email Addresses.
Banday Effectiveness and limitations of e-mail security protocols
JP6909233B2 (en) How to authenticate an email containing a certified digital signature on the part of the telecommunications carrier
US20190080115A1 (en) Mail content anonymization
CN105474585A (en) Private tokens in electronic messages
US20060218235A1 (en) Spam prevention by legal user database and user authentication
CN105323254A (en) A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof
US20120284347A1 (en) System and method for confirming delivery of an electronic message
CN103986724B (en) Email real name identification method and system
US20100057874A1 (en) Preventing wrongful transmission of message content
Roman et al. Protection against spam using pre-challenges
Roman et al. An anti-spam scheme using pre-challenges
CN105450502B (en) The Email that software-oriented defines network denies suppression system and its suppressing method
Fontana Authentication failure reporting using the abuse reporting format

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120815

Termination date: 20161015