CN101977111B - Anti-spam method based on privacy protection - Google Patents
Anti-spam method based on privacy protection Download PDFInfo
- Publication number
- CN101977111B CN101977111B CN2010105157928A CN201010515792A CN101977111B CN 101977111 B CN101977111 B CN 101977111B CN 2010105157928 A CN2010105157928 A CN 2010105157928A CN 201010515792 A CN201010515792 A CN 201010515792A CN 101977111 B CN101977111 B CN 101977111B
- Authority
- CN
- China
- Prior art keywords
- main body
- voice mailbox
- sub voice
- mailbox
- email address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention provides an anti-spam method based on privacy protection, belonging to the computer network security field. The method is applicable to internet in which email address information needs to be protected. In the method, the frequently-used email address of a user is protected as privacy information without disclosure on the premise of guaranteeing smooth network interaction; and a sub-email address code with term of validity which can be flexibly controlled by the user replaces the frequently-used email address, and the frequently-used email address of the user is hidden as the privacy information, wherein, the sub-email address code is generated according to the email address, the system time and the random number of an interaction party and only used in the case of one-on-one communication between the specific interaction party and the user. The anti-spam method of the invention can keep the frequently-used email address of the user unpublished, emphasize autonomy of the user, and help the user independently judge and identify a spam and stop sending the spam from a source.
Description
Technical field
The present invention proposes a kind of under network environment, not only can well protect the subscriber mailbox privacy information, and can effectively prevent the interference of spam and be easy to find the method in the source of spam.Achievement of the present invention is based on anti-rubbish mail model and the method for protecting user's email address commonly used as privacy information, can be used in the Internet network application that need protect and spam and source are stoped and search email address information.
Background technology
Existing anti-rubbish mail method is a kind of to be to utilize to make laws and regulations to retrain the spam transmit leg; Another kind takes technological means to filter in mail server side or user side exactly; And underground oneself the email address of user also is a kind of method, but the strick precaution that this user self has no control under existing interactive mode weak tendency also influences mutual carrying out to a certain extent very much; In case there is certain network interaction side to obtain user's email address commonly used; The insecurity of network has been easy to cause the permanent leakage of user address commonly used, and in a single day leak user's address commonly used, and the user does not just have other way to let it become security information again; User self does not just have ability to reject spam again, and all hope can only be placed on the anti-spam technologies that service provider takes.
Taking technological means is the main method of present anti-rubbish mail, how to find otherwise effective technique to come fundamentally to address this problem to be main research direction now.The technology of present anti-rubbish mail is the Spam filtering technology of starting with from server end basically, from two aspect classification the filtering technique of distinguishing from the role is arranged, and comprises MAT filtering technique, MDA filtering technique, MIJA filtering technique; From the filtering technique that method is distinguished, comprise filtering technique based on key character, technological based on the filtering technique of blacklist, inverse dns nailing technology, rule-based filtering technique, content-based filtering technique and other filtrating mails based on the filtering technique of white list.These technology have solved a large amount of problem of transmission of spam to a certain extent; But the spam transmit leg also should have new anti-filtering technique to occur mutually; As long as user's email address is arranged, always sending, spam have way to break through the blockade in delivery of mail process, arrive the destination.
To fundamentally solve the problem that spam spreads unchecked; Effective method is exactly to protect user's email address as privacy information; Do not leak to any network interaction side, certainly, this will guarantee under the prerequisite that network interaction can normally carry out; Meaningful to user's mailbox commonly used ability of maintaining secrecy, but email address as privacy information protect into the method for the research anti-rubbish mail on basis now also seldom.The present invention realizes a kind of anti-rubbish mail model and method based on secret protection from this source research.
Summary of the invention
The objective of the invention is to utilize a kind of new method for secret protection; Effectively protect user's email address commonly used as privacy information; Through change network service interactive mode, and adopt the sub voice mailbox address code to replace the method protection user of user's email address commonly used to use email address, these sub voice mailbox address codes of the flexible control that the user can be autonomous always; So that autonomous the examination confirmed spam; Find the sender of spam easily, and effectively stop the reception of spam, in time report the spammer.This method is guaranteeing under the prerequisite that network interaction carries out smoothly, on the basis of effectively having protected user privacy information, fundamentally solution spam problem, as shown in Figure 1.
Set membership mailbox tactic pattern is adopted in global design of the present invention.Mailbox commonly used is laid special stress on protecting as user privacy information, carries out in user and other people or other website when mutual, as if the email address that the user need be provided; The user just logins its mailbox server commonly used, and as father's mailbox, application generates a sub-email address code mailbox commonly used; When only supplying user and specific other people or website mutual, this sub voice mailbox address code uses; Flexibility is strong, not only comprises the email address with other people or website of user interactions, also comprises random number information and current time in system; And security parameters such as the valid expiration date that can be provided with according to the mutual situation of both sides, cipher mode, digital signature; After the sub voice mailbox address code generated, its contained information was bound the sub voice mailbox address code that user uncle's mailbox obtains generating by the storage of father's mailbox and with father's mailbox; Pass to mutual side; So mutual side just also can exchange with the user through this sub voice mailbox address code under the prerequisite that does not obtain user's email address commonly used, and father's mailbox is when generating sub voice mailbox address code and storage, and the user can independently select the function of this sub voice mailbox address code to open or close; And change sub voice mailbox address code valid expiration date, even cancel this sub voice mailbox address code.Find not only to send the service of some customization to the user through the mutual with it website of this sub voice mailbox address code as the user; Also send the unwanted at all spam of some users; The user can close this mailbox or cancel; Like this, not only be easy to confirm the source of spam, this spam incident of processing that can also independent and flexible.When the user finds that the mail that receives through certain sub voice mailbox address code is the unwanted spam of user; The user can know easily that this is and the sub voice mailbox address code of which mutual website, has also just known it is the spam that send which website, like this; If the service that the user also needs this website to provide; That just can be linked up with this website, hopes that they do not send the spam except that customize services to the user again, and linking up successfully, this sub voice mailbox continues to use; Avoided the influence of spam; Get nowhere if link up, that user can independently cancel or close this sub voice mailbox address code function, even can be to anti-garbage mail system or department's this website behavior of report.
In the network interaction process, user's Website login often need be filled in user's email address with other user interactions, in our convenient interchange, has also produced a lot of problems, like the leakage of spam, email address.Design a kind of novel mailbox secret protection model at this, adopted this model fundamentally to address this problem.
The present invention has taked following technical scheme.Based on the anti-rubbish mail method of secret protection, the whole framework of realizing this method comprises the owner user of mailbox commonly used, mailbox server and with other people or website of user interactions.The owner user of mailbox commonly used is a main body A, with other people or website of user interactions be object B, mailbox server is C,, this method overall procedure such as Fig. 2 may further comprise the steps:
(1) main body A need be carried out alternately with other people or website object B, and B needs the email address of A to communicate.
(2) main body A detects the email address of whether having known object B.Divide two types of situation I and II.
I. detect successfully, main body A obtains the email address of object B.
1) main body A signs in to mail server C, according to email address and random number and the current time in system of object B, uses the SHA-1 algorithm to produce eap-message digest, and uses RSA Algorithm that summary is carried out digital signature, generates the sub voice mailbox address code.
2) main body A obtains the sub voice mailbox address code that mail server C generates according to application information; The mailbox commonly used of sub voice mailbox address code and main body A is bound; And in mailbox commonly used, preserve all sub voice mailbox information; Making things convenient for main body A according to mutual situation this sub voice mailbox to be managed afterwards with in the object B reciprocal process, and this sub voice mailbox tentatively is provided with: the security parameters such as abbreviation, interactive service keyword and cipher mode, digital signature that the term of validity, the sub voice mailbox of sub voice mailbox are set.
3) main body A sends to object B to this sub voice mailbox address code, with this as only supplying between A, B the mutual means of communication of using.
4) object B posts a letter to main body A through the sub voice mailbox address code.
5) main body A verifies to the mail sender's through the communication of sub voice mailbox address code ID whether sender's email address is identical with the email address of object B, is, the mail that sends to the sub voice mailbox address code is received by master mailbox, otherwise, be rejected.
So just realized and have only main body A and object B to use this sub voice mailbox address code to carry out alternately.The mail that mails to object B from main body A also sends through the sub voice mailbox address, but in communication process concerning main body A the sub voice mailbox address code be transparent.The mail sender who shows at the terminal of object B is the sub voice mailbox address code, rather than the mailbox commonly used of main body A.
II. detect failure, main body A is not known the email address of object B.
1) main body A signs in to mail server C; To use the SHA-1 algorithm to produce eap-message digest according to random number and current time in system under the situation of the email address of default object B, and use RSA Algorithm that summary is carried out digital signature; Generate special sub voice mailbox address code; Simultaneously the mailbox commonly used of special sub voice mailbox address code and main body A is bound, and the information of in mailbox commonly used, preserving all special sub voice mailbox, to make things convenient for main body A this sub voice mailbox is managed.Main body A is open with special sub voice mailbox address code.
2) main body A obtains the special sub voice mailbox address code that mail server C generates according to application information, and special sub voice mailbox tentatively is provided with: the security parameters such as abbreviation, interactive service keyword and cipher mode, digital signature that the term of validity, the sub voice mailbox of sub voice mailbox are set.
3) main body A is told object B special sub voice mailbox address code.
4) object B posts a letter to main body A through special sub voice mailbox address code.
5) mailbox commonly used that a prompting message is given main body A will be sent in special sub voice mailbox address, and this prompting message comprises sender, mail matter topics, sends out part time and mail size, information such as mail keyword.
6) main body A is checked prompting message.Interested in the mail; In mailbox commonly used, collect this mail; Main body A has just obtained the email address of mutual with it object B like this; To repeat above-mentioned I process, main body A sends to B to sub-email address code of mail server C application, and this sub voice mailbox address code only supplies to use alternately between A and the B.Main body A is lost interest in to prompting message, thinks that spam just blacklists it, and mail will be deleted automatically.
Use this method that email address commonly used is had a following characteristic as what user privacy information was protected:
1) different with traditional approach; When user and website are mutual among the present invention; Need not directly tell mutual website the email address commonly used of oneself, but utilize the address code of sub voice mailbox flexibly of a special use to replace email address commonly used, through this sub voice mailbox address; User's mutual website directly sends to user's required service information user's mailbox commonly used, has so not only protected user's email address commonly used but also has accomplished whole interactive service process.
2) design of antithetical phrase email address code is customer-centric, has characteristics such as provisional, managerial flexibility, and sub voice mailbox is to be generated by user's mailbox commonly used, replace user's email address commonly used to come receiving and dispatching mail, but it has specificity.
3) the present invention is main body with user, considers the difference preference of different user and to different the defining of spam, autonomous spam is positioned and handles flexibly, and according to the mutual situation flexible management sub voice mailbox address code of website.
Description of drawings
Fig. 1 overall application procedure chart of the present invention
The main frame structure applicating flow chart of Fig. 2 the present invention
Embodiment
Explain with an example how the present invention is guaranteeing under the mutual smoothly prerequisite of accomplishing in user and website user and site for service in reciprocal process below; Protected user's email address information not obtained by irrelevant third party; Explain and utilize the present invention can well solve the spam problem; And know easily and the source of spam can effectively solve the spam problem from the source.Three instance entity are arranged, main body A-user, object B-weather forecast service website, mailbox server C-Netease mailbox server, flow process and step such as Fig. 2 in this example.
1) user A logins weather forecast service website B, customizes the weather forecast information of half a year, and weather forecast website B needs user A that his email address commonly used is provided, so that send to subscriber mailbox to the weather forecast information of customization on time.
2) user A from the weather forecast website B know email address to network address, but do not want to inform this website to email address commonly used, let out it to prevent this website, perplexed by problems such as spam.
3) just login its email address commonly used place mailbox server C of Netease; According to email address, random number, the current time in system of weather forecast service website B; Use the SHA-1 algorithm to produce eap-message digest, and use RSA Algorithm that summary is carried out digital signature, generate a sub-email address code.
4) user A obtains the sub voice mailbox address code that mail server C generates according to application information; Bundle email address code and user A mailbox commonly used is bound; And in mailbox commonly used, preserve all sub voice mailbox information, according to mutual situation this sub voice mailbox is managed afterwards with in the object B reciprocal process to make things convenient for main body A.This sub voice mailbox tentatively is provided with: sub voice mailbox valid expiration date is 6 months, sub voice mailbox abbreviate the weather forecast mailbox as, the customize services keyword is a weather, cipher mode adopts des encryption, uses information such as digital signature.
5) user A sends to weather forecast service website B to this sub voice mailbox address code, with this as only supplying between A, B the mutual means of communication of using.
6) weather forecast website B sends weather forecast information through the sub voice mailbox address code and gives user A.
7) user A verifies the mail sender's through the communication of sub voice mailbox address code ID; Whether sender's email address is identical with the email address of weather forecast website B, is, the mail that sends to the sub voice mailbox address code is received by master mailbox; Otherwise, be rejected.So just realized and have only user A and weather forecast website B to use this sub voice mailbox address code to carry out alternately.The mail that mails to weather forecast website B from user A also sends through the sub voice mailbox address, but in communication process concerning user A the sub voice mailbox address code be transparent.
8) the mail sender that the terminal of B shows in the weather forecast website is the sub voice mailbox address code, rather than the mailbox commonly used of user A.
After this, the user can basis and change and the setting of the mutual situation in weather forecast website through the flexible management completion antithetical phrase mailbox functions of sub voice mailbox.
The present invention uses the secret protection technology; Make that the user can be according to the privacy needs of oneself; Antithetical phrase email address code is managed flexibly; Can find the sender of spam fast and accurately, fundamentally stop the generation of spam incident, protect user's mailbox privacy information commonly used.
Above instance is merely one of the present invention and implements for example; Only be used for better explaining function of the present invention and flow process; Do not represent the present invention to only limit to this exemplary application; All in spirit of the present invention, principle and technical scope, the modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (1)
1. method based on the anti-rubbish mail of secret protection is characterized in that:
The owner user of mailbox commonly used is a main body A, with other people or website of user interactions be object B, mail server is C; Overall procedure technology performing step is following:
(1) main body A need be carried out alternately with other people or website object B, and B needs the email address of A to communicate;
(2) main body A detects the email address of whether having known object B; Divide following two types of situation I and II.
I. when detecting successfully, main body A obtains the email address of object B:
A) main body A signs in to mail server C, and mail server C uses the SHA-1 algorithm to produce eap-message digest according to email address and random number and the current time in system of object B, uses RSA Algorithm that summary is carried out digital signature, generates the sub voice mailbox address code;
B) main body A obtains the sub voice mailbox address code that mail server C generates according to application information; Mail server C binds the mailbox commonly used of sub voice mailbox address code and main body A, and in mailbox commonly used, preserves all sub voice mailbox information, according to mutual situation this sub voice mailbox is managed afterwards with in the object B reciprocal process to make things convenient for main body A; Main body A tentatively is provided with this sub voice mailbox: the term of validity, abbreviation, interactive service keyword and the cipher mode of sub voice mailbox, these security parameters of digital signature that sub voice mailbox is set at least;
C) main body A sends to object B to this sub voice mailbox address code, with this as only supplying between A, B the mutual means of communication of using;
D) object B posts a letter to main body A through the sub voice mailbox address code;
E) main body A verifies to the mail sender's through the communication of sub voice mailbox address code ID whether sender's email address is identical with the email address of object B, is, the mail that sends to the sub voice mailbox address code is received by master mailbox, otherwise, be rejected;
If II. detect failure, main body A is not known the email address of object B:
1) main body A signs in to mail server C; Mail server C will be according to random number and current time in system under the situation of the email address of default object B; Produce eap-message digest; And summary carried out digital signature, and generating special sub voice mailbox address code, mail server C binds the mailbox commonly used of special sub voice mailbox address code and main body A simultaneously; And the information of in mailbox commonly used, preserving all special sub voice mailbox, to make things convenient for main body A this sub voice mailbox is managed; Main body A is open with special sub voice mailbox address code;
2) main body A obtains the special sub voice mailbox address code that mail server C generates according to application information, and special sub voice mailbox tentatively is provided with: the term of validity, abbreviation, interactive service keyword and the cipher mode of sub voice mailbox, these security parameters of digital signature that sub voice mailbox is set at least;
3) main body A is told object B special sub voice mailbox address code;
4) object B posts a letter to main body A through special sub voice mailbox address code;
5) mailbox commonly used that a prompting message is given main body A will be sent in special sub voice mailbox address, and this prompting message comprises sender, mail matter topics, sends out part time and mail size, mail keyword;
6) main body A is checked prompting message; If it is interested in the mail; In mailbox commonly used, collect this mail; Main body A has just obtained the email address of mutual with it object B like this; To repeat above-mentioned I process, main body A sends to B to sub-email address code of mail server C application, and this sub voice mailbox address code only supplies to use alternately between A and the B; If main body A is lost interest in to prompting message, think that spam just blacklists it, mail will be deleted automatically.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105157928A CN101977111B (en) | 2010-10-15 | 2010-10-15 | Anti-spam method based on privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105157928A CN101977111B (en) | 2010-10-15 | 2010-10-15 | Anti-spam method based on privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101977111A CN101977111A (en) | 2011-02-16 |
CN101977111B true CN101977111B (en) | 2012-08-15 |
Family
ID=43576960
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010105157928A Expired - Fee Related CN101977111B (en) | 2010-10-15 | 2010-10-15 | Anti-spam method based on privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101977111B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5639511B2 (en) * | 2011-03-18 | 2014-12-10 | 株式会社沖データ | Information processing apparatus, composite apparatus, image reading apparatus, and information processing method |
CN102663321B (en) * | 2012-04-24 | 2016-01-13 | 百度在线网络技术(北京)有限公司 | For security enhancement system and the method for software |
CN102843313B (en) * | 2012-09-27 | 2015-05-20 | 深圳中兴网信科技有限公司 | Safety management system of e-mail address and safety management method |
CN104660485B (en) * | 2013-11-22 | 2019-12-13 | 腾讯科技(深圳)有限公司 | Message processing method, device and system |
CN104463605A (en) * | 2014-12-19 | 2015-03-25 | 百度在线网络技术(北京)有限公司 | Coupon code anti-cheating method and device |
CN107743111A (en) * | 2016-10-27 | 2018-02-27 | 腾讯科技(深圳)有限公司 | A kind of E-mail processing method, device and system |
CN108737443B (en) * | 2018-06-14 | 2020-06-02 | 北京大学 | Method for hiding mail address based on cryptographic algorithm |
CN111049738B (en) * | 2019-12-24 | 2022-04-22 | 杭州安司源科技有限公司 | E-mail data security protection method based on hybrid encryption |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1601540A (en) * | 2004-10-25 | 2005-03-30 | 汤溪蔚 | Method of preventing electronic refuse mail |
CN1794284A (en) * | 2005-12-26 | 2006-06-28 | 上海洲信信息技术有限公司 | Method and system of realizing single account multiuser of electron mail box |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040193685A1 (en) * | 2003-03-31 | 2004-09-30 | Sony Corporation/Sony Electronics, Inc. | Method and apparatus for managing and sharing personal identities in a peer-to-peer environment |
US20090259725A1 (en) * | 2008-04-14 | 2009-10-15 | Case Western Reserve University | Email consumer reputation |
-
2010
- 2010-10-15 CN CN2010105157928A patent/CN101977111B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1601540A (en) * | 2004-10-25 | 2005-03-30 | 汤溪蔚 | Method of preventing electronic refuse mail |
CN1794284A (en) * | 2005-12-26 | 2006-06-28 | 上海洲信信息技术有限公司 | Method and system of realizing single account multiuser of electron mail box |
Also Published As
Publication number | Publication date |
---|---|
CN101977111A (en) | 2011-02-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101977111B (en) | Anti-spam method based on privacy protection | |
Hall | How to avoid unwanted email | |
US8090788B2 (en) | Method and system for filtering electronic messages | |
US7711786B2 (en) | Systems and methods for preventing spam | |
US8751808B2 (en) | Method and system for sharing trusted contact information | |
US8572696B1 (en) | Contextual data aided security protection | |
CN1535424A (en) | Web-based communications addressing system and method | |
US20070233610A1 (en) | An improved institutional electronic messaging system | |
CN102918810A (en) | Trusted e-mail communication in a multi-tenant environment | |
WO2009097151A1 (en) | A system and method for providing security via a top level domain | |
US20060053202A1 (en) | Method and system implementing secure email | |
Ioannidis | Fighting Spam by Encapsulating Policy in Email Addresses. | |
Banday | Effectiveness and limitations of e-mail security protocols | |
JP6909233B2 (en) | How to authenticate an email containing a certified digital signature on the part of the telecommunications carrier | |
US20190080115A1 (en) | Mail content anonymization | |
CN105474585A (en) | Private tokens in electronic messages | |
US20060218235A1 (en) | Spam prevention by legal user database and user authentication | |
CN105323254A (en) | A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof | |
US20120284347A1 (en) | System and method for confirming delivery of an electronic message | |
CN103986724B (en) | Email real name identification method and system | |
US20100057874A1 (en) | Preventing wrongful transmission of message content | |
Roman et al. | Protection against spam using pre-challenges | |
Roman et al. | An anti-spam scheme using pre-challenges | |
CN105450502B (en) | The Email that software-oriented defines network denies suppression system and its suppressing method | |
Fontana | Authentication failure reporting using the abuse reporting format |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120815 Termination date: 20161015 |