CN109600455A - A kind of invalid mail address recognition methods and identifying system - Google Patents
A kind of invalid mail address recognition methods and identifying system Download PDFInfo
- Publication number
- CN109600455A CN109600455A CN201811250461.9A CN201811250461A CN109600455A CN 109600455 A CN109600455 A CN 109600455A CN 201811250461 A CN201811250461 A CN 201811250461A CN 109600455 A CN109600455 A CN 109600455A
- Authority
- CN
- China
- Prior art keywords
- library
- address
- mail address
- invalid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4555—Directories for electronic mail or instant messaging
Abstract
The invention discloses a kind of invalid mail address recognition methods, data resource includes: 1) blacklist filtering library in recognition methods, stores the invalid mail address that has been identified;2) gray list filters library, stores not confirmed, but the invalid mail address that possibility is very big;3) mail behavior record, the behavior that storage sends mail are passed through;4) address validation device implements the device of invalid mail address identification;Invalid mail address recognition methods provided by the invention improves the filter efficiency for being directed to invalid mail address, increases external certificate mechanism and anticipation mechanism, can substantially reduce the failure rate of mail transmission, and have and be obviously improved to transmitting efficiency.
Description
Technical field
Embodiment of the present invention is related to technical field of information processing, is related to a kind of invalid mail address recognition methods and identification
System.
Background technique
Nowadays, internet and various terminal equipment have become the pith that work and life are be unable to do without, these equipment
For we provide many information, we have increasing need for and rely on value brought by this information, but these information also have
Good having is bad, some are even useless, anywhere these bad information are full of, and not so influences us to information
Cognition, also waste valuable time and device resource significantly, thus now people gradually start for attention to be placed on how
It goes to handle these information well, allows valuable information to be preferably our services, resource is allowed to perform to maximum value.
The rapid development of Email has not only brought convenience, at the same also produce more garbage informations and
The wasting of resources, enterprise is to registration user's sending advertisement etc., although these mail addresss are all that user provides, being also no lack of has
That user forges, failure and be dropped and do not use, these addresses are referred to as invalid address by us, these are ineffectually
Location is not but not generation is worth, but also will cause a large amount of spam and the wasting of resources.
Although many enterprises can all use blacklist mechanism with handling some forgeries or partial failure mail at present
Location, but there are also the mail address not used more is dropped, they will generate the garbage information of substantial amounts, occupy more
Resource remove these useless garbage informations so we will identify them.
Summary of the invention
The present invention is to solve above-mentioned technical problem and the technical solution adopted is that provide a kind of invalid mail address identification side
Method and identifying system, wherein specific technical solution is:
Data resource includes: in recognition methods
1) blacklist filters library, stores the invalid mail address being identified;
2) gray list filters library, stores not confirmed, but the invalid mail address that possibility is very big;
3) mail behavior record, the behavior that storage sends mail are passed through;
4) address validation device implements the device of invalid mail address identification;
Specifically identification process includes:
1) mail address is taken out from list;
2) blacklist library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
3) gray list library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
4) behavior record library: whether inquiry has transmission to record;
It is: enters in next step;It is no: to skip to step 11;
5) behavior record library: inquiring whether last n times record has opening to record, and N is configurable;
It is: skips to step 12;It is no: to enter in next step;
6) it behavior record library: matches and opens whether record accounting is lower than M% in all records, M is configurable;
It is: enters in next step;It is no: to skip to step 12;
7) gray list library: write-in gray list;
8) gray list filters library: whether matching gray list library has K all of above record, and K is configurable;
It is: enters in next step;It is no: to skip to step 12;
9) blacklist library: write-in blacklist;
10) labeled as non-transmittable address, the 21st step is skipped to;
11) external authentication device: checking request is sent to outside by API, whether verifying address is effective;
It is: enters in next step;It is no: to skip to step 19;
12) labeled as transmittable address;
13) mail transmission system: mail is sent;
14) mail transmission system: whether mail transmission succeeds;
It is: enters in next step;It is no: to skip to step 20;
15) behavior record library: write-in behavior record;
16) Mail Clients: addressee opens mail;
17) behavior record library: write-in behavior record;
18) gray list library: gray list is deleted;
19) labeled as transmittable address;
20) blacklist library: write-in blacklist;
21) process is completed.
The invalid mail address identifying system applied in invalid mail address recognition methods, identifying system includes internal data
Server one, equip blacklist library, gray list library, mail behavior library;Externally it is responsible for receiving fixed refer to equipped with API service module
It enables, reads data according to instruction write-in data or inquiry;And equipped with management module be responsible for data inquiry and modification, delete or
Export work.
Identifying system further includes that external authentication device is multiple servers, by a central server and multiple subprocessing sections
Point composition;Central server is responsible for obtaining address date by api interface, is that each subprocessing several points are distributed according to load balancing rule
Work is verified, and real-time collecting verification result returns the result data by api interface;Child node server is responsible for receiving central clothes
The mail address sent of business device, and by a set of verifying instruction implementation mail-address verification, after verifying directly puts back to result
Entreat server
The present invention has the following beneficial effects with respect to the prior art: being a kind of identification method of invalid mail address, mention
Principle of readjustment, restructuring, consolidation and improvement increases external certificate mechanism and anticipation mechanism, can substantially reduce mail transmission to the filter efficiency of invalid mail address
Failure rate, and transmitting efficiency is had and is obviously improved.
Detailed description of the invention
Fig. 1 is the flow diagram of invalid mail address recognition methods.
Fig. 2 is the schematic diagram of internal data system framework.
Fig. 3 is the schematic diagram of external authentication device system architecture.
Specific embodiment
This method is identified suitable for invalid mail address.
Data resource:
1, blacklist filtering library (the invalid mail address that storage has been identified)
2, gray list filtering library (storage not confirmed, but the very big invalid mail address of possibility)
To guarantee to reduce False Rate, the mail address record for being stored into gray list library has a timeliness,
Can fail beyond this record after the time, with guarantee not by the short time the system failure and
It is judged by accident caused by Force Majeure cause, but if record is more than will be this mail address more than after certain number
It is added into blacklist library.
3, mail behavior record (the behavior process that storage sends mail)
4, address validation device (one is implemented the device of invalid mail address identification)
Implementing procedure:
1, mail address is taken out from list.
2, blacklist library: whether inquiry has matched mail address.
Be: filtering posts address skips to step 10;It is no: to enter in next step.
3, gray list library: whether inquiry has matched mail address.
Be: filtering posts address skips to step 10;It is no: to enter in next step.
4, behavior record library: whether inquiry has transmission to record.
It is: enters in next step;It is no: to skip to step 11.
5, behavior record library: inquire whether last n times record has opening record (N is configurable).
It is: skips to step 12;It is no: to enter in next step.
6, it behavior record library: matches and opens whether record accounting is lower than M% in all records (M is configurable).
It is: enters in next step;It is no: to skip to step 12.
7, gray list library: write-in gray list.
8, gray list filters library: whether matching gray list library has K all of above record (K is configurable).
It is: enters in next step;It is no: to skip to step 10.
9, blacklist library: write-in blacklist.
10, labeled as non-transmittable address, the 21st step is skipped to.
11, external authentication device: checking request is sent to outside by API, whether verifying address is effective.
It is: enters in next step;It is no: to skip to step 19.
12, labeled as transmittable address.
13, mail transmission system: mail is sent.
14, mail transmission system: whether mail transmission succeeds.
It is: enters in next step;It is no: to skip to step 20.
15, behavior record library: write-in behavior record.
16, Mail Clients: addressee opens mail.
17, behavior record library: write-in behavior record.
18, all gray list records, the gray list record including failure gray list library: are deleted.
19, labeled as transmittable address.
20, blacklist library: write-in blacklist.
21, process is completed.
System architecture:
1, internal data server one equips blacklist library, gray list library, mail behavior library;
Externally it is responsible for receiving fixed instruction equipped with API service module, reads data according to instruction write-in data or inquiry;
And it is responsible for inquiry and modification, the deletion or export work of data equipped with management module.
2, external authentication device is multiple servers, by a central server and multiple subprocessing sections
Point composition;
Central server is responsible for obtaining address date by api interface, is each subprocessing several points point according to load balancing rule
With verifying work, and real-time collecting verification result returns the result data by api interface;
Child node server is responsible for receiving the mail address that central server is sent, and is instructed by a set of verifying and implement postal
Part address validation, directly puts back to central server for result after verifying.
Although the present invention is disclosed as above with preferred embodiment, however, it is not to limit the invention, any this field skill
Art personnel, without departing from the spirit and scope of the present invention, when can make a little modification and perfect therefore of the invention protection model
It encloses to work as and subject to the definition of the claims.
Claims (3)
1. a kind of invalid mail address recognition methods, it is characterised in that:
Data resource includes: in recognition methods
1) blacklist filters library, stores the invalid mail address being identified;
2) gray list filters library, stores not confirmed, but the invalid mail address that possibility is very big;
3) mail behavior record, the behavior that storage sends mail are passed through;
4) address validation device implements the device of invalid mail address identification;
Specifically identification process includes:
1) mail address is taken out from list;
2) blacklist library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
3) gray list library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
4) behavior record library: whether inquiry has transmission to record;
It is: enters in next step;It is no: to skip to step 11;
5) behavior record library: inquiring whether last n times record has opening to record, and N is configurable;
It is: skips to step 12;It is no: to enter in next step;
6) it behavior record library: matches and opens whether record accounting is lower than M% in all records, M is configurable;
It is: enters in next step;It is no: to skip to step 12;
7) gray list library: write-in gray list;
8) gray list filters library: whether matching gray list library has K all of above record, and K is configurable;
It is: enters in next step;It is no: to skip to step 10;
9) blacklist library: write-in blacklist;
10) labeled as non-transmittable address, the 21st step is skipped to;
11) external authentication device: checking request is sent to outside by API, whether verifying address is effective;
It is: enters in next step;It is no: to skip to step 19;
12) labeled as transmittable address;
13) mail transmission system: mail is sent;
14) mail transmission system: whether mail transmission succeeds;
It is: enters in next step;It is no: to skip to step 20;
15) behavior record library: write-in behavior record;
16) Mail Clients: addressee opens mail;
17) behavior record library: write-in behavior record;
18) gray list library: gray list is deleted;
19) labeled as non-transmittable address;
20) blacklist library: write-in blacklist;
21) process is completed.
2. the invalid mail address applied in a kind of invalid mail address recognition methods as described in any one of claim 2-3
Identifying system, it is characterised in that: identifying system includes internal data server one, equips blacklist library, gray list library, mail
Behavior library;Externally it is responsible for receiving fixed instruction equipped with API service module, reads data according to instruction write-in data or inquiry;
And it is responsible for inquiry and modification, the deletion or export work of data equipped with management module.
3. invalid mail address identifying system as claimed in claim 2, it is characterised in that: identifying system further includes external certificate
Device is multiple servers, is made of a central server and multiple subprocessing nodes;Central server is responsible for connecing by API
Mouth obtains address date, is that each subprocessing several points distribute verifying work, and real-time collecting verification result is logical according to load balancing rule
It crosses api interface and returns the result data;Child node server is responsible for receiving the mail address that central server is sent, and by a set of
Mail-address verification is implemented in verifying instruction, and result is directly put back to central server after verifying.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811250461.9A CN109600455A (en) | 2018-10-25 | 2018-10-25 | A kind of invalid mail address recognition methods and identifying system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811250461.9A CN109600455A (en) | 2018-10-25 | 2018-10-25 | A kind of invalid mail address recognition methods and identifying system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109600455A true CN109600455A (en) | 2019-04-09 |
Family
ID=65957062
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811250461.9A Pending CN109600455A (en) | 2018-10-25 | 2018-10-25 | A kind of invalid mail address recognition methods and identifying system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109600455A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101036366A (en) * | 2004-07-22 | 2007-09-12 | 弗兰德斯特公司 | Methods for authorizing transmission of content from first to second individual and authentication an individual based on an individual's social network |
CN101340387A (en) * | 2008-08-12 | 2009-01-07 | 华为技术有限公司 | Method and apparatus for control forwarding data packets |
CN101473313A (en) * | 2006-02-14 | 2009-07-01 | 信息标准有限责任公司 | Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification |
US20120150965A1 (en) * | 2010-12-08 | 2012-06-14 | Stephen Wood | Mitigating Email SPAM Attacks |
CN104636683A (en) * | 2015-03-04 | 2015-05-20 | 深圳市中兴移动通信有限公司 | Terminal, email missending prevention method of terminal and server |
CN106060021A (en) * | 2016-05-20 | 2016-10-26 | 腾讯科技(深圳)有限公司 | E-mail identification method, device and system |
CN106209724A (en) * | 2015-04-29 | 2016-12-07 | 福建天晴数码有限公司 | A kind of invalid addresses of items of mail filter method and device |
CN107707462A (en) * | 2017-10-31 | 2018-02-16 | 下代互联网重大应用技术(北京)工程研究中心有限公司 | Spam emergency processing method based on cloud computing |
CN108449263A (en) * | 2018-04-16 | 2018-08-24 | 深圳市小满科技有限公司 | E-mail sending method and device, electronic equipment and storage medium |
-
2018
- 2018-10-25 CN CN201811250461.9A patent/CN109600455A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101036366A (en) * | 2004-07-22 | 2007-09-12 | 弗兰德斯特公司 | Methods for authorizing transmission of content from first to second individual and authentication an individual based on an individual's social network |
CN101473313A (en) * | 2006-02-14 | 2009-07-01 | 信息标准有限责任公司 | Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification |
CN101340387A (en) * | 2008-08-12 | 2009-01-07 | 华为技术有限公司 | Method and apparatus for control forwarding data packets |
US20120150965A1 (en) * | 2010-12-08 | 2012-06-14 | Stephen Wood | Mitigating Email SPAM Attacks |
CN104636683A (en) * | 2015-03-04 | 2015-05-20 | 深圳市中兴移动通信有限公司 | Terminal, email missending prevention method of terminal and server |
CN106209724A (en) * | 2015-04-29 | 2016-12-07 | 福建天晴数码有限公司 | A kind of invalid addresses of items of mail filter method and device |
CN106060021A (en) * | 2016-05-20 | 2016-10-26 | 腾讯科技(深圳)有限公司 | E-mail identification method, device and system |
CN107707462A (en) * | 2017-10-31 | 2018-02-16 | 下代互联网重大应用技术(北京)工程研究中心有限公司 | Spam emergency processing method based on cloud computing |
CN108449263A (en) * | 2018-04-16 | 2018-08-24 | 深圳市小满科技有限公司 | E-mail sending method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4717886B2 (en) | Method and system for regulating email | |
US6460050B1 (en) | Distributed content identification system | |
US6405243B1 (en) | Method and system for updating email addresses | |
US7293065B2 (en) | Method of electronic message delivery with penalties for unsolicited messages | |
US8108477B2 (en) | Message classification using legitimate contact points | |
CN101495969B (en) | Identifying threats in electronic messages | |
US7194515B2 (en) | Method and system for selectively blocking delivery of bulk electronic mail | |
US8725889B2 (en) | E-mail management services | |
US7886066B2 (en) | Zero-minute virus and spam detection | |
US11888805B2 (en) | Method and apparatus for storing email messages | |
US20020198950A1 (en) | Junk electronic mail detector and eliminator | |
US20030233418A1 (en) | Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses | |
US20090044006A1 (en) | System for blocking spam mail and method of the same | |
WO2004013796A1 (en) | Practical techniques for reducing unsolicited electronic messages by identifying sender’s addresses | |
CN112351392B (en) | Cloud communication short message service platform | |
CN105023137A (en) | E-mail evidence processing system and processing method | |
CN108011805A (en) | Method, apparatus, intermediate server and the car networking system of message screening | |
WO2018210097A1 (en) | Method and device for execution transaction mode by classification | |
CN110225109B (en) | Multi-queue data transmission method based on 'industrial and commercial connection' platform | |
CN106330661A (en) | Data centralized processing method | |
KR100999977B1 (en) | Information drain prevention method | |
CN108462625B (en) | Method and device for determining recipients in process of replying electronic mail | |
CN109600455A (en) | A kind of invalid mail address recognition methods and identifying system | |
US20060195537A1 (en) | Systems and methods for managing directory harvest attacks via electronic messages | |
CN102843376A (en) | Method and device for preventing junk mails |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190409 |
|
RJ01 | Rejection of invention patent application after publication |