CN109600455A - A kind of invalid mail address recognition methods and identifying system - Google Patents

A kind of invalid mail address recognition methods and identifying system Download PDF

Info

Publication number
CN109600455A
CN109600455A CN201811250461.9A CN201811250461A CN109600455A CN 109600455 A CN109600455 A CN 109600455A CN 201811250461 A CN201811250461 A CN 201811250461A CN 109600455 A CN109600455 A CN 109600455A
Authority
CN
China
Prior art keywords
library
mail
address
mail address
invalid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811250461.9A
Other languages
Chinese (zh)
Inventor
徐诚
庞振环
王星元
乔永志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Tengdao Information Technology Co Ltd
Original Assignee
Shanghai Tengdao Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Tengdao Information Technology Co Ltd filed Critical Shanghai Tengdao Information Technology Co Ltd
Priority to CN201811250461.9A priority Critical patent/CN109600455A/en
Publication of CN109600455A publication Critical patent/CN109600455A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4555Directories for electronic mail or instant messaging

Abstract

The invention discloses a kind of invalid mail address recognition methods, data resource includes: 1) blacklist filtering library in recognition methods, stores the invalid mail address that has been identified;2) gray list filters library, stores not confirmed, but the invalid mail address that possibility is very big;3) mail behavior record, the behavior that storage sends mail are passed through;4) address validation device implements the device of invalid mail address identification;Invalid mail address recognition methods provided by the invention improves the filter efficiency for being directed to invalid mail address, increases external certificate mechanism and anticipation mechanism, can substantially reduce the failure rate of mail transmission, and have and be obviously improved to transmitting efficiency.

Description

A kind of invalid mail address recognition methods and identifying system
Technical field
Embodiment of the present invention is related to technical field of information processing, is related to a kind of invalid mail address recognition methods and identification System.
Background technique
Nowadays, internet and various terminal equipment have become the pith that work and life are be unable to do without, these equipment For we provide many information, we have increasing need for and rely on value brought by this information, but these information also have Good having is bad, some are even useless, anywhere these bad information are full of, and not so influences us to information Cognition, also waste valuable time and device resource significantly, thus now people gradually start for attention to be placed on how It goes to handle these information well, allows valuable information to be preferably our services, resource is allowed to perform to maximum value.
The rapid development of Email has not only brought convenience, at the same also produce more garbage informations and The wasting of resources, enterprise is to registration user's sending advertisement etc., although these mail addresss are all that user provides, being also no lack of has That user forges, failure and be dropped and do not use, these addresses are referred to as invalid address by us, these are ineffectually Location is not but not generation is worth, but also will cause a large amount of spam and the wasting of resources.
Although many enterprises can all use blacklist mechanism with handling some forgeries or partial failure mail at present Location, but there are also the mail address not used more is dropped, they will generate the garbage information of substantial amounts, occupy more Resource remove these useless garbage informations so we will identify them.
Summary of the invention
The present invention is to solve above-mentioned technical problem and the technical solution adopted is that provide a kind of invalid mail address identification side Method and identifying system, wherein specific technical solution is:
Data resource includes: in recognition methods
1) blacklist filters library, stores the invalid mail address being identified;
2) gray list filters library, stores not confirmed, but the invalid mail address that possibility is very big;
3) mail behavior record, the behavior that storage sends mail are passed through;
4) address validation device implements the device of invalid mail address identification;
Specifically identification process includes:
1) mail address is taken out from list;
2) blacklist library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
3) gray list library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
4) behavior record library: whether inquiry has transmission to record;
It is: enters in next step;It is no: to skip to step 11;
5) behavior record library: inquiring whether last n times record has opening to record, and N is configurable;
It is: skips to step 12;It is no: to enter in next step;
6) it behavior record library: matches and opens whether record accounting is lower than M% in all records, M is configurable;
It is: enters in next step;It is no: to skip to step 12;
7) gray list library: write-in gray list;
8) gray list filters library: whether matching gray list library has K all of above record, and K is configurable;
It is: enters in next step;It is no: to skip to step 12;
9) blacklist library: write-in blacklist;
10) labeled as non-transmittable address, the 21st step is skipped to;
11) external authentication device: checking request is sent to outside by API, whether verifying address is effective;
It is: enters in next step;It is no: to skip to step 19;
12) labeled as transmittable address;
13) mail transmission system: mail is sent;
14) mail transmission system: whether mail transmission succeeds;
It is: enters in next step;It is no: to skip to step 20;
15) behavior record library: write-in behavior record;
16) Mail Clients: addressee opens mail;
17) behavior record library: write-in behavior record;
18) gray list library: gray list is deleted;
19) labeled as transmittable address;
20) blacklist library: write-in blacklist;
21) process is completed.
The invalid mail address identifying system applied in invalid mail address recognition methods, identifying system includes internal data Server one, equip blacklist library, gray list library, mail behavior library;Externally it is responsible for receiving fixed refer to equipped with API service module It enables, reads data according to instruction write-in data or inquiry;And equipped with management module be responsible for data inquiry and modification, delete or Export work.
Identifying system further includes that external authentication device is multiple servers, by a central server and multiple subprocessing sections Point composition;Central server is responsible for obtaining address date by api interface, is that each subprocessing several points are distributed according to load balancing rule Work is verified, and real-time collecting verification result returns the result data by api interface;Child node server is responsible for receiving central clothes The mail address sent of business device, and by a set of verifying instruction implementation mail-address verification, after verifying directly puts back to result Entreat server
The present invention has the following beneficial effects with respect to the prior art: being a kind of identification method of invalid mail address, mention Principle of readjustment, restructuring, consolidation and improvement increases external certificate mechanism and anticipation mechanism, can substantially reduce mail transmission to the filter efficiency of invalid mail address Failure rate, and transmitting efficiency is had and is obviously improved.
Detailed description of the invention
Fig. 1 is the flow diagram of invalid mail address recognition methods.
Fig. 2 is the schematic diagram of internal data system framework.
Fig. 3 is the schematic diagram of external authentication device system architecture.
Specific embodiment
This method is identified suitable for invalid mail address.
Data resource:
1, blacklist filtering library (the invalid mail address that storage has been identified)
2, gray list filtering library (storage not confirmed, but the very big invalid mail address of possibility)
To guarantee to reduce False Rate, the mail address record for being stored into gray list library has a timeliness,
Can fail beyond this record after the time, with guarantee not by the short time the system failure and
It is judged by accident caused by Force Majeure cause, but if record is more than will be this mail address more than after certain number It is added into blacklist library.
3, mail behavior record (the behavior process that storage sends mail)
4, address validation device (one is implemented the device of invalid mail address identification)
Implementing procedure:
1, mail address is taken out from list.
2, blacklist library: whether inquiry has matched mail address.
Be: filtering posts address skips to step 10;It is no: to enter in next step.
3, gray list library: whether inquiry has matched mail address.
Be: filtering posts address skips to step 10;It is no: to enter in next step.
4, behavior record library: whether inquiry has transmission to record.
It is: enters in next step;It is no: to skip to step 11.
5, behavior record library: inquire whether last n times record has opening record (N is configurable).
It is: skips to step 12;It is no: to enter in next step.
6, it behavior record library: matches and opens whether record accounting is lower than M% in all records (M is configurable).
It is: enters in next step;It is no: to skip to step 12.
7, gray list library: write-in gray list.
8, gray list filters library: whether matching gray list library has K all of above record (K is configurable).
It is: enters in next step;It is no: to skip to step 10.
9, blacklist library: write-in blacklist.
10, labeled as non-transmittable address, the 21st step is skipped to.
11, external authentication device: checking request is sent to outside by API, whether verifying address is effective.
It is: enters in next step;It is no: to skip to step 19.
12, labeled as transmittable address.
13, mail transmission system: mail is sent.
14, mail transmission system: whether mail transmission succeeds.
It is: enters in next step;It is no: to skip to step 20.
15, behavior record library: write-in behavior record.
16, Mail Clients: addressee opens mail.
17, behavior record library: write-in behavior record.
18, all gray list records, the gray list record including failure gray list library: are deleted.
19, labeled as transmittable address.
20, blacklist library: write-in blacklist.
21, process is completed.
System architecture:
1, internal data server one equips blacklist library, gray list library, mail behavior library;
Externally it is responsible for receiving fixed instruction equipped with API service module, reads data according to instruction write-in data or inquiry; And it is responsible for inquiry and modification, the deletion or export work of data equipped with management module.
2, external authentication device is multiple servers, by a central server and multiple subprocessing sections
Point composition;
Central server is responsible for obtaining address date by api interface, is each subprocessing several points point according to load balancing rule With verifying work, and real-time collecting verification result returns the result data by api interface;
Child node server is responsible for receiving the mail address that central server is sent, and is instructed by a set of verifying and implement postal Part address validation, directly puts back to central server for result after verifying.
Although the present invention is disclosed as above with preferred embodiment, however, it is not to limit the invention, any this field skill Art personnel, without departing from the spirit and scope of the present invention, when can make a little modification and perfect therefore of the invention protection model It encloses to work as and subject to the definition of the claims.

Claims (3)

1. a kind of invalid mail address recognition methods, it is characterised in that:
Data resource includes: in recognition methods
1) blacklist filters library, stores the invalid mail address being identified;
2) gray list filters library, stores not confirmed, but the invalid mail address that possibility is very big;
3) mail behavior record, the behavior that storage sends mail are passed through;
4) address validation device implements the device of invalid mail address identification;
Specifically identification process includes:
1) mail address is taken out from list;
2) blacklist library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
3) gray list library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
4) behavior record library: whether inquiry has transmission to record;
It is: enters in next step;It is no: to skip to step 11;
5) behavior record library: inquiring whether last n times record has opening to record, and N is configurable;
It is: skips to step 12;It is no: to enter in next step;
6) it behavior record library: matches and opens whether record accounting is lower than M% in all records, M is configurable;
It is: enters in next step;It is no: to skip to step 12;
7) gray list library: write-in gray list;
8) gray list filters library: whether matching gray list library has K all of above record, and K is configurable;
It is: enters in next step;It is no: to skip to step 10;
9) blacklist library: write-in blacklist;
10) labeled as non-transmittable address, the 21st step is skipped to;
11) external authentication device: checking request is sent to outside by API, whether verifying address is effective;
It is: enters in next step;It is no: to skip to step 19;
12) labeled as transmittable address;
13) mail transmission system: mail is sent;
14) mail transmission system: whether mail transmission succeeds;
It is: enters in next step;It is no: to skip to step 20;
15) behavior record library: write-in behavior record;
16) Mail Clients: addressee opens mail;
17) behavior record library: write-in behavior record;
18) gray list library: gray list is deleted;
19) labeled as non-transmittable address;
20) blacklist library: write-in blacklist;
21) process is completed.
2. the invalid mail address applied in a kind of invalid mail address recognition methods as described in any one of claim 2-3 Identifying system, it is characterised in that: identifying system includes internal data server one, equips blacklist library, gray list library, mail Behavior library;Externally it is responsible for receiving fixed instruction equipped with API service module, reads data according to instruction write-in data or inquiry; And it is responsible for inquiry and modification, the deletion or export work of data equipped with management module.
3. invalid mail address identifying system as claimed in claim 2, it is characterised in that: identifying system further includes external certificate Device is multiple servers, is made of a central server and multiple subprocessing nodes;Central server is responsible for connecing by API Mouth obtains address date, is that each subprocessing several points distribute verifying work, and real-time collecting verification result is logical according to load balancing rule It crosses api interface and returns the result data;Child node server is responsible for receiving the mail address that central server is sent, and by a set of Mail-address verification is implemented in verifying instruction, and result is directly put back to central server after verifying.
CN201811250461.9A 2018-10-25 2018-10-25 A kind of invalid mail address recognition methods and identifying system Pending CN109600455A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811250461.9A CN109600455A (en) 2018-10-25 2018-10-25 A kind of invalid mail address recognition methods and identifying system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811250461.9A CN109600455A (en) 2018-10-25 2018-10-25 A kind of invalid mail address recognition methods and identifying system

Publications (1)

Publication Number Publication Date
CN109600455A true CN109600455A (en) 2019-04-09

Family

ID=65957062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811250461.9A Pending CN109600455A (en) 2018-10-25 2018-10-25 A kind of invalid mail address recognition methods and identifying system

Country Status (1)

Country Link
CN (1) CN109600455A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101036366A (en) * 2004-07-22 2007-09-12 弗兰德斯特公司 Methods for authorizing transmission of content from first to second individual and authentication an individual based on an individual's social network
CN101340387A (en) * 2008-08-12 2009-01-07 华为技术有限公司 Method and apparatus for control forwarding data packets
CN101473313A (en) * 2006-02-14 2009-07-01 信息标准有限责任公司 Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification
US20120150965A1 (en) * 2010-12-08 2012-06-14 Stephen Wood Mitigating Email SPAM Attacks
CN104636683A (en) * 2015-03-04 2015-05-20 深圳市中兴移动通信有限公司 Terminal, email missending prevention method of terminal and server
CN106060021A (en) * 2016-05-20 2016-10-26 腾讯科技(深圳)有限公司 E-mail identification method, device and system
CN106209724A (en) * 2015-04-29 2016-12-07 福建天晴数码有限公司 A kind of invalid addresses of items of mail filter method and device
CN107707462A (en) * 2017-10-31 2018-02-16 下代互联网重大应用技术(北京)工程研究中心有限公司 Spam emergency processing method based on cloud computing
CN108449263A (en) * 2018-04-16 2018-08-24 深圳市小满科技有限公司 E-mail sending method and device, electronic equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101036366A (en) * 2004-07-22 2007-09-12 弗兰德斯特公司 Methods for authorizing transmission of content from first to second individual and authentication an individual based on an individual's social network
CN101473313A (en) * 2006-02-14 2009-07-01 信息标准有限责任公司 Method for predelivery verification of an intended recipient of an electronic message and dynamic generation of message content upon verification
CN101340387A (en) * 2008-08-12 2009-01-07 华为技术有限公司 Method and apparatus for control forwarding data packets
US20120150965A1 (en) * 2010-12-08 2012-06-14 Stephen Wood Mitigating Email SPAM Attacks
CN104636683A (en) * 2015-03-04 2015-05-20 深圳市中兴移动通信有限公司 Terminal, email missending prevention method of terminal and server
CN106209724A (en) * 2015-04-29 2016-12-07 福建天晴数码有限公司 A kind of invalid addresses of items of mail filter method and device
CN106060021A (en) * 2016-05-20 2016-10-26 腾讯科技(深圳)有限公司 E-mail identification method, device and system
CN107707462A (en) * 2017-10-31 2018-02-16 下代互联网重大应用技术(北京)工程研究中心有限公司 Spam emergency processing method based on cloud computing
CN108449263A (en) * 2018-04-16 2018-08-24 深圳市小满科技有限公司 E-mail sending method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
JP4717886B2 (en) Method and system for regulating email
US6460050B1 (en) Distributed content identification system
US6405243B1 (en) Method and system for updating email addresses
US7293065B2 (en) Method of electronic message delivery with penalties for unsolicited messages
US8108477B2 (en) Message classification using legitimate contact points
CN101495969B (en) Identifying threats in electronic messages
US7194515B2 (en) Method and system for selectively blocking delivery of bulk electronic mail
US8725889B2 (en) E-mail management services
US7886066B2 (en) Zero-minute virus and spam detection
US11888805B2 (en) Method and apparatus for storing email messages
US20020198950A1 (en) Junk electronic mail detector and eliminator
US20030233418A1 (en) Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses
US20090044006A1 (en) System for blocking spam mail and method of the same
WO2004013796A1 (en) Practical techniques for reducing unsolicited electronic messages by identifying sender’s addresses
CN112351392B (en) Cloud communication short message service platform
CN105023137A (en) E-mail evidence processing system and processing method
CN108011805A (en) Method, apparatus, intermediate server and the car networking system of message screening
WO2018210097A1 (en) Method and device for execution transaction mode by classification
CN110225109B (en) Multi-queue data transmission method based on 'industrial and commercial connection' platform
CN106330661A (en) Data centralized processing method
KR100999977B1 (en) Information drain prevention method
CN108462625B (en) Method and device for determining recipients in process of replying electronic mail
CN109600455A (en) A kind of invalid mail address recognition methods and identifying system
US20060195537A1 (en) Systems and methods for managing directory harvest attacks via electronic messages
CN102843376A (en) Method and device for preventing junk mails

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190409

RJ01 Rejection of invention patent application after publication