CN1780266A - Method for analyzing and controlling e-mails - Google Patents

Method for analyzing and controlling e-mails Download PDF

Info

Publication number
CN1780266A
CN1780266A CNA200410096045XA CN200410096045A CN1780266A CN 1780266 A CN1780266 A CN 1780266A CN A200410096045X A CNA200410096045X A CN A200410096045XA CN 200410096045 A CN200410096045 A CN 200410096045A CN 1780266 A CN1780266 A CN 1780266A
Authority
CN
China
Prior art keywords
mail
email
policy
behavior
parsing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200410096045XA
Other languages
Chinese (zh)
Inventor
郑志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA200410096045XA priority Critical patent/CN1780266A/en
Publication of CN1780266A publication Critical patent/CN1780266A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The envelope information and title information of email is used to preset a group of email policy. When agent receives the email, the email policy is compared with the content of email to examine if the content of email conforms to email policy. If the email is decided as a garbage mail by email policy, the mail will be rejected. If the mail is decided as a free checking mail by email policy, it will be transmitted.

Description

Resolve the method for mail behavior control Email
Technical field
The present invention relates to a kind of method of handling Email, refer to a kind of method of resolving mail behavior control Email especially.
Background technology
The corporate mail information security issue is from virus, hacker, spam wildness till now, the overwhelming majority mail by filtration check, virus scan is value added with the anti-blocking software company of spam, all be to build in the computing and analytical technology basis of huge database, by the Mail Contents that compiles a large amount of rubbish, numerical value weighted calculation and intelligence inspiration method reach the anti-blocking function of spam in addition.Yet the shortcoming of located by prior art be its classification assert too subjective, for example pornographic, make a good deal of money, medicine, commerce etc., indecisive, may judge by accident, and Mail Contents scanning is filtered and caused system resource to expend with communication efficiency to reduce.
Be to resist spam, various countries make laws in succession, and through international common recognition, mail is roughly divided into spam and advertisement matter, thus talk about spam anti-blocking before, we must distinguish spam and advertisement matter earlier.With the U.S. is example, Can-Spam legislation spam down refer to anonymous, forge, distribute indiscriminately or illegal conduct transmission Emails such as (transition information or hide Info etc.), it adopts the possible cause of these gimmicks as follows: can't trace the source 1.; 2. change contact method; 3. allow receiver think colleague or friend by mistake; 4. allow receiver based on curious and see letter etc., because of unknown origin or can't successfully refuse, so need have special technique to come identification and reject.And advertisement matter refers to post the part person obtains the receiver address through specific channel, transmits Email with normal publicity pattern, and receiver can be reviewed the source place and have the right to cancel subscriptions through official channel.
Known Spam filtering obstruct technology is broadly divided into information filtering, numerical computations and three kinds of technology of inspiration technology.The way of information filtering provides in the person that posts the part, receiver, mail purport, Mail Contents, extension name, file name and the archives literary composition etc. and filters and intercept, and sees through the blacklist collection mode, comes anti-blocking spam; But have that list collect to be difficult for, list set up time-consuming, stop shortcomings such as rate is not high, blacklist erroneous judgement.The way of numerical computations is to be based upon in the computing and analytical technology basis of huge database, and by the Mail Contents that compiles a large amount of rubbish, the numerical value weight computation method reaches the effect of anti-blocking spam in addition; Yet its have classification assert too subjective (for example pornographic, make a good deal of money, medicine, commerce etc.), indecisive, may judge by accident, Mail Contents scanning filters and causes system resource to expend and shortcoming such as communication efficiency reduction.The inspiration technology is then similar with aforementioned numerical computation method, it also builds on the computing Mail Contents that compile a large amount of rubbish next with analysis of huge database, except with Mail Contents in addition the numerical value weighted calculation, also added simultaneously intelligence inspiration method, therefore except shortcoming with numerical computation method, when database was big more, then False Rate was high more.
Summary of the invention
Main purpose of the present invention is to provide a kind of method of resolving mail behavior control Email, and it can reach the purpose of control mail turnover.
Another object of the present invention is to provide a kind of method of resolving mail behavior control Email, it can effectively reach the anti-blocking effect of spam.
A further object of the present invention is to provide a kind of method of resolving mail behavior control Email, and it not only accurately controls mail, and saves network bandwidth, system resource and hard drive space.
Another purpose of the present invention is to provide a kind of method of resolving mail behavior control Email, and it can save operation costs.
To achieve these goals, technical solution of the present invention is: a kind of method of resolving mail behavior control Email comprises the following steps: to set a different set of mail policy according to the envelope information and the heading message of mail; When proxy server (Agent) when receiving Email, the mail policy compares the mail transmission data of this Email one by one, verifies whether the behavior of this Email meets the mail policy, and takes to stop or transmit action according to the checking result.
Above-mentioned mail policy is to be used for judging whether Email is spam, when proxy server is received Email, the method of verifying this Email comprises the following steps: that the mail policy compares the mail transmission data of this Email one by one, whether the behavior of verifying this Email meets this group mail policy, meet and be spam, and then stop this Email; Do not meet and then transmit this Email.
This group mail policy is gate inhibition's policy of the inspection-free mail behavior of definition, proxy server is when receiving Email, the method of verifying this Email comprises the following steps: that the mail policy compares the mail transmission data of this Email one by one, whether the behavior of verifying this Email meets this group mail policy, meet that to represent this Email be inspection-free mail, and then transmit this Email; Otherwise stop this Email.
The person of sending of inspection-free mail comprises the domain name of parent company, subsidiary, Very Important Person, contact manufacturer, subscribing e-paper and fixing IP person.
In the mail policy step that sets, comprise the checking criterion of setting each mail policy, the checking criterion is selected to meet, do not meet and skip over and does not contrast one of them.
This mail transmission data includes envelope information and the heading message under this Email.
The method whether the checking Email meets the spam behavior of mail policy specifically comprises the following steps:
(a) when proxy server is received Email, the first mail policy is carried out true and false checking to the mail transmission data of this Email, judges whether it meets the first mail policy, then carries out step (b) if meet, and then carries out step (c) if not;
(b) allow this Email to send out; And
(c) continue the conduct of reviewing this Email with the second mail policy, judge whether it meets this second mail policy, if then carry out step (b), then continue the conduct of reviewing this Email if not by next mail policy, to the last the mail policy uses until exhausted, and when this Email did not still meet last mail policy, then proxy server stopped this Email.
Each mail policy comprises one group of rule, when utilizing one of them mail policy that the mail transmission data of this Email is verified, comprises the following steps:
(a) by first rule mail transmission data of this Email is carried out true and false checking, judge whether it meets first rule,, then carry out step (c) if not if then carry out step (b);
(b) continue the mail transmission data of this Email is carried out true and false checking by second rule, judge whether it meets second rule, then carry out step (c) if not, if then continue the conduct that next rule is reviewed this Email, rule to the last uses until exhausted, and the checking result according to employed last rule determines whether this Email meets this mail policy, if then allow this E-mail conveyance to go out, then carries out step (c) if not; And
(c) continue the conduct that next mail policy is reviewed this Email, judge whether it meets this next mail policy, and repeat above-mentioned (a) and (b) step.
The checking criterion of each rule of checking Email for meet, do not meet and skip over noncontrastive one of them, and this checking criterion is located in the step of mail policy.
The mail policy judges whether Email has abnormal behaviour, and abnormal behaviour comprises anonymity, forges, distributes indiscriminately and illegal or its combination.
Anonymous behavior comprise be selected from that heading message is failed to understand, the person's main frame of posting the part with reply one of them behavior at least that the different and answer mailbox main frame of mailbox main frame is the group that forms of network service provider (ISP) main frame.
It is external network domain but the person address of posting the part is forged into incorrect one of them behavior of domain name server (DNS) in internal host and net territory that the forgery behavior includes the source place main frame.
It is unusual and change is frequent that the behavior of distributing indiscriminately includes the mode of sending.
Illegal act comprises the behavior of return address for the lease main frame.
The content of mail and add file are as the setting content of mail policy.
Proxy server is Mail Transfer Agent device (MTA).
Mail Transfer Agent device (MTA) is a router.
The group that envelope information is selected from post part person's account number, receiver account number, receiver host address, the person's host address of posting the part, return address, domain name server (DNS) and ELECTRONIC POSTMARK are formed at least one of them.
The supplier of ELECTRONIC POSTMARK be selected from group that transmitting end server, local side server and networking network ISP (ISP) server form at least one of them.
The processing mode that stops this Email is selected from this Email of rejection, deletes one of them mode of this Email.
When this Email of rejection, return an error code and error messages simultaneously.
After adopting such scheme, the present invention utilizes the mail characteristic and the transmission principle of Email, " the mail envelope " of one Email resolved with the true-false value of mail transmission data such as " mail header ", and through back forecasting repeatedly, whether the behavior that goes out mail with accurate induction and deduction is allowed by the mail policy of presetting, and then reaches turnover of control Email and the anti-blocking effect of spam.So the present invention not only can accurately control mail, effective anti-blocking spam improves network security, and can save network bandwidth, system resource and hard drive space, to reach the effect of promoting mail communication efficient and saving operation costs.
Description of drawings
Fig. 1 resolves the method schematic diagram of mail behavior control Email for the present invention;
Detailed process schematic diagram when Fig. 2 verifies Email for one group of rule of the present invention in utilizing a mail policy;
Fig. 3 is the flow chart of the present invention with default mail policy checking Email.
Figure number explanation: 10 mail policies, 12 rules
Embodiment
The present invention is at Mail Transfer Agent device (Mail transfer agent, MTA) execution phase, utilize default mail policy to verify the true-false value of the mail transmission data of an Email, see through the parsing of mail transmission data such as mail envelope and mail header, initiatively judge the behavior behavior whether compliance with system allowed of this Email, and then reach mail turnover control and the anti-blocking purpose of spam.
The Email that one envelope is complete is called mail text (Mail text).Generally speaking, the mail text comprises mail envelope (Mail envelop), mail header (Mail header) and Mail Contents (Mail content).The Email that one envelope is complete will have through Mail Transfer Agent device (Mail transfer agent at server and client, MTA) and mail user agent device (Mail useragent, MUA) process of Chu Liing, this is the basic transmission mode of Email.The present invention utilizes the mail characteristic and the transmission principle of this Email, " the mail envelope " of one Email resolved with the true-false value of mail transmission data such as " mail header ", and through back forecasting repeatedly, go out hundreds of mail behavior type with accurate induction and deduction, and then reach the turnover and the anti-blocking effect of spam of control Email.
Because the present invention can use the mail policy that the envelope information of an Email is set the management mail, so before explanation method of the present invention, the content of the necessary envelope of explanation earlier information.Information such as the envelope information of Email is generally post part person's account number, receiver account number, receiver host address, the person's host address of posting the part, return address, domain name server (DNS) and ELECTRONIC POSTMARK; Wherein, Email after proxy servers such as transmitting end server, local side server or networking network ISP (ISP) server transmit, each the proxy server of the process ELECTRONIC POSTMARK of can on this Email, annotating.
Fig. 1 resolves the method schematic diagram of mail behavior control Email for the present invention, comprise the following steps: at first, utilize the information such as envelope information, heading message, content and add file of mail to preestablish out a different set of mail policy 10, and each mail policy 10 comprise one group of rule 12.As shown in Figure 2, the setting of each policy 10 includes [envelope posts the part person], [envelope receiver] and [mail header] three sigma rule 12, and the setting of above-mentioned three sigma rule 12 must meet simultaneously, and system just can carry out.About rule 12 setting, the user can specify to meet, do not meet and skip over and not contrast one of them, that is the user can specify [envelope posts the part person] or [envelope receiver], do not fill in then expression all; Also can select contrast or skip over [mail header], and the relevance of 12 of strictly all ruleses be [with], must all meet those settings and just be considered as establishment condition, system just can carry out to take suitable action.Similarly, when these mail policies 10 of setting, can specify on demand to meet, do not meet and skip over not contrast one of them.
After configuring mail policy 10 and rule 12 thereof, when proxy server (Agent) is received an Email, mail policy 10 compares the mail transmission data of this Email one by one, the mail transmission data that is contrasted refers to include this Email affiliated envelope information and heading message, or even content and add file, according to predefined mail policy 10 and rule 12 thereof, verify that whether this Email trip is for meeting these mail policies 10, and foundation is verified the action that the result takes corresponding stopping/transmits.
Wherein, mail policy 10 and rule 12 thereof can be defined as the behavior of spam or the behavior of inspection-free mail by setting person, thereby judge whether Email is spam, or judge whether Email is inspection-free courteous reception or treatment mail.Be defined as the behavior of spam when mail policy 10 and regular 12, when then this moment, proxy server was verified this Email receiving Email, comprise the following steps: one by one the mail transmission data of this Email to be compared by mail policy 10, whether meet the mail policy with the behavior of verifying this Email, if, then representing this Email is spam, and then stops this Email; If not, then transmit this Email.
On the contrary, when mail policy 10 and regular 12 is defined as the behavior of inspection-free mail, after then this moment, proxy server compared its mail transmission data with these mail policies 10 one by one receiving Email, if the behavior of this Email meets mail policy 10, then representing this Email is inspection-free mail, so transmit this Email; If do not meet, then stop this Email.Setting according to inspection-free mail, can set the inspection-free courteous reception or treatment object of the gate inhibition of enterprise policy, the person of sending of inspection-free mail can be the domain name of parent company, subsidiary, Very Important Person, contact manufacturer, subscribing e-paper or fixing IP person, perhaps for enterprise allows inner member in enterprise's external access mail (for example: in the employee family, subcontractor, special point stationed abroad etc.), the inspection-free courteous reception or treatment object of all genus enterprises is prior-release then.
Because the action that proxy server is taked presents adverse consequences according to the setting content of mail policy, that is when the behavior of mail policy emulation spam, then when meeting policy, stop mail, and when the inspection-free mail behavior of mail policy emulation, clearance mail when meeting policy then, its operation principle is identical, thus below only describe in detail at the control flow of spam, then repeat no more about the emulation of inspection-free mail.
Wherein, the example that is controlled to be with spam, when whether this Email of checking meets mail policy 10, its detailed steps as shown in Figure 3, when proxy server was received Email, the first mail policy was carried out true and false checking to the mail transmission data of Email, to judge whether it meets this first mail policy, if meet and then carry out step S12, promptly allow this Email to send out, then do not carry out step S14 if meet.
In step S14, whether the conduct that the proxy server continuation is reviewed Email with the second mail policy meets this second mail policy to judge it, then allows this Email to send out if meet, and promptly carries out step S12; If do not meet, then carry out step S16, continue the conduct that next mail policy is reviewed this Email, to the last a mail policy uses until exhausted; When using last mail policy, shown in step S18, when verifying this Email with last mail policy, if this Email meets this mail policy, then carry out step S12,, can confirm that then this Email is not really for being allowed to conveyer if this Email does not still meet the rule of this mail policy, then go on foot S20 this moment, and proxy server takes suitable action that this Email is not transmitted.
Wherein, when not transmitting Email, the processing mode of this moment can be rejected Email and return an error code and error messages, or directly deletes this Email, and this processing mode that does not transmit Email also can promptly be specified when default mail policy.
In addition, in the flow process of Fig. 3, when wherein a mail policy was verified the mail transmission data of Email in utilization, its detailed step can be consulted shown in Figure 2, is described as follows now:
(a) at first, the mail transmission data of Email is carried out true and false checking, whether meet this first rule,, then carry out step (c) if not if then carry out step (b) to judge it with first rule;
(b) continue the mail transmission data of this Email is carried out true and false checking with second rule, to judge whether it meets this second rule, then carry out step (c) if not, if then continue the conduct that next rule is reviewed this Email, to the last a rule uses until exhausted, and the checking result according to employed last rule determines whether this Email meets this mail policy, then allows this Email to send out if meet, and does not then carry out step (c) if meet; And
(c) continue the conduct that the rule in next mail policy is reviewed this Email, to judge whether it meets this mail policy, if meet, then allow this E-mail conveyance to go out, if do not meet, then next mail policy conduct of continuing to review this Email, to the last a mail policy uses until exhausted.
Therefore, the present invention controls by the comprehensive important information of grasping Email, as long as correct mail behavior and the processing mode thereof set just can effectively reach the purpose of controlling Email.
Since spam with anonymous, forge, distribute indiscriminately or illegally (transition information or hide Info etc.) wait conduct transmission Email, being different from advertisement matter can review the source place and have the right to cancel subscriptions through official channel, if the person that can confirm to post the part painstakingly with anonymous, forge, distribute indiscriminately or illegally conduct such as (transition information or hide Info) transmit Email, can identification its be the possible spam person of distributing indiscriminately.
Whether above-mentioned mail policy can be spam in order to judge this Email, and basis for estimation is for to judge whether this Email has abnormal behaviour, that this abnormal behaviour is generally is anonymous, forge, distribute indiscriminately or behavior such as illegal, if after the empirical tests, find that this Email has abnormal behaviour, then decidable its be spam.For instance, to have heading message not clear in anonymous behavior; The person's main frame of posting the part is different with answer mailbox main frame; Or answer mailbox main frame is behaviors such as network service provider (ISP) main frame.Its source place main frame of forgery behavior is an external network domain, and the person address is forged into internal host but post the part; Or the behaviors such as domain name server (DNS) is incorrect in net territory.Distribute indiscriminately behavior its to send mode unusual and change is frequent.The return address of illegal act is lease main frame person.
Wherein, parsing about anonymous behavior, method of the present invention is except can differentiating the above-mentioned anonymous behavior of enumerating, also can differentiate machine, hacker or the artificial Email that sends, for example differentiate the Email that postmaster (Postmaster), mail core (mailerdemon) or mail tabulation server (Listserver) etc. are sent.
The present invention resolves the method for mail behavior control Email and implements in proxy server usually, normal user is Mail Transfer Agent device (MTA), in Mail Transfer Agent device (MTA) execution phase, utilize default spam behavior emulation, via grasping " mail envelope " and information such as " mail header ", and the true-false value of recalling parsing mail transmission data, being able to correct verification goes out the behavior and whether meets " spam behavior ", wherein, Mail Transfer Agent device (MTA) can be a router.
So far, the spirit that the present invention resolves the method for mail behavior control Email has illustrated and has finished, following spy verifies explanation method of the present invention in detail with three concrete examples, is familiar with that this operator can obtain enough knowledge with reference to the description of example and enforcement according to this.
Example one: mail turnover control---specific internal user only can transmit Email and give the specific internal user.
Figure A20041009604500121
Eligible ◎ meets zero and does not meet above-mentioned policy person, carries out according to following processing mode.
Processing mode The ◎ rejection, passback error code and error messages zero deletion mail do not return error code and error messages zero and directly transmit
Example two: spam is anti-blocking---and anonymous behavior illustrates, and person's main frame is different with answer mailbox main frame to post the part.
Figure A20041009604500131
Example three: spam is anti-blocking---and the forgery behavior illustrates, and the source place main frame is an external network domain, and the person address is forged into internal host to post the part
Figure A20041009604500141
Therefore, the present invention utilizes the mail characteristic and the transmission principle of Email, " the mail envelope " of one Email resolved with the true-false value of mail transmission data such as " mail header ", and through back forecasting repeatedly, whether the behavior that goes out mail with accurate induction and deduction is allowed by the mail policy of presetting, and then reaches turnover of control Email and the anti-blocking effect of spam.So the present invention not only can accurately control mail, effective anti-blocking spam improves network security, and can save network bandwidth, system resource and hard drive space, to reach the effect of promoting mail communication efficient and saving operation costs.
The above embodiment illustrates characteristics of the present invention, its purpose is familiar with this operator and can be understood content of the present invention and implement according to this making, and non-limiting claim of the present invention, so all other do not break away from equivalence modification or the modification that disclosed spirit is finished, and must be included in the claim of the following stated.

Claims (21)

1. resolve the method that Email is controlled in the mail behavior for one kind, it is characterized in that: this method comprises the following steps: to set a different set of mail policy according to the envelope information of mail and heading message; When proxy server (Agent) when receiving Email, the mail policy compares the mail transmission data of this Email one by one, verifies whether the behavior of this Email meets the mail policy, and takes the action that stops/transmit according to the checking result.
2. the method for parsing mail behavior control Email as claimed in claim 1, it is characterized in that: the mail policy is to be used for judging whether Email is that spam is, when proxy server is received Email, the method of verifying this Email comprises the following steps: that the mail policy compares the mail transmission data of this Email one by one, whether the behavior of verifying this Email meets this group mail policy, meet and be spam, and then stop this Email; Do not meet and then transmit this Email.
3. the method for parsing mail behavior control Email as claimed in claim 1, it is characterized in that: this group mail policy is gate inhibition's policy of the inspection-free mail behavior of definition, proxy server verifies that the method for this Email comprises the following steps: that the mail policy compares the mail transmission data of this Email one by one when receiving Email; Whether the behavior of verifying this Email meets this group mail policy, meets that to represent this Email be inspection-free mail, and then transmits this Email; Otherwise stop this Email.
4. the method for parsing mail behavior as claimed in claim 3 control Email is characterized in that: the person of sending of this inspection-free mail comprises the domain name of parent company, subsidiary, Very Important Person, contact manufacturer, subscribing e-paper and fixing IP person.
5. the method for parsing mail behavior control Email as claimed in claim 1, it is characterized in that: in the mail policy step that sets, comprise the checking criterion of setting each mail policy, the checking criterion is selected to meet, do not meet and skip over and does not contrast one of them.
6. the method for parsing mail behavior control Email as claimed in claim 1, it is characterized in that: this mail transmission data includes envelope information and the heading message under this Email.
7. the method for parsing mail behavior control Email as claimed in claim 2 is characterized in that: the method whether the checking Email meets the spam behavior of mail policy specifically comprises the following steps:
(a) when proxy server is received Email, the first mail policy is carried out true and false checking to the mail transmission data of this Email, judges whether it meets the first mail policy, then carries out step (b) if meet, and then carries out step (c) if not;
(b) allow this Email to send out; And
(c) continue the conduct of reviewing this Email with the second mail policy, judge whether it meets this second mail policy, if then carry out step (b), then continue the conduct of reviewing this Email if not by next mail policy, to the last the mail policy uses until exhausted, and when this Email did not still meet last mail policy, then proxy server stopped this Email.
8. the method for parsing mail behavior control Email as claimed in claim 2, it is characterized in that: each mail policy comprises one group of rule, when utilizing one of them mail policy that the mail transmission data of this Email is verified, comprise the following steps:
(a) by first rule mail transmission data of this Email is carried out true and false checking, judge whether it meets first rule,, then carry out step (c) if not if then carry out step (b);
(b) continue the mail transmission data of this Email is carried out true and false checking by second rule, judge whether it meets second rule, then carry out step (c) if not, if then continue the conduct that next rule is reviewed this Email, rule to the last uses until exhausted, and the checking result according to employed last rule determines whether this Email meets this mail policy, if then allow this E-mail conveyance to go out, then carries out step (c) if not; And
(c) continue the conduct that next mail policy is reviewed this Email, judge whether it meets this next mail policy, and repeat above-mentioned (a) and (b) step.
9. the method for parsing mail behavior control Email as claimed in claim 8, it is characterized in that: the checking criterion of each rule of checking Email for meet, do not meet and skip over noncontrastive one of them, and this checking criterion is located in the step of mail policy.
10. the method for parsing mail behavior control Email as claimed in claim 1, it is characterized in that: the mail policy judges whether Email has abnormal behaviour, abnormal behaviour comprises anonymity, forges, distributes indiscriminately and illegal or its combination.
11. the method for parsing mail behavior as claimed in claim 10 control Email is characterized in that: this anonymity behavior comprise be selected from that heading message is failed to understand, the person's main frame of posting the part with reply one of them behavior at least that the different and answer mailbox main frame of mailbox main frame is the group that forms of network service provider (ISP) main frame.
12. the method for parsing mail behavior as claimed in claim 10 control Email is characterized in that: it is external network domain but the person address of posting the part is forged into incorrect one of them behavior of domain name server (DNS) in internal host and net territory that this forgery behavior includes the source place main frame.
13. the method for parsing mail behavior control Email as claimed in claim 10 is characterized in that: this behavior of distributing indiscriminately comprises that the mode of sending is unusual and change is frequent.
14. the method for parsing mail behavior control Email as claimed in claim 10 is characterized in that: this illegal act comprises the behavior of return address for the lease main frame.
15. the method for parsing mail behavior control Email as claimed in claim 1, it is characterized in that: the content of mail and add file are as the setting content of mail policy.
16. the method for parsing mail behavior control Email as claimed in claim 1, it is characterized in that: this proxy server is Mail Transfer Agent device (MTA).
17. the method for parsing mail behavior control Email as claimed in claim 16, it is characterized in that: this Mail Transfer Agent device (MTA) is a router.
18. the method for parsing mail behavior as claimed in claim 1 control Email is characterized in that: the group that this envelope information is selected from post part person's account number, receiver account number, receiver host address, the person's host address of posting the part, return address, domain name server (DNS) and ELECTRONIC POSTMARK are formed at least one of them.
19. the method for parsing mail behavior as claimed in claim 18 control Email is characterized in that: the supplier of this ELECTRONIC POSTMARK be selected from group that transmitting end server, local side server and networking network ISP (ISP) server form at least one of them.
20. the method for parsing mail behavior control Email as claimed in claim 1 is characterized in that: the processing mode that stops this Email is selected from this Email of rejection, deletes one of them mode of this Email.
The method of 21 parsing mail behavior control Emails as claimed in claim 20 is characterized in that: when this Email of rejection, return an error code and error messages simultaneously.
CNA200410096045XA 2004-11-26 2004-11-26 Method for analyzing and controlling e-mails Pending CN1780266A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200410096045XA CN1780266A (en) 2004-11-26 2004-11-26 Method for analyzing and controlling e-mails

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200410096045XA CN1780266A (en) 2004-11-26 2004-11-26 Method for analyzing and controlling e-mails

Publications (1)

Publication Number Publication Date
CN1780266A true CN1780266A (en) 2006-05-31

Family

ID=36770381

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200410096045XA Pending CN1780266A (en) 2004-11-26 2004-11-26 Method for analyzing and controlling e-mails

Country Status (1)

Country Link
CN (1) CN1780266A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102804213A (en) * 2009-06-26 2012-11-28 微软公司 Real-time spam look-up system
CN105306342A (en) * 2015-09-29 2016-02-03 武汉钢铁(集团)公司 Method and system for processing information errors of non-standard mail system
CN113609479A (en) * 2021-08-06 2021-11-05 北京天融信网络安全技术有限公司 File detection method and device, electronic equipment and readable storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102804213A (en) * 2009-06-26 2012-11-28 微软公司 Real-time spam look-up system
CN102804213B (en) * 2009-06-26 2016-05-25 微软技术许可有限责任公司 Real-time spam seeking system
CN105306342A (en) * 2015-09-29 2016-02-03 武汉钢铁(集团)公司 Method and system for processing information errors of non-standard mail system
CN113609479A (en) * 2021-08-06 2021-11-05 北京天融信网络安全技术有限公司 File detection method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US8874662B2 (en) Method and apparatus for controlling unsolicited messages in a messaging network using an authoritative domain name server
EP1484893B1 (en) Origination/destination features and lists for spam prevention
JP4593926B2 (en) Email management service
CN101730903B (en) Multi-dimensional reputation scoring
US8108477B2 (en) Message classification using legitimate contact points
US8285804B2 (en) Declassifying of suspicious messages
CN101030972A (en) Electronic information and data tracking system
US8301703B2 (en) Systems and methods for alerting administrators about suspect communications
CN1819563A (en) System and method for treating electronic messages
US20070050461A1 (en) Zero-minute virus and spam detection
CN101030856A (en) Method for verifying SMS and transmitting reliability classification based on cipher technology mark
JP2005518173A5 (en)
DE202012013734U1 (en) System for filtering spam messages based on user reputation
CN1415099A (en) System and method for blocking harmful information online, and computer readable medium therefor
US20060259551A1 (en) Detection of unsolicited electronic messages
CA2513967A1 (en) Feedback loop for spam prevention
CN101056306A (en) Network device and its access control method
CN1175621C (en) Method of detecting and monitoring malicious user host machine attack
CN108011805A (en) Method, apparatus, intermediate server and the car networking system of message screening
CN1722710A (en) E-mail management system and method
CN101316172B (en) Exception mail detection system and method
CN1696949A (en) Method of anti garbage E-Mails for receiving/transmitting server, and system of anti garbage E-mails
CN1780266A (en) Method for analyzing and controlling e-mails
CN1271816C (en) Network protocol layer user identifying method for packet filter
CN102231874A (en) Short message processing method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1090490

Country of ref document: HK

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20060531

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1090490

Country of ref document: HK