CN1839402A - Electronic message delivery with estimation approaches - Google Patents

Electronic message delivery with estimation approaches Download PDF

Info

Publication number
CN1839402A
CN1839402A CNA2003801088217A CN200380108821A CN1839402A CN 1839402 A CN1839402 A CN 1839402A CN A2003801088217 A CNA2003801088217 A CN A2003801088217A CN 200380108821 A CN200380108821 A CN 200380108821A CN 1839402 A CN1839402 A CN 1839402A
Authority
CN
China
Prior art keywords
message
sender
punishment
value
recipient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2003801088217A
Other languages
Chinese (zh)
Inventor
S·巴尼斯特
P·彼得森
J·穆尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Return Path Inc
Original Assignee
Return Path Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Return Path Inc filed Critical Return Path Inc
Publication of CN1839402A publication Critical patent/CN1839402A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

Message delivery approaches are disclosed through which senders can guarantee that their messages are desired by intended recipients. In one embodiment, a Sender agrees with a Service Operator to pay a fine for each message that is reported as an unwanted by its Recipient. For senders that agree in advance to pay such fines, Service Operators may provide preferential message routing around 'spam' filters knowing that a guarantee is in place. If the Recipient reports that the message is unwanted, the Service Operator can penalize the Sender by a fine in the agreed amount, or by modifying a bond ratio value, rating, or other experience value associated with the Sender. Estimates of the complaints expected for a Sender may be used to determine the outcomes of the tests applied by the Receiver.

Description

Use the electronic message delivery of method of estimation
Invention field
The present invention relates generally to use the electronic message delivery of method of estimation.The invention particularly relates to the method and system that is used to guarantee electronic message delivery.
Background of invention
Can adopt the method for describing in this part, but the method for having imagined or having adopted before needing not to be.Therefore, unless explanation in addition here, the method for describing in this part is not with respect to the prior art of claims among the application and is not considered to prior art because be included in this part.
The use of communication system for electronic messages recently obviously increases.But many users of this system are that sender of the message or recipient find that this system is not easy to use.Similar problem is relevant with phone, fax or E-mail communication etc.
In the Email environment, method by a kind of past, the sender of marketing commercial product or service need obtain or expand email address list, periodically sends a large amount of uncalled email messages (" spam ") subsequently to all addresses in the tabulation.Utilize contemporary electronic systems, the cost that sends millions of part this message is negligible, and even also is considered to be worth less than centesimal responsiveness.Therefore, uncalled message successfully is delivered to the income that just changes into the sender in effective inbox of receptor usually.
Unfortunately, this method can make the recipient receive unwanted message.Direct and the indirect cost that receives " spam " is very high.As response, the recipient has adopted the whole bag of tricks to prevent to receive or watch unwanted message.
In one approach, the recipient uses and filters or interrupter technique, and it is searched key word and the refusal or isolate of message subject in capable and comprises message with the key word of disable word list match.In another approach, the recipient uses " blacklist " to discern and forbids demonstration from the suspicious sender's of unsolicited message message.Some recipient promotes these technology with individual's good friend or other " white list " that can accept the sender; Only allow message from the sender in " white list "." white list " and " blacklist " also can come from the source of networking.Be used for carrying out the technology that " blacklist " search and described at document " ip4r.htm ", the document can onlinely obtain, at "/junkmail/support/ " the catalogue place in " declude.com " territory of WWW and Www.scconsult.com/bill/
For legal sender, a problem is: legitimate messages can not arrive the recipient of expectation, because they are blocked by this filtration or interrupter technique.Filtration and interrupter technique simultaneously, use the recipient of filtration or interrupter technique regularly can not receive legitimate messages, because can not suitably be distinguished legitimate messages and unwanted message.Specific industrial standard term or technology abbreviation may be consistent with forbidden key word, thus puzzlement " spam " filtrator.
In addition, the recipient continues to receive a large amount of unwanted message of correctly not held back by " spam " filtrator.As a result, except under situation about being restricted, many recipients refuse to reveal their address now.As response, developed " selecting to participate in (opt-in) " method such as many legitimate sender of famous enterprise, wherein do not use recipient address, unless the recipient agrees to receive message certainly such as the consumer.Even when so doing, those message from legitimate sender of the recipient who has sent it to " selecting to participate in " also may be deleted or be isolated to filtration or interrupter technique.
As a result, reduced the value of the legal marketing tool that Email communicates by letter as the recipient with " selecting to participate in ".Many recipients' maintenances do not add defence to the daily impact of " spam " in their email INBOXs basically.Though many states have issued that rules impose civil or criminal penalty to sending " spam ", these ways are time-consuming for the recipient.In addition, link up or trade with the entity of those transmissions " spam " though many Internet service provider (" ISP ") are discerned energetically and refused, this inappropriate activity of control influences the great amount of cost of ISP.
ISP also bears and handles and sends it to the message cost related of not having the receptor of account relation with ISP.For these receptors, the mailing system of ISP produces " rebounding " message automatically usually, and the statement receptor is unknown.In fact, " dual rebounding " when message has invalid sender address and is sent to invalid receptor, can appear.Cost with safeguard to produce bounced message and be used to make bounced message to get back to the network branch that to task sender's equipment and software relevant.Therefore, need a kind of system or method can reduce that ISP stands and by the quantity of " rebounding " and " dual rebounding " incident of unwanted message generation.
Therefore, the problem of " spam " is attrition operation substantially in the internet E-mail environment.The legal marketing institutions that sends promotional messages by bulk electronic mail is arranged, and other sender who sends effectively a large amount of message.But usually except " spammer " oneself, nobody can make a profit from the activity of " spammer ".ISP, commercial enterprise and terminal user suffer inconvenience, cost and harassing and wrecking.
In addition, the email message of high value is blocked or puts into " a large amount of (Bulk) " mail folder based on the rule of its appearance regularly, these rules for the terminal user be complicated, at random, change and secret.This makes Email dealer increase cost and makes the sender lose the confidence to the benefit of Email Marketing.In addition, the terminal user needs spended time in monitoring, inspection, transmission and negotiation " white list " and similar mechanism.Even when ISP and enterprise used anti-" spam " technology, a large amount of " spams " be incoming terminal user's inbox still, is perhaps inserted a large amount of mail folder mistakenly.
Though the previous examples problem is present in the Email environment, instant message, chatroom application, internet message plate, phone and facsimile service also stand similar problem.
Based on aforementioned content, obviously need the technology of improvement to guarantee that legitimate messages is received by suitable recipient.
Also need a kind of method, it can punish the sender who does not need message.
Description of drawings
In the accompanying drawings, by example explanation the present invention, it is as restriction, and wherein identical label is represented like and wherein:
Figure 1A is the block diagram that the system outline of electronic information is transmitted in explanation;
Figure 1B is the block diagram of add ons of the system of explanation Figure 1B;
Fig. 2 A is the process flow diagram according to the electronic message delivery process of an embodiment;
Fig. 2 B is a process flow diagram of handling the method for the electronic information that receives;
Fig. 3 is the method flow diagram of the unwanted message of report;
Fig. 4 is the block diagram of message;
Fig. 5 A is the process flow diagram of message method of calibration;
Fig. 5 B is the process flow diagram that the additional step in Fig. 5 A method is shown;
Fig. 5 C is the process flow diagram that produces validation message;
Fig. 6 is the process flow diagram that message is come into force;
Fig. 7 A is the process flow diagram that verification does not need the report of message;
Fig. 7 B is the process flow diagram that the additional step in Fig. 7 A method is shown;
Fig. 8 relates to the bank network of Figure 1A system and the block diagram of relevant element;
Fig. 9 is the block diagram that explanation realizes the computer system of embodiment;
Figure 10 A is to use the process flow diagram of first process that is used for Message Processing of method of estimation; And
Figure 10 B is to use the process flow diagram of second process that is used for Message Processing of method of estimation.
Embodiment
The electronic message delivery method has been described among the application.In the following description, for illustration purpose, many details have been set forth so that thorough of the present invention to be provided.But what those skilled in the art were obvious is, the present invention can implement under the situation of these details not having.In other example, known configurations and device illustrate by the block diagram form, to avoid unnecessarily making the present invention smudgy.
According to following outline embodiment is described:
1.0 overview
2.0 electronic message delivery method
2.1 term
2.2 system architecture and functional profile
2.3 encrypt the mark method
2.4 determine whether to accept message
2.5 handle the report that does not need message
2.6 punishment sender
2.7 method of estimation
3.0 realization mechanism-hardware overview
4.0 expansion and possibility
1.0 overview
Realized the needs determined in the aforementioned background art among the present invention, and obvious other needs and purpose in the following description, it comprises the method that is used to transmit electronic information on the one hand.The present invention comprises computer installation and the computer readable medium that is configured for the transmission electronic information on the other hand.
Generally, method and system described herein provides the sender of the message can guarantee that their message is passed to the receptor of expectation and can not be used the technology of " spam " filtrator blocking-up by current many Internet service providers.In one embodiment, the sender adds and Bonded Sender TMService operations person's (ServiceOperator) contract, wherein the sender does not need or each message of " spam " Email is propped up and paid a fine with meaning to be reported as by the receptor of its expectation.The sender sets up it to be willing to mean the fine amount of each Email payment.The sender can be subjected to the credit inspection or be required giving the third party keeping with fund.Perhaps, but the specific fine amount of sender's acceptance and guarantee, but not actual in advance providing with funds.(BONDED SENDER is present assignee IronPortSystems, the trade mark of Inc.).
Subsequently, the sender is identified as " secured " with this message when sending message.In one embodiment, the encryption mark in the message is secured with this message identifier.Perhaps, secured message sends from the special network address, and this address is provided for service operations person when consulting contract.In such a way, service operations person knows: all message that have the particular source network address in the message header all are secured.
In one embodiment, when receiving secured message, the recipient carries out conventional anti-" spam " and checks and filtration.If it is not " spam " that the recipient determines this message, then the recipient is with the receptor of this transfer of messages to its expectation.If it is " spam " that the recipient determines this message, then the recipient checks to determine whether the sender of the message is secured sender.This inspection is undertaken by send a query to service operations person from the recipient, and wherein this inquiry comprises sender's the network address.Whether service operations person determines in the database that service operations person keeps by the sign sender.If then service operations person sends to the recipient with response, the sender is identified as secured.Randomly, response can comprise the fine amount that the sender agrees in the contract, perhaps other amount.
The recipient determines whether it accepts this message.Accept decision and can whether surpass specified quantitative or threshold value based on fine.Threshold value can be set as policing issue by the recipient, is perhaps preestablished by each independent terminal user account possessor relevant with the recipient.For example, the user profile at the recipient place relevant with user X can stipulate that X will not accept from promising to undertake any potential " spam " of fine less than the sender of every Xiao Xi $2.50; But, can stipulate that to the brief introduction of user Y Y will accept the message of any amount of every message Da Yu $1 of promise.
Randomly, will accept message if the recipient is definite, then recipient's notification service operator.As response, service operations person attempts reserving fine amount or punishment.If reserve successfully, then service operations person sends to the recipient with affirmation.
Use the sum of reserving and follow the tracks of reservation to make service operations person can determine whether the sender may surpass the marginal credit that service operations person sets up, and perhaps whether the sender needs to deposit additional guarantee fund to service operations person.In addition, as strategy, service operations person can refuse to confirm that the reservation fine amount that amounts to exceeds any sender's the guarantee situation of itself and service operations person's marginal credit one assign thresholds.In one embodiment, at the appointed time after, each is reserved automatically at the expiration.
In response to receiving predetermined affirmation, the recipient is with the receptor of transfer of messages to expectation.In one embodiment, the recipient also provides signaling recipient user a message to be identified as the method for " spam " to relevant receptor.For example, graphical user interface displays can have the button that indicates " is not need with message report ".If the recipient receives message is identified as unwanted signal, then recipient's storage is about the information of signal and message.The recipient periodically sends to service operations person with report, and which message report identifies is reported as " spam ".As response, service operations person punishes described sender.
In a particular embodiment, punishment comprises the fine of establishing the upper limit, classification or timing by different way.In another embodiment, message comprises email message, instant message, chatroom mail, Web message board poster, call or page message.In yet another embodiment, can use various based revenue models,, share fine, to the recipient who participates in or sender's charge etc. with non-profit prevention such as sharing fine with the recipient at fine.
2.0 electronic message delivery method
2.1 term
In the text, following term has following example meaning:
" guarantee " be illustrated in the sender distribute one or the many batches of message before be transferred to service operations person's the magnitude of value by the sender.Guarantee can comprise resource, goods, service or the promise of money or any kind.
" enterprise " expression is not mainly to be engaged in the commercial legal person who sends large quantities of message; Its employee is the receptor normally.
" recipient " expression commercial undertaking, hardware unit, software element or above combination, they are accepted message and give the receptor with these message distributions of message.Recipient's example comprises commercial enterprise, Internet service provider (ISP), based on E-mail service of Web etc.
Individual account, computing machine or the terminal user of the message of sender's transmission read, uses or consume in " receptor " expression.The receptor usually is the final user who has account with the recipient.
" sender " expression individuality or commercial undertaking, it sends to a large amount of message reality or expection client, subscriber, member or other receptor regularly.Sender's example comprises retail trade, comprises online commerce and traditional commerce, advertising service agency, email list supplier etc.The sender comprises that also record and management send the individuality of the guarantee sender network address of the stand-alone terminal user of message or system.
" service operations person " expression is as the supplier's of function that defines here and service trusted third party.
" spam " represents unwanted email message, its normally a large amount of uncalled message.
" submission person " expression individuality or commercial undertaking, it reports that to service operations person one or more reception message are unwanted.Submission person can be recipient or receptor.Make or sell one of anti-" spam " filtrator, software or other technology and can be used as submission person, with the quantity of " false positive " that reduce its technology generation.
2.2 system architecture and functional profile
Figure 1A is the block diagram that the system outline of electronic information is transmitted in explanation.Have, operate outbound message gateway 104 or be coupled to the message handling system 106 that system operator has or operates by one or more network services directly or indirectly about sender 102 with it.Recipient 108 is communicatively coupled to message handling system 106.The recipient has, operates inbound messages gateway 110 or related with it.The receptor is communicatively coupled to gateway 110.
Each gateway 104,110 can comprise the universal information gateway, be also referred to as message transport agents (MTA), mail relaying, Email relaying, Email router, Simple Mail Transfer protocol (SMTP) server or E-mail gateway, it is specifically programmed to carry out function described here.
For simplified example is described, Figure 1A shows one of above-mentioned each element.But, in specific embodiments, any amount of sender, recipient, gateway and receptor can be arranged, and expectation use several thousand or millions of this elements.In the high capacity network environment, for the purpose of scalability or load balance, in one or more examples, reproducible message handling system 106.In addition, as an example, in the environment of handling email message, specific embodiment is described here; But in other embodiments, these message comprise call or page message.
In the structure of Figure 1A, generally in one embodiment, sender 102 is to message handling system 106 registrations and acquisition service operations person's account.Randomly, recipient 108 also registers and obtains account.Sender 102 can select to be used to assure the dedicated source network address of message, and selected address is offered message handling system 106.In any moment after this, sender 102 makes its outbound message gateway 104 send one or more message of the punishment amount that comprises that sign provides or promise, and is sent to receptor 112.
Inbound messages gateway 110 places recipient 108 receive message.Gateway 110 determines that message is assured.Gateway 110 apply for information disposal systems 106, and whether definite message comes from a side who is registered as the guarantee sender in message handling system.Message handling system 106 and gateway 110 put on one or more tests that come into force the information of grouping in the message or that derive from message transfer.Test and the tactful result who determines according to gateway 110 applies are delivered to receptor 112, perhaps score value are offered filtrator, perhaps abandon this message, are Bulk with message marking perhaps, perhaps take other action.
Aforementioned is the general statement of the operation of an exemplary embodiment, is in order to make reader adapt to Figure 1A.But, further described many modification and additional example sexual function here.
Figure 1B is the block diagram of the add ons of explanation Figure 1B system.Message handling system 106 is realized as one or more server-class computers system, is comprised Web server 122, database 124 and dns server 126.Web server 122 can comprise such as the http server of Apache http server with such as the combination of the application server of WebLogic application server.Database 124 is provided for storing the storehouse about the information of sender, recipient, receptor, guarantee, message and other metadata, and can comprise relational database server, such as Oracle8i, Microsoft SQL Server etc.Database 124 also can comprise log information, adds or the history of the network address of deletion such as the sender.
Dns server 126 can use internet domain name system (" DNS ") agreement request visit and executable field name to the resolution of Internet Protocol (" IP ") address, and the information about special IP address is provided, etc.For a clearly example is shown, at specific embodiment DNS and IP are described here; But embodiment is not limited to DNS and IP are used for address process, and the present invention can be applicable to any network address mechanism or the agreement of exploitation in the future.
For the embodiment of reality, dns server 126 has high power capacity.For example, but suitable dns server handle about 50,000,000 inquiries for 126 every days.In addition, should provide the DNS transmitter of not carrying out irrational Messages-Waiting time near 100% availability.
Can in one or more java server pages (JSP), Active Server Pages (ASP) or other software element, realize function described herein.For illustrated example, Figure 1B shows JSP and realizes that wherein function is organized into sender's page 120A and management (" Admin ") page 120B.Randomly, recipient's (" Recv ' r ") page 120C provides the recipient function.In this was realized, sender 102 and recipient 108 can utilize the function of conventional web browser application access system 106, such as Microsoft InternetExplorer, and Netscape Communicator etc.Similarly, gateway 110 can be by being directed to the function that system 106 visits system 106 with the HTTP request.
Particularly, sender 102 and sender's page 120A interact so that register to system, and obtain about the guarantee amount, credit exposure, complaint, the size of message of transmission and the fine that causes that receives that provide or promise to undertake.Managerial personnel relevant with service operations person and Admin page 120B interact, to carry out management function, such as user registration with come into force, provide that the representative of the sender information of registration to the sender, user's maintenance, address maintenance, system maintenance, guarantee are confiscated, invoicing, account inspection, solution to disputes, report generation etc.Recipient or receptor and recipient's page 120C interact, so that register to system, report unwanted message, letter of reference usefulness and Guarantee Status etc.
Message handling system 106 also can comprise one or more other software elements, hardware element or manual operation, carries out function described here.
Fig. 2 A is the process flow diagram according to the electronic message delivery process of an embodiment.In the frame 201, one or more senders and service operations person sign a contract.In one embodiment, the sender sends unwanted message and props up and pay a fine with meaning, and is limited by to relate to the duplicity report that do not need message and from the solution to disputes process of the receptor's of actual reception message false report not.
Frame 201 can comprise the participation enrollment process, and wherein the sender offers service operations person with contact details and credit information.In enrollment process, other authorised representative of managerial personnel or sender or recipient can set up the account of cryptoguard, so as to enter, upgrade and watch with they with service operations person's relevant information that interacts.
In one embodiment, as the part of frame 201, the sender provides its one or more IP address of wishing guarantee to service operations person, and specify DNS " A " and " PTR " write down and whether be present in the DNS system of address.
In another embodiment, the clause of contract is specified: service operations person will be provided by the address information that is provided, so that the suitable configurations of the entitlement of verification IP address and DNS record; The sender can use this system so that only send the message that meets one group of standard; And other clause relates to legal liabilities, registration affirmation, expense etc.The online form that contract can be used as " click and accept " realizes.
In yet another embodiment, utilize non-on-line communication method to carry out any or all step in the above-mentioned enrollment process, such as by phone, fax etc.In this embodiment, the sender represents and gets in touch with the relevant managerial personnel of service operations person, and it forms record in obtaining the system of above-mentioned information.For example, can utilize facsimile service to consult and agree the contractual terms and conditions of above outline.
Frame 201 also can comprise service operations person, and its carries out coming into force of out of Memory that network address and sender provide.For example, contrary (PTR) dns lookup is carried out in each IP address that service operations person's managerial personnel provide the sender, and writes down the information in each territory of returning about the DNS system.Service operations person carries out " whois " and searches, with the domain name entitlement coupling sender of calibration tails.Can carry out other test the verification sender be not " spam person " or verification sender isolate its a large amount of mail tabulations with guarantee only non-" spam " message be directed into the guarantee address.
In the frame 202, in one embodiment, sender and server pledge.Pledge can form a part of signing a contract in the frame 201.In certain embodiments, service operations person carries out the credit inspection to the sender and does not need guarantee.Perhaps, lacking the sender of suitable credit or payment history need be to service operations person's deposit funds.Stored fund can place discretionary account, trust account or similar account, and only service operations person just can be from wherein extracting fund when determining to have sent unwanted message.
In the frame 204, the sender indicates specific communications to be assured and is condition with the fine.This indication can provide by several modes.In the first method of being represented by frame 204A, sender's announcement is elected as a particular network address of its " guarantee sender " address by the sender.In one embodiment, it is used for using Internet Protocol (" IP ") address to come the network in identification message source, and the sender registers special guarantee sender source IP address to service operations person, only sends guarantee message subsequently from this address.Perhaps, in frame 204B, method accesses to your password.The method in notice message source will further describe in other parts.
Among the frame 205A, how many fine amounts of notice payment if sender's indication particular message or communication are unwanted.In one approach, before sending message, the sender registers the fine amount of suggestion to service operations person.Perhaps, can use the cryptographic methods of specifying fine.Or the sender sends promise to service operations person, and promptly the sender will be the specific fine amount of uncalled message payment; Need be before not sending message the actual transfer fund.In one embodiment, measure based on complaint rate or other fixing or variable fine value are provided.For example, the sender can be and surpasses each complaint payment $20 of one of per 1,000,000.Can use any other suitable complaint rate or fine value.In one embodiment, all fine can be constant single special amounts, such as each unwanted Xiao Xi $1.The fine that also can use minimum fine, maximum fine or change at particular message or receptor.Among the frame 205B, the sender sends message.Frame 205B can comprise makes information gateway that one or more message are assigned into network.
Fig. 2 B is a process flow diagram of handling the method for the electronic information that receives.At first reference block 206, can be that the recipient of personal terminal user, ISP, commercial enterprise or any other people or mechanism receives message from the sender.
In a particular embodiment, before receiving message, recipient and receptor register to service operations person, so that obtain the right of use service operations person's service.For example, recipient and receptor register as the part of the frame 201 of Fig. 2 A.The employed information about anti-" spam " technology of contact details, domain name and e-mail address information, gateway information, recipient etc. that provides can be provided in recipient or receptor's registration.In response to recipient's successful registration, service operations person can with the guarantee sender DNS information offer recipient or receptor, make their h.323-configured gateways so as with system's mutual operation.
Frame 206 can comprise that utilizing commercial anti-" spam " filtration or interrupter technique to carry out routine anti-" spam " checks.In such an embodiment, only when message was identified as " spam ", the recipient proceeded the remaining step of Fig. 2 B.If message checks that by " spam " then it is sent to the receptor.In optional embodiment, the remaining step of execution graph 2B, and no matter the result of anti-" spam " filtering technique.
In the frame 207, the recipient checks the Guarantee Status of communication.This can comprise several tests.
For example, in the frame 208, at the database of the guarantee sender address of announcing, the source address of the message that recipient's verification receives.For example, the recipient sends inquiry by the agreement of deciding through consultation to service operations person, and the source address of the message that the recipient receives is provided.In a specially for carrying out example, in the example as Figure 1A and Figure 1B, frame 208 comprises gateway 110, and it sends the dns lookup request to the dns server 126 that comprises the source address that receives message.If dns server 126 places its database with source address, then return the first special response.If source address not in the DNS database, is then returned the second special response.In one embodiment, first response is that " 127.0.0.2 " and second response are " 127.0.0.3 ".
Service operations person forms response message, and whether its identification source address is the guarantee sender address of registration, and this response message is sent to the recipient, shown in frame 212.
Aforementioned test also can be included as the fine amount that message determines that the sender advises.In addition, the recipient can take more or less test, perhaps different tests, and this depends on guarantee or fine amount that the sender provides particular message or promises to undertake.
Whether discern the guarantee sender of registration according to source address, the recipient can take response activities.For example, in the frame 218, if source address is not the guarantee sender of registration, as testing in the frame 214, the recipient can select with blocking message, perhaps it is delivered to the bulk electronic mail file, perhaps carries out any other message screening step.
If source address is verified as the guarantee sender address of registration, then the recipient can keep the fine amount by by the agreement of deciding through consultation message being sent to service operations person, shown in frame 215.In response, the term of validity that keeps determined in the record that service operations person's formation expense in its database keeps, and send response message to the recipient.
In one embodiment, keep fine and can comprise that the recipient agrees to be delivered to receptor's inbox, and need not any special mark or processing, need not be Bulk promptly with message marking, message stores is medium in the Bulk file.In this embodiment, service operations person and recipient sign a contract, and provide and implement this clause.Perhaps, can there be under the situation of contract sincerity relation implement this rule based on each side.
In addition, In yet another embodiment, expense keep can comprise service operations person be intended to retention period full before the receptor be to pay a part in any expense to the recipient under the unwanted situation with message report.Every reservation is all relevant with the term of validity, keeps expiration after this term of validity.Whenever the term of validity can come across sends after the reservation.In one embodiment, keep one to four day that normally sends after the reservation.
Using to keep makes service operations person can estimate and measure its scope with respect to each sender's current credit risk.For example, send the chance that more reservation means the more rubbish reports of formation.In addition, based on the reservation amount, service operations person can require the sender to deposit additional capital, and perhaps can carry out additional credit inspection is acceptable with its exposure to the receptor of verification.
After this, the recipient can select to be delivered to receptor's inbox, shown in frame 216.
In optional embodiment, the gateway relevant with the recipient can pass to message from a plurality of and go out the station address of selecting the station address that goes out.In this embodiment, as the part of frame 201, specific sender can be registered the departures guarantee sender address of a plurality of mandates.Each this address can have unique title.How one or more routing rules are determined based on sender's address selection outbound message address.When service operations person determined that the guarantee sender has sent particular message, the service supplier used these rules, perhaps injects strobe utility, so that the source address of appointment in the message is mapped to one of a plurality of registrations address.The station address that goes out that service operations person will be shone upon offers gateway, and it is delivered to this address.
In optional embodiment, by the recipient with serve agreement in advance between the operator, the recipient needs all message with guarantee sender address of registration is delivered to message receptor's inbox.
In another optional embodiment, when the message that will have a guarantee sender address of registration as the recipient passed to message receptor's inbox, the recipient was the guarantee sender who is derived from registration with this message marking.For example, show that the graphic user interface of account holder's message inbox can show distinguished chart, be derived from the guarantee sender's of registration message with identification.Perhaps, the recipient's theme line that can change message is derived from the guarantee sender of registration to represent it.
In another optional embodiment, the special action that the recipient takes can provide or the guarantee amount of promising to undertake changes according to the sender.
According to an embodiment; the delivery of mail method here provides a kind of system and process; adopt this system and process, do not need the recipient of Email to point out to service operations person: Email is unwanted, and impliedly request is carried out guarantee or sent fine.In another embodiment, this complaint can be gathered from the recipient by third-party server or system.The complaint gatherer can send complaint to service operations person or carry out the executable above-mentioned any response activities of service supplier (as service operations person's procurator).Can be used as the third-party example of appealing gatherer and be SpamCop.net, the SPAMCOP that Inc. provides at territory spamcop.net place TMService.
In an optional embodiment, provide sector transfer (zone transfer) function.Use the sector transfer function, the mandate individuality of being correlated with the recipient can be in single operation the notification service operator: a plurality of servers or the miscellaneous equipment of being correlated with the recipient have moved on to different address realms.
Service operations person's managerial personnel also can generate the report to sender and recipient.For example, the inquiry quantity that report can specify receiver to send, the physical quantities of the inquiry of execution inquiry IP address, etc.
Fig. 3 is a process flow diagram of reporting the process that does not need message.In the frame 302, the recipient determines that it is unwanted receiving message.The recipient can not need the message that received at several reasons.For example, unwanted message is " spam " message, perhaps this message is owing to following reason causes: the sender can not ask " the removing to subscribe to (unsubscribe) " from mail tabulation, the sender does not abide by the principle of direct marketing association, and the sender can not provide " going to subscribe to " link in the website etc.Determine message be unwanted also can comprise generating rebound or the dual message report that rebounds.
In the frame 304, the recipient reports to service operations person: message is unwanted.Frame 304 can comprise any the use in several report mechanisms.For example, but receptor of enterprise or ISP can be used for watching the graphic user interface of email INBOX that graphic button is provided, can click the sign clickable hyperlinks, be used to report other selectable user interface widget that does not need message.This widget is labeled for, for example, and " being reported as ' spam ' " to the guarantee tissue.Perhaps, the recipient can provide a special address, so that the receptor transmits unwanted message, rebounds or the report of dual bounced message, sends to the message of the account of not selective reception commercial E-mail, etc.The recipient can accumulate or gather this report and will report by criticizing and submit to service operations person.
Among the embodiment, message is the information that unwanted report comprises source address value, sender's sign, receptor's sign and identification fine side of requirement or report side.Source address value, sender's sign and receptor's sign can be obtained from message by report side.The information of identification fine requirements side can comprise that the recipient is as a part of registering to service operations person and from recipient's identifier of service operations person's acquisition.
The use of this system cause really the terminal user falsely report message be unwanted with the risk of intentional generation at sender's credits.In order to detect or to stop this unreal report, in one embodiment, provide checking procedure, pointed as frame 306.For example, frame 306 can comprise to the user and show dialog box that " you point out that message is unwanted in its expression.Carry out verification below please clicking." or, this message can be provided in to be dealt into the recipient and the email message that automatically generates in response to the report that does not need message in.
In one embodiment, frame 306 comprises that 102 pairs of information gateways are reported as unwanted each message and carry out the one or many statistical test.It is signature text in the unwanted message that these statistical tests manage to discern expression message.Perhaps, the user can be classified into one of a plurality of level of trust.Can determine to use any test in fact do not need to determine whether message with user-dependent level of trust.In the encryption method that here further describes, use to encrypt mark the approval of message is provided, and prevent that malicious parties from advocating to enjoy fine to a message that never sends is qualified falsely.
Perhaps, other safety method can be used for promoting approval.For example, the SMTP authentication message can be used for the sender of verification message, includes the header of TXT white list record data, etc.
In the frame 308, service operations person determines whether to apply fine.In one embodiment, determine whether to apply fine and comprise and determine to have received the report that does not need message, and the sender who does not need message is with can not to meet one or more situations of assuring sender's principle relevant.For example, the sender may send nix before, generates the nix of bounced message, and perhaps its user provides subscribing mechanism earlier.In another embodiment, determine whether to apply fine and comprise whether definite sender has surpassed the complaint rate of the permission of all recipients or particular recipient.For example, the complaint rate of permission can be in each 1,000,000 message of sending of sender a complaint to be arranged, and two or many complaints just will be above the complaint rates of this permission.
If the test of frame 308 is sure, then in frame 310, service operations person punishes the sender.Frame 308 can comprise with any method punishment sender who describes in the part 2.6, comprising all complaints of surpassing complaint rate are charged to sender's debit with fixed amount, and perhaps according to the size of message variable that debts, etc.
The sender can select to use guarantee message to send to all message or to the message of selecting according to internal standard, scale economics etc.If the sender selects not send guarantee message, then this message can be subjected to problems outlined in the background parts.Enterprise can assure that the departures enterprise message neglected the possibility of blocking-up to reduce legitimate messages.
Therefore, the embodiment here provides a kind of means to the sender, financially to assure selected Email, be passed to receptor's inbox to guarantee it, and can or be stored in the Bulk file by anti-" spam " filtrator or similar techniques blocking-up.The message that embodiment also makes the Email recipient can guarantee that the receptor expects can be as instead " spam " filtrator or similar techniques are carried out the result of " false positive " and be blocked or be stored in the Bulk file.Embodiment also provides a kind of mechanism to the recipient, applies finance punishment to guarantee pledge and to send the sender who does not need message subsequently.
2.3 be used for the encryption mark method in notice message source
In the represented a kind of method of the frame 204A of Fig. 2 A, sender's announcement sends one or more network addresss of guarantee message from it.In this environment, " announcement " can be included in registration guarantee sender source in the database that service operations person safeguards.Perhaps, as in frame 204B, each sender comprises the special message header that message is identified as guarantee message in each guarantee message.
Fig. 4 is to use the block diagram of the electronic information of encrypting messages header method.Message 400 generally comprises message header 402 and source body 418.Can indicate message header 402 especially.For example, the sender can comprise in the message header that is indicated as being " X-BSP " header.For simplified example is described, message 400 is illustrated as only has message header 402 and source body 418.But in practical embodiments, message can comprise any amount of other header that is used for suitable purposes, such as SMTP header, MIME header etc.
In the embodiment of Fig. 4, message header 402 comprises sender's identifier (ID) value 404 and encrypts mark 406.Sender ID value is the sender of identification message 400 from all senders uniquely.Sender's id field 408, mark ID410, time expiration value 412 and the guarantee amount 414 that provides are provided the plaintext pattern of encrypting mark 406.
Mark 406 also comprises receptor's address value 416.
The value of sender's id field 408 is identical with sender ID value 404, and is provided for approving purposes.Mark ID value 410 is discerned current mark from issued institute with same sender ID value and identical time expiration value underlined uniquely.Time expiration value 412 is specified maximum time, during this period the recipient relevant information can be reported as unwanted, thereby attempt the sender that punishment sends does not need message.
The guarantee amount 414 that provides is sender's being identified as under the unwanted situation of receptor as the value amount to sender's punishment in message of providing or promise to undertake.
In one embodiment, encrypt mark 406 with the public key cryptography principle.For example, use and the related encrypted private key mark 406 of corresponding PKI of registering to service operations person.
The recipient who presses the email message of Fig. 4 form obtains sender ID and mark from message header.Subsequently, the recipient is according to one of SOME METHODS verification message.
Fig. 5 A is the process flow diagram of message method of calibration, and Fig. 5 B is the process flow diagram that the additional step in Fig. 5 A method is shown.In the frame 502, the recipient forms and to contain the verification message of sender ID and mark, and this message is submitted to service operations person is used for verification.In the frame 504, decipher this mark.Among the frame 506-516 that below further describes, service operations person carries out a series of tests to the value that the mark from deciphering obtains, and result indicator is placed the response message that comes into force that finally sends back to the sender.
With reference now to frame 506,, whether service operations person tests sender ID effective.For example, frame 506 comprises whether test mates the sender ID that the recipient provides from the sender ID value 408 of the mark acquisition of deciphering its validation message.If so, then in frame 508, service operations person places response message with come into force mark or similar value of sure sender ID.If coupling not then in frame 509, will negate that the sender ID mark that comes into force places response message.Perhaps, can carry out different marks or signaling manipulation, so that the verification that service operations person provides mark to be created by the sender really.
In the frame 510, service operations person determines whether it had handled identical mark before.For example, frame 510 can be included in table that service operations person safeguards or the map and search mark ID value 410.The mark identifier of handling before table or the map storage is associated with the sender ID value and the time expiration value of response.If do not find the mark ID value of coupling, then the test of frame 510 has negative decision.If find the mark ID of coupling, then the test of frame 510 has positive result.
If negative decision in the frame 512, will negate that replay verification mark places the response message that comes into force then.If positive result, then in frame 511, the verification mark of will replaying certainly places the response message that comes into force.Perhaps, can use other to send frame 510 results' method.Therefore, validation message provides verification: service operations person does not understand this mark ID at that time-at that time from any (then-current) at that time-at that time sender preceding mark with identical time expiration value.
With reference now to Fig. 5 B,, in the frame 514, test, determine whether the sender of the message has enough credit or deposit funds, wherein service operations person fulfils or enough pays all its balances of indebtedness.For example, require the sender to have enough credit or deposit funds, whole values of the institute's secured amount 414 that provides that all message of sending with enough Zhi Fuyu senders 400 are relevant, wherein the time expiration value 412 of this message is not out of date, comprises at that time-message at that time.The test of frame 514 can be simplified by the tables of data that service operations person safeguards by inquiry, its follow the tracks of each sender at that time whole-may punish responsibility at that time.
If the sender has enough credit or deposit funds, then in the frame 516, sure credit verification mark is set in response message.If the sender does not have enough credit, in the frame 515, will negate that credit verification mark places response message then.
In the frame 518, the response message that comes into force is finished by service operations person.Guarantee amount 414 and the receptor address 416 that time expiration value 412 is set, provides for example can be provided frame 518, and this all is that compromising emanations 406 from the response message that comes into force obtains.
In the frame 520, the response message that will come into force sends back to the initial message recipient.Below further describe the subsequent treatment that the recipient carries out.
Fig. 5 B is the process flow diagram of the optional method of validation message.The treatment step that the recipient of the message of Fig. 5 B presentation graphs 4 forms carries out.This recipient can be ISP, enterprise, individual terminal user etc.
Fig. 5 C is the process flow diagram that generates validation message.In the frame 530, the recipient extracts sender ID value 404 from the message header 402 of message 400.The recipient submits to service operations person with sender ID value 404, and request provides sender's PKI.In response, for example, as searching key or index, service operations person searches the PKI of sender in table, map or the database that service operations person safeguards with sender ID value 404.
In the frame 532, the recipient receives the PKI from the sender in service operations person's the response message.Utilize this PKI, the mark 406 in recipient's cocoa decrypt header 402 is shown in frame 534.
In the frame 536, whether the recipient tests sender ID effective.For example, frame 536 comprises whether test mates the sender ID that the recipient provides from the sender ID value 408 of the mark acquisition of deciphering its validation message.If like this, then in the frame 538, the recipient writes down expression established data certainly.If do not mate, then in the frame 539, it negates to determine that the recipient writes down.If the recipient has way to remember whether its check mark is formed by the sender really, then do not need special data or recording mechanism.
In the frame 540, the recipient is provided from the mark of deciphering by time expiration value, the guarantee amount that provides and receptor address.In the frame 542, by the mark of deciphering, the recipient forms the request message that comes into force, and it comprises sender ID value, mark ID value and time expiration value.In the frame 544, recipient's request message that will come into force sends to service operations person.
In response, whether service operations person determines whether to handle before it identical mark and sender has enough credit or deposit funds with its possible at that time-at that time punishment responsibility of enough payments, comprises at that time-any responsibility under the message at that time.The step of the frame 510-520 that can comprise service operations person's execution graph 5A is handled in this response.
In the frame 546, message recipient receives the response message that comes into force from service operations person.The response message that comes into force comprises data, whether its expression service operations person understands this mark ID at that time-at that time from any sender at that time-at that time preceding mark with identical time expiration value, and whether the sender of the message have enough credit or deposit funds, and wherein service operations person fulfils or enough pay all its balances of indebtedness.
After the method for the method of implementing Fig. 5 A or Fig. 5 B, the recipient can resolve the response message that comes into force, and based on the value that wherein comprises, the recipient can determine whether to forward this information to the receptor of its appointment, its message stores in a large amount of mail folder, is abandoned this message, etc.By strategy, different recipients can form different responses at the various values in the response message that comes into force.
2.4 determine whether to accept message
Fig. 6 is the whether process flow diagram of acceptable example procedure of the message that determine to receive.Fig. 6 has represented to carry out the instance processes step that message recipient carries out after a kind of method of Fig. 5 A or Fig. 5 B.Different recipients can select to be less than institute shown in Figure 6 in steps, perhaps can select to carry out diverse process.In addition, can be by the step of any order execution graph 6.
In the frame 602, the recipient determines whether the time expiration of the message that receives has specified scope.For example, the recipient can require at that time-and the time expiration value 412 of message was N days at least in the future at that time, thus can there be the enough time to allow the estimation of message, and may be unwanted with message report by the terminal user or the receptor of message.The N value can be individual terminal user, ISP, corporate mail server or other device or individual and extensively change according to the recipient.For example, the scope of N can from 1 to 120.
If the time expiration value is not in specified scope, then frame 612 is transferred in control, wherein refuses this message.In this environment, " refusal " message can comprise message stores in a large amount of message folder in the frame 612, blocks this message, deletes this message, will send to the sender from dynamic response, etc.Do not need special reject mechanism and can select different disposal mechanism at different senders, receptor or other situation as each recipient of policing issue.
Frame 604, the recipient determine that the sender provides or the guarantee amount of promising to undertake whether greater than special amount.For example, the guarantee amount 414 that the recipient can require to provide is D at least, and wherein D is a designated value.The D value can be individual terminal user, ISP, corporate mail server or other device or individual and change widely according to the recipient.For example, the scope of D can be from $1 to $100, perhaps the equivalent of other currency.If the guarantee amount that provides or promise to undertake is not in specified scope, then frame 612 is transferred in control, wherein refuses this message.
In the frame 606, the recipient determines whether the receptor address mates the destination-address of message.For example, the recipient compares in receptor's address value 416 and the message header 402 or destination network address that other places are found in other header (such as the IP packet header).If there is no coupling is then controlled and is transferred to frame 612, wherein refuses this message.
In the frame 608, the recipient determines whether the response message that comes into force (as the part of the method for participating in Fig. 5 A or Fig. 5 B) that it receives comprises any indication that comes into force and fail.For example, the recipient checks the various mark value in the response message that comes into force and determines Fig. 5 A, the special test of the 5B failure that whether comes into force.If like this, then frame 612 is transferred in control, wherein refuses this message.
If all successes of all tests of frame 602,604,606,608, then control forwards frame 610 to, and wherein the recipient handles message as " can accept guarantee ".As the part of this processing, the recipient can accept this message, and message is placed the inbox relevant with the receptor, perhaps carries out other action.
2.5 handle the report that does not need message
Fig. 7 A is the process flow diagram that verification does not need message report; And Fig. 7 B is the process flow diagram that the additional step in Fig. 7 A method is shown.This report also can be called " complaint ".At first, general with reference to figure 7A, be unwanted if the receptor determines this message, then the receptor is delivered to this message mark service operations person and asks the sender to confiscate guarantee.For example, after recipient's reception of execution graph 6 processes forwarded its message to, the receptor can carry out this definite.Service operations person checks this mark and other value, should ask with verification, determines whether to confiscate guarantee subsequently.
With reference now to frame 702,, receiving expression message is the report that does not need message.In one embodiment, this report comprises the message from the receptor to service operations person, and this message comprises sender ID value 404, encryption mark 406 and confiscates the request of guarantee.Report or complaint also comprise in the complaint message or the network address of the receptor in the packet header of pass-along message.For example, conventional IP packet header transmission grouping sender's address.In response, service operations person's compromising emanations is shown in frame 704.Then, service operations person in the mark and the value relevant with submission person carry out a series of tests.
In the frame 706, service operations person determines mark whether created by original message sender by reality.For example, service operations person will compare with sender ID value 404 from the sender ID value 408 of deciphering mark.If have coupling, know that then the sender of identification has created the encryption mark.Selection is used to encrypt the encryption method of mark 406, thereby the malice sender can not create false mark, perhaps compromising emanations and understanding sender ID value 408 wherein.
If the test of frame 706 negates, then control forwards frame 718 (Fig. 7 B) to, and wherein service operations person sends to error message the submission person of the request of confiscating.In this environment, send error message and can comprise that sending advisory message arrives submission person, indication non-confiscation guarantee.It also can comprise and alert message is sent to the sender of message and these action of record in daily record or other database.
In the frame 708, service operations person determines whether mark is not yet due.Frame 708 can comprise to be checked time expiration value 412 and itself and major clock or time value is compared.Time value can represent that perhaps service operations person randomly carries out one or more time zones conversion operations by the Greenwich Mean Time.If crossed time expiration value 412, then control forwards frame 718 to.
Otherwise in the frame 710, service operations person determines that whether the submission person of the request of confiscating is effective owner of the message address that will send.For example, service operations person checks the receptor's address value 416 in the message mark 406 of deciphering, and whether definite submission person has this address.Based on the header of address value in the complaint message or complaint message, by receptor's address value 416 and receptor's known network address are compared, service operations person can determine good title.In this environment, determine that entitlement comprises whether a definite side is effective agency of address.Therefore, really send a message to the complainant by the sender who requires the complainant to prove in essence to identify in the complaint, the use of receptor's address designator prevents the deception complaint of malicious user unsolicited message in the mark 406 of message 400.For example, malicious user can prepare to generate automatically a large amount of identical complaints.But, if determining receptor's address value 416 and receptor's actual address, the test of frame 710 do not match, will suspect the deception complaint, and control forwards the part A of Fig. 7 B, its error process to.
In the frame 712, service operations person determines whether the guarantee amount of message is not forfeit at that time-at that time.For example, by searching mark based on its time expiration value and mark ID value confiscating in the guarantee database of service operations person's maintenance, frame 712 comprises determines whether mark 706 represented guarantees at that time-at that time are forfeit.If be forfeit before the guarantee relevant with mark, then control forwards frame 718 (Fig. 7 B) to.
With reference now to Fig. 7 B,,, then in the frame 714, punishes the sender if all tests of frame 706,708,710,712 all are sure.Can use any method in the part 2.6.In the frame 716, service operations person uses and punishes its database of relevant information updating.
Test shown in Figure 7 can be undertaken by any order.In addition, as strategy, service operations person can select to carry out other test.
In addition, the process that can replenish Fig. 7 with the solution to disputes process, this solution to disputes process relate to suspicion deception report that does not need message or the report of being sent by suspicion deception receptor.
2.6 punishment sender
Service operations person can punish to send and is designated as secured but based on the sender of the message of any formation " spam " in the several method.Fig. 8 is the block diagram of bank network and the relevant element that is used for ad hoc approach and is correlated with the system of Figure 1A.For accordance with any particular embodiment, the element of Fig. 8 is unwanted.
Message handling system 106 directly or indirectly with bank network 802 communicative couplings.One or more holding structures such as sender's holding structure 804A, service operations person's holding structure 804B and other holding structure 804C, link to each other with network 802.Each holding structure 804A, 804B, 804C comprise bank, savings or other mechanism, and its reception and preserve private fund in destiny account is such as the securities dealer etc.Sender's holding structure 804A preserves the account that the sender has; Service operations person's holding structure 804B preserves the account that service operations person has; And other holding structure 804C preserves recipient, receptor, perhaps one or more accounts of third party beneficiary 806.
In one embodiment, the punishment sender comprises all or the part guarantee that makes that the sender confiscates that the sender provides to service operations person.If the sender tenders guarantee to service operations person, then confiscate and to comprise and carry out electronic funds transfer.For example, service operations person makes the sender that the magnitude of value that equates with the guarantee amount that provides of sender in the message mark is provided.This can comprise that account transfer fund from (service supplier have and comprise fund that the sender deposits) service operations person's holding structure 804B is to account or the designated parties of other holding structure 804B.
If the sender does not tender guarantee, then punish the sender and can comprise that service operations person sends invoice to the sender.In response, the sender can send check or the draft that extracts to the account of sender's holding structure 804A to service operations person.After this, or the while, service operations person can be with the transfer of funds to recipient, receptor or beneficiary.
In a particular embodiment, the punishment amount that applies to special sender for a plurality of identical " spam " message is bound in the maximum penalties of appointment.For example, service operations person can punish the maximal value of Fa Songzhe $10000, and perhaps some other specified amount is even sent millions of identical " spam " message and only received " spam " report from the receptor.Perhaps, classification is measured in punishment,, perhaps carry out classification based on the quantity of " spam " message that sends so that in " spam " when report that receives specific quantity, the punishment amount increases.
The punishment sender also can comprise determining how to divide a side or in many ways fine and artificially or adopt electronic funds transfer or similar mechanism that the fine branch is tasked these sides.For example, expression can (for example be transferred to service operations person, network management personnel, recipient, receptor, recipient (as the credit of the interests of the account that the receptor is preserved the recipient) from sender or the account that is associated with the sender at fund, monetary value or other element of value of sender's punishment, terminal user with ISP account contact), such as the third party beneficiary of charity organization etc.
2.7 method of estimation
In a particular embodiment, fine amount that keeps in guarantee amount that is provided with in the frame 202 of Fig. 2 A or the frame 215 of Fig. 2 B or frame 310 places of Fig. 3 are applied to sender's punishment amount and can utilize method of estimation to determine automatically, and this method of estimation is considered at the quantity of sender's recipient's complaint that may receive at that time at that time.
Figure 10 A is to use the process flow diagram of first process of the Message Processing of method of estimation.The process of Figure 10 A by the message handling system 106 of Figure 1A in response to from the inquiry of inbound messages gateway 110 and carry out.In the frame 1002, send to receptor's message such as recipient's reception of information gateway.In the frame 1004, recipient's request message disposal system is sent the report about the message that receives.
In the frame 1006, message handling system is determined the guarantee amount that all message provided of sender of the message for its transmission.For example, frame 1006 can comprise the encryption mark deciphering that the sender of the message is prepared, and this encryption mark comprises the guarantee amount of suggestion.In the method, the amount that is provided is total guarantee amount but not for the amount of single message.
In the frame 1008, message handling system calculating all is not received the person in many or all message and is reported as the maximum punishment amount that can be applied to the sender under the unwanted situation.Maximum punishment be calculated as basic punishment amount multiply by (a) about from the complaint quantity of the uncalled message of sender's actual reception and (b) recipient do not make complaint or can not make estimation (" the not complaint of the Ti Jiaoing ") sum of the quantity of complaint.
In the frame 1010, message handling system 106 will compare from the maximum punishment of calculating in the guarantee amount that is provided of message and the frame 1008.If message handling system is determined the guarantee amount and the punishment amount that calculates between difference greater than zero, then message handling system is just to inbound messages gateway 110 notices: the sender can satisfy maximum possible and punish, and promptly the sender maintains guarantee, shown in frame 1014.In response, inbound messages gateway 110 passes to receptor 112 with the message that receives.Perhaps, if difference is zero or littler, then in frame 1012, message handling system 106 can be notified to gateway 110: the sender can not satisfy greatest expected punishment.Then, but gateway 110 request message disposal systems 106 punishment senders, and blocking-up passes to receptor 112 with message, etc.
Figure 10 B is to use the process flow diagram of first process of the Message Processing of method of estimation.In this method, frame 1002,1004 and 1006 comprises the step identical with Figure 10 A.But in the frame 1020, message handling system calculates guarantee rate value, as the sender provide or the guarantee amount that proposes divided by about from the complaint quantity that does not need message of sender's actual reception with the recipient does not submit to or the estimation sum of the complaint quantity that can not submit to.
Each inbound messages gateway 110 of access message disposal system 106 all is assumed that the minimum guarantee rate amount of setting up and storing appointment.Frame 1022 places, the guarantee rate value that message handling system calculates to the recipient's notice such as inbound messages gateway 110.Frame 1024 places, inbound messages gateway 110 determines whether the guarantee value that calculates is equal to or greater than the minimum guarantee rate of the appointment amount of gateway.If like this, then give receptor 112 in frame 1028 message that place's gateways 110 are accepted and transmission receives.If not, then at frame 1026 places, gateway can be refused this message, request message disposal system 106 punishment senders, and blocking-up passes to receptor 112 with message, etc.
Guarantee rate value method provides more dirigibilities to the recipient, because all can set the minimum guarantee rate value of its own appointment with each the inbound messages gateway 110 in many gateways that different recipients are correlated with.For example, an ISP can require all senders to have at least 10 guarantee rate value, and another ISP can require 20 minimum rate.Therefore, recipient's operation of customized messages disposal system 106 to a certain extent.
In addition, guarantee rate value method makes the recipient can determine how first sender compares with second sender with respect to the reality complaint in continuous item, but not knows simply whether first sender can bear special punishment amount, as the method for Figure 10 A.For example, the recipient can derive the evaluation for special sender based on definite guarantee rate value.This guarantee rate value can be considered sender's empirical value or evaluation.
Moreover guarantee rate value does not comprise the punishment amount.Therefore, it will negate that experience evaluation is applied to the sender that the use of guarantee rate value provides a kind of method, and the unactual sender of requirement tenders guarantee in advance and unactually fund is debted or apply the finance punishment of appointment to the sender from the sender.For example, keep the possibility of fine, recomputate and store sender's guarantee rate value as frame 215 places of Fig. 2 B.Similarly, frame 218 places, sender's guarantee rate value can be recomputated the negative experience with the reflection sender.In another example, the guarantee rate that the frame 310 of Fig. 3 penalizes the sender to comprise everywhere to recomputate and store the sender, and unactually apply finance punishment to the sender.The recomputating of guarantee rate can also be carried out at frame 520 places of Fig. 5 B with evaluation (value), answer and the credit of considering the sender mark that comes into force; Perhaps carry out at frame 610,612 places of Fig. 6; Perhaps carry out at frame 714 places of Fig. 7.Along with the guarantee rate worsens, the sender just loses the possibility that sends message by the gateway that contacts with message handling system 106.
In arbitrary these methods, the estimation of a large amount of complaints that the execution recipient does not submit to or can not submit to is calculated.Can utilize several mechanism to carry out this calculating.For example, by from the mapping of estimated value and magnitude, selecting estimated value, can determine to estimate based on the amount that sends message.Use this mechanism, the sender who at the appointed time sends 1000000 message in the window (for example 24 hours) can be assigned with 100 complaint estimate amount.Perhaps, if the sender sent 10000000 message in 24 hours, then message handling system 106 can be supposed in the future and will receive 1500 complaints.The time window that uses appointment is because the receptor needs the time of specified quantitative to receive, read and estimates the message that receives, thereby can be through several hours to several days delay at least between transmission message and reception complaint.
In the modification of this method,, adjust the estimative figure of complaint in proportion according to the length of time window.For example, if time window is 3 days, then a complaint rate can be applicable to first 24 hours, second different complaint rate can be applicable to second 24 hours, and the 3rd different complaint rate can be applicable to the 3rd 24 hours, and these three complaint rates can be mixed to obtain average complaint rate, and it multiply by size of message to form the final estimation of complaint amount.
These methods have solved the potential problems of how handling the sender of new guarantee and sending a large amount of message immediately.Because this sender does not have historical actual complaint rate,, just can expect the better operation of message handling system 106 and better satisfying of recipient if be the transmission message supposition of specified rate or the complaint of estimating some quantity.
Perhaps, can provide estimation, form historical complaint rate by on the window at the appointed time the actual quantity of complaint being counted.Estimation can be applied to historical complaint rate with adjusted value in proportion, so that the actual quantity of the message that complaint rate and sender send is relevant.
3.0 realization mechanism---hardware overview
Fig. 9 is the block diagram that explanation realizes the computer system 900 of complaint rate of the present invention.Computer system 900 comprises bus 902 or other communication mechanism that is used for the communication information, and with bus 902 coupling and be used for the processor 904 of process information.Computer system 900 also comprises primary memory 906, and such as random-access memory (ram) or other dynamic storage device, it is coupled to bus 902 and is used to store information and the instruction of being carried out by processor 904.The instruction of carrying out at processor 904 the term of execution, primary memory 906 also can be used for storing temporary variable or other intermediate information.Computer system 900 comprises that further being coupled to bus 902 is used to processor 904 to store ROM (read-only memory) (ROM) 908 or other static memory of static informations and instruction.Memory storage 910 such as disk or CD is provided, and is coupled to bus 902 and is used for canned data and instruction.
Computer system 900 can be coupled to display 912 via bus 902, such as cathode ray tube (CRT), is used for information is shown to the computer user.The input media 914 that comprises alphanumeric and other button is coupled to bus 902 and is used for information and command selection are passed to processor 904.The user input apparatus of other type is a cursor control 916, such as mouse, trace ball, pen or cursor guiding key, is used for guidance information and command selection are delivered to processor and the pen travel that is used to control on the display 912.This input media has two degree of freedom on two axles usually, and first (for example, x) (for example, y), allows device assigned address in the plane with second.
The present invention relates to be used for the use of the computer system 900 of electronic message delivery method.According to one embodiment of present invention, the electronic message delivery method is carried out one or more sequences of the one or more instructions that comprise in the primary memory 906 by computer system 900 in response to processor 904 and is provided.This instruction can be read in primary memory 906 from other computer-readable media (such as memory storage 910).The instruction sequence that comprises in the primary memory 906 is carried out and is made processor 904 carry out treatment step described herein.In optional embodiment, hard-wired circuitry can be used for replacing software instruction or makes up with it and realize the present invention.Therefore, embodiments of the invention are not limited to any particular combinations of hardware circuit and software.
Term used herein " computer readable medium " relates to any media that participation provides instruction to be used to carry out to processor 904.This media can adopt many patterns, includes but not limited to non-volatile media, volatile media and transfer medium.Non-volatile medium for example comprises CD or disk, such as memory storage 910.Volatile media comprises dynamic storage, such as primary memory 906.Transfer medium comprises concentric cable, copper cash and optical fiber, comprises the circuit that constitutes bus 902.Transfer medium also can be taked the form of acoustics or light wave, such as produce in radiowave and the infrared data communication those.
The common form of computer-readable media for example comprises floppy disk, flexible plastic disc, hard disk, tape or any other magnetic media, CD-ROM, any other light media, punched card, paper tape, any other physical media with hole pattern, RAM, PROM and EPROM, FLASH-EPROM, any other storage chip or cassette disk, carrier wave as described below, perhaps any other media of embodied on computer readable.
Various forms of computer-readable medias relate to one or more sequences with one or more instructions and are sent to processor 904 and are used for carrying out.For example, can on the disk of remote computer, execute instruction at first.Remote computer can be gone into instruction load its dynamic storage and be utilized modulator-demodular unit to send instruction on telephone wire.The modulator-demodular unit of 900 machines of computer system can receive the data on the telephone wire and use infrared transmitter that data-switching is become infrared signal.But data carried by data and suitable circuit can place data on the bus 902 on the infrared detector receiving infrared-ray signal.Bus 902 is sent to primary memory 906 with data, and processor 904 is from its search instruction and carry out it.The instruction that primary memory 906 receives can randomly be stored on the memory storage 910 before or after processor 904 is carried out.
Computer system 900 also comprises the communication interface 918 with bus 902 couplings.Communication interface 918 provides and is connected to the bidirectional data communication of network linking 920 couplings of localized network 922.For example, communication interface 918 can be Integrated Service Digital Network card or modulator-demodular unit, connects so that be provided to the data communication of respective type telephone wire.As another example, communication interface 918 can be the Local Area Network card, connects so that be provided to the data communication of compatible LAN.Also can realize wireless link.In any this realization, communication interface 918 sends and receives electricity, electromagnetism or light signal, and it transmits the digital data stream of the various information of expression.
Network linking 920 provides data communication by one or more networks to other data set usually.For example, network linking 920 can provide principal computer 924 or the data equipment that is connected to Internet service provider (ISP) 926 operations by localized network 922.ISP926 then provides data communication services by worldwide packet data communication network (existing " the Internet " 928 that often be called).Localized network 922 and the Internet 928 all use electricity, electromagnetism or the light signal of carrying digital data stream.Via being exemplary forms of the carrier wave of transmission information on the signal of diverse network and the network linking 920 and via the signal of communication interface 918, described signaling bearer is to computer system 900 and come from its numerical data.
Computer system 900 can be passed through network, network linking 920 and communication interface 918 and send message and receive data, comprises program code.In the Internet example, server 930 can pass through the request code that the Internet 928, ISP926, localized network 922 and communication interface 918 send application program.According to the present invention, the application of a this download provides the electronic message delivery method, as described herein.
When being received and/or being stored in memory storage 910 or other non-volatile memories and be used for carrying out after a while, the code of reception can be carried out by processor 904.In such a way, computer system 900 can obtain the application code of carrier format.
4.0 expansion and possibility
In aforementioned specification, the present invention has been described with reference to specific embodiments.Yet, obvious, can carry out various modifications and change to it and do not deviate from broad spirit of the present invention and scope.Therefore, instructions and accompanying drawing are illustratives and nonrestrictive.

Claims (69)

1. a help is sent to recipient's method with message from the sender, it is characterized in that, comprising:
Storage is willing to mean the relevant sender's identifying information of punishment that unwanted first message of recipient is born with the sender;
Whether reception satisfies the inquiry of specific transmission standard about the sender of first message;
Determine whether the sender satisfies specific transmission standard; And
Send second message, it specifies the sender of first message whether to satisfy specific transmission standard, so that be used to determine whether to accept described first message by the recipient.
2. the method for claim 1, it is characterized in that determining step comprises: determine that whether punishment multiply by (a) about described recipient and any other recipient do not make complaint or can not make the estimation sum of the quantity of complaint from the complaint quantity of the uncalled message of sender's actual reception with (b) greater than basic punishment amount.
3. method as claimed in claim 2 is characterized in that, further comprises when punishment being not more than that basic punishment amount multiply by (a) and (b) during sum, refusal acceptance first message.
4. the method for claim 1, it is characterized in that, determining step comprises: the sender who is first message determines sender's empirical value, and wherein sender's empirical value is calculated as punishment divided by about not making complaint from the complaint quantity of the uncalled message of sender's actual reception and described recipient and any other recipient or can not making the estimation sum of the quantity of complaint.
5. method as claimed in claim 4 is characterized in that, further comprises: when sender's empirical value of first sender of the message during less than minimum sender's empirical value of appointment, refusal is accepted first message.
6. authorize first message to be sent to recipient's method for one kind, it is characterized in that, comprising from the sender:
Store the sender identifying information relevant with the punishment value, this punishment value sign sender is willing to mean the sender and sends to the monetary value amount that recipient and the unwanted particular message of recipient are paid;
Whether reception is subjected to the inquiry of the punishment that the sender provides about first message from the sender;
The punishment whether first message provided by the sender is provided; And
Send second message, the punishment that it specifies first message provided by the sender.
7. method as claimed in claim 6 is characterized in that, further comprises: receive the step of the 3rd message, it is unwanted that described the 3rd message indicates first message.
8. method as claimed in claim 7 is characterized in that, further comprises: based on the source network address of the 3rd message and the receptor address in first message are compared, verification the 3rd message is legal.
9. method as claimed in claim 6 is characterized in that, further may further comprise the steps:
Receive the 3rd message from the recipient, it indicates first message is unwanted;
In response to receiving the 3rd message, from sender's account transferring money.
10. method as claimed in claim 6 is characterized in that, further may further comprise the steps:
Receive the 3rd message from the recipient, it indicates first message is unwanted; And in response to receiving the 3rd message, the sender who is first message determines sender's empirical value, and wherein sender's empirical value is calculated as the monetary value amount divided by the estimate amount sum about not making complaint or can not make complaint from the complaint quantity that does not need message of sender's actual reception and described recipient and any other recipient.
11. method as claimed in claim 6 is characterized in that, further may further comprise the steps:
Receive the 3rd message from the recipient, it indicates first message is unwanted;
In response to receiving the 3rd message, from sender's branch value, wherein the value that shifts from the sender equals the punishment value.
12. method as claimed in claim 6 is characterized in that, further may further comprise the steps:
After sending second message, the request that receives is to keep the monetary value amount that equates with the punishment value;
Keep request in response to receiving, store the punishment value of the reservation relevant with sender's recognition data;
Receive the 3rd message from the recipient, it indicates first message is unwanted;
In response to receiving the 3rd message, from sender's branch value.
13. method as claimed in claim 6 is characterized in that, further may further comprise the steps:
Send the part of punishment value as second message;
Receive the 3rd message from the recipient, it indicates first message is unwanted;
In response to receiving the 3rd message, from sender's branch value.
14. method as claimed in claim 6 is characterized in that, first message is email message.
15. method as claimed in claim 6 is characterized in that, first message is telephone message.
16. method as claimed in claim 6 is characterized in that, first message is email message, and wherein receives inquiry from E-mail service supplier.
17. method as claimed in claim 6 is characterized in that, first message is telephone message, and wherein receives inquiry from telephone network services supplier.
18. method as claimed in claim 6, it is characterized in that, storing step comprises: sender's identifying information that storage has a plurality of punishment values, described punishment value identification sender is willing to mean the sender and sends to a plurality of different monetary value amount that recipient and the unwanted message of recipient are paid, and each in wherein a plurality of punishment values is all relevant with one of a plurality of recipients.
19. method as claimed in claim 6, it is characterized in that, storing step comprises: store the sender identifying information relevant with a plurality of punishment values, described a plurality of punishment value sign sender is willing to mean the sender and sends to a plurality of different monetary value amount that recipient and the unwanted message of recipient are paid, and each in wherein a plurality of punishment values is all relevant with one of multiclass recipient.
20. method as claimed in claim 6, it is characterized in that, storing step comprises: store the sender identifying information relevant with a plurality of punishment values, described a plurality of punishment value sign sender is willing to mean the sender and sends to a plurality of different monetary value amount that recipient and the unwanted message of recipient are paid, and each in wherein a plurality of punishment values is all relevant with one of multiclass message.
21. method as claimed in claim 6, it is characterized in that, storing step comprises: store the sender identifying information relevant with a plurality of punishment values, described a plurality of punishment value sign sender is willing to mean the sender and sends to the maximum monetary value amount that recipient and the unwanted message of recipient are paid, and further may further comprise the steps:
Receive the 3rd message from the recipient, it indicates first message is unwanted;
In response to receiving the 3rd message, select to be less than or equal to the value amount of punishment value, and shift selected value amount from the sender.
22. method as claimed in claim 6 is characterized in that, further may further comprise the steps:
Receive the 3rd message from the recipient, it indicates first message is unwanted;
In response to receiving the 3rd message,, comprise that shifting part value gives the receptor from sender's branch value.
23. will assure that message sends to receptor's method for one kind, it is characterized in that, comprising:
Reach an agreement with service operations person, if the receptor receives unwanted guarantee message, just payment punishment;
The message of guarantee is sent to the receptor; And
If responding expression, the receptor do not need to assure message, then payment punishment.
24. a method of handling electronic information is characterized in that, comprising:
Receive first message that sends to the expection receptor from the sender;
Request service operations person determines the whether secured of first message;
Receive second message from service operations person, it represents whether first message is assured; And
Only when second message represents that first message is guaranteed, first message is delivered to the receptor of expectation.
25. a method of handling electronic information is characterized in that, comprising:
Receive first message that sends to the expectation receptor from the sender;
Request service operations person determines whether the sender of first message satisfies specific transmission standard;
Receive second message from service operations person, whether its expression sender satisfies specific transmission standard;
Only when second message represents that the sender of first message satisfies specific transmission standard, first message is delivered to the receptor of expectation.
26. method as claimed in claim 25, it is characterized in that, second message indication: for the sender, whether the sender agrees confiscated monetary value amount greater than punishment, and wherein said punishment is calculated as basic punishment amount and multiply by (a) about from the complaint quantity that does not need message of sender's actual reception and (b) described recipient and any other recipient estimate amount sum of not making complaint or can not make complaint.
27. method as claimed in claim 26 is characterized in that, only further comprises when monetary value amount during greater than punishment, just transmits first message.
28. method as claimed in claim 25, it is characterized in that, second message comprises sender's empirical value of first sender of the message, and wherein sender's empirical value is calculated as the monetary value amount divided by the estimate amount sum about not making complaint or can not make complaint from the complaint quantity that does not need message of sender's actual reception and described recipient and any other recipient.
29. method as claimed in claim 28 is characterized in that, further comprises: only, transmit first message when sender's empirical value of first sender of the message during more than or equal to specific minimum sender's empirical value.
30. method as claimed in claim 25 is characterized in that, second message comprises and is identified at the receptor to indicate this first message be the punishment value of the currency punishment that the sender is ready to pay under the unwanted situation.
31. method as claimed in claim 25, it is characterized in that, second message comprises and is identified in the receptor to indicate this first message be the punishment value of the currency punishment that the sender is ready to pay under the unwanted situation, and wherein request step comprises that request service operations person determines the whether secured of first message by relatively punishment value and certain threshold level.
32. method as claimed in claim 25, it is characterized in that, second message comprises the punishment value, it is identified at sender under the situation that the receptor do not need to represent first message and is ready the currency punishment paid, and wherein request step comprises that request service operations person determines the whether secured of first message by relatively punishment value and certain threshold level, wherein based on the receptor's of expectation identity selection certain threshold level.
33. a management sends to the method for receptor's electronic information from the sender, it is characterized in that, comprising:
Receive the agreement of payment punishment from the sender of the message, wherein punish based on one and determine, promptly the sender of the message to send to one or more electronic informations of message receptor be that the message receptor is unwanted;
Receive one or more indications: the message that the sender of the message sends is that one or more message receptors do not want;
Create and store one or more records of described indication; And
Quantity based on the indication that receives is collected punishment to the sender of the message.
34. method as claimed in claim 33, it is characterized in that, further comprise: notify the receptor: for the sender, the sender agrees that whether confiscated monetary value amount multiply by (a) about from the complaint quantity that does not need message of sender's actual reception and (b) described recipient and any other recipient estimate amount sum of not making complaint or can not make complaint greater than basic punishment amount.
35. method as claimed in claim 33, it is characterized in that, further comprise sender's empirical value from first sender of the message to the receptor that notify, wherein sender's empirical value is calculated as the monetary value amount divided by the estimate amount sum about not making complaint or can not make complaint from the complaint quantity that does not need message of sender's actual reception and described recipient and any other recipient.
36. method as claimed in claim 33 is characterized in that, electronic information is an email message.
37. method as claimed in claim 33 is characterized in that, electronic information is call.
38. method as claimed in claim 33 is characterized in that, electronic information is a beep-page message.
39. method as claimed in claim 33 is characterized in that, multiply by specific fine amount by the quantity with indication and determines punishment.
40. method as claimed in claim 33 is characterized in that, for all indications that receive in specific period, punishment is restricted to the maximum punishment amount of an appointment.
41. method as claimed in claim 33 is characterized in that, multiply by based on the indication quantity that receives by the indication quantity that will receive and determines punishment from the punishment value that one of a plurality of punishment values are selected.
42. method as claimed in claim 33 is characterized in that, it is fixed amount that punishment is indicated for each of the complaint rate that surpass to allow.
43. a punishment sends to sender's the method for receptor's uncalled message, it is characterized in that, may further comprise the steps:
Reception information, indicate the sender deposited monetary value in the sign sender information-related account;
Receive information from the receptor, its sign is tasked claiming of receptor from sender's branch needs message;
Determine that this claims that uncalled electronic information is unwanted; And
Claim that in response to determining uncalled electronic information is uncalled, punish the sender by some or all monetary value is transferred to service operations person, recipient or receptor from described account.
44. a method of operating the electronic information gateway is characterized in that, may further comprise the steps:
Receive electronic information from the sender;
Determine whether the sender is identified in known sender's tabulation;
Determine whether message is a large amount of uncalled electronic informations; And
In response to definite electronic information is a large amount of uncalled electronic informations, sends service operations person, recipient or the receptor of one or more instructions so that some or all currencies value of preserving in the account relevant with the sender are transferred to electronic information from the account relevant with the sender.
45. a method of operating electronic message system is characterized in that, may further comprise the steps:
Reception information, indicate the sender deposited monetary value in the sign sender information-related account in;
Receive electronic information from the sender;
Determine that whether the sender is in known sender's identified in list;
Determine whether message is unwanted message; And
In response to definite electronic information is unwanted electronic information, some or all monetary value is transferred to service operations person, recipient or the receptor of Email from the account relevant with the sender.
46. method as claimed in claim 45 is characterized in that, further may further comprise the steps:
Receive information from the receptor directly or indirectly, its sign is assigned to the uncalled message of claiming of receptor from the sender; And
Based on the information that receives from the receptor, claim that in response to determining uncalled electronic information is unwanted, transfers to service operations person, recipient or receptor with some or all monetary value from described account.
47. a punishment is dealt into sender's the method for receptor's unsolicited message by the recipient, it is characterized in that, may further comprise the steps:
Receive the encryption mark that the sender is provided with in message;
Determine based on the value of encrypting in the mark whether the sender creates this mark really;
If whether definite message is the unwanted words of receptor sender has enough credit come through bearing punishment;
Send response message, whether its sign sender whether actual creation mark and sender has enough credit;
Reception information, it indicates message is unwanted; And
The punishment sender.
48. method as claimed in claim 47 is characterized in that, further comprises: determine whether the receptor's address value in the encryption mark mates receptor's known network address.
49. method as claimed in claim 47 is characterized in that, encrypts mark and comprises the punishment amount that sender's identifier, mark identifier and sender provide.
50. method as claimed in claim 47 is characterized in that, encrypts mark and comprises punishment amount and the time expiration value that sender's identifier, mark identifier, sender provide.
51. method as claimed in claim 47 is characterized in that, the value of encrypting in the mark comprises punishment amount and the receptor address that sender's identifier, sender provide.
52. method as claimed in claim 47 is characterized in that, further comprises: whether definite encryption mark is before processed, and generates a value in response message, represents whether this encryption mark is before processed.
53. method as claimed in claim 47 is characterized in that, the value of encrypting in the mark comprises the time expiration value, and further may further comprise the steps:
Determine whether to have crossed the time expiration value;
Only when not out of date full time value, just accept message.
54. method as claimed in claim 47 is characterized in that, the value of encrypting in the mark comprises the punishment amount that the sender provides, and further may further comprise the steps:
Determine that whether punishment amount that the sender provides is greater than specific minimum punishment value;
When only the punishment amount that provides as the sender is greater than specific minimum punishment value, just accept message.
55. method as claimed in claim 47 is characterized in that, the value of encrypting in the mark comprises receptor's address value, and further may further comprise the steps:
Determine whether receptor's address value mates the destination-address value in the message header;
Only when the destination-address value in receptor's address value coupling message header, just accept message.
56. method as claimed in claim 47 is characterized in that, further comprises: only when in fact the sender creates mark, just accept message.
57. method as claimed in claim 47 is characterized in that, further comprises: only when the complaint message of sign of inclusion is confirmed as in fact being created by the first message receptor, just punish the sender.
58. method as claimed in claim 47 is characterized in that, further comprises: only the sender has enough credit when bearing punishment under the situation that does not need message the receptor, just accepts message.
59. method as claimed in claim 47 is characterized in that, further may further comprise the steps:
Receive and encrypt mark, it has the information that does not need described message that indicates; And
Only when determining that based on the sender's identifier in the mark in fact the sender creates mark, just punish the sender.
60. method as claimed in claim 47 is characterized in that, further may further comprise the steps:
Receive and encrypt mark, it has the information that does not need described message that indicates; And
Only when determining that based on the time expiration value in the mark mark is not yet due, just punish the sender.
61. method as claimed in claim 47 is characterized in that, further may further comprise the steps:
Receive to encrypt mark, it has, and to indicate described message be unwanted information; And
When only when determine the sender based on described mark before, not punishing, just punish the sender for other message payment relevant with identical mark.
62. method as claimed in claim 47 is characterized in that, further comprises: only when determining to indicate the submission person actual receptor of having address that message is unwanted information based on the receptor address in the mark or when relevant, just punishing the sender with the receptor address.
63. method as claimed in claim 47 is characterized in that, punishment the sender comprise: service operations person sends invoice to the sender, is used for propping up paying a fine.
64. method as claimed in claim 47 is characterized in that, punishment the sender comprise: service operations person from first account relevant with service operations person the fund that provides before the sender is provided and recipient, receptor or the second relevant account of beneficiary.
65. computer readable medium, its carrying is used to transmit one or more sequences of the instruction of electronic information, when being carried out by one or more processors, described instruction makes one or more processor enforcements of rights require each described step in 1,6,24,25,33,42,43,44,45 or 47.
66. a device that is used to create and store the trouble shooting information of transmitting electronic information, it comprises the device that is used for any function described in the enforcement of rights requirement 1,6,24,25,33,42,43,44,45 or 47.
67. a device that is used to transmit electronic information is characterized in that, comprising:
Network interface, it is coupled to data network, is used for receiving one or more stream of packets from it;
Processor;
The instruction sequence of one or more storages when being carried out by described processor, makes described processor implement each the described step in the claim 1,6,24,25,33,42,43,44,45 or 47.
68. the method for claim 1 is characterized in that, punishment comprises currency, resource, commodity, service or promise.
69. method as claimed in claim 6 is characterized in that, may further comprise the steps:
Receive the 3rd message from the recipient, it is unwanted indicating first message;
Determine whether the 3rd message exceeds the complaint rate of the permission relevant with the sender; And
When exceeding described complaint rate, from sender's debit certain value.
CNA2003801088217A 2002-11-20 2003-11-20 Electronic message delivery with estimation approaches Pending CN1839402A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US42813402P 2002-11-20 2002-11-20
US60/428,134 2002-11-20
US60/482,883 2003-06-25
US10/717,414 2003-11-18

Publications (1)

Publication Number Publication Date
CN1839402A true CN1839402A (en) 2006-09-27

Family

ID=37016206

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2003801088217A Pending CN1839402A (en) 2002-11-20 2003-11-20 Electronic message delivery with estimation approaches

Country Status (1)

Country Link
CN (1) CN1839402A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114651431A (en) * 2020-06-25 2022-06-21 索尼集团公司 Importance determination for undelivered messages

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114651431A (en) * 2020-06-25 2022-06-21 索尼集团公司 Importance determination for undelivered messages
CN114651431B (en) * 2020-06-25 2024-03-08 索尼集团公司 Method and device for determining the importance of undelivered messages

Similar Documents

Publication Publication Date Title
US9015263B2 (en) Domain name searching with reputation rating
US7293065B2 (en) Method of electronic message delivery with penalties for unsolicited messages
CN1781119A (en) Method and apparatus for identifying,managing and controlling communications
US7970858B2 (en) Presenting search engine results based on domain name related reputation
CN101057466A (en) A method and system for regulating electronic mail
US10079791B2 (en) Systems and methods for domain- and auto-registration
US20090013375A1 (en) Permissions management platform
US20060174350A1 (en) Methods and apparatus for optimizing identity management
CN101052946A (en) A system and method for controlling access to an electronic message recipient
US20090319290A1 (en) Economic solution to the spam problem
KR20150105359A (en) Systems and methods for access-controlled interactions
CN1579080A (en) User access control to distributed resources on a data communications network
CN1579079A (en) Enhanced privacy protection in identification in a data communications network
CN1860477A (en) Search system and method via proxy server
CN101076818A (en) Safety system
CN1575580A (en) Portability and privacy with data communications network browsing
CN1349625A (en) Mutual authentication in a data network using automatic incremental credential disclosure
CN1926566A (en) Dynamic indicator for context sensitive real-time communications
CN1930591A (en) Multiple party benefit from an online authentication service
CN1434963A (en) Method for carrying out votes, referendums and polls and system for the implementation thereof
CN1794294A (en) Network protocol payment method
CN1848734A (en) Communications system, communications apparatus, and communication method
CN1547144A (en) Internet safety payment system
CN1839402A (en) Electronic message delivery with estimation approaches
Ma The process and characteristics of phishing attacks-A small international trading company case study

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20060927