CN1917425A - Method for delivering E-mail between creditable groups - Google Patents

Method for delivering E-mail between creditable groups Download PDF

Info

Publication number
CN1917425A
CN1917425A CNA2005100920194A CN200510092019A CN1917425A CN 1917425 A CN1917425 A CN 1917425A CN A2005100920194 A CNA2005100920194 A CN A2005100920194A CN 200510092019 A CN200510092019 A CN 200510092019A CN 1917425 A CN1917425 A CN 1917425A
Authority
CN
China
Prior art keywords
trusted
email
code
outbox
trusted code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2005100920194A
Other languages
Chinese (zh)
Inventor
姜珊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNA2005100920194A priority Critical patent/CN1917425A/en
Publication of CN1917425A publication Critical patent/CN1917425A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The method comprises: the sending end sends email to the receiving end; the receiving end examines the received email to decide if the email includes the credible code; if yes, then sending the credible code to the credible server to authenticate if the credible code is true; when the receiving end receive a message from the credible server, which indicates the credible code is true, it receives the email including the true credible code.

Description

Between credible group, transmit the method for Email
Technical field
The invention belongs to internet and field of e-mail.More specifically, relate to a kind of method that transmits mail between credible group, it is provided between the both sides that give credible qualification, carries out the ability of the delivery of mail, thereby has avoided the generation of spam.
Background technology
The appearance of internet and the universal lifestyle that has greatly changed people, nowadays, the internet progressively becomes the indispensable part of people's daily life.According to the statistical analysis to internet behavior, sending and receiving e-mail is the motivation that ranks the first, and obtains up to 90 percent point out, and Email has become important means of communication.The letter that continues, phone (mobile phone) is people's communication media of communication of normal use afterwards.Along with popularizing of broadband (ADSL etc.), people strengthen day by day for the dependence of internet.The quick transmission and multimedia feature makes Email become current most important communication modes.Every day, tens envelope Emails are different local very quick the shuttling back and forth of the earth.Yet, being accompanied by the development of Email, a problem that can not be ignored appears in face of the people: spam.Investigation shows that the spam that the E-mail address of announcing is received is more than the twice of unpub E-mail address on the net.The user thinks, spam is mainly derived from domestic professional spam organizations and individuals, and addresses of items of mail search software and mass-sending software.Chinese user is during year April in August, 2004 to 2005, and on average the spam quantity of receiving weekly is by reaching 16.8 envelopes.In 2005, China's anti-rubbish mail status investigation for the first time showed that the spam development with more havoc is swift and violent, and the spam classification that the user detests becomes " virus " spam by " pornographic, the violence " in past.2005 the 5th phases " science New Times " said in this way: whether spam not only is related to us can buy counterfeit drug, the more important thing is thing also under cover more dangerous in the spam that fills up inbox---and worm, virus, wooden horse and various rogue program all can be hidden in the Email that seems harmless.
The technology that tackles spam at present is also in continuous development.These anti-spam technologies can reduce 4 classes:
1) rule and method, the artificial condition of setting the rejection mail, such as: blacklist, the address of rejecting mail artificially is set, form record sheet.OUTLOOK uses at present, perhaps as patent " processing method of Email " (application number: the 00133641) similar approach of being narrated.
2) statistical method: the frequency that occurs some wording in the probability of use statistics mail, 20040267893), " Mail server probabilityspam filter " (application number: 20040210640) disclosed mail is filtered (Filting), as United States Patent (USP) " Fuzzy logic voting method andsystem for classifying E-mail using inputs from multiple spamclassifiers " (application number:.
3) feedback method: analyze addresses of items of mail or address inquires to this address, as Microsoft apply for a patent simultaneously in China " the spam detection device that band is addressed inquires to " (application number: 03131160)/U. S. application patent " Spam detector with challenges " (application number: 20040003283), perhaps United States Patent (USP) " Feedback loop for spam prevention " (application number: disclosed 20040177110).
4) other method: for example, the United States Patent (USP) of IBM " Spam control systemrequiring unauthorized senders to pay postage through anInternet payment service with provision for refund on acceptedmessages " (application number: 20040158540) etc. disclosed.
But, because these patents have such-and-such deficiency, make spam precautionary technology be far from stage of reaching practical.For first kind patent, spam be very hide rule easily, make rule perform practically no function.For the second class patent, need a large amount of firsthand information of cost to obtain statistical law, and in different field, the source of data all can be disturbed to statistics.So statistical method rests on theoretical aspect basically.For the 3rd class patent, feedback or inquiry also are the answers that very easy service routine is carried out emulation.And the execution flow process of the 3rd class patent and the workflow of present Email have many differently, in other words, need transform the transmission agreement of present Email, therefore almost do not have the possibility of current use.For the 4th class patent, big multi-method is unusual, design is cute, lacks practical value.With IBM patent above-mentioned is example, and the method that this patent proposes similar postage expense stops spam.
So far, do not have clear and definite definition, be very difficult to enumerate its content characteristic yet for spam.But, it is very tangible a feature being arranged: catch someone on the wrong foot.Why the Email meeting " catches someone on the wrong foot ", and its main cause has two: one, and anyone can be registered to a mailbox in different on earth easily places, need not identify the card body, and no matter how strange box name is; Its two, can successfully obtain the address of any one mailbox by permutation and combination, as long as computer enough soon.
For first problem, can set up one credible group, all are participated in credible group member and all prove by credible qualification, are to notarize with identity card, driving license the same needs such as: registration mailbox, especially the cidex of company and enterprise.That is to say, the registration mailbox directly and identity and prestige link together.More direct, society will distribute to mailbox of each citizen.These mailboxes by credible qualification proof will be formed credible group.For second problem, if not in credible group, even obtain credible group membership's email address, also communication under the limited conditions, or rejection, or classify as insincere mail.
If spam is produced by credible group member, be easy to so this member is imposed sanction, some countries have specified the clause that spam generation personnel are carried out legal sanction in the world at present.But, do not have effective technical means to follow the trail of and point out the producer of spam at present.
Summary of the invention
In view of above problem has proposed the present invention, therefore, the purpose of this invention is to provide a kind of method that between credible group, transmits Email, wherein, when transmitting Email between credible group, transmission need obtain trusted code, receiving needs the checking trusted code, everything is transparent for the user, thus, has guaranteed the strick precaution to spam to a certain extent.
To achieve these goals,, proposed a kind of method that between credible group, transmits Email, having comprised: outbox direction recipient send Email according to the present invention; The recipient checks whether comprise trusted code from the Email that transmit leg receives; If comprise trusted code in the Email that receives, then verify to trusted servers whether described trusted code is true; Show described trusted code when really responding when the recipient receives from trusted servers, then prepare to receive the described Email that includes described trusted code.
Preferably, if the recipient, do not comprise trusted code in the Email that receives, then the recipient indicates described Email insincere or directly delete described Email.
Preferably, show described trusted code not when really responding when the recipient receives from trusted servers, the recipient indicates described Email insincere or directly delete described Email.
Preferably, before outbox direction recipient send Email, described method also comprises: the request of outbox direction trusted servers is at the trusted code of described mail; Whether trusted servers is credible group membership according to the described outbox side of the requests verification of outbox side; If outbox side is credible group membership, then to the trusted code of outbox side's transmission at described mail; If outbox side and untrusted group membership then send the response that can not distribute trusted code to outbox side.
Preferably, described method also comprises: acquisition sends to recipient with described Email together with described trusted code at the outbox side of the trusted code of described mail.
Preferably, the request of outbox direction trusted servers comprises at the step of the trusted code of described mail: as credible group membership's outbox direction trusted servers send the authentication that distributes by described trusted servers with trusted code so that authenticate by trusted servers.
Preferably, described authentication trusted code is distributed to described outbox side by trusted servers, and utilizes the credible plug-in unit of downloading from trusted servers that described authentication is sent to trusted servers with trusted code from outbox side to authenticate.
Preferably, described credible group membership and untrusted group membership divide according to the mail domain name.
Description of drawings
Below in conjunction with the detailed description of preferred embodiment of accompanying drawing to being adopted, above-mentioned purpose of the present invention, advantage and feature will become apparent by reference, wherein:
Fig. 1 shows according to the embodiment of the invention, the flow chart that mail user is registered to trusted servers;
Fig. 2 shows according to the embodiment of the invention, by the flow chart of outbox side's send Email process;
Fig. 3 shows according to the embodiment of the invention, is received the flow chart of email process by recipient;
Fig. 4 shows according to the embodiment of the invention, the sequential chart of E-mail conveyance process; And
Fig. 5 shows the schematic diagram of credible group and untrusted group.
Embodiment
The preferred embodiments of the present invention are described below with reference to the accompanying drawings.
In the present invention, for Email, need set up credible group and untrusted group, as shown in Figure 5.Thus, produced following three kinds of email delivery relation:
Between credible group, because the member is believable, so the reception of Email can directly enter inbox;
Between the untrusted group, be equal to present situation, owing to do not relate in the present invention, therefore repeat no more;
Between credible group and untrusted group, when credible group membership receives untrusted group membership's Email, can set automatic deletion, perhaps incorporate insincere inbox into.Mail to insincere inbox has strict quarantine measures, and certainly, the present invention is not limited thereto, also can have other processing modes.The division rule of credible group and untrusted group is arbitrarily, for example, can divide credible group according to the mail domain name, promptly, according to the mail domain name, the mail that will have the specific mail domain name is divided into credible group, and the mail that will have other mail domain names is divided into the untrusted group.Certainly, the present invention is not limited thereto, but can take other modes to divide credible group and untrusted group, as long as it satisfies above-mentioned email delivery relation.
The flow chart that mail user is registered to trusted servers is described according to the embodiment of the invention below with reference to Fig. 1.
As shown in Figure 1, after beginning, in step 100, mail user is submitted log-on message to trusted servers.At step 102 place, judge whether trusted servers receives user applies.If not, then finish.If, then forward step 104 to, in step 104, trusted servers provides initial trusted code to the mail user of application on the backstage.Then, in step 106, trusted servers provides credible plug-in unit to the mail user of application on the backstage, and afterwards, in step 108, the mail end of mail user is installed credible plug-in unit.Install, then succeed in registration.
Describe according to the embodiment of the invention below with reference to Fig. 2, by the flow chart of outbox side's send Email process.
As shown in Figure 2, after the beginning, in step 200, outbox side's send Email.In step 202, credible plug-in unit is submitted the trusted code TC (i) of local storage to trusted servers.In step 204, the authenticity of trusted servers checking trusted code TC (i).If true, then in step 208, trusted servers transmits trusted code TC (i+1) to outbox side.Then, in step 210, outbox side receives this trusted code TC (i+1), and replaces trusted code TC (i) with it.Afterwards, in step 214, outbox side sends to recipient with Email with trusted code TC (i+1), thereby finishes this process.
If in step 204, trusted servers finds that trusted code is not true.Then in step 206, trusted servers transmits to outbox side does not have trusted code information.Then,, only Email is sent to recipient, wherein do not comprise aforesaid trusted code TC (i+1) by outbox side in step 212.
Describe according to the embodiment of the invention below with reference to Fig. 3, receive the flow chart of email process by recipient.
As shown in Figure 3, after the beginning, in step 300, recipient receives Email.Then, in step 302, judge whether received Email carries aforesaid trusted code TC (i+1).If then in step 304, recipient transmits trusted code TC (i+1) to trusted servers and with the request trusted servers it is tested very.In step 306 and step 308, judge by trusted servers whether trusted code TC (i+1) is true.If be true, then the Email that receives is put into credible inbox so that read after a while by the user.
If conclude that at step 302 place received Email does not carry trusted code, then forward step 310 to, in step 310, the Email that receives is put into insincere inbox or directly deletion.
In addition, if at step 308 place, trusted servers concludes that trusted code TC (i+1) not for true, then forwards step 310 to equally, so that the Email that receives is put into insincere inbox or directly deletion.
The sequential chart of the E-mail conveyance process between outbox side, trusted servers, recipient is described according to the embodiment of the invention below with reference to Fig. 4.
As shown in Figure 4, at step 400 place, outbox direction trusted servers transmits the Email that has trusted code TC (i).In step 402, trusted code trusted code TC (i) is tested very.If be true, then transmit trusted code TC (i+1) to outbox side from trusted servers.In step 404, send Email to recipient together with trusted code TC (i+1) by outbox side.In step 406, at Email and the trusted code TC (i+1) of recipient reception from outbox side, then, it is true to test to transmit this trusted code TC (i+1) by recipient to trusted servers.In step 408, trusted code TC (i+1) is tested very by trusted servers.If it is true, then trusted servers sends to recipient in response with this result.In step 410, when receiving expression from trusted servers, recipient is verified as when really responding, and it puts into credible inbox with this Email, so that read after a while by the user.
Above-described trusted code TC produces according to random number.TC (i) and TC (i+1) can not have recursion or causality fully.Particularly, trusted code is used in TC (i) expression authentication, is used for by the trusted servers authentication to distribute the suitable trusted code TC at mail (i+1) to outbox side.
It should be noted that at mail terminal (comprising: outbox side and recipient) plug-in unit all is installed, be responsible for communication with trusted servers.Plug-in unit transmits TC and receives new TC when outbox on the backstage; Plug-in unit sends the feedback information of TC and reception trusted servers on the backstage when addressee.In addition, after outbox side loses TC, must re-register as shown in Figure 1, so that obtain a new TC.Preferably, trusted servers can have fixing IP.Mail end plug-in unit is preserved identical IP, can directly login trusted servers.
Thus,, can follow the tracks of the trace of spam, thereby stop up the source of spam according to the present invention.In addition, even the producer of spam adopts address searching/address traversal, perhaps the mode of address camouflage also can not send mail to credible group membership's mailbox.Because obtaining and verifying of trusted code (TC) is the key that mail successfully sends.In addition, can with existing mail protocol and the fine compatibility of framework.The free feature that has wherein also kept the Internet allows that the untrusted group exists.
Although below show the present invention in conjunction with the preferred embodiments of the present invention, one skilled in the art will appreciate that under the situation that does not break away from the spirit and scope of the present invention, can carry out various modifications, replacement and change to the present invention.Therefore, the present invention should not limited by the foregoing description, and should be limited by claims and equivalent thereof.

Claims (8)

1, a kind of method that transmits Email between credible group comprises:
Outbox direction recipient send Email;
The recipient checks whether comprise trusted code from the Email that transmit leg receives;
If comprise trusted code in the Email that receives, then verify to trusted servers whether described trusted code is true;
Show described trusted code when really responding when the recipient receives from trusted servers, then prepare to receive the described Email that includes described trusted code.
2, method according to claim 1 is characterized in that not comprising trusted code if the recipient in the Email that receives, and then the recipient indicates described Email insincere or directly delete described Email.
3, method according to claim 1 is characterized in that showing described trusted code not when really responding when the recipient receives from trusted servers, and the recipient indicates described Email insincere or directly delete described Email.
4, method according to claim 1 is characterized in that described method also comprises before outbox direction recipient send Email:
The request of outbox direction trusted servers is at the trusted code of described mail,
Whether trusted servers is credible group membership according to the described outbox side of the requests verification of outbox side;
If outbox side is credible group membership, then to the trusted code of outbox side's transmission at described mail;
If outbox side and untrusted group membership then send the response that can not distribute trusted code to outbox side.
5, method according to claim 4 is characterized in that also comprising:
Acquisition sends to recipient with described Email together with described trusted code at the outbox side of the trusted code of described mail.
6, method according to claim 4 is characterized in that the request of outbox direction trusted servers comprises at the step of the trusted code of described mail: as credible group membership's outbox direction trusted servers send the authentication that distributes by described trusted servers with trusted code so that authenticate by trusted servers.
7, method according to claim 6, it is characterized in that described authentication trusted code distributes to described outbox side by trusted servers, and utilize the credible plug-in unit of downloading from trusted servers that described authentication is sent to trusted servers with trusted code from outbox side to authenticate.
8,, it is characterized in that described credible group membership and untrusted group membership divide according to the mail domain name according to any described method of claim 4 to 7.
CNA2005100920194A 2005-08-16 2005-08-16 Method for delivering E-mail between creditable groups Pending CN1917425A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2005100920194A CN1917425A (en) 2005-08-16 2005-08-16 Method for delivering E-mail between creditable groups

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2005100920194A CN1917425A (en) 2005-08-16 2005-08-16 Method for delivering E-mail between creditable groups

Publications (1)

Publication Number Publication Date
CN1917425A true CN1917425A (en) 2007-02-21

Family

ID=37738324

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2005100920194A Pending CN1917425A (en) 2005-08-16 2005-08-16 Method for delivering E-mail between creditable groups

Country Status (1)

Country Link
CN (1) CN1917425A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107533478A (en) * 2015-07-31 2018-01-02 慧与发展有限责任合伙企业 The migration of computer system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107533478A (en) * 2015-07-31 2018-01-02 慧与发展有限责任合伙企业 The migration of computer system

Similar Documents

Publication Publication Date Title
AU2004202268B2 (en) Origination/destination features and lists for spam prevention
US9524334B2 (en) Using distinguishing properties to classify messages
US8463861B2 (en) Message classification using legitimate contact points
US20040236838A1 (en) Method and code for authenticating electronic messages
US7836133B2 (en) Detecting unwanted electronic mail messages based on probabilistic analysis of referenced resources
US20060149823A1 (en) Electronic mail system and method
US8316092B2 (en) Process for automatically handling electronic requests for notification of unsolicited commercial email and other service disruptions
US20050210272A1 (en) Method and apparatus for regulating unsolicited electronic mail
CN1838647A (en) Spam prevention by legal user database and user authentication
CN1696949A (en) Method of anti garbage E-Mails for receiving/transmitting server, and system of anti garbage E-mails
US8135778B1 (en) Method and apparatus for certifying mass emailings
CN1917425A (en) Method for delivering E-mail between creditable groups
CN1564167A (en) Method of dealing with refuse mail
Malamud A No Soliciting Simple Mail Transfer Protocol (SMTP) Service Extension
JP2007281702A (en) Management/control method for electronic mail,
Dalkilic et al. A simple yet effective spam blocking method
Mohamed Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods
Lieven Pre-MX spam filtering with adaptive greylisting based on retry patterns
Brodsky et al. Trinitya: distributed defense against transient spam-bots
Longe et al. A Prototype Scalable System for Secured Bulk SMS Delivery on Mobile Networks.
Malamud RFC 3865: A No Soliciting Simple Mail Transfer Protocol (SMTP) Service Extension
Tung et al. PISA Anti-Spam Project Group
Boers An automation of mail channels to eliminate junk e-mail

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20070221