GB2415062A - Junk mail filter for emails based on subject field text - Google Patents

Junk mail filter for emails based on subject field text Download PDF

Info

Publication number
GB2415062A
GB2415062A GB0412691A GB0412691A GB2415062A GB 2415062 A GB2415062 A GB 2415062A GB 0412691 A GB0412691 A GB 0412691A GB 0412691 A GB0412691 A GB 0412691A GB 2415062 A GB2415062 A GB 2415062A
Authority
GB
United Kingdom
Prior art keywords
email
keyword
software
spam
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0412691A
Other versions
GB0412691D0 (en
Inventor
Malcolm Ripley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0412691A priority Critical patent/GB2415062A/en
Publication of GB0412691D0 publication Critical patent/GB0412691D0/en
Publication of GB2415062A publication Critical patent/GB2415062A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Computer Hardware Design (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method for eliminating spam from the internet. It employs a public non encrypted frequently changed keyword or phrase in the subject line that is interpreted as being from a new sender by the recipient, recipient software or server filtering software. As the spammers ability to reach a users inbox is eliminated the cost effectiveness of spamming will be significantly reduced and thus the spam circulating around the internet will ultimately decrease. This method will work for one user or many users. It does not depend on any server to server cooperation, no databases are required, no additional confirmation or validation emails, no significant changes to software, no encoded keys, no secret passwords and is fully compatible with existing filtering methods.

Description

24 1 5062
2.0 Description
2.1 Background
There already exists anti-spam filters which can employ many methods to try and identify spam. In most cases there are three basic [risers: the accept List, the delete List and the interpretation o; content. The accept list usually consists of the email addresses o] letdown contacts and/or subjects of interest. The delete list is similar in that it is a list of unwanted sender addresses and subjects o) no interest. However, the problem here is that the addresses used by spammers can be filmed and/or loole genuine and the subject line for spam is becoming increasingly sophisticated with purposely misspelt keywords e.g. vi@gra, malting the keyword search neJective. Thirdly there is the filtering based on an analysis of content but again the spammer is becoming ever more sophisticated such that even these filters are becoming ineffective.
2.2 Method The basic approach for this method is to assume that we can never identify spam using software and that a human interface is required. The human interface will world perfectly well it they only have to malice decisions for a very small number of emails i.e. a volume similar to their genuine email. Genuine emarl and email requiring a decision must be kept entirely separate for the human decision malting process to be elective.
The following terms are used in the subsequent description: "new sender" keyword The word or phrase included in the email subject line that is used to identify to the recipient that the sender of the Emil is previously unknown but is a potentially genuine sender o] emaiL anti-spam filter Software used to Triter emails according to defined rules which could be a specific ant-spam application run on the server, and/or on the users computer and/or embedded within an email reader. These already exist but would require modification to automate the method described here The user has antc-spam filters, either on the server or the client computer or both, that specifically detect the "new sender" keyword. The anti-spam filters and email reader will then do 3 things to incoming email.
1 Accept all emarl from known senders identified as such by their emarl address.
This is one of the accept criteria already employed by anti-spam filtering Ad.
software.
2 Email identified by the use o] the "new sender" keyword in the subject line is added to a new sender list.
3 Delete all other email.
The above functionality is the overall basic behaviour from email received by the server to delivery to the user see figure 1. Iffilters are applied on both the server and client then the functionality may be split as show in figure 2. Split functionality will occur depending on the users email access i.e. dialup or broadband and/or if the users email reader and filtering software are separate applications.
All smalls in the new sender list are not readable as normal emails but are listed to allow the user to select which they wish to accept and which to reject. All accepted smalls are then passed through to the inbox as normal. The email addresses of accepted emails are automatically added to the accept criteria in the anti-spam [alters. If any smalls in the new sender list are rejected the software will prompt the user to change the "new sender" keyword. Ideally this would be mandatory if at least one message was rejected in a session.
However, it may be practical to apply the change after a defined number o] rejections or after a specified time since the Rest rejection. For example, changing several times a day is clearly impractical but every 2 or 3 days at worst is more manageable. The basic decision pow for the handling of new sender messages is shown in [pure 3.
For maximum security, especially against attached viruses, the list of new senders should be presented to the user as simple text. If additional identification of the email is required such as the subject line and/or the first line(s) of the main email message then these should also only be presented in simple text format. It is recommended that any list handlers do not have an "accept all" option. This then forces the user to specifically accept or reject each email which is far more likely to stimulate the correct response.
Since the auto-changing o] the "new sender" keyword occurs within the email reader software which is also used to compose emails then it can automatically modify the keyword in the users email signature. Smart methods would allow users to compose signatures in a free format of their choice but use tokens to identify where the "new sender" keyword should be inserted.
2.2.1 Existing or Additional Email Senders of email do not need to use the keyword once the recipient has their address in their accept list. The assumption for the sender is that they only need to put the keyword into their first sent email. However, no harm will be done by keeping the keyword in all correspondence, it will simply become redundant.
2.2.2 Spammers Using the keyword It is inevitable that spammers will Icicle up the keyword. Once this happens the recipient simply hns to change the keyword and all spam will immediately cease. There is very little danger LO valid email being deleted since the recipient would have already added them to their accept list. I] spam comes through at the same time as a new valid email, both using the keyword, then all of this email will be added to the new sender list and the user will only accept the genuine sender(s). In cases such as these the amount o] new spam tends to be very small and only increases over time if not tackled.
It is theoretically possiblefor a spammer to leep a database of all email addresses and auto detected "new sender" keywords. However, this greatly increases the cost o] sending spam and requires the spammer to constantly re-interpret email signatures and/or Illegally tap into internet correspondence. It will not be cost effective for the spammer, especially since the amount of spam getting through is considerably reduced and the amount o] returns needed, to cover the higher costs, will have increased.
2.2.3 Unrequested Genuine Email In order to receive email from unknown genuine senders they would still need to provide the "new sender" keyword. Therefore, the anew sender" keyword would have to be advertised and the best place for this would be as part o] the users email signature. The format o] the signature can be anything since it is interpreted by people who are genuine senders and not by software used by spammers. Since every user can format the signature any way they wish this makes it very difficult for software to interpret.
Some users already successfully employ a cryptic method of adding their email address to their signature. Unfortunately this does not allow for the automatic detection of new senders only the foiling of email grabbers for spam lists.
2.3 Effectiveness The electiveness in this approach is, ironically, the total openness. In orderfor shammers to send spam they would have to have software that can intelligently identify "new sender" keywords. But the method used by users to advertise their keyword is entirely up to them.
There will be no specific method employed. I] this system is accepted as a general principle of sending email then a new "new sender" keyword box would be added wherever an email is prompted for. In this case the keyword can only be "grabbed" once a user has requested something to be sent to themselves not only that but the validity o] this keyword is short- lived. Users themselves could change this keyword as often as they please even i] the spammers haven't picked up on the word. This way the user will always be ahead of even the most tenacious intrusive spammer who is illegally tapping into internet requests and forms.
2.4 Backwards Compatibility Since the method can be employed manually using existing unmodified anti-spam [mitering it allows senders and receivers o] email to communicate with one another using this method even if they do not have the relevant modified software. Although this would require a more knowledgeable computer user.
The method is fully compatible with existing filtering so that there can be an overlap whilst this method is adopted as a standard. In addition the user can still employ other accept criteria. For example, the user may wish to accept all smalls related to a specific subject of interest from a user/news group, in which case they would have the keyword e.g. "trainspotting" as a normal accept criteria and emails that match that criteria would go directly to their inbox. It is only smalls that match the new sender keyword that are treated differently from existing filters.
Even ii this method is adopted as an internet standard users of non new sender complaint software and methods can continue to receive their email exactly as they presently do.
However, such users would have to cooperate with the new sender methods to send new emails i.e. embed the recipients current new sender keyword in the subject line.
2.5 Viruses Viruses in emails are essentially spam and since this method deletes all unknown equals by default then the spread of injection will be considerably reduced. Since the recipients keyword changes then the virus spread stops right there. The faster a vitas attempts to spread the quicker peoples anti-spam filters detect unaccepted emarLs and so the quicker the keywords change and the spread o] the virus hatted. However, there is no protection against proliferation by a user who accepts aLL "new sender" emaiLs hence the recommendation to prompt for acceptance of messages one at a time. There will be protection against the automatic opening of attachments by the Less knowledgeable user since all virus emaiLs will be in the new sender text only List.
2.6 Variations For added security and flexibility additional "new senders keywords can be adopted: Unpublished new sender Only provided when prompted for in forms for example.
Old unpublished new sender The previous unpublished keyword kept for a short time (e.g. One or two days) to maintain an overlap in case the keyword changes between the sending of a genuine emaiL and when it is received.
Published new sender Published in emaiL signatures.
Old Published new sender No Longer published but inept for a short time (e.g. one or two days) to maintain an overlap in case the keyword changes between the sending of a genuine emarL and when it is received.
The ideal configuration of client, server, anti-spam filter and email reader will depend on the type of connection the user has to their emaiL and how the new sender functionality has been coded in the software. DcaLup/POP3 users would want to delete emaL on the server and thus the functionality would be split between the server and the client. Broadband/IMAP users can delete emaL wherever it is the most convenient. is

Claims (4)

  1. 3.0 Claims 1. A method for filtering email using a public non encrypted
    keyword or phrase in the subject line that identifies the sender to the recipient as a potential genuine "new sender".
  2. 2. Filtered email using the method described in claim 1 is downloaded to the normal inbox for genuine emails or a list of potential genuine email that that user approves, all other email and unapproved new sender email is deleted.
  3. 3. The keyword or phrase of claim 1 can be changed as and when deemed necessary by the user or automatically by software.
  4. 4. The single keyword or phrase of claim 1 is the simplest protection but more keywords can be employed to add greaser flexibility and protection.
GB0412691A 2004-06-08 2004-06-08 Junk mail filter for emails based on subject field text Withdrawn GB2415062A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0412691A GB2415062A (en) 2004-06-08 2004-06-08 Junk mail filter for emails based on subject field text

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0412691A GB2415062A (en) 2004-06-08 2004-06-08 Junk mail filter for emails based on subject field text

Publications (2)

Publication Number Publication Date
GB0412691D0 GB0412691D0 (en) 2004-07-07
GB2415062A true GB2415062A (en) 2005-12-14

Family

ID=32696804

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0412691A Withdrawn GB2415062A (en) 2004-06-08 2004-06-08 Junk mail filter for emails based on subject field text

Country Status (1)

Country Link
GB (1) GB2415062A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331475A (en) * 2014-11-04 2015-02-04 郑州悉知信息技术有限公司 Information detection method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6023723A (en) * 1997-12-22 2000-02-08 Accepted Marketing, Inc. Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms
US20030012348A1 (en) * 2000-02-29 2003-01-16 Ameritech Corporation. Method and system for filter based message processing in a unified messaging system
US20040068543A1 (en) * 2002-10-03 2004-04-08 Ralph Seifert Method and apparatus for processing e-mail

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6023723A (en) * 1997-12-22 2000-02-08 Accepted Marketing, Inc. Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms
US20030012348A1 (en) * 2000-02-29 2003-01-16 Ameritech Corporation. Method and system for filter based message processing in a unified messaging system
US20040068543A1 (en) * 2002-10-03 2004-04-08 Ralph Seifert Method and apparatus for processing e-mail

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331475A (en) * 2014-11-04 2015-02-04 郑州悉知信息技术有限公司 Information detection method and device
CN104331475B (en) * 2014-11-04 2018-03-23 郑州悉知信息科技股份有限公司 A kind of information detecting method and device

Also Published As

Publication number Publication date
GB0412691D0 (en) 2004-07-07

Similar Documents

Publication Publication Date Title
US8135779B2 (en) Method, system, apparatus, and software product for filtering out spam more efficiently
US8646043B2 (en) System for eliminating unauthorized electronic mail
US6868498B1 (en) System for eliminating unauthorized electronic mail
US7433924B2 (en) Interceptor for non-subscribed bulk electronic messages
US20050204005A1 (en) Selective treatment of messages based on junk rating
US8363568B2 (en) Message filtering method
US20030023736A1 (en) Method and system for filtering messages
US20060026246A1 (en) System and method for authorizing delivery of E-mail and reducing spam
US7620691B1 (en) Filtering electronic messages while permitting delivery of solicited electronics messages
WO2004107137A2 (en) Method and code for authenticating electronic messages
US20080177843A1 (en) Inferring email action based on user input
US7574476B2 (en) Filtering e-mail messages
US20050044160A1 (en) Method and software product for identifying unsolicited emails
GB2382900A (en) Regulating receipt of electronic mail with a whitelist based on outgoing email addresses
CA2379464A1 (en) Method, device and e-mail server for detecting an undesired e-mail
US7627635B1 (en) Managing self-addressed electronic messages
WO2006051434A1 (en) A method and system for preventing reception of unwanted electronic messages, such as spam-mails
EP1733521B1 (en) A method and an apparatus to classify electronic communication
GB2415062A (en) Junk mail filter for emails based on subject field text
US20060026107A1 (en) Mechanisms for waiving or reducing senders' liability in bonded electronic message systems while preserving the deterrent effect of bonds
JP2004254034A (en) System and method for controlling spam mail suppression policy
US20080177846A1 (en) Method for Providing E-Mail Spam Rejection Employing User Controlled and Service Provider Controlled Access Lists
Park et al. Spam Detection: Increasing Accuracy with A Hybrid Solution.
US20070180034A1 (en) Method and system for filtering communication
KR20040035329A (en) method for automatically blocking spam mail by mailing record

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)