507140 A7507140 A7
疋 法 本發明係有關於一種自動柃祕♦ 7 裡目勁檢核電子郵 有關於一種可以節省人力 方法,特 。 ^ ^自動檢核電子郵件之 經濟部智慧財產局員工消費合作社印製 發明背景: 有鑑於現今網際網路日益發 (B2C)或企業對企t之間(Β2β) 1 =業對顧 傳統郵件以傳遞訊息與商章 由電子郵件取 之雜執上/ 一 、商業仃為之溝通已成為不可避 勢”何糟由兩效率電子郵件之處理以保 關係’進而提升企業形象再創商機,已成為二十:世:: 業生存之重要課題。 、 -般而言,傳統上當企業處理來自顧客大量電子郵 、’除了可由企業内部之客服人員或其他相關處理人員 人工的方式針對該電子郵件之内容進行回覆,另一方面 亦伴隨使用一套自動回覆系統,來對於-般常問問題採J 自+動回覆以減低回覆郵件的時效。然而,隨著網際網路^ 蓬勃發展,伴隨而來的網路亂象,常常對於企業此種半纟 動客服電子郵件回覆系統造成困擾,例如,若在一個客月 電子郵件信箱,一百封電子郵件中只有十件是客戶真正次 要反應之問題,其他九十件都是廣告或是其他企業之郵卡 自動回覆系統所發送之禮貌性回函,甚至是内含病毒之乘 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐)疋 Method The present invention relates to an automatic secret ♦ 7 miles to check electronic mail related to a method that can save manpower, especially. ^ ^ Automatically check emails printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economics Background of the invention: In view of the increasing Internet (B2C) or business-to-business (B2β) 1 = business-to-business traditional mail to Dissemination of messages and business seals by email. I. Business communication has become unavoidable. "What's wrong with the two efficient e-mail processing to protect the relationship", and then enhance the corporate image and create business opportunities. Ten: World :: An important issue for the survival of the industry. In general, traditionally, when companies handle a large number of e-mails from customers, 'except by the internal customer service staff or other relevant processing staff, the content of the email is performed manually. Replying, on the other hand, is also accompanied by the use of an automatic reply system, which uses J ++ to respond to frequently asked questions to reduce the timeliness of replying to emails. However, with the rapid development of the Internet ^, the accompanying Internet The chaos often causes trouble for such semi-automated customer service email response systems. For example, if there is one hundred emails per month, Only ten of the sub-messages are the real secondary reaction of customers. The other ninety are polite replies sent by advertisements or other company's post card automatic response systems, or even multiplying paper sizes containing viruses. Applicable to China National Standard (CNS) A4 specification (210 X 297 mm)
507140 經濟部智慧財產局員工消費合作社印製 五、發明説明() 件’也就是所謂的垃圾郵件’這時候客服 去閱讀以分辨出這封信是否需求回覆,如此::大: 增加=月\人員與系統管理人員之負擔,未必合乎單位= 内,,濟A现’甚至於垃圾郵件帶來病毒而損壞了電腦 統等等,均是可能發生之額外風險。 ’、 企業之半自動客服電子郵件回覆系統中,合 外界之垃圾郵件攻擊可概分為二種:誤用攻擊:二: 擊,在誤用攻擊情況下,兩系統同時均為同型之電子= 回覆管理系統’而發生禮貌性回函不斷相互傳送之 造成客服人員與系統管理人員之困擾’另一類蓄意二擊| 發生在駭客使用阻斷攻擊8寺’在短時間内I出大;:立義 之電子郵件到客服電子郵件系統中,企圖擁輿系統運:。 面對客戶抱怨服務處理時間之延時,同時還得處理垃圾郵 件,造成電子郵件客服人員之人事成本提升。因此,企業 面對網際網路日益風行,和顧客電子郵件日益增加的未 來,一種可以同時降低電子郵件客服人員之人事^本與工 作負擔而且同時提高顧客服務品質的改善方法變得十分重 要。 刀 發明目的及概述: 許多人都非常痛恨垃圾郵件,尤其是對一些相當倚重電 子郵件作為主要與顧客進行互動管道之公司而言,一旦遭受 到非預期性之電子郵件攻擊,往往會造成電子郵件服務系統507140 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the invention () is the so-called spam mail. At this time, the customer service goes to read to determine whether the letter needs a reply, like this :: large: increase = month \ The burden of personnel and system management personnel may not be in line with the unit, and it is possible that even spam may bring viruses and damage the computer system, etc., which are additional risks that may occur. '、 In the semi-automatic customer service email response system of the enterprise, the external spam attacks can be divided into two types: misuse attacks: two: hit, in the case of misuse attacks, both systems are the same type of electronic = reply management system 'And the confusion caused by the continuous transmission of polite replies to customer service staff and system administrators' Another kind of deliberate second strike | Occurs when a hacker uses a blocking attack on 8 temples' in a short time; Mail to customer service email system in an attempt to support the system. In the face of customer complaints about delays in service processing time, it also has to deal with spam emails, resulting in increased personnel costs for email customer service staff. Therefore, in the face of the increasing popularity of the Internet and the increasing number of customer emails in the future, an improvement method that can simultaneously reduce the personnel and work burden of email customer service staff and at the same time improve the quality of customer service has become very important. The purpose and overview of the invention: Many people hate spam, especially for companies that rely heavily on email as the main channel of interaction with customers. Once an unexpected email attack is encountered, it will often cause email service system
(請先閲讀背面之注意事項再本頁) I裝_ 本 訂 • I I II - 1· - · 3 507140 A7 B7 五、發明説明( 中斷,形成業者服務品質下降,造成顧客流失。 因此許多單位團體甚至個人都開始對垃圾郵件採取反 制措施,其中包括技術面、法律面甚至社會文化面等。目前 技術面主要的做法就是進行郵件過濾,然而若是由客服人員 :進行工作,不僅缓不濟急,對公司而言更是不符合經濟: 本發明的主要目的,係提供一種快速且自動監护 郵件之方法與系統,以大量即時處理來自非預期性客戶之 電子郵件並同時降低處理人力。 根據以上所述之目的,本發明揭露了一種快速且自動 :核電子郵件之方法。利用該檢核系統對所接收之電子郵 =位址、寄件人電子郵件位址、主旨與内容進行檢核, 並將該電子郵件與-保全資料庫所儲存之發信端電子郵件 二位址、寄件人之電子郵件位址、主旨與内容做多層之檢 韓二=絕來自任何過去有不良記錄的帳號或主機的郵件 轉达要求,同時亦利用特殊字串來對應因為誤用所造成之 攻擊進行檢核。 圖式簡單說明: 由以下本發明中較佳具體實施例之細節描述,可以對 :發明之目的、觀點及優點有更佳的了解。同時參考下列 本發明之圖式加以說明: 第一圖係為說明本㈣自動檢核㈣f子郵件之系統 (請先閲讀背面之注意事項再本頁) I裝· 訂 經濟部智慧財產局員工消費合作社印製 A7 五、發明説明( 示意圖。 檢核顧客電子郵件方法之流程 第二圖係為本發明自動 圖0 圖號對照說明: 100 顧客端 120 保全資料庫 發明詳細說明: 110 檢核系統 13 0 郵件伺服器(Please read the precautions on the back first, then this page) I equipment _ booklet • II II-1 ·-· 3 507140 A7 B7 V. Description of the invention Even individuals have begun to take countermeasures against spam, including technical aspects, legal aspects, and even social and cultural aspects. At present, the main technical method is to perform mail filtering. However, if the customer service staff: work, it is not only inconvenient, It is even more uneconomical for the company: The main purpose of the present invention is to provide a method and system for fast and automatic monitoring of mail, to process a large number of e-mails from unexpected customers in real time and reduce processing manpower at the same time. For the stated purpose, the present invention discloses a fast and automatic method for verifying e-mail. The verification system is used to check the received e-mail = address, sender's e-mail address, subject and content, And send the email with the sender's email address and the sender's email address stored in the -security database Multi-layered inspection of the subject and content Han II = Must send mail requests from any account or host with bad records in the past, and also use special strings to check for attacks caused by misuse. Simple illustration of the diagram: The following detailed description of the preferred embodiments of the present invention can better understand: the purpose, viewpoints and advantages of the invention. At the same time, refer to the following drawings of the present invention to explain: The first diagram is to illustrate the present automatic System for checking e-mails (please read the precautions on the back, and then this page). I assemble and order printed A7 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the invention (schematic diagram. The process of checking customer email methods The second picture is the automatic picture of the present invention. The drawing number is compared with the description: 100 client 120 security database invention detailed description: 110 check system 13 0 mail server
—在不限制本發明之精神及應用範圍之下,以下即以一 貫施例,介紹本發明之實施;熟悉此領域技藝者,在瞭解 本發明之精神後,當可應用此方法於各種不同之郵件檢核 系統上,來消除因接收非意欲性電子郵件而對電子郵件管 統造成困擾,本發明之應用當不僅限於以下所述之實 、、本發明揭露了一種快速且能自動檢核電子郵件之方 :於:!一圖所示,本發明之電子郵件自動檢核系統包含 一 h、統 110 和保全資料庫 12〇 (security , =自=檢核系統可輕合至網際網路環境下,用以處理檢核 :自外部多個顧客4 100所發送之大量電子郵件,同時也 :、 郵件伺服器13 〇 ,讓通過檢核後之電子郵件, 由^郵件伺服器130自動回覆顧客端所發送之電子郵 本紙張尺度顧巾關) A4«^ ( 210X29^17 訂-Without limiting the spirit and scope of the present invention, the following describes the implementation of the present invention with consistent examples; those skilled in the art, after understanding the spirit of the present invention, can apply this method to a variety of different On the mail checking system, to eliminate the trouble of email management caused by receiving unintended emails, the application of the present invention is not limited to the following, and the present invention discloses a fast and automatic checking of electronic Email: Yu :! As shown in the figure, the automatic email verification system of the present invention includes a security system 110 and a security database 12〇 (security, = since = audit system can be easily integrated into the Internet environment to handle the audit : A large number of e-mails sent from multiple external customers 4 100, and also :, mail server 13 〇, let the email server 130 automatically reply to the e-mail sent by the client after passing the check Paper scale Gu Jinguan) A4 «^ (210X29 ^ 17 order
經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 五、發明説明 經濟部智慧財產局員工消費合作社印製 :中檢核系統110用以接收來自外部顧客端ι〇 子郵件’並將所接收之電子# ^ 可浐右π !由一檢核過程,將所有 Ζ : 子郵件筛檢出後,再將其他通過筛檢之電 郵件傳$給郵件㈣器13G,如 由客服人員一一回覆郵 士 * <方式,即 客之電子郵件,其中該檢核系統—亦= 保:資料庫12°,該資料庫儲存有-些骇客“二 ==:發:圾郵件網站…址,或電子郵件位 作马師檢時之檢核對象。 ::第二圖所示為客服電子郵件管 :::::::核:程’當客服電子郵件…覆系統= 序以將所文之損害減至最低,本發明之檢核程序八 個階段,當在接收來自外部顧 刀四 定刪除程彳加,於該程序中會將該進入系 寄件人之電子郵件位址與保全資料庫m内 t IP位址與電子郵件位址進行比對,當與指 ::〇5中所儲存之IP位址和電子郵件位址相同時,列 :此封電子郵件,並將此封電子郵件的來源之π位址: 電子郵件位址、主旨與刪除時間紀錄到保全資料 比對次I/ IP位址與電子郵件位址建立指定刪除 子貝料檔之方式是依據若該寄信者之1{)位址與電件 ::址’是被確定經常傳送垃圾郵件或夹帶病毒源之來源地 irPrinted by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Description of the Invention Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs: The inspection system 110 is used to receive sub-mails from external customers and send the received electronic # ^ You can do it right! After a check process, all the mails will be screened out, and then the other mails that passed the screening will be sent to the mail server 13G. If the customer service staff responds to the postal mail one by one * < Method, that is, the email of the guest, in which the checking system-also = security: database 12 °, the database stores-some hackers "two ==: send: spam website ... address, or email address The object of the check during the horseman check. :: The second picture shows the customer service email management :::::::: 核: 程 'When customer service email ... Overwrite the system = order to reduce the damage to the article At least, in the eight stages of the verification procedure of the present invention, when receiving the deletion process from the external Gudao, the process will be entered into the email address of the sender and the security database m. The IP address is compared with the email address. When referring to: When the IP address and e-mail address stored in 5 are the same, list: this e-mail, and the π address of the source of this e-mail: e-mail address, subject, and deletion time record to security data ratio The method of establishing the designated I / IP address and e-mail address to delete the crustacean material file is based on if the sender's 1 () address and electronic mail :: address' is determined to frequently send spam or entrainment Origin of the virus source
·· — !1 1--1· · • I- - - 1 -二- 1 - .---ί 裝— (請先閱讀背面之注意事項再本頁^ 訂 線 ^07140 五、發明説明( 當所接收之電子郵件通過指定刪除程彳咖後,進入 ^控對象202之比對程序,於該程序中會將該進人系統郵 件之:[p位址和寄件人之電子郵件位址與保全資料庫12〇内 可疑信件紀錄表中所错存之ΙΡ位址和電子郵件位址進行比 對,當相同時’則將此Ιρ位址和電子郵件位址之嘗試次數 加一,亦即紀錄-段時間内可疑信件紀錄表2〇6中所儲存 之IP位址和電子郵件位址進人客服電子郵件管理回覆系統 之次數,若達到-刪除臨界值(該臨界次數可由系統人員 設定),則刪除此封電子郵件,並將此封電子郵件的來源 4止_件人之電子郵件位址、纟旨與刪除時間紀錄 到保全資料庫120中,其中對該1?位址與電子郵件位址建 立可疑信件紀錄表比對資料檔之方式是依據若該寄信者之 ΠΜ立址與電子郵件位址,是_個有可能傳送垃圾郵件或央 帶病毒源之來源地址。 經濟部智慧財產局員工消費合作社印製 田所接收之電子郵件通過監控對象2〇2之比對程序 後,進入檢核比對203程序,於該程序中會將該進入系統 郵件之IP位址、寄件人之電子郵件位址、主旨和郵件内容 與保全資料庫120内之偵測信件紀錄表207資料相符,且 該筆郵件於很短時間内(該臨界時間可由系統人員設定), 重複傳送至系統内,則將該筆郵件之IP位址和寄件人之電 子郵件位址移至保全資料庫120内可疑信件紀錄表206中 進行比對,亦即當該筆電子郵件重複出現次數達到程序202 之界值,則刪除此封電子郵件,並將此封電子郵件的來 源之IP位址、寄件人之電子郵件位址、主旨與刪除時間紀 本紙張尺度適用中國國家標準(CNS )以祕(2io^2rl·^) 川/丄4〇 、發明説明( T到保全資料庫120中’其中對該主旨 式是採逐字比對方式。 5比對之方 (請先閱讀背面之注意事項再填寫本頁} ,當所接收之電子郵件通過監控對象202之比掛箱东 後,進入檢核比對203程序’於該程序中會入 盘保入4庙 之料料位址、主旨和郵件内容 内之偵測信件紀錄表2(37資料相符,且 4郵件於很短時間内(該臨界時間可由系統人貝設 重複傳送至系統内,則將該筆郵件之Ip位和寄件人之電子 郵件位址移至保全資料庫120内可疑信件紀錄表206中進 m亦即當該筆電子郵件重複出現次數達到程序2〇2 之臨界值’則刪除此封電子郵件,並將此封電子郵件的來 源之IP位址、寄件人之電子郵件位址、主旨與刪除時 、11 錄到保全資料庫120中,其中對該主旨和郵件内比對之方 式是採逐字比對方式。 經濟部智慧財產局員工消費合作社印製 當所接收之電子郵件通過檢核比對2〇3程序後,進入 禮貌回函比對204程序,於該程序中主要是避免當 使用同型之電子郵件回覆管理系統,而發生禮貌性回函不 斷相互傳送之情況,造成客服人員與系統管理人員之困 擾,因此於本流程中會配合客服電子郵件管理回覆系統在 對別系統之禮貌回函中之主旨與内容加入一特別字串,女 abcd-12345,其中“abcd,,為一特別字串而“12345,,為信^ 之編號,當進入本流程中會與保全資料庫12〇内關鰱自免 錄表208中進行比對,依此例該關鍵字為“abcd” ,因此會 開始找尋“abed”這個特別字串以進行比對,如果有這個字 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) du/i4〇 A7 -------------B7^_ 一 五、發明説明() 率存在,則可認定這為自己系統所發出之禮貌回函’然後 刪除此信件。 若以上比對均通過,則將此信件之IP位址、寄件人之 電子郵件位址、主旨和郵件内容紀錄到偵測信件紀錄表中 以供程序203進行檢核比對。 如熟悉此技術之人員所瞭解的,以上所述僅為本發明 之較佳實施例而已,並非用以限定本發明之申請專利範 圍;凡其它未脫離本發明所揭示之精神下所完成之等效改 變或修飾,均應包含在下述之申請專利範圍内。. (請先閱讀背面之注意事項再本頁} —裝 木 、一ίά 線 經濟部智慧財產局員工消費合作社印製 I張 -紙 本 Α4 \J/ Ns一軺 標 家 國 國 中 用 適·· —! 1 1--1 · · • I---1-二-1-.--- — — Please read the precautions on the back before this page ^ Thread ^ 07140 V. Description of the invention ( When the received e-mail passes the designated deletion process, it enters the comparison process of the control object 202, in which it will enter the system's mail: [p address and sender's e-mail address Compare it with the IP address and email address that are mistakenly stored in the suspicious correspondence record table in the security database 120. When they are the same, then increase the number of attempts of this IP address and email address by one. That is, the number of times that the IP address and email address stored in the suspicious letter record table 206 entered the customer service email management response system for a period of time. If it reaches the-delete threshold (the critical number can be set by the system staff) ), Delete this e-mail, and record the source of the e-mail, the email address, purpose, and deletion time of the person to the security database 120, where the 1? Address and electronic The method of creating suspicious correspondence records and comparing data files with mail addresses is based on The address and e-mail address of the sender are _ the source addresses that are likely to send spam or CCV sources. The e-mail received by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, printed by the field passed the monitoring object 2 After the 2 comparison procedure, enter the check and comparison procedure 203, in which the IP address of the incoming system mail, the email address of the sender, the subject matter, and the content of the mail are stored in the security database 120. Detect the correspondence in the mail record table 207, and the message is repeatedly sent to the system within a short time (the critical time can be set by the system staff), then the IP address of the message and the email of the sender The address is moved to the suspicious letter record table 206 in the security database 120 for comparison, that is, when the number of repeated occurrences of the email reaches the threshold of the procedure 202, the email is deleted, and the email is deleted. Source IP address, sender's e-mail address, subject, and deletion time. This paper standard is applicable to China National Standards (CNS). (2io ^ 2rl · ^) Chuan / 丄 40. (T to the security database 120 'where the subjective method is a word-by-word comparison method. 5 Comparison party (please read the precautions on the back before filling out this page}), when the received email passes the monitoring object After the ratio of 202 is linked to the box owner, enter the check and compare process 203. In this process, the material address, subject, and detection letter record table 2 of the 4 temples will be entered into the disk (37 data match, 4 emails within a short period of time (the critical time can be repeatedly transmitted to the system by the system person), then the IP address of the email and the email address of the sender are moved to the suspicious letter record in the security database 120 In Table 206, that is, when the number of repeated occurrences of the email reaches the threshold of program 202, the email is deleted, and the source IP address of the email and the email of the sender are deleted. When the address, subject, and deletion, 11 are recorded in the security database 120, and the way of comparing the subject and the message is to use a word-by-word comparison method. Printed by the Employees' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. When the received e-mail passes the check and comparison process 203, it enters the polite reply comparison process 204. In this process, it is mainly to avoid using the same type of email reply Management system, and the situation where polite replies are continuously transmitted to each other, causing customer service staff and system administrators to be troubled. Therefore, in this process, we will cooperate with the customer service email management response system. A special string is added to the content, female abcd-12345, where "abcd," is a special string and "12345," is the number of the letter ^. When entering this process, it will be waived with the security database within 120. The comparison is performed in the record table 208. In this example, the keyword is "abcd", so it will start to look for the special string "abed" for comparison. If there is such a text, the paper size applies the Chinese National Standard (CNS) A4 Specifications (210 X 297 mm) du / i4〇A7 ------------- B7 ^ _ One, five, invention description () rate exists, you can consider this as a courtesy issued by your own system Reply 'then In addition to this letter. If all the above comparisons are passed, record the IP address of the letter, the email address of the sender, the subject, and the content of the message in the detection letter record table for the program 203 to check and compare. As will be understood by those familiar with this technology, the above is only a preferred embodiment of the present invention, and is not intended to limit the scope of the patent application for the present invention; all others completed without departing from the spirit disclosed by the present invention, etc. Effective changes or modifications should be included in the scope of patent application described below. (Please read the notes on the back first, then this page} — Packing wood, a line printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, one sheet-paper Α4 \ J / Ns