TW507140B - Method for automatic e-mail checking - Google Patents

Method for automatic e-mail checking Download PDF

Info

Publication number
TW507140B
TW507140B TW90100874A TW90100874A TW507140B TW 507140 B TW507140 B TW 507140B TW 90100874 A TW90100874 A TW 90100874A TW 90100874 A TW90100874 A TW 90100874A TW 507140 B TW507140 B TW 507140B
Authority
TW
Taiwan
Prior art keywords
address
mail
email
record
sender
Prior art date
Application number
TW90100874A
Other languages
Chinese (zh)
Inventor
Jia-He Jeng
Huei-Liang Jiang
Original Assignee
Iqchina Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iqchina Technology Inc filed Critical Iqchina Technology Inc
Priority to TW90100874A priority Critical patent/TW507140B/en
Application granted granted Critical
Publication of TW507140B publication Critical patent/TW507140B/en

Links

Abstract

The present invention discloses a method for fast and automatic e-mail checking, which uses the checking system to check on the IP address, the e-mail address of the sender, the subject and the content in the received e-mail, and applies multi-level checking on the e-mail with the e-mail IP address, e-mail address of the sender, the subject and the content of the sending site stored in a security database, so as to reject the e-mail forwarding request by the account or server having any bad records in the past, and also employs special character strings for checking on the corresponding attacks caused by fault usage.

Description

507140 A7507140 A7

疋 法 本發明係有關於一種自動柃祕♦ 7 裡目勁檢核電子郵 有關於一種可以節省人力 方法,特 。 ^ ^自動檢核電子郵件之 經濟部智慧財產局員工消費合作社印製 發明背景: 有鑑於現今網際網路日益發 (B2C)或企業對企t之間(Β2β) 1 =業對顧 傳統郵件以傳遞訊息與商章 由電子郵件取 之雜執上/ 一 、商業仃為之溝通已成為不可避 勢”何糟由兩效率電子郵件之處理以保 關係’進而提升企業形象再創商機,已成為二十:世:: 業生存之重要課題。 、 -般而言,傳統上當企業處理來自顧客大量電子郵 、’除了可由企業内部之客服人員或其他相關處理人員 人工的方式針對該電子郵件之内容進行回覆,另一方面 亦伴隨使用一套自動回覆系統,來對於-般常問問題採J 自+動回覆以減低回覆郵件的時效。然而,隨著網際網路^ 蓬勃發展,伴隨而來的網路亂象,常常對於企業此種半纟 動客服電子郵件回覆系統造成困擾,例如,若在一個客月 電子郵件信箱,一百封電子郵件中只有十件是客戶真正次 要反應之問題,其他九十件都是廣告或是其他企業之郵卡 自動回覆系統所發送之禮貌性回函,甚至是内含病毒之乘 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐)疋 Method The present invention relates to an automatic secret ♦ 7 miles to check electronic mail related to a method that can save manpower, especially. ^ ^ Automatically check emails printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economics Background of the invention: In view of the increasing Internet (B2C) or business-to-business (B2β) 1 = business-to-business traditional mail to Dissemination of messages and business seals by email. I. Business communication has become unavoidable. "What's wrong with the two efficient e-mail processing to protect the relationship", and then enhance the corporate image and create business opportunities. Ten: World :: An important issue for the survival of the industry. In general, traditionally, when companies handle a large number of e-mails from customers, 'except by the internal customer service staff or other relevant processing staff, the content of the email is performed manually. Replying, on the other hand, is also accompanied by the use of an automatic reply system, which uses J ++ to respond to frequently asked questions to reduce the timeliness of replying to emails. However, with the rapid development of the Internet ^, the accompanying Internet The chaos often causes trouble for such semi-automated customer service email response systems. For example, if there is one hundred emails per month, Only ten of the sub-messages are the real secondary reaction of customers. The other ninety are polite replies sent by advertisements or other company's post card automatic response systems, or even multiplying paper sizes containing viruses. Applicable to China National Standard (CNS) A4 specification (210 X 297 mm)

507140 經濟部智慧財產局員工消費合作社印製 五、發明説明() 件’也就是所謂的垃圾郵件’這時候客服 去閱讀以分辨出這封信是否需求回覆,如此::大: 增加=月\人員與系統管理人員之負擔,未必合乎單位= 内,,濟A现’甚至於垃圾郵件帶來病毒而損壞了電腦 統等等,均是可能發生之額外風險。 ’、 企業之半自動客服電子郵件回覆系統中,合 外界之垃圾郵件攻擊可概分為二種:誤用攻擊:二: 擊,在誤用攻擊情況下,兩系統同時均為同型之電子= 回覆管理系統’而發生禮貌性回函不斷相互傳送之 造成客服人員與系統管理人員之困擾’另一類蓄意二擊| 發生在駭客使用阻斷攻擊8寺’在短時間内I出大;:立義 之電子郵件到客服電子郵件系統中,企圖擁輿系統運:。 面對客戶抱怨服務處理時間之延時,同時還得處理垃圾郵 件,造成電子郵件客服人員之人事成本提升。因此,企業 面對網際網路日益風行,和顧客電子郵件日益增加的未 來,一種可以同時降低電子郵件客服人員之人事^本與工 作負擔而且同時提高顧客服務品質的改善方法變得十分重 要。 刀 發明目的及概述: 許多人都非常痛恨垃圾郵件,尤其是對一些相當倚重電 子郵件作為主要與顧客進行互動管道之公司而言,一旦遭受 到非預期性之電子郵件攻擊,往往會造成電子郵件服務系統507140 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the invention () is the so-called spam mail. At this time, the customer service goes to read to determine whether the letter needs a reply, like this :: large: increase = month \ The burden of personnel and system management personnel may not be in line with the unit, and it is possible that even spam may bring viruses and damage the computer system, etc., which are additional risks that may occur. '、 In the semi-automatic customer service email response system of the enterprise, the external spam attacks can be divided into two types: misuse attacks: two: hit, in the case of misuse attacks, both systems are the same type of electronic = reply management system 'And the confusion caused by the continuous transmission of polite replies to customer service staff and system administrators' Another kind of deliberate second strike | Occurs when a hacker uses a blocking attack on 8 temples' in a short time; Mail to customer service email system in an attempt to support the system. In the face of customer complaints about delays in service processing time, it also has to deal with spam emails, resulting in increased personnel costs for email customer service staff. Therefore, in the face of the increasing popularity of the Internet and the increasing number of customer emails in the future, an improvement method that can simultaneously reduce the personnel and work burden of email customer service staff and at the same time improve the quality of customer service has become very important. The purpose and overview of the invention: Many people hate spam, especially for companies that rely heavily on email as the main channel of interaction with customers. Once an unexpected email attack is encountered, it will often cause email service system

(請先閲讀背面之注意事項再本頁) I裝_ 本 訂 • I I II - 1· - · 3 507140 A7 B7 五、發明説明( 中斷,形成業者服務品質下降,造成顧客流失。 因此許多單位團體甚至個人都開始對垃圾郵件採取反 制措施,其中包括技術面、法律面甚至社會文化面等。目前 技術面主要的做法就是進行郵件過濾,然而若是由客服人員 :進行工作,不僅缓不濟急,對公司而言更是不符合經濟: 本發明的主要目的,係提供一種快速且自動監护 郵件之方法與系統,以大量即時處理來自非預期性客戶之 電子郵件並同時降低處理人力。 根據以上所述之目的,本發明揭露了一種快速且自動 :核電子郵件之方法。利用該檢核系統對所接收之電子郵 =位址、寄件人電子郵件位址、主旨與内容進行檢核, 並將該電子郵件與-保全資料庫所儲存之發信端電子郵件 二位址、寄件人之電子郵件位址、主旨與内容做多層之檢 韓二=絕來自任何過去有不良記錄的帳號或主機的郵件 轉达要求,同時亦利用特殊字串來對應因為誤用所造成之 攻擊進行檢核。 圖式簡單說明: 由以下本發明中較佳具體實施例之細節描述,可以對 :發明之目的、觀點及優點有更佳的了解。同時參考下列 本發明之圖式加以說明: 第一圖係為說明本㈣自動檢核㈣f子郵件之系統 (請先閲讀背面之注意事項再本頁) I裝· 訂 經濟部智慧財產局員工消費合作社印製 A7 五、發明説明( 示意圖。 檢核顧客電子郵件方法之流程 第二圖係為本發明自動 圖0 圖號對照說明: 100 顧客端 120 保全資料庫 發明詳細說明: 110 檢核系統 13 0 郵件伺服器(Please read the precautions on the back first, then this page) I equipment _ booklet • II II-1 ·-· 3 507140 A7 B7 V. Description of the invention Even individuals have begun to take countermeasures against spam, including technical aspects, legal aspects, and even social and cultural aspects. At present, the main technical method is to perform mail filtering. However, if the customer service staff: work, it is not only inconvenient, It is even more uneconomical for the company: The main purpose of the present invention is to provide a method and system for fast and automatic monitoring of mail, to process a large number of e-mails from unexpected customers in real time and reduce processing manpower at the same time. For the stated purpose, the present invention discloses a fast and automatic method for verifying e-mail. The verification system is used to check the received e-mail = address, sender's e-mail address, subject and content, And send the email with the sender's email address and the sender's email address stored in the -security database Multi-layered inspection of the subject and content Han II = Must send mail requests from any account or host with bad records in the past, and also use special strings to check for attacks caused by misuse. Simple illustration of the diagram: The following detailed description of the preferred embodiments of the present invention can better understand: the purpose, viewpoints and advantages of the invention. At the same time, refer to the following drawings of the present invention to explain: The first diagram is to illustrate the present automatic System for checking e-mails (please read the precautions on the back, and then this page). I assemble and order printed A7 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the invention (schematic diagram. The process of checking customer email methods The second picture is the automatic picture of the present invention. The drawing number is compared with the description: 100 client 120 security database invention detailed description: 110 check system 13 0 mail server

—在不限制本發明之精神及應用範圍之下,以下即以一 貫施例,介紹本發明之實施;熟悉此領域技藝者,在瞭解 本發明之精神後,當可應用此方法於各種不同之郵件檢核 系統上,來消除因接收非意欲性電子郵件而對電子郵件管 統造成困擾,本發明之應用當不僅限於以下所述之實 、、本發明揭露了一種快速且能自動檢核電子郵件之方 :於:!一圖所示,本發明之電子郵件自動檢核系統包含 一 h、統 110 和保全資料庫 12〇 (security , =自=檢核系統可輕合至網際網路環境下,用以處理檢核 :自外部多個顧客4 100所發送之大量電子郵件,同時也 :、 郵件伺服器13 〇 ,讓通過檢核後之電子郵件, 由^郵件伺服器130自動回覆顧客端所發送之電子郵 本紙張尺度顧巾關) A4«^ ( 210X29^17 訂-Without limiting the spirit and scope of the present invention, the following describes the implementation of the present invention with consistent examples; those skilled in the art, after understanding the spirit of the present invention, can apply this method to a variety of different On the mail checking system, to eliminate the trouble of email management caused by receiving unintended emails, the application of the present invention is not limited to the following, and the present invention discloses a fast and automatic checking of electronic Email: Yu :! As shown in the figure, the automatic email verification system of the present invention includes a security system 110 and a security database 12〇 (security, = since = audit system can be easily integrated into the Internet environment to handle the audit : A large number of e-mails sent from multiple external customers 4 100, and also :, mail server 13 〇, let the email server 130 automatically reply to the e-mail sent by the client after passing the check Paper scale Gu Jinguan) A4 «^ (210X29 ^ 17 order

經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 五、發明説明 經濟部智慧財產局員工消費合作社印製 :中檢核系統110用以接收來自外部顧客端ι〇 子郵件’並將所接收之電子# ^ 可浐右π !由一檢核過程,將所有 Ζ : 子郵件筛檢出後,再將其他通過筛檢之電 郵件傳$給郵件㈣器13G,如 由客服人員一一回覆郵 士 * <方式,即 客之電子郵件,其中該檢核系統—亦= 保:資料庫12°,該資料庫儲存有-些骇客“二 ==:發:圾郵件網站…址,或電子郵件位 作马師檢時之檢核對象。 ::第二圖所示為客服電子郵件管 :::::::核:程’當客服電子郵件…覆系統= 序以將所文之損害減至最低,本發明之檢核程序八 個階段,當在接收來自外部顧 刀四 定刪除程彳加,於該程序中會將該進入系 寄件人之電子郵件位址與保全資料庫m内 t IP位址與電子郵件位址進行比對,當與指 ::〇5中所儲存之IP位址和電子郵件位址相同時,列 :此封電子郵件,並將此封電子郵件的來源之π位址: 電子郵件位址、主旨與刪除時間紀錄到保全資料 比對次I/ IP位址與電子郵件位址建立指定刪除 子貝料檔之方式是依據若該寄信者之1{)位址與電件 ::址’是被確定經常傳送垃圾郵件或夹帶病毒源之來源地 irPrinted by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Description of the Invention Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs: The inspection system 110 is used to receive sub-mails from external customers and send the received electronic # ^ You can do it right! After a check process, all the mails will be screened out, and then the other mails that passed the screening will be sent to the mail server 13G. If the customer service staff responds to the postal mail one by one * < Method, that is, the email of the guest, in which the checking system-also = security: database 12 °, the database stores-some hackers "two ==: send: spam website ... address, or email address The object of the check during the horseman check. :: The second picture shows the customer service email management :::::::: 核: 程 'When customer service email ... Overwrite the system = order to reduce the damage to the article At least, in the eight stages of the verification procedure of the present invention, when receiving the deletion process from the external Gudao, the process will be entered into the email address of the sender and the security database m. The IP address is compared with the email address. When referring to: When the IP address and e-mail address stored in 5 are the same, list: this e-mail, and the π address of the source of this e-mail: e-mail address, subject, and deletion time record to security data ratio The method of establishing the designated I / IP address and e-mail address to delete the crustacean material file is based on if the sender's 1 () address and electronic mail :: address' is determined to frequently send spam or entrainment Origin of the virus source

·· — !1 1--1· · • I- - - 1 -二- 1 - .---ί 裝— (請先閱讀背面之注意事項再本頁^ 訂 線 ^07140 五、發明説明( 當所接收之電子郵件通過指定刪除程彳咖後,進入 ^控對象202之比對程序,於該程序中會將該進人系統郵 件之:[p位址和寄件人之電子郵件位址與保全資料庫12〇内 可疑信件紀錄表中所错存之ΙΡ位址和電子郵件位址進行比 對,當相同時’則將此Ιρ位址和電子郵件位址之嘗試次數 加一,亦即紀錄-段時間内可疑信件紀錄表2〇6中所儲存 之IP位址和電子郵件位址進人客服電子郵件管理回覆系統 之次數,若達到-刪除臨界值(該臨界次數可由系統人員 設定),則刪除此封電子郵件,並將此封電子郵件的來源 4止_件人之電子郵件位址、纟旨與刪除時間紀錄 到保全資料庫120中,其中對該1?位址與電子郵件位址建 立可疑信件紀錄表比對資料檔之方式是依據若該寄信者之 ΠΜ立址與電子郵件位址,是_個有可能傳送垃圾郵件或央 帶病毒源之來源地址。 經濟部智慧財產局員工消費合作社印製 田所接收之電子郵件通過監控對象2〇2之比對程序 後,進入檢核比對203程序,於該程序中會將該進入系統 郵件之IP位址、寄件人之電子郵件位址、主旨和郵件内容 與保全資料庫120内之偵測信件紀錄表207資料相符,且 該筆郵件於很短時間内(該臨界時間可由系統人員設定), 重複傳送至系統内,則將該筆郵件之IP位址和寄件人之電 子郵件位址移至保全資料庫120内可疑信件紀錄表206中 進行比對,亦即當該筆電子郵件重複出現次數達到程序202 之界值,則刪除此封電子郵件,並將此封電子郵件的來 源之IP位址、寄件人之電子郵件位址、主旨與刪除時間紀 本紙張尺度適用中國國家標準(CNS )以祕(2io^2rl·^) 川/丄4〇 、發明説明( T到保全資料庫120中’其中對該主旨 式是採逐字比對方式。 5比對之方 (請先閱讀背面之注意事項再填寫本頁} ,當所接收之電子郵件通過監控對象202之比掛箱东 後,進入檢核比對203程序’於該程序中會入 盘保入4庙 之料料位址、主旨和郵件内容 内之偵測信件紀錄表2(37資料相符,且 4郵件於很短時間内(該臨界時間可由系統人貝設 重複傳送至系統内,則將該筆郵件之Ip位和寄件人之電子 郵件位址移至保全資料庫120内可疑信件紀錄表206中進 m亦即當該筆電子郵件重複出現次數達到程序2〇2 之臨界值’則刪除此封電子郵件,並將此封電子郵件的來 源之IP位址、寄件人之電子郵件位址、主旨與刪除時 、11 錄到保全資料庫120中,其中對該主旨和郵件内比對之方 式是採逐字比對方式。 經濟部智慧財產局員工消費合作社印製 當所接收之電子郵件通過檢核比對2〇3程序後,進入 禮貌回函比對204程序,於該程序中主要是避免當 使用同型之電子郵件回覆管理系統,而發生禮貌性回函不 斷相互傳送之情況,造成客服人員與系統管理人員之困 擾,因此於本流程中會配合客服電子郵件管理回覆系統在 對別系統之禮貌回函中之主旨與内容加入一特別字串,女 abcd-12345,其中“abcd,,為一特別字串而“12345,,為信^ 之編號,當進入本流程中會與保全資料庫12〇内關鰱自免 錄表208中進行比對,依此例該關鍵字為“abcd” ,因此會 開始找尋“abed”這個特別字串以進行比對,如果有這個字 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) du/i4〇 A7 -------------B7^_ 一 五、發明説明() 率存在,則可認定這為自己系統所發出之禮貌回函’然後 刪除此信件。 若以上比對均通過,則將此信件之IP位址、寄件人之 電子郵件位址、主旨和郵件内容紀錄到偵測信件紀錄表中 以供程序203進行檢核比對。 如熟悉此技術之人員所瞭解的,以上所述僅為本發明 之較佳實施例而已,並非用以限定本發明之申請專利範 圍;凡其它未脫離本發明所揭示之精神下所完成之等效改 變或修飾,均應包含在下述之申請專利範圍内。. (請先閱讀背面之注意事項再本頁} —裝 木 、一ίά 線 經濟部智慧財產局員工消費合作社印製 I張 -紙 本 Α4 \J/ Ns一軺 標 家 國 國 中 用 適·· —! 1 1--1 · · • I---1-二-1-.--- — — Please read the precautions on the back before this page ^ Thread ^ 07140 V. Description of the invention ( When the received e-mail passes the designated deletion process, it enters the comparison process of the control object 202, in which it will enter the system's mail: [p address and sender's e-mail address Compare it with the IP address and email address that are mistakenly stored in the suspicious correspondence record table in the security database 120. When they are the same, then increase the number of attempts of this IP address and email address by one. That is, the number of times that the IP address and email address stored in the suspicious letter record table 206 entered the customer service email management response system for a period of time. If it reaches the-delete threshold (the critical number can be set by the system staff) ), Delete this e-mail, and record the source of the e-mail, the email address, purpose, and deletion time of the person to the security database 120, where the 1? Address and electronic The method of creating suspicious correspondence records and comparing data files with mail addresses is based on The address and e-mail address of the sender are _ the source addresses that are likely to send spam or CCV sources. The e-mail received by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, printed by the field passed the monitoring object 2 After the 2 comparison procedure, enter the check and comparison procedure 203, in which the IP address of the incoming system mail, the email address of the sender, the subject matter, and the content of the mail are stored in the security database 120. Detect the correspondence in the mail record table 207, and the message is repeatedly sent to the system within a short time (the critical time can be set by the system staff), then the IP address of the message and the email of the sender The address is moved to the suspicious letter record table 206 in the security database 120 for comparison, that is, when the number of repeated occurrences of the email reaches the threshold of the procedure 202, the email is deleted, and the email is deleted. Source IP address, sender's e-mail address, subject, and deletion time. This paper standard is applicable to China National Standards (CNS). (2io ^ 2rl · ^) Chuan / 丄 40. (T to the security database 120 'where the subjective method is a word-by-word comparison method. 5 Comparison party (please read the precautions on the back before filling out this page}), when the received email passes the monitoring object After the ratio of 202 is linked to the box owner, enter the check and compare process 203. In this process, the material address, subject, and detection letter record table 2 of the 4 temples will be entered into the disk (37 data match, 4 emails within a short period of time (the critical time can be repeatedly transmitted to the system by the system person), then the IP address of the email and the email address of the sender are moved to the suspicious letter record in the security database 120 In Table 206, that is, when the number of repeated occurrences of the email reaches the threshold of program 202, the email is deleted, and the source IP address of the email and the email of the sender are deleted. When the address, subject, and deletion, 11 are recorded in the security database 120, and the way of comparing the subject and the message is to use a word-by-word comparison method. Printed by the Employees' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. When the received e-mail passes the check and comparison process 203, it enters the polite reply comparison process 204. In this process, it is mainly to avoid using the same type of email reply Management system, and the situation where polite replies are continuously transmitted to each other, causing customer service staff and system administrators to be troubled. Therefore, in this process, we will cooperate with the customer service email management response system. A special string is added to the content, female abcd-12345, where "abcd," is a special string and "12345," is the number of the letter ^. When entering this process, it will be waived with the security database within 120. The comparison is performed in the record table 208. In this example, the keyword is "abcd", so it will start to look for the special string "abed" for comparison. If there is such a text, the paper size applies the Chinese National Standard (CNS) A4 Specifications (210 X 297 mm) du / i4〇A7 ------------- B7 ^ _ One, five, invention description () rate exists, you can consider this as a courtesy issued by your own system Reply 'then In addition to this letter. If all the above comparisons are passed, record the IP address of the letter, the email address of the sender, the subject, and the content of the message in the detection letter record table for the program 203 to check and compare. As will be understood by those familiar with this technology, the above is only a preferred embodiment of the present invention, and is not intended to limit the scope of the patent application for the present invention; all others completed without departing from the spirit disclosed by the present invention, etc. Effective changes or modifications should be included in the scope of patent application described below. (Please read the notes on the back first, then this page} — Packing wood, a line printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, one sheet-paper Α4 \ J / Ns

Claims (1)

507140 ABCD 六、申請專利範圍 申請專利範園 1 · 一種自動檢核電子郵件之方法, 驟: μ方法至少包含下 接收一電子郵件; 言買取遠電子郵件内容; 將該電子郵件内容與資 ;以及 平π緒存之資料進行分 列步 ! 1 I 1— - · 對 層比 根據各層界定 之刪除標準,判斷該電子郵件是 刪除標準,若符合則自動刪除該電子郵件。 苻合 2.如申請專利範圍帛丄項所述之方法,盆 對之電子郵件内容包含電子郵件之ιρ位址:r進行比 郵件位址、主旨和郵件内容。 ° 之電子 3.如申請專利範圍第!項所述之方法,其中上述 儲存之資料更包含指定刪除紀錄表、可疑信件紀錚:庠所 測信件紀錄表與關鍵字紀錄表。 、、 f請先閱讀背面之注意事¾再本頁) I— ml I.......... •訂 經齊部智慧財產局員工消費合作社印製 4如申請專利範圍第3項所述之方法,其中上 除紀錄表所儲存之資料為確定會發送垃圾郵件或包=疋刪 郵件之IP位址或寄件人之電子郵件位址。 s •如申請專利範圍第3項所述之方法,其中上 10 本紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公釐) 病毒 述之可疑信 ju/140 A8 B8 C8 D8 申請專利範圍 件紀錄表所儲存之資料為可能會發送垃圾郵件或包含病毒 郵件之IP位址或寄件人之電子郵件位址。 請 先 閱 讀 背 ιέ 之 注 意 事 項 6·如申請專利範圍第3項所述之方法,其中上述之偵測信 件紀錄表所儲存之資料為短時間内大量發送同一主旨信件 之1P位址或寄件人之電子郵件位址。 7·如申請專利範圍第3項所述之方法,其中上述關鍵字紀 錄表所健存之資料為自定之特別字串,作為區分是否為自 己系統所發出之禮貌回函。 8·如申請專利範圍第i項所述之方法,其中上述分層比對 之步驟更包括: 訂 將電子郵件之IP位址或寄件人之電子郵件位址與資料 庫所錯存之指定刪除紀錄表進行比對; 若該電子郵件之IP位址或該寄件人之電子郵件位址與 該資料庫所儲存之該指定刪除紀錄表不符,則再與可疑信 件紀錄表進行比對,同時亦紀錄該筆信件於一界定時間内 被接收之次數; 經濟部智慧財產局員工消費合作社印製 ^若該電子郵件之1 p位址或該寄件人之電子郵件位址與 該資料庫所儲存之該可疑信件紀錄表不符,且於界定時間 内被接收之次數亦未達到一界定之臨界值,則再二二 件紀錄表進行比對,若於—界定之臨界時間内相同於該偵 測信件紀錄表之電子郵件重複出現次數達一界定之臨界 11 507140 A8 B8 C8 D8 申請專利範圍 值,則將該筆電子郵件移至可疑紀錄表進行比對;以及 若該電子郵件之1{>位址或該寄件人之電子郵件位址斑 該資料庫所儲存之該偵測紀錄表不符,則再與可關鍵字紀 錄表進行比對,若有該關鍵字出現,則確定為一禮貌回函, 並將該電子郵件予以刪除,㈣即完成該分層比對工作。 9·如申請專利範圍f 8項所述之方法,其中上述將該筆電 子郵件移至該可疑紀錄表進行㈣,是㈣㈣電子郵件 之IP位址和該寄件人之電子郵件位址移至該可疑紀錄表中 並與其後所接收之電子郵件進行比對。 請 先 閱 讀 背 面 之 注 意 事 項 丨 頁I 經濟部智慧財產局員工消費合作社印製 10. 一 步驟: 接 讀 將 料庫所 若 該資料 件紀錄 被接收 若 該資料 内被接 種自動檢核電子郵件之方法,該方法至少包含下列 收一電子郵件; 取該電子郵件内容; 該電子郵件之IP位址或寄件人之電子郵件位址與資 儲存之指定刪除紀錄表進行比對; 該電子郵件之;[P位址或該寄件人之電子郵件位址與 庫所儲存之該指定删除紀錄表不符,則再與可疑作 表進行比對,同時亦紀錄該筆信件於一界定時間内 之次數; 該電子郵件之IP位址或該寄件人之電子郵件位址與 庫所儲存之該可疑信件紀錄表不符,且於界定時間 收之次數亦未達到一界定之臨界值,則再與偵測信 12 本紙張尺度·中國國家( 210x297i 訂 申請專利範圍 件紀錄表進行比對,若於一 請 先 閱 讀 背 ιέ 之 注 意 事 測信件紀錄表之電子、—界定之臨界時間内相同於該偵 值,則將該筆電子郵件件重複出現次數達一界定之臨界 若該電子郵件之Ip可疑紀錄表進行比對;以及 該資料庫所儲存之該相ϋ或該寄件人之電子郵件位址與 表進行比對,若有該關键:錄表不符,則再與可關鍵字紀錄 將該電子郵件予以刪除,=現’則_定為-禮貌回函’並 〃 則即完成該分層比對工作。 11·如申請專利範圍第 電子郵件移至該可疑纪釺矣所迷之方法’其中上述將該筆 件之ΠΜ立址和該寄件人=進行比對,是指將該筆電子郵 中並與其後所接收之電子郵:郵件位址移至該可疑紀錄表 叹之電子郵件進行比對。 訂 12. 如申請專利範圍第1〇項所述之方法 刪除紀錄表所儲存之資料 ,、中上述之‘疋 ^ 為確定會發送垃圾郵件或包含疡 毒郵件之ΠΜ立址或寄件人之電子郵件位址。Ρ件或w病 13. 如申請專利範圍第10項所述之方法, 信件紀錄表所儲存之資料為可、述之可疑 主翻杜夕ττ> ^ f發送垃圾郵件或包含病 經濟部智慧財產局員工消費合作社印製 毋郵件之P位址或寄件人之電子郵件位址。 圍第1〇項所述之方法,其中上述之憤測 l件紀錄表所健存之資料為短時間内大量發送同一主旨信 件之IP位址或寄件人之電子郵件位址。 w 13 本紙張尺度適用中國國家榡準(CNS ) Α4規格(2丨0Χ297公釐) 507140 A8 B8 C8 D8 六、申請專利範圍 15.如申請專利範圍第1〇項所述之方法,其中上述關鍵字 紀錄表所儲存之資料為自定之特別字_,作為區分是否為 自己系統所發出之禮貌回函。 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐)507140 ABCD VI. Scope of Patent Application Patent Application Park 1 · A method for automatically checking e-mail, step: μ method includes at least receiving the next e-mail; buying the e-mail content; purchasing the e-mail content and information; and Hierarchical information is divided into steps! 1 I 1—-· The layer ratio is determined according to the deletion criteria defined by each layer, and the e-mail is determined to be a deletion standard. If it is met, the e-mail is automatically deleted. Combination 2. According to the method described in the scope of the patent application, the content of the e-mail address contains the address of the e-mail address: r to compare the e-mail address, subject, and e-mail content. ° Electron 3. As the scope of patent application! The method described in the above item, wherein the stored data further includes a designated deletion log table, a suspicious letter record: 铮 the measured mail log table and the keyword log table. (,, f, please read the notice on the back ¾ again on this page) I— ml I ............. • Book printed by the Consumers ’Cooperative of the Intellectual Property Bureau of Qibu 4 If the scope of patent application is 3 The method described above, wherein the data stored in the log file is the IP address of the sender or the sender's email address. s • The method described in item 3 of the scope of patent application, in which the above 10 paper sizes are applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) Suspicious letter described by the virus ju / 140 A8 B8 C8 D8 The information stored in the log form is the IP address or the email address of the sender that may send spam or virus mail. Please read the note 6: The method described in item 3 of the scope of patent application, in which the information stored in the above-mentioned detection letter record form is a 1P address or a mailing of the same subject letter in a short period of time. Email address of the person. 7. The method as described in item 3 of the scope of patent application, wherein the information stored in the keyword record table above is a special string of self-definition, as a courtesy reply to distinguish whether it is issued by its own system. 8. The method as described in item i of the scope of patent application, wherein the step of the above-mentioned hierarchical comparison further includes: specifying the IP address of the e-mail or the sender's e-mail address and the database misplaced designation Compare the delete record table; if the IP address of the email or the sender's email address does not match the specified delete record table stored in the database, then compare it with the suspicious letter record table, It also records the number of times the letter was received within a defined period of time; printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ^ if the 1 p address of the email or the sender's email address and the database The stored suspicious letter record table does not match, and the number of times it has been received within a defined time does not reach a defined threshold value, then two or two record tables are compared. If the defined time is the same as the Detect the number of repeated emails in the letter record table reaches a defined threshold 11 507140 A8 B8 C8 D8 Patent application range value, then move the email to the suspicious record table for comparison And if the 1 {> address of the email or the email address of the sender does not match the detection record table stored in the database, then it is compared with the keyword record table. When the keyword appears, it is determined as a polite reply and the email is deleted, and then the hierarchical comparison work is completed. 9. The method as described in the scope of patent application f8, wherein the email is moved to the suspicious record form. The IP address of the email and the email address of the sender are moved to The suspicious log table is compared with the emails it receives. Please read the notes on the back first page Ⅰ. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 10. One step: Read the data warehouse if the data record is received. Method, the method includes at least the following receiving an e-mail; fetching the content of the e-mail; comparing the IP address of the e-mail or the e-mail address of the sender with the designated delete log of the asset store; ; [P address or the sender's e-mail address does not match the specified delete record table stored in the warehouse, then compare it with the suspicious work table, and also record the number of times the letter is sent within a defined time ; The IP address of the email or the sender's email address does not match the suspicious letter record table stored in the warehouse, and the number of times received within a defined time does not reach a defined threshold, then Test letter 12 paper size · Chinese national (210x297i patent application scope record table for comparison, please read the notes beforehand If the electronic time of the letter record form is the same as the detection value within the defined critical time, the number of repeated occurrences of the email will reach a defined threshold. If the IP suspicious record form of the email is compared, and the information The e-mail address of the relative or the sender stored in the library is compared with the list. If there is the key: the record does not match, then the email is deleted with the keyword record, = now ' Then _ determined to be-polite reply letter and then the layered comparison work will be completed. 11 · If the patent application scope email is moved to the method of the suspicious discipline, where the above mentioned ΠΜ The address and the sender = comparison refers to the comparison between the e-mail and the e-mail received later: the e-mail address is moved to the e-mail sighed by the suspicious record. Order 12. If The method described in item 10 of the scope of the patent application deletes the data stored in the record form, and the above-mentioned '疋 ^ is determined to be a spam mail or a mailing address containing a poisonous mail or the email address of the sender. .P pieces or w disease 13. According to the method described in item 10 of the scope of patent application, the information stored in the letter record form is suspicious and can be described as the suspicious owner. Du Xi ττ > ^ f Sending spam or including the print of the employee's consumer cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs Make no P address or e-mail address of the sender. The method described in item 10, in which the information stored in the above-mentioned record of one record is to send a large number of the same subject letter within a short period of time. IP address or e-mail address of the sender. W 13 This paper size applies to China National Standard (CNS) A4 specification (2 丨 0 × 297 mm) 507140 A8 B8 C8 D8 6. Application scope of patent 15. If you apply The method described in item 10 of the patent scope, wherein the information stored in the above keyword record table is a special special word _ as a polite reply to distinguish whether it is issued by its own system. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs This paper is sized to the Chinese National Standard (CNS) A4 (210X297 mm)
TW90100874A 2001-01-15 2001-01-15 Method for automatic e-mail checking TW507140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW90100874A TW507140B (en) 2001-01-15 2001-01-15 Method for automatic e-mail checking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW90100874A TW507140B (en) 2001-01-15 2001-01-15 Method for automatic e-mail checking

Publications (1)

Publication Number Publication Date
TW507140B true TW507140B (en) 2002-10-21

Family

ID=27621780

Family Applications (1)

Application Number Title Priority Date Filing Date
TW90100874A TW507140B (en) 2001-01-15 2001-01-15 Method for automatic e-mail checking

Country Status (1)

Country Link
TW (1) TW507140B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8145710B2 (en) 2003-06-18 2012-03-27 Symantec Corporation System and method for filtering spam messages utilizing URL filtering module
TWI385532B (en) * 2008-12-05 2013-02-11 Hon Hai Prec Ind Co Ltd Electronic apparatus with mail receiving and sending function and method for setting mailbox of the electronic apparatus
CN114500435A (en) * 2020-11-12 2022-05-13 汎铨科技股份有限公司 Checking method for material analysis report sending

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8145710B2 (en) 2003-06-18 2012-03-27 Symantec Corporation System and method for filtering spam messages utilizing URL filtering module
TWI385532B (en) * 2008-12-05 2013-02-11 Hon Hai Prec Ind Co Ltd Electronic apparatus with mail receiving and sending function and method for setting mailbox of the electronic apparatus
CN114500435A (en) * 2020-11-12 2022-05-13 汎铨科技股份有限公司 Checking method for material analysis report sending

Similar Documents

Publication Publication Date Title
US8984289B2 (en) Classifying a message based on fraud indicators
US8011003B2 (en) Method and apparatus for handling messages containing pre-selected data
US7454778B2 (en) Enforcing rights management through edge email servers
US8041719B2 (en) Personal computing device-based mechanism to detect preselected data
CA2597083C (en) Method and apparatus for handling messages containing pre-selected data
US20070094500A1 (en) System and Method for Investigating Phishing Web Sites
US20060184549A1 (en) Method and apparatus for modifying messages based on the presence of pre-selected data
US20100174784A1 (en) Systems and Methods for Analyzing Electronic Communications
US20090300770A1 (en) Mechanism to search information content for preselected data
WO2019236389A1 (en) Protecting personally identifiable information (pii) using tagging and persistence of pii
US8370437B2 (en) Method and apparatus to associate a modifiable CRM related token to an email
US7590698B1 (en) Thwarting phishing attacks by using pre-established policy files
CA2499508A1 (en) Detection of preselected data
CN107196942B (en) Internal threat detection method based on user language features
US9094236B2 (en) Methods, systems, and computer program products for collaborative junk mail filtering
US20040260775A1 (en) System and method for sending messages
TW507140B (en) Method for automatic e-mail checking
JP4998302B2 (en) Mail misdelivery prevention system, mail misdelivery prevention method, and mail misdelivery prevention program
JP2008262259A (en) Information leakage prevention system
WO2006042480A2 (en) System and method for investigating phishing web sites
Bayens The Search and Seizure of Computers: Are We Sacrificing Personal Privacy for the Advancement of Technology
Fleurbaaij et al. Privileged data within digital evidence
Stallings Data loss prevention as a privacy-enhancing technology
RU2787308C1 (en) Spam disposal system
JP2007281702A (en) Management/control method for electronic mail,

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees