TWI569608B - A computer program product and e-mail transmission method thereof for e-mail transmission in monitored network environment - Google Patents
A computer program product and e-mail transmission method thereof for e-mail transmission in monitored network environment Download PDFInfo
- Publication number
- TWI569608B TWI569608B TW104133140A TW104133140A TWI569608B TW I569608 B TWI569608 B TW I569608B TW 104133140 A TW104133140 A TW 104133140A TW 104133140 A TW104133140 A TW 104133140A TW I569608 B TWI569608 B TW I569608B
- Authority
- TW
- Taiwan
- Prior art keywords
- transmission
- computer program
- program product
- Prior art date
Links
Landscapes
- Information Transfer Between Computers (AREA)
Description
本發明係一種用於電子郵件傳輸之電腦程式產品及其方法,尤指一種應用於管制網路下傳輸電子郵件之電腦程式產品及其方法。 The present invention relates to a computer program product for email transmission and a method thereof, and more particularly to a computer program product and method for transmitting email under a regulated network.
現行之企業為提昇作業效率,多透過電子郵件進行文件之往返。而為因應個人資料保護法之規定以及避免企業內部資料進行外洩,現行之電子郵件管理伺服器多會檢查信件內容是否管制之關鍵字,並當信件出現管制關鍵字時,攔截或退回該信件。 In order to improve the efficiency of the work, the current enterprises use the e-mail to conduct round-trip documents. In order to comply with the provisions of the Personal Data Protection Act and to avoid leakage of internal information, the current email management server will check the keyword of the content of the letter, and intercept or return the letter when the letter appears to be a controlled keyword. .
而部分對於網路監控較為積極之國家,還會對特定的敏感關鍵字進行控管,而當需控管的關鍵字過於繁多時,外國企業欲發送至該國之電子信件則相當容易被管控系統攔截或退信,而阻礙了雙方通訊之運作。 In some countries where network monitoring is more active, specific sensitive keywords are also controlled. When the number of keywords to be controlled is too large, e-mails sent by foreign companies to the country are easily controlled. The system intercepts or bounces the letter, which hinders the operation of the communication between the two parties.
為解決前述之問題,習知之電子郵件伺服裝置會對電子郵件內容進行加密,使得管制端無法從內容中找到管制之關鍵字,然而加密文多為亂數編碼,因此管控系統僅需對內文進行語句分析,即可得知該電子郵件係經由加密處理,並加以對該電子郵件進行控管,此種處理模式會造 成更大的反效果。 In order to solve the aforementioned problems, the conventional e-mail server encrypts the e-mail content, so that the policing terminal cannot find the policing keyword from the content, but the cipher text is mostly random number encoding, so the management system only needs to be in the text. By performing statement analysis, it can be known that the email is processed through encryption and the email is controlled. This processing mode will result in Into a larger counter effect.
綜上所述,如何提供一種可在管制網路環境傳輸電子郵件之技術乃本領域亟需解決之技術問題。 In summary, how to provide a technology for transmitting e-mail in a regulated network environment is a technical problem that needs to be solved in the field.
為解決前揭之問題,本發明之目的係提供一種用於管制網路傳輸電子郵件之技術手段。 In order to solve the problems disclosed above, it is an object of the present invention to provide a technical means for regulating network transmission of electronic mail.
為達上述目的,本發明提出一種用於管制網路傳輸電子郵件之電腦程式產品。前述之電腦程式產品係判斷電子郵件的傳輸路徑之一部分或全部位於管制網路,則將電子郵件分割成複數個郵件檔案分別的進行傳送。 To achieve the above object, the present invention proposes a computer program product for regulating the transmission of e-mail on a network. The computer program product described above determines that part or all of the transmission path of the e-mail is located in the control network, and the e-mail is divided into a plurality of mail files for transmission.
為達上述目的,本發明提出一種用於管制網路傳輸電子郵件之電子郵件傳輸方法。前述之方法係判斷電子郵件的傳輸路徑之一部分或全部位於管制網路,則將電子郵件分割成複數個郵件檔案分別的進行傳送。 To achieve the above object, the present invention provides an electronic mail transmission method for regulating network transmission of electronic mail. The foregoing method determines that part or all of the transmission path of the email is located in the control network, and then divides the email into a plurality of mail files for transmission.
綜上所述,本發明之電腦程式產品及其方法透過分割並傳送電子郵件至管制網路環境,因此在遇到關鍵字管制措施時,可免於重送整封之電子郵件,而能有效節省系統處理資源以及傳輸之頻寬。 In summary, the computer program product and method thereof of the present invention can be free from resending the entire e-mail when the keyword control measures are encountered, and can be effectively effective by dividing and transmitting the e-mail to the regulated network environment. Save system processing resources and the bandwidth of the transmission.
1‧‧‧電子郵件傳輸系統 1‧‧‧Email transmission system
11‧‧‧電子郵件傳輸裝置 11‧‧‧E-mail transmission device
12‧‧‧使用端裝置 12‧‧‧Using the end device
13‧‧‧電子郵件 13‧‧‧Email
131‧‧‧郵件檔案 131‧‧‧ mail file
132‧‧‧子郵件檔案 132‧‧‧Sub-mail file
2‧‧‧路由節點 2‧‧‧ routing node
21‧‧‧第一傳輸通道 21‧‧‧First transmission channel
22‧‧‧第二傳輸通道 22‧‧‧Second transmission channel
3‧‧‧管制網路 3‧‧‧Control Network
30‧‧‧管制網路伺服裝置 30‧‧‧Control network server
31‧‧‧收件端伺服裝置 31‧‧‧Receiver Servo
32‧‧‧收件端裝置 32‧‧‧ Receiving device
圖1係為本發明之電子郵件傳輸系統之應用環境示意圖。 FIG. 1 is a schematic diagram of an application environment of an email transmission system according to the present invention.
圖2係為本發明之一實施例示意圖。 2 is a schematic view of an embodiment of the present invention.
圖3係為本發明之第一傳輸方案操作示意圖。 3 is a schematic diagram of the operation of the first transmission scheme of the present invention.
圖4係為本發明之第二傳輸方案操作示意圖。 4 is a schematic diagram of the operation of the second transmission scheme of the present invention.
以下將描述具體之實施例以說明本發明之實施態樣,惟其並非用以限制本發明所欲保護之範疇。 The specific embodiments are described below to illustrate the embodiments of the invention, but are not intended to limit the scope of the invention.
請參閱圖1,其為本發明之電子郵件傳輸系統1之應用環境示意圖。前述之電子郵件傳輸系統1包含電子郵件傳輸裝置11以及使用端裝置12。前述之電子郵件傳輸裝置11係為用於收發電子郵件之電腦伺服器、前述之使用端裝置12可為具收發電子郵件功能之電子裝置(例如:電腦、智慧型手機等)。電子郵件傳輸裝置11上安裝用於管制網路中傳輸電子郵件之電腦程式產品。 Please refer to FIG. 1 , which is a schematic diagram of an application environment of an email transmission system 1 according to the present invention. The aforementioned electronic mail transmission system 1 includes an electronic mail transmission device 11 and a use terminal device 12. The aforementioned email transmission device 11 is a computer server for transmitting and receiving emails, and the aforementioned user terminal device 12 can be an electronic device (for example, a computer, a smart phone, etc.) having an e-mail function. A computer program product for regulating the transmission of e-mail in the network is installed on the e-mail transmission device 11.
使用端裝置12係電性連接電子郵件傳輸裝置11。電子郵件傳輸裝置11經由一個或多個路由節點2(第一路由節點以及第二路由節點)所形成之第一傳輸通道21連接至位於管制網路3之管制網路伺服裝置30。管制網路伺服裝置30再電性連接至收件端伺服裝置31,收件端伺服裝置31則電性連接收件端裝置32。於另一傳輸模式下,電子郵件傳輸裝置11係經由一個或多個路由節點2(第三路由節點)所形成之第二傳輸通道22直接連接收件端伺服裝置31或收件端裝置32。 The end device 12 is electrically connected to the e-mail transmission device 11. The email transmission device 11 is connected to the regulatory network server 30 located at the regulatory network 3 via a first transmission channel 21 formed by one or more routing nodes 2 (first routing node and second routing node). The control network server 30 is electrically connected to the receiving server 31, and the receiving server 31 is electrically connected to the receiving device 32. In another transmission mode, the email transmission device 11 is directly connected to the destination server 31 or the destination device 32 via a second transmission channel 22 formed by one or more routing nodes 2 (third routing nodes).
於一實施例中,安裝前述電腦程式產品之電子郵件傳輸裝置11判斷電子郵件的傳輸路徑之一部分或全部位於管制網路3,則將電子郵件分割成複數個郵件檔案進行傳送。除了檢查收件端(收件端伺服裝置31或收件端裝置32)外,電子郵件傳輸裝置11亦可判斷自身是位於管制網路3內,則將電子郵件分割成複數個郵件檔案分別的進行傳送。 In one embodiment, the e-mail transmission device 11 that installs the aforementioned computer program product determines that part or all of the transmission path of the e-mail is located in the control network 3, and then divides the e-mail into a plurality of mail files for transmission. In addition to checking the receiving end (the receiving end server 31 or the receiving end device 32), the e-mail transmitting device 11 can also determine that it is located in the regulatory network 3, and divide the e-mail into a plurality of mail files respectively. Transfer.
除了檢查收件者是否位於管制網路3,前述之電腦程式產 品,更可依各別管制網路3之形態來檢查此電子郵件內容是否有特定之關鍵字,並將具有管制關鍵字之電子郵件分割成郵件檔案,以使單一郵件檔案內不具有管制關鍵字。 In addition to checking if the recipient is located on the control network 3, the aforementioned computer program Products can also check whether the email content has a specific keyword according to the form of the individual control network 3, and divide the email with the controlled keyword into a mail file, so that there is no control key in the single mail file. word.
前述之電腦程式產品更將未能成功傳送(例如:被退回或被攔截)之郵件檔案再分割成複數個子郵件檔案進行傳送。進一步說明之,前述之分割作業係將郵件檔案分割至單一子郵件檔件不具有管制關鍵字。 The aforementioned computer program product further divides the mail file that has not been successfully transmitted (for example, returned or intercepted) into a plurality of sub-mail files for transmission. Further, the foregoing splitting operation divides the mail file into a single sub-mail file and does not have a regulatory keyword.
除此之外,電腦程式產品更在郵件檔案未能成功傳送下,則更換至未進行管制檢查之傳輸通道,以重送原先未能成功之郵件檔案。 In addition, if the computer program product fails to be successfully transmitted, the computer program product is replaced with a transmission channel that has not been subjected to regulatory inspection to resend the original unsuccessful mail file.
相對的,本案之電腦程式產品更接收並合併經由前述分割作業所產生之郵件檔案,以還原電子郵件。 In contrast, the computer program product of the present case further receives and merges the mail file generated by the foregoing splitting operation to restore the email.
於另一實施例中,本發明更提供一種用於管制網路傳輸電子郵件之電子郵件傳輸方法,該方法係判斷電子郵件的傳輸路徑之一部分或全部位於管制網路,則將電子郵件分割成複數個郵件檔案分別的進行傳送。 In another embodiment, the present invention further provides an e-mail transmission method for regulating network transmission of e-mail, which is to determine that part or all of the transmission path of the e-mail is located in the regulatory network, and then divide the e-mail into A plurality of mail files are separately transmitted.
前述之方法更判斷執行電子郵件傳輸方法之電子郵件傳輸裝置11位於管制網路3,則將電子郵件分割成郵件檔案進行傳送。進一步說明之,此分割作業係將具有管制關鍵字之電子郵件分割成郵件檔案,以使單一郵件檔案內不具有管制關鍵字。 The foregoing method further determines that the email transmission device 11 that executes the email transmission method is located on the regulatory network 3, and divides the email into a mail archive for transmission. Further, the splitting operation divides the email with the regulatory keyword into a mail file so that there is no regulatory keyword in the single mail file.
此外,前述之方法更將未能成功傳送之郵件檔案再分割成複數個子郵件檔案進行傳送,並將郵件檔案分割至單一的子郵件檔件不具有管制關鍵字。 In addition, the foregoing method further divides the mail file that has not been successfully transmitted into a plurality of sub-mail files for transmission, and divides the mail file into a single sub-mail file without a regulatory keyword.
另外,前述之方法更於郵件檔案未能成功傳送下,則更換至未進行管制檢查之傳輸通道,以重送原先未能成功之郵件檔案。 In addition, if the above method is not successfully transmitted, the mail file is replaced with a transmission channel that has not been subjected to the regulatory check to resend the mail file that was originally unsuccessful.
前述之方法更可接收並合併前述分割作業之所產生之郵件檔案,以還原電子郵件。 The foregoing method can further receive and merge the mail file generated by the foregoing splitting operation to restore the email.
請共同參閱圖1及圖2,當電子郵件傳輸裝置11執行前述之電腦程式產品,並收到使用端裝置12欲經由第一路由節點以及第二路由節點所形成之第一傳輸通道21傳送之電子郵件13時,電腦程式產品會對收件者之電子郵件位址(E-mail address)進行解析,並在判斷此封電子郵件13的傳輸路徑之一部分或全部位於管制網路3,則將電子郵件13分割成複數個郵件檔案131進行傳送。 Referring to FIG. 1 and FIG. 2 together, when the e-mail transmission device 11 executes the foregoing computer program product, and receives the first transmission channel 21 formed by the user terminal device 12 via the first routing node and the second routing node, At 13 o'clock, the computer program product will parse the recipient's e-mail address and determine that part or all of the transmission path of the e-mail 13 is located on the control network 3. The email 13 is divided into a plurality of mail files 131 for transmission.
以表1之電子郵件13說明之,電子郵件傳輸裝置11在收到如表1之電子郵件13時,可透過下列之解析方案來解析此封電子郵件13的傳輸路徑一部分或全部是否位於管制網路3:
第一解析方案:直接查詢管制網路名單,得知該此封電子郵件13之電子郵件地址是否位於管制網路3內。 The first resolution solution: directly query the list of the control network to know whether the email address of the email 13 is located in the control network 3.
第二解析方案:透過DNS主機查詢收件端伺服裝置31之IP位址,並查詢管制網路名單,得知收件端伺服裝置31之1IP位址是否位於管制網路3內。 The second resolution solution is: querying the IP address of the receiving server 31 through the DNS host, and querying the list of the control network to know whether the IP address of the receiving server 31 is located in the control network 3.
第三解析方案:透過網路傳輸路徑分析之程式,例如:網路指令「tracert」來得知收件端伺服裝置31所經過的各個傳輸節點IP,以判斷傳輸路徑之一部分或全部是否位於管制網路3內。 The third analysis solution is: through the network transmission path analysis program, for example, the network command "tracert" to know the IP addresses of the transmission nodes that the receiving server 31 passes, to determine whether part or all of the transmission path is located in the control network. Road 3 inside.
請接著參閱圖3,而當判斷收件端伺服裝置31位於管制網路3內時,此時電子郵件傳輸裝置11可將電子郵件13之分割成複數個郵件檔案131(例如:多用途網際網路郵件擴展(Multipurpose Internet Mail Extensions,簡稱:MIME)檔案格式)之郵件檔案131進行傳送。 Please refer to FIG. 3, and when it is determined that the receiving server 31 is located in the regulatory network 3, the email transmission device 11 can divide the email 13 into a plurality of email files 131 (for example, a multi-purpose internet network). The mail file 131 of the Multipurpose Internet Mail Extensions (MIME) file format is transmitted.
舉例說明之,表1之電子郵件13之內容可被分割成N個(於此案例中N=3)郵件檔案131(第一郵件檔案131~第三郵件檔案131),每一個郵件檔案131上皆附有收件者之檔頭(Header) For example, the content of the email 13 of Table 1 can be divided into N (N=3 in this case) mail file 131 (first mail file 131~third mail file 131), each mail file 131 Both are accompanied by the header of the recipient (Header)
當管制網路3內部之管制關鍵字中設有「長江1號」時,在透 過習知之電子郵件傳輸裝置傳送該封電子郵件時,整封電子郵件因此而被退回,而當電子郵件檔案較為龐大時(夾帶附件檔),不斷的重送郵件將會大量的消耗作業資源以及傳輸頻寬。相較於習知技術之缺失,本案之電子郵件13第一次傳送後僅有第三郵件檔案131會被退回,因此僅需對第三郵件檔案131進行處理,而其他郵件檔案131(第一郵件檔案131、第二郵件檔案131以及第四郵件檔案131)則毋需再進行重送。 When "Changjiang No. 1" is included in the control keywords inside the Control Network 3, When the e-mail transmission device of the well-known e-mail transmits the e-mail, the entire e-mail is returned, and when the e-mail file is large (carrying attachment files), the continuous re-delivery will consume a large amount of operating resources and Transmission bandwidth. Compared with the lack of the prior art, only the third mail file 131 will be returned after the first transmission of the email 13 of the case, so only the third mail file 131 needs to be processed, and the other mail file 131 (first The mail file 131, the second mail file 131, and the fourth mail file 131) are not required to be resent.
而當電子郵件傳輸裝置11得知第三郵件檔案131未能成功傳輸時,可選用下列二個傳輸方案進行重傳: When the e-mail transmission device 11 knows that the third mail file 131 has not been successfully transmitted, the following two transmission schemes may be used for retransmission:
第一傳輸方案:此時電子郵件傳輸裝置11會將第三郵件檔案131再行分割成複數個子郵件檔案132,並讓單一的子郵件檔案132不具有管制關鍵字,以表3說明之,此時可將第三郵件檔案131進一步切割成N個子郵件檔案132,為了不讓單一的子郵件檔案132內文出現管制關鍵字,各個子郵件檔案132係僅具有單一的字元。 The first transmission scheme: at this time, the email transmission device 11 divides the third email archive 131 into a plurality of sub-mail archives 132, and causes the single sub-mail archive 132 to have no regulatory keywords, as illustrated in Table 3. The third mail file 131 can be further cut into N child mail files 132. In order to prevent the single child mail file 132 from appearing in the text, each child mail file 132 has only a single character.
第二傳輸方案:請參閱圖4,此時電子郵件傳輸裝置11亦可切換傳輸通道,並將第三郵件檔案131經由毋需接受管制網路3檢查之第二傳輸通道22(例如:費率較為昂貴之私人企業電信傳輸通道、衛星通訊傳輸通道等)來進行傳輸。 The second transmission scheme: Referring to FIG. 4, the e-mail transmission device 11 can also switch the transmission channel, and the third mail file 131 can be passed to the second transmission channel 22 (for example, the rate) that is not required to be checked by the control network 3. More expensive private enterprise telecom transmission channels, satellite communication transmission channels, etc.) for transmission.
而收件端伺服裝置31以及電子郵件傳輸裝置11在接收到前述分割之郵件檔案131後,可依郵件檔案131之編號進行重組,以還原出原始之電子檔案。 After receiving the segmented mail file 131, the destination server 31 and the email transmission device 11 may reorganize according to the number of the mail file 131 to restore the original electronic file.
於另一實施例中,為節省作業時間,本案之電子郵件傳輸裝置11可在傳輸前即先行檢查電子郵件地址之類型,並查詢如表4之管制關鍵字分類表,以提取相對應管制關鍵字資料庫,來查核內文是否具有管制關 鍵字,並將管制關鍵字之內容進行分割。 In another embodiment, in order to save the working time, the email transmission device 11 of the present invention can check the type of the email address before the transmission, and query the regulatory keyword classification table as shown in Table 4 to extract the corresponding control key. Word database to check whether the text has control Keyword and split the content of the control keyword.
舉例說明之,當需傳輸如表5之電子郵件13時,若電子郵件傳輸裝置11查詢收件者電子郵件地址得知,收件之收件端伺服裝置31為銀行,接著電子郵件傳輸裝置11會存取「個資關鍵字資料庫」,來查核信件內部是否包含與個資有關之關鍵字(例如:身份證字號、生日、姓名、地址),因此電子郵件傳輸裝置11在分割郵件檔案131時可先行標記關鍵字之內容,並將關鍵字之內容部分個別分割成僅具有單一字元之子郵件檔案,分割後之郵件檔案131如表6所示:
由於具有關鍵字之電子郵件內文已被分割成複數個郵件檔案131或子郵件檔案132,並分別進行傳輸,因此當管制網路伺服裝置30檢 查各別郵件檔案內文時,無法找到需進行管制的關鍵字,因而放行此郵件檔案131或子郵件檔案132,而使用本案之電腦程式產品或方法後,將可有效的降低電子信件被管制端攔截或退信之問題。 Since the email body having the keyword has been divided into a plurality of mail files 131 or sub-mail files 132 and transmitted separately, when the control network server 30 checks When checking the texts of the individual mail files, the keywords that need to be controlled cannot be found, so the mail file 131 or the sub-mail file 132 is released. After using the computer program product or method of the case, the electronic mail can be effectively reduced. The problem of intercepting or returning letters.
前述之電腦程式產品可藉由ASP、C/C++/C#、Java、Python、PHP、Perl等程式語言實現之,惟其程式語言之類別不在此限。 The aforementioned computer program products can be implemented by ASP, C/C++/C#, Java, Python, PHP, Perl, etc., but the category of the programming language is not limited thereto.
上列詳細說明係針對本發明之一可行實施例之具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。 The detailed description of the preferred embodiments of the present invention is intended to be limited to the scope of the invention, and is not intended to limit the scope of the invention. The patent scope of this case.
1‧‧‧電子郵件傳輸系統 1‧‧‧Email transmission system
11‧‧‧電子郵件傳輸裝置 11‧‧‧E-mail transmission device
12‧‧‧使用端裝置 12‧‧‧Using the end device
2‧‧‧路由節點 2‧‧‧ routing node
21‧‧‧第一傳輸通道 21‧‧‧First transmission channel
22‧‧‧第二傳輸通道 22‧‧‧Second transmission channel
3‧‧‧管制網路 3‧‧‧Control Network
30‧‧‧管制網路伺服裝置 30‧‧‧Control network server
31‧‧‧收件端伺服裝置 31‧‧‧Receiver Servo
32‧‧‧收件端裝置 32‧‧‧ Receiving device
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW104133140A TWI569608B (en) | 2015-10-08 | 2015-10-08 | A computer program product and e-mail transmission method thereof for e-mail transmission in monitored network environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW104133140A TWI569608B (en) | 2015-10-08 | 2015-10-08 | A computer program product and e-mail transmission method thereof for e-mail transmission in monitored network environment |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI569608B true TWI569608B (en) | 2017-02-01 |
TW201714433A TW201714433A (en) | 2017-04-16 |
Family
ID=58608427
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW104133140A TWI569608B (en) | 2015-10-08 | 2015-10-08 | A computer program product and e-mail transmission method thereof for e-mail transmission in monitored network environment |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI569608B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002013031A1 (en) * | 2000-08-04 | 2002-02-14 | Uniwis Co., Ltd | Apparatus and method for connecting and serving an e-mail using wireless terminal |
CN1750030A (en) * | 2005-10-25 | 2006-03-22 | 二六三网络通信股份有限公司 | Method for filtering junk nails |
US7089286B1 (en) * | 2000-05-04 | 2006-08-08 | Bellsouth Intellectual Property Corporation | Method and apparatus for compressing attachments to electronic mail communications for transmission |
US20080172468A1 (en) * | 2007-01-15 | 2008-07-17 | John Almeida | Virtual email method for preventing delivery of unsolicited and undesired electronic messages |
US20090113003A1 (en) * | 2007-10-31 | 2009-04-30 | Fortinet, Inc., A Delaware Corporation | Image spam filtering based on senders' intention analysis |
CN100583840C (en) * | 2006-12-12 | 2010-01-20 | 华南理工大学 | Spam mail identify method based on interest cognition and system thereof |
US7653606B2 (en) * | 2003-10-03 | 2010-01-26 | Axway Inc. | Dynamic message filtering |
US20100077480A1 (en) * | 2006-11-13 | 2010-03-25 | Samsung Sds Co., Ltd. | Method for Inferring Maliciousness of Email and Detecting a Virus Pattern |
US7783706B1 (en) * | 2004-04-21 | 2010-08-24 | Aristotle.Net, Inc. | Filtering and managing electronic mail |
US8065424B2 (en) * | 2005-07-15 | 2011-11-22 | University Of Utah Research Foundation | System and method for data transport |
US20130060863A1 (en) * | 2011-09-01 | 2013-03-07 | John D'ERI | Method and System for Filtering Outgoing Email |
US8402102B2 (en) * | 2003-05-15 | 2013-03-19 | Symantec Corporation | Method and apparatus for filtering email spam using email noise reduction |
-
2015
- 2015-10-08 TW TW104133140A patent/TWI569608B/en active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7089286B1 (en) * | 2000-05-04 | 2006-08-08 | Bellsouth Intellectual Property Corporation | Method and apparatus for compressing attachments to electronic mail communications for transmission |
WO2002013031A1 (en) * | 2000-08-04 | 2002-02-14 | Uniwis Co., Ltd | Apparatus and method for connecting and serving an e-mail using wireless terminal |
US8402102B2 (en) * | 2003-05-15 | 2013-03-19 | Symantec Corporation | Method and apparatus for filtering email spam using email noise reduction |
US7653606B2 (en) * | 2003-10-03 | 2010-01-26 | Axway Inc. | Dynamic message filtering |
US7783706B1 (en) * | 2004-04-21 | 2010-08-24 | Aristotle.Net, Inc. | Filtering and managing electronic mail |
US8065424B2 (en) * | 2005-07-15 | 2011-11-22 | University Of Utah Research Foundation | System and method for data transport |
CN1750030A (en) * | 2005-10-25 | 2006-03-22 | 二六三网络通信股份有限公司 | Method for filtering junk nails |
US20100077480A1 (en) * | 2006-11-13 | 2010-03-25 | Samsung Sds Co., Ltd. | Method for Inferring Maliciousness of Email and Detecting a Virus Pattern |
CN100583840C (en) * | 2006-12-12 | 2010-01-20 | 华南理工大学 | Spam mail identify method based on interest cognition and system thereof |
US20080172468A1 (en) * | 2007-01-15 | 2008-07-17 | John Almeida | Virtual email method for preventing delivery of unsolicited and undesired electronic messages |
US20090113003A1 (en) * | 2007-10-31 | 2009-04-30 | Fortinet, Inc., A Delaware Corporation | Image spam filtering based on senders' intention analysis |
US20130060863A1 (en) * | 2011-09-01 | 2013-03-07 | John D'ERI | Method and System for Filtering Outgoing Email |
Non-Patent Citations (1)
Title |
---|
"Defeat Internet Censorship: Overview of Advanced Technologies and Products", Global Internet Freedom Consortium (GIFC), 2007/11/21. * |
Also Published As
Publication number | Publication date |
---|---|
TW201714433A (en) | 2017-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11595353B2 (en) | Identity-based messaging security | |
JP6983194B2 (en) | Middleware security layer for cloud computing services | |
US10587550B1 (en) | System and method for evaluating domains to send emails while maintaining sender reputation | |
US9756073B2 (en) | Identifying phishing communications using templates | |
US9686308B1 (en) | Systems and methods for detecting and/or handling targeted attacks in the email channel | |
US8787567B2 (en) | System and method for decrypting files | |
AU2011212934B2 (en) | Electronic message systems and methods | |
US11722503B2 (en) | Responsive privacy-preserving system for detecting email threats | |
US11539726B2 (en) | System and method for generating heuristic rules for identifying spam emails based on fields in headers of emails | |
US11681757B2 (en) | Similar email spam detection | |
US10891373B2 (en) | Quarantining electronic messages based on relationships among associated addresses | |
US10122722B2 (en) | Resource classification using resource requests | |
JP2012511842A (en) | Electronic messaging integration engine | |
CN103701592B (en) | Data cutout and the method and system of encryption and decryption | |
US10250543B2 (en) | Deduplication of e-mail content by an e-mail server | |
US9961090B2 (en) | Message quarantine | |
US9055018B2 (en) | Related message detection and indication | |
US9917738B2 (en) | Intelligent device data router | |
TWI569608B (en) | A computer program product and e-mail transmission method thereof for e-mail transmission in monitored network environment | |
US9923857B2 (en) | Symbolic variables within email addresses | |
TW201123782A (en) | Computer-readable storage medium and computer-implemented method | |
US9979685B2 (en) | Filtering electronic messages based on domain attributes without reputation | |
Mishra et al. | Forensic analysis of e-mail date and time spoofing | |
US11586781B2 (en) | Data loss prevention using machine learning | |
JP2015084462A (en) | Email transmission method, device, and program |