WO2004010662A1 - 電子メールサーバ、電子メールの受渡しの中継方法、およびコンピュータプログラム - Google Patents
電子メールサーバ、電子メールの受渡しの中継方法、およびコンピュータプログラム Download PDFInfo
- Publication number
- WO2004010662A1 WO2004010662A1 PCT/JP2002/007402 JP0207402W WO2004010662A1 WO 2004010662 A1 WO2004010662 A1 WO 2004010662A1 JP 0207402 W JP0207402 W JP 0207402W WO 2004010662 A1 WO2004010662 A1 WO 2004010662A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- url
- site
- web page
- received
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/48—Message addressing, e.g. address format or anonymous messages, aliases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Definitions
- the present invention relates to an e-mail server that processes an e-mail that is annoying to a user so that the e-mail is not transmitted to a terminal device of the user.
- D M direct mail
- e-mail has the following advantages for businesses.
- the cost can be kept lower than in the case of delivery by mail or courier service, and delivery to many users requires little effort.
- the URL of the web page of the website established by the company itself is described in the e-mail, interested users will access the website of the company themselves, so the e-mail design E-mail creation is easy without the need for special arrangements for layouts. Due to these advantages, there are a very large number of companies that deliver DMs by e-mail.
- a method of refusing to receive an e-mail from a specific partner specified by a user For example, the user registers the e-mail address or domain name of the company that frequently sends DMs to the e-mail server of the Internet Service Provider (ISP).
- the e-mail server filters the e-mail addressed to the user and extracts the e-mail sent from the merchant.
- the extracted e-mail is regarded as unsolicited e-mail and is deleted without being sent to the user's terminal device.
- the present invention has been made in view of the above problems, and has as its object to enable a user to refuse to receive unsolicited e-mail regardless of the source e-mail address. Disclosure of the invention
- the e-mail server is an e-mail server that relays the delivery of e-mails, and is a nuisance that stores part or all of the URL of a Web site that transmits information unnecessary for an e-mail recipient.
- URL storage means reception means for receiving an e-mail transmitted from the sender's terminal device, and a part or all of the URL stored in the annoying URL storage means included in the received e-mail.
- URL rule storage means for storing URL rule information indicating the relationship between the domain name of the domain when determining the URL and the website name of the website provided for each domain, and e-mail which is annoying to the user who received the First receiving means for receiving a certain unsolicited e-mail from the user's terminal device, domain extracting means for extracting a domain name indicated in a URL included in the received unsolicited e-mail, and the URL rule from the extracted domain name
- a website identifying means for distributing the web page indicated by the URL included in the received unsolicited e-mail, a website identifying means, and a web site identifying the extracted domain name and the identified website.
- Annoying site storage means for storing the site name of the user as the annoying site information in association with the user; and an e-mail transmitted from the terminal device of the sender.
- the second receiving means for receiving, and whether the URL included in the received e-mail includes the domain name and the site name indicated in the unwanted site information of the user who is the destination of the e-mail Junk mail discriminating means for judging whether or not the e-mail is junk mail, and only when the received e-mail is judged not to be junk mail, the e-mail is Transmitting means for transmitting to the user terminal device as the destination.
- a first web page obtaining means for obtaining a web page indicated by a URL included in the unsolicited email received by the first receiving means, wherein the first web page obtaining means
- the domain extracting means sets the other web page.
- the domain name of the domain to be extracted, the website identification means identifies the website to which the other web page is distributed, and the annoying site storage means distributes the other website.
- the domain name of the domain where the web site is provided and the site name of the web site are stored as unwanted site information.
- the second web page acquisition means for acquiring a web page indicated by a URL included in the email received by the second reception means, and If the web page acquired by the second web page acquisition means includes a code that automatically jumps to another web page, the code based on the URL of the other web page is used. It is determined whether the electronic mail is unsolicited mail.
- part or all of the URL of a website that transmits unnecessary information to an e-mail recipient is stored and transmitted from a terminal device of the sender.
- Receiving the received e-mail determining whether the received e-mail includes a part or all of the stored URL, and determining whether or not a part or the whole of the URL is included. Only when it is determined that the e-mail has not been received, the received e-mail is transmitted to the terminal device of the recipient of the e-mail.
- FIG. 1 is a diagram showing an example of the configuration of an electronic mail system provided with an electronic mail server according to the present invention.
- FIG. 2 is a diagram illustrating an example of a URL rule pattern.
- FIG. 3 is a diagram illustrating an example of a hardware configuration of the e-mail server.
- FIG. 4 is a diagram illustrating an example of a functional configuration of the e-mail server.
- FIG. 5 is a diagram showing an example of a configuration based on a URL rule.
- FIG. 6 is a diagram showing an example of the configuration of the nuisance site database.
- FIG. 7 is a diagram showing an example of an e-mail sent from a distributor to a user.
- FIG. 8 is a diagram illustrating an example of a general URL rule.
- Fig. 9 is a diagram for explaining the mechanism of the web page redirection function.
- FIG. 10 is a diagram showing an example of an HTML file having a redirect code.
- FIG. 11 is a flowchart illustrating an example of a processing flow when relaying delivery of an e-mail.
- FIG. 12 is a flowchart illustrating an example of a processing flow when a nuisance site is registered.
- the e-mail server 1 can be connected to devices such as the terminal devices 2 and 3 and the WWW server 5 via a communication line 4.
- a communication line 4 the Internet, a LAN, a dedicated line, or a public line is used.
- the terminal device 3 has installed therein e-mail software for creating, transmitting and receiving e-mails, and a WWW browser for browsing web pages.
- the user of each terminal device 3 is given one e-mail address.
- a user can use the e-mail server 1 as an SMTP (Simple Mail Transfer Protocol) server and a POP (Post Office Protocol) server to exchange e-mail with other users.
- the terminal device 3 includes a personal convenience store, a workstation, a PDA (Personal Digital Assistant), Alternatively, a mobile phone device or the like is used.
- the terminal device 2 is a terminal device of a company that distributes DM (direct mail) indiscriminately by e-mail.
- the DM includes advertisements on the products or services of the distributor, as well as the URL of the website established by the distributor. We will refer to such emails as “spam” or "spam”.
- the distributor knows the e-mail addresses of many users, designates these e-mail addresses as destinations, and sends spam.
- Each Internet Service Provider (ISP) or company has a domain with a domain name such as "xxxxx.ne.jp".
- the domain is provided with one or more WWW servers 5 according to the number of members, the number of accesses, or the amount of information to be distributed. With this configuration, the domain has one or more websites (WWW sites).
- each web site is given a subdomain or directory and a site name to distinguish it from other web sites.
- the method of determining the URL that is, the method of naming websites differs for each domain, and is roughly divided into the patterns shown in Fig. 2. For example, pattern A with the subdomain name before the domain name as the site name, such as "subdomain name.xxxxx.ne.jp", and the pattern name after the domain name, such as "xxxxx.ne.jp/directory name”.
- Pattern B using a directory name as a site name a pattern using a directory name as a site name such as “xxxxx.ne.jp/—directory name” and using “ ⁇ ” (tilde) as a symbol indicating the site name (:, Or ⁇ Subdomain name.xxxxx.n
- a pattern D such as “e.jp/directory name” that combines a subdomain name and a directory name to create a site name.
- the WWW server name may be used instead of the subdomain name.
- Web pages are written in HTML (Hyper Text Markup Language) or XML (Extensible Markup Language).
- HTML Hyper Text Markup Language
- XML Extensible Markup Language
- the e-mail server 1 includes a CPU la, a RAM lb, a ROM lc, a magnetic storage device ld, and various interfaces.
- Magnetic storage device id operating system As shown in FIG. 3, the e-mail server 1 includes a CPU la, a RAM lb, a ROM lc, a magnetic storage device ld, and various interfaces.
- Magnetic storage device id operating system As shown in FIG. 3, the e-mail server 1 includes a CPU la, a RAM lb, a ROM lc, a magnetic storage device ld, and various interfaces.
- Magnetic storage device id operating system As shown in FIG. 3, the e-mail server 1 includes a CPU la, a RAM lb, a ROM lc, a magnetic storage device ld, and various interfaces.
- Magnetic storage device id operating system As shown in FIG. 3, the e-mail server 1 includes a CPU la, a RAM lb, a
- the e-mail server 1 may be configured by one server as shown in FIG. 1 or may be configured by being distributed to a plurality of server machines.
- the configuration may be such that the processing of the SMTP server and the processing of the POP server are performed using different server machines.
- the e-mail server 1 as shown in FIG. 4, has the URL rule database 1D1, the unsolicited site database 1D2, the mail box 1D3, the mail receiving unit 101, and the unsolicited mail.
- Judgment unit 102, Mail transmission unit 103, Spam mail reception unit 104, Domain judgment unit 105, Spam site identification unit 106, First redirect destination acquisition unit 107, and Second redirect Functions such as the first acquisition unit 108 are realized.
- the URL rule database 1D1 has URL rule information 7 1 (7 1 a, 7 1 b,...) Indicating the regularity of the URL assignment method for each domain on the Internet. ) Is remembered.
- the mailbox 1D3 is provided for each user of the terminal device 3, and temporarily stores an e-mail 70 transmitted from the terminal device on the Internet to the user.
- the annoying site data base 1D2 is an annoying site information 72 (72a, 72b) indicating a web site that delivers unnecessary information that is meaningless for each user. , ⁇ ' ⁇ ).
- annoying sites such web sites may be referred to as “nuisance sites”.
- the web site (junk site) registered in the spam site information 72 is registered based on the URL described in the spam mail document received by the user.
- the format of the description of the URL of the annoying site in the annoying site information 72 described later differs depending on the above-described domain pattern (see FIG. 5).
- the mail receiving unit 101 receives an e-mail 70 addressed to the user of the terminal device 3 among e-mails transmitted from various terminal devices on the Internet.
- the e-mail 70 may include unsolicited e-mail sent from the terminal device 2 of the DM distributor.
- the junk mail determining unit 102 determines whether or not the received e-mail 70 is junk mail. Such a determination is performed as follows. First, the URL described in the body of the e-mail 70 is extracted. For example, in the case of the e-mail 70a shown in FIG. 7A, "ht tp: @ www.ppp.bbbbb.ne.jp / top.htmlj is extracted.
- the mail transmitting unit 103 transmits the electronic mail 70 determined to be a normal electronic mail to the terminal device 3 of the destination user. If the terminal device 3 is a mobile phone device, the electronic mail 70 is transmitted at a timing determined to be a normal electronic mail. When the terminal device 3 is a personal computer, the e-mail 70 is temporarily stored in the user's mailbox 1D3. And there was a request from the terminal device 3 The transmission is performed in the evening.
- the e-mail 70 determined to be spam is deleted without being delivered to the user. However, instead of deleting the email immediately, it may be temporarily stored in the user's mailbox 1D3 separately from ordinary email. This allows the user to check the contents of the junk mail just before the junk mail is deleted. In this case, the unwanted mail is deleted from the mailbox 1D3 when instructed by the user or after a predetermined period of time.
- An e-mail 70 in which no URL of a Web site (an annoying site) registered in the annoying site information 72 is described is sent to the terminal device 3 even if the e-mail 70 is an annoying e-mail. Therefore, the user can request the e-mail server 1 not to send unsolicited e-mail guiding the unsolicited site in the future.
- the user operates the terminal device 3 to transfer the e-mail 70 (junk mail) received from the distributor to the e-mail server 1. For example, the e-mail 70b in FIG. 7 (b) is forwarded.
- the domain discriminating unit 105 extracts a domain name from the URL described in the unsolicited email. As a result, the domain to which the web site (nuisance site) that distributes the web page indicated by the URL belongs is determined. Generally, URLs are assigned based on the rules shown in Figure 8. Therefore, in the case of e-mail 70b, the domain name "dddd d.comj is extracted (determined).
- the unsolicited site identification unit 106 identifies a Web site indicated by the URL described in the unsolicited email based on the URL rule information 71 corresponding to the extracted domain. For the URL listed in the email 70 b According to the URL rule information 71 d of the domain “ddddd.com” shown in FIG. 5, it can be seen that the site name is described after the domain name. Therefore, the website is identified as "abcde”.
- the specified website is regarded as a spam site for the user who forwards the spam mail, and is added (registered) to the spam site information 72 of the user.
- the website (unwanted site) is registered to include the site name and the domain name in accordance with the rules shown in the URL rule information 71 of the domain to which the website belongs. For example, in the case of the above-mentioned website “abcde”, it is registered as “ddddd.com factory abcde” according to the URL rule information 71 d in FIG. However, if only one web site is formed in one domain, the domain name indicates the site name of the web site. Therefore, a domain name such as “aaaaa.co.jp” is registered in the unwanted site information 72.
- the user can refuse to receive unsolicited e-mail indicating the URL of the unsolicited site registered in the unsolicited unsolicited site information 72 in the future.
- Fig. 9 is a diagram illustrating the mechanism of the web page redirection function
- Fig. 10 is a diagram illustrating an example of an HTML file having a redirection code.
- a redirect function such as HTML or XML
- the distributor can send the company's website to the user without directly writing the URL of the website in the e-mail 70 delivered to the user. Can be viewed. This is due to the mechanism described in Figure 9.
- a distributor distributes an e-mail 70c as shown in FIG. 9 (a).
- the terminal device 3 activates the WWW browser, and the terminal device 3 shown in FIG. 9 (b) Download web page 74 (HTML file) from the dummy web site 5a.
- This HTML file contains the tag C1, which is the code of the redirect (jump), as shown in Figure 10. Therefore, the terminal device 3 accesses (redirects) the distributor's true Web site 5 b based on the tag C 1 and downloads the Web page 75.
- the distributor uses a so-called free provider to create new dummy websites one after another, such as website 5a, and frequently changes the URL in Fig. 9 (a) and spam users. To deliver. Therefore, even if the user registers the website 5a in the annoying site information 72 shown in FIG. 6, the user refuses to receive the annoying e-mail that indirectly guides the true website 5b of the distributor. I can't. Therefore, the e-mail server 1 performs the following processing to deal with such means.
- the first redirect destination acquisition unit 107 in FIG. 4 acquires the Web page based on the URL described in the e-mail 70 transferred from the terminal device 3 of the user. Search for the redirect code in the obtained web page. If there is a redirect code, extract the redirect destination URL indicated in the code. For example, when the HTML file shown in FIG. 10 is acquired as a web page, the URL “http://www.ppp.bbbbb.ne.jP/top:html” shown in the tag C1 is extracted.
- the domain determination unit 105 determines the domain to which the Web site that distributes the Web page indicated by the extracted URL belongs.
- the annoying site identification unit 106 identifies the site name of this Web site. Through these processes, this Web site is regarded as an annoying site, and is registered in the annoying site information 72 of the user who is the source of the unsolicited mail.
- the second redirect destination acquisition unit 108 acquires the Web page indicated by the URL described in the text of the e-mail 70 transmitted from the distributor.
- the junk e-mail discriminator 102 extracts the URL of the redirect destination from the redirect code (for example, tag C1 shown in FIG. 10) described on the acquired Web page.
- FIG. 11 is a flowchart for explaining an example of the flow of processing when relaying the delivery of e-mail
- FIG. 12 is a flowchart for explaining an example of the flow of processing when registering an annoying site.
- the URL described in the e-mail 70 is extracted (# 12). It is determined whether or not the e-mail 70 is junk mail based on the extracted URL and the junk site information 72a of the user A (# 13). If it is determined that the message is spam (Yes in # 13), the e-mail 70 is deleted (# 19). Alternatively, save it in mailbox 1 D3 of user A separately from ordinary e-mail, and delete it after a predetermined period.
- Step # 18 If it is determined that the message is not spam (No in # 13), an e-mail 70 is transmitted to the terminal device 3 of the user A (# 18). However, there is a possibility that the e-mail 70 is unsolicited e-mail that indirectly guides the distributor's website (Web site 5b) by means shown in Fig. 9 (b). is there. Therefore, the following processing may be performed before performing Step # 18.
- the web page pointed to by the URL extracted in step # 1 2 is obtained (# 14), and it is determined whether or not the web page includes a code for redirecting (jumping) to another web page. Judge (# 15).
- an e-mail 70 is transmitted to the terminal device 3 of the user A (# 18). If it is included, the URL of the redirect destination (jump destination) is extracted from the code (# 16), and similarly to step # 13, it is determined whether the e-mail 70 is spam (# 17) Then, according to the discrimination result, the e-mail 70 is deleted (# 19) or transmitted to the terminal device 3 of the user A (# 18).
- the process is performed as shown in FIG.
- the e-mail server 1 receives an e-mail 70b as shown in FIG. 7 (b) from the user A (# 21)
- the URL “http: @” described in the e-mail 70b is received.
- ddddd.com factory abcde / index.html ”(# 22) and identify the website that distributes the web page indicated by the URL (unwanted site) and the domain to which the unwanted site belongs (# twenty three) .
- the nuisance site “ddddd.com factory a bcdej” is registered in the nuisance site information 72 a of the user A (# 24).
- a dummy web page with a redirect code for example, a web page 5b in Fig. 9 (b)
- a redirect code for example, a web page 5b in Fig. 9 (b)
- the steps or steps # 15 to # 17 in Fig. 11 are performed until a web page without a redirect destination is reached (that is, the final unwanted site).
- Steps # 27 to # 29 in Step 12 may be repeated.
- the user can refuse to receive an e-mail that the user finds to be annoying irrespective of the e-mail address of the sender.
- the annoying site information 72 is stored for each user as shown in FIG. 6, but the annoying site information 72 common to all users may be stored.
- a website considered to be a harassment site by many users is registered in the common harassment site information 72.
- an administrator of the e-mail server 1 previously registers a website that distributes information contrary to public order and morals in the common nuisance site information 72.
- the e-mail server deletes the e-mail in which the URL of the Web page registered on the annoying site database is not sent to the user's terminal device. This is useful because it provides users with an environment where they can work efficiently without wasting time checking for unwanted e-mail. Also, since it is determined whether or not the e-mail is spam regardless of the sender's e-mail address, the junk e-mail can be deleted even if the e-mail is a fake e-mail address. This is useful in that it can be done.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02747713A EP1533958A4 (en) | 2002-07-22 | 2002-07-22 | SERVERS FOR ELECTRONIC POST, METHOD FOR DISTRIBUTION ELECTRONIC POST AND COMPUTER PROGRAM |
PCT/JP2002/007402 WO2004010662A1 (ja) | 2002-07-22 | 2002-07-22 | 電子メールサーバ、電子メールの受渡しの中継方法、およびコンピュータプログラム |
JP2004522703A JP3929464B2 (ja) | 2002-07-22 | 2002-07-22 | 電子メールサーバ、電子メールの受渡しの中継方法、およびコンピュータプログラム |
US10/521,945 US20060031298A1 (en) | 2002-07-22 | 2002-07-22 | Electronic mail server, electronic mail delivery relaying method, and computer program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2002/007402 WO2004010662A1 (ja) | 2002-07-22 | 2002-07-22 | 電子メールサーバ、電子メールの受渡しの中継方法、およびコンピュータプログラム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004010662A1 true WO2004010662A1 (ja) | 2004-01-29 |
Family
ID=30490767
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2002/007402 WO2004010662A1 (ja) | 2002-07-22 | 2002-07-22 | 電子メールサーバ、電子メールの受渡しの中継方法、およびコンピュータプログラム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20060031298A1 (ja) |
EP (1) | EP1533958A4 (ja) |
JP (1) | JP3929464B2 (ja) |
WO (1) | WO2004010662A1 (ja) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006268335A (ja) * | 2005-03-23 | 2006-10-05 | Nec Corp | 電子メールシステム、電子メールシステムにおけるリンク先のフィルタ方法およびプログラム |
DE102006014419A1 (de) * | 2006-03-27 | 2007-10-04 | TRüTZSCHLER GMBH & CO. KG | Vorrichtung an einer Spinnereivorbereitungsmaschine, insbesondere Karde, Krempel o. dgl., zur Einstellung des Kardierabstandes |
JP2007265368A (ja) * | 2006-03-02 | 2007-10-11 | Yafoo Japan Corp | スパム除去方法 |
US7890588B2 (en) | 2005-05-11 | 2011-02-15 | Ntt Docomo, Inc. | Unwanted mail discriminating apparatus and unwanted mail discriminating method |
JP2013242929A (ja) * | 2007-03-30 | 2013-12-05 | Canon Electronics Inc | ネットワーク管理システムおよびその方法、プログラム |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7472163B1 (en) * | 2002-10-07 | 2008-12-30 | Aol Llc | Bulk message identification |
WO2004055632A2 (en) | 2002-12-13 | 2004-07-01 | Wholesecurity, Inc. | Method, system, and computer program product for security within a global computer network |
US8145710B2 (en) | 2003-06-18 | 2012-03-27 | Symantec Corporation | System and method for filtering spam messages utilizing URL filtering module |
US7383306B2 (en) * | 2003-07-31 | 2008-06-03 | Hewlett-Packard Development Company, L.P. | System and method for selectively increasing message transaction costs |
US7539729B1 (en) * | 2003-09-15 | 2009-05-26 | Cloudmark, Inc. | Method and apparatus to enable mass message publications to reach a client equipped with a filter |
US8271588B1 (en) * | 2003-09-24 | 2012-09-18 | Symantec Corporation | System and method for filtering fraudulent email messages |
US8301702B2 (en) * | 2004-01-20 | 2012-10-30 | Cloudmark, Inc. | Method and an apparatus to screen electronic communications |
US7941490B1 (en) | 2004-05-11 | 2011-05-10 | Symantec Corporation | Method and apparatus for detecting spam in email messages and email attachments |
US7912905B2 (en) * | 2004-05-18 | 2011-03-22 | Computer Associates Think, Inc. | System and method for filtering network messages |
US20060026242A1 (en) * | 2004-07-30 | 2006-02-02 | Wireless Services Corp | Messaging spam detection |
JP4576265B2 (ja) * | 2005-03-14 | 2010-11-04 | 富士通株式会社 | Url危険度判定装置およびurl危険度判定システム |
US7739337B1 (en) | 2005-06-20 | 2010-06-15 | Symantec Corporation | Method and apparatus for grouping spam email messages |
US8010609B2 (en) * | 2005-06-20 | 2011-08-30 | Symantec Corporation | Method and apparatus for maintaining reputation lists of IP addresses to detect email spam |
US9152949B2 (en) * | 2006-05-17 | 2015-10-06 | International Business Machines Corporation | Methods and apparatus for identifying spam email |
US9172707B2 (en) * | 2007-12-19 | 2015-10-27 | Microsoft Technology Licensing, Llc | Reducing cross-site scripting attacks by segregating HTTP resources by subdomain |
US20090300012A1 (en) * | 2008-05-28 | 2009-12-03 | Barracuda Inc. | Multilevel intent analysis method for email filtration |
US8874662B2 (en) * | 2008-10-17 | 2014-10-28 | Alan Graham | Method and apparatus for controlling unsolicited messages in a messaging network using an authoritative domain name server |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999033188A2 (en) * | 1997-12-23 | 1999-07-01 | Bright Light Technologies, Inc. | Apparatus and method for controlling delivery of unsolicited electronic mail |
JP2000010880A (ja) * | 1998-06-22 | 2000-01-14 | Ricoh Co Ltd | 電子メール転送装置 |
GB2350747A (en) * | 1999-04-09 | 2000-12-06 | Ibm | Hindering undesired transmission or receipt of electronic messages |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6615242B1 (en) * | 1998-12-28 | 2003-09-02 | At&T Corp. | Automatic uniform resource locator-based message filter |
US6523120B1 (en) * | 1999-10-29 | 2003-02-18 | Rstar Corporation | Level-based network access restriction |
US6785666B1 (en) * | 2000-07-11 | 2004-08-31 | Revenue Science, Inc. | Method and system for parsing navigation information |
US7178099B2 (en) * | 2001-01-23 | 2007-02-13 | Inxight Software, Inc. | Meta-content analysis and annotation of email and other electronic documents |
US6954934B2 (en) * | 2001-03-15 | 2005-10-11 | Intel Corporation | Management of links to data embedded in blocks of data |
US8176125B2 (en) * | 2002-02-22 | 2012-05-08 | Access Company, Ltd. | Method and device for processing electronic mail undesirable for user |
JP3690599B2 (ja) * | 2002-03-22 | 2005-08-31 | 富士通株式会社 | 電子メール配信拒否方法及びその方法をコンピュータに行わせることを可能とするプログラム |
US20040006621A1 (en) * | 2002-06-27 | 2004-01-08 | Bellinson Craig Adam | Content filtering for web browsing |
-
2002
- 2002-07-22 JP JP2004522703A patent/JP3929464B2/ja not_active Expired - Fee Related
- 2002-07-22 US US10/521,945 patent/US20060031298A1/en not_active Abandoned
- 2002-07-22 EP EP02747713A patent/EP1533958A4/en not_active Withdrawn
- 2002-07-22 WO PCT/JP2002/007402 patent/WO2004010662A1/ja active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999033188A2 (en) * | 1997-12-23 | 1999-07-01 | Bright Light Technologies, Inc. | Apparatus and method for controlling delivery of unsolicited electronic mail |
JP2000010880A (ja) * | 1998-06-22 | 2000-01-14 | Ricoh Co Ltd | 電子メール転送装置 |
GB2350747A (en) * | 1999-04-09 | 2000-12-06 | Ibm | Hindering undesired transmission or receipt of electronic messages |
Non-Patent Citations (2)
Title |
---|
"Denshi mail to tenso anote konote", ASCII, vol. 25, no. 7, July 2001 (2001-07-01), pages 348 - 352, XP002972294 * |
See also references of EP1533958A4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006268335A (ja) * | 2005-03-23 | 2006-10-05 | Nec Corp | 電子メールシステム、電子メールシステムにおけるリンク先のフィルタ方法およびプログラム |
US7890588B2 (en) | 2005-05-11 | 2011-02-15 | Ntt Docomo, Inc. | Unwanted mail discriminating apparatus and unwanted mail discriminating method |
JP2007265368A (ja) * | 2006-03-02 | 2007-10-11 | Yafoo Japan Corp | スパム除去方法 |
JP4500285B2 (ja) * | 2006-03-02 | 2010-07-14 | ヤフー株式会社 | スパム除去方法 |
DE102006014419A1 (de) * | 2006-03-27 | 2007-10-04 | TRüTZSCHLER GMBH & CO. KG | Vorrichtung an einer Spinnereivorbereitungsmaschine, insbesondere Karde, Krempel o. dgl., zur Einstellung des Kardierabstandes |
JP2013242929A (ja) * | 2007-03-30 | 2013-12-05 | Canon Electronics Inc | ネットワーク管理システムおよびその方法、プログラム |
Also Published As
Publication number | Publication date |
---|---|
EP1533958A4 (en) | 2007-09-05 |
US20060031298A1 (en) | 2006-02-09 |
JP3929464B2 (ja) | 2007-06-13 |
JPWO2004010662A1 (ja) | 2005-11-17 |
EP1533958A1 (en) | 2005-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3929464B2 (ja) | 電子メールサーバ、電子メールの受渡しの中継方法、およびコンピュータプログラム | |
CA2673110C (en) | Method and system for intellegent processing of electronic information | |
US7870206B2 (en) | Method, computer program product, and user interface for making non-shared linked documents in electronic messages accessible to recipients | |
US20020019849A1 (en) | Information communication system | |
US20170039592A1 (en) | Advertisement coordination | |
US20020107925A1 (en) | Method and system for e-mail management | |
US20010044903A1 (en) | Information access method and network system | |
US20040258044A1 (en) | Method and apparatus for managing email messages | |
WO2008031871A1 (en) | Method for automatically classifying communication between a sender and a recipient | |
US20080177848A1 (en) | System and method of sharing and dissemination of electronic information | |
JP2005208780A (ja) | メールフィルタリングシステム及びそれに用いるurlブラックリスト動的構築方法 | |
US20100255861A1 (en) | System and Method for Transferring Contact Information to a Recipient | |
US8122025B2 (en) | Method of managing locations of information and information location management device | |
JP4007893B2 (ja) | サーバ装置、プログラムおよび記録媒体 | |
US20060264204A1 (en) | Method for sending a message waiting indication | |
JP4500285B2 (ja) | スパム除去方法 | |
JP2009093325A (ja) | 情報編集装置及びプログラム | |
KR20040072059A (ko) | 링크 유알엘 접속을 통한 스팸메일 자동 차단 방법 | |
JP4364899B2 (ja) | 電子メールサーバ、電子メールの受渡しの中継方法、およびコンピュータプログラム | |
JP3690599B2 (ja) | 電子メール配信拒否方法及びその方法をコンピュータに行わせることを可能とするプログラム | |
KR20010081731A (ko) | 전자우편 전용 프로그램을 이용하여 웹기반전자우편서비스 서버로부터 전자우편을 읽을 수 있는장치와 그 방법 | |
KR20090086929A (ko) | 주소정제 방법 | |
WO2008096346A2 (en) | System and method for enabling transfer of data and communication between individuals | |
TWI552545B (zh) | Electronic mail delivery method | |
KR20090088499A (ko) | 광고 데이터 제공방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004522703 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002747713 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2006031298 Country of ref document: US Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10521945 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2002747713 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10521945 Country of ref document: US |