WO2006048529A1 - Systeme et procede d'envoi de messages dans un reseau de communication par messagerie electronique, bases sur l'utilisation d'un filtre d'envoi. - Google Patents
Systeme et procede d'envoi de messages dans un reseau de communication par messagerie electronique, bases sur l'utilisation d'un filtre d'envoi. Download PDFInfo
- Publication number
- WO2006048529A1 WO2006048529A1 PCT/FR2005/002676 FR2005002676W WO2006048529A1 WO 2006048529 A1 WO2006048529 A1 WO 2006048529A1 FR 2005002676 W FR2005002676 W FR 2005002676W WO 2006048529 A1 WO2006048529 A1 WO 2006048529A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- address
- terminal
- sending
- list
- code
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
Definitions
- the present invention relates to a system and method for sending messages in an electronic communication network, based on the use of a sending filter, and for limiting the propagation of computer viruses and the disadvantages related to unsolicited messages.
- Communication networks such as the Internet, give their users access to, and allow them to exchange, virtually any type of information.
- instant messaging systems or couriers such as email, commonly referred to as email or email
- email the transmission and reception of information and become virtually instantaneous.
- the use of email has become widespread, allowing users to stay in touch more easily, to exchange information more frequently and without much effort.
- Email has, however, become an effective vector for spreading computer viruses. Indeed, viruses usually use email to spread from one terminal to another, within an attachment to the message sent. When the attachment is opened by the recipient, the virus is released and can act.
- Viruses that are capable of scanning the contents of the address book on the terminal on which they are running and spreading to all or appeared terminals whose address appears in this address book are particularly known. . The identity of the victim is thus fraudulently stolen to send an infected message to all terminals whose address is present in the address book of the victim.
- the invention thus relates, in a first aspect, to a method of sending messages in an electronic communication network comprising at least one sender access server.
- the sender access server is used by at least one sender terminal to connect to the communication network.
- the sender terminal has access to at least one list of terminal addresses.
- each list of addresses is modified to contain at least one erroneous sending code
- a selection step when sending a message to a destination terminal, of a list of addresses among the address lists,
- the sender terminal has access to at least one security code
- the method of the invention further comprises a step of insertion in the message of the security code, and a step of verification of compliance. of this security code inserted into the message.
- the security code is randomly and periodically set by the access server.
- the verification steps of the sending code and / or the security code are performed by the access server.
- the access server informs the sending terminal. and or . - blocks the sending of the message.
- each time a new terminal address is inserted in a first address list a sending code is associated with it in this first address list.
- the new address is then also inserted in the other address lists with a sending code identical to that associated with it in the first address list, or with, for at least one of the other address lists, a send code different from the one associated with it in the first address list.
- the number of duplications of the address list is configurable.
- the invention also relates, according to a second aspect, to a system for sending messages in an electronic communication network that implements the method of the invention as explained above.
- the invention relates, according to a third aspect, to a storage medium readable by a terminal, on which is stored a sequence of instructions which, when executed by a computer system, allows this computer system to implement the method of the invention as described above.
- the method and system of the invention advantageously allow blocking the sending of bulk messages to all users of an address book by malicious software or viruses. Indeed, such a virus, not knowing the existence of duplicate address lists will use the list of addresses or standard address book to proceed. It will then inevitably use an incorrect sending code for at least one of the addresses contained in the address book. The system will then detect the malicious operation and block the sending of messages and possibly inform the user.
- FIG. 1 schematically represents a system for sending electronic messages according to the invention
- FIGS. 2a, 2b, 2c show schematically the method of sending electronic messages according to the invention.
- FIG. 1 schematically represents a system for sending electronic messages according to the invention, in which there is a first access server 2 allowing a first terminal 3 to access the communication network 1, and a second server 5 access allowing a second terminal 4 to access the communication network 1.
- the communication network 1 is for example the Internet.
- Terminal means any terminal for sending and receiving e-mails. It may be for example a computer, as shown schematically in Figure 1, or an electronic personal assistant, a terminal with limited functions, entirely dedicated to electronic mail, a mobile phone supporting e-mail functions. In general, any electronic device 0 supporting the functions of electronic mail, able to connect to the communication network 1, by wire (telephone line for example) or wireless (GSM for example), may be suitable.
- wire telephone line for example
- GSM wireless
- the access server 2 may comprise a processor 21, a zone
- the memory 22 may equally well be a conventional structure with single or multiple registers, or a database. This description of a portion of the access server 2 is purely functional ⁇ ⁇ - and non-structural. "ERT Indeed, the memory 22 may well be structurally integrated into the processor 21, or module 23, for example. Similarly, the module 23 and the processor 22 may form only one entity.
- the memory 52 may equally well be a conventional structure with single or multiple registers, or a database. This description of a portion of the access server is also purely functional, and non-structural. Indeed, the memory 52 may very well be structurally integrated with the processor 51, or the module 53 for example. Similarly, the module 53 and the processor 52 may form a single entity.
- This access server therefore allows the terminal 4 to access the communication network 1. It allows this terminal 4 to receive messages sent by the terminal 3 via the access server 2. It should be noted, however, that the distinction between the two servers 4 and 5 access is given by way of example and is therefore not exhaustive of the invention. Indeed, an access server generally allowing multiple terminals to access the communication network, the terminals 3 and 4 can very well access this communication network 1 through the same access server 2. It then alternately plays the role of sender access server when it is used by one of the terminals to send a message to another, and recipient access server when it is used by one or other of the terminals to receive a message sent by the other.
- Figure 2a describes the part of the method of the invention which concerns the configuration and duplication of the address lists.
- - -. -A step consisting 10 ⁇ Coclé a "sending is assigned to each address contained in the original address list.
- These codes can be sent assigned automatically by the system, for example by a random generator, or manually by the user.
- This initial address list can be stored at the terminal 3 or in the memory 22 of the access server 2 sender. Also, this initial address list can be partially stored at the terminal 3 and partially stored in the memory 22 of the sender 2 access server.
- This operation can be performed at a local level, that is to say on the terminal 3, with appropriate messaging software in the case where the operation is automated, or at the level of the access server 2, by through the module 23 and / or the processor 21 in the case where the operation is automated, and wherever the list of addresses is stored.
- the initial address list is duplicated at least once, manually or automatically. Ideally, it is duplicated more than twice, in order to make the system more efficient. Preferably, the number N of duplications can be parameterized by the user.
- duplicate address lists can be stored at the terminal 3 or in the memory 22 of the access server 2 sender. Also, these duplicate address lists can be partially stored at the terminal 3 and partially stored in the memory 22 of the sender 2 access server.
- this operation can be performed at a local level, that is to say on the terminal 3, with an appropriate messaging software in the case where the operation is automated, or at the level of the access server 2 , through the module 23 and / or the processor 21 in the case where the operation is automated, and wherever the address list is stored
- step 30 starts a loop on all the address lists at .cours lattle- of these "last will all be moditiées to contain at least one address for which the send code is wrong. Ideally, each address list will contain several addresses for which the sending code is wrong. The number of its addresses with an incorrect sending code depends on the number of total addresses and the number of address lists. It can be calculated automatically by the system, or set manually.
- step 31 at least one sending code, associated with an address Am, in the address list Ln, is modified so as to make it erroneous.
- step 32 the information that the sending code associated with the address Am in the address list Ln is wrong, is archived, preferably encrypted. This archiving can be at the level of the terminal 3, or at the memory 22 of the sender access server 2, or distributed on both the terminal 3 and the memory 22 of the sender access server 2. Alternatively, the archived information may also be the information complementary to the previous one, namely the fact that the sending code associated with a given address is correct in a number of lists of given addresses.
- Step 40 symbolizes the end of the part of the method of the invention which concerns the configuration and duplication of the address lists.
- FIG. 2b describes the part of the method of the invention relating to the insertion of a new address into all available addresses for sending messages.
- step 50 a new address is inserted automatically or manually into any of the address lists.
- step 60 a sending code is assigned to it in this address list, again manually or automatically (via a random generator for example).
- step 70 begins a loop on all the address lists, during which they will all be updated to include this new address.
- step 71 the new address Am is inserted in the address list Ln.
- step 72 a sending code, generated manually or automatically (for example randomly), is associated with the new address Am. This sending code can be chosen so as to be an erroneous sending code, or no. The system decides based on the total number of address lists, and the total number of addresses.
- step 73 the information that the sending code associated with the address Am in the address list Ln is wrong, is archived, preferably encrypted.
- This archiving can be at the level of the terminal 3, or at the memory 22 of the sender access server 2, or distributed on both the terminal 3 and the memory 22 of the sender access server 2.
- the archived information may also be the information complementary to the previous one, namely the fact that the sending code associated with a given address is correct in a number of lists of given addresses.
- Step 80 symbolizes the end of the part of the method of the invention which concerns the insertion of a new address in all available addresses to send messages.
- FIG. 2c describes the sending of a message by the terminal 3 to the terminal 4 according to the method of the invention.
- a user of the terminal 3 connects to the electronic messaging system to send a message to the user of the terminal 4.
- This operation can be performed locally, with appropriate messaging software installed on the sending terminal. . It can also be performed from any terminal connected to the network directly at the sender access server 2, typically through a so-called "web mail" service.
- Step 110 corresponds to the selection of a list of addresses from the N lists of available addresses, in which is the address of the 0 --- recipient-with its associated sending code.
- ⁇ _ operation can be performed manually, but preferably this operation is performed automatically by the system of the invention which determines the list of addresses to select, based on the information archived in step 32 and / or step 73.
- step 120 is implemented, during which the sending code associated with the address of the recipient which is in the list of previously selected addresses, is inserted in the message.
- the insertion may take place anywhere in the message, for example, but not necessarily, in the subject field of the message.
- a security code fixed for example randomly and periodically by the access server 2
- this security code is stored encrypted on the terminal
- the method of the invention can provide that each new connection of the terminal 3 sender to the network through its server 2 of access, it verifies that the security code stored on the terminal is the security code of the day. If this is not the case, the access server unloads the new security code instead of the previous one on the terminal.
- step 140 after having received the message sent by the sender terminal 3 if this sending was made locally, the access server 2 proceeds to verify the validity of the message sent. Specifically, in step 141, the access server 2 checks whether the sending code present in the message complies with the expected sending code for the recipient of the message. This check may be based on the data archived during the steps of 32 and / or 73. If the sending code is not compliant, step 141 is followed by step 160, during which the system blocks the message. This step 160 is itself followed by - the diligent- 170 -during "of" 2 wherein the access server notifies the user of the terminal 3 of the blocking message.
- step 141 is followed by step 142 in which the access server 2 checks whether the security code present in the message complies with the expected security code (independent of the recipient). If this security code is not compliant, step 142 is followed by steps 160 and 170 described above. Otherwise, that is to say, if the security code is compliant, the access server 2 proceeds to send the message in a conventional manner (step 150).
- the method and system of the invention advantageously allow blocking the sending of bulk messages to all users of an address book by malicious software or viruses. Indeed, such a virus, not knowing the existence of duplicate address lists will use the list of addresses or standard address book to proceed. Even if he knows the structure of the address list with the presence of the sending codes, he will then inevitably use an incorrect sending code for at least one of the addresses contained in the address book. The system will then detect the malicious operation and block the sending of messages and possibly inform the user
- terminals to connect to the network is not limited to the invention.
- terminal means any terminal for sending and receiving electronic messages. It may be for example a simple computer, or an electronic personal assistant, a limited-function terminal entirely dedicated to electronic mail, a - phone " portable supporting e-mail functions.
- any electronic device supporting the functions of electronic messaging able to connect to the communication network, by wired (telephone line for example) or wireless (GSM for example), may be suitable.
- the same terminal can be used by the sending user on the one hand and the recipient user on the other hand, playing in turn the role of sender terminal which connects to the network via a sender access server, and destination terminal that connects to the network via a destination access server, the latter may be the same as the sending access server as specified above.
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0411657A FR2877528B1 (fr) | 2004-11-02 | 2004-11-02 | Systeme et procede d'envoi de messages dans un reseau de communication par messagerie electronique, bases sur l'utilisation d'un filtre d'envoi |
FR0411657 | 2004-11-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006048529A1 true WO2006048529A1 (fr) | 2006-05-11 |
Family
ID=34951477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2005/002676 WO2006048529A1 (fr) | 2004-11-02 | 2005-10-26 | Systeme et procede d'envoi de messages dans un reseau de communication par messagerie electronique, bases sur l'utilisation d'un filtre d'envoi. |
Country Status (3)
Country | Link |
---|---|
US (1) | US20060095523A1 (fr) |
FR (1) | FR2877528B1 (fr) |
WO (1) | WO2006048529A1 (fr) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1280039A2 (fr) * | 2001-07-26 | 2003-01-29 | Networks Associates Technology, Inc. | Détection de code malveillant distribué par le courrier électronique |
US20030154394A1 (en) * | 2002-02-13 | 2003-08-14 | Levin Lawrence R. | Computer virus control |
US20040073617A1 (en) * | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
-
2004
- 2004-11-02 FR FR0411657A patent/FR2877528B1/fr not_active Expired - Fee Related
-
2005
- 2005-06-17 US US11/156,278 patent/US20060095523A1/en not_active Abandoned
- 2005-10-26 WO PCT/FR2005/002676 patent/WO2006048529A1/fr not_active Application Discontinuation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073617A1 (en) * | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
EP1280039A2 (fr) * | 2001-07-26 | 2003-01-29 | Networks Associates Technology, Inc. | Détection de code malveillant distribué par le courrier électronique |
US20030154394A1 (en) * | 2002-02-13 | 2003-08-14 | Levin Lawrence R. | Computer virus control |
Also Published As
Publication number | Publication date |
---|---|
US20060095523A1 (en) | 2006-05-04 |
FR2877528B1 (fr) | 2007-02-02 |
FR2877528A1 (fr) | 2006-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2692089B1 (fr) | Mécanisme de redirection entrante sur un proxy inverse | |
EP1643710A1 (fr) | Procédé de mise à jour d'une table de correspondance entre une adresse et un numéro d'identification | |
WO2006035140A1 (fr) | Procede, dispositif et programme de detection d'usurpation de point d'acces. | |
EP3365829B1 (fr) | Procédé d'aide a la détection d'infection d'un terminal par un logiciel malveillant | |
EP1834469B1 (fr) | Dispositif de connexion automatique au réseau Internet | |
EP3622688B1 (fr) | Singularisation de trames à émettre par un objet connecté et blocage de trames réémises sur un réseau de communication sans-fil basse consommation | |
EP1935149B1 (fr) | Procede et systeme de notification de reception de messages asynchrones | |
WO2006048529A1 (fr) | Systeme et procede d'envoi de messages dans un reseau de communication par messagerie electronique, bases sur l'utilisation d'un filtre d'envoi. | |
FR3093833A1 (fr) | Procédé d’optimisation d’échanges de données dans une infrastructure d’objets connectés | |
FR2877114A1 (fr) | Systeme et procede de gestion de messages dans un reseau de communication par messagerie electronique | |
EP3641268A1 (fr) | Procédé de communication d'un objet avec un réseau d'objets connectés pour signaler qu'un clone se fait potentiellement passer pour l'objet dans le réseau | |
FR3056873A1 (fr) | Procedes d'echange de messages et de gestion de messages, terminal et serveur de messagerie | |
EP0666671A1 (fr) | Communication sur réseau numérique, avec anti-virus | |
FR2998747A1 (fr) | Procede d'aiguillage d'un message | |
FR3110800A1 (fr) | Procédé de notification d’un terminal mobile | |
EP3840312A1 (fr) | Transfert de données vers des dispositifs de stockage | |
FR3096479A1 (fr) | Procédé de vérification qu’un utilisateur d’un site web est un être humain, et plateforme de vérification associée | |
FR3109692A1 (fr) | Procédé de gestion d’une phase de demande d’appairage entre dispositifs de traitement de données. | |
WO2012035236A1 (fr) | Gestion de l'acces au statut d'une ressource | |
WO2011023904A1 (fr) | Procede de diffusion d'un contenu dans un reseau de telecommunications de maniere geolocalisee | |
FR3089089A1 (fr) | Procédé pour l’optimisation par type de message de l’échange de données entre objets connectés | |
WO2016083476A1 (fr) | Procédé de notification de messages | |
EP1689158A1 (fr) | Procédé de configuration d'un terminal fixe | |
FR2860676A1 (fr) | Procede et systeme d'echange d'informations point a point par l'intermediaire d'un reseau de diffusion | |
FR3022375A1 (fr) | Procede et dispositif de securisation d'un systeme protege par mot de passe |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: CONSTATATION DE LA PERTE D UN DROIT CONFORMEMENT A LA REGLE 69(1) CBE (FORM 1205A, 21.08.2007) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 05815070 Country of ref document: EP Kind code of ref document: A1 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 5815070 Country of ref document: EP |