WO2006138526A2 - Method and apparatus for reducing spam on peer-to-peer networks - Google Patents
Method and apparatus for reducing spam on peer-to-peer networks Download PDFInfo
- Publication number
- WO2006138526A2 WO2006138526A2 PCT/US2006/023425 US2006023425W WO2006138526A2 WO 2006138526 A2 WO2006138526 A2 WO 2006138526A2 US 2006023425 W US2006023425 W US 2006023425W WO 2006138526 A2 WO2006138526 A2 WO 2006138526A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- decoy
- message
- search
- word
- spam
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Definitions
- the present invention relates generally to computing networks and relates more particularly to the propagation of spam (e.g., unsolicited or spoofed data) over peer-to-peer data transfer networks.
- spam e.g., unsolicited or spoofed data
- FIG. 1 is a schematic diagram of a network 100 of nodes (e.g., computing devices) interacting in a peer-to-peer (P2P) manner.
- a requesting node 101 sends a search message 105 (e.g., containing keywords relating to data that the requesting node 101 wishes to locate) to at least one intermediate node 111 in communication with the requesting node 101 via a peer connection.
- the intermediate node 111 receives the search message 105 and forwards the search message 105 to at least one additional node 111.
- the search message 105 reaches at least one responding node 103 having the requested data (in some cases, the first intermediate node 111 to which the search message 105 is forwarded will also be a responding node 103). At least one responding node 103 then sends a response message 107 back to the requesting node 101, e.g., via the intermediate nodes 111. The requesting node 101 then requests the relevant data from a responding node 103 by connecting directly to the responding node 103, e.g., via direct connection 109.
- a responding node 103 may even send spam content in response to substantially any search message that is received, regardless of the keywords included in the search message.
- a responding node 103 may indicate that it has a file labeled "Joes_poetry.mp3" or "JoesPoetry.wmv”.
- the file instead of containing content related to Joe's poetry, the file in fact contains an advertisement for a product completely unrelated to Joe or poetry. If the user at the requesting node does not immediately check the content of the transferred file, he or she may be unaware that the transferred file contains spam and may unknowingly share the spam content with other users on the P2P network.
- One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network.
- Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content).
- Figure 1 is a schematic diagram of a network of nodes interacting in a peer-to- peer manner
- Figure 2 is a flow diagram illustrating one embodiment of a method for reducing spam on a P2P network, according to the present invention
- Figure 3 is a flow diagram illustrating a second embodiment of a method for reducing spam on a P2P network, according to the present invention.
- Figure 4 is a high level block diagram of the spam reduction method that is implemented using a general purpose computing device.
- the present invention is a method and apparatus for reducing spam in P2P networks.
- Embodiments of the present invention make it possible for a user to identify disguised spam sent in response to search messages before downloading the associated data, so that the user does not download and subsequently potentially share the spam with other users.
- Embodiments of the present invention are especially effective in identifying nodes that send spam in response to substantially any search message that they receive, regardless of the content of the search message.
- node refers to a computing device such as a personal computing device (e.g., a desk top computer, a laptop computer, a cellular telephone, a personal digital assistant, etc.), a server, a router or the like that is connected to a P2P network.
- a personal computing device e.g., a desk top computer, a laptop computer, a cellular telephone, a personal digital assistant, etc.
- server e.g., a server, a router or the like that is connected to a P2P network.
- FIG. 2 is a flow diagram illustrating one embodiment of a method 200 for reducing spam on a P2P network, according to the present invention.
- the method 200 may be implemented at, for example, a node in a P2P network.
- the method 200 is initialized at step 202 and proceeds to step 204, where the method 200 receives a search message, e.g., from a user of the node that is the source of the search message.
- the search message comprises, for example, one or more search keywords relating to data that a user wishes to search for in the network.
- the search message might comprise the words "Joe Smith" and "Happy Birthday” to indicate that the user wishes to search for media files related to Joe Smith's "Happy Birthday” album or song.
- the method 200 adds at least one "decoy" word to the search message received in step 204.
- the decoy word is a natural word that is unrelated to the keywords in the search message.
- decoy words are selected arbitrarily from a dictionary for insertion in the search message.
- decoy words are fanciful or made up words. For instance, in the example above, the method 200 might add the words “elephant”, “giraffe” and “dinosaur” to the search message containing the words "Joe Smith" and "Happy Birthday”.
- the number of decoy words that are added to the search message is predefined. For example, a user may specify that a fixed number of decoy words automatically be added to each search message, or that added decoy words comprise a fixed percentage of the total number of words or characters in the original search message. In another embodiment, the number of decoy words added to the search message is based on the lengths of previous search messages sent by the user (e.g., a number of decoy words may be added so that the length of the search message, including the decoy words, substantially matches the average length of previous search messages).
- step 208 the method 200 sends the search message, including the decoy words, e.g., in accordance with typical P2P protocols.
- the method 200 then receives at least one response message responding to the search message in step 210.
- the method 200 may specify that response messages stop being accepted after a specified period of time has elapsed or after a specified number of response messages has been received, in order to prevent response messages from being received indefinitely.
- step 212 examines a received response message. Specifically, the method 200 examines the content of the response message. In step 214, the method 200 determines whether the response message contains any of the decoy words that were added to the search message in step 206.
- a response message contains "enough" decoy words to be categorized as spam if the response message includes at least a predefined threshold number of decoy words or if decoy words comprise at least a predefined threshold percentage of the total number of words or characters in the response message. In one embodiment, responses that are categorized as spam are discarded.
- the method 200 may present the categorization results (e.g., from steps 216 and 218) to the user as a visual display, where the visual display represents an initial filtering of received response messages by the method 200, and the user may review the initial filtering results in order to verify the proper categorization of the received response messages (e.g., in a manner similar to the filtering of electronic mail by many commercial electronic mail providers).
- the method 200 may present "spam" and "non-spam" response messages in separate windows or panes on the user's display, or may flag response messages as "spam” or “non-spam” (e.g., using one or more icons).
- step 220 determines whether any unexamined response messages remain. If the method 200 determines that there is at least one unexamined response message, the method 200 returns to step 212 and proceeds as described above to examine and categorize the next response message. Alternatively, if the method 200 determines that no unexamined response messages remain, the method 200 terminates in step
- the method 200 thereby enables a user on a P2P network to quickly identify spammers within the network.
- the method 200 is able to weed out response messages from nodes that respond to substantially any search message they receive, which is a typical approach that spammers take.
- a user can avoid not only downloading spam, but sharing the spam with other users who subsequently download data from the user.
- the user can choose, based on the information gleaned via application of the method 200, to sever the connection to the spammer, thereby potentially isolating the spammer and preventing him or her from distributing any more spam.
- the user may decide simply to ignore all messages sent from the spammer for a predefined period of time.
- the method 200 may add a network identifier (e.g., an IP address) of the spammer to a list of known spammer nodes, where all messages received from nodes on the list are to be ignored for a predefined period of time.
- a network identifier e.g., an IP address
- FIG. 3 is a flow diagram illustrating a second embodiment of a method 300 for reducing spam on a P2P network, according to the present invention.
- the method 300 is tailored to data transfer networks in which search messages are considered to be the logical AND (e.g., only data matching all keywords in the search message will generate a search response).
- the method 300 may be implemented at, for example, a node in a P2P network.
- the method 300 is initialized at step 302 and proceeds to step 304, where the method 300 constructs a search message using only decoy words. Similar to the decoy words used in the method 200, the decoy words used to construct the search message in step 304 comprise arbitrary, individually un-related natural words, for example selected from a dictionary. Thus, for example, a search message constructed in step 304 might contain the words "elephant", "orange” and "hockey".
- step 306 the method 300 sends the search message e.g., in accordance with typical P2P protocols.
- the method 300 then receives at least one response message responding to the search message in step 308.
- the method 300 may specify that response messages stop being accepted after a specified period of time has elapsed or after a specified number of response messages has been received, in order to prevent response messages from being received indefinitely.
- the method 300 proceeds to step 310 and examines a received response message. Specifically, the method 300 examines the response message to determine the sender of the response message ⁇ e.g., as identified by an IP address associated with the response message).
- the method 300 categorizes the sender of the response message as a spammer (e.g., a node that is known to send spam). The method 300 may then decide to ignore all messages sent from the sender for a predefined period of time. In one embodiment, the method 300 adds a network identifier (e.g., an IP address) of the sender to a list of known spammer nodes, where all messages received from nodes on the list are to be ignored for a predefined period of time.
- a network identifier e.g., an IP address
- step 314 determines whether any unexamined response messages remain. If the method 300 determines that there is at least one unexamined response message, the method 300 returns to step 310 and proceeds as described above to examine and categorize the sender of the next response message. Alternatively, if the method 300 determines that no unexamined response messages remain, the method 300 terminates in step 316.
- FIG. 4 is a high level block diagram of the spam reduction method that is implemented using a general purpose computing device 400.
- a general purpose computing device 400 comprises a processor 402, a memory 404, a spam reduction module 405 and various input/output (I/O) devices 406 such as a display, a keyboard, a mouse, a modem, and the like.
- I/O devices 406 such as a display, a keyboard, a mouse, a modem, and the like.
- at least one I/O device is a storage device (e.g., a disk drive, an optical disk drive, a floppy disk drive).
- the spam reduction module 405 can be implemented as a physical device or subsystem that is coupled to a processor through a communication channel.
- the spam reduction module 405 can be represented by one or more software applications (or even a combination of software and hardware, e.g., using Application Specific Integrated Circuits (ASIC)), where the software is loaded from a storage medium (e.g., I/O devices 406) and operated by the processor 402 in the memory 404 of the general purpose computing device 400.
- ASIC Application Specific Integrated Circuits
- the spam reduction module 405 for reducing spam in a P2P network described herein with reference to the preceding Figures can be stored on a computer readable medium or carrier (e.g., RAM, magnetic or optical drive or diskette, and the like).
- the present invention represents a significant advancement in the field of data transfer networks.
- a method and apparatus are provided that make it possible for a user to identify disguised spam sent in response to search messages before downloading the associated data, so that the user does not download and subsequently potentially share the spam with other users.
- the spreading of spam through a network is substantially reduced.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Operations Research (AREA)
- Data Mining & Analysis (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP06773312.1A EP1891540A4 (en) | 2005-06-15 | 2006-06-15 | METHOD AND DEVICE FOR REDUCING GARBAGE MAIL ON POST-MAIL NETWORKS |
| CN2006800167997A CN101341477B (zh) | 2005-06-15 | 2006-06-15 | 用于减少对等网络上的垃圾信息的方法和装置 |
| JP2008517125A JP4791539B2 (ja) | 2005-06-15 | 2006-06-15 | ピア・ツー・ピア・ネットワーク上のスパムを減らす方法および装置 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/152,890 | 2005-06-15 | ||
| US11/152,890 US7552230B2 (en) | 2005-06-15 | 2005-06-15 | Method and apparatus for reducing spam on peer-to-peer networks |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2006138526A2 true WO2006138526A2 (en) | 2006-12-28 |
| WO2006138526A3 WO2006138526A3 (en) | 2008-07-24 |
Family
ID=37571204
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2006/023425 Ceased WO2006138526A2 (en) | 2005-06-15 | 2006-06-15 | Method and apparatus for reducing spam on peer-to-peer networks |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US7552230B2 (enExample) |
| EP (1) | EP1891540A4 (enExample) |
| JP (1) | JP4791539B2 (enExample) |
| CN (1) | CN101341477B (enExample) |
| WO (1) | WO2006138526A2 (enExample) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009524293A (ja) * | 2006-01-13 | 2009-06-25 | インターナショナル・ビジネス・マシーンズ・コーポレーション | ピアツーピアでのカルマおよび信頼を確立する方法ならびにその装置 |
| JP2009302823A (ja) * | 2008-06-12 | 2009-12-24 | Nec Biglobe Ltd | 電子メールシステム、電子メール転送方法、プログラム |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7567959B2 (en) | 2004-07-26 | 2009-07-28 | Google Inc. | Multiple index based information retrieval system |
| US7702618B1 (en) | 2004-07-26 | 2010-04-20 | Google Inc. | Information retrieval system for archiving multiple document versions |
| US7711679B2 (en) | 2004-07-26 | 2010-05-04 | Google Inc. | Phrase-based detection of duplicate documents in an information retrieval system |
| US7580921B2 (en) * | 2004-07-26 | 2009-08-25 | Google Inc. | Phrase identification in an information retrieval system |
| US8117223B2 (en) | 2007-09-07 | 2012-02-14 | Google Inc. | Integrating external related phrase information into a phrase-based indexing information retrieval system |
| WO2010070646A1 (en) * | 2008-12-18 | 2010-06-24 | Tipayo Ltd | A system and method enabling agents to interact with p2p networks to perform required processing |
| US10229219B2 (en) * | 2015-05-01 | 2019-03-12 | Facebook, Inc. | Systems and methods for demotion of content items in a feed |
| JP6489983B2 (ja) * | 2015-09-16 | 2019-03-27 | 株式会社東海理化電機製作所 | センサ構造及びこれを用いたパワーウインドウ制御装置 |
| CN107426147A (zh) * | 2016-03-28 | 2017-12-01 | 阿里巴巴集团控股有限公司 | 用于确定应用的反垃圾性能的方法与设备 |
| US11861304B2 (en) * | 2019-05-13 | 2024-01-02 | Mcafee, Llc | Methods, apparatus, and systems to generate regex and detect data similarity |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE69836545T2 (de) * | 1997-07-24 | 2007-05-16 | Tumbleweed Communications Corp., Redwood City | Firewall für elektronische post mit verschlüsselung/entschlüsselung mittels gespeicherter schlüssel |
| US7389413B2 (en) * | 1998-07-23 | 2008-06-17 | Tumbleweed Communications Corp. | Method and system for filtering communication |
| US6360215B1 (en) * | 1998-11-03 | 2002-03-19 | Inktomi Corporation | Method and apparatus for retrieving documents based on information other than document content |
| US6654787B1 (en) * | 1998-12-31 | 2003-11-25 | Brightmail, Incorporated | Method and apparatus for filtering e-mail |
| US7032030B1 (en) * | 1999-03-11 | 2006-04-18 | John David Codignotto | Message publishing system and method |
| JP2002007234A (ja) * | 2000-06-20 | 2002-01-11 | Mitsubishi Electric Corp | 不正メッセージ検出装置、不正メッセージ対策システム、不正メッセージ検出方法、不正メッセージ対策方法、及びコンピュータ読み取り可能な記録媒体 |
| JP3495030B2 (ja) * | 2001-02-14 | 2004-02-09 | 三菱電機株式会社 | 不正侵入データ対策処理装置、不正侵入データ対策処理方法及び不正侵入データ対策処理システム |
| US20020194489A1 (en) | 2001-06-18 | 2002-12-19 | Gal Almogy | System and method of virus containment in computer networks |
| EP1476819B1 (en) * | 2002-02-19 | 2009-04-01 | Postini, Inc. | E-mail management services |
| KR100460322B1 (ko) | 2002-05-31 | 2004-12-08 | (주) 시큐컴 | 스팸메일 방지 시스템 및 방법 |
| US20030229672A1 (en) | 2002-06-05 | 2003-12-11 | Kohn Daniel Mark | Enforceable spam identification and reduction system, and method thereof |
| US8090798B2 (en) * | 2002-08-12 | 2012-01-03 | Morganstein | System and methods for direct targeted media advertising over peer-to-peer networks |
| US7293065B2 (en) * | 2002-11-20 | 2007-11-06 | Return Path | Method of electronic message delivery with penalties for unsolicited messages |
| US7219148B2 (en) | 2003-03-03 | 2007-05-15 | Microsoft Corporation | Feedback loop for spam prevention |
| US7320020B2 (en) * | 2003-04-17 | 2008-01-15 | The Go Daddy Group, Inc. | Mail server probability spam filter |
| US20070005970A1 (en) * | 2003-05-21 | 2007-01-04 | Trupp Steven E | E-mail authentication protocol or MAP |
| US20050076220A1 (en) * | 2003-10-02 | 2005-04-07 | Xiao Quan Zhang | Method and System for Using a Point System to Deliver Advertisement Emails and to Stop Spam |
| US7257564B2 (en) * | 2003-10-03 | 2007-08-14 | Tumbleweed Communications Corp. | Dynamic message filtering |
| US7493322B2 (en) | 2003-10-15 | 2009-02-17 | Xerox Corporation | System and method for computing a measure of similarity between documents |
| US7181498B2 (en) * | 2003-10-31 | 2007-02-20 | Yahoo! Inc. | Community-based green list for antispam |
| US20050120019A1 (en) | 2003-11-29 | 2005-06-02 | International Business Machines Corporation | Method and apparatus for the automatic identification of unsolicited e-mail messages (SPAM) |
| US20060168042A1 (en) * | 2005-01-07 | 2006-07-27 | International Business Machines Corporation | Mechanism for mitigating the problem of unsolicited email (also known as "spam" |
| EP2171666A4 (en) * | 2007-06-11 | 2012-05-09 | Tiversa Inc | SYSTEM AND METHOD FOR PASSING ADVERTISEMENTS IN A NETWORK OF PEERS |
-
2005
- 2005-06-15 US US11/152,890 patent/US7552230B2/en not_active Expired - Fee Related
-
2006
- 2006-06-15 CN CN2006800167997A patent/CN101341477B/zh not_active Expired - Fee Related
- 2006-06-15 EP EP06773312.1A patent/EP1891540A4/en not_active Withdrawn
- 2006-06-15 WO PCT/US2006/023425 patent/WO2006138526A2/en not_active Ceased
- 2006-06-15 JP JP2008517125A patent/JP4791539B2/ja not_active Expired - Fee Related
-
2008
- 2008-06-27 US US12/163,439 patent/US7962643B2/en not_active Expired - Fee Related
Non-Patent Citations (1)
| Title |
|---|
| See references of EP1891540A4 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2009524293A (ja) * | 2006-01-13 | 2009-06-25 | インターナショナル・ビジネス・マシーンズ・コーポレーション | ピアツーピアでのカルマおよび信頼を確立する方法ならびにその装置 |
| JP2009302823A (ja) * | 2008-06-12 | 2009-12-24 | Nec Biglobe Ltd | 電子メールシステム、電子メール転送方法、プログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| EP1891540A4 (en) | 2014-06-11 |
| US20080263202A1 (en) | 2008-10-23 |
| US20070011347A1 (en) | 2007-01-11 |
| CN101341477B (zh) | 2012-02-01 |
| JP2008547095A (ja) | 2008-12-25 |
| US7552230B2 (en) | 2009-06-23 |
| JP4791539B2 (ja) | 2011-10-12 |
| US7962643B2 (en) | 2011-06-14 |
| CN101341477A (zh) | 2009-01-07 |
| WO2006138526A3 (en) | 2008-07-24 |
| EP1891540A2 (en) | 2008-02-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7962643B2 (en) | Method and apparatus for reducing spam on peer-to-peer networks | |
| US10904186B1 (en) | Email processing for enhanced email privacy and security | |
| US10587550B1 (en) | System and method for evaluating domains to send emails while maintaining sender reputation | |
| US20070027857A1 (en) | System and method for searching multimedia and download the search result to mobile devices | |
| US7359941B2 (en) | Method and apparatus for filtering spam email | |
| US10062054B2 (en) | Computerized method and system for establishing a network connection based on a contact list automatically seeded from network behavioral analysis of a user | |
| JP5208358B2 (ja) | ナレッジ交換プロファイルを生成する方法、システム、および装置 | |
| US20020107925A1 (en) | Method and system for e-mail management | |
| CN1592229B (zh) | 基于url的电子通讯和网页过滤 | |
| US7660864B2 (en) | System and method for user notification | |
| US20080104184A1 (en) | Using Distinguishing Properties to Classify Messages | |
| US8280970B2 (en) | Method and apparatus for improving data transfers in peer-to-peer networks | |
| US8650245B1 (en) | Systems and methods for providing adaptive views of domain name system reputation data | |
| EP2210391A2 (en) | System and method for customized sharing of multimedia content in a communications network | |
| US20060122957A1 (en) | Method and system to detect e-mail spam using concept categorization of linked content | |
| US9246860B2 (en) | System, method and computer program product for gathering information relating to electronic content utilizing a DNS server | |
| US20070094321A1 (en) | General purpose rss catcher | |
| CN1901695B (zh) | 使用vm应用程序的短消息管理系统与移动通信终端 | |
| CN101257461A (zh) | 基于分类的内容过滤方法及其装置 | |
| US7706263B2 (en) | Tracking and blocking of spam directed to clipping services | |
| EP2992446B1 (en) | Apparatus and method for augmenting a message to facilitate spam identification | |
| CN101083633B (zh) | 信息搜索系统及搜索方法 | |
| US10462246B2 (en) | Unified content posting | |
| KR101853388B1 (ko) | 소외 광고용 소셜 컨텍스트 | |
| Both | Combating Spam |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 200680016799.7 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| ENP | Entry into the national phase |
Ref document number: 2008517125 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2006773312 Country of ref document: EP |