WO2010107031A1 - Relay device, setting update method, and program - Google Patents

Relay device, setting update method, and program Download PDF

Info

Publication number
WO2010107031A1
WO2010107031A1 PCT/JP2010/054455 JP2010054455W WO2010107031A1 WO 2010107031 A1 WO2010107031 A1 WO 2010107031A1 JP 2010054455 W JP2010054455 W JP 2010054455W WO 2010107031 A1 WO2010107031 A1 WO 2010107031A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
setting
mail
address
setting data
Prior art date
Application number
PCT/JP2010/054455
Other languages
French (fr)
Japanese (ja)
Inventor
慎吾 梅島
雅行 水嶋
良信 岩崎
Original Assignee
ヤマハ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ヤマハ株式会社 filed Critical ヤマハ株式会社
Priority to CN201080012509.8A priority Critical patent/CN102356611B/en
Publication of WO2010107031A1 publication Critical patent/WO2010107031A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding

Definitions

  • the present invention relates to a technique for updating setting of a relay device.
  • the relay device is a network device that performs data transfer according to the protocol of the third layer (network layer) or the fourth layer (transport layer) in the OSI (Open Systems Interconnection) reference model.
  • Many relay devices refuse to forward packets that have a certain IP address as the source IP address or destination IP address, or refuse to forward packets that have a certain port number as the source port number or destination port number.
  • These settings can be customized from an external computer.
  • a user who customizes the settings of this type of relay device accesses a URL (Uniform Resource Locator) of setting utility screen data in the relay device from a computer connected to the relay device, and causes the computer to display a setting utility screen. Then, the user inputs an ID and password, which are unique account information, on the setting utility screen.
  • URL Uniform Resource Locator
  • the computer transmits the ID and password to the relay device.
  • the relay device regards the computer as a user having a legitimate authority and follows the command transmitted from the computer thereafter. (See, for example, Patent Document 1).
  • an administrator of this type of relay device grants the user the authority to customize the settings of the relay device, the administrator sets the account information unique to that user in the relay device. Therefore, if there are circumstances such as giving the authority to customize the settings of the relay device to many users or changing the user who gives the authority later, the burden of setting account information by the administrator is heavy. It becomes. On the other hand, if no account information is set in the relay device, and all computers that access the URL of the setting utility screen data are operated as if they have a legitimate authority, fraud by the Service-to-Self It is not possible to exclude changes in settings.
  • the present invention has been devised under such a background, and an object of the present invention is to make it possible to determine access from a legitimate person who is authorized to customize the setting of a relay device by simpler processing. And
  • a generation unit that generates setting data instructing setting contents of a relay device and a message including the setting data generated by the generation unit are transmitted with a predetermined address in a communication network under the relay device as a destination address. And when receiving a message from the subordinate communication network and the received message contains the same setting data as the setting data generated by the generating means, according to the setting data included in the message Provided is a relay device comprising update means for updating the setting contents of the relay device.
  • the relay apparatus when a situation that requires updating of the setting contents of the relay apparatus occurs, the relay apparatus generates setting data instructing the updating contents, and updates the setting data, for example, the setting of the relay apparatus Send to the address of one or more authorized terminals. Then, the relay device considers that the transmission source is a person who has been given the authority to update when receiving the setting data from the terminal that was the transmission destination of the setting data generated by itself, and according to the setting data Update the settings of the relay device. Therefore, by limiting the transmission destination of the setting data, it is possible to eliminate an unauthorized update request from a person who has not been given authority.
  • FIG. 1 It is a figure which shows the whole structure of the electronic mail transfer system containing the relay apparatus concerning 1st and 2nd embodiment of this invention. It is a figure which shows the data structure of the email message transmitted / received in the email transfer system shown in FIG. It is a block diagram which shows the structure of the relay apparatus in the electronic mail transfer system shown in FIG. It is a flowchart which shows operation
  • FIG. 1 is a diagram showing an overall configuration of an electronic mail transfer system including a relay device 10 according to the first embodiment of the present invention.
  • the relay device 10 is a device that plays a role of relaying the exchange of data packets through the line 91 between the terminal 20-i and the mail transfer server device 30 under the relay device 10 and the Internet 90. Details of the relay device 10 will be described later.
  • the terminal 20-i is, for example, a personal computer.
  • the user who uses the terminal 20-i is given the authority to update the security setting of the relay device 10.
  • the terminal 20-i has a mailer program installed.
  • the mailer program is a program that causes the terminal 20-i to execute processing for generating, sending and receiving and displaying an e-mail message in MIME (Multipurpose Internet Mail Extension) format.
  • MIME Multipurpose Internet Mail Extension
  • a MIME-format e-mail message has a mail header and a mail body.
  • the mail header of the e-mail message has a plurality of header fields, and information such as a destination e-mail address, a transmission source e-mail address, a subject, and a transmission date / time is described in these header fields.
  • the body of the e-mail message and various contents such as an image file and an audio file attached to the e-mail message are described for each group called a part.
  • the part has a content header and a content body.
  • encoded data obtained by encoding a character string forming the body of the e-mail message and other various contents is described.
  • a character string indicating the data type of the content described in the content body of the part is described.
  • an electronic mail address (XXX@example1.net) assigned to the user is set in the terminal 20-1.
  • the terminal 20-2 is set with an electronic mail address (YYY@example1.net) assigned to the user.
  • an e-mail address (ZZZ@example1.net) assigned to the user is set.
  • the mail transfer server device 30 is a server device that plays a role as an SMTP (Simple Mail Transfer Protocol) server and a role as a POP (Post Office Protocol) 3 server in the domain (example1.net) to which the terminal 20-i belongs.
  • the mail transfer server device 30 is implemented with SMTP and POP3.
  • SMTP is a protocol related to transmission of an electronic mail message by the terminal 20-i.
  • POP3 is a protocol related to reception of an electronic mail message by the terminal 20-i.
  • the mail transfer server device 30 has a mailbox database 31 and a mailing list 32.
  • the mailbox database 31 is a collection of mailboxes of the terminal 20-i.
  • Each mailbox in the mailbox database 31 stores an e-mail message having each e-mail address of the terminal 20-i as a destination e-mail address.
  • the mailing list 32 includes “XXX@example1.net” which is the electronic mail address of the terminal 20-1, “YYY@example1.net” which is the electronic mail address of the terminal 20-2, and the electronic mail of the terminal 20-3.
  • a set of “ZZZ@example1.net” which is a mail address is registered in association with “LIST@example1.net” which is a representative e-mail address representing those three. Note that it is not necessary to register all of the above-mentioned mail addresses in the mailing list 32.
  • the mail transfer server device 30 receives an email message from the terminal 20-i or the relay device 10, and the destination email address of the received email message is any of the email addresses of the terminal 20-i. It is determined whether it is.
  • the mail transfer server device 30 receives an e-mail message having any one of the e-mail addresses of the terminal 20-i as the destination e-mail address, the mail transfer server device 30 corresponds to the terminal 20-i in the mailbox database 31. Store the email message in a mailbox.
  • the e-mail message when an e-mail message having an e-mail address other than that of the terminal 20-i as a destination e-mail address is received, the e-mail message is used as a payload portion, and a POP3 server (non-address) of the same domain as that of the e-mail address
  • a POP3 server non-address
  • a data packet whose destination IP address is the IP address shown in the figure is assembled, and the assembled data packet is delivered to the relay apparatus 10.
  • the data packet is transferred from the relay device 10 to the Internet 90 via the line 91, and then received by a POP3 server (not shown) having the destination IP address and stored in the mailbox.
  • the mail transfer server device 30 receives an e-mail message having “LIST@example1.net” which is the representative e-mail address of the mailing list 32 as the destination e-mail address, the e-mail message is transferred to the terminal 20-i. The same number of copies is made, and the destination e-mail address of each copied e-mail message is stored in the mailbox corresponding to each terminal 20-i in the mailbox database 31.
  • the mail transfer server device 30 receives the user ID and password, which are each account information, from the terminal 20-i, and performs an authentication process using the received account information. Then, the mail transfer server device 30 reads an e-mail message having the e-mail address of the terminal 20-i that has been authenticated by the account information as the destination e-mail address from the corresponding mailbox in the mailbox database 31, and the terminal 20 -Hand over to i.
  • FIG. 3 is a block diagram illustrating a configuration of the relay device 10.
  • the communication interface 11-k is a NIC (Network Interface Card).
  • At least one of the communication interfaces 11-k (for example, the communication interface 11-1) of the relay device 10 is connected to the terminal 20-i and the mail transfer server device 30, and at least one of the remaining (for example, the communication interface) 11-2) is connected to the line 91.
  • the communication interfaces 11-1 and 11-2 receive Ethernet (registered trademark) frames (hereinafter simply referred to as “frames”) having the MAC addresses of the communication interfaces 11-1 and 11-2 as destination MAC addresses.
  • frames Ethernet (registered trademark) frames
  • the data packet included in the frame is delivered to the control unit 13.
  • the real time clock 19 outputs a signal indicating the current time.
  • the storage unit 12 includes a volatile storage unit 14 and a nonvolatile storage unit 15.
  • the volatile storage unit 14 is a RAM (Random Access Memory) and provides a work area to the control unit 13.
  • the nonvolatile storage unit 15 is, for example, a hard disk or a Flash ROM.
  • ID data indicating an ID unique to the relay device 10
  • a spam mail source address list 16 and a control program 17 are stored in the nonvolatile storage unit 15.
  • the junk mail sender address list 16 is a list for registering an e-mail address that is handled as a junk mail sender in the relay device 10.
  • the control program 17 has the following four functions. a. Junk mail discard function This is because the payload part of the data packet delivered from the communication interface 11-2 includes an e-mail message having the e-mail address of the terminal 20-i as the destination e-mail address. This is a function for discarding the e-mail message when the sender e-mail address is registered in the junk mail sender address list 16. b. Setting data generation function This is when the e-mail address of the e-mail message is not registered in the junk e-mail sender address list 16 and the mail body contains a predetermined character string that violates public order and morals.
  • Configuration data distribution function This generates an update notification email message, which is an email message containing the configuration data generated by the function of the configuration data generation function, and this update notification email message is represented by a representative email address in the mailing list 32.
  • This is a function that transmits a certain “LIST@example1.net” as a destination electronic mail address.
  • Setting content update function This is a setting data generated by receiving a Hyper Text Transfer Protocol (HTTP) message from the terminal 20-i after transmitting an update notification e-mail message, and generating the received HTTP message by the function of the setting data generation function.
  • HTTP Hyper Text Transfer Protocol
  • the setting content of the relay device 10 is updated according to the setting data.
  • FIG. 4 is a flowchart showing the operation of the relay device 10 in the present embodiment.
  • the control unit 13 of the relay apparatus 10 performs the operation shown in FIG. 4 every time a data packet is delivered from the communication interfaces 11-1 and 11-2.
  • steps S100 to S130 are processes executed by the control unit 13 by the function of the junk mail discard function
  • steps S140 to S150 are performed by the control unit 13 by the function of the setting data generation function.
  • Steps S160 to S170 are processes executed by the control unit 13 by the function of the setting data distribution function
  • steps S180 to S230 are processes executed by the control unit 13 by the function of the setting content update function. is there.
  • the control unit 13 of the relay device 10 adds one of the e-mail addresses of the terminal 20-i to the payload portion of the data packet. It is determined whether or not an e-mail message having a destination e-mail address is included (S100).
  • the control unit 13 takes out the e-mail message from the payload portion of the data packet and stores it in the volatile storage unit 14 It is stored in an area (referred to as “determined mail storage area”) (S110).
  • the control unit 13 determines whether or not the transmission source email address of the email message stored in the determination required email storage area is registered in the junk mail transmission source address list 16 (S120). And the control part 13 cancels
  • the control unit 13 determines the email body of the email message. It is determined whether or not a predetermined character string that violates public order and morals is included (S140). The determination in step S140 is performed, for example, by collating the character string described in the mail body with the contents recorded in the junk mail determination dictionary file.
  • step S140 If it is determined in step S140 that the mail body of the e-mail message stored in the determination required mail storage area does not include a character string that violates public order and morals (S140: No), the control unit 13 performs a transfer process ( S300). In this transfer process, the control unit 13 assembles a data packet having the payload of the electronic mail message stored in the determination required mail storage area, and transmits a frame including the data packet from the communication interface 11-1.
  • step S140 determines in step S140 that the mail body of the e-mail message stored in the determination required mail storage area includes a character string that violates public order and morals (S140: Yes)
  • the control data generation process is performed. Perform (S150).
  • the control unit 13 sends a command (referred to as an “address registration command”) for instructing registration of an email address to the junk mail source address list 16 and an email message email in the determination required email storage area
  • a pair of sender e-mail addresses described in the header is set as setting data.
  • control unit 13 performs an encryption process (S160).
  • the control unit 13 reads ID data stored in the nonvolatile storage unit 15. Then, the control unit 13 sets the ID data read from the nonvolatile storage unit 15, the setting data generated in step S150, the time data indicating the current time output from the real-time clock 19 at the time of generation, and the expiration date of the setting data.
  • Encrypted data is generated by encrypting a set of four types of data consisting of time length data indicating the time length set in the relay device 10 with a secret key unique to the relay device 10.
  • the control unit 13 performs the update notification mail transmission process (S170), and then proceeds to the transfer process (S300) described above.
  • the control unit 13 In the update notification mail transmission process in step S170, the control unit 13 generates a new e-mail message in the storage area secured in the volatile storage unit 14 (referred to as “new mail storage area”), and the e-mail message The mail header of the electronic mail message stored in the determination mail storage area and the body part in the mail body are copied. Then, after the text string of the text in the part of the text, a text string for requesting confirmation of the update contents (referred to as “update check request text string”) and the URL of the relay device 10 are described.
  • the update confirmation request string is: "This email has been determined to be suspected of being spam. By registering the sender address of this email in the list, receiving emails with the same address as the sender is rejected. If you wish to register in the list, please upload to the following URL. "
  • the control unit 13 adds a new part to the mail body of the e-mail message stored in the new mail storage area, and uses the encrypted data generated by the encryption process in step S160. Describe it as the content body of the added part. Further, the destination e-mail message described in the e-mail header of the e-mail message is replaced with “LIST@example1.net” which is the representative e-mail address of the mailing list 32, and this e-mail message is replaced with an update notification e-mail message. To do. When the generation of the update notification e-mail message is completed, the control unit 13 assembles a data packet having the update notification e-mail message as a payload portion, and transmits a frame including the assembled data packet from the communication interface 11-1.
  • the mail transfer server device 30 acquires the update notification email message from the relay device 10 and confirms that the destination email address is “LIST@example1.net”, which is the representative email address, the update notification email The same number of messages as the terminal 20-i are duplicated, and the duplicated update notification e-mail message is stored in the mailbox of each terminal 20-i in the mailbox database 31. These update notification e-mail messages are delivered to each terminal 20-i according to POP3, and each terminal 20-i displays the acquired e-mail message as a mail screen.
  • FIG. 5 shows an example of a mail screen displayed when the terminal 20-1 (e-mail address: XXX@example1.net), which is one of the destinations of the update notification e-mail message, acquires the update notification e-mail message.
  • the header information display column 51 of the mail screen displays each character string indicating the destination, sender, subject, and transmission date / time, and is described in the mail header of the update notification email message on the right of each.
  • the destination information e-mail address, transmission source e-mail address, subject, and transmission date and time are displayed.
  • the user of the terminal 20-i refers to the transmission source e-mail address in the header information display column 51 and the content of the text in the text display column 52 of the mail screen displayed by each terminal 20-i, and the transmission source e-mail It is determined whether the address can be registered in the spam mail source address list 16. If the user determines that the source e-mail address can be registered in the junk e-mail source address list 16, the user moves the mouse pointer mp to the URL in the text display field 52 and performs a left double-click operation. .
  • the DNS 20 The associated IP address, that is, the IP address of the relay device 10 is acquired from the server. Then, the terminal 20-i extracts the encrypted data from the update notification electronic mail message acquired by the terminal 20-i, and generates an HTTP message including the encrypted data. Further, the terminal 20-i uses this HTTP message as a payload part, assembles a data packet having the IP address of the relay device 10 as a destination IP address, and transmits a frame including the assembled data packet.
  • the communication interface 11-1 of the relay apparatus 10 receives the frame transmitted by the terminal 20-i and delivers the data packet included in the frame to the control unit 13.
  • the control unit 13 determines whether an HTTP message is included in the payload portion of the data packet (S180).
  • control unit 13 determines in step S180 that the HTTP message is included in the payload portion of the data packet (S180: Yes), the control unit 13 determines whether encrypted data is included in the HTTP message (S190). .
  • control unit 13 determines in step S190 that the HTTP message includes encrypted data (S190: Yes)
  • the control unit 13 stores the encrypted data in the storage area (" (S200)
  • the decryption process is performed (S210).
  • the control unit 13 decrypts the encrypted data stored in the decryption required data storage area with a secret key unique to the relay device 10 to obtain ID data, time data, and time length. The data and the four types of data set data are restored.
  • control unit 13 determines whether or not the set of four types of data restored by the decoding process in step S210 should be discarded (S220). More specifically, the control unit 13 should discard these data sets when the four types of data sets restored by the decoding process do not satisfy at least one of the following conditions a and b. If both conditions a and b are satisfied, it is regarded as a valid data set that should not be discarded. a. ID data forming a set of four types of data restored by the decryption process matches the ID data stored in the nonvolatile storage unit 15. b.
  • the time length indicated by the time length data forming the set of four types of data restored by the decoding processing is the time when the decoding processing is executed from the time indicated by the time data forming the set (specifically, the decoding processing) Is longer than the time length from the real time clock 19 to the current time).
  • step S220 If it is determined in step S220 that the four types of data sets are to be discarded (S220: Yes), the control unit 13 ends the process without proceeding to the subsequent processes. If it is determined in step S220 that the four types of data sets are not to be discarded (S220: No), the control unit 13 performs a setting update process (S230). In the setting update process in step S230, the control unit 13 extracts the address registration command included in the setting data from the four types of data restored by the decoding process, and executes the extracted address registration command. Then, the e-mail address included in the setting data is registered in the junk mail transmission source address list 16.
  • step S180 If it is determined in step S180 that the HTTP message is not included in the payload portion of the data packet (S180: No), or the encrypted data is not included in the HTTP message in step S190.
  • step S190: No it progresses to step S300, without performing step S230 from step S200.
  • a request transmitted from a terminal 20-i to a DNS server (not shown) or a WWW server (not shown) in the Internet 90 is included in the payload portion of a data packet delivered from the communication interfaces 11-1 and 11-2. If the response transmitted from the server to the terminal 20-i is included, the control unit 13 immediately proceeds from step S180 or step S190 to step S300, and performs the following transfer process.
  • the control unit 13 determines the transfer destination of the data packet by referring to the destination IP address of the data packet delivered from the communication interfaces 11-1 and 11-2.
  • the frame including the data packet is transmitted from the communication interface 11-1, and the terminal
  • a data packet having a destination IP address as an IP address other than that of 20-i and the mail transfer server device 30 is delivered, a frame including the data packet is transmitted from the communication interface 11-2.
  • the control unit 13 of the relay apparatus 10 determines the e-mail address when a situation that requires registration of a new e-mail address in the spam mail source address list 16 occurs. Setting data for instructing registration in the list 16 as setting contents is generated. Then, the control unit 13 uses the encrypted data obtained by encrypting the set of four types of data, that is, the setting data, the ID data, the time data, and the time length data, as the update notification e-mail message. Broadcast transmission to the terminal 20-i.
  • the ID data of the four types of data included in the HTTP message received from the terminal 20-i thereafter matches the own ID data stored in the nonvolatile storage unit 15 (condition a ), If the time length indicated by the time length data constituting the set is longer than the time length indicated by the time data constituting the set and the current time (condition b), spam mail is set according to the setting data constituting the set. A new e-mail address is registered in the source address list 16. Therefore, by restricting the transmission destinations to which the update notification e-mail message is broadcast from the relay device 10, fraud from a computer of a person who is not authorized to update the junk mail source address list 16 of the relay device 10. Can be easily eliminated.
  • the relay device 10 is a device other than the relay device 10.
  • the inconvenience of updating the junk mail sender address list 16 according to the setting data generated by the apparatus can be prevented.
  • the relay device 10 prevents the occurrence of inconvenience that the junk mail source address list 16 is updated according to the setting data that has lost its value after a lapse of a considerable period from the time of generation. be able to.
  • the relay apparatus 10 when the relay apparatus 10 erroneously determines that an e-mail message that should not be determined as junk mail is junk mail, an e-mail message that is subsequently transmitted from that e-mail address Can be prevented from being discarded by the relay device 10.
  • the relay device 10 registers the e-mail address in the junk e-mail sender address list 16 when a situation that requires registration of a new e-mail address in the junk e-mail sender address list 16 occurs. After the process is performed as the first setting update process, setting data for instructing cancellation of the first setting update process is transmitted as an update notification e-mail message.
  • the relay device 10 receives the HTTP message from the terminal 20-i subordinate to the relay device 10, and the HTTP message includes the same setting data as the setting data transmitted as the update notification e-mail message to the terminal 20-i. If it is, the process of deleting the e-mail address registered in the spam mail source address list 16 from the list 16 is performed as the second setting update process.
  • FIG. 6 is a flowchart showing the operation of the relay device 10 in the present embodiment.
  • the control unit 13 of the relay apparatus 10 proceeds to the next step after executing step S141.
  • the control unit 13 performs a first setting update process.
  • the control unit 13 registers the destination e-mail address of the e-mail message stored in the determination necessary mail storage area in the junk mail transmission source address list 16.
  • steps S150, S170, and S230 in the flowchart shown in FIG. 4 are replaced with steps S151, S171, and S231. More specifically, in the setting data generation process in step S151, the control unit 13 instructs the deletion of the e-mail address from the junk mail transmission source address list 16 (referred to as “address deletion command”) and the determination required mail. A pair of sender email addresses described in the email header of the email message in the storage area is set as setting data.
  • control unit 13 extracts an address deletion command from the setting data, and executes the extracted address deletion command, thereby changing the e-mail address included in the setting data. It is deleted from the spam mail sender address list 16.
  • the relay apparatus 10 when the relay apparatus 10 erroneously determines that an e-mail message that should not be determined as junk mail is junk mail, an e-mail message that is subsequently transmitted from that e-mail address is relayed. It is possible to prevent an inconvenience that the device 10 continues to be discarded.
  • the present invention may have other embodiments.
  • it is as follows.
  • two conditions a and b are imposed as conditions for permitting registration or deletion of a new e-mail address in the spam mail source address list 16 in step S230 or step S231. It was done. However, only condition b may be imposed.
  • the control unit 13 of the relay apparatus 10 restores a set of ID data, time data, time length data, and setting data from the encrypted data included in the HTTP message, and then forms the set.
  • the setting update processing according to the setting data forming the set It is good to do.
  • the control unit 13 of the relay apparatus 10 performs the encryption process and the decryption process using a secret key unique to the relay apparatus 10.
  • the encryption process may be performed using a public key unique to the relay device 10
  • the decryption process may be performed using a secret key that is paired with the public key.
  • the control unit 13 of the relay apparatus 10 transmits a set of setting data, ID data, time data, and time length data to the terminal 20-i as an update notification e-mail message.
  • the terminal 20-i transmits the setting data included in the update notification e-mail message to the relay apparatus 10 as an HTTP message.
  • transmission / reception of setting data between the relay device 10 and the terminal 20-i may be performed as a message according to another protocol (for example, a message in an instant messenger, an IP phone, or a push-type email protocol). Good.
  • the control unit 13 of the relay apparatus 10 receives an HTTP message from any one of the terminals 20-i (for example, the terminal 20-1), and converts the HTTP message into the HTTP message.
  • a message including the update completion data indicating that the update has been completed is displayed as an HTTP message of the terminal 20-i that broadcasts the update notification e-mail message.
  • the addresses of the terminals 20-2 and 20-3 that are not the transmission source may be transmitted as the destination address. According to this embodiment, the user of the terminals 20-2 and 20-3 is informed that there is no need to perform an operation for instructing registration or deletion of an e-mail address in the junk mail transmission source address list 16.
  • control unit 13 of the relay device 10 receives an HTTP message from any one of the terminals 20-i (for example, the terminal 20-1), and sets the relay device 10 according to the setting data included in the HTTP message.
  • a message including update completion data indicating that the update has been completed may be transmitted to all terminals 20-i under the relay apparatus 10. According to this embodiment, it is possible to notify the user of the terminal 20-1 that the registration and deletion of the e-mail address in the junk mail transmission source address list 16 has been successfully completed.
  • step S230 of the first embodiment or step S231 of the second embodiment the control unit 13 of the relay device 10 determines whether or not the set of four types of data restored by the decoding process satisfies the condition b. This determination may be made as follows. First, the control unit 13 compares the time length data forming the set of four types of data restored by the decoding process with the time length data set for itself, and selects the shorter one. Further, the time length indicated by the selected time length data is compared with the time length from the time indicated by the time data in the set to the time when the decoding process is executed, and the time length indicated by the selected time length data. If is longer, it is determined that the condition b is satisfied.
  • the control program 17 in the first and second embodiments may be downloaded from a server device on the Internet 90 to a computer, and the computer may function as the relay device 10. Further, such a program may be distributed after being stored in a storage medium.
  • setting data indicating the setting contents of the relay device 10 the transmission source electronic mail address of the electronic mail message and the electronic mail address to the junk mail transmission source address list 16 are set.
  • the setting data in the present invention is not limited to this. That is, examples of setting data include the following (A)-(D).
  • the relay device 10 when the QoS (Quality of Service) function of the bandwidth control method is operating, the relay device 10 performs class classification in order to set the priority of the packet to be transmitted.
  • the control unit 13 of the relay apparatus 10 monitors the traffic for each class. When it is determined that the deviation from the band in which a certain class of traffic is set continues for a certain period of time, the control unit 13 generates setting data for changing the set bandwidth allocation. Then, the control unit 13 transmits the generated setting data to the terminal 20-i subordinate to the relay device 10.
  • the user of the terminal 20-i confirms the received setting data and returns a message to the relay apparatus 10 after including the setting data. As a result, the user of the terminal 20-i can approve the allocated amount of the band of the class.
  • the control unit 13 of the relay device 10 monitors its own CPU load factor.
  • the control unit 13 determines that the CPU load rate exceeds a preset threshold, the control unit 13 identifies a class that increases the CPU load rate and changes the bandwidth allocation amount set for the class. Generate configuration data.
  • the control unit 13 transmits the generated setting data to the terminal 20-i subordinate to the relay device 10.
  • the user of the terminal 20-i confirms the received setting data and returns a message to the relay apparatus 10 after including the setting data. As a result, the user of the terminal 20-i can approve the allocated amount of the band of the class.
  • the control unit 13 of the relay apparatus 10 monitors packets relating to a specific terminal passing through the relay apparatus.
  • the control unit 13 determines that the packet loss of the packet related to the specific terminal has increased and it is preferable for the specific terminal that there is no packet loss than the packet delay, the control unit 13 Setting data for switching the communication network (WAN side line) to a line with less packet loss is generated.
  • the control unit 13 transmits the generated setting data to the terminal 20-i subordinate to the relay device 10.
  • the user of the terminal 20-i confirms the received setting data and returns a message to the relay apparatus 10 after including the setting data.
  • line switching can be approved by the user of the terminal 20-i.
  • line switching switching from the Internet line to the ISDN line or switching from the ISDN line to the satellite line can be considered.
  • the relay device 10 When the relay device 10 has a server function, the relay device 10 always monitors the access status from the client terminal.
  • the control unit 13 determines that the communication amount from a certain terminal is equal to or greater than the threshold, the access from the client terminal is determined to be a DoS attack (Denial of Service Attack), and the communication from the terminal is blocked by the interface unit. Setting data to generate. Then, the control unit 13 transmits the generated setting data to the terminal 20-i subordinate to the relay device 10.
  • the user of the terminal 20-i confirms the received setting data and returns a message to the relay apparatus 10 after including the setting data. Thereby, the user of the terminal 20-i can approve the interruption of communication with the terminal.
  • SYMBOLS 10 Relay device, 11 ... Communication interface, 12 ... Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

An access from a proper person who is authorized to customize a security setting of a relay device can be judged by an easier process. When a new e-mail address must be registered to an unwanted e-mail transmission source address list (16), the relay device (10) generates setting data to instruct a content of this update, and transmits the setting data to terminals (20-i) as an update notification e-mail message. When the relay device (10) receives an HTTP message containing the setting data from any of the terminals (20-i), and judges that the setting data contained in the HTTP message is valid, the relay device (10) performs a setting update process on the basis of the setting data.

Description

中継装置、設定更新方法およびプログラムRelay device, setting update method and program
 本発明は、中継装置の設定の更新を行うための技術に関する。 The present invention relates to a technique for updating setting of a relay device.
 中継装置は、OSI(Open Systems Interconnection)参照モデルにおける第3層(ネットワーク層)や第4層(トランスポート層)のプロトコルに従ったデータ転送を行うネットワーク機器である。中継装置の多くは、あるIPアドレスを送信元IPアドレスや宛先IPアドレスとするパケットの転送を拒否したり、あるポート番号を送信元ポート番号や宛先ポート番号とするパケットの転送を拒否する、などといった各種設定を、外部のコンピュータからカスタマイズできるようになっている。この種の中継装置の設定をカスタマイズするユーザは、中継装置に接続されたコンピュータから、その中継装置における設定ユーティリティ画面データのURL(Uniform Resource Locator)にアクセスし、コンピュータに設定ユーティリティ画面を表示させる。その上で、ユーザは、自らに固有のアカウント情報であるIDとパスワードを設定ユーティリティ画面に入力する。すると、コンピュータは、そのIDとパスワードを中継装置へ送信する。中継装置は、コンピュータから受信したIDとパスワードの対が自らに登録されている対と一致する場合、そのコンピュータを正当な権限を有するユーザとみなし、そのコンピュータから以後に送信されるコマンドに従って、自らの設定を更新する(たとえば、特許文献1を参照)。 The relay device is a network device that performs data transfer according to the protocol of the third layer (network layer) or the fourth layer (transport layer) in the OSI (Open Systems Interconnection) reference model. Many relay devices refuse to forward packets that have a certain IP address as the source IP address or destination IP address, or refuse to forward packets that have a certain port number as the source port number or destination port number. These settings can be customized from an external computer. A user who customizes the settings of this type of relay device accesses a URL (Uniform Resource Locator) of setting utility screen data in the relay device from a computer connected to the relay device, and causes the computer to display a setting utility screen. Then, the user inputs an ID and password, which are unique account information, on the setting utility screen. Then, the computer transmits the ID and password to the relay device. When the ID / password pair received from the computer matches the registered pair, the relay device regards the computer as a user having a legitimate authority and follows the command transmitted from the computer thereafter. (See, for example, Patent Document 1).
日本国特開2004-040164号公報Japanese Unexamined Patent Publication No. 2004-041064
 この種の中継装置の管理者は、中継装置の設定をカスタマイズする権限をユーザに付与するたびに、そのユーザに固有のアカウント情報を中継装置に設定する作業を行っていた。よって、中継装置の設定をカスタマイズする権限を多数のユーザに与えたり、あるいはその権限を与えるユーザを後から変更するなどの事情が発生した場合、管理者によるアカウント情報の設定作業の負担は大きなものとなる。一方で、中継装置にアカウント情報を全く設定せず、その設定ユーティリティ画面データのURLにアクセスしてくるコンピュータのすべてを正当な権限を有するユーザとみなすようにして稼働させた場合、悪意者による不正な設定の変更を排除することができない。
 本発明は、このような背景の下に案出されたものであり、中継装置の設定をカスタマイズする権限を付与した正当な者からのアクセスをより簡易な処理によって判定できるようにすることを目的とする。
Whenever an administrator of this type of relay device grants the user the authority to customize the settings of the relay device, the administrator sets the account information unique to that user in the relay device. Therefore, if there are circumstances such as giving the authority to customize the settings of the relay device to many users or changing the user who gives the authority later, the burden of setting account information by the administrator is heavy. It becomes. On the other hand, if no account information is set in the relay device, and all computers that access the URL of the setting utility screen data are operated as if they have a legitimate authority, fraud by the Service-to-Self It is not possible to exclude changes in settings.
The present invention has been devised under such a background, and an object of the present invention is to make it possible to determine access from a legitimate person who is authorized to customize the setting of a relay device by simpler processing. And
 本発明は、中継装置の設定内容を指示する設定データを生成する生成手段と、前記生成手段が生成した設定データを含むメッセージを当該中継装置の配下の通信網における所定のアドレスを宛先アドレスとして送信する配布手段と、前記配下の通信網からメッセージを受信し、受信したメッセージに前記生成手段が生成した設定データと同じ設定データが含まれている場合に、そのメッセージに含まれている設定データに従って当該中継装置の設定内容を更新する更新手段とを具備する中継装置を提供する。 According to the present invention, a generation unit that generates setting data instructing setting contents of a relay device and a message including the setting data generated by the generation unit are transmitted with a predetermined address in a communication network under the relay device as a destination address. And when receiving a message from the subordinate communication network and the received message contains the same setting data as the setting data generated by the generating means, according to the setting data included in the message Provided is a relay device comprising update means for updating the setting contents of the relay device.
 この発明では、中継装置は、当該中継装置の設定内容の更新を要する事態が発生すると、その更新内容を指示する設定データを生成し、その設定データを、たとえば、当該中継装置の設定を更新する権限を付与した一または複数のユーザの端末のアドレスへ送信する。そして、中継装置は、自らが生成した設定データの送信先であった端末からその設定データを受信したことをもって、その発信元が更新の権限を付与された者であるとみなし、その設定データに従って当該中継装置の設定内容を更新する。よって、設定データの送信先を限定することにより、権限を付与していない者からの不正な更新の要求を排除することができる。 In the present invention, when a situation that requires updating of the setting contents of the relay apparatus occurs, the relay apparatus generates setting data instructing the updating contents, and updates the setting data, for example, the setting of the relay apparatus Send to the address of one or more authorized terminals. Then, the relay device considers that the transmission source is a person who has been given the authority to update when receiving the setting data from the terminal that was the transmission destination of the setting data generated by itself, and according to the setting data Update the settings of the relay device. Therefore, by limiting the transmission destination of the setting data, it is possible to eliminate an unauthorized update request from a person who has not been given authority.
本発明の第1および第2実施形態にかかる中継装置を含む電子メール転送システムの全体構成を示す図である。It is a figure which shows the whole structure of the electronic mail transfer system containing the relay apparatus concerning 1st and 2nd embodiment of this invention. 図1に示す電子メール転送システムにおいて送受信される電子メールメッセージのデータ構造を示す図である。It is a figure which shows the data structure of the email message transmitted / received in the email transfer system shown in FIG. 図1に示す電子メール転送システムにおける中継装置の構成を示すブロック図である。It is a block diagram which shows the structure of the relay apparatus in the electronic mail transfer system shown in FIG. 本発明の第1実施形態にかかる中継装置の動作を示すフローチャートである。It is a flowchart which shows operation | movement of the relay apparatus concerning 1st Embodiment of this invention. 図1に示す電子メール転送システムにおける端末が、更新通知電子メールメッセージを受信したときに表示させるメール画面の一例を示す図である。It is a figure which shows an example of the mail screen displayed when the terminal in the email transfer system shown in FIG. 1 receives an update notification email message. 本発明の第2実施形態にかかる中継装置の動作を示すフローチャートである。It is a flowchart which shows operation | movement of the relay apparatus concerning 2nd Embodiment of this invention.
 (第1実施形態)
 以下、図面を参照し、この発明の第1実施形態を説明する。
 図1は、本発明の第1実施形態にかかる中継装置10を含む電子メール転送システムの全体構成を示す図である。
(First embodiment)
Hereinafter, a first embodiment of the present invention will be described with reference to the drawings.
FIG. 1 is a diagram showing an overall configuration of an electronic mail transfer system including a relay device 10 according to the first embodiment of the present invention.
 中継装置10は、端末20-i(i=1~3)およびメール転送サーバ装置30とともにLAN(Local Area Network)を構成している。中継装置10は、当該中継装置10の配下の端末20-iおよびメール転送サーバ装置30とインターネット90との間の回線91を介したデータパケットのやりとりを中継する役割を果たす装置である。この中継装置10の詳細は、後述する。 The relay device 10 forms a LAN (Local Area Network) together with the terminals 20-i (i = 1 to 3) and the mail transfer server apparatus 30. The relay device 10 is a device that plays a role of relaying the exchange of data packets through the line 91 between the terminal 20-i and the mail transfer server device 30 under the relay device 10 and the Internet 90. Details of the relay device 10 will be described later.
 端末20-iは、たとえば、パーソナルコンピュータである。端末20-iを利用するユーザには、中継装置10のセキュリティ設定を更新する権限が付与されている。端末20-iは、メーラプログラムを実装している。メーラプログラムは、MIME(Multipurpose Internet Mail Extension)形式の電子メールメッセージの生成、送受信、表示のための処理を端末20-iに実行させるプログラムである。なお、ここでは端末20-iの数を3としているが、本発明ではこれに限らず、1以上の端末が配置されていればよい(i=1~N、N:自然数)。 The terminal 20-i is, for example, a personal computer. The user who uses the terminal 20-i is given the authority to update the security setting of the relay device 10. The terminal 20-i has a mailer program installed. The mailer program is a program that causes the terminal 20-i to execute processing for generating, sending and receiving and displaying an e-mail message in MIME (Multipurpose Internet Mail Extension) format. Although the number of terminals 20-i is 3 here, the present invention is not limited to this, and one or more terminals may be arranged (i = 1 to N, N: natural number).
 図2の例に示すように、MIME形式の電子メールメッセージは、メールヘッダとメールボディを有する。この電子メールメッセージのメールヘッダは複数のヘッダフィールドを有し、それらのヘッダフィールドには、宛先電子メールアドレス、送信元電子メールアドレス、件名、送信日時などの情報が記述される。また、メールボディには、電子メールメッセージの本文、およびその電子メールメッセージに添付された画像ファイルや音声ファイルなどの各種コンテントが、パートと呼ばれる纏まりごとに記述される。 As shown in the example of FIG. 2, a MIME-format e-mail message has a mail header and a mail body. The mail header of the e-mail message has a plurality of header fields, and information such as a destination e-mail address, a transmission source e-mail address, a subject, and a transmission date / time is described in these header fields. In the mail body, the body of the e-mail message and various contents such as an image file and an audio file attached to the e-mail message are described for each group called a part.
 パートは、コンテントヘッダとコンテントボディを有する。各パートのコンテントボディには、電子メールメッセージの本文をなす文字列やその他の各種コンテントをエンコードしたエンコードデータが記述される。各パートのコンテントヘッダには、それらのパートのコンテントボディに記述されたコンテントのデータ型を示す文字列などが記述される。 The part has a content header and a content body. In the content body of each part, encoded data obtained by encoding a character string forming the body of the e-mail message and other various contents is described. In the content header of each part, a character string indicating the data type of the content described in the content body of the part is described.
 図1において、端末20-1には、そのユーザに割り当てられた電子メールアドレス(XXX@example1.net)が設定されている。端末20-2には、そのユーザに割り当てられた電子メールアドレス(YYY@example1.net)が設定されている。端末20-3には、そのユーザに割り当てられた電子メールアドレス(ZZZ@example1.net)が設定されている。 In FIG. 1, an electronic mail address (XXX@example1.net) assigned to the user is set in the terminal 20-1. The terminal 20-2 is set with an electronic mail address (YYY@example1.net) assigned to the user. In the terminal 20-3, an e-mail address (ZZZ@example1.net) assigned to the user is set.
 メール転送サーバ装置30は、端末20-iが属するドメイン(example1.net)におけるSMTP(SimpleMail Transfer Protocol)サーバとしての役割とPOP(Post Office Protocol)3サーバとしての役割を果たすサーバ装置である。メール転送サーバ装置30は、SMTPとPOP3とを実装している。SMTPは、端末20-iによる電子メールメッセージの送信に関わるプロトコルである。POP3は、端末20-iによる電子メールメッセージの受信に関わるプロトコルである。メール転送サーバ装置30は、メールボックスデータベース31とメーリングリスト32とを有する。メールボックスデータベース31は、端末20-iのメールボックスの集合体である。メールボックスデータベース31の各メールボックスには、端末20-iの各々の電子メールアドレスを宛先電子メールアドレスとする電子メールメッセージが記憶される。また、メーリングリスト32には、端末20-1の電子メールアドレスである「XXX@example1.net」、端末20-2の電子メールアドレスである「YYY@example1.net」、および端末20-3の電子メールアドレスである「ZZZ@example1.net」のセットが、それらの3つを代表する代表電子メールアドレスである「LIST@example1.net」と対応づけて登録されている。なお、メーリングリスト32に上述のメールアドレスすべてが登録される必要はない。 The mail transfer server device 30 is a server device that plays a role as an SMTP (Simple Mail Transfer Protocol) server and a role as a POP (Post Office Protocol) 3 server in the domain (example1.net) to which the terminal 20-i belongs. The mail transfer server device 30 is implemented with SMTP and POP3. SMTP is a protocol related to transmission of an electronic mail message by the terminal 20-i. POP3 is a protocol related to reception of an electronic mail message by the terminal 20-i. The mail transfer server device 30 has a mailbox database 31 and a mailing list 32. The mailbox database 31 is a collection of mailboxes of the terminal 20-i. Each mailbox in the mailbox database 31 stores an e-mail message having each e-mail address of the terminal 20-i as a destination e-mail address. Further, the mailing list 32 includes “XXX@example1.net” which is the electronic mail address of the terminal 20-1, “YYY@example1.net” which is the electronic mail address of the terminal 20-2, and the electronic mail of the terminal 20-3. A set of “ZZZ@example1.net” which is a mail address is registered in association with “LIST@example1.net” which is a representative e-mail address representing those three. Note that it is not necessary to register all of the above-mentioned mail addresses in the mailing list 32.
 SMTPに従って、メール転送サーバ装置30は、端末20-iまたは中継装置10から電子メールメッセージを受信し、受信した電子メールメッセージの宛先電子メールアドレスが、端末20-iの電子メールアドレスのうちのいずれかであるかを判定する。そして、メール転送サーバ装置30は、端末20-iの電子メールアドレスのうちのいずれかを宛先電子メールアドレスとする電子メールメッセージを受信した場合、メールボックスデータベース31における当該端末20-iに対応するメールボックスにその電子メールメッセージを記憶する。また、端末20-iのものでない電子メールアドレスを宛先電子メールアドレスとする電子メールメッセージを受信した場合、その電子メールメッセージをペイロード部とし、その電子メールアドレスのものと同じドメインのPOP3サーバ(不図示)のIPアドレスを宛先IPアドレスとするデータパケットを組み立て、組み立てたデータパケットを中継装置10に引き渡す。このデータパケットは、中継装置10から回線91を介してインターネット90へ転送された後、その宛先IPアドレスを有するPOP3サーバ(不図示)によって受信され、そのメールボックスに記憶される。
 また、メール転送サーバ装置30は、メーリングリスト32の代表電子メールアドレスである「LIST@example1.net」を宛先電子メールアドレスとする電子メールメッセージを受信した場合、その電子メールメッセージを端末20-iと同じ数だけ複製し、複製した電子メールメッセージの各々の宛先電子メーアドレスをメールボックスデータベース31における各端末20-iに対応するメールボックスに記憶する。
In accordance with SMTP, the mail transfer server device 30 receives an email message from the terminal 20-i or the relay device 10, and the destination email address of the received email message is any of the email addresses of the terminal 20-i. It is determined whether it is. When the mail transfer server device 30 receives an e-mail message having any one of the e-mail addresses of the terminal 20-i as the destination e-mail address, the mail transfer server device 30 corresponds to the terminal 20-i in the mailbox database 31. Store the email message in a mailbox. In addition, when an e-mail message having an e-mail address other than that of the terminal 20-i as a destination e-mail address is received, the e-mail message is used as a payload portion, and a POP3 server (non-address) of the same domain as that of the e-mail address A data packet whose destination IP address is the IP address shown in the figure is assembled, and the assembled data packet is delivered to the relay apparatus 10. The data packet is transferred from the relay device 10 to the Internet 90 via the line 91, and then received by a POP3 server (not shown) having the destination IP address and stored in the mailbox.
Further, when the mail transfer server device 30 receives an e-mail message having “LIST@example1.net” which is the representative e-mail address of the mailing list 32 as the destination e-mail address, the e-mail message is transferred to the terminal 20-i. The same number of copies is made, and the destination e-mail address of each copied e-mail message is stored in the mailbox corresponding to each terminal 20-i in the mailbox database 31.
 POP3に従って、メール転送サーバ装置30は、端末20-iから各々のアカウント情報であるユーザIDとパスワードを受信し、受信したアカウント情報による認証処理を行う。そして、メール転送サーバ装置30は、アカウント情報による認証を経た端末20-iの電子メールアドレスを宛先電子メールアドレスとする電子メールメッセージを、メールボックスデータベース31における該当のメールボックスから読み出し、その端末20-iに引き渡す。 In accordance with POP3, the mail transfer server device 30 receives the user ID and password, which are each account information, from the terminal 20-i, and performs an authentication process using the received account information. Then, the mail transfer server device 30 reads an e-mail message having the e-mail address of the terminal 20-i that has been authenticated by the account information as the destination e-mail address from the corresponding mailbox in the mailbox database 31, and the terminal 20 -Hand over to i.
 図3は、中継装置10の構成を示すブロック図である。中継装置10は、通信インターフェース11-k(k=1~4)、記憶部12、制御部13、およびリアルタイムクロック19を有する。通信インターフェース11-kは、NIC(Network Interface Card)である。中継装置10の通信インターフェース11-kの少なくとも一つ(たとえば、通信インターフェース11-1とする)は、端末20-iおよびメール転送サーバ装置30に接続され、残りの少なくとも一つ(たとえば、通信インターフェース11-2とする)は、回線91に接続される。通信インターフェース11-1,11-2は、当該通信インターフェース11-1,11-2のMACアドレスを宛先MACアドレスとするイーサネット(登録商標)フレーム(以下、単に「フレーム」という)を受信し、そのフレームに含まれるデータパケットを制御部13に引き渡す。なお、ここではインターフェース11-kの数を4としているが、本発明ではこれに限らず、1以上のインターフェースが配置されていればよい(k=1~N、N:自然数)。
 リアルタイムクロック19は、現在時刻を示す信号を出力する。
FIG. 3 is a block diagram illustrating a configuration of the relay device 10. The relay device 10 includes a communication interface 11-k (k = 1 to 4), a storage unit 12, a control unit 13, and a real time clock 19. The communication interface 11-k is a NIC (Network Interface Card). At least one of the communication interfaces 11-k (for example, the communication interface 11-1) of the relay device 10 is connected to the terminal 20-i and the mail transfer server device 30, and at least one of the remaining (for example, the communication interface) 11-2) is connected to the line 91. The communication interfaces 11-1 and 11-2 receive Ethernet (registered trademark) frames (hereinafter simply referred to as “frames”) having the MAC addresses of the communication interfaces 11-1 and 11-2 as destination MAC addresses. The data packet included in the frame is delivered to the control unit 13. Although the number of interfaces 11-k is four here, the present invention is not limited to this, and one or more interfaces may be arranged (k = 1 to N, N: natural number).
The real time clock 19 outputs a signal indicating the current time.
 記憶部12は、揮発性記憶部14と不揮発性記憶部15を含んでいる。揮発性記憶部14はRAM(Random Access Memory)であり、制御部13にワークエリアを提供する。不揮発性記憶部15は、たとえばハードディスクやFlashROMである。この不揮発性記憶部15には、当該中継装置10に固有のIDを示すIDデータのほか、迷惑メール送信元アドレスリスト16、および制御プログラム17が記憶されている。 The storage unit 12 includes a volatile storage unit 14 and a nonvolatile storage unit 15. The volatile storage unit 14 is a RAM (Random Access Memory) and provides a work area to the control unit 13. The nonvolatile storage unit 15 is, for example, a hard disk or a Flash ROM. In addition to ID data indicating an ID unique to the relay device 10, a spam mail source address list 16 and a control program 17 are stored in the nonvolatile storage unit 15.
 迷惑メール送信元アドレスリスト16は、当該中継装置10において迷惑メールの送信元として取り扱う電子メールアドレスを登録するためのリストである。 The junk mail sender address list 16 is a list for registering an e-mail address that is handled as a junk mail sender in the relay device 10.
 制御プログラム17は、以下に示す4つの機能を有する。
a.迷惑メール破棄機能
 これは、通信インターフェース11-2から引き渡されたデータパケットのペイロード部に、端末20-iの電子メールアドレスを宛先電子メールアドレスとする電子メールメッセージが含まれ、その電子メールメッセージの送信元電子メールアドレスが迷惑メール送信元アドレスリスト16に登録されている場合に、当該電子メールメッセージを破棄する機能である。
b.設定データ生成機能
 これは、電子メールメッセージの送信元電子メールアドレスが迷惑メール送信元アドレスリスト16に登録されておらず、そのメールボディに公序良俗違反となる所定の文字列が含まれている場合に、その電子メールメッセージの送信元電子メールアドレスと迷惑メール送信元アドレスリスト16への電子メールアドレスの登録に関わるコマンドの対である設定データを生成する機能である。
c.設定データ配布機能
 これは、設定データ生成機能の働きによって生成された設定データを含む電子メールメッセージである更新通知電子メールメッセージを生成し、この更新通知電子メールメッセージをメーリングリスト32における代表電子メールアドレスである「LIST@example1.net」を宛先電子メールアドレスとして送信する機能である。
d.設定内容更新機能
 これは、更新通知電子メールメッセージを送信した後に、端末20-iからHTTP(Hyper Text Transfer Protocol)メッセージを受信し、受信したHTTPメッセージに設定データ生成機能の働きによって生成した設定データと同じ設定データが含まれている場合に、その設定データに従って当該中継装置10の設定内容の更新を行う機能である。
The control program 17 has the following four functions.
a. Junk mail discard function This is because the payload part of the data packet delivered from the communication interface 11-2 includes an e-mail message having the e-mail address of the terminal 20-i as the destination e-mail address. This is a function for discarding the e-mail message when the sender e-mail address is registered in the junk mail sender address list 16.
b. Setting data generation function This is when the e-mail address of the e-mail message is not registered in the junk e-mail sender address list 16 and the mail body contains a predetermined character string that violates public order and morals. This is a function for generating setting data that is a pair of commands related to the registration of the e-mail address of the e-mail message and the e-mail address in the junk e-mail transmission source address list 16.
c. Configuration data distribution function This generates an update notification email message, which is an email message containing the configuration data generated by the function of the configuration data generation function, and this update notification email message is represented by a representative email address in the mailing list 32. This is a function that transmits a certain “LIST@example1.net” as a destination electronic mail address.
d. Setting content update function This is a setting data generated by receiving a Hyper Text Transfer Protocol (HTTP) message from the terminal 20-i after transmitting an update notification e-mail message, and generating the received HTTP message by the function of the setting data generation function. When the same setting data is included, the setting content of the relay device 10 is updated according to the setting data.
 次に、本実施形態の動作を説明する。図4は、本実施形態における中継装置10の動作を示すフローチャートである。中継装置10の制御部13は、通信インターフェース11-1,11-2からデータパケットが引き渡されるたび、図4に示す動作を行う。図4に示す一連の処理のうち、ステップS100~S130は、迷惑メール破棄機能の働きによって制御部13が実行する処理であり、ステップS140~S150は、設定データ生成機能の働きによって制御部13が実行する処理であり、ステップS160~S170は、設定データ配布機能の働きによって制御部13が実行する処理であり、ステップS180~S230は、設定内容更新機能の働きによって制御部13が実行する処理である。 Next, the operation of this embodiment will be described. FIG. 4 is a flowchart showing the operation of the relay device 10 in the present embodiment. The control unit 13 of the relay apparatus 10 performs the operation shown in FIG. 4 every time a data packet is delivered from the communication interfaces 11-1 and 11-2. Of the series of processes shown in FIG. 4, steps S100 to S130 are processes executed by the control unit 13 by the function of the junk mail discard function, and steps S140 to S150 are performed by the control unit 13 by the function of the setting data generation function. Steps S160 to S170 are processes executed by the control unit 13 by the function of the setting data distribution function, and steps S180 to S230 are processes executed by the control unit 13 by the function of the setting content update function. is there.
 図4において、中継装置10の制御部13は、通信インターフェース11-1,11-2からデータパケットが引き渡されると、そのデータパケットのペイロード部に、端末20-iの電子メールアドレスのうちいずれかを宛先電子メールアドレスとする電子メールメッセージが含まれているかを判定する(S100)。 In FIG. 4, when the data packet is delivered from the communication interfaces 11-1 and 11-2, the control unit 13 of the relay device 10 adds one of the e-mail addresses of the terminal 20-i to the payload portion of the data packet. It is determined whether or not an e-mail message having a destination e-mail address is included (S100).
 制御部13は、データパケットのペイロード部に該当の電子メールメッセージが含まれている場合(S100:Yes)、そのデータパケットのペイロード部から電子メールメッセージを取り出し、揮発性記憶部14に確保した記憶領域(「要判定メール記憶領域」という)に記憶する(S110)。次に、制御部13は、要判定メール記憶領域に記憶された電子メールメッセージの送信元電子メールアドレスが迷惑メール送信元アドレスリスト16に登録されているか否かを判定する(S120)。そして、制御部13は、送信元電子メールアドレスが迷惑メール送信元アドレスに登録されている場合(S120:Yes)、その電子メールメッセージを破棄する(S130)。 When the corresponding e-mail message is included in the payload portion of the data packet (S100: Yes), the control unit 13 takes out the e-mail message from the payload portion of the data packet and stores it in the volatile storage unit 14 It is stored in an area (referred to as “determined mail storage area”) (S110). Next, the control unit 13 determines whether or not the transmission source email address of the email message stored in the determination required email storage area is registered in the junk mail transmission source address list 16 (S120). And the control part 13 cancels | discards the email message, when the transmission origin email address is registered into the junk mail transmission source address (S120: Yes).
 また、制御部13は、要判定メール記憶領域に記憶された電子メールメッセージの送信元電子メールアドレスが迷惑メール送信元アドレスに登録されていない場合(S120:No)、その電子メールメッセージのメールボディに公序良俗違反となる所定の文字列が含まれているか否かを判定する(S140)。このステップS140における判定は、たとえば、メールボディに記述された文字列と迷惑メール判定用の辞書ファイルの収録内容とを照合することによって行う。 In addition, when the transmission source email address of the email message stored in the determination required email storage area is not registered in the spam email transmission source address (S120: No), the control unit 13 determines the email body of the email message. It is determined whether or not a predetermined character string that violates public order and morals is included (S140). The determination in step S140 is performed, for example, by collating the character string described in the mail body with the contents recorded in the junk mail determination dictionary file.
 制御部13は、ステップS140において、要判定メール記憶領域に記憶された電子メールメッセージのメールボディに公序良俗違反の文字列が含まれていないと判定した場合(S140:No)、転送処理を行う(S300)。この転送処理において、制御部13は、要判定メール記憶領域に記憶された電子メールメッセージをペイロード部とするデータパケットを組み立て、そのデータパケットを含むフレームを通信インターフェース11-1から送信させる。 If it is determined in step S140 that the mail body of the e-mail message stored in the determination required mail storage area does not include a character string that violates public order and morals (S140: No), the control unit 13 performs a transfer process ( S300). In this transfer process, the control unit 13 assembles a data packet having the payload of the electronic mail message stored in the determination required mail storage area, and transmits a frame including the data packet from the communication interface 11-1.
 制御部13は、ステップS140において、要判定メール記憶領域に記憶された電子メールメッセージのメールボディに公序良俗違反の文字列が含まれていると判定した場合(S140:Yes)、設定データ生成処理を行う(S150)。この設定データ生成処理では、制御部13は、迷惑メール送信元アドレスリスト16への電子メールアドレスの登録を指示するコマンド(「アドレス登録コマンド」という)と要判定メール記憶領域における電子メールメッセージのメールヘッダに記述された送信元電子メールアドレスの対を、設定データとする。 If the control unit 13 determines in step S140 that the mail body of the e-mail message stored in the determination required mail storage area includes a character string that violates public order and morals (S140: Yes), the control data generation process is performed. Perform (S150). In this setting data generation process, the control unit 13 sends a command (referred to as an “address registration command”) for instructing registration of an email address to the junk mail source address list 16 and an email message email in the determination required email storage area A pair of sender e-mail addresses described in the header is set as setting data.
 次に、制御部13は、暗号化処理を行う(S160)。この暗号化処理では、制御部13は、不揮発性記憶部15に記憶されているIDデータを読み出す。そして、制御部13は、不揮発性記憶部15から読み出したIDデータ、ステップS150において生成した設定データ、その生成時にリアルタイムクロック19から出力された現在時刻を示す時刻データ、および設定データの有効期限として当該中継装置10に設定されている時間長を示す時間長データからなる4種類のデータのセットを当該中継装置10に固有の秘密鍵によって暗号化することにより、暗号化済みデータを生成する。 Next, the control unit 13 performs an encryption process (S160). In this encryption process, the control unit 13 reads ID data stored in the nonvolatile storage unit 15. Then, the control unit 13 sets the ID data read from the nonvolatile storage unit 15, the setting data generated in step S150, the time data indicating the current time output from the real-time clock 19 at the time of generation, and the expiration date of the setting data. Encrypted data is generated by encrypting a set of four types of data consisting of time length data indicating the time length set in the relay device 10 with a secret key unique to the relay device 10.
 制御部13は、更新通知メール送信処理を行ってから(S170)、上述した転送処理(S300)に進む。ステップS170における更新通知メール送信処理では、制御部13は、揮発性記憶部14に確保された記憶領域(「新規メール記憶領域」という)に新たな電子メールメッセージを生成し、その電子メールメッセージに、要判定メール記憶領域に記憶されている電子メールメッセージのメールヘッダとそのメールボディにおける本文のパートをコピーする。そして、その本文のパートにおける本文の文字列の後に、更新内容の確認を依頼する文字列(「更新確認依頼文字列」という)と当該中継装置10のURLを記述する。更新確認依頼文字列は、「このメールは迷惑メールの疑いがあると判定されました。このメールの送信元アドレスをリストへ登録することにより、同じアドレスを送信元とするメールの受信が拒否されます。リストへの登録を希望する場合は、以下のURLへアップロードしてください。」という内容にするとよい。 The control unit 13 performs the update notification mail transmission process (S170), and then proceeds to the transfer process (S300) described above. In the update notification mail transmission process in step S170, the control unit 13 generates a new e-mail message in the storage area secured in the volatile storage unit 14 (referred to as “new mail storage area”), and the e-mail message The mail header of the electronic mail message stored in the determination mail storage area and the body part in the mail body are copied. Then, after the text string of the text in the part of the text, a text string for requesting confirmation of the update contents (referred to as “update check request text string”) and the URL of the relay device 10 are described. The update confirmation request string is: "This email has been determined to be suspected of being spam. By registering the sender address of this email in the list, receiving emails with the same address as the sender is rejected. If you wish to register in the list, please upload to the following URL. "
 更新通知メール送信処理では、制御部13は、新規メール記憶領域に記憶されている電子メールメッセージのメールボディに新たなパートを付加し、ステップS160の暗号化処理によって生成した暗号化済みデータをその追加したパートのコンテントボディとして記述する。さらに、その電子メールメッセージのメールヘッダに記述されている宛先電子メールメッセージを、メーリングリスト32の代表電子メールアドレスである「LIST@example1.net」に置き換え、この電子メールメッセージを更新通知電子メールメッセージとする。制御部13は、更新通知電子メールメッセージの生成を終えると、その更新通知電子メールメッセージをペイロード部とするデータパケットを組み立て、組み立てたデータパケットを含むフレームを通信インターフェース11-1から送信させる。 In the update notification mail transmission process, the control unit 13 adds a new part to the mail body of the e-mail message stored in the new mail storage area, and uses the encrypted data generated by the encryption process in step S160. Describe it as the content body of the added part. Further, the destination e-mail message described in the e-mail header of the e-mail message is replaced with “LIST@example1.net” which is the representative e-mail address of the mailing list 32, and this e-mail message is replaced with an update notification e-mail message. To do. When the generation of the update notification e-mail message is completed, the control unit 13 assembles a data packet having the update notification e-mail message as a payload portion, and transmits a frame including the assembled data packet from the communication interface 11-1.
 メール転送サーバ装置30は、中継装置10から更新通知電子メールメッセージを取得し、その宛先電子メールアドレスが代表電子メールアドレスである「LIST@example1.net」であることを確認すると、更新通知電子メールメッセージを端末20-iと同じ数だけ複製し、複製した更新通知電子メールメッセージを、メールボックスデータベース31における各端末20-iのメールボックスにそれぞれ記憶する。これらの更新通知電子メールメッセージは、POP3に従って各端末20-iにそれぞれ引き渡され、各端末20-iは、各々が取得した電子メールメッセージをメール画面として表示させる。 When the mail transfer server device 30 acquires the update notification email message from the relay device 10 and confirms that the destination email address is “LIST@example1.net”, which is the representative email address, the update notification email The same number of messages as the terminal 20-i are duplicated, and the duplicated update notification e-mail message is stored in the mailbox of each terminal 20-i in the mailbox database 31. These update notification e-mail messages are delivered to each terminal 20-i according to POP3, and each terminal 20-i displays the acquired e-mail message as a mail screen.
 図5は、更新通知電子メールメッセージの宛先の1つである端末20-1(電子メールアドレス:XXX@example1.net)が、更新通知電子メールメッセージを取得したときに表示させるメール画面の一例を示す図である。図5の例において、メール画面のヘッダ情報表示欄51には、宛先、差出人、件名、送信日時を示す各文字列が表示され、各々の右には、更新通知電子メールメッセージのメールヘッダに記述された情報である、宛先電子メールアドレス、送信元電子メールアドレス、件名、および送信日時が表示される。 FIG. 5 shows an example of a mail screen displayed when the terminal 20-1 (e-mail address: XXX@example1.net), which is one of the destinations of the update notification e-mail message, acquires the update notification e-mail message. FIG. In the example of FIG. 5, the header information display column 51 of the mail screen displays each character string indicating the destination, sender, subject, and transmission date / time, and is described in the mail header of the update notification email message on the right of each. The destination information e-mail address, transmission source e-mail address, subject, and transmission date and time are displayed.
 また、このメール画面の本文表示欄52内には、要判定メール記憶領域に記憶された電子メールメッセージの本文であった、「SSSの写真を…などいかがですか。」の文字列が表示される。そして、その下には、「このメールは迷惑メールの疑いがあると判定されました。このメールの送信元アドレスをリストへ登録することにより、同じアドレスを送信元とするメールの受信が拒否されます。リストへの登録を希望する場合は、以下のURLへアップロードしてください。」の文字列と、URLを示す"http://133.176.74.1/decode.mail"の文字列が表示される。これらの文字列は、中継装置10の制御部13が記述したものである。 Further, in the text display field 52 of this mail screen, a character string “Would you like a photo of SSS?” That was the text of the email message stored in the judgment required mail storage area is displayed. The And below that, “It was determined that this email was suspected of being spam. By registering the sender address of this email in the list, it was refused to receive emails from the same address. If you wish to register in the list, please upload to the following URL "and the string" http://133.176.74.1/decode.mail "indicating the URL is displayed. . These character strings are described by the control unit 13 of the relay apparatus 10.
 端末20-iのユーザは、各々の端末20-iが表示させたメール画面のヘッダ情報表示欄51における送信元電子メールアドレスや本文表示欄52における本文の内容を参照し、その送信元電子メールアドレスを迷惑メール送信元アドレスリスト16に登録して差し支えないかを判断する。そして、ユーザは、送信元電子メールアドレスを迷惑メール送信元アドレスリスト16に登録して差し支えないと判断すると、本文表示欄52内のURLにマウスポインタmpを移動させて左ダブルクリックする操作を行う。 The user of the terminal 20-i refers to the transmission source e-mail address in the header information display column 51 and the content of the text in the text display column 52 of the mail screen displayed by each terminal 20-i, and the transmission source e-mail It is determined whether the address can be registered in the spam mail source address list 16. If the user determines that the source e-mail address can be registered in the junk e-mail source address list 16, the user moves the mouse pointer mp to the URL in the text display field 52 and performs a left double-click operation. .
 端末20-iは、本文表示欄52内のURL上にマウスポインタmpを移動させてダブルクリックする操作が行われたことを検出すると、DNS(Domain Name System)サーバ(不図示)においてそのURLと対応づけられたIPアドレス、すなわち、中継装置10のIPアドレスを同サーバから取得する。そして、端末20-iは、当該端末20-iが取得した更新通知電子メールメッセージから暗号化済みデータを取り出し、その暗号化済みデータを含むHTTPメッセージを生成する。さらに、端末20-iは、このHTTPメッセージをペイロード部とし、中継装置10のIPアドレスを宛先IPアドレスとするデータパケットを組み立て、組み立てたデータパケットを含むフレームを送信する。中継装置10の通信インターフェース11-1は、端末20-iが送信したフレームを受信し、そのフレームに含まれるデータパケットを制御部13に引き渡す。このデータパケットのペイロード部には、端末20-iの電子メールアドレスを宛先電子メールアドレスとする電子メールメッセージが含まれていないため、図4のステップS100における判定結果は「No」になる。この場合、制御部13は、データパケットのペイロード部にHTTPメッセージが含まれているか判定する(S180)。 When the terminal 20-i detects that an operation of moving the mouse pointer mp over the URL in the text display field 52 and double-clicking has been performed, the DNS 20 The associated IP address, that is, the IP address of the relay device 10 is acquired from the server. Then, the terminal 20-i extracts the encrypted data from the update notification electronic mail message acquired by the terminal 20-i, and generates an HTTP message including the encrypted data. Further, the terminal 20-i uses this HTTP message as a payload part, assembles a data packet having the IP address of the relay device 10 as a destination IP address, and transmits a frame including the assembled data packet. The communication interface 11-1 of the relay apparatus 10 receives the frame transmitted by the terminal 20-i and delivers the data packet included in the frame to the control unit 13. Since the payload portion of the data packet does not include an e-mail message having the e-mail address of the terminal 20-i as the destination e-mail address, the determination result in step S100 in FIG. 4 is “No”. In this case, the control unit 13 determines whether an HTTP message is included in the payload portion of the data packet (S180).
 制御部13は、ステップS180において、データパケットのペイロード部にHTTPメッセージが含まれていると判定した場合(S180:Yes)、そのHTPPメッセージに暗号化済みデータが含まれているか判定する(S190)。 If the control unit 13 determines in step S180 that the HTTP message is included in the payload portion of the data packet (S180: Yes), the control unit 13 determines whether encrypted data is included in the HTTP message (S190). .
 制御部13は、ステップS190において、HTTPメッセージに暗号化済みデータが含まれていると判定した場合(S190:Yes)、その暗号化済みデータを揮発性記憶部14に確保された記憶領域(「要復号化データ記憶領域」という)に記憶した後(S200)、復号化処理を行う(S210)。この復号化処理では、制御部13は、要復号化データ記憶領域に記憶された暗号化済みデータを当該中継装置10に固有の秘密鍵によって復号化することにより、IDデータ、時刻データ、時間長データ、および設定データの4種類のデータのセットを復元する。 If the control unit 13 determines in step S190 that the HTTP message includes encrypted data (S190: Yes), the control unit 13 stores the encrypted data in the storage area (" (S200), the decryption process is performed (S210). In this decryption process, the control unit 13 decrypts the encrypted data stored in the decryption required data storage area with a secret key unique to the relay device 10 to obtain ID data, time data, and time length. The data and the four types of data set data are restored.
 次に、制御部13は、ステップS210の復号化処理により復元した4種類のデータのセットが破棄されるべきものであるか否かを判定する(S220)。より詳細には、制御部13は、復号化処理により復元した4種類のデータのセットが以下の条件a,bのうち少なくとも一つを満足しない場合は、それらのデータのセットが破棄されるべきものであるとみなし、条件a,bの両方を満足する場合は、破棄されるべきでない有効なデータのセットであるとみなす。
a.復号化処理により復元した4種類のデータのセットをなすIDデータが不揮発性記憶部15に記憶されているIDデータと一致すること。
b.復号化処理によって復元した4種類のデータのセットをなす時間長データが示す時間長が、そのセットをなす時刻データが示す時刻から復号化処理が実行された時刻(具体的には、復号化処理を開始する時にリアルタイムクロック19から出力された現在時刻)までの時間長よりも長いこと。
Next, the control unit 13 determines whether or not the set of four types of data restored by the decoding process in step S210 should be discarded (S220). More specifically, the control unit 13 should discard these data sets when the four types of data sets restored by the decoding process do not satisfy at least one of the following conditions a and b. If both conditions a and b are satisfied, it is regarded as a valid data set that should not be discarded.
a. ID data forming a set of four types of data restored by the decryption process matches the ID data stored in the nonvolatile storage unit 15.
b. The time length indicated by the time length data forming the set of four types of data restored by the decoding processing is the time when the decoding processing is executed from the time indicated by the time data forming the set (specifically, the decoding processing) Is longer than the time length from the real time clock 19 to the current time).
 制御部13は、ステップS220において、4種類のデータのセットが破棄されるべきものであると判定した場合(S220:Yes)、以降の処理に進むことなく、処理を終了する。
 また、制御部13は、ステップS220において、4種類のデータのセットが破棄されるべきものでないと判定した場合(S220:No)、設定更新処理を行う(S230)。このステップS230における設定更新処理では、制御部13は、復号化処理によって復元した4種類のデータのうちの設定データに含まれているアドレス登録コマンドを取り出し、取り出したアドレス登録コマンドを実行することにより、その設定データに含まれている電子メールアドレスを迷惑メール送信元アドレスリスト16に登録する。
If it is determined in step S220 that the four types of data sets are to be discarded (S220: Yes), the control unit 13 ends the process without proceeding to the subsequent processes.
If it is determined in step S220 that the four types of data sets are not to be discarded (S220: No), the control unit 13 performs a setting update process (S230). In the setting update process in step S230, the control unit 13 extracts the address registration command included in the setting data from the four types of data restored by the decoding process, and executes the extracted address registration command. Then, the e-mail address included in the setting data is registered in the junk mail transmission source address list 16.
 制御部13は、ステップS180において、データパケットのペイロード部にHTTPメッセージが含まれていないと判定した場合(S180:No)や、ステップS190において、HTTPメッセージに暗号化済みデータが含まれていないと判定した場合(S190:No)は、ステップS200からステップS230を実行することなくステップS300に進む。たとえば、通信インターフェース11-1,11-2から引き渡されたデータパケットのペイロード部に、端末20-iからインターネット90におけるDNSサーバ(不図示)やWWWサーバ(不図示)へ送信されたリクエストやそれらのサーバから端末20-iへ送信された応答が含まれていた場合、制御部13は、ステップS180やステップS190から直ちにステップS300へ進み、以下のような転送処理を行う。まず、制御部13は、通信インターフェース11-1,11-2から引き渡されたデータパケットの宛先IPアドレスを参照することにより、そのデータパケットの転送先を決定する。そして、端末20-iのいずれかまたはメール転送サーバ装置30のIPアドレスを宛先IPアドレスとするデータパケットが引き渡されたときは、そのデータパケットを含むフレームを通信インターフェース11-1から送信させ、端末20-iおよびメール転送サーバ装置30のものでないIPアドレスを宛先IPアドレスとするデータパケットが引き渡されたときは、そのデータパケットを含むフレームを通信インターフェース11-2から送信させる。 If it is determined in step S180 that the HTTP message is not included in the payload portion of the data packet (S180: No), or the encrypted data is not included in the HTTP message in step S190. When it determines (S190: No), it progresses to step S300, without performing step S230 from step S200. For example, a request transmitted from a terminal 20-i to a DNS server (not shown) or a WWW server (not shown) in the Internet 90 is included in the payload portion of a data packet delivered from the communication interfaces 11-1 and 11-2. If the response transmitted from the server to the terminal 20-i is included, the control unit 13 immediately proceeds from step S180 or step S190 to step S300, and performs the following transfer process. First, the control unit 13 determines the transfer destination of the data packet by referring to the destination IP address of the data packet delivered from the communication interfaces 11-1 and 11-2. When a data packet having the destination IP address as the IP address of any one of the terminals 20-i or the mail transfer server device 30 is delivered, the frame including the data packet is transmitted from the communication interface 11-1, and the terminal When a data packet having a destination IP address as an IP address other than that of 20-i and the mail transfer server device 30 is delivered, a frame including the data packet is transmitted from the communication interface 11-2.
 以上説明したように、本実施形態では、中継装置10の制御部13は、迷惑メール送信元アドレスリスト16への新たな電子メールアドレスの登録を要する事態が発生した場合に、その電子メールアドレスの同リスト16への登録を設定内容として指示する設定データを生成する。そして、制御部13は、その設定データ、IDデータ、時刻データ、および時間長データの4種類のデータのセットを暗号化した暗号化済みデータを更新通知電子メールメッセージとして当該中継装置10の配下の端末20-iへ同報送信する。そして、以後に端末20-iから受信したHTTPメッセージにセットとして含まれている4種類のデータのうちのIDデータが不揮発性記憶部15に記憶されている自らのIDデータと一致し(条件a)、そのセットをなす時刻データが示す時刻から現在時刻までの時間長よりもそのセットをなす時間長データが示す時間長の方が長い場合(条件b)、そのセットをなす設定データに従って迷惑メール送信元アドレスリスト16へ新たな電子メールアドレスを登録する。よって、中継装置10から更新通知電子メールメッセージを同報送信する送信先を限定することにより、当該中継装置10の迷惑メール送信元アドレスリスト16の更新の権限を与えていない者のコンピュータからの不正な更新の指示を簡単に排除することができる。 As described above, in the present embodiment, the control unit 13 of the relay apparatus 10 determines the e-mail address when a situation that requires registration of a new e-mail address in the spam mail source address list 16 occurs. Setting data for instructing registration in the list 16 as setting contents is generated. Then, the control unit 13 uses the encrypted data obtained by encrypting the set of four types of data, that is, the setting data, the ID data, the time data, and the time length data, as the update notification e-mail message. Broadcast transmission to the terminal 20-i. Thereafter, the ID data of the four types of data included in the HTTP message received from the terminal 20-i thereafter matches the own ID data stored in the nonvolatile storage unit 15 (condition a ), If the time length indicated by the time length data constituting the set is longer than the time length indicated by the time data constituting the set and the current time (condition b), spam mail is set according to the setting data constituting the set. A new e-mail address is registered in the source address list 16. Therefore, by restricting the transmission destinations to which the update notification e-mail message is broadcast from the relay device 10, fraud from a computer of a person who is not authorized to update the junk mail source address list 16 of the relay device 10. Can be easily eliminated.
 また、本実施形態では、設定データに従った迷惑メール送信元アドレスリスト16への新たな電子メールアドレスの登録を認める条件として条件aを課すことにより、中継装置10が、当該中継装置10以外の装置が生成した設定データに従って迷惑メール送信元アドレスリスト16を更新してしまう、という不都合の発生を防ぐことができる。さらに、条件bを課すことにより、中継装置10が、生成時から相当期間が経過してもはや価値を失った設定データに従って迷惑メール送信元アドレスリスト16を更新してしまう、という不都合の発生を防ぐことができる。 Further, in the present embodiment, by imposing the condition a as a condition for permitting registration of a new e-mail address in the junk mail transmission source address list 16 according to the setting data, the relay device 10 is a device other than the relay device 10. The inconvenience of updating the junk mail sender address list 16 according to the setting data generated by the apparatus can be prevented. Furthermore, by imposing the condition b, the relay device 10 prevents the occurrence of inconvenience that the junk mail source address list 16 is updated according to the setting data that has lost its value after a lapse of a considerable period from the time of generation. be able to.
 さらに、本実施形態によると、中継装置10が、迷惑メールと判定すべきでない電子メールメッセージを迷惑メールであると誤判定した場合に、その送信元電子メールアドレスから以後に送信される電子メールメッセージが中継装置10により破棄され続けてしまう、という不都合の発生を防ぐことができる。 Furthermore, according to the present embodiment, when the relay apparatus 10 erroneously determines that an e-mail message that should not be determined as junk mail is junk mail, an e-mail message that is subsequently transmitted from that e-mail address Can be prevented from being discarded by the relay device 10.
 (第2実施形態)
 以下、図面を参照し、この発明の第2実施形態を説明する。なお、本実施形態の説明においては、第1実施形態と同じ構成のものは同じ符号を用い、詳細な説明は省略する。
 本実施形態において、中継装置10は、迷惑メール送信元アドレスリスト16への新たな電子メールアドレスの登録を要する事態が発生した場合に、その電子メールアドレスを迷惑メール送信元アドレスリスト16に登録する処理を第1の設定更新処理として行ってから、その第1の設定更新処理の取り消しを指示する設定データを更新通知電子メールメッセージとして送信する。そして、中継装置10は、当該中継装置10の配下の端末20-iからHTTPメッセージを受信し、端末20-iへ更新通知電子メールメッセージとして送信した設定データと同じ設定データがそのHTTPメッセージに含まれている場合に、迷惑メール送信元アドレスリスト16に登録した電子メールアドレスをそのリスト16から消去する処理を第2の設定更新処理として行う。
(Second Embodiment)
Hereinafter, a second embodiment of the present invention will be described with reference to the drawings. In the description of the present embodiment, the same components as those in the first embodiment are denoted by the same reference numerals, and detailed description thereof is omitted.
In the present embodiment, the relay device 10 registers the e-mail address in the junk e-mail sender address list 16 when a situation that requires registration of a new e-mail address in the junk e-mail sender address list 16 occurs. After the process is performed as the first setting update process, setting data for instructing cancellation of the first setting update process is transmitted as an update notification e-mail message. Then, the relay device 10 receives the HTTP message from the terminal 20-i subordinate to the relay device 10, and the HTTP message includes the same setting data as the setting data transmitted as the update notification e-mail message to the terminal 20-i. If it is, the process of deleting the e-mail address registered in the spam mail source address list 16 from the list 16 is performed as the second setting update process.
 図6は、本実施形態における中継装置10の動作を示すフローチャートである。図6に示す動作において、中継装置10の制御部13は、ステップS140の判定結果が「Yes」となった場合に、ステップS141を実行してから次のステップに進む。ステップS141において、制御部13は、第1の設定更新処理を行う。この第1の設定更新処理において、制御部13は、要判定メール記憶領域に記憶された電子メールメッセージの宛先電子メールアドレスを迷惑メール送信元アドレスリスト16に登録する。 FIG. 6 is a flowchart showing the operation of the relay device 10 in the present embodiment. In the operation illustrated in FIG. 6, when the determination result in step S140 is “Yes”, the control unit 13 of the relay apparatus 10 proceeds to the next step after executing step S141. In step S141, the control unit 13 performs a first setting update process. In the first setting update process, the control unit 13 registers the destination e-mail address of the e-mail message stored in the determination necessary mail storage area in the junk mail transmission source address list 16.
 また、図6に示すフローチャートでは、図4(第1実施形態)に示すフローチャートのステップS150,S170,およびステップS230が、ステップS151,S171,S231に置き換えられている。
 より詳細に説明すると、ステップS151の設定データ生成処理では、制御部13は、迷惑メール送信元アドレスリスト16からの電子メールアドレスの消去を指示するコマンド(「アドレス消去コマンド」という)と要判定メール記憶領域における電子メールメッセージのメールヘッダに記述された送信元電子メールアドレスの対を、設定データとする。
In the flowchart shown in FIG. 6, steps S150, S170, and S230 in the flowchart shown in FIG. 4 (first embodiment) are replaced with steps S151, S171, and S231.
More specifically, in the setting data generation process in step S151, the control unit 13 instructs the deletion of the e-mail address from the junk mail transmission source address list 16 (referred to as “address deletion command”) and the determination required mail. A pair of sender email addresses described in the email header of the email message in the storage area is set as setting data.
 また、ステップS171の更新通知メール送信処理では、制御部13は、新規メール記憶領域に生成した電子メールメッセージに、要判定メール記憶領域に記憶されている電子メールメッセージのメールヘッダとそのメールボディにおける本文のパートをコピーした後、その本文のパートにおける本文の文字列の後に、「このメールは迷惑メールの疑いがあると判定されたため、送信元の電子メールアドレスをリストに登録しました。登録を希望しない場合は、以下のURLへアップロードしてください。」という内容の更新確認依頼文字列と当該中継装置10のURLを記述し、この電子メールメッセージを更新通知電子メールメッセージとする。 In addition, in the update notification mail transmission process in step S171, the control unit 13 adds the mail header of the email message stored in the determination required mail storage area and the mail body to the email message generated in the new mail storage area. After copying the body part, after the text string in the body part, “The email address of the sender was registered in the list because it was determined that this email was suspected of being spam. If you do not wish, please upload the update confirmation request character string “Please upload to the following URL” and the URL of the relay device 10, and let this email message be the update notification email message.
 さらに、ステップS231における第2の設定更新処理では、制御部13は、設定データからアドレス消去コマンドを取り出し、取り出したアドレス消去コマンドを実行することにより、その設定データに含まれている電子メールアドレスを迷惑メール送信元アドレスリスト16から消去する。 Furthermore, in the second setting update process in step S231, the control unit 13 extracts an address deletion command from the setting data, and executes the extracted address deletion command, thereby changing the e-mail address included in the setting data. It is deleted from the spam mail sender address list 16.
 本実施形態によっても、中継装置10が、迷惑メールと判定すべきでない電子メールメッセージを迷惑メールであると誤判定した場合に、その送信元電子メールアドレスから以後に送信される電子メールメッセージが中継装置10により破棄され続けてしまう、という不都合の発生を防ぐことができる。 Also in this embodiment, when the relay apparatus 10 erroneously determines that an e-mail message that should not be determined as junk mail is junk mail, an e-mail message that is subsequently transmitted from that e-mail address is relayed. It is possible to prevent an inconvenience that the device 10 continues to be discarded.
 以上、この発明の一実施形態について説明したが、この発明には他にも実施形態があり得る。例えば、以下の通りである。
(1)上記第1および第2実施形態では、ステップS230またはステップS231で、迷惑メール送信元アドレスリスト16への新たな電子メールアドレスの登録または消去を認める条件として2の条件a、bが課された。しかし、条件bだけを課すこととしてもよい。この実施形態では、中継装置10の制御部13は、HTTPメッセージに含まれていた暗号化処理済みデータからIDデータ、時刻データ、時間長データ、設定データのセットを復元したあと、そのセットをなす時間長データが示す時間長が、そのセットをなす時刻データが示す時刻から現在時刻までの時間長よりも長い場合(条件bを満足する場合)、そのセットをなす設定データに従った設定更新処理を行うようにするとよい。
Although one embodiment of the present invention has been described above, the present invention may have other embodiments. For example, it is as follows.
(1) In the first and second embodiments, two conditions a and b are imposed as conditions for permitting registration or deletion of a new e-mail address in the spam mail source address list 16 in step S230 or step S231. It was done. However, only condition b may be imposed. In this embodiment, the control unit 13 of the relay apparatus 10 restores a set of ID data, time data, time length data, and setting data from the encrypted data included in the HTTP message, and then forms the set. When the time length indicated by the time length data is longer than the time length from the time indicated by the time data forming the set to the current time (when the condition b is satisfied), the setting update processing according to the setting data forming the set It is good to do.
(2)上記第1および第2実施形態では、中継装置10の制御部13は、暗号化処理と復号化処理を当該中継装置10に固有の秘密鍵を用いて行った。しかし、暗号化処理を、当該中継装置10に固有の公開鍵を用いて行い、復号化処理をその公開鍵と対をなす秘密鍵を用いて行ってもよい。 (2) In the first and second embodiments, the control unit 13 of the relay apparatus 10 performs the encryption process and the decryption process using a secret key unique to the relay apparatus 10. However, the encryption process may be performed using a public key unique to the relay device 10, and the decryption process may be performed using a secret key that is paired with the public key.
(3)上記第1および第2実施形態では、中継装置10の制御部13は、設定データ、IDデータ、時刻データ、時間長データのセットを更新通知電子メールメッセージとして端末20-iへ送信し、端末20-iは、この更新通知電子メールメッセージに含まれる設定データをHTTPメッセージとして中継装置10へ送信した。しかし、この中継装置10と端末20-iとの間の設定データの送受信を、他のプロトコルに従ったメッセージ(たとえば、インスタントメッセンジャー、IP電話、プッシュ型電子メールのプロトコルにおけるメッセージ)として行ってもよい。 (3) In the first and second embodiments, the control unit 13 of the relay apparatus 10 transmits a set of setting data, ID data, time data, and time length data to the terminal 20-i as an update notification e-mail message. The terminal 20-i transmits the setting data included in the update notification e-mail message to the relay apparatus 10 as an HTTP message. However, transmission / reception of setting data between the relay device 10 and the terminal 20-i may be performed as a message according to another protocol (for example, a message in an instant messenger, an IP phone, or a push-type email protocol). Good.
(4)上記第1および第2実施形態において、中継装置10の制御部13は、端末20-iのいずれか(たとえば、端末20-1とする)からHTTPメッセージを受信し、そのHTTPメッセージに含まれる設定データに従って当該中継装置10の設定を更新したとき、更新が完了したことを示す更新完了データを含むメッセージを、更新通知電子メールメッセージを同報送信した端末20-iのうちそのHTTPメッセージの送信元でない端末20-2,20-3のアドレスを宛先アドレスとして送信してもよい。この実施形態によると、端末20-2,20-3のユーザに対して、迷惑メール送信元アドレスリスト16への電子メールアドレスの登録やその消去を指示する操作を行う必要がないことを知らせることができる。また、中継装置10の制御部13は、端末20-iのいずれか(たとえば、端末20-1とする)からHTTPメッセージを受信し、そのHTTPメッセージに含まれる設定データに従って当該中継装置10の設定を更新したとき、更新が完了したことを示す更新完了データを含むメッセージを、当該中継装置10の配下のすべての端末20-iに送信してもよい。この実施形態によると、端末20-1のユーザに対して、迷惑メール送信元アドレスリスト16への電子メールアドレスの登録やその消去が無事に完了したことを知らせることができる。 (4) In the first and second embodiments described above, the control unit 13 of the relay apparatus 10 receives an HTTP message from any one of the terminals 20-i (for example, the terminal 20-1), and converts the HTTP message into the HTTP message. When the setting of the relay device 10 is updated according to the included setting data, a message including the update completion data indicating that the update has been completed is displayed as an HTTP message of the terminal 20-i that broadcasts the update notification e-mail message. Alternatively, the addresses of the terminals 20-2 and 20-3 that are not the transmission source may be transmitted as the destination address. According to this embodiment, the user of the terminals 20-2 and 20-3 is informed that there is no need to perform an operation for instructing registration or deletion of an e-mail address in the junk mail transmission source address list 16. Can do. Further, the control unit 13 of the relay device 10 receives an HTTP message from any one of the terminals 20-i (for example, the terminal 20-1), and sets the relay device 10 according to the setting data included in the HTTP message. When a message is updated, a message including update completion data indicating that the update has been completed may be transmitted to all terminals 20-i under the relay apparatus 10. According to this embodiment, it is possible to notify the user of the terminal 20-1 that the registration and deletion of the e-mail address in the junk mail transmission source address list 16 has been successfully completed.
(5)第1実施形態のステップS230または第2実施形態のステップS231において、中継装置10の制御部13は、復号化処理により復元した4種類のデータのセットが条件bを満足するか否かの判断を、以下のようにして行ってもよい。まず、制御部13は、復号化処理によって復元した4種類のデータのセットをなす時間長データと自らに設定された時間長データを比較し、短い方を選択する。さらに、その選択した時間長データが示す時間長と当該セットをなす時刻データが示す時刻から復号化処理が実行された時刻までの時間長とを比較し、その選択した時間長データが示す時間長の方が長い場合に、条件bが満たされると判断する。 (5) In step S230 of the first embodiment or step S231 of the second embodiment, the control unit 13 of the relay device 10 determines whether or not the set of four types of data restored by the decoding process satisfies the condition b. This determination may be made as follows. First, the control unit 13 compares the time length data forming the set of four types of data restored by the decoding process with the time length data set for itself, and selects the shorter one. Further, the time length indicated by the selected time length data is compared with the time length from the time indicated by the time data in the set to the time when the decoding process is executed, and the time length indicated by the selected time length data. If is longer, it is determined that the condition b is satisfied.
(6)上記第1および第2実施形態における制御プログラム17を、インターネット90上のサーバ装置から、コンピュータにダウンロードさせ、そのコンピュータを中継装置10として機能させてもよい。また、そのようなプログラムを記憶媒体に記憶させた上で配布するようにしてもよい。 (6) The control program 17 in the first and second embodiments may be downloaded from a server device on the Internet 90 to a computer, and the computer may function as the relay device 10. Further, such a program may be distributed after being stored in a storage medium.
(7)上記第1および第2実施形態では、中継装置10の設定内容を示す設定データの例として、電子メールメッセージの送信元電子メールアドレスと迷惑メール送信元アドレスリスト16への電子メールアドレスの登録に関わるコマンドの対を挙げたが、本発明における設定データはこれに限定されない。すなわち、設定データの例としては以下の(A)-(D)が挙げられる。 (7) In the first and second embodiments described above, as an example of setting data indicating the setting contents of the relay device 10, the transmission source electronic mail address of the electronic mail message and the electronic mail address to the junk mail transmission source address list 16 are set. Although a pair of commands related to registration is listed, the setting data in the present invention is not limited to this. That is, examples of setting data include the following (A)-(D).
(A)帯域割当ての変更1
 中継装置10において、帯域制御方式のQoS(Quality of Service)機能が動作しているとき、送信するパケットの優先度を設定するために、中継装置10においてはクラス分類がなされる。このとき、中継装置10の制御部13は、クラス毎の通信量を監視する。制御部13は、あるクラスの通信量が設定されている帯域とのずれが一定時間続いていると判断した場合、設定されている帯域の割当量を変更するための設定データを生成する。そして、制御部13は、生成した設定データを当該中継装置10の配下の端末20-iへ送信する。端末20-iのユーザは、受信した設定データを確認し、中継装置10に対してその設定データを含めた上でメッセージを返送する。これにより、端末20-iのユーザによって、当該クラスの帯域の割当量を承認することができる。
(A) Change of bandwidth allocation 1
In the relay device 10, when the QoS (Quality of Service) function of the bandwidth control method is operating, the relay device 10 performs class classification in order to set the priority of the packet to be transmitted. At this time, the control unit 13 of the relay apparatus 10 monitors the traffic for each class. When it is determined that the deviation from the band in which a certain class of traffic is set continues for a certain period of time, the control unit 13 generates setting data for changing the set bandwidth allocation. Then, the control unit 13 transmits the generated setting data to the terminal 20-i subordinate to the relay device 10. The user of the terminal 20-i confirms the received setting data and returns a message to the relay apparatus 10 after including the setting data. As a result, the user of the terminal 20-i can approve the allocated amount of the band of the class.
(B)帯域割当ての変更2
 中継装置10において、帯域制御方式のQoS機能が動作しているとき、中継装置10の制御部13は、自身のCPU負荷率を監視する。制御部13は、CPU負荷率が予め設定されている閾値を超えたと判断した場合、CPU負荷率を上げているクラスを特定し、当該クラスに設定されている帯域の割当量を変更するための設定データを生成する。そして、制御部13は、生成した設定データを当該中継装置10の配下の端末20-iへ送信する。端末20-iのユーザは、受信した設定データを確認し、中継装置10に対してその設定データを含めた上でメッセージを返送する。これにより、端末20-iのユーザによって、当該クラスの帯域の割当量を承認することができる。
(B) Change of bandwidth allocation 2
In the relay device 10, when the bandwidth control type QoS function is operating, the control unit 13 of the relay device 10 monitors its own CPU load factor. When the control unit 13 determines that the CPU load rate exceeds a preset threshold, the control unit 13 identifies a class that increases the CPU load rate and changes the bandwidth allocation amount set for the class. Generate configuration data. Then, the control unit 13 transmits the generated setting data to the terminal 20-i subordinate to the relay device 10. The user of the terminal 20-i confirms the received setting data and returns a message to the relay apparatus 10 after including the setting data. As a result, the user of the terminal 20-i can approve the allocated amount of the band of the class.
(C)WAN(Wide Area Network)側回線の切替え
 中継装置10の制御部13は、中継装置を通過する特定端末に関するパケットを監視する。制御部13が当該特定端末に関するパケットのパケットロスが多くなってきたと判断し、かつ、当該特定端末にとってはパケットの遅延よりもパケットロスが無い方が好ましい場合、制御部13は、特定端末に関するパケットの通信網(WAN側の回線)を、パケットロスが少ない回線に切替えるための設定データを生成する。そして、制御部13は、生成した設定データを当該中継装置10の配下の端末20-iへ送信する。端末20-iのユーザは、受信した設定データを確認し、中継装置10に対してその設定データを含めた上でメッセージを返送する。これにより、端末20-iのユーザによって、回線の切替えを承認することができる。なお、回線の切替えの例としては、インターネット回線からISDN回線への切替え、あるいは、ISDN回線から衛星回線への切替え等が考えられる。
(C) WAN (Wide Area Network) side line switching The control unit 13 of the relay apparatus 10 monitors packets relating to a specific terminal passing through the relay apparatus. When the control unit 13 determines that the packet loss of the packet related to the specific terminal has increased and it is preferable for the specific terminal that there is no packet loss than the packet delay, the control unit 13 Setting data for switching the communication network (WAN side line) to a line with less packet loss is generated. Then, the control unit 13 transmits the generated setting data to the terminal 20-i subordinate to the relay device 10. The user of the terminal 20-i confirms the received setting data and returns a message to the relay apparatus 10 after including the setting data. As a result, line switching can be approved by the user of the terminal 20-i. As examples of line switching, switching from the Internet line to the ISDN line or switching from the ISDN line to the satellite line can be considered.
(D)アクセス制限の設定変更
 中継装置10がサーバ機能を有する場合、中継装置10はクライアント端末からのアクセス状況を常に監視する。制御部13が、ある端末からの通信量が閾値以上であると判断した場合、当該クライアント端末からのアクセスをDoS攻撃(Denial of Service Attack)と判定し、当該端末からの通信をインターフェース部で遮断するための設定データを生成する。そして、制御部13は、生成した設定データを当該中継装置10の配下の端末20-iへ送信する。端末20-iのユーザは、受信した設定データを確認し、中継装置10に対してその設定データを含めた上でメッセージを返送する。これにより、端末20-iのユーザによって、当該端末との通信の遮断を承認することができる。
(D) Access restriction setting change When the relay device 10 has a server function, the relay device 10 always monitors the access status from the client terminal. When the control unit 13 determines that the communication amount from a certain terminal is equal to or greater than the threshold, the access from the client terminal is determined to be a DoS attack (Denial of Service Attack), and the communication from the terminal is blocked by the interface unit. Setting data to generate. Then, the control unit 13 transmits the generated setting data to the terminal 20-i subordinate to the relay device 10. The user of the terminal 20-i confirms the received setting data and returns a message to the relay apparatus 10 after including the setting data. Thereby, the user of the terminal 20-i can approve the interruption of communication with the terminal.
10…中継装置、11…通信インターフェース、12…記憶部、13…制御部,14…揮発性記憶部、15…不揮発性記憶部、17…制御プログラム、19…リアルタイムクロック、20…端末、30…メール転送サーバ装置、31…メールボックスデータベース、32…メーリングリスト、90…インターネット、91…回線。 DESCRIPTION OF SYMBOLS 10 ... Relay device, 11 ... Communication interface, 12 ... Memory | storage part, 13 ... Control part, 14 ... Volatile memory | storage part, 15 ... Nonvolatile memory | storage part, 17 ... Control program, 19 ... Real time clock, 20 ... Terminal, 30 ... Mail transfer server device, 31 ... mailbox database, 32 ... mailing list, 90 ... internet, 91 ... line.

Claims (9)

  1.  中継装置の設定内容を指示する設定データを生成する生成手段と、
     前記生成手段が生成した設定データを含むメッセージを当該中継装置の配下の通信網における所定のアドレスを宛先アドレスとして送信する配布手段と、
     前記配下の通信網からメッセージを受信し、受信したメッセージに前記生成手段が生成した設定データと同じ設定データが含まれている場合に、そのメッセージに含まれている設定データに従って当該中継装置の設定内容を更新する更新手段と
     を具備することを特徴とする中継装置。
    Generating means for generating setting data for instructing setting contents of the relay device;
    Distribution means for transmitting a message including setting data generated by the generation means as a destination address in a communication network under the relay device;
    When a message is received from the subordinate communication network, and the received message contains the same setting data as the setting data generated by the generating means, the setting of the relay device according to the setting data included in the message An updating device comprising: an updating means for updating contents.
  2.  現在時刻を出力するリアルタイムクロックをさらに備え、
     前記配布手段は、前記生成手段が生成した設定データと、前記設定データが生成された時刻を示す時刻データと、所定の時間長を示す時間長データとを含むメッセージを、前記宛先アドレスに向けて送信し、
     前記更新手段は、前記配下の通信網から受信したメッセージに設定データと時刻データと時間長データとが含まれている場合に、その受信したメッセージに含まれている時刻データが示す時刻から前記リアルタイムクロックが出力した現在時刻までの時間長と前記受信したメッセージに含まれている時間長データが示す時間長とを比較し、前記受信したメッセージに含まれている時間長データが示す時間長の方が長い場合において、前記受信したメッセージに含まれている設定データに従った設定内容の更新を行う
     ことを特徴とする請求項1に記載の中継装置。
    A real-time clock that outputs the current time is further provided.
    The distribution means sends a message including setting data generated by the generating means, time data indicating the time when the setting data was generated, and time length data indicating a predetermined time length to the destination address. Send
    The update means, when the setting data, time data, and time length data are included in the message received from the subordinate communication network, the real-time from the time indicated by the time data included in the received message. The time length up to the current time output by the clock is compared with the time length indicated by the time length data included in the received message, and the time length indicated by the time length data included in the received message 2. The relay apparatus according to claim 1, wherein, in a case where the message is long, the setting contents are updated according to the setting data included in the received message.
  3.  前記更新手段は、
     前記配布手段が前記設定データを送信する前に、当該中継装置の設定内容を予め設定する第1の設定更新処理を行い、
     前記配下の通信網からメッセージを受信し、受信したメッセージに前記生成手段が生成した設定データと同じ設定データが含まれている場合に、そのメッセージに含まれている設定データに従って当該中継装置に予め更新された設定内容を消去する第2の設定更新処理を行う
     ことを特徴とする請求項1に記載の中継装置。
    The updating means includes
    Before the distribution means transmits the setting data, a first setting update process for setting the setting contents of the relay device in advance is performed,
    When a message is received from the subordinate communication network and the received message includes the same setting data as the setting data generated by the generating means, the relay apparatus is preliminarily set according to the setting data included in the message. The relay apparatus according to claim 1, wherein a second setting update process for erasing the updated setting contents is performed.
  4.  前記中継装置の設定内容は、迷惑メール送信元アドレスリストへの電子メールアドレスの登録である
     ことを特徴とする請求項1に記載の中継装置。
    The relay device according to claim 1, wherein the setting content of the relay device is registration of an e-mail address in a junk mail transmission source address list.
  5.  前記設定データは、所定の送信元電子メールアドレスと、前記迷惑メール送信元アドレスリストへの該所定の送信元電子メールアドレスの登録を指示するアドレス登録コマンドと、を含み、
     前記更新手段は、前記配下の通信網からメッセージを受信し、受信したメッセージに前記アドレス登録コマンドが含まれている場合に、前記迷惑メール送信元アドレスリストに前記所定の送信元電子メールアドレスを登録する
     ことを特徴とする請求項4に記載の中継装置。
    The setting data includes a predetermined transmission source email address, and an address registration command for instructing registration of the predetermined transmission source email address in the junk mail transmission source address list,
    The update means receives a message from the subordinate communication network, and registers the predetermined sender email address in the spam sender address list when the received message includes the address registration command. The relay device according to claim 4, wherein:
  6.  前記設定データは、送信元電子メールアドレスと、前記迷惑メール送信元アドレスリストからの該送信元電子メールアドレスの消去を指示するアドレス消去コマンドと、を含み、
     前記更新手段は、
     前記迷惑メール送信元アドレスリストへ所定の送信元電子メールアドレスを予め登録する第1の設定更新処理を行い、
     前記配下の通信網からメッセージを受信し、受信したメッセージに前記アドレス消去コマンドが含まれている場合に、前記迷惑メール送信元アドレスリストからの前記所定の送信元電子メールアドレスを消去する第2の設定更新処理を行う
     ことを特徴とする請求項4に記載の中継装置。
    The setting data includes a transmission source e-mail address, and an address deletion command for instructing deletion of the transmission source e-mail address from the junk mail transmission source address list,
    The updating means includes
    Performing a first setting update process for pre-registering a predetermined sender email address to the spam sender address list;
    A second message that receives a message from the subordinate communication network and deletes the predetermined source e-mail address from the junk e-mail source address list when the received message includes the address deletion command; 5. The relay apparatus according to claim 4, wherein setting update processing is performed.
  7.  前記更新手段における当該中継装置の設定内容を更新したとき、前記配下の通信網に対して、更新完了データを含むメッセージを送信する送信手段をさらに備える
     ことを特徴とする請求項1に記載の中継装置。
    2. The relay according to claim 1, further comprising: a transmission unit configured to transmit a message including update completion data to the subordinate communication network when the setting content of the relay device in the update unit is updated. apparatus.
  8.  中継装置の設定内容を指示する設定データを生成するステップと、
     前記生成ステップにて生成した設定データを含むメッセージを当該中継装置の配下の通信網における所定のアドレスを宛先アドレスとして送信するステップと、
     前記配下の通信網からメッセージを受信し、受信したメッセージに前記生成ステップにて生成した設定データと同じ設定データが含まれている場合に、そのメッセージに含まれている設定データに従って当該中継装置の設定内容を更新するステップと
     を具備することを特徴とする中継装置の設定更新方法。
    Generating setting data instructing the setting contents of the relay device;
    Transmitting a message including the setting data generated in the generating step as a destination address with a predetermined address in a communication network under the relay device;
    When a message is received from the subordinate communication network, and the received message includes the same setting data as the setting data generated in the generating step, the relay device according to the setting data included in the message A setting update method for the relay device, comprising the step of updating the setting content.
  9.  コンピュータに、
     中継装置の設定内容を指示する設定データを生成する生成手段と、
     前記生成手段が生成した設定データを含むメッセージを当該中継装置の配下の通信網における所定のアドレスを宛先アドレスとして送信する配布手段と、
     前記配下の通信網からメッセージを受信し、受信したメッセージに前記生成手段が生成した設定データと同じ設定データが含まれている場合に、そのメッセージに含まれている設定データに従って当該中継装置の設定内容を更新する更新手段と
     を実現させるプログラム。
    On the computer,
    Generating means for generating setting data for instructing setting contents of the relay device;
    Distribution means for transmitting a message including setting data generated by the generation means as a destination address in a communication network under the relay device;
    When a message is received from the subordinate communication network, and the received message contains the same setting data as the setting data generated by the generating means, the setting of the relay device according to the setting data included in the message A program that realizes an updating means for updating contents.
PCT/JP2010/054455 2009-03-16 2010-03-16 Relay device, setting update method, and program WO2010107031A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201080012509.8A CN102356611B (en) 2009-03-16 2010-03-16 Relay device, setting update method, and program

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2009-062499 2009-03-16
JP2009062499A JP5417914B2 (en) 2009-03-16 2009-03-16 Relay device and program

Publications (1)

Publication Number Publication Date
WO2010107031A1 true WO2010107031A1 (en) 2010-09-23

Family

ID=42739691

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2010/054455 WO2010107031A1 (en) 2009-03-16 2010-03-16 Relay device, setting update method, and program

Country Status (3)

Country Link
JP (1) JP5417914B2 (en)
CN (1) CN102356611B (en)
WO (1) WO2010107031A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116033413A (en) * 2023-01-30 2023-04-28 广州爱浦路网络技术有限公司 Privacy security enhancement method for relay communication

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389872A (en) * 2021-12-29 2022-04-22 卓尔智联(武汉)研究院有限公司 Data processing method, model training method, electronic device, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004070614A1 (en) * 2003-02-10 2004-08-19 Guang Feng Communication method and communication system in which called person has the initiative
JP2004254034A (en) * 2003-02-19 2004-09-09 Fujitsu Ltd System and method for controlling spam mail suppression policy
JP2005251230A (en) * 2005-05-10 2005-09-15 Nec Corp Mail server
JP2008139926A (en) * 2006-11-30 2008-06-19 Database Consultants Corp Email server apparatus and email server program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004070614A1 (en) * 2003-02-10 2004-08-19 Guang Feng Communication method and communication system in which called person has the initiative
JP2004254034A (en) * 2003-02-19 2004-09-09 Fujitsu Ltd System and method for controlling spam mail suppression policy
JP2005251230A (en) * 2005-05-10 2005-09-15 Nec Corp Mail server
JP2008139926A (en) * 2006-11-30 2008-06-19 Database Consultants Corp Email server apparatus and email server program

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116033413A (en) * 2023-01-30 2023-04-28 广州爱浦路网络技术有限公司 Privacy security enhancement method for relay communication
CN116033413B (en) * 2023-01-30 2023-08-29 广州爱浦路网络技术有限公司 Privacy security enhancement method for relay communication

Also Published As

Publication number Publication date
JP5417914B2 (en) 2014-02-19
JP2010219731A (en) 2010-09-30
CN102356611B (en) 2015-05-06
CN102356611A (en) 2012-02-15

Similar Documents

Publication Publication Date Title
US10313135B2 (en) Secure instant messaging system
US7774411B2 (en) Secure electronic message transport protocol
EP1788770B1 (en) A method for establishing a secure e-mail communication channel between a sender and a recipient
US20040221016A1 (en) Method and apparatus for preventing transmission of unwanted email
WO2003079619A1 (en) System and method for transmitting and utilizing attachments
WO2008050743A1 (en) Electronic mail transmission/reception system
US20110231502A1 (en) Relay apparatus, relay method and recording medium
US20060184635A1 (en) Electronic mail method using email tickler
Castiglione et al. E-mail-based covert channels for asynchronous message steganography
KR100784474B1 (en) System and method for knock notification to an unsolicited message
JP5206220B2 (en) Relay device and program
WO2010107031A1 (en) Relay device, setting update method, and program
JP4250148B2 (en) Secure email format transmission
CN1875599B (en) System for enhancing the transmission security of the e-mails in the internet network
CA2328548A1 (en) Privacy system
JP2005236825A (en) Electronic-mail system
JP3908722B2 (en) Message delivery system, message delivery method, and message delivery program
JP6931906B2 (en) Programs and servers
JP2006227892A (en) Electronic mail relay system, electronic mail relay method and computer program
JP2023156423A (en) Risk checking system, risk level checking method, and program
JP2005354462A (en) Internet facsimile system having security improved, communication control method thereof, facsimile terminal, and mail server
Venema CPJ Koymans1, J. Scheerder2
Scheerder CPJ Koymans
WO2004061611A2 (en) Implicit access for communications pathway
Dean Management aspects of secure messaging between organizations

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201080012509.8

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10753523

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10753523

Country of ref document: EP

Kind code of ref document: A1