WO2011146232A2 - Trusted e-mail communication in a multi-tenant environment - Google Patents
Trusted e-mail communication in a multi-tenant environment Download PDFInfo
- Publication number
- WO2011146232A2 WO2011146232A2 PCT/US2011/034800 US2011034800W WO2011146232A2 WO 2011146232 A2 WO2011146232 A2 WO 2011146232A2 US 2011034800 W US2011034800 W US 2011034800W WO 2011146232 A2 WO2011146232 A2 WO 2011146232A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- organization
- attribution
- trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/48—Message addressing, e.g. address format or anonymous messages, aliases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- FIG. 4 is a block diagram of a system including a computing device.
- multi-tenant hosting provider 120 may send an "EHLO" command to stand-alone organization 1 10 via SMTP.
- Stand-alone organization 1 10 may reply with a list of supported SMTP extensions, such as "DSN,” “STARTTLS,” and/or "SIZE". Consistent with embodiments of the invention, stand-alone organization 1 10 may indicate in the reply that it supports an attribution data element extension, such as by including an extension name of "XOORG" in the list of supported extensions.
- FIG. 2 is a flow chart setting forth the general stages involved in a method 200 consistent with embodiments of the invention for providing message source validation and attribution.
- Method 200 may be implemented using a computing device 400 as described in more detail below with respect to FIG. 4. Ways to implement the stages of method 200 will be described in greater detail below.
- Method 200 may begin at starting block 205 and proceed to stage 210 where computing device 400 may receive a message from a source organization.
- multi-tenant hosting provider 120 may receive a message from hosting tenant 125(A) for a recipient at stand-alone system 1 10
- the multi-tenant system may validate hosting tenants (e.g., hosting tenants 125(A)-B) and/or filtering tenants 135(A)-(B)), such as by requiring verifiable changes be made to domain ownership records by organizations seeking to host their e-mail communications associated with a given domain at multi-tenant host provider 120 and/or utilize services provided by multi-tenant e-mail filtering provider 130.
- hosting tenants e.g., hosting tenants 125(A)-B
- filtering tenants 135(A)-(B) such as by requiring verifiable changes be made to domain ownership records by organizations seeking to host their e-mail communications associated with a given domain at multi-tenant host provider 120 and/or utilize services provided by multi-tenant e-mail filtering provider 130.
- the multi-tenant system may also be operative to identify a sender of messages received by the multi-tenant system for delivery to one of its tenants.
- the multi-tenant system may have sufficient data (e.g. a fully qualified domain name (FQDN) in a message source organization's certificate) to identify stand-alone system 110 and may reliably attribute incoming messages to the first party based on a securely authenticated communication channel.
- FQDN fully qualified domain name
- computing device 400 may, for example, use an SMTP protocol extension.
- An XOORG command may be implemented within the SMTP framework and/or an XOORG parameter may be included in the existing "MAIL FROM:" command within the SMTP standard framework.
- the separate XOORG command may be used to transmit attribution data associated with multiple messages transmitted from a given source organization (e.g., a particular tenant from a multi-tenant system) during a single SMTP session while the XOORG parameter of the "MAIL FROM:” command may be varied for each message.
- the protocol extension may allow the receiving system to decide whether a message may be trusted before all the recipients and actual message data is received.
- the attribution data may be added to the message itself and transmitted in a header such as "X-Originator Organization".
- the value of the header may comprise the identity of the organization on whose behalf the message is being sent, and may comprise a fully -qualified domain name.
- the SMTP extension and the header are not mutually-exclusive and both may be provided.
- the data supplied in the protocol parameter may take precedence over the header value. If a discrepancy is detected by the receiving MTA, it may re-stamp the header to match the protocol parameter value.
- a system consistent with an embodiment of the invention may include a computing device, such as computing device 400.
- computing device 400 may include at least one processing unit 402 and a system memory 404.
- system memory 404 may comprise, but is not limited to, volatile (e.g. random access memory (RAM)), nonvolatile (e.g. read-only memory (ROM)), flash memory, or any combination.
- System memory 404 may include operating system 405, one or more programming modules 406, and may include a message transport agent (MTA) 407.
- Operating system 405, for example, may be suitable for controlling computing device 400' s operation.
- Embodiments of the invention may be practiced in conjunction with a graphics library, other operating systems, or any other application program and is not limited to any particular application or system. This basic configuration is illustrated in FIG. 4 by those components within a dashed line 408.
- Computing device 400 may have additional features or functionality.
- computing device 400 may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape.
- additional storage is illustrated in FIG. 4 by a removable storage 409 and a non-removable storage 410.
- Computing device 400 may also contain a communication connection 416 that may allow device 400 to communicate with other computing devices 418, such as over a network in a distributed computing environment, for example, an intranet or the Internet.
- Communication connection 416 is one example of communication media.
- embodiments of the present invention may take the form of a computer program product on a computer-usable or computer- readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system.
- a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Priority Applications (10)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020127030390A KR101784756B1 (ko) | 2010-05-21 | 2011-05-02 | 멀티-테넌트 환경 내에서의 신뢰되는 전자 우편 통신 |
| KR1020177027593A KR101903923B1 (ko) | 2010-05-21 | 2011-05-02 | 멀티-테넌트 환경 내에서의 신뢰되는 전자 우편 통신 |
| CN201180025046.3A CN102918810B (zh) | 2010-05-21 | 2011-05-02 | 用于多承租人环境中的可信电子邮件通信的方法和系统 |
| HK13107971.3A HK1180853B (en) | 2010-05-21 | 2011-05-02 | Methods and systems for trusted e-mail communication in a multi-tenant environment |
| AU2011256698A AU2011256698B2 (en) | 2010-05-21 | 2011-05-02 | Trusted e-mail communication in a multi-tenant environment |
| RU2012149431/08A RU2569806C2 (ru) | 2010-05-21 | 2011-05-02 | Доверенная связь по электронной почте в многопользовательской среде |
| EP11783939.9A EP2572328B1 (en) | 2010-05-21 | 2011-05-02 | Trusted e-mail communication in a multi-tenant environment |
| BR112012029427-0A BR112012029427B1 (pt) | 2010-05-21 | 2011-05-02 | Método para fornecer comunicação por e-mail confiável, meio legível por computador e sistema para fornecer a comunicação por e-mail confiável |
| CA2798124A CA2798124C (en) | 2010-05-21 | 2011-05-02 | Trusted e-mail communication in a multi-tenant environment |
| JP2013512630A JP6092098B2 (ja) | 2010-05-21 | 2011-05-02 | マルチテナント環境における信頼できる電子メール通信 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/785,348 US8707420B2 (en) | 2010-05-21 | 2010-05-21 | Trusted e-mail communication in a multi-tenant environment |
| US12/785,348 | 2010-05-21 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2011146232A2 true WO2011146232A2 (en) | 2011-11-24 |
| WO2011146232A3 WO2011146232A3 (en) | 2012-01-19 |
Family
ID=44973578
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2011/034800 Ceased WO2011146232A2 (en) | 2010-05-21 | 2011-05-02 | Trusted e-mail communication in a multi-tenant environment |
Country Status (10)
| Country | Link |
|---|---|
| US (2) | US8707420B2 (enExample) |
| EP (1) | EP2572328B1 (enExample) |
| JP (1) | JP6092098B2 (enExample) |
| KR (2) | KR101784756B1 (enExample) |
| CN (1) | CN102918810B (enExample) |
| AU (1) | AU2011256698B2 (enExample) |
| BR (1) | BR112012029427B1 (enExample) |
| CA (1) | CA2798124C (enExample) |
| RU (1) | RU2569806C2 (enExample) |
| WO (1) | WO2011146232A2 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2013152702A (ja) * | 2011-12-28 | 2013-08-08 | Canon Marketing Japan Inc | 情報処理装置、情報処理方法、及びコンピュータプログラム |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE112012000358B4 (de) * | 2011-03-02 | 2019-08-14 | International Business Machines Corporation | Unternehmensübergreifender Datenaustausch |
| US9026784B2 (en) * | 2012-01-26 | 2015-05-05 | Mcafee, Inc. | System and method for innovative management of transport layer security session tickets in a network environment |
| US9237168B2 (en) * | 2012-05-17 | 2016-01-12 | Cisco Technology, Inc. | Transport layer security traffic control using service name identification |
| US10164962B2 (en) | 2013-03-15 | 2018-12-25 | Blackhawk Network, Inc. | Using client certificates to communicate trusted information |
| US9853927B2 (en) | 2013-08-27 | 2017-12-26 | Microsoft Technology Licensing, Llc | Enforcing resource quota in mail transfer agent within multi-tenant environment |
| US9565198B2 (en) | 2014-01-31 | 2017-02-07 | Microsoft Technology Licensing, Llc | Tenant based signature validation |
| US10524122B2 (en) | 2014-01-31 | 2019-12-31 | Microsoft Technology Licensing, Llc | Tenant based signature validation |
| MA41502A (fr) | 2015-02-14 | 2017-12-19 | Valimail Inc | Validation centralisée d'expéditeurs d'email par ciblage de noms ehlo et d'adresses ip |
| US11843597B2 (en) * | 2016-05-18 | 2023-12-12 | Vercrio, Inc. | Automated scalable identity-proofing and authentication process |
| US10554418B2 (en) | 2016-06-24 | 2020-02-04 | General Electric Company | Routing cloud messages using digital certificates |
| US10326730B2 (en) | 2016-06-27 | 2019-06-18 | Cisco Technology, Inc. | Verification of server name in a proxy device for connection requests made using domain names |
| US20180102992A1 (en) * | 2016-10-11 | 2018-04-12 | Microsoft Technology Licensing, Llc | Controlling Permissions in a Communication System |
| US11363060B2 (en) * | 2019-10-24 | 2022-06-14 | Microsoft Technology Licensing, Llc | Email security in a multi-tenant email service |
| CN113595863B (zh) * | 2020-04-30 | 2023-04-18 | 北京字节跳动网络技术有限公司 | 一种分享邮件的显示方法、装置、电子设备和存储介质 |
| DE102020212586A1 (de) * | 2020-10-06 | 2022-04-07 | Robert Bosch Gesellschaft mit beschränkter Haftung | Verfahren und Vorrichtung zum Verarbeiten von mit über ein Bussystem übertragbaren Nachrichten assoziierten Daten |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040203589A1 (en) | 2002-07-11 | 2004-10-14 | Wang Jiwei R. | Method and system for controlling messages in a communication network |
| US20050210272A1 (en) | 2003-11-17 | 2005-09-22 | Fotta Keith A | Method and apparatus for regulating unsolicited electronic mail |
| US20070162394A1 (en) | 2004-02-12 | 2007-07-12 | Iconix, Inc. | Rapid identification of message authentication |
Family Cites Families (40)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6941304B2 (en) | 1998-11-17 | 2005-09-06 | Kana Software, Inc. | Method and apparatus for performing enterprise email management |
| US6356937B1 (en) | 1999-07-06 | 2002-03-12 | David Montville | Interoperable full-featured web-based and client-side e-mail system |
| US7249175B1 (en) * | 1999-11-23 | 2007-07-24 | Escom Corporation | Method and system for blocking e-mail having a nonexistent sender address |
| US6990581B1 (en) | 2000-04-07 | 2006-01-24 | At&T Corp. | Broadband certified mail |
| CN1288202A (zh) * | 2000-06-23 | 2001-03-21 | 林海 | 一种防止垃圾电子邮件的方法 |
| JP4319791B2 (ja) | 2001-06-08 | 2009-08-26 | パナソニック コミュニケーションズ株式会社 | データ通信装置及びインターネットファクシミリ装置 |
| WO2003054719A1 (en) * | 2001-12-19 | 2003-07-03 | Secluda Technologies, Inc. | Message processor |
| JP2004064215A (ja) * | 2002-07-25 | 2004-02-26 | Casio Comput Co Ltd | 電子メールシステム、電子メールのなりすまし送信防止方法及びなりすまし送信メールの受信防止方法 |
| JP2004078845A (ja) | 2002-08-22 | 2004-03-11 | Pasuko:Kk | 電子メール受信システム |
| US7469280B2 (en) | 2002-11-04 | 2008-12-23 | Sun Microsystems, Inc. | Computer implemented system and method for predictive management of electronic messages |
| US7480287B2 (en) | 2002-11-19 | 2009-01-20 | Murata Kikai Kabushiki Kaisha | Communication terminal device, communication method and electronic mail server |
| US7660989B2 (en) | 2002-11-26 | 2010-02-09 | Rpost International Limited | System for, and method of, authenticating an electronic message to a recipient |
| US7085745B2 (en) * | 2003-03-05 | 2006-08-01 | Klug John R | Method and apparatus for identifying, managing, and controlling communications |
| US20040181581A1 (en) | 2003-03-11 | 2004-09-16 | Michael Thomas Kosco | Authentication method for preventing delivery of junk electronic mail |
| US20070005970A1 (en) * | 2003-05-21 | 2007-01-04 | Trupp Steven E | E-mail authentication protocol or MAP |
| AU2003229234A1 (en) | 2003-05-30 | 2005-01-21 | Privasphere Gmbh | System and method for secure communication |
| US7272853B2 (en) * | 2003-06-04 | 2007-09-18 | Microsoft Corporation | Origination/destination features and lists for spam prevention |
| US20050102366A1 (en) * | 2003-11-07 | 2005-05-12 | Kirsch Steven T. | E-mail filter employing adaptive ruleset |
| JP4574161B2 (ja) * | 2003-11-17 | 2010-11-04 | キヤノン株式会社 | 通信装置、その制御方法およびプログラム |
| US7698558B2 (en) | 2003-11-21 | 2010-04-13 | Rpost International Limited | System for, and method of, providing the transmission, receipt and content of an e-mail message |
| US20050198508A1 (en) * | 2004-03-04 | 2005-09-08 | Beck Stephen H. | Method and system for transmission and processing of authenticated electronic mail |
| US7721093B2 (en) * | 2004-04-02 | 2010-05-18 | Microsoft Corporation | Authenticated exchange of public information using electronic mail |
| US20060048210A1 (en) | 2004-09-01 | 2006-03-02 | Hildre Eric A | System and method for policy enforcement in structured electronic messages |
| US20060121880A1 (en) | 2004-12-07 | 2006-06-08 | Cowsar Lawrence C | Method and apparatus for enabling authorized and billable message transmission between multiple communications environments |
| US9160755B2 (en) * | 2004-12-21 | 2015-10-13 | Mcafee, Inc. | Trusted communication network |
| US8738708B2 (en) * | 2004-12-21 | 2014-05-27 | Mcafee, Inc. | Bounce management in a trusted communication network |
| JP4601470B2 (ja) | 2005-03-18 | 2010-12-22 | 富士通株式会社 | 電子メール転送方法及び装置 |
| US7917756B2 (en) * | 2005-06-01 | 2011-03-29 | Goodmail Sytems, Inc. | E-mail stamping with from-header validation |
| US8595814B2 (en) * | 2005-12-13 | 2013-11-26 | Google Inc. | TLS encryption in a managed e-mail service environment |
| JP2007251242A (ja) * | 2006-03-13 | 2007-09-27 | Net Surf:Kk | メールサーバー用プログラム及びメールサーバー用システム |
| WO2007106826A2 (en) * | 2006-03-13 | 2007-09-20 | Markmonitor Inc. | Domain name ownership validation |
| US8201231B2 (en) | 2007-02-21 | 2012-06-12 | Microsoft Corporation | Authenticated credential-based multi-tenant access to a service |
| US20080307226A1 (en) | 2007-06-07 | 2008-12-11 | Alcatel Lucent | Verifying authenticity of e-mail messages |
| CN101374117A (zh) | 2007-08-21 | 2009-02-25 | 华为技术有限公司 | 处理电子邮件的方法、电子邮件服务器和客户端 |
| JP2009088717A (ja) * | 2007-09-28 | 2009-04-23 | Ntt Comware Corp | 情報通信システム、通信端末、情報サーバ装置、通信プログラム、情報サービスプログラム、情報通信方法 |
| US8381262B2 (en) * | 2008-02-20 | 2013-02-19 | Yahoo! Inc. | Blocking of spoofed E-mail |
| WO2010038143A1 (en) * | 2008-10-01 | 2010-04-08 | Network Box Corporation Limited | Electronic communication control |
| US20100274856A1 (en) * | 2009-04-24 | 2010-10-28 | International Business Machines Corporation | Managing oversized messages |
| US8856525B2 (en) * | 2009-08-13 | 2014-10-07 | Michael Gregor Kaplan | Authentication of email servers and personal computers |
| US8327157B2 (en) * | 2010-02-15 | 2012-12-04 | Vistech LLC | Secure encrypted email server |
-
2010
- 2010-05-21 US US12/785,348 patent/US8707420B2/en active Active
-
2011
- 2011-05-02 KR KR1020127030390A patent/KR101784756B1/ko not_active Expired - Fee Related
- 2011-05-02 CN CN201180025046.3A patent/CN102918810B/zh active Active
- 2011-05-02 CA CA2798124A patent/CA2798124C/en not_active Expired - Fee Related
- 2011-05-02 KR KR1020177027593A patent/KR101903923B1/ko active Active
- 2011-05-02 JP JP2013512630A patent/JP6092098B2/ja active Active
- 2011-05-02 AU AU2011256698A patent/AU2011256698B2/en not_active Ceased
- 2011-05-02 RU RU2012149431/08A patent/RU2569806C2/ru not_active IP Right Cessation
- 2011-05-02 WO PCT/US2011/034800 patent/WO2011146232A2/en not_active Ceased
- 2011-05-02 BR BR112012029427-0A patent/BR112012029427B1/pt active IP Right Grant
- 2011-05-02 EP EP11783939.9A patent/EP2572328B1/en active Active
-
2014
- 2014-04-22 US US14/258,140 patent/US9253126B2/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040203589A1 (en) | 2002-07-11 | 2004-10-14 | Wang Jiwei R. | Method and system for controlling messages in a communication network |
| US20050210272A1 (en) | 2003-11-17 | 2005-09-22 | Fotta Keith A | Method and apparatus for regulating unsolicited electronic mail |
| US20070162394A1 (en) | 2004-02-12 | 2007-07-12 | Iconix, Inc. | Rapid identification of message authentication |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP2572328A4 |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2013152702A (ja) * | 2011-12-28 | 2013-08-08 | Canon Marketing Japan Inc | 情報処理装置、情報処理方法、及びコンピュータプログラム |
| JP2014180007A (ja) * | 2011-12-28 | 2014-09-25 | Canon Marketing Japan Inc | 情報処理装置、情報処理方法、及びコンピュータプログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102918810B (zh) | 2016-05-11 |
| JP6092098B2 (ja) | 2017-03-08 |
| BR112012029427A2 (pt) | 2017-02-21 |
| BR112012029427B1 (pt) | 2020-11-03 |
| US20140229562A1 (en) | 2014-08-14 |
| CA2798124A1 (en) | 2011-11-24 |
| KR20170118941A (ko) | 2017-10-25 |
| EP2572328B1 (en) | 2018-07-25 |
| US8707420B2 (en) | 2014-04-22 |
| KR20130077822A (ko) | 2013-07-09 |
| EP2572328A2 (en) | 2013-03-27 |
| KR101903923B1 (ko) | 2018-10-02 |
| KR101784756B1 (ko) | 2017-10-12 |
| EP2572328A4 (en) | 2014-03-19 |
| US9253126B2 (en) | 2016-02-02 |
| CN102918810A (zh) | 2013-02-06 |
| RU2569806C2 (ru) | 2015-11-27 |
| CA2798124C (en) | 2017-09-26 |
| AU2011256698A1 (en) | 2012-12-13 |
| JP2013528301A (ja) | 2013-07-08 |
| WO2011146232A3 (en) | 2012-01-19 |
| HK1180853A1 (zh) | 2013-10-25 |
| AU2011256698B2 (en) | 2014-05-29 |
| US20110289581A1 (en) | 2011-11-24 |
| RU2012149431A (ru) | 2014-05-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8707420B2 (en) | Trusted e-mail communication in a multi-tenant environment | |
| US7730145B1 (en) | Anti-UCE system and method using class-based certificates | |
| US20110113249A1 (en) | Method and system for sharing trusted contact information | |
| MXPA05011087A (es) | Validacion de mensajes de entrada. | |
| US9866391B1 (en) | Permissions based communication | |
| MXPA05014002A (es) | Lista segura de emisor seguridad. | |
| US8484456B2 (en) | Trusted electronic messaging system | |
| US9967242B2 (en) | Rich content scanning for non-service accounts for email delivery | |
| US9887950B2 (en) | Validating E-mails using message posting services | |
| Martin et al. | Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows | |
| HK1180853B (en) | Methods and systems for trusted e-mail communication in a multi-tenant environment | |
| EP3962035B1 (en) | Processing external messages using a secure email relay | |
| van Hove et al. | Your vulnerability disclosure is important to us: An analysis of coordinated vulnerability disclosure responses using a real security issue | |
| Zhao et al. | An add-on end-to-end secure email solution in mobile communications | |
| Tong et al. | E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing? | |
| Martin et al. | RFC 7960: Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows | |
| WO2014054009A1 (en) | Secure email messaging system and method | |
| EP1788771A1 (en) | System and method for handling electronic messages | |
| van Bekkum | Standard for Transmission & Security 1.1 | |
| Hansen et al. | RFC 5863: DomainKeys Identified Mail (DKIM) Development, Deployment, and Operations | |
| AU2005242194A1 (en) | A trusted electronic messaging system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 201180025046.3 Country of ref document: CN |
|
| ENP | Entry into the national phase |
Ref document number: 2798124 Country of ref document: CA |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 9401/CHENP/2012 Country of ref document: IN |
|
| ENP | Entry into the national phase |
Ref document number: 2012149431 Country of ref document: RU Kind code of ref document: A Ref document number: 20127030390 Country of ref document: KR Kind code of ref document: A |
|
| ENP | Entry into the national phase |
Ref document number: 2013512630 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2011783939 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2011256698 Country of ref document: AU Date of ref document: 20110502 Kind code of ref document: A |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11783939 Country of ref document: EP Kind code of ref document: A2 |
|
| REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112012029427 Country of ref document: BR |
|
| ENP | Entry into the national phase |
Ref document number: 112012029427 Country of ref document: BR Kind code of ref document: A2 Effective date: 20121119 |