WO2000049776A1 - Method and apparatus for proxying and filtering electronic mail - Google Patents
Method and apparatus for proxying and filtering electronic mail Download PDFInfo
- Publication number
- WO2000049776A1 WO2000049776A1 PCT/GB2000/000560 GB0000560W WO0049776A1 WO 2000049776 A1 WO2000049776 A1 WO 2000049776A1 GB 0000560 W GB0000560 W GB 0000560W WO 0049776 A1 WO0049776 A1 WO 0049776A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- user
- electronic mail
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
Definitions
- This invention relates to electronic mail systems where electronic mail is passed between a client and server over a network.
- a piece of electronic mail referred to by those practised in the art as email, comprises a header component and a body component.
- the body component contains the message which the sender wishes to deliver to the eventual recipient; this message may be a piece of plain ASCII text, or a binary (a piece of machine-readable data such as a database or spreadsheet file, or even a program designed to be executed on a particular machine architecture) suitably encoded for transmission as an email message, or a number of pieces of text and binaries encapsulated via an appropriate metric within the one whole message body.
- the header component which is sometimes referred to as an "envelope" contains a number of fields; each field comprises a string of characters, and can be decomposed into a header (a piece of plain ASCII terminated by a colon), a field body, and a terminator (a carriage return followed by a linefeed).
- Email messages are generally constructed according to the Standard for the Format ofARPA Internet Text Messages specification; this document is known to those practised in the art as RFC822, and a plaintext copy of it may be found at ftp://ftp.sunsite.doc.ic.ac.uk/rfcs/rfc822.txt . All email messages that are intended to be propagated across the Internet must conform to this specification.
- the "To:” field This field is filled in by the message sender, and contains a comma- separated list of the email addresses of the intended primary recipients. It can also point to the email address of an alias expander (see below), or to the sender if the "Bcc:” method of sending, (see below) is used.
- the "Cc:” field This field is filled in by the message sender, and contains a comma- separated list of the email addresses of the intended secondary recipients. It can also point to the email address of an alias expander (see below).
- the "From:” field This field is filled in by the email software running on the sender's computer, and contains the email address of the sender.
- the "Envelope-to:” field This is the email address of a single intended recipient. If this address is not listed in the "To:” or “Cc:” fields, it can be inferred that the message was sent using the "Bcc:” method (see below).
- the "Date:” field This field is filled in by the email software running on the sender's computer, and contains the date and time at which the message was sent.
- the "Message-ID:" field This field contains a number generated by the sender's computer, using a metric which guarantees that the number can be used to uniquely identify a given piece of email.
- the "Subject:” field This field is filled in by the message sender, and is conventionally used to give an indication of the subject matter to which the message body content pertains. If the message is a reply to a previous message, it is conventional for the field body to begin with the string "Re:” or “Re[ ⁇ ]: M where n is an integer, or some string representing "Re:” or “Re[ «]:” in different case, followed by the field body present in the message being replied to. •
- the "Received:” field This field is added to the header by a mail forwarder program, which needs to be running on computers which bridge the individual networks between the sender's and recipient's computers and thus form the complete path ,by which the message is propagated from sender to recipient.
- This field usually contains the name and Internet address of the machine on which the forwarder is running, the name and version number of the piece of software acting as the forwarder, the name of the machine from which the forwarder received the message, the transport protocol used to transfer the message, an intermediate message ID assigned by the message transport, and the date and time at which the message was received by the forwarder.
- headers can be inserted at the time of sending either by the sender or the sender's email program; headers which fall outside the scope of those headers defined by RFC822 and associated RFCs are given field headers which begin with the string "X-".
- Email clients submit composed messages to a computer program known to those practised in the art as a mail transport agent, which is the program which causes a message to be propagated to its intended recipients.
- a distribution list is generally directed towards a particular subject matter (for example regdevs@acorn.co.uk, which dealt with technical news pertinent to developers of hardware and software for Acorn computers), thus those users who are interested in the subject matter can be "subscribed" by arrangement to the list.
- Their email address is then added to an alias expander, such that when an email is sent to the email address owned by the alias expander, the expander redistributes the email to the email addresses of all the list subscribers, using conventional email.
- Distribution lists can be managed directly by an administrator or trusted user, by a computer-executable program (such as Smartlist), or by a combination of both.
- a subscribed user With distribution lists, particularly unmoderated ones, a subscribed user often loses interest in the subject being discussed; when the user would rather not read a message which has been sent to them by an alias expander, that message becomes electronic junk mail; the name is given as an analogy to paper junk mail, which is considered a waste of time to open or read.
- Another source of junk email is spam; this term is applied to email messages, often containing advertisements for products or services as the body text, which are sent to alias expanders devoted to other topics, or directly to users who have often had no prior contact with the organisation originating the spam message. If a user is subscribed to multiple distribution lists, he can often receive multiple copies of the same spam message.
- POP3 Post Office Protocol - Version 3 of the Post Office Protocol
- RFC 1939 Post Office Protocol - Version 3
- RFC 1957 Some Observations on Implementations of the Post Office Protocol (POP 3)”; copies of these documents can be found at ftp://sunsite.doc.ic.ac.uk/rfcs/rfcl939.txt and ftp://sunsite.doc.ic.ac.uk/rfcs/rfcl957.txt .
- POP3 is intended to permit a client to dynamically access email stored on a server in a simple fashion; the server receives incoming mail intended for a given recipient from other Internet-based servers and collects it in a defined area of filespace (a "mailbox"), and the client (usually a workstation or thin client device) connects to the server from time to time and, by use of a small command set, is able to authenticate itself as a registered user with the server, to negotiate with the server to determine whether new mail is waiting to be collected, to make a local copy of the mail, and to delete mail from the mailbox on the server.
- a mailbox a defined area of filespace
- POP3 An extension of POP3 is known as APOP, which addresses some system security issues presented by POP3 (which, in non-APOP form, requires that the User ID and associated password are transmitted as unencrypted ASCII from the client to the server) by using the user's password to encrypt a one-time unique piece of plain ASCII passed by the server to the client at connection time as a digest using the MD5 encryption algorithm, and passing this digest to the server.
- MD5 encryption algorithm can be found in RFC 1321, a copy of which is located at ftp://sunsite.doc.ic.ac.uk/rfcs/rfc 1321.txt .
- the POP3 transport is designed for use in situations where the connection between the client and the server does not constitute a permanent link, or when the link between client and server is of very restricted bandwidth (ie significantly slower than lOBaseT Ethernet); thus POP3 is widely used by Internet Service Providers who provide Internet connectivity via the public switched telephone network for home users or small offices.
- the simplicity of the POP3 negotiation protocol also makes it very suitable for use with end-user client machines which have limited local computing power and little or no local storage, which are known to those skilled in the art as "thin" clients.
- the World Wide Web has several aspects; the first aspect is a language known as the Hypertext Mark-up Language (HTML), in which documents to be made available via the World Wide Web are written.
- HTML documents can comprise text, graphics and interactive features, such that an element of text of a graphic can form a link to another document; the user selects a link element on a page, and the page linked to is loaded.
- the second aspect of the World Wide Web is the Uniform Resource Locator (URL), and the associated Hypertext Transport Protocol (http).
- URL sytax is defined in the document known to those practised in the art as RFC 1630, and can be found as ftp://sunsite.doc.ic.ac.uk/rfc/rfcl630.txt .
- a user can cause the computer to request ("fetch") a local copy of an HTML document from a publicly- exported location on another computer connected to a network which can be routed to the local computer.
- Documents can also be specified in URLs which are local to the computer running the browser; the fetcher can then offer up the document from the computer's local storage medium if it can be found there.
- the third aspect of the World Wide Web is the browser; this is an application run by a user on their local computer which is able to render documents which have been written in HTML, and which communicates with the local http fetcher such that HTML documents fetched by the fetcher are rendered by the browser.
- the fourth and final aspect of the World Wide Web that is considered here is the server.
- This is a program run on a computer such that page fetch requests made of it by remote computers can be parsed and, if the relevant HTML document is available on the computer executing the server program and authentication conditions are satisfied, the document can be sent to the appropriate remote computer.
- the server supports an application interface codified as the Common Gateway Interface (CGI); this interface allows specific HTML document elements (check boxes, buttons, text areas etc) which can have their state changed by a user operating a browser viewing that document to communicate their state to a secondary application running on the machine acting as a server (and referred to by those practised in the art as a CGI script), and also allows appropriate scripts to dynamically generate customised HTML documents, which can then be served.
- CGI Common Gateway Interface
- the present invention provides apparatus for processing electronic mail, said apparatus comprising: mail fetching logic for fetching an electronic mail message for a user from a first mail server, said apparatus interacting as a first mail client with said first mail server; mail filtering logic for identifying at least one predetermined characteristic within said electronic mail message that is indicative of said mail message being unwanted by said user so as to identify said electronic mail message as either a wanted electronic mail message or an unwanted electronic mail message; mail storage for storing at least wanted electronic mail messages identified by said mail filtering logic; and mail delivery logic responsive to a mail delivery request from a second mail client for delivering wanted mail for said user from said mail storage to said second mail client, said apparatus interacting as a second mail server with said second mail client.
- POP3 protocol (rather than a protocol such as IMAP, although IMAP could be employed) between the end-client and the main server, since the use of POP3 enables the invention to be added to a pre-existing system without any change having to be made to the server in such a pre-existing system.
- POP3 In the treatment below the mail transport between the existing server and the filtering system, and the filtering system and the end-user client, is treated as being POP3, however it must be noted that the scope of the invention is not limited to embodiments where POP3 is used for this purpose.
- the invention may comprise a proxy system (whether as a distinct separate computer apparatus or a modular software component) which can be inserted between a POP3 server and a POP3 client, such that the system takes electronic mail in from the POP3 server, automatically filters it for junk mail according to a set of rules, and then passes the filtered mail out to the client via a second POP3 stream (thus appearing to the original client to be a POP3 server).
- a proxy system whether as a distinct separate computer apparatus or a modular software component
- Electronic mail considered by the system to be junk following automatic filtering can, optionally and dependent on the configuration set by the proxy's administrator, either be discarded or placed in a per-user "deferred" mailbox rather than being delivered by POP3; this "deferred" mailbox is an area of mass storage on the proxy where electronic mail can be stored, retrieved and presented to its original intended recipient.
- the contents of the deferred mailbox can be presented to the user for inspection via a secure World Wide Web page. Users may access their deferred mailbox via a World Wide Web browser, and using check boxes and action buttons can elect to have messages moved from the deferred box to their main POP3 box, or deleted.
- the user can inform the server of the junk nature of the message using a World Wide Web interface. If a number of users (the number is configured by the proxy's administrator) mark a particular message as being junk, then it is automatically deleted from the system.
- the deferred mailbox is subject to automatic message deletion for messages which have been resident there for an administrator-configurable length of time (a week is suggested as an appropriate time interval) to prevent the deferred mailboxes becoming too large.
- Figure 1 illustrates the connectivity between an email client, a POP3 server and the Internet, as typically observed between a single end-user and an Internet Service Provider;
- Figure 2 illustrates the connectivity between an email client, a POP3 server and the Internet, as typically observed between a small business running a number of computers (each hosting an email client), and an Internet Service Provider;
- Figure 3 indicates where in the chain of connectivity shown in Figure 1 a preferred embodiment of the invention would be installed by an Internet Service Provider;
- Figure 4 indicates where in the chain of connectivity shown in Figure 2 a preferred embodiment of the invention would be installed by the system administrator of a small business' computer network;
- Figure 5 illustrates portions of the computer systems shown in the above figures, and indicates the hardware present in and the software running on a preferred embodiment of the invention
- Figure 6 illustrates the principal computer programs which handle an email message in the preferred embodiment; the email message is originated at the top of the diagram, and received in a mailbox at the bottom of the diagram;
- Figure 7 shows an example of what the World Wide Web interface presented to the user for examining and manually filtering the contents of his deferred mailbox may look like
- Figure 8 shows the assignment of fields within a record contained within the email message database held on the proxy, in the preferred embodiment.
- Figure 9 shows the assignment of fields within a record contained within the database of users of the proxy, in the preferred embodiment.
- items of hardware within a computer system are differentiated from items of software running on that computer system by enclosing the character strings naming the items of hardware within a rectangular box.
- the system allows email messages resident on a POP3 server to be accessed via a proxy, such that the proxy performs filtering operations on the email as it is downloaded by a user of the proxy.
- a proxy performs filtering operations on the email as it is downloaded by a user of the proxy.
- all email stored on a remote POP3 server which is intended to be received by a user of the proxy may be "harvested" by the proxy at an administrator-configurable time and cached within the proxy.
- the filtering operations take place remote from the end-user system, such that this end-user system does not have to devote local computing power to performing the filtering operations, and the only change in configuration required at the end-user system involves changing the information pertaining to which POP3 server the user's email client should point at.
- the POP3 server requires no modification.
- End-users who are able to connect to the POP3 proxy using POP or APOP and associated authentication, by virtue of them having an account on the proxy apparatus, comprise a trusted group.
- Each user has two areas of filespace hosted on the proxy to which they have access; a main mailbox, which can be accessed using POP3, and a deferred mailbox. If an email to a user is scored by the filters as being suspected junk email, it is moved into the user's deferred mailbox, where it can be viewed by the user via an authenticated World Wide Web interface.
- the user can inform the proxy which emails within the deferred mailbox are genuinely junk, and which should be moved into the user's main mailbox such that they can be collected via POP3.
- the proxy maintains a database of all the email messages it holds, and if a sufficient number of users mark a given message as junk, the message is removed from all users' mailboxes so that users who have yet to read it do not have to waste their time doing so.
- Email messages held within the deferred box are automatically deleted a configurable time after they have been received, so that the deferred mailboxes do not grow in size to a point where they fill the file storage system installed on the proxy to its capacity.
- the group of people who use the proxy benefit from having their POP3 email automatically filtered such that junk messages are not presented for download; however, they also have a second area containing the messages which have been filtered out of their POP3 mailboxes, which they can elect to read to determine which messages are actually junk. If they find a junk message and inform the server of the nature of the message via their World Wide Web interface, the message is removed from all users' mailboxes, thus the first readers of a junk message benefit the group as a whole.
- Figure 1 shows a typical arrangement for a user client 101 to connect to POP3 server 102 and thence to the Internet 103, where the dashed line 105 indicates the point at which Internet and Intranet connect (routers, modems, modem concentrators and other equipment used to link the physical media 104, 106 and 107, where 104 is usually a telephone or ISDN line and 106 and 107 are Ethernet or some other fast interconnect commonly utilised between machines located at the same physical site, along which the email travels, are not shown), and where the client has no server support local to it (this is the most common configuration for an Internet Service Provider serving home users), and Figure 2 shows an alternative arrangement for the network such that the POP3 host 102 lies within an Intranet and consequently has a much higher- bandwidth link 204 (such as a lOBaseT Ethernet link) to the end-user client systems 101.
- This arrangement is more typical of a small office r ⁇ j-nning thin clients as end-user terminals; the slower ISDN or telephone
- FIGs 3 and 4 illustrates the location of the proxy 301 within the networks illustrated in Figures 1 and 2;
- Figure 5 gives a more detailed breakdown of the thin client or multiple client case illustrated in Figure 4, showing the individual computing elements (CPUs, network interfaces, memories, file storage units) present in an end-user thin client terminal, a POP3 proxy host, and a POP3 server.
- a Central Processing Unit (CPU) 501 is connected to a memory 502 and an I/O controller 503; the I/O controller supports a keyboard 504, a pointing device 505 and a display system 506 such as a monitor or a domestic television.
- CPU Central Processing Unit
- the thin client contains a network interface 507 (which may be an Ethernet adaptor, a modem designed to operate over the public switched telephone network, an ISDN modem and terminal adaptor, a cable modem, or some other network interface), and executes locally to itself an appropriate network stack, a World Wide Web browser 508 and an email package 509 which supports email reception via the POP3 protocol.
- the thin client has no local file storage capability, but instead makes use of file storage on a server (this could be the main POP3 server acting in another functional capacity, or a different server altogether). It links to the proxy apparatus 102 via an appropriate network connection 106.
- the proxy apparatus hardware 301 comprises a CPU 510, a memory 511, an I/O controller 512 and either one or two network interfaces 513, 514 (dependent on the exact structure of the network into which the proxy is to be installed) of types described above; the I/O controller 512 supports a file storage device 515 such as a hard disc drive, and although the I/O controller also has support for a keyboard, a pointing device and a display system such as a monitor, it is intended that these devices will not need to be permanently connected once initial configuration and installation has been performed (the intention being that all subsequent administration is performed via an authenticated World Wide Web interface).
- the proxy apparatus executes locally to itself an appropriate network stack or stacks, a World Wide Web server 516, a database 517 to contain details of the nature and status of email messages stored locally on the file storage device, a database 518 to contain user mapping details, a POP3 client 519, a POP3 server 520, and a set of database and World Wide Web server manipulation programs 521 which embody the filtering system.
- the proxy can be implemented purely as a set of software components on the main POP3 server 102;
- the POP3 server (which comprises a CPU 522, a memory 523, an I/O controller 524, one or more file storage devices 525 and one or more network interfaces 526, and which already runs locally to itself one or more network stacks, a mail transport agent and a POP3 server 527, as well as being likely to run computer-executable code to perform other unrelated services 528) can in this instance have added to it a POP3 client 519 to communicate with the existing POP3 server via an internal calling and message passing mechanism, a World Wide Web server 516, two databases 517 and 518, a POP3 server 520, and a set of database and World Wide Web server manipulation programs 521 which embody the filtering system.
- FIG. 6 provides a conceptual overview of the elements of an electronic mail system which features message interchange over the POP3 protocol and which uses the system disclosed here to provide message filtering services.
- a message sender's email system 601 contains a composition facility 602 that allows the sender to compose an email message, including specifying a list of recipients and a subject. This email is passed to a mail transport agent 603, where it is sent to the addresses of the intended recipients. Often, the message is sent to a remote computer by using the Internet 103; if an intended recipient has an address on the same computer as the sender, the Internet is not used but instead message deliver is handled by the computer which hosts the sender's and recipient's accounts.
- a copy of the message is stored in the sender's filespace as resident either on the system they are sending from or some other filesystem on a server local to their site. If the message is destined for a user who has an address handled by POP3 server 102, the message passes across the Internet, is handled by the POP3 server's mail transport agent 604,and is passed into the user's POP3 mailbox 605 as resident on the file storage device present on that system.
- the message is left in the mailbox 605 ready for collection when the user connects from their client to the proxy (if the proxy is not operating in harvest mode); if the elements of the filtering system are installed on the same hardware which hosts the POP3 server, the mail is collected locally.
- the mail is filtered using processes 606 such as those detailed in the "Automatic Mechanisms for Filtering and Scoring Email" section below and delivered either to the user's main POP3 mailbox 607 as resident on the proxy, or to the user's deferred mailbox 608.
- the user elects to examine his POP3 mailbox to determine whether new mail has arrived. If the embodiment of the filtering system in use involves the use of a separate hardware apparatus as the proxy, the user connects to the POP3 server running on the proxy device and authenticates himself using the recognised POP or APOP authentication mechanisms. If the proxy device is configured to filter mail on a per-connection rather than a "harvesting" basis, the proxy device observes that an authorised user has connected, and looks up in a database the appropriate address of the user's main POP3 server and the UserlD and password with which the user would authenticate himself on that server.
- the proxy then contacts the user's main POP3 server, authenticates itself with the server using the connected user's UserlD and password via the recognised POP or APOP authentication mechanisms, and uses the recognised POP3 mechanism to transfer any messages waiting in the user's mailbox to itself before terminating the POP3 session. For each new message fetched, the proxy then performs the following operations in the following order: •The proxy checks the message headers against the criteria embodied in the global killfile maintained by the proxy's system administrator, discarding any messages which match the criteria specified in the killfile for explicit message discarding.
- the proxy checks the message headers against the criteria embodied in the user's killfile as maintained by the user and which is to be applied to messages for which he is the intended recipient, discarding any messages which match the criteria specified in the killfile for explicit message discarding.
- the email database is checked for the existence of a record matching the "Message-ID:" field of the message; if no such record is found, the "Message-ID:” field, an integer indicating the number of intended message recipients who have addresses matching addresses of authorised users of the proxy, a field indicating the message's status (filtered as valid, filtered as junk or manually classified as junk) for the named user, and the time of receipt of the email are formed into a record and added to the database. If a database record matching the "Message-ID:” field of the message is found, the record is examined to determine whether the user has already received a copy of the message; if so, the message is discarded.
- the record is extended by adding a field indicating the message's status (filtered as valid, filtered as junk or manually classified as junk) for the named user is added, and the field representing the time of receipt of the email is updated with the time of receipt of this copy of the email.
- the proxy then enumerates the scoring filters installed (scoring filters are described in the "Automatic Mechanisms for Filtering and Scoring Email" below) and submits the message header and body text to each filter in turn. Each filter returns a positive integer; the higher the value of the integer, the closer is the match between the message submitted and what the filter considers to be junk email.
- the proxy multiplies each of the integers returned by the filters by an individual weighting (configured by the system administrator, and reflecting his confidence in the ability of each filter to reliably isolate junk email from useful email), sums the weighted integers, and compares the sum against threshold values set by the message's intended recipient and the system administrator in their configuration files.
- the user does not have to supply a threshold value; if the user does not supply a value, then the value set by the proxy's system administrator is used by default. If both the system administrator and the user have supplied values, the higher value is used for the comparison. »If the sum is greater than or equal to the threshold value, the message is moved into the user's deferred mailbox. If the sum is less than the threshold value the message is copied into the user's main mailbox, from where the user can retrieve it via a POP3 transaction forming part of his current session.
- the proxy device If the proxy device is configured to operate in a "harvesting" mode, the proxy will, at a time configurable by the proxy's system administrator, establish POP3 connections with the main POP3 server of each authorised user of the proxy in turn, authenticate itself with the main POP3 server as the appropriate user, fetch any waiting email from the mailbox of each user in turn, close the POP3 connections, and for each message in turn, operate upon the message using the processes listed above.
- the proxy will collect messages from the main POP3 server at or very shortly after the time when the message, having been processed by the POP3 server's mail transport agent, arrives in the user's POP3 mailbox. The messages will then be operated upon in turn using the processes listed above.
- the contents of a user's deferred mailbox may be operated upon by the user via a World Wide Web interface.
- An HTML document is constructed by a CGI script using methods known in the prior art, such that the user's World Wide Web browser presents him with a document containing information ("From:" field, "Date:” field, "Subject:” field, etc) pertaining to each message in the deferred mailbox.
- Each set of information pertaining to a particular message constitutes a link, such that the message headers and body text are presented in full as another HTML document (HTML mark-up being performed by another CGI script) if the link is clicked on by the user's pointing device.
- checkboxes are user-interaction elements that comprise part of a "fill-out form" as known to those skilled in the art of HTML.
- One checkbox has the function of marking the message as junk, and the other has the function of marking the message as valid and moving it to the user's main mailbox for delivery via POP3.
- An example of the possible display is shown in Figure 7.
- a preferred embodiment of the invention maintains information in a database regarding the unique "Message-ID:" identifiers for email messages, the number of intended recipients of each message who are authorised users of the proxy, the UserlDs of the authorised users who have received the email messages, and whether the killfile and configuration file of each user who is an intended recipient of a given message has caused that user's copy of the message to be automatically discarded, stored in the deferred mailbox as junk, or stored as useful mail in the main mailbox for POP3 delivery.
- the structure of a record of this type is represented in Figure 8, and the database is indexed on the contents of the "Message-ID" field.
- a second database holds records pertaining to authorised users.
- the proxy is able to operate in conjunction with multiple main POP3 servers, therefore each record in this database is indexed by the UserlD of the user as registered with the proxy, and contains fields representing the address of the user's main POP3 server, the user's UserlD on the remote POP3 server, the user's password on the remote POP3 server, and a flag to indicate whether the connection to the remote POP3 server should be authenticated using POP or APOP.
- the structure of a record of this type is represented in Figure 9.
- the email message database and the users' deferred mailboxes will grow in size over time, so a periodically-operating mechanism must be put in place to prevent them growing to a capacity which will fill and attempt to overflow the file storage device used by the proxy.
- a periodically-operating mechanism would in a preferred embodiment operate daily, and be scheduled to take place at a time when computer activity is predicted by the proxy system administrator to be low (activating the maintenance process at a time of 03:20 am is suggested).
- the email message database is examined, starting from the first record, and continuing sequentially so that all records are examined in the process.
- the ratio of the number of users who have specified the mail item as being junk to the number of users who have not specified the message as being junk and the absolute number of users who have specified the mail item as being junk is enumerated, and if this exceeds a ratio or absolute value set by the proxy system admimstrator, the message is deleted from the deferred mailboxes of all the users indicated in the record as having received it.
- the "Date of last update" field is compared with the current calendar date, and if the difference in dates between the date of update and the current date is equal to a suitable threshold set by the proxy's system administrator, the record is deleted.
- a suitable threshold set by the proxy's system administrator
- the deferred mailboxes require a different approach; users may be unable to examine their deferred email for a number of weeks owing to holiday, illness, business trips etc. Hence it would be inappropriate except in extreme circumstances for the contents of these mailboxes to be pruned automatically; instead, it is suggested that a periodically-operating mechanism (again, operating daily in the preferred embodiment) would enumerate the authorised proxy users, determine the size of each user's deferred mailbox, and construct a digest in the form of a World Wide Web document which would then be placed in the World Wide Web document area accessible only by the proxy's system administrator. If the system administrator saw that a particular user's deferred mailbox was becoming excessively large, he could then take appropriate action in accordance with his organisation's policy.
- a killfile is usually applied to USENET newsreaders rather than email systems. It comprises a list of email addresses and / or keywords found in header lines or body text, and information on how mail messages that match them should be dealt with.
- the email proxy can be configured either to stop all mail being passed through except that from specified users or with specified words in a header line or the body text, or to allow through all email except that from specified users or with specified words in a header line or the body text, or to copy emails from specified users or with specified words in a header line or the body text to a human administrator for examination. Such entries could therefore check for the user name of the sender, the domain the email was sent from, and the type of email client software the sender used (some clients are more suited to producing spam than others)
- Killfiles stored as part of the proxy apparatus may be made available to their respective owners by a file-export mechanism such as authenticated ftp or NFS, or the killfile may be constructed and maintained on a user's workstation and sent to the proxy by email.
- a killfile can be found in Table 1.
- Table 1 An example of a simple user killfile Message Scoring
- an email message is not explicitly barred by killfiles installed by the system administrator or the recipient of the mail, there are a numerous ways in which it may be filtered by a computer program to determine whether or not it is junk or spam email.
- Autonomous filters are sometimes used, however the methods outlined below can be treated as part of a modular structure in which, once a test is performed, the result of the test can be treated as a numerical value; this value can then be added to a running total relating to the message, such that if the total after the tests have been performed is greater than or equal to a threshold value set either by the user or the system administrator, the message can either be forwarded to a trusted user to determine whether or not it genuinely is junk mail, or it can be discarded by the computer subject to configuration.
- the following message scoring metrics by no means comprise the whole collection of tests that may be performed by the system; rather they serve as a useful starting point upon which to build a message-scoring suite of tests.
- string matching and related-string matching techniques such as those used by the freeware USENET newsreader "slrn" (source code for which is available on ftp://sunsite.doc.ic.ac.uk/ ) may be converted into scoring programs, and particularly advanced scoring programs may employ neural network techniques to identify and weight messages against known patterns which tend to occur in junk email, particularly spam.
- Table 2 An example of a mail header attached to a spam email
- Table 3 A second example of a mail header attached to a spam email Now apply the following scoring mechanisms:
- Junk email particularly spam, often has its headers modified by the sender so that the apparent sender has a ficticious email address. This is generally done so that messages from recipients complaining about the spam do not consume resource on the sender's server. Verifying the validity of a sender's email address is therefore another valuable method of determining whether or not a message is spam.
- Extract the "Reply-To:” field if it is present, from the message header; extract the "From:” field if the "Reply-To:” field is not present.
- Extract the domain component the string following the "@" from this field. 5
- a record of the message ID of each message received by each user is maintained within a database stored on the proxy; the database is structured such that it is indexed by message ID, and the contents of each record includes a field enumerating the authorised users of the proxy who have received a copy of the same message. If a message is received by a large number of users, it will either be a legitimate circular to users of a trusted group which includes the user of
- the portion of the sender's email address following the "@” can be checked against a regularly updated list of known addresses from which spam and other junk email is 30 known to originate.
- a list in this instance known as the "Mail Abuse Protection System Realtime Blackhole List (MAPS RBL)" is maintained at http://maps.vix.com/ .
- Subject Field and Message Body Content is maintained at http://maps.vix.com/ .
- the nature of the contents of the subject field or message body text can reliably indicate whether a given email is a junk message; for example, distribution list subscription and unsubscription requests usually contain a one-line body text starting with the word "subscribe” or "unsubscribe”.
- spam messages tend to contain an excess of exclamation marks (a contiguous block of more than two exclamation marks is not uncommon), dollar signs, and particular phrases. This method of filtering is prior art, and operates with the limitations that junk email usually does not have a unique characteristic in these areas.
- Each scoring metric when applied to an incoming email message, can return a positive integer indicating the degree to which the metric believes the message to be junk.
- the individual scores from each metric are weighted according to the confidence the proxy administrator has in the ability of each metric to distinguish junk email from useful email, and summed. The sum is compared to threshold values defined by the proxy administrator and the user; if the sum is greater than or equal to the threshold value, the message can configurably be deleted from all users' mailboxes, or moved to all users' deferred mailboxes.
- World Wide Web servers such as the one used in the preferred embodiment to present deferred mailboxes can be made secure in three significant ways; either by configuring the server to present UserlD - password challenge-response authentication request to a user to verify his identity before allowing him access to the CGI- constructed document showing the contents of his deferred mailbox, or by requiring that the server authenticate and serve the documents using the secure http protocol (https), or both.
- https secure http protocol
- the ability of the proxy's POP3 client to perform APOP may in fact be a security enhancement if the end-user client was only able to perform ordinary POP authentication.
- a computer program running on a computer in the embodiment described.
- a computer program can be recorded on a recording medium (for example a magnetic disc or tape, an optical disc or an electronic memory device such as a ROM) in a way well known to those skilled in the art.
- a suitable reading device such as a magnetic or optical disc drive
- a signal is produced which causes a computer to perform the processes described.
- a mail proxy apparatus which may be an additional computer apparatus (containing, for example, a CPU, a memory, a file storage system and one or more network interfaces, and running computer-readable code which implements a POP3 client, a POP3 server, a World Wide Web server and a database, and additional scripts to manipulate the database and the World Wide Web server) which is added to the network containing the preexisting client and pre-existing server and which appears to the pre-existing server as the client, and which appears to the pre-existing client's email system as a mail server and secure World Wide Web server;
- an additional computer apparatus containing, for example, a CPU, a memory, a file storage system and one or more network interfaces, and running computer-readable code which implements a POP3 client, a POP3 server, a World Wide Web server and a database, and additional scripts to manipulate the database and the World Wide Web server
- a set of metrics to be codified into computer-readable form for utilising a computer apparatus (comprising a CPU, a memory, a file storage system and one or more network interfaces) to filter email messages for junk and spam content by analysis of the message headers and body text of said emails;
- This aspect also includes a presentation prevention mechanism that operates to prevent messages in a given class from being presented to other users of the proxy apparatus;
- a computer program having computer readable code embodied in a computer usable storage medium, and which implements a POP3 mail proxy service.
- This code may be executed on an existing POP3 mail server, provided that the POP3 mail server is also running a World Wide Web server, such that the filtering process occurs transparently to the already-running POP3 server program, such that the client communicates with the POP3 proxy program, in which the screening processes are carried out, and which in turn communicates locally with the preexisting POP3 mail service;
- the POP3 server component of the proxy maintains two email repositories per user; one contains email to be delivered at the user's request via POP3, and the other contains "deferred" messages (which are messages which the screening system scores as being junk) which can be accessed by using a World Wide Web browser to access an HTML document built by a CGI script, such that the user can read email messages, mark checkboxes to indicate which messages are genuinely junk, mark checkboxes to indicate which messages in this mailbox should be transferred to the POP3 mailbox, and mark checkboxes to indicate which messages in this mailbox should be discarded; and
- a computer program having computer readable code embodied in a computer usable storage medium.
- This code when executed on a computer, causes a computer to provide services to a recipient.
- the services comprise all the services available to an unprivileged user plus the ability to add to, modify or configure the metrics used for screening of incoming messages for junk content, the ability to set thresholds at or above which messages are automatically considered to be junk, the ability to specify for all users how messages considered to be junk are to be dealt with automatically (whether they are to be moved to a deferred mailbox or discarded), the ability to specify or modify a killfile against which all messages incoming to the proxy are screened prior to being screened for subject or body content, the ability to specify the mode of operation (proxy-per-connection or harvest) mode of the computer executing the code, the ability to determine the time after which a message enters a deferred mailbox it is discarded, and the ability to authorise new users so that they may use the proxy, and remove authorisation
- the service comprises POP3 email filtered to remove junk content, World Wide Web-browsable digests of messages which have been sent addressed to the user but classified by filters as likely to be junk, the ability to specify how messages to that user are dealt with once classified by filters as likely to be junk, the ability to specify and modify a killfile against which messages to that user are screened prior to being screened for subject or body content, and the ability to flag a received email as being junk such that the program will remove instances of that email from other users' mailboxes subject to the metrics imposed by the administrator.
- a computer controlled method for processing electronic mail (email) comprising the steps of:
- step (a) matching header and / or body text in each message against criteria set in particular configuration files ("killfiles") by the system administrator and / or the intended recipient of the message, and either deleting the message or passing it to step (b) below dependent upon a match; (b) passing each message which remains undeleted by the processes in step (a) above to a set of scoring metrics, to obtain a characterisation of each message indicating the likelihood of the message comprising junk; (c) recording specific characteristics of each message in a database such that records of receipt of multiple copies of the same message can be used by the scoring metrics in step
- Clause 4 The computer performed multiplicative weighting applied to the numerical result returned by each scoring metric in clause 3, according to a file generated and maintained by the system administrator and which reflects his confidence in each metric to reliably isolate junk email from useful email, and the summing of the weighted results to produce a single characterisation metric for each message.
- Clause 7 The computer controlled method of testing the validity of an email address to be used by the metric of clause 6, and comprising:
- Clause 8 The allocation of two mailboxes to each user, where messages considered to be useful are delivered to one mailbox (denoted as the "main” mailbox) and messages that are suspected to comprise junk, following computer-performed classification by the computer controlled systems of clause 1 part (b) are delivered to the other mailbox (denoted as the "deferred” mailbox), as disclosed in clause 1 part (c).
- Clause 9 The computer controlled method of presentation of the contents of the deferred mailbox to its owning user as disclosed in clause 1 part (d), such that each message therein may be examined and optionally classified by the user as junk.
- Clause 10 The computer controlled method of notification by which the server hosting the deferred mailbox of clause 9 may be informed by the user that a message within his deferred mailbox constitutes junk.
- Clause 11 The use of a World Wide Web interface to present a computer controlled interactive digest of email messages contained within the deferred mailbox as in clause 9, and to implement the notification mechanism of clause 10 by encoding notification details within a URL to be passed to a CGI script executing on the apparatus of clause 1 part (a).
- Clause 12 The computer controlled method of clause 1 part (f) of deleting a message manually classified as junk according to the computer controlled methods of clauses 9, 10 and 11.
- a computer controlled method for automatically connecting to and downloading all pending email from a plurality of remote mail servers for all registered users of an apparatus comprising a central processor unit, a memory, a file storage mechanism and one or more network interfaces), and filing the email according to intended recipient in appropriate mailboxes stored on the apparatus in a non-interactive batch process, such that the apparatus functions as an email proxy server.
- Clause 14 A computer controlled method of indexing received email for the purpose of determining its likelihood to constitute junk, by storing salient properties of each message in a database as the message is received for use by the suite of scoring metrics disclosed in clauses 3, 5, 6 and 7.
- An electronic mail (email) and World Wide Web system having a central processor unit, a memory, a file storage mechanism and one or more network interfaces, said system comprising:
- a World Wide Web presentation mechanism configured to interactively present email messages classified as likely to constitute junk for inspection by their intended recipient;
- a classification mechanism configured to allow the intended recipient of a message to classify said message;
- a presentation prevention mechanism configured to prevent presentation of messages formally classified as junk to registered users of the system.
- Clause 16 The system of clause 15, whereby the classification mechanism of part (e) is further configured to notify the system of manual junk email classification by submitting a URL to a CGI script.
- Clause 17 The system of clause 15, whereby the classification mechanism of clause 16 includes an identifying characteristic of the junk email message.
- Clause 18 The system of clause 15, whereby the mechanisms of examining email include implementations of the methods described in clauses 2, 3, 4, 5, 6 and 7, and subsequent recording of the results of examination according to clause 14.
- Clause 19 The system of clause 15, whereby the presentation prevention mechanism further comprises a deletion mechanism configured to delete all instances of a message having an identifying characteristic passed to it by the method of clause 16 from all the deferred mailboxes stored on the system.
- An electronic mail (email) apparatus configured to gather, process and proxy serve electronic mail messages, said apparatus having a central processor unit, a memory, a file storage mechanism and one or more network interfaces, said apparatus comprising a message classifying, sorting and filing mechanism and a presentation prevention mechanism configured to prevent presentation of an email message to one or more registered users of the apparatus.
- a signal for causing an electronic mail (email) apparatus to process electronic mail messages said apparatus having a central processor unit, a memory, a file storage mechanism and one or more network interfaces, the signal causing the apparatus to implement a message sorting and filing mechanism and a presentation mechanism configured to prevent presentation of an email message to one or more registered users of the apparatus.
- a method of storing data on a recording medium comprising storing data representative of a signal, that causes an electronic mail (email) apparatus to gather, process and proxy serve electronic mail messages, said apparatus having a central processor unit, a memory, a file storage mechanism and one or more network interfaces; the signal causing the apparatus to implement a message sorting and filtering mechanism and a presentation mechanism configured to prevent presentation of an email message to one or more registered users of the apparatus.
- an electronic mail electronic mail
- Clause 23 The email apparatus of clause 20, the signal of clause 21 or the method of clause 22 whereby said presentation prevention mechanism further comprises a World Wide Web server and CGI script set configured to receive a URL.
- a computer program product comprising: (a) a computer usable storage medium having computer readable code embodied therein for causing a computer to gather, process and proxy serve electronic mail messages, said computer readable code comprising:
- Clause 28 The computer program product of clause 26, whereby said presentation prevention mechanism further comprises computer readable code devices configured to enable a computer to receive a URL containing an identifying characteristic and effect an email deletion mechanism configured to dispose of said email message having said identifying characteristic.
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000600402A JP2002537727A (en) | 1999-02-17 | 2000-02-17 | Electronic mail proxy and filter device and method |
EP00903871A EP1153498A1 (en) | 1999-02-17 | 2000-02-17 | Method and apparatus for proxying and filtering electronic mail |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9903672.5 | 1999-02-17 | ||
GB9903672A GB2347053A (en) | 1999-02-17 | 1999-02-17 | Proxy server filters unwanted email |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000049776A1 true WO2000049776A1 (en) | 2000-08-24 |
Family
ID=10847991
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2000/000560 WO2000049776A1 (en) | 1999-02-17 | 2000-02-17 | Method and apparatus for proxying and filtering electronic mail |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1153498A1 (en) |
JP (1) | JP2002537727A (en) |
GB (1) | GB2347053A (en) |
WO (1) | WO2000049776A1 (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2366706A (en) * | 2000-08-31 | 2002-03-13 | Content Technologies Ltd | Monitoring email eg for spam,junk etc |
DE10115428A1 (en) * | 2001-03-29 | 2002-10-17 | Siemens Ag | Procedure for detecting an unsolicited email |
WO2004032439A1 (en) * | 2002-10-03 | 2004-04-15 | Ralf Seifert | Method and apparatus for filtering e-mail |
EP1494409A2 (en) * | 2003-06-30 | 2005-01-05 | Microsoft Corporation | Use of a bulk-email filter within a system for classifying messages for urgency or importance |
WO2005055545A1 (en) * | 2003-12-05 | 2005-06-16 | Research In Motion Limited | Apparatus and method of controlling unsolicited traffic destined to a wireless communication device |
US6941348B2 (en) | 2002-02-19 | 2005-09-06 | Postini, Inc. | Systems and methods for managing the transmission of electronic messages through active message date updating |
EP1489799A3 (en) * | 2003-06-20 | 2005-09-28 | Microsoft Corporation | Obfuscation of a spam filter |
JP2006178998A (en) * | 2004-12-21 | 2006-07-06 | Lucent Technol Inc | Detection of annoying message (spam) based on message content |
US7133660B2 (en) | 2000-09-29 | 2006-11-07 | Postini, Inc. | E-mail filtering services and e-mail service enrollment techniques |
US7437416B2 (en) | 2002-10-03 | 2008-10-14 | Ntt Docomo, Inc. | Electronic mail server apparatus |
US7603472B2 (en) | 2003-02-19 | 2009-10-13 | Google Inc. | Zero-minute virus and spam detection |
US7647321B2 (en) | 2004-04-26 | 2010-01-12 | Google Inc. | System and method for filtering electronic messages using business heuristics |
US7668951B2 (en) | 2004-05-25 | 2010-02-23 | Google Inc. | Electronic message source reputation information system |
US7730141B2 (en) | 2005-12-16 | 2010-06-01 | Microsoft Corporation | Graphical interface for defining mutually exclusive destinations |
US7958187B2 (en) | 2003-02-19 | 2011-06-07 | Google Inc. | Systems and methods for managing directory harvest attacks via electronic messages |
CN113055274A (en) * | 2021-02-04 | 2021-06-29 | 北京淇瑀信息科技有限公司 | File distribution method and device based on RPA and electronic equipment |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU3969093A (en) | 1992-04-30 | 1993-11-29 | Apple Computer, Inc. | Method and apparatus for organizing information in a computer system |
KR100403582B1 (en) * | 2001-01-11 | 2003-10-30 | 삼성전자주식회사 | Multi-function apparatus and method for receiving and printing electronic letter |
GB2373130B (en) * | 2001-03-05 | 2004-09-22 | Messagelabs Ltd | Method of,and system for,processing email in particular to detect unsolicited bulk email |
US7076527B2 (en) | 2001-06-14 | 2006-07-11 | Apple Computer, Inc. | Method and apparatus for filtering email |
WO2003044617A2 (en) * | 2001-10-03 | 2003-05-30 | Reginald Adkins | Authorized email control system |
JP3717829B2 (en) | 2001-10-05 | 2005-11-16 | 日本デジタル株式会社 | Junk mail repelling system |
EP1376420A1 (en) * | 2002-06-19 | 2004-01-02 | Pitsos Errikos | Method and system for classifying electronic documents |
US8046832B2 (en) | 2002-06-26 | 2011-10-25 | Microsoft Corporation | Spam detector with challenges |
US7627633B2 (en) | 2002-08-30 | 2009-12-01 | The Go Daddy Group, Inc. | Proxy email method and system |
US8775675B2 (en) | 2002-08-30 | 2014-07-08 | Go Daddy Operating Company, LLC | Domain name hijack protection |
US7130878B2 (en) | 2002-08-30 | 2006-10-31 | The Go Daddy Group, Inc. | Systems and methods for domain name registration by proxy |
GB2396709A (en) * | 2002-12-27 | 2004-06-30 | Ttpcomm Ltd | Method of Filtering Messages |
US7533148B2 (en) * | 2003-01-09 | 2009-05-12 | Microsoft Corporation | Framework to enable integration of anti-spam technologies |
US7543053B2 (en) * | 2003-03-03 | 2009-06-02 | Microsoft Corporation | Intelligent quarantining for spam prevention |
GB2405229B (en) * | 2003-08-19 | 2006-01-11 | Sophos Plc | Method and apparatus for filtering electronic mail |
US7257564B2 (en) | 2003-10-03 | 2007-08-14 | Tumbleweed Communications Corp. | Dynamic message filtering |
US7349901B2 (en) * | 2004-05-21 | 2008-03-25 | Microsoft Corporation | Search engine spam detection using external data |
US20060168020A1 (en) | 2004-12-10 | 2006-07-27 | Network Solutions, Llc | Private domain name registration |
US7930353B2 (en) | 2005-07-29 | 2011-04-19 | Microsoft Corporation | Trees of classifiers for detecting email spam |
US7908329B2 (en) * | 2005-08-16 | 2011-03-15 | Microsoft Corporation | Enhanced e-mail folder security |
US8065370B2 (en) | 2005-11-03 | 2011-11-22 | Microsoft Corporation | Proofs to filter spam |
WO2008004064A1 (en) * | 2006-06-30 | 2008-01-10 | Network Box Corporation Limited | Proxy server |
US8224905B2 (en) | 2006-12-06 | 2012-07-17 | Microsoft Corporation | Spam filtration utilizing sender activity data |
US8428367B2 (en) | 2007-10-26 | 2013-04-23 | International Business Machines Corporation | System and method for electronic document classification |
US9565147B2 (en) | 2014-06-30 | 2017-02-07 | Go Daddy Operating Company, LLC | System and methods for multiple email services having a common domain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0420779A2 (en) * | 1989-09-25 | 1991-04-03 | International Business Machines Corporation | User selectable electronic mail management method |
WO1996035994A1 (en) * | 1995-05-08 | 1996-11-14 | Compuserve Incorporated | Rules based electronic message management system |
WO1999006929A2 (en) * | 1997-08-03 | 1999-02-11 | At & T Corp. | An extensible proxy framework for e-mail agents |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6453327B1 (en) * | 1996-06-10 | 2002-09-17 | Sun Microsystems, Inc. | Method and apparatus for identifying and discarding junk electronic mail |
TW400487B (en) * | 1996-10-24 | 2000-08-01 | Tumbleweed Software Corp | Electronic document delivery system |
WO1998037680A2 (en) * | 1997-02-25 | 1998-08-27 | Intervoice Limited Partnership | E-mail server for message filtering and routing |
US6185551B1 (en) * | 1997-06-16 | 2001-02-06 | Digital Equipment Corporation | Web-based electronic mail service apparatus and method using full text and label indexing |
GB2328110B (en) * | 1997-08-01 | 2001-12-12 | Mitel Corp | Dialable screening profile |
-
1999
- 1999-02-17 GB GB9903672A patent/GB2347053A/en not_active Withdrawn
-
2000
- 2000-02-17 WO PCT/GB2000/000560 patent/WO2000049776A1/en not_active Application Discontinuation
- 2000-02-17 JP JP2000600402A patent/JP2002537727A/en not_active Withdrawn
- 2000-02-17 EP EP00903871A patent/EP1153498A1/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0420779A2 (en) * | 1989-09-25 | 1991-04-03 | International Business Machines Corporation | User selectable electronic mail management method |
WO1996035994A1 (en) * | 1995-05-08 | 1996-11-14 | Compuserve Incorporated | Rules based electronic message management system |
WO1999006929A2 (en) * | 1997-08-03 | 1999-02-11 | At & T Corp. | An extensible proxy framework for e-mail agents |
Non-Patent Citations (2)
Title |
---|
PALME J ET AL: "Issues when designing filters in messaging systems", COMPUTER COMMUNICATIONS,NL,ELSEVIER SCIENCE PUBLISHERS BV, AMSTERDAM, vol. 19, no. 2, 1 February 1996 (1996-02-01), pages 95 - 101, XP004032392, ISSN: 0140-3664 * |
PICH J: "PC-BRIEFKASTEN FUER E-MAIL: TIXI-MAIL BOX", CHIP ZEITSCHRIFT FUER MIKROCOMPUTER-TECHNIK,DE,VOGEL VERLAG. WURZBURG, no. 3, 1 March 1998 (1998-03-01), pages 192 - 194, XP000737954, ISSN: 0170-6632 * |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7565403B2 (en) | 2000-03-16 | 2009-07-21 | Microsoft Corporation | Use of a bulk-email filter within a system for classifying messages for urgency or importance |
US7801960B2 (en) | 2000-08-31 | 2010-09-21 | Clearswift Limited | Monitoring electronic mail message digests |
GB2366706A (en) * | 2000-08-31 | 2002-03-13 | Content Technologies Ltd | Monitoring email eg for spam,junk etc |
GB2366706B (en) * | 2000-08-31 | 2004-11-03 | Content Technologies Ltd | Monitoring electronic mail messages digests |
US7272378B2 (en) | 2000-09-29 | 2007-09-18 | Postini, Inc. | E-mail filtering services using Internet protocol routing information |
US7761498B2 (en) | 2000-09-29 | 2010-07-20 | Google Inc. | Electronic document policy compliance techniques |
CN101710880A (en) * | 2000-09-29 | 2010-05-19 | 谷歌公司 | Value-added electronic messaging services and implementation thereof using an intermediate server |
US7133660B2 (en) | 2000-09-29 | 2006-11-07 | Postini, Inc. | E-mail filtering services and e-mail service enrollment techniques |
US7236769B2 (en) | 2000-09-29 | 2007-06-26 | Postini, Inc. | Value-added electronic messaging services and transparent implementation thereof using intermediate server |
US7277695B2 (en) | 2000-09-29 | 2007-10-02 | Postini, Inc. | E-mail policy compliance techniques |
US7428410B2 (en) | 2000-09-29 | 2008-09-23 | Google Inc. | Value-added electronic messaging services having web-based user accessible message center |
DE10115428A1 (en) * | 2001-03-29 | 2002-10-17 | Siemens Ag | Procedure for detecting an unsolicited email |
US8725889B2 (en) | 2002-02-19 | 2014-05-13 | Google Inc. | E-mail management services |
US8769020B2 (en) | 2002-02-19 | 2014-07-01 | Google, Inc. | Systems and methods for managing the transmission of electronic messages via message source data |
US6941348B2 (en) | 2002-02-19 | 2005-09-06 | Postini, Inc. | Systems and methods for managing the transmission of electronic messages through active message date updating |
WO2004032439A1 (en) * | 2002-10-03 | 2004-04-15 | Ralf Seifert | Method and apparatus for filtering e-mail |
US7437416B2 (en) | 2002-10-03 | 2008-10-14 | Ntt Docomo, Inc. | Electronic mail server apparatus |
US7603472B2 (en) | 2003-02-19 | 2009-10-13 | Google Inc. | Zero-minute virus and spam detection |
US7958187B2 (en) | 2003-02-19 | 2011-06-07 | Google Inc. | Systems and methods for managing directory harvest attacks via electronic messages |
EP1489799A3 (en) * | 2003-06-20 | 2005-09-28 | Microsoft Corporation | Obfuscation of a spam filter |
EP1494409A2 (en) * | 2003-06-30 | 2005-01-05 | Microsoft Corporation | Use of a bulk-email filter within a system for classifying messages for urgency or importance |
EP1494409A3 (en) * | 2003-06-30 | 2005-04-27 | Microsoft Corporation | Use of a bulk-email filter within a system for classifying messages for urgency or importance |
CN1577359B (en) * | 2003-06-30 | 2012-05-02 | 微软公司 | System and method for effectively and automatically processing information |
US7684363B2 (en) | 2003-12-05 | 2010-03-23 | Research In Motion Ltd. | Apparatus and method of controlling unsolicited traffic destined to a wireless communication device |
US7545767B2 (en) | 2003-12-05 | 2009-06-09 | Research In Motion Limited | Apparatus and method of controlling unsolicited traffic destined to a wireless communication device |
WO2005055545A1 (en) * | 2003-12-05 | 2005-06-16 | Research In Motion Limited | Apparatus and method of controlling unsolicited traffic destined to a wireless communication device |
US7647321B2 (en) | 2004-04-26 | 2010-01-12 | Google Inc. | System and method for filtering electronic messages using business heuristics |
US8321432B2 (en) | 2004-04-26 | 2012-11-27 | Google Inc. | System and method for filtering electronic messages using business heuristics |
US8037144B2 (en) | 2004-05-25 | 2011-10-11 | Google Inc. | Electronic message source reputation information system |
US8001268B2 (en) | 2004-05-25 | 2011-08-16 | Google Inc. | Source reputation information system with router-level filtering of electronic messages |
US7792909B2 (en) | 2004-05-25 | 2010-09-07 | Google Inc. | Electronic message source reputation information system |
US7788359B2 (en) | 2004-05-25 | 2010-08-31 | Google Inc. | Source reputation information system with blocking of TCP connections from sources of electronic messages |
US7668951B2 (en) | 2004-05-25 | 2010-02-23 | Google Inc. | Electronic message source reputation information system |
JP2006178998A (en) * | 2004-12-21 | 2006-07-06 | Lucent Technol Inc | Detection of annoying message (spam) based on message content |
US7730141B2 (en) | 2005-12-16 | 2010-06-01 | Microsoft Corporation | Graphical interface for defining mutually exclusive destinations |
CN113055274A (en) * | 2021-02-04 | 2021-06-29 | 北京淇瑀信息科技有限公司 | File distribution method and device based on RPA and electronic equipment |
CN113055274B (en) * | 2021-02-04 | 2022-09-06 | 北京淇瑀信息科技有限公司 | File distribution method and device based on RPA and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
GB2347053A (en) | 2000-08-23 |
JP2002537727A (en) | 2002-11-05 |
GB9903672D0 (en) | 1999-04-14 |
EP1153498A1 (en) | 2001-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2000049776A1 (en) | Method and apparatus for proxying and filtering electronic mail | |
US8646043B2 (en) | System for eliminating unauthorized electronic mail | |
US7249175B1 (en) | Method and system for blocking e-mail having a nonexistent sender address | |
EP2068516B1 (en) | E-mail management services | |
US9338026B2 (en) | Delay technique in e-mail filtering system | |
US7886066B2 (en) | Zero-minute virus and spam detection | |
US20050015626A1 (en) | System and method for identifying and filtering junk e-mail messages or spam based on URL content | |
US7822977B2 (en) | System for eliminating unauthorized electronic mail | |
AU782333B2 (en) | Electronic message filter having a whitelist database and a quarantining mechanism | |
US20050081059A1 (en) | Method and system for e-mail filtering | |
US20060036690A1 (en) | Network protection system | |
US20050044160A1 (en) | Method and software product for identifying unsolicited emails | |
US20060265459A1 (en) | Systems and methods for managing the transmission of synchronous electronic messages | |
WO2005001733A1 (en) | E-mail managing system and method thereof | |
US7958187B2 (en) | Systems and methods for managing directory harvest attacks via electronic messages | |
KR20040074118A (en) | An Internet Mail Method and System based on Sender Mailbox | |
JP2004523012A (en) | A system to filter out unauthorized email | |
KR20040035329A (en) | method for automatically blocking spam mail by mailing record |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000903871 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2000 600402 Kind code of ref document: A Format of ref document f/p: F |
|
WWP | Wipo information: published in national office |
Ref document number: 2000903871 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09913589 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000903871 Country of ref document: EP |