Email transfer method for the online protocol and credit mechanism based on scalable message

A technology for sending e-mails and e-mails, applied in the Internet field, can solve problems such as difficulty in promotion and deployment

Active Publication Date: 2009-09-09
TSINGHUA UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the Email service industry has been fully popularized and deeply rooted, it is difficult to achieve comprehensive promotion and deployment of improvements to such a "legacy system"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Email transfer method for the online protocol and credit mechanism based on scalable message
  • Email transfer method for the online protocol and credit mechanism based on scalable message
  • Email transfer method for the online protocol and credit mechanism based on scalable message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] We mainly introduce a core mechanism of the present invention: the spam filtering method based on the reputation mechanism and the black and white list strategy. For the black and white list information, we can extract the white list information from the contact list information submitted by each IM user; and the black list information, we can use the Privacy Lists mechanism provided by the XMPP protocol to obtain the communication of which users the user rejects. For the reputation mechanism, we need to build a reputation network and a reputation calculation model in order to obtain the user's reputation.

[0049] For the establishment of the reputation network, we use the user whitelist information collected by the server, that is, the contact list information to build a reputation network. Through the contact list, we can get such as figure 2 Such a directed graph G 1 : The directed connection (A → B) between the nodes in the graph indicates that there is a relati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The e-mail transmission method based on the extensible message online protocol and reputation mechanism belongs to the field of network security. It is characterized in that: in the method, the IM platform based on the XMPP protocol is used to effectively guarantee the authenticity of the source identity. The "pull mode" transmission mode is adopted for sending Email messages. In the process of message transmission, the IM platform is used to maintain the characteristics of the user's online status, and a transmission method combining block transmission and direct connection transmission between the sender and the receiver is adopted. Moreover, in the method, a unique combination of the reputation mechanism and the black and white list strategy is invented to prevent spam attacks in real time. The method can be deployed on the widely used IM platform based on the XMPP protocol at present. The method adopts the transmission scheme of server forwarding and end-to-end direct connection to transmit messages, which reduces the burden on the original server and will not affect the performance of the original IM service.

Description

technical field [0001] The e-mail transmission method based on the Extensible Messaging and Presence Protocol (XMPP) and reputation mechanism belongs to the field of Internet technology, and especially relates to the technology of network security. Background technique [0002] With the development and popularization of the Internet, Email has become one of the indispensable means of communication in people's daily life with its unique charm of convenience, speed and low cost. But while Email brings great convenience to people, it also increasingly shows its flaws and hidden dangers that cannot be ignored, especially spam attacks. It seriously affects people's normal communication. At present, the source identities of many spam emails are forged, which has a great impact on spam filtering and governance. The reason why the source identity is easy to forge is that the Email communication protocol lacks the necessary identity authentication mechanism. At present, most email...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L29/06H04L9/32
Inventor 毕军吴建平张文茂
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products