Method for realizing electronic mail credibility management on the basis of anti-fraud control logic unit

A technology for controlling logic and e-mail, applied in electrical components, digital transmission systems, transmission systems, etc., can solve problems such as spam flooding, interference with users' daily life and work, and economic losses.

Inactive Publication Date: 2013-05-01
NANJING AUDIT UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After a computer is infected with a mail virus, it usually automatically forwards the virus mail, and even paralyzes the network service by consuming network resources; the well-known viruses such as Nimda and Code Red use e-mail to spread rapidly, and eventually lead to a large number of e-mails. Services were forced to shut down, causing huge financial losses
[0005] (3) Flooding of spam: Mail servers usually do not limit the forwarding function, and no special authentication is required for sending mail, which provides a breeding ground for the generation and reproduction of spam; according to statistics, 75% of e-mail boxes in the world have received spam , this kind of e-mail that is forcibly sent to the user's mailbox without the user's permission not only seriously interferes with the user's daily life and work, but also may occupy a large amount of network bandwidth and affect the normal operation of the network
Second, in terms of e-mail security transmission technology and mail server security technology, although the existing technology can guarantee the security and reliability of e-mail interaction to a certain extent, as Clark believes, the design of many security mechanisms is very poor at present. It seldom touches the core content of the architecture, and most of them use additional mechanisms such as single defense, single information security, and patching to block illegal users and unauthorized access at the periphery, and there is no set of rules to effectively integrate these security mechanisms. Ensure the security and reliability of mail interaction in the network system
[0037] In short, none of the existing secure email technologies can truly ensure the security of email interactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing electronic mail credibility management on the basis of anti-fraud control logic unit
  • Method for realizing electronic mail credibility management on the basis of anti-fraud control logic unit
  • Method for realizing electronic mail credibility management on the basis of anti-fraud control logic unit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] Embodiment 1: A method for implementing trusted email management such as figure 1 As shown, it does not overthrow any e-mail protocol structure widely used in the existing network system to rebuild a new type of e-mail protocol structure, but adds an anti-fraud control logic unit on this basis, which includes credibility management, trust Configuration, evidence management, non-repudiation and trust management are five components, among which the credibility management component provides the current credibility of the target entity to the trust configuration component in the form of trust view, and provides the target entity credibility to the trust management component in the form of historical trust flow Historical changes, and the reliability of the target entity that accepts the feedback from the trust management component; the trust configuration component implements trust decisions based on the trust view, and forms an email interaction control configuration comma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing electronic mail credibility management on the basis of an anti-fraud control logic unit. In the invention, predictability and manageability of mail interbehaviors are realized through increasing the anti-fraud control logic unit on the basis of not destroying a traditional electronic mail protocol structure in a traditional network system; and in the method, a credibility management module, a trust configuration module, an evidence management module, a non-repudiation module and a trust management module are comprised. Within an electronic mail credibility management frame, the mail interaction turns into a closed-loop self-feedback system in the whole process from the credibility management before mail interaction and control management in the interaction to dispute settlement and credibility feedback after the interaction, thereby satisfying security requirements on the mail interaction.

Description

technical field [0001] The present invention relates to the field of network security and management, in particular to an implementation method of e-mail trusted management based on anti-fraud control logic unit, which is used to ensure predictable and manageable e-mail interactive behavior, and provide future security e-mail Provide the infrastructure. Background technique [0002] As a cross-platform and general-purpose distributed system in a heterogeneous network environment, email has become the most widely used network application along with the popularization of the Internet and the rapid development of e-commerce and e-government applications; At the same time, issues critical to e-mail security, such as leakage of sensitive information, spread of viruses, and flooding of spam, are gradually attracting widespread attention from the industry. [0003] (1) Leakage of sensitive information: Emails need to be forwarded among multiple mail servers before reaching the tar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L29/06H04L12/24
Inventor 韩志耕陈耿王良民蒋健朱玉全崔应留
Owner NANJING AUDIT UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products