Unlock instant, AI-driven research and patent intelligence for your innovation.

Junk mail identifying method and device

A spam and identification method technology, applied in the field of communication, can solve the problems of white list failure, sending address spoofing, unable to block such mails, etc., and achieve the effect of preventing receiving

Active Publication Date: 2014-12-31
HUAWEI DEVICE CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the format of spam is changing with each passing day, so that it can avoid the detection of anti-spam software. For example, some spam creators do not simply broadcast emails, but spoof sending addresses, so that the white list cannot block such emails
In addition, the methods used by Internet Service Providers (ISPs) to prevent spam on mail servers are different from those used by client manufacturers, and they are not compatible with each other and are not easy to expand.
And because the email ISP is very powerful, many manufacturers of advertising emails now cooperate with the email ISP. The email ISP can invalidate the white list through its powerful authority, and the user has no initiative

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Junk mail identifying method and device
  • Junk mail identifying method and device
  • Junk mail identifying method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0017] The invention discloses a spam identification method and device. The method and device are used for the local mail client to actively send a key by broadcasting and add the key to Send it to the Simple Mail Transfer Protocol (SMTP), and the legal multiple peer mail clients will process the key after receiving the key. When sending mail to the local mail client, the The key is added to the SMTP protocol again for sending. After the local mail client receives the mail sent by the peer mail client, it judges according to the key added to the SMTP protocol again and judges the received mail according to the judgment result of the key. The emails are processed accordingly. This can fundamentally block spam.

[0018] figure 1 It is a flowchart of a spam identification method provided by an embodiment of the present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to a junk mail identifying method and device. The junk mail identifying method specifically comprises the following steps of: sending broadcast information to an opposite-end mail client, wherein the broadcast information comprises a first secret key, and the first secret key is used for generating a second secret key by the opposite-end mail client according to the first secret key, and generating a third secret key by a local mail client according to the first secret key; receiving a mail sent by the opposite-end mail client through a simple mail transmission protocol; identifying whether the second secret key exists in the simple mail transmission protocol or not; if the second secrete key exists in the simple mail transmission protocol, identifying whether the second secret key is the same as the third secret key or not; if the second secrete key is the same as the third secrete key, storing the mail; and otherwise, judging that the mail is a junk mail. Therefore, with the adoption of the method and the device provided by the invention, a user can get hold of initiative for judging the junk mail independently, so as to better prevent the junk mail from being received.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a spam identification method and device. Background technique [0002] With the development of the Internet, many legal or illegal merchants forcefully send a large amount of spam to the user's mailbox without the user's permission, thereby bringing a lot of troubles to the user. Especially when the user receives spam carrying viruses or Trojan horses, it will bring fatal harm to the user. As the problem of spam is becoming more and more serious, many software vendors have launched their own anti-spam software. [0003] At present, the method of dealing with spam generally uses whitelist technology, puts the legal sender's mailbox into the whitelist set by the user, and processes the emails in the whitelist according to different levels. Among them, the highest level is to only accept emails sent by email addresses in the white list. [0004] However, the format of spam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58
Inventor 潘伟
Owner HUAWEI DEVICE CO LTD