A method and device for identifying identity characteristics of email senders

An e-mail sending and identity feature technology, applied in the field of e-mail system, can solve the problem of not being able to confirm the identity of the sender of the e-mail

Active Publication Date: 2021-04-13
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if some addresses and domain names have been set accordingly, in many cases, some recipients do not explicitly reject emails that do not comply with SPF or DKIM settings. Therefore, it is still difficult to confirm the identity of the email sender with these mechanisms alone. believable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for identifying identity characteristics of email senders
  • A method and device for identifying identity characteristics of email senders
  • A method and device for identifying identity characteristics of email senders

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0189] The first embodiment of the present application provides a method for identifying the identity of an e-mail sender. The method is used to identify whether the e-mail sender has a real identity. When an e-mail is transmitted between two different e-mail systems , the recipient system needs to screen and verify the authenticity of the domain name identity of the sending address of the received mail to determine whether the received mail is indeed from the email system authorized by the domain name owner, or to determine whether the Whether the received email is sent from the email sending IP address authorized by the domain name owner, further this method can identify suspicious emails sent by forging or pretending to be someone else's domain name.

[0190] Among them, the e-mail system is a separate system, which has its own server. Multiple domains can be set up in the e-mail system, and multiple users can be set up in each domain. For example, if you buy a The commerci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a method and device for identifying the identity characteristics of email senders, wherein the method establishes a preset feature matching model, uses the preset feature matching model as a basis for judgment, and concentrates the extracted preset features to be screened The matching conditions are judged based on the characteristics of the features, and when the corresponding features in the preset feature set meet the feature matching conditions, it means that the identity of the sender of the email to be screened is true and credible. Therefore, the method provided by this application does not require the email sender to make any settings, but completely collects and compares email sending behavior information, uses this information to match and identify the identity characteristics of the email sender, and through this method It can accurately confirm whether the identity of the sender is authentic or not.

Description

technical field [0001] The present application relates to the technical field of email systems, and in particular to a method and device for identifying identity characteristics of email senders. Background technique [0002] Due to the development of network technology, traditional communication methods are almost replaced by network communication methods. For example, the emergence of email has gradually replaced traditional letter transmission. In the era when the Internet is popular, users are more inclined to use email as a transmission method to transfer files and information no matter in life or work. [0003] According to the e-mail protocol, when an e-mail is transmitted in the same e-mail system, both the receiver and the sender need to use passwords and other methods for identity authentication when logging in for the receiver and sender to use the same e-mail system , Therefore, if the receiver and the sender use the same system, the sender needs to pass the ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L29/06H04L29/12
CPCH04L63/0876H04L51/42H04L61/4511
Inventor 沈朝阳
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products