Goodman, 2004 - Google Patents
IP Addresses in Email Clients.Goodman, 2004
View PDF- Document ID
- 8489409022893440488
- Author
- Goodman J
- Publication year
- Publication venue
- CEAS
External Links
Snippet
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti- spoofing and related purposes. While it is trivial to find the sender's IP address in most email server software, it turns out to be surprisingly difficult to do so in email client software: we …
- 235000008694 Humulus lupulus 0 description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/581—Real time or near real time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/28—Details regarding addressing issues
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/06—Message adaptation based on network or terminal capabilities
- H04L51/066—Message adaptation based on network or terminal capabilities with adaptation of format
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/30—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with reliability check, e.g. acknowledgments or fault reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/043—Real-time or near real-time messaging, e.g. instant messaging [IM] use or manipulation of presence information in messaging
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5825—Message adaptation based on network or terminal capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/14—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5885—Message switching systems, e.g. electronic mail systems with provisions for tracking the progress of a message
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/38—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages in combination with wireless systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10193898B2 (en) | Reputation-based method and system for determining a likelihood that a message is undesired | |
US7529802B2 (en) | Method for performing multiple hierarchically tests to verify identity of sender of an email message and assigning the highest confidence value | |
Lyon et al. | Sender ID: Authenticating e-mail | |
US8073912B2 (en) | Sender authentication for difficult to classify email | |
US20060004896A1 (en) | Managing unwanted/unsolicited e-mail protection using sender identity | |
KR101137089B1 (en) | Validating inbound messages | |
US8219630B2 (en) | System and method for detecting and filtering unsolicited and undesired electronic messages | |
US7487217B2 (en) | Network domain reputation-based spam filtering | |
US20060168017A1 (en) | Dynamic spam trap accounts | |
JP4729400B2 (en) | Secure and safe sender list | |
JP2009527058A (en) | How to verify the intended recipient of an electronic message before delivery, and how to dynamically generate message content upon confirmation | |
Goodman | IP Addresses in Email Clients. | |
Leiba et al. | DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification. | |
Leiba et al. | SMTP Path Analysis. | |
US20080270544A1 (en) | Greylisting optimizations for electronic mail filtering | |
WO2006134226A1 (en) | Method and server for authenticating sender of email and notifying exchange information of email | |
US20060242251A1 (en) | Method and system for filtering spoofed electronic messages | |
EP1922631B1 (en) | System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison | |
Saraubon et al. | Fast effective botnet spam detection | |
Fleizach et al. | Slicing spam with occam's razor | |
Lieven et al. | Filtering spam email based on retry patterns | |
Lyon et al. | RFC 4406: Sender ID: Authenticating E-Mail | |
Leiba et al. | Author Domain Signing Practices (ADSP): Point and Counterpoint | |
Palmieri et al. | Introducing public e-mail gateways: An effective hardening strategy against spam | |
Chrobok et al. | Advantages and vulnerabilities of pull-based email-delivery |