WO2005119994A1 - Systeme et procede de filtration de messages de reseau - Google Patents
Systeme et procede de filtration de messages de reseau Download PDFInfo
- Publication number
- WO2005119994A1 WO2005119994A1 PCT/US2004/015550 US2004015550W WO2005119994A1 WO 2005119994 A1 WO2005119994 A1 WO 2005119994A1 US 2004015550 W US2004015550 W US 2004015550W WO 2005119994 A1 WO2005119994 A1 WO 2005119994A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identity
- server
- list
- unacceptable
- network
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000001914 filtration Methods 0.000 title claims abstract description 27
- 238000004891 communication Methods 0.000 description 8
- 230000009471 action Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000002716 delivery method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000005204 segregation Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/48—Message addressing, e.g. address format or anonymous messages, aliases
Definitions
- the present disclosure relates generally to data processing and communication systems, and more particularly, to a system and method for filtering network messages, e.g., electronic mail, at a network server via a user-specific unacceptable, e.g., junk sender, list.
- network messages e.g., electronic mail
- a user-specific unacceptable e.g., junk sender
- PCs personal computers
- PCs may equip PCs with an interface (such as a modem) that may be used for communication over networks, such as the Internet.
- the Internet is a well-known collection of networks (e.g., public and private voice, data, video and multimedia networks) that cooperate using common protocols to connect computers around the world.
- networks e.g., public and private voice, data, video and multimedia networks
- the combination of inexpensive personal computers and easy-to-use graphical software has enabled the Internet to become a major medium for communications.
- Two extremely popular methods of communicating via the Internet, or any known network, are electronic mail, e.g., e-mail, and instant messaging, also known as IM.
- E-mail is a method of sending and receiving electronic messages and files, over a computer network, e.g. the Internet.
- E-mail consists of a text message normally typed on a computer keyboard in an e-mail software application, for example, an e-mail client such as MicrosoftTM Outlook or LotusTM Notes.
- HTML Hypertext Markup Language
- e-mail software applications also let users transmit computer files by attaching the file to the e-mail message.
- Web-based software is making e-mail even more accessible due to the fact Web-based e-mail is stored on a Web site that can be accessed from any computer with an
- LM Instant messaging
- LM Internet connection.
- Instant messaging enables a user to send messages to another user that immediately appear on that user's computer screen over a network.
- Instant messaging can work on inter-office LANs (local-area networks) as well as the Internet.
- Instant messages are different from e-mail messages in that they do not sit unread until the user checks his or her e-mail; they appear on-screen as they are received in real time.
- GUI graphical user interfaces
- spam filtering software has been developed, which searches keywords in the subject line or text of the e-mail to attempt to identify and delete spam. More advanced filtering software attempt to statistically identify spam based on word patterns or word frequency. Once the filter decides that an e-mail is spam, the filter places it in a special folder, the end user is notified by an e-mail that they have received a spam e-mail and the end user is given a chance to release/delete this e-mail.
- the simple filters are easily fooled by simple spelling variations and the advanced filters can be worked around by adding random words to messages and by using short messages with no identifiable pattern. Additionally, the various filters end up blocking messages that the recipient actually wants. Therefore, a need exists for techniques to allow computer users to establish user-specific lists for blocking unsolicited and undesirable electronic messages.
- a system and method for filtering network messages e.g., electronic mail, instant messages, etc. are provided.
- a user-specific blocked list or identified junk sender list is published at the server of a computing network, so when a new e-mail arrives, the server can automatically apply filtering rules based on the user-specific junk sender list and delete the appropriate messages.
- the teachings of the present disclosure permits the mail server to handle the user-specific junk e-mail, and gives more control to the user in what gets filtered.
- a method for filtering network messages in a computer system incorporating a server and at least one client includes the steps of generating a list of unacceptable identities within a database accessible by a server, determining an identity associated with a network message received by the server, comparing the identity with the list of unacceptable identities, and deleting the network message from the server if the identity matches an identity on the list of unacceptable identities.
- the method may further include the step of transmitting the network message to the at least one client if the identity does not match an identity on the list of unacceptable identities .
- the step of generating a list includes marking a network message received by the at least one client as an unacceptable message, establishing an identity associated with the unacceptable message, and adding the identity associated with the unacceptable message to the list of unacceptable identities within the database.
- the step of establishing an identity is performed by the at least one client.
- the step of adding the identity preferably includes polling the at least one client with the server to obtain the identity associated with the unacceptable message.
- the step of generating a list includes forwarding an unacceptable network message, received by the at least one client, to the server, establishing an identity associated with the unacceptable network message at the server, and adding the identity associated with the unacceptable message to the list of unacceptable identities within the database if the identity is not previously included in the list.
- the step of generating a list may include the step of inputting an unacceptable identity into the database via a server interface.
- the network message is one of an electronic mail message and an instant message and the identity is one of an e-mail address, IP address, domain and user name.
- the network may be selected from the group consisting of a local area network, a wide area network or the Internet.
- a program storage device is disclosed.
- the program storage device is readable by a machine, tangibly embodying a program of instructions executable by the machine to perform any of the afore-mentioned method steps for filtering network messages.
- a computer system for filtering network messages including at least one server and at least one client is provided.
- the system includes means for generating a list of unacceptable identities at the at least one server; means for determining an identity associated with a network message; means for comparing the identity with the list of unacceptable identities; and means for deleting the network message at the at least one server if the identity matches an identity on the list of unacceptable identities.
- a server for filtering network messages in a computer system includes means for generating a list of unacceptable identities; means for determining an identity associated with a network message; means for comparing the identity with the list of unacceptable identities; and means for deleting the network message if the identity matches an identity on the list of unacceptable identities.
- FIG. 1 is a block diagram of an exemplary system for filtering network messages in accordance with an embodiment of the present disclosure
- FIG. 2 is an exemplary computer for use in the system shown in FIG. 1
- FIG. 3 is a flow chart illustrating a method for filtering network message in accordance with an embodiment of the present disclosure
- FIG. 4 is a flow chart illustrating a method for generating a user-specific junk sender list in accordance with an embodiment of the present disclosure.
- a system and method for filtering network messages e.g., electronic mail
- a user-specific blocked list or identified junk sender list is published at the server of a computing network, so when a new e-mail arrives, the server can automatically apply filtering rules based on the user- specific junk sender list and delete the inappropriate messages.
- many e-mail clients allow a user to mark an e-mail as junk e- mail.
- junk e-mail refers to junk, unsolicited or adult- orientated e-mail, i.e., any undesired e-mail message.
- a user identifies and marks a particular e-mail as junk e-mail that results in a sender of the particular e-mail being marked as a junk sender by an e-mail client.
- the e-mail client e.g., MicrosoftTM Outlook
- This list of junk senders is stored by the client application.
- filtering rules on the client filters out any e-mail from the previously established junk sender list.
- the client program will apply all the junk filtering rules and then determine if the e-mail came from a junk e-mail sender. If the e-mail did come from a junk e-mail sender, the client application places the e-mail in the "Deleted Items" folder. The user is notified that the new e-mail has arrived, which is distracting and can be time consuming depending on the number of received e-mails.
- a software application embedded in a mail server of a computing network will poll the e-mail client and retrieve a user-specific junk sender list.
- the polling will be done for all the users in a network, e.g., employees of an organization, at a predetermined time and a predetermined frequency.
- the embedded application will maintain the user-specific junk sender list and through a secured web connection permit the user to make modifications.
- the user will be able to also manually add or delete a junk sender and even mark a whole domain as a junk sender.
- the user-specific junk sender list enables the embedded application to create a user specific query or filter. Now when a new e-mail arrives, the embedded application will determine a destination user or intended recipient, and run the query against the junk sender list of the destination user.
- the system includes at least one computer 100, 102 for sending/receiving network messages.
- Each computer 100, 102 is coupled to at least one server 104, 106, e.g., an Internet Service Provider (ISP), for coupling the computers 102, 104 to a network 108, for example, the Internet.
- ISP Internet Service Provider
- network 108 may be a local area network (LAN), wide area network (WAN) or any known network that couples a plurality of computers to enable various modes of communication via network messages.
- LAN local area network
- WAN wide area network
- the system may be a corporate intranet including a single server and multiple personal computers housed within a single facility, or alternatively, multiple servers with multiple personal computers located in various geographic locations.
- the present invention may be implemented in various forms of hardware, software, firmware, special purpose processors, or a combination thereof.
- the present disclosure may be implemented in software as an application program tangibly embodied on a program storage device.
- the application program may be uploaded to, and executed by, a machine including any suitable architecture such as personal computers 100, 102 or servers 104, 106.
- a machine including any suitable architecture such as personal computers 100, 102 or servers 104, 106.
- One suitable machine for executing these functions is illustrated in FIG. 2.
- Machine 200 is implemented on a computer platform having hardware such as one or more central processing units (CPU)
- the computer platform also includes an operating system and micro instruction code.
- the various processes and functions described herein may either be part of the micro instruction code or part of the application program (or a combination thereof) which is executed via the operating system.
- various other peripheral devices may be connected to the computer platform such as an additional data storage device, a printing device and a scanning device 216.
- personal computers 100, 102 will include client software applications for enabling network communications, e.g., an e-mail client 110, 128, such as MicrosoftTM Outlook.
- Servers 104, 106 will be running the appropriate complimentary server application to the client application.
- mail server 112 will be provided with a Simple Mail Transfer Protocol (SMTP) server 114 for handling outgoing e-mail messages and a POP3 (Post Office Protocol version 3) server 116 for handling incoming e-mail messages.
- SMTP Simple Mail Transfer Protocol
- POP3 Post Office Protocol version 3
- FIGS. 1 and 3 an embodiment of the present disclosure will be described in communicating through e-mail over the Internet.
- a first network user desires to send an e-mail to another network user, e.g. an intended recipient.
- the first network user opens an e-mail client 110 residing on personal computer 100.
- the first network creates a new e-mail by entering an e-mail address of the intended recipient and some text.
- the personal computer 100 sends the e-mail via SMTP to the mail server 112 of the ISP server 104.
- the SMTP server 114 of ISP server 104 then transfers the e-mail message via the Internet 108 to the SMTP server 122 of the ISP server 106 corresponding to the entered e-mail address.
- the SMTP server 122 hands the message to the POP3 server 124 for delivery to the intended recipient. It is to be understood that if the intended recipient had the same Internet Service Provider (ISP) 104 as the first network user, e.g., the sender, the e-mail would simply have been handed off from the SMTP server 114 to the POP3 server 116.
- ISP Internet Service Provider
- ISP server 106 Once ISP server 106 has received the e-mail, e.g., the network message (step 302), the server 106 will determine the destination user name (e.g., the e-mail address of the intended recipient), and the sender's address and domain name (step 304). Next, ISP server 106 will compare the address of the sender of the e-mail to a user-specific junk sender list of the intended recipient to determine if the intended recipient is receiving e-mails from the specific sender or any e-mails from the domain of the sender (step 306). It is to be understood that ISP server 106 may use any identifier available to determine if the sender is on the user-specific junk sender list.
- ISP server 106 may use the sender's e- mail address, e.g., johndoe@domain.com, user name, or alternatively, may use the IP (Internet Protocol) address of the originating computer 100 which is sent along with the e- mail. Furthermore, the server may generally use just the domain the e-mail was sent from, e.g., domain.com, and identify any e-mail with the same domain.
- the junk sender or address list is preferably initially generated at the server 106 (step 308) and/or stored in a database accessible by the server. The generation of the junk sender list will be described in greater detail hereinbelow. Referring still to FIGS.
- the network message is deleted (step 314).
- the term “deleted” is to be construed to include deletion, removal, tagging, segregation and/or forwarding of the network message to an auxiliary designated "junk" mailbox.
- a counter optionally associated with the intended recipient may be incremented by one (step 316) to record the number of deleted network messages, i.e., to trace how many junk e-mails have been automatically deleted by the server 106. An administrator will be able to view this counter for the whole network, e.g., a specific organization.
- computer 100, 102 may be any computing device capable of sending and receiving network messages, for example, a laptop/notebook computer, a mobile telephone, a personal digital assistant (PDA) such as a Pocket PCTM,
- PDA personal digital assistant
- the computing devices 100, 102 may communicate to the servers 104, 106 and network 108 via any known communication link 132, for example, dial-up, hardwired, cable, DSL, satellite, cellular, PCS, wireless transmission (e.g., 802.1 la/b/g), etc.
- the teachings of the present disclosure may be applied to instant messaging.
- the personal computers 100, 102 may include an instant messaging client 111, 130 such as AOLTM Instant Messenger (ATM), ICQTM, and MSNTM Messenger, and corresponding servers 104, 106 will execute the appropriate messenger server application 118, 126.
- ATM AOLTM Instant Messenger
- ICQTM ICQTM
- MSNTM Messenger MSNTM Messenger
- the receiving messenger server 126 will access the user-specific junk sender list to determine if the user name of the LM sender is on the list. If the IM sender is on the user-specific junk sender list, the messenger server 126 will not grant the LM sender access to the intended IM client 130.
- this embodiment will prevent annoying IMs from popping up on the user's computer screen and having the user click an "Ignore" button to dismiss the LM resulting in useless user down-time, i.e., lost productivity.
- a user can mark an e-mail as junk from the e-mail client such as MicrosoftTM Outlook (step 402).
- MicrosoftTM Outlook e-mail client
- Outlook this can be accomplished by going to the Actions menu item and selecting "Junk E-Mail” and then selecting one of the two actions "Add to Junk sender's List” or "Add to Adult Content Senders List”. This action will add the senders e-mail address to the junk e- mail sender list stored at the client.
- the user For Outlook, the user must first enable the Junk filtering process by clicking Organize and enabling the "Junk E-Mail” option. After this feature is enabled, the user can mark any e-mail sender as junk or adult-oriented. The user can manage the list of junk and adult senders by going back to the Organize feature of the client.
- the server preferably the mail server 120, will poll the client 128 to retrieve the user-specific junk sender list at a predetermined time (step 404).
- An e-mail administrator of the network may establish policies at the server that controls when the polling process starts and at what frequency it occurs.
- the server will poll all the running machines with an active e-mail client.
- the embedded application in the server will query the e-mail client for the user account name, and the junk/adult sender list.
- the server application will use this list and merge it with the existing stored list (step 406).
- the merge process will add all the new entries from the retrieved list.
- a user interface will allow the user to generate the junk sender list over the network via a secure connection (step 410).
- the user interface will provide the user with the ability to add or delete a junk sender's e-mail address to the junk sender list.
- the user interface will additionally allow the user to mark specific domains as junk senders.
- the user interface will include a central policy manager where an administrator of the network can set the time and frequency of the polling of the individual clients.
- the junk sender list may be generated by having the user forward the junk e-mail to a pre-designated generic address at the server (step 412).
- the embedded application extracts the information it needs from the user-sent e-mail, e.g. the junk sender e-mail address and the user name of the user that forwarded the e-mail, and to establish the identity of the sender. If the junk sender already exists on the list (step 414), no further action is required (step 416); however, if the information does not exists, then it is automatically added to the user-specific junk sender list (step 406).
- the e-mail server or the embedded application doesn't have to poll the e-mail client saving bandwidth and system resources; its beneficial where the e-mail client doesn't support the feature to maintain the junk sender list; and it allows the user to forward the e-mail from any e-mail capable device such as a laptop, personal digital assistant (PDA), mobile phone, etc.
- PDA personal digital assistant
- a system and method for filtering user-specific junk e-mails in a network of computers have been described.
- the server automatically deletes the unwanted e-mail at the server, the network will not be cluttered by unwanted e-mail and the network bandwidth is better utilized.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2004/015550 WO2005119994A1 (fr) | 2004-05-18 | 2004-05-18 | Systeme et procede de filtration de messages de reseau |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2004/015550 WO2005119994A1 (fr) | 2004-05-18 | 2004-05-18 | Systeme et procede de filtration de messages de reseau |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005119994A1 true WO2005119994A1 (fr) | 2005-12-15 |
Family
ID=34958120
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2004/015550 WO2005119994A1 (fr) | 2004-05-18 | 2004-05-18 | Systeme et procede de filtration de messages de reseau |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2005119994A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2436184A (en) * | 2006-03-17 | 2007-09-19 | Empower Interactive Group Ltd | Monitoring the distribution of messages |
CN100435514C (zh) * | 2006-03-10 | 2008-11-19 | 中国科学院软件研究所 | 以太网驱动级底层过滤方法和系统 |
US8566406B2 (en) | 2010-01-14 | 2013-10-22 | Microsoft Corporation | Filtering of electronic mail messages destined for an internal network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030224760A1 (en) * | 2002-05-31 | 2003-12-04 | Oracle Corporation | Method and apparatus for controlling data provided to a mobile device |
US20040073634A1 (en) * | 2000-09-14 | 2004-04-15 | Joshua Haghpassand | Highly accurate security and filtering software |
-
2004
- 2004-05-18 WO PCT/US2004/015550 patent/WO2005119994A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073634A1 (en) * | 2000-09-14 | 2004-04-15 | Joshua Haghpassand | Highly accurate security and filtering software |
US20030224760A1 (en) * | 2002-05-31 | 2003-12-04 | Oracle Corporation | Method and apparatus for controlling data provided to a mobile device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100435514C (zh) * | 2006-03-10 | 2008-11-19 | 中国科学院软件研究所 | 以太网驱动级底层过滤方法和系统 |
GB2436184A (en) * | 2006-03-17 | 2007-09-19 | Empower Interactive Group Ltd | Monitoring the distribution of messages |
GB2436184B (en) * | 2006-03-17 | 2011-01-26 | Empower Interactive Group Ltd | Message forwarding system and method |
US8566406B2 (en) | 2010-01-14 | 2013-10-22 | Microsoft Corporation | Filtering of electronic mail messages destined for an internal network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050160144A1 (en) | System and method for filtering network messages | |
US6779022B1 (en) | Server that obtains information from multiple sources, filters using client identities, and dispatches to both hardwired and wireless clients | |
US6732157B1 (en) | Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages | |
US8874672B2 (en) | Identifying and using identities deemed to be known to a user | |
US7962558B2 (en) | Program product and system for performing multiple hierarchical tests to verify identity of sender of an e-mail message and assigning the highest confidence value | |
US7853652B2 (en) | Instant messaging system with privacy codes | |
US7912905B2 (en) | System and method for filtering network messages | |
US8463862B2 (en) | Methods and systems for dispatching messages to mobile devices | |
US20040154022A1 (en) | System and method for filtering instant messages by context | |
US20050198171A1 (en) | Managing electronic messages using contact information | |
US20040143632A1 (en) | Method and system for publication of instant messaging privacy codes | |
US20110213852A1 (en) | Method And System For Removing A Person From An E-Mail Thread | |
US20070022213A1 (en) | Scheme for sharing IM message history | |
US7472351B1 (en) | E-mail manager interface with integrated instant messaging and phone call initiator feature | |
WO2009116054A2 (fr) | Procédé et système permettant d’organiser des courriers électroniques | |
JP4857246B2 (ja) | 承認装置、承認方法、及びプログラム | |
US8805936B2 (en) | Email server cooperative management for automatic routing of emails based on preferences | |
WO2005119994A1 (fr) | Systeme et procede de filtration de messages de reseau | |
KR20030055817A (ko) | 메일 헤더 정보를 이용하여 선택적으로 메일을수신/삭제하는 메일 관리 방법 및 메일 클라이언트 단말기 | |
JP2004523012A (ja) | 権限が与えられていない電子メールを排除するシステム | |
US20060212523A1 (en) | Policy based control of multiple message forwards | |
KR100438545B1 (ko) | 무선 단말기에서의 메일 수신 방법 | |
Lockhead | The use of Internet-based technologies-beyond e-mail and search engines |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |