Browse Prior Art Database

Detection System of SPAM mails using multiple dummy mail addresses (IDs)

IP.com Disclosure Number: IPCOM000015741D
Original Publication Date: 2002-Mar-24
Included in the Prior Art Database: 2003-Jun-21
Document File: 1 page(s) / 36K

Publishing Venue

IBM

Abstract

Putting certain numbers of dummy mail addresses (traps) besides the existing ones in the meaning of alphabetical order of the ids, and when the same content of mails are arrived in these dummy addresses, the mails can be considered as SPAMs. The same mail contents which are considered as SPAMs are saved only once in the mail spool, other copies are all discarded to save spool area, and keep pointer to that one copy, existing mail addresses to which the SPAM were sent may refer the mail. Besides, the detection of the SPAM is logged and mail administrators should be notified. By this method, SPAM mails are automatically detected by systems, and avoid mail spool from filled up with excess copies of SPAMs. Also this method avoids the law problems in discarding the SPAM without the notice to the recipient, because at least one copy is kept and can be referred to. In addition, this copy can be used as a proval of the SPAM, without using much spool space. 1

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Detection System of SPAM mails using multiple dummy mail addresses (IDs)

    Putting certain numbers of dummy mail addresses (traps) besides the existing ones in the meaning of alphabetical order of the ids, and when the same content of mails are arrived in these dummy addresses, the mails can be considered as SPAMs. The same mail contents which are considered as SPAMs are saved only once in the mail spool, other copies are all discarded to save spool area, and keep pointer to that one copy, existing mail addresses to which the SPAM were sent may refer the mail. Besides, the detection of the SPAM is logged and mail administrators should be notified.

By this method, SPAM mails are automatically detected by systems, and avoid mail spool from filled up with excess copies of SPAMs. Also this method avoids the law problems in discarding the SPAM without the notice to the recipient, because at least one copy is kept and can be referred to. In addition, this copy can be used as a proval of the SPAM, without using much spool space.

1