A kind of invalid mail address recognition methods and identifying systemTechnical field
Embodiment of the present invention is related to technical field of information processing, is related to a kind of invalid mail address recognition methods and identificationSystem.
Background technique
Nowadays, internet and various terminal equipment have become the pith that work and life are be unable to do without, these equipmentFor we provide many information, we have increasing need for and rely on value brought by this information, but these information also haveGood having is bad, some are even useless, anywhere these bad information are full of, and not so influences us to informationCognition, also waste valuable time and device resource significantly, thus now people gradually start for attention to be placed on howIt goes to handle these information well, allows valuable information to be preferably our services, resource is allowed to perform to maximum value.
The rapid development of Email has not only brought convenience, at the same also produce more garbage informations andThe wasting of resources, enterprise is to registration user's sending advertisement etc., although these mail addresss are all that user provides, being also no lack of hasThat user forges, failure and be dropped and do not use, these addresses are referred to as invalid address by us, these are ineffectuallyLocation is not but not generation is worth, but also will cause a large amount of spam and the wasting of resources.
Although many enterprises can all use blacklist mechanism with handling some forgeries or partial failure mail at presentLocation, but there are also the mail address not used more is dropped, they will generate the garbage information of substantial amounts, occupy moreResource remove these useless garbage informations so we will identify them.
Summary of the invention
The present invention is to solve above-mentioned technical problem and the technical solution adopted is that provide a kind of invalid mail address identification sideMethod and identifying system, wherein specific technical solution is:
Data resource includes: in recognition methods
1) blacklist filters library, stores the invalid mail address being identified;
2) gray list filters library, stores not confirmed, but the invalid mail address that possibility is very big;
3) mail behavior record, the behavior that storage sends mail are passed through;
4) address validation device implements the device of invalid mail address identification;
Specifically identification process includes:
1) mail address is taken out from list;
2) blacklist library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
3) gray list library: whether inquiry has matched mail address;
Be: filtering posts address skips to step 10;It is no: to enter in next step;
4) behavior record library: whether inquiry has transmission to record;
It is: enters in next step;It is no: to skip to step 11;
5) behavior record library: inquiring whether last n times record has opening to record, and N is configurable;
It is: skips to step 12;It is no: to enter in next step;
6) it behavior record library: matches and opens whether record accounting is lower than M% in all records, M is configurable;
It is: enters in next step;It is no: to skip to step 12;
7) gray list library: write-in gray list;
8) gray list filters library: whether matching gray list library has K all of above record, and K is configurable;
It is: enters in next step;It is no: to skip to step 12;
9) blacklist library: write-in blacklist;
10) labeled as non-transmittable address, the 21st step is skipped to;
11) external authentication device: checking request is sent to outside by API, whether verifying address is effective;
It is: enters in next step;It is no: to skip to step 19;
12) labeled as transmittable address;
13) mail transmission system: mail is sent;
14) mail transmission system: whether mail transmission succeeds;
It is: enters in next step;It is no: to skip to step 20;
15) behavior record library: write-in behavior record;
16) Mail Clients: addressee opens mail;
17) behavior record library: write-in behavior record;
18) gray list library: gray list is deleted;
19) labeled as transmittable address;
20) blacklist library: write-in blacklist;
21) process is completed.
The invalid mail address identifying system applied in invalid mail address recognition methods, identifying system includes internal dataServer one, equip blacklist library, gray list library, mail behavior library;Externally it is responsible for receiving fixed refer to equipped with API service moduleIt enables, reads data according to instruction write-in data or inquiry;And equipped with management module be responsible for data inquiry and modification, delete orExport work.
Identifying system further includes that external authentication device is multiple servers, by a central server and multiple subprocessing sectionsPoint composition;Central server is responsible for obtaining address date by api interface, is that each subprocessing several points are distributed according to load balancing ruleWork is verified, and real-time collecting verification result returns the result data by api interface;Child node server is responsible for receiving central clothesThe mail address sent of business device, and by a set of verifying instruction implementation mail-address verification, after verifying directly puts back to resultEntreat server
The present invention has the following beneficial effects with respect to the prior art: being a kind of identification method of invalid mail address, mentionPrinciple of readjustment, restructuring, consolidation and improvement increases external certificate mechanism and anticipation mechanism, can substantially reduce mail transmission to the filter efficiency of invalid mail addressFailure rate, and transmitting efficiency is had and is obviously improved.
Detailed description of the invention
Fig. 1 is the flow diagram of invalid mail address recognition methods.
Fig. 2 is the schematic diagram of internal data system framework.
Fig. 3 is the schematic diagram of external authentication device system architecture.
Specific embodiment
This method is identified suitable for invalid mail address.
Data resource:
1, blacklist filtering library (the invalid mail address that storage has been identified)
2, gray list filtering library (storage not confirmed, but the very big invalid mail address of possibility)
To guarantee to reduce False Rate, the mail address record for being stored into gray list library has a timeliness,
Can fail beyond this record after the time, with guarantee not by the short time the system failure and
It is judged by accident caused by Force Majeure cause, but if record is more than will be this mail address more than after certain numberIt is added into blacklist library.
3, mail behavior record (the behavior process that storage sends mail)
4, address validation device (one is implemented the device of invalid mail address identification)
Implementing procedure:
1, mail address is taken out from list.
2, blacklist library: whether inquiry has matched mail address.
Be: filtering posts address skips to step 10;It is no: to enter in next step.
3, gray list library: whether inquiry has matched mail address.
Be: filtering posts address skips to step 10;It is no: to enter in next step.
4, behavior record library: whether inquiry has transmission to record.
It is: enters in next step;It is no: to skip to step 11.
5, behavior record library: inquire whether last n times record has opening record (N is configurable).
It is: skips to step 12;It is no: to enter in next step.
6, it behavior record library: matches and opens whether record accounting is lower than M% in all records (M is configurable).
It is: enters in next step;It is no: to skip to step 12.
7, gray list library: write-in gray list.
8, gray list filters library: whether matching gray list library has K all of above record (K is configurable).
It is: enters in next step;It is no: to skip to step 10.
9, blacklist library: write-in blacklist.
10, labeled as non-transmittable address, the 21st step is skipped to.
11, external authentication device: checking request is sent to outside by API, whether verifying address is effective.
It is: enters in next step;It is no: to skip to step 19.
12, labeled as transmittable address.
13, mail transmission system: mail is sent.
14, mail transmission system: whether mail transmission succeeds.
It is: enters in next step;It is no: to skip to step 20.
15, behavior record library: write-in behavior record.
16, Mail Clients: addressee opens mail.
17, behavior record library: write-in behavior record.
18, all gray list records, the gray list record including failure gray list library: are deleted.
19, labeled as transmittable address.
20, blacklist library: write-in blacklist.
21, process is completed.
System architecture:
1, internal data server one equips blacklist library, gray list library, mail behavior library;
Externally it is responsible for receiving fixed instruction equipped with API service module, reads data according to instruction write-in data or inquiry;And it is responsible for inquiry and modification, the deletion or export work of data equipped with management module.
2, external authentication device is multiple servers, by a central server and multiple subprocessing sections
Point composition;
Central server is responsible for obtaining address date by api interface, is each subprocessing several points point according to load balancing ruleWith verifying work, and real-time collecting verification result returns the result data by api interface;
Child node server is responsible for receiving the mail address that central server is sent, and is instructed by a set of verifying and implement postalPart address validation, directly puts back to central server for result after verifying.
Although the present invention is disclosed as above with preferred embodiment, however, it is not to limit the invention, any this field skillArt personnel, without departing from the spirit and scope of the present invention, when can make a little modification and perfect therefore of the invention protection modelIt encloses to work as and subject to the definition of the claims.