发明名称 DETECTION METHOD FOR FRAUDULENT MAIL, DETECTION PROGRAM THEREFOR, AND DETECTION DEVICE THEREFOR
摘要 Preliminarily sharing internal-transmission-secret-key-information used in e-mail addressed to an internal-network, between transmitting and receiving-terminals, and generating external-transmission-secret-key information used in an e-mail addressed to an external-network and external-transmission-public-key-information corresponding to the external-transmission-secret-key-information, in transmitting a mail, generating verification-information by encrypting first characteristic-amount-target-information including a characteristic-amount-target-item included in an outgoing-mail and adding, to the outgoing-mail header, the verification-information and characteristic-amount-target-item-information corresponding to the characteristic-amount-target-item, and, in receiving a mail, generating second characteristic-amount-target-information including a characteristic-amount-target-item indicated by the characteristic-amount-target-item-information added to the incoming-mail, decrypting the verification-information, generating third characteristic-amount-target-information, and verifying whether the second and the third coincide.
申请公布号 US2014181516(A1) 申请公布日期 2014.06.26
申请号 US201314063481 申请日期 2013.10.25
申请人 FUJITSU LIMITED 发明人 YOSHIOKA Takashi
分类号 H04L9/32 主分类号 H04L9/32
代理机构 代理人
主权项 1. A fraudulent mail detection method executed by a computer in an electronic mail terminal device, the fraudulent mail detection method comprising: preliminarily sharing internal transmission secret key information used in an electronic mail addressed to an internal network, between a transmitting terminal and a receiving terminal, and preliminarily generating external transmission secret key information used in an electronic mail addressed to an external network and external transmission public key information corresponding to the external transmission secret key information; at a time of transmitting a mail, generating verification information by encrypting, using the internal transmission secret key information, first characteristic amount target information including a characteristic amount target item from among a header item, a body text, and attached information, included in an outgoing mail, or first characteristic amount information generated from the first characteristic amount target information on a basis of a predetermined function when a transmission destination of the outgoing mail is the internal network, and generating the verification information by encrypting, using the external transmission secret key information, the first characteristic amount target information or the first characteristic amount information when the transmission destination of the outgoing mail is the external network; and adding, to a header of the outgoing mail, the verification information and characteristic amount target item information corresponding to the characteristic amount target item; and at a time of receiving a mail, generating second characteristic amount target information including a characteristic amount target item indicated by the characteristic amount target item information added to the incoming mail, from among a header item, a body text, and attached information, included in the incoming mail, or generating second characteristic amount information from the second characteristic amount target information on the basis of the predetermined function; decrypting, using the internal transmission secret key information, the verification information added to the incoming mail when a transmission source of the incoming mail is the internal network, decrypting, using the external transmission public key information, the verification information added to the incoming mail when the transmission source of the incoming mail is the external network, and generating third characteristic amount target information or third characteristic amount information; and comparing the second characteristic amount target information or the second characteristic amount information with the third characteristic amount target information or the third characteristic amount information, and verifying whether or not the second characteristic amount target information or the second characteristic amount information and the third characteristic amount target information or the third characteristic amount information coincide with each other.
地址 Kawasaki-shi JP