US20020004826A1 - Methods and systems for securely delivering electronic mail to hosts having dynamic ip addresses - Google Patents

Methods and systems for securely delivering electronic mail to hosts having dynamic ip addresses Download PDF

Info

Publication number
US20020004826A1
US20020004826A1 US09/153,226 US15322698A US2002004826A1 US 20020004826 A1 US20020004826 A1 US 20020004826A1 US 15322698 A US15322698 A US 15322698A US 2002004826 A1 US2002004826 A1 US 2002004826A1
Authority
US
United States
Prior art keywords
server
dynamic
mail server
address
receiving mail
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/153,226
Other versions
US6434600B2 (en
Inventor
Ryan W. J. Waite
Bruno Lambert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US09/153,226 priority Critical patent/US6434600B2/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LAMBERT, BRUNO, WAITE, RYAN W.J.
Publication of US20020004826A1 publication Critical patent/US20020004826A1/en
Application granted granted Critical
Publication of US6434600B2 publication Critical patent/US6434600B2/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5076Update or notification mechanisms, e.g. DynDNS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4552Lookup mechanisms between a plurality of directories; Synchronisation of directories, e.g. metadirectories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/48Message addressing, e.g. address format or anonymous messages, aliases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]

Definitions

  • the present invention relates to methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses. More particularly, the present invention relates to methods and systems for securely delivering electronic mail to mail servers having dynamic IP addresses utilizing the Simple Mail Transfer Protocol (SMTP).
  • SMTP Simple Mail Transfer Protocol
  • IP internet protocol
  • An IP address is a number uniquely identifying a network connection. Available Internet IP addresses have become limited in number due to inefficient address assignment and an increase in the number of hosts connected to the Internet. As a result, Internet service providers (ISPs) may be unwilling to allocate static IP addresses to customers without charging substantial fees.
  • ISPs Internet service providers
  • a static or fixed IP address does not change for a given network connection. For example, each time a customer with a static IP address accesses the Internet through an ISP, the customer has the same IP address. Instead of allocating static IP addresses to customers, some ISPs allocate dynamic IP addresses.
  • a dynamic IP address is temporarily assigned to a user, or, more specifically, to the network connection of a user's machine. For example, when a customer accesses the Internet through an ISP, the customer may be given a dynamic IP address. When the customer terminates the connection with the ISP, the dynamic IP address may be assigned to another customer. When the first customer accesses the Internet a second time through the same ISP, he or she may or may not receive the same IP address used in the first connection.
  • dynamic IP addresses allow owners of static IP addresses to maximize the value of each address by temporarily allocating the address to multiple customers.
  • SMTP is the dominant Internet standard for delivering electronic mail.
  • SMTP allows mail for multiple users to be delivered to a single SMTP server.
  • SMTP is an IP-based protocol.
  • a delivering mail server retrieves the IP address of a receiving mail server.
  • the SMTP protocol was designed to route mail to a server permanently connected to a network using a static IP address. Delivering mail to a mail server that randomly connects to a network with a dynamic IP address cannot be done securely using SMTP according to conventional mail delivery techniques. Alternatively, an SMTP server having a dynamic IP address cannot securely retrieve mail.
  • the delivering SMTP server determines the IP address of the receiving SMTP server.
  • the delivering SMTP server may access a Domain Name System (DNS) server.
  • DNS Domain Name System
  • a DNS server stores a database of resource records containing information relating to hosts, including IP addresses of the hosts.
  • Determining the IP address of the receiving SMTP server is a two step process.
  • the delivering SMTP server queries the DNS server for the name of the receiving SMTP server.
  • the query includes the domain name of the domain for which the receiving SMTP server receives mail.
  • the DNS server searches its resource records for a mail exchange or MX record corresponding to the domain name in the query.
  • An MX record specifies the name of a mail exchanger, i.e., the receiving SMTP server, responsible for receiving mail for a given domain.
  • the DNS server sends an MX record specifying the name of the receiving SMTP server to the delivering SMTP server.
  • the next step is determining the IP address corresponding to the mail exchanger name specified in the MX record received by the delivering SMTP server. Accordingly, the delivering SMTP server queries the DNS server for the IP address corresponding to the name of the mail exchanger extracted from the MX record.
  • the DNS server stores additional resource records, known as address or A records, that pair IP addresses with host names.
  • the DNS server stores the A record for the mail exchanger, the A record is transmitted to the delivering SMTP server, which can then initiate an SMTP connection to the IP address specified by the A record and deliver the mail.
  • the DNS server may not have the A record for the receiving SMTP server because conventional DNS servers are not dynamically updated when a host receives a dynamic IP address. More particularly, no mechanism exists in the conventional Domain Name System for dynamically or automatically updating A records in a DNS server. Updating may be performed manually, for example, using a keyboard. However, such a process is time-consuming, labor-intensive, and unsuitable in a computing environment where dynamic IP addresses change frequently. Thus, conventional DNS servers may store A records containing static IP addresses only.
  • a receiving mail server may access a network periodically to retrieve mail queued by a delivering mail server.
  • One conventional mechanism for receiving queued mail for a domain is the SMTP TURN command.
  • the receiving mail server In order to retrieve mail using the TURN command, the receiving mail server first establishes an SMTP connection with the delivering mail server. Next, the receiving mail server issues the TURN command followed by the domain name for which the receiving mail server receives mail. The delivering mail server then delivers queued mail for the domain name specified in the TURN command without verifying the IP address of the receiving mail server.
  • the SMTP connection initiated by the receiving mail server is essentially reversed and used by the delivering mail server to deliver mail.
  • the TURN command is not secure because a user can initiate an SMTP connection, issue the TURN command, and retrieve mail for a domain for which he or she is not authorized to retrieve mail.
  • the SMTP ETRN command was developed as a more secure method for retrieving queued mail.
  • the receiving mail server first initiates an SMTP connection with the delivering mail server.
  • the receiving mail server issues the ETRN command followed by the domain name for which mail delivery is requested.
  • the delivering mail server queries a DNS server for the mail exchanger and then for the IP address of the mail exchanger. Because the delivering mail server queries the DNS server to determine where to deliver mail, mail retrieval using the ETRN command is more secure than mail retrieval using the TURN command.
  • the DNS server may not store the A record for the receiving mail server.
  • the IP address cannot be determined and mail retrieval using the ETRN command fails.
  • An alternative is to use the TURN command, which is not secure.
  • electronic mail could not be securely delivered to an SMTP server having a dynamic IP address.
  • the term “server” refers to a program executing on a machine, such as a computer, and providing shared services to client processes on a network.
  • the computer may include a memory device that stores the server and a processor that executes the server.
  • the computer may also include one or more network adapters, such as Ethernet adapters, that allow the server to communicate with other servers executing on other machines.
  • network adapters such as Ethernet adapters
  • multiple servers may execute on the same physical machine.
  • a server as described herein, is not intended to be limited to use with or by any particular hardware configuration.
  • server is not intended to be limited to a program that always provides services to clients. For example, in some communications, servers may act as clients or peers of other network processes.
  • the phrase “delivering mail server” refers to a program that stores and delivers mail to a receiving mail server.
  • the phrase “receiving mail server” refers to a program that requests delivery of queued mail from the delivering mail server.
  • neither of these phrases is intended to be limited to a mail server that only delivers or only receives mail.
  • the receiving mail server may deliver mail, and the delivering mail server may receive mail.
  • the terms “delivering” and “receiving” are intended to describe the functions of the mail servers with regard to a given transaction.
  • receiving mail server code refers to any string or grouping of alphanumeric characters, digits, and/or symbols preferably arranged so that the receiving mail server code is difficult to determine.
  • the receiving mail server code is utilized to securely deliver electronic mail to a receiving mail server, as described in more detail below.
  • the present invention includes one or more name servers in communication with a delivering mail server to securely communicate the dynamic IP address of receiving mail servers to the delivering mail server.
  • a first name server hereinafter referred to as “the dynamic name server” dynamically stores records linking receiving mail server codes of receiving mail servers with dynamic IP addresses of receiving mail servers.
  • a second name server hereinafter referred to as “the private name server” stores records linking the receiving mail server codes with domain names for which the receiving mail servers receive mail.
  • the phrase “dynamic name server” refers to any server capable automatically registering records linking receiving mail server codes and dynamic IP addresses of receiving mail servers in response to registration requests received over a network.
  • private name server refers to any name server capable of storing records linking receiving mail server codes to domain names for the receiving mail servers, wherein access to the records is preferably limited, e.g., to a delivering mail server, in order to protect the stored receiving mail server codes.
  • a third name server hereinafter referred to as, “the public name server” may be used by other mail servers to route mail to the delivering mail server.
  • the phrase “public name server” refers to any server that stores records linking domain names mail exchanger names and records linking mail exchanger names to IP addresses, wherein the records are freely accessible to network users.
  • the public name server is not essential to the invention but is nonetheless mentioned for completeness.
  • the present invention includes a setup phase, a connection phase, and a mail delivery phase.
  • the setup phase may occur when a new receiving mail server and the domain(s) for which it receives mail are added to a network.
  • the setup phase may include generating a receiving mail server code for the receiving mail server and linking the receiving mail server code with the domain name corresponding to the domain for which the receiving mail server receives mail.
  • the receiving mail server code and the domain name are preferably registered with a private name server.
  • the receiving mail server code and the domain name are preferably also registered with the receiving mail server.
  • the receiving mail server connects to the network and receives a dynamic IP address.
  • the receiving mail server preferably registers its IP address along with its receiving mail server code with a dynamic name server.
  • the connection phase may occur each time a receiving mail server connects to the network and receives a dynamic IP address.
  • the receiving mail server requests delivery of queued mail from the delivering mail server.
  • the delivering mail server first retrieves the receiving mail server code corresponding to the domain or domains for which the receiving mail server receives mail from the private name server.
  • the delivering mail server requests the dynamic IP address from the private name server.
  • the private name server determines that it does not have the record containing the IP address, so the private name server queries the dynamic name server for the dynamic IP address.
  • the dynamic name server transmits the dynamic IP address to the private name server.
  • the private name server transmits the dynamic IP address to the delivering mail server.
  • the delivering mail server then creates an SMTP connection to the IP address received from the private name server and then delivers the mail.
  • the mail delivery phase may occur each time the delivering mail server requests delivery of queued mail after connecting to the network and receiving a dynamic IP address.
  • the present invention includes a method for securely delivering electronic mail to a receiving mail server having a dynamic IP address.
  • the method includes registering a dynamic IP address and a code of a receiving mail server to which electronic mail is to be delivered in a dynamic name server.
  • the receiving mail server may transmit a request for delivery of electronic mail to a delivering mail server.
  • the delivering mail server may be a remote mail server storing queued messages for the receiving mail server.
  • the delivering mail server may transmit a request for the dynamic IP address of the receiving mail server to a private name server, such as a DNS server.
  • the private name server may store a database of resource records linking receiving mail server codes with domain names for a plurality of receiving mail servers. However, since the dynamic IP address of the receiving mail server may not be stored in the private name server, the private name server may transmit a request for determining the dynamic IP address to the dynamic name server. The request may include the receiving mail server code. The dynamic name server may extract the dynamic IP address based on the receiving mail server code. The dynamic IP address may then be transmitted to the delivering mail server. The delivering mail server may then deliver the mail to the receiving mail server utilizing the dynamic IP address transmitted from the private name server.
  • the present invention may include a system for securely delivering electronic mail to electronic mail servers having dynamic IP addresses.
  • a delivering mail server receives requests for electronic mail delivery from a plurality of receiving mail servers having dynamic IP addresses via a network.
  • the delivering mail server delivers electronic mail to the plurality of receiving mail servers.
  • a dynamic name server receives and stores receiving mail server codes and corresponding dynamic IP addresses of the receiving mail servers, e.g., during the connection phase when the receiving mail servers are allocated dynamic IP addresses.
  • a private name server may be in communication with the dynamic name server and the delivering mail server for storing the receiving mail server codes and corresponding domain names of the plurality of receiving mail servers.
  • the private name server may access the dynamic name server to determine dynamic IP addresses of the plurality of receiving mail servers.
  • the present invention includes a method for securely communicating a dynamic IP address of a receiving mail server to a delivering mail server.
  • the method includes registering a dynamic IP address and a receiving mail server code of a receiving mail server with a dynamic name server.
  • Registering the dynamic IP address may include transmitting a name registration request packet, including the dynamic IP address and the receiving mail server code, from the receiving mail server to the dynamic name server.
  • the receiving mail server code may also be stored with the domain name of the receiving mail server in a private name server in communication with the dynamic name server.
  • the private name server may extract the receiving mail server code from its records.
  • the private name server may then transmit a request for the dynamic IP address to the dynamic name server.
  • the request may include the receiving mail server code.
  • the dynamic name server having previously registered the dynamic IP address with the receiving mail server code, extracts the dynamic IP address from its records.
  • the private name server may then transmit the dynamic IP address to the delivering mail server.
  • the present invention may include a computer-readable medium having computer-executable instructions for performing steps for retrieving mail from a mail server.
  • the steps may include identifying a routeable dynamic IP address received from a network.
  • a receiving mail server code previously stored with the receiving mail server, e.g., during the setup phase, may be retrieved and linked with the dynamic IP address. If the receiving mail server code is encrypted, it is preferably decrypted before being linked with the dynamic IP address.
  • the receiving mail server code and the dynamic IP address may be registered with a dynamic name server. The receiving mail server may then request and receive mail securely.
  • the present invention may include a computer-readable medium having stored thereon a data structure.
  • the data structure may include an A record.
  • the A record may include a first data field containing data representing a secret receiving mail server code of a receiving mail server and a second data field containing data representing a dynamic IP address of the receiving mail server.
  • the present invention may include a computer-readable medium having stored thereon a data structure.
  • the data structure may include an MX record.
  • the MX record may include a first data field containing data representing a secret receiving mail server code of a receiving mail server and a second data field containing data representing a domain name of a domain for which the receiving mail server receives mail.
  • FIG. 1 is a block diagram of an exemplary operating environment for computer-executable instructions according to embodiments of the present invention.
  • FIG. 2 is a flow diagram of a method and a system for securely delivering electronic mail to a mail server having a dynamic IP address according to an embodiment of the present invention.
  • FIG. 3 is a flow chart of a process for securely delivering electronic mail to a mail server having a dynamic IP address according to an embodiment of the present invention.
  • FIG. 4 is a diagram of an exemplary data structure of an A record according to an embodiment of the present invention.
  • FIG. 5 is a diagram of an exemplary data structure of an MX record according to an embodiment of the present invention.
  • FIG. 6 is a network diagram of a system for securely delivering electronic mail to a mail server having a dynamic IP address according to an embodiment of the present invention.
  • FIG. 7 is a flow chart illustrating an exemplary process that may be performed by a receiving mail server to retrieve electronic mail after receiving a dynamic IP address according to an embodiment of the present invention.
  • FIG. 1 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented.
  • embodiments of the present invention may include a receiving mail server 101 , a dynamic name server 102 , a delivering mail server 103 , and a private name server 104 , all of which are illustrated in FIG. 2. Any or all of these servers may be implemented in the computing environment illustrated in FIG. 1.
  • the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by a personal computer.
  • program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like.
  • the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote memory storage devices.
  • an exemplary system for implementing any of the servers, data structures, or other programs for securely delivering electronic mail to mail servers may include a general purpose computing device, such as a conventional personal computer 20 .
  • the personal computer 20 may include a processing unit 21 , a system memory 22 , and a system bus 23 that couples various system components including the system memory to the processing unit 21 .
  • the system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • the system memory includes read only memory (ROM) 24 and random access memory (RAM) 25 .
  • a basic input/output system 26 (BIOS) containing the basic routines that helps to transfer information between elements within the personal computer 20 , such as during start-up, is stored in ROM 24 .
  • the personal computer 20 further includes a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29 , and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM or other optical media.
  • the hard disk drive 27 , magnetic disk drive 28 , and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32 , a magnetic disk drive interface 33 , and an optical drive interface 34 , respectively.
  • the drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the personal computer 20 .
  • Exemplary instructions and data structures that may be stored in these computer readable media according to embodiments of the present invention include mail servers, name servers, receiving mail server codes, IP addresses, MX records, A records, or any other instructions and data structures utilized to securely deliver electronic mail to mail servers having dynamic IP addresses.
  • a number of program modules may be stored on the hard disk, magnetic disk 29 , optical disk 31 , ROM 24 or RAM 25 , including an operating system 35 , one or more application programs 36 , such as mail servers and name servers according to embodiments of the present invention, other program modules 37 , and program data 38 , such as dynamic IP addresses, domain names, and receiving mail server codes according to embodiments of the present invention.
  • application programs 36 such as mail servers and name servers according to embodiments of the present invention
  • other program modules 37 such as dynamic IP addresses, domain names, and receiving mail server codes according to embodiments of the present invention.
  • a user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42 .
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
  • serial port interface 46 that is coupled to the system bus, but may be connected to the processing unit 21 by other interfaces, such as a parallel port, game port or a universal serial bus (USB).
  • a monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48 .
  • personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
  • the personal computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49 .
  • the remote computer 49 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the personal computer 20 , although only a memory storage device has been illustrated in FIG. 1.
  • the personal computer 20 may embody a receiving mail server and the remote computer 49 may embody a delivering mail server.
  • the logical connections depicted in FIG. 1 include a local area network (LAN) 51 and a wide area network (WAN) 52 .
  • LAN local area network
  • WAN wide area network
  • the personal computer 20 When used in a LAN networking environment, the personal computer 20 is connected to the local network 51 through a network interface or adapter 53 .
  • the network interface 53 may be connected to a cable modem or ADSL device.
  • the personal computer 20 When used in a WAN networking environment, the personal computer 20 typically includes a modem 54 or other means for establishing communications over the wide area network 52 , such as the Internet.
  • the modem 54 which may be internal or external, is connected to the system bus 23 via the serial port interface 46 .
  • program modules depicted relative to the personal computer 20 may be stored in the remote memory storage device.
  • any of the servers may store program data, such as receiving mail server codes, domain names, and IP addresses, in remote memory storage devices.
  • program data such as receiving mail server codes, domain names, and IP addresses.
  • FIGS. 2 and 3 illustrate a process, e.g., a set of computer executable instructions, for secure delivery of electronic mail to a mail server having a dynamic IP address according to an embodiment of the present invention.
  • the instructions illustrated in FIGS. 2 and 3 may be stored on a computer-readable medium, for example, any of the computer-readable media illustrated in FIG. 1.
  • a receiving mail server 101 such as an SMTP server, may receive a dynamic IP address, for example, when the receiving mail server accesses a network, such as the Internet.
  • the receiving mail server 101 preferably registers the dynamic IP address along with a receiving mail server code with a dynamic name server 102 .
  • Step ST 1 The registration may occur during the connection phase when the receiving mail server accesses the network.
  • the receiving mail server code registered with the dynamic name server 102 is preferably secret, i.e., structured and stored to reduce the likelihood of discovery by someone attempting to impersonate the receiving mail server 101 and steal electronic mail.
  • the generation and storage of an exemplary receiving mail server code are discussed in more detail below.
  • the dynamic name server 102 comprises a dynamically updatable name server, such as a “Windows” Internet Name Service (WINS) server.
  • the present invention is not limited to registering the receiving mail server code and the dynamic IP address of the receiving mail server 101 with a WINS server. Any server capable of dynamically updating a database of receiving mail server codes and IP addresses is within the scope of the invention.
  • WINS server is preferred because WINS servers allow users to dynamically register receiving mail server codes and dynamic IP addresses by transmitting a name registration request, including a receiving mail server code and a dynamic IP address, to the WINS server.
  • WINS servers are capable of maintaining a dynamically updated database of receiving mail server codes and dynamic IP addresses.
  • WINS servers are conventionally used in small business computer networks to allow users to self-register machine names and IP addresses and communicate with other users connected to the small business computer network.
  • the dynamic name server 102 stores receiving mail server codes and dynamic IP addresses for secure delivery of electronic mail to remote mail servers.
  • access to the records storing the receiving mail server codes may be limited to prevent unauthorized discovery of the receiving mail server codes.
  • the dynamic name server 102 may comprise a dynamic DNS server.
  • the receiving mail server 101 may request mail delivery for a domain name from a delivering mail server 103 for example, using SMTP.
  • the delivering mail server 103 transmits a request for the name of the mail server that receives mail for the domain name received in ST 2 to a private name server 104 .
  • the private name server 104 is preferably a DNS server.
  • the private name server 104 stores a record linking the receiving mail server code and the domain name of a domain for which the receiving mail server receives mail. Multiple domain names can be linked with the same receiving mail server code. This record may be created and stored at some time prior to the request for mail delivery, for example, when the owner of the receiving mail server 101 contracts for services from the owner of the delivering mail server 103 , i.e., during the setup phase.
  • the private name server 104 then transmits the record linking the domain name and the receiving mail server code to the delivering mail server 103 .
  • Step ST 4 The delivering mail server 103 transmits a request for the dynamic IP address corresponding to the receiving mail server code to the private name server 104 .
  • Step ST 5 The private name server 104 may not store a record linking the IP address of the receiving mail server 101 with the receiving mail server code, since the receiving mail server 101 has a dynamic IP address. Once the private name server 104 determines that it does not have the record linking the receiving mail server code with the dynamic IP address, the private name server requests the record from the dynamic name server 102 (Step ST 6 ).
  • the dynamic name server 102 having stored the dynamic IP address and the receiving mail server code during the registration, extracts the record containing the dynamic IP address and transmits the record containing the IP address of the receiving mail server 101 to the private name server 104 .
  • the private name server 104 transmits the record including the dynamic IP address of the receiving mail server 101 to the delivering mail server 103 .
  • the delivering mail server 103 delivers electronic mail to the receiving mail server 101 .
  • Step ST 9 Thus, electronic mail can be securely delivered to a mail server, even when the mail server has a dynamic IP address.
  • the delivery is secure because the receiving mail server code stored by the name servers and the receiving mail server is preferably secret. An unauthorized user cannot impersonate the receiving mail server and receive mail without knowing the receiving mail server code.
  • the receiving mail server 101 registers a dynamic IP address and a receiving mail server code with the dynamic name server 102 .
  • the receiving mail server code may be any combination of alphanumeric characters, digits, and/or symbols that are preferably arranged so that the receiving mail server code is difficult to determine.
  • the receiving mail server code may comprise a random or pseudo-random string of characters, such as “AXRY14TJLM.”
  • the receiving mail server code may comprise a pure binary value that does not translate into alphanumeric characters.
  • the length of the receiving mail server code may vary according to the desired level of security. For example, the longer the receiving mail server code, the more difficult the receiving mail server code is to determine through iterative techniques. In this example, the receiving mail server code is a ten-character string.
  • the receiving mail server code may be generated by the receiving mail server 101 , the delivering mail server 103 , or by any program in communication with the receiving mail server 101 or the delivering mail server 103 .
  • the receiving mail server code may be generated by a program executing on a machine at an ISP and downloaded to the receiving mail server 101 the first time that the receiving mail server 101 connects to the ISP, e.g., during the setup phase.
  • the receiving mail server may include the program for generating the receiving mail server code and upload the receiving mail server code to the ISP when the receiving mail server 101 connects to the ISP for the first time.
  • the program or algorithm for generating the receiving mail server code may comprise any suitable algorithm for generating a code having the characteristics described above.
  • the algorithm may comprise a random or pseudo-random number generation algorithm.
  • the receiving mail server code is preferably stored by the receiving mail server 101 , e.g., in memory accessible by the receiving mail server 101 , to be used in the receiving mail server code registration process.
  • the receiving mail server 101 In order to register the receiving mail server code and the dynamic IP address with the dynamic name server 102 , the receiving mail server 101 preferably constructs a packet of registration data in a format recognizable by the dynamic name server 102 .
  • the packet may be a name registration request.
  • a name registration request includes a header section, a question section, and a resource record section. Details of the structure of the header section and the question section are described in Request For Comments (RFC) 1002, entitled, “Protocol Standard For NetBIOS Service on a TCP/UDP Transport: Detailed Specifications,” by The NetBIOS Working Group (March 1987), the disclosure of which is incorporated herein by reference.
  • the resource record section contains the data being registered with the dynamic name server 102 . Since the data being registered includes the dynamic IP address of the receiving mail server 101 , the resource record is an address or A record.
  • FIG. 4 illustrates an exemplary data structure for an A record according to an embodiment of the present invention.
  • the data structure illustrated in FIG. 4 may be embodied in any computer-readable medium, for example, any of the computer-readable media illustrated in FIG. 1.
  • the words in parenthesis indicate the field names for each block of the A record.
  • the characters under each field name indicate textual representations of data, which may be stored in each field according to the present embodiment.
  • block 130 represents the Resource Domain Name field.
  • the Resource Domain Name field is traditionally used to store the domain name of the machine to which the record pertains.
  • Block 138 represents the IP address field for storing the IP address corresponding to the name in block 130 .
  • block 138 stores the dynamic IP address of the receiving mail server, for example, “ 131 . 100 . 100 . 13 .”
  • Block 136 represents the Type field indicating the type of data contained in the resource record. For an A record, the Type field contains the character “A,” representing “Address.” Blocks 132 and 134 respectively represent the Network Class field and the Time to Live field of the A record.
  • the values in these blocks are not essential to the invention.
  • the characters “IN” for Internet class are used for the Network Class field, and the Time to Live field is blank, since it is optional.
  • the textural representation of an exemplary A record stored in the dynamic name server 102 according to the present embodiment using the receiving mail server code and the dynamic IP address of the receiving mail server 101 may be as follows:
  • the dynamic name server 102 preferably maintains a dynamically updated database of A records containing receiving mail server codes and dynamic IP addresses of a plurality of receiving mail servers.
  • the present invention is not limited to linking dynamic IP addresses with receiving mail server codes using A records. Any data structure for linking a dynamic IP address with a receiving mail server code is within the scope of the invention. In addition, the present invention is not limited to storing the records linking IP addresses and receiving mail server codes in a WINS server. Any type of server capable of dynamically registering records linking receiving mail server codes with dynamic IP addresses is within the scope of the invention.
  • the receiving mail server 101 transmits a mail delivery request command to the delivering mail server 103 .
  • the mail delivery request command is the SMTP ETRN command.
  • the ETRN command was developed to allow remote users to receive queued mail over a transient connection to an ISP.
  • the ETRN command is an Internet standard for remote delivery of queued mail.
  • the ETRN command instructs the delivering mail server 103 to establish a separate SMTP connection with the receiving mail server 101 to deliver mail, rather than reversing the mail delivery request connection. Establishing a separate connection enhances security because the delivering mail server accesses a name server to determine where to deliver the mail, instead of relying on a name provided by an unknown requester.
  • some mail servers used the SMTP TURN command to receive queued mail.
  • the TURN command is not secure because the delivering mail server does not access a DNS server to verify the name of the receiving mail server.
  • a user may enter the command “TURN smallbiz.com.”
  • the delivering mail server then delivers all mail intended for smallbiz.com to the user's IP address without extracting the MX record from a DNS server to determine whether the user is a mail server authorized to receive mail for smallbiz.com.
  • the ETRN command is an improvement over the TURN command because the delivering mail server accesses a domain name server to determine the name of the mail exchanger authorized to receive mail for a domain.
  • mail delivery using the SMTP ETRN command could not be performed unless the receiving mail server had a static IP address because conventional DNS servers may not be updated when a receiving SMTP server receives a dynamic IP address.
  • the present invention is not limited to using the ETRN command to start delivery of queued mail. Any command that causes the delivering mail server to perform name verification before delivering mail is within the scope of the invention.
  • step ST 3 the delivering mail server 103 requests the name of the mail exchanger authorized to receive mail for the domain specified in the ETRN command.
  • the delivering mail server 103 requests the MX record to determine the name of the receiving mail server 101 .
  • FIG. 5 shows an exemplary format of an MX record according to the present embodiment.
  • the data structure illustrated in FIG. may be embodied in a computer-readable medium, for example, any of the computer-readable media illustrated in FIG. 1.
  • the words in parenthesis inside each block indicate the field types for the MX record.
  • the characters under each block illustrate exemplary data in textual format for each field according to the present embodiment.
  • Block 150 indicates the Exchange-Dname field.
  • Block 150 is used to store the receiving mail server code corresponding to the dynamic IP address, for example, “AXRY14TJLM.”
  • Block 140 represents the Resource Domain Name field. This field stores the domain name of the domain for which the receiving mail server handles mail, e.g., smallbiz.com.
  • Block 142 represents the Class field. For purposes of the present example, the Class field is assumed to be IN or Internet.
  • Block 144 represents the Time to Live field. The Time to Live field is used for caching. The Time to Live field is not essential in explaining the present embodiment, and is left blank.
  • Block 46 represents the Preference field.
  • the Preference field stores a numeric priority value that allows the delivering mail server to select among multiple MX records when multiple mail exchangers deliver mail for a domain.
  • the preference value is not important in explaining the present embodiment, since only one receiving mail machine has been described. Thus, in the illustrated embodiment, the preference value is set to 0.
  • An example of an MX record in textual format according to the present embodiment may be as follows:
  • the MX record according to the present embodiment may be stored in the private name server 104 at any time prior to the request for mail delivery.
  • the MX record may be stored when the owner of the receiving mail server 101 contracts for services with the owner of the delivering mail server 103 and the receiving mail server is added to the network, i.e., during the setup phase.
  • the private name server 104 performs a search of its MX records for the MX record corresponding to the domain for which the receiving mail server 101 receives mail. After locating the MX record, the private name server 104 transmits the MX record including the receiving mail server code to the delivering mail server 103 (Step ST 4 ).
  • the present invention is not limited to using MX records to link receiving mail server codes with domain names of receiving mail servers. Any data structure for linking the receiving mail server codes and the domain names is within the scope of the invention.
  • the delivering mail server 103 queries the private name server for the A record corresponding to the receiving mail server code in the MX record.
  • the private name server 104 performs a search of its resource records, for example, using the receiving mail server code specified in the request received from the delivering mail server 103 .
  • the private name server 104 may not store an A record for the receiving mail server 101 .
  • the private name server 104 preferably does, however, store a record that points to the dynamic name server 102 for A records that it does not contain.
  • the dynamic name server 102 comprises a WINS server
  • the record is known as a WINS record.
  • the private name server 104 thus queries the dynamic name server 102 for the A record.
  • An exemplary format for the query is the name query request, as described in RFC 1002.
  • the dynamic name server 102 stores the A record including the receiving mail server code and the dynamic IP address because the A record was previously registered in Step ST 1 by the receiving mail server 101 .
  • the dynamic name server 102 locates the A record, for example, by executing a look-up algorithm of its A records using the receiving mail server code received in the query from the dynamic name server 102 .
  • the dynamic name server 102 then transmits the A record including the dynamic IP address and the receiving mail server code to the private name server 104 .
  • Step ST 7 The private name server 104 delivers the A record to the delivering mail server 103 .
  • Step ST 8 The delivering mail server 103 then establishes an SMTP connection with the machine corresponding to the dynamic IP address specified by the A record and delivers mail to that machine.
  • Step ST 9 Since the receiving mail server code and the dynamic IP address were registered by the receiving mail server 101 , the mail reaches its intended destination.
  • Mail delivery following receipt of the dynamic IP address preferably follows the Simple Mail Transfer Protocol, as described, for example, in RFC 821, entitled “Simple Mail Transfer Protocol,” by Jonathan Postel (August 1982), the disclosure of which is incorporated herein by reference.
  • the present invention is not limited to the Simple Mail Transport Protocol as defined in RFC 821.
  • SMTP mail delivery according to the present invention may include any extensions and modifications of the basic protocol, for example, extensions and modifications pursuant to RFC 1869, entitled, “SMTP Service Extensions,” by J. Klensin et al. (November 1995), the disclosure of which is also incorporated herein by reference.
  • the receiving mail server 101 may unregister the A record containing the receiving mail server code from the dynamic name server 102 to reduce the likelihood of discovery of the receiving mail server code.
  • the dynamic name server is compromised, only receiving mail server codes being used in pending mail transactions are discoverable.
  • An exemplary command for unregistering data from a WINS server is the name overwrite request described in RFC 1002. Because the receiving mail server code is preferably secret and a separate SMTP connection is established to deliver the mail, mail delivery is secure.
  • FIG. 6 is a network diagram illustrating an exemplary system for securely delivering electronic mail to mail servers having dynamic IP addresses according to an embodiment of the present invention.
  • the system includes a dynamic name server 102 including a first interface in communication with a public network 108 , such as the Internet, and a second interface in communication with a private network 109 .
  • the dynamic name server 102 is preferably a dynamically updatable server, such as a WINS server.
  • the dynamic name server 102 registers dynamic IP addresses and corresponding receiving mail server codes from receiving mail servers, such as the receiving mail server 101 .
  • the dynamic name server 102 preferably stores the receiving mail server codes and the corresponding IP addresses as A records.
  • a private name server 104 includes a first interface coupled to the second interface of the dynamic name server 102 via the private network 109 .
  • the private name server 104 preferably comprises a DNS server.
  • the private name server 104 stores records, preferably MX records, pairing the receiving mail server codes stored by the dynamic name server 102 with domain names.
  • the private name server 104 is preferably hidden from the public network 108 to enhance the security of the receiving mail server codes.
  • a delivering mail server 103 includes a first interface in communication with the public network 108 and a second interface in communication with the private network 109 to deliver mail to the receiving mail server 101 via the public network 108 .
  • the delivering mail server 103 may also communicate with additional private or public networks to deliver mail to a plurality of receiving mail servers.
  • the delivering mail server 103 is preferably an SMTP server.
  • the dynamic name server 102 and the delivering mail server 103 execute on the same machine.
  • the receiving mail server 101 may access the public network 108 through any suitable means, for example, using a modem.
  • the modem may access a communication link 105 , such as the public telephone network.
  • a network access server such as a router 106 , including a modem or a plurality of modems, receives calls from mail servers requesting mail delivery. Thus, one of the modems of the router 106 may receive the call from the receiving mail server 101 over the communication link 105 .
  • a dialup access network 107 may provide a password authentication service before allowing customer access to the public network 108 . Thus, the dialup access network 107 may connect the receiving mail server 101 to the public network 108 only after verifying a password.
  • customers may connect to the delivering mail server through a private network (not shown), i.e., a network that is not accessible to non-subscribers of the private network.
  • a private network not shown
  • the receiving mail server 101 may receive a dynamic IP address and request delivery of electronic mail.
  • the dynamic and private name servers 102 and 104 , the delivering mail server 103 , the router 106 , and the dialup access network 107 may be managed by an ISP providing electronic mail and Internet services to remote customers. Additional servers, such as public name servers, may communicate with the other servers at the ISP through the public and private networks. These servers are not essential in explaining the present embodiment and are therefore not shown in FIG. 6.
  • the receiving mail server 101 may be located remotely from the ISP, for example, at a company receiving Internet and electronic mail service from the ISP. However, the present invention is not limited to any particular location of the receiving mail server 101 .
  • the private name server 104 that stores the MX records pairing the receiving mail server codes and the receiving mail server domain names is preferably hidden from, i.e., not directly connected to, the public network 108 .
  • the delivering mail server 103 and the dynamic name server 102 are connected to the public network 108 .
  • the delivering mail server 103 and the dynamic name server 102 preferably respond to a limited set of commands, e.g., name registration requests and ETRN commands, received from the public network 108 .
  • a firewall server may be provided at any logical location between the private name server 104 and the public network 108 , for example, between the delivering mail server 103 and the public network 108 .
  • the private name server 104 may be directly connected to the public network 108 through the firewall.
  • Implementations of firewall servers which may be suitable, include packet filters, stateful inspection filters, and combinations of packet and stateful inspection filters. Any type of firewall server for protecting the stored receiving mail server codes is within the scope of the invention.
  • the receiving mail server codes stored in the private name server 104 , the dynamic name server 102 , and/or the receiving mail server 101 may be encrypted.
  • the present invention is not limited to the embodiment illustrated in FIG. 6.
  • the delivering mail server 103 , the dynamic name server 102 , and the private name server 104 may execute on the same physical machine.
  • each of the servers may execute on separate machines to enhance processing speed. Any combination of servers and machines is within the scope of the invention.
  • the following example illustrates how a receiving mail server connected to a small business computer network having a domain name of smallbiz.com may utilize the system of FIG. 6 to securely retrieve electronic mail.
  • the Internet service provider may generate the receiving mail server code and store the receiving mail server code in an MX record including the domain name smallbiz.com in the private name server 104 .
  • the receiving mail server code is preferably also stored in memory accessible by the receiving mail server 101 to be used in secure mail transactions.
  • the receiving mail server code may be downloaded with the customer's Internet access software.
  • the receiving mail server 101 connects to the public network 108 through any suitable means, for example, using a modem, as described above.
  • the receiving mail server In order to communicate with other machines connected to the public network 108 , the receiving mail server preferably receives an IP address. Because available IP addresses may be limited, the receiving mail server may receive a dynamic IP address, for example, from a dynamic host configuration protocol (DHCP) server or a RADIUS server located at the Internet service provider. In this example, it is assumed that the receiving mail server 101 is given a dynamic IP address of 131.100.100.13.
  • DHCP dynamic host configuration protocol
  • RADIUS located at the Internet service provider.
  • FIG. 7 illustrates exemplary steps which may be performed by the receiving mail server 101 after receiving a dynamic IP address in order to securely retrieve electronic mail.
  • the steps may are preferably computer-executable instructions, i.e., a program, embodied in a computer-readable medium, for example, any of the computer-readable media illustrated in FIG. 1.
  • the program evaluates network interfaces of the receiving mail server to identify a valid Internet address.
  • Step ST 21 Nonrouteable default IP addresses, which may have been stored by the receiving mail server 101 for use in local area network communications, are preferably ignored.
  • the program locates the dynamic IP address received from the Internet service provider, that address is selected as the address for mail communications, provided it is a routeable Internet address.
  • the receiving mail server 101 sends a name registration request to the dynamic name server 102 at the ISP.
  • the name registration request includes the dynamic IP address and a receiving mail server code.
  • the dynamic name server 102 stores the A record including the dynamic IP address and the receiving mail server code.
  • the receiving mail server 101 may request delivery of electronic mail.
  • Step ST 23 First, the receiving mail server 101 establishes an SMTP connection with the delivering mail server 103 , for example, using logical port 25 . After establishing the connection, the receiving mail server 101 may transmit the SMTP command “EHLO” to identify the receiving mail server 101 and determine SMTP commands supported by the delivering mail server 103 . The delivering mail server 103 responds by sending a list of SMTP commands that the delivering mail server 103 supports.
  • the receiving mail server 101 After receiving the list of commands, the receiving mail server 101 transmits the command “ETRN smallbiz.com.”
  • the delivering mail server 103 first queries the private name server 104 for the MX record to identify the name of the mail server responsible for receiving mail for smallbiz.com.
  • the private name server 104 may respond by transmitting the MX record, “smallbiz.com. IN MX 0 AXRY14TJLM” to the delivering mail server 103 .
  • the private name server may transmit only the receiving mail server code to the delivering mail server 102 .
  • the delivering mail server 103 queries the private name server 104 for the A record corresponding to AXRY14TJLM.
  • the private name server 104 does not have an A record for AXRY14TJLM.
  • the private name server 104 may store a WINS record pointing to the dynamic name server 102 .
  • the private name server 104 queries the dynamic name server 102 for the A record for AXRY14TJLM. This process is known as a WINS referral.
  • the dynamic name server 102 may respond by transmitting the A record “AXRY14TJLM IN A 131.100.100.13.” to the private name server 104 .
  • the private name server 104 transmits the A record to the delivering mail server 103 .
  • the delivering mail server 103 establishes an SMTP connection to machine located at the IP address 131.100.100.13 and delivers the mail to that machine.
  • the receiving mail server 101 may then receive the mail (Step ST 24 ) and distribute the mail to users of its site.
  • the receiving mail server code is preferably secret, unauthorized users cannot impersonate the receiving mail server 101 and steal electronic mail. For example, without knowing the receiving mail server code, a user cannot register the receiving mail server code and the user's IP address with the dynamic name server 102 . Moreover, as discussed above, the receiving mail server preferably unregisters the receiving mail server code and the dynamic IP address after receiving mail. (Step ST 25 )

Abstract

The present invention includes methods and systems for securely delivering electronic mail to electronic mail servers having dynamic IP addresses. Before requesting mail delivery, a receiving mail server having a dynamic IP address registers its dynamic IP address along with a receiving mail server code in memory accessible by a dynamic name server. The receiving mail server code is preferably also stored with the domain name for which the receiving mail server receives mail in memory accessible by a private name server. In response to a request for mail delivery, a delivering mail server utilizes the receiving mail server code stored in memory accessible by the private name server and the dynamic name server to determine the dynamic IP address.

Description

    TECHNICAL FIELD
  • The present invention relates to methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses. More particularly, the present invention relates to methods and systems for securely delivering electronic mail to mail servers having dynamic IP addresses utilizing the Simple Mail Transfer Protocol (SMTP). [0001]
  • BACKGROUND OF THE INVENTION
  • Hosts connected to a TCP/IP network communicate with each other using internet protocol (IP) addresses. An IP address is a number uniquely identifying a network connection. Available Internet IP addresses have become limited in number due to inefficient address assignment and an increase in the number of hosts connected to the Internet. As a result, Internet service providers (ISPs) may be unwilling to allocate static IP addresses to customers without charging substantial fees. A static or fixed IP address does not change for a given network connection. For example, each time a customer with a static IP address accesses the Internet through an ISP, the customer has the same IP address. Instead of allocating static IP addresses to customers, some ISPs allocate dynamic IP addresses. A dynamic IP address is temporarily assigned to a user, or, more specifically, to the network connection of a user's machine. For example, when a customer accesses the Internet through an ISP, the customer may be given a dynamic IP address. When the customer terminates the connection with the ISP, the dynamic IP address may be assigned to another customer. When the first customer accesses the Internet a second time through the same ISP, he or she may or may not receive the same IP address used in the first connection. Thus, dynamic IP addresses allow owners of static IP addresses to maximize the value of each address by temporarily allocating the address to multiple customers. [0002]
  • SMTP is the dominant Internet standard for delivering electronic mail. SMTP allows mail for multiple users to be delivered to a single SMTP server. SMTP is an IP-based protocol. In order to deliver electronic mail, a delivering mail server retrieves the IP address of a receiving mail server. The SMTP protocol was designed to route mail to a server permanently connected to a network using a static IP address. Delivering mail to a mail server that randomly connects to a network with a dynamic IP address cannot be done securely using SMTP according to conventional mail delivery techniques. Alternatively, an SMTP server having a dynamic IP address cannot securely retrieve mail. For example, in order for a delivering SMTP server to determine where to deliver electronic mail, the delivering SMTP server determines the IP address of the receiving SMTP server. In order to determine the IP address of the receiving SMTP server, the delivering SMTP server may access a Domain Name System (DNS) server. A DNS server stores a database of resource records containing information relating to hosts, including IP addresses of the hosts. [0003]
  • Determining the IP address of the receiving SMTP server is a two step process. First, the delivering SMTP server queries the DNS server for the name of the receiving SMTP server. The query includes the domain name of the domain for which the receiving SMTP server receives mail. The DNS server searches its resource records for a mail exchange or MX record corresponding to the domain name in the query. An MX record specifies the name of a mail exchanger, i.e., the receiving SMTP server, responsible for receiving mail for a given domain. The DNS server sends an MX record specifying the name of the receiving SMTP server to the delivering SMTP server. [0004]
  • The next step is determining the IP address corresponding to the mail exchanger name specified in the MX record received by the delivering SMTP server. Accordingly, the delivering SMTP server queries the DNS server for the IP address corresponding to the name of the mail exchanger extracted from the MX record. The DNS server stores additional resource records, known as address or A records, that pair IP addresses with host names. Thus, if the DNS server stores the A record for the mail exchanger, the A record is transmitted to the delivering SMTP server, which can then initiate an SMTP connection to the IP address specified by the A record and deliver the mail. However, when the receiving SMTP server has a dynamic IP address, the DNS server may not have the A record for the receiving SMTP server because conventional DNS servers are not dynamically updated when a host receives a dynamic IP address. More particularly, no mechanism exists in the conventional Domain Name System for dynamically or automatically updating A records in a DNS server. Updating may be performed manually, for example, using a keyboard. However, such a process is time-consuming, labor-intensive, and unsuitable in a computing environment where dynamic IP addresses change frequently. Thus, conventional DNS servers may store A records containing static IP addresses only. [0005]
  • Since SMTP was originally designed to route mail between mail servers permanently connected to a network using fixed IP addresses, the fact that conventional DNS servers were not dynamically updatable was of little consequence. Conventional DNS servers stored the A records for the permanently connected mail servers. Mail delivery to the permanently connected mail servers was reasonably secure because delivering mail servers verified the addresses of receiving mail servers by accessing DNS servers before delivering mail. As long as the records stored in the DNS servers were secure, mail delivery occurred to the intended recipients. [0006]
  • However, in order to reduce network access fees, it has become desirable for a receiving mail server not to maintain a permanent connection to a network. For example, a receiving mail server may access a network periodically to retrieve mail queued by a delivering mail server. One conventional mechanism for receiving queued mail for a domain is the SMTP TURN command. In order to retrieve mail using the TURN command, the receiving mail server first establishes an SMTP connection with the delivering mail server. Next, the receiving mail server issues the TURN command followed by the domain name for which the receiving mail server receives mail. The delivering mail server then delivers queued mail for the domain name specified in the TURN command without verifying the IP address of the receiving mail server. The SMTP connection initiated by the receiving mail server is essentially reversed and used by the delivering mail server to deliver mail. The TURN command is not secure because a user can initiate an SMTP connection, issue the TURN command, and retrieve mail for a domain for which he or she is not authorized to retrieve mail. [0007]
  • Because of the security problems associated with the TURN command, the SMTP ETRN command was developed as a more secure method for retrieving queued mail. In order to utilize the ETRN command to retrieve mail, the receiving mail server first initiates an SMTP connection with the delivering mail server. Next, the receiving mail server issues the ETRN command followed by the domain name for which mail delivery is requested. In response to the ETRN command, the delivering mail server queries a DNS server for the mail exchanger and then for the IP address of the mail exchanger. Because the delivering mail server queries the DNS server to determine where to deliver mail, mail retrieval using the ETRN command is more secure than mail retrieval using the TURN command. However, if the receiving mail server has a dynamic IP address, the DNS server may not store the A record for the receiving mail server. As a result, the IP address cannot be determined and mail retrieval using the ETRN command fails. An alternative is to use the TURN command, which is not secure. Thus, according to conventional delivery techniques, electronic mail could not be securely delivered to an SMTP server having a dynamic IP address. [0008]
  • SUMMARY OF THE INVENTION
  • As used herein, the term “server” refers to a program executing on a machine, such as a computer, and providing shared services to client processes on a network. The computer may include a memory device that stores the server and a processor that executes the server. The computer may also include one or more network adapters, such as Ethernet adapters, that allow the server to communicate with other servers executing on other machines. Alternatively, multiple servers may execute on the same physical machine. However, a server, as described herein, is not intended to be limited to use with or by any particular hardware configuration. In addition, the term “server” is not intended to be limited to a program that always provides services to clients. For example, in some communications, servers may act as clients or peers of other network processes. [0009]
  • In addition, the phrase “delivering mail server” refers to a program that stores and delivers mail to a receiving mail server. The phrase “receiving mail server” refers to a program that requests delivery of queued mail from the delivering mail server. However, neither of these phrases is intended to be limited to a mail server that only delivers or only receives mail. For example, the receiving mail server may deliver mail, and the delivering mail server may receive mail. Thus, the terms “delivering” and “receiving” are intended to describe the functions of the mail servers with regard to a given transaction. [0010]
  • As used herein, the phrase, “receiving mail server code” refers to any string or grouping of alphanumeric characters, digits, and/or symbols preferably arranged so that the receiving mail server code is difficult to determine. The receiving mail server code is utilized to securely deliver electronic mail to a receiving mail server, as described in more detail below. [0011]
  • According to one aspect, the present invention includes one or more name servers in communication with a delivering mail server to securely communicate the dynamic IP address of receiving mail servers to the delivering mail server. A first name server hereinafter referred to as “the dynamic name server” dynamically stores records linking receiving mail server codes of receiving mail servers with dynamic IP addresses of receiving mail servers. A second name server hereinafter referred to as “the private name server” stores records linking the receiving mail server codes with domain names for which the receiving mail servers receive mail. As used herein, the phrase “dynamic name server” refers to any server capable automatically registering records linking receiving mail server codes and dynamic IP addresses of receiving mail servers in response to registration requests received over a network. The phrase “private name server” refers to any name server capable of storing records linking receiving mail server codes to domain names for the receiving mail servers, wherein access to the records is preferably limited, e.g., to a delivering mail server, in order to protect the stored receiving mail server codes. A third name server, hereinafter referred to as, “the public name server” may be used by other mail servers to route mail to the delivering mail server. As used herein, the phrase “public name server” refers to any server that stores records linking domain names mail exchanger names and records linking mail exchanger names to IP addresses, wherein the records are freely accessible to network users. The public name server is not essential to the invention but is nonetheless mentioned for completeness. [0012]
  • According to another aspect, the present invention includes a setup phase, a connection phase, and a mail delivery phase. The setup phase may occur when a new receiving mail server and the domain(s) for which it receives mail are added to a network. The setup phase may include generating a receiving mail server code for the receiving mail server and linking the receiving mail server code with the domain name corresponding to the domain for which the receiving mail server receives mail. The receiving mail server code and the domain name are preferably registered with a private name server. The receiving mail server code and the domain name are preferably also registered with the receiving mail server. [0013]
  • Next, during the connection phase, the receiving mail server connects to the network and receives a dynamic IP address. During the connection phase, the receiving mail server preferably registers its IP address along with its receiving mail server code with a dynamic name server. The connection phase may occur each time a receiving mail server connects to the network and receives a dynamic IP address. [0014]
  • Next, during the mail retrieval phase, the receiving mail server requests delivery of queued mail from the delivering mail server. The delivering mail server first retrieves the receiving mail server code corresponding to the domain or domains for which the receiving mail server receives mail from the private name server. The delivering mail server then requests the dynamic IP address from the private name server. The private name server determines that it does not have the record containing the IP address, so the private name server queries the dynamic name server for the dynamic IP address. The dynamic name server transmits the dynamic IP address to the private name server. The private name server transmits the dynamic IP address to the delivering mail server. The delivering mail server then creates an SMTP connection to the IP address received from the private name server and then delivers the mail. The mail delivery phase may occur each time the delivering mail server requests delivery of queued mail after connecting to the network and receiving a dynamic IP address. [0015]
  • According to another aspect, the present invention includes a method for securely delivering electronic mail to a receiving mail server having a dynamic IP address. The method includes registering a dynamic IP address and a code of a receiving mail server to which electronic mail is to be delivered in a dynamic name server. In order to retrieve electronic mail, after the registration, the receiving mail server may transmit a request for delivery of electronic mail to a delivering mail server. The delivering mail server may be a remote mail server storing queued messages for the receiving mail server. In order to determine where to deliver the queued mail, the delivering mail server may transmit a request for the dynamic IP address of the receiving mail server to a private name server, such as a DNS server. The private name server may store a database of resource records linking receiving mail server codes with domain names for a plurality of receiving mail servers. However, since the dynamic IP address of the receiving mail server may not be stored in the private name server, the private name server may transmit a request for determining the dynamic IP address to the dynamic name server. The request may include the receiving mail server code. The dynamic name server may extract the dynamic IP address based on the receiving mail server code. The dynamic IP address may then be transmitted to the delivering mail server. The delivering mail server may then deliver the mail to the receiving mail server utilizing the dynamic IP address transmitted from the private name server. [0016]
  • According to another aspect, the present invention may include a system for securely delivering electronic mail to electronic mail servers having dynamic IP addresses. In the system, a delivering mail server receives requests for electronic mail delivery from a plurality of receiving mail servers having dynamic IP addresses via a network. The delivering mail server delivers electronic mail to the plurality of receiving mail servers. A dynamic name server receives and stores receiving mail server codes and corresponding dynamic IP addresses of the receiving mail servers, e.g., during the connection phase when the receiving mail servers are allocated dynamic IP addresses. A private name server may be in communication with the dynamic name server and the delivering mail server for storing the receiving mail server codes and corresponding domain names of the plurality of receiving mail servers. The private name server may access the dynamic name server to determine dynamic IP addresses of the plurality of receiving mail servers. [0017]
  • According to another aspect, the present invention includes a method for securely communicating a dynamic IP address of a receiving mail server to a delivering mail server. The method includes registering a dynamic IP address and a receiving mail server code of a receiving mail server with a dynamic name server. Registering the dynamic IP address may include transmitting a name registration request packet, including the dynamic IP address and the receiving mail server code, from the receiving mail server to the dynamic name server. The receiving mail server code may also be stored with the domain name of the receiving mail server in a private name server in communication with the dynamic name server. In response to a request for the dynamic IP address of the receiving mail server from a delivering mail server, the private name server may extract the receiving mail server code from its records. The private name server may then transmit a request for the dynamic IP address to the dynamic name server. The request may include the receiving mail server code. The dynamic name server, having previously registered the dynamic IP address with the receiving mail server code, extracts the dynamic IP address from its records. The dynamic IP address is then transmitted to the delivering mail server. Transmitting the dynamic IP address to the delivering mail server may include first transmitting the dynamic IP address to the private name server. The private name server may then transmit the dynamic IP address to the delivering mail server. [0018]
  • According to another aspect, the present invention may include a computer-readable medium having computer-executable instructions for performing steps for retrieving mail from a mail server. The steps may include identifying a routeable dynamic IP address received from a network. Next, a receiving mail server code previously stored with the receiving mail server, e.g., during the setup phase, may be retrieved and linked with the dynamic IP address. If the receiving mail server code is encrypted, it is preferably decrypted before being linked with the dynamic IP address. Next, the receiving mail server code and the dynamic IP address may be registered with a dynamic name server. The receiving mail server may then request and receive mail securely. [0019]
  • According to another aspect, the present invention may include a computer-readable medium having stored thereon a data structure. The data structure may include an A record. The A record may include a first data field containing data representing a secret receiving mail server code of a receiving mail server and a second data field containing data representing a dynamic IP address of the receiving mail server. [0020]
  • According to another aspect, the present invention may include a computer-readable medium having stored thereon a data structure. The data structure may include an MX record. The MX record may include a first data field containing data representing a secret receiving mail server code of a receiving mail server and a second data field containing data representing a domain name of a domain for which the receiving mail server receives mail. [0021]
  • BRIEF DESCRIPTION OF THE DRAWING
  • FIG. 1 is a block diagram of an exemplary operating environment for computer-executable instructions according to embodiments of the present invention. [0022]
  • FIG. 2 is a flow diagram of a method and a system for securely delivering electronic mail to a mail server having a dynamic IP address according to an embodiment of the present invention. [0023]
  • FIG. 3 is a flow chart of a process for securely delivering electronic mail to a mail server having a dynamic IP address according to an embodiment of the present invention. [0024]
  • FIG. 4 is a diagram of an exemplary data structure of an A record according to an embodiment of the present invention. [0025]
  • FIG. 5 is a diagram of an exemplary data structure of an MX record according to an embodiment of the present invention. [0026]
  • FIG. 6 is a network diagram of a system for securely delivering electronic mail to a mail server having a dynamic IP address according to an embodiment of the present invention. [0027]
  • FIG. 7 is a flow chart illustrating an exemplary process that may be performed by a receiving mail server to retrieve electronic mail after receiving a dynamic IP address according to an embodiment of the present invention. [0028]
  • DETAILED DESCRIPTION OF THE INVENTION Exemplary Operating Environment
  • FIG. 1 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented. For example, embodiments of the present invention may include a receiving [0029] mail server 101, a dynamic name server 102, a delivering mail server 103, and a private name server 104, all of which are illustrated in FIG. 2. Any or all of these servers may be implemented in the computing environment illustrated in FIG. 1. Although not required, the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by a personal computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
  • With reference to FIG. 1, an exemplary system for implementing any of the servers, data structures, or other programs for securely delivering electronic mail to mail servers according to embodiments of the present invention may include a general purpose computing device, such as a conventional [0030] personal computer 20. The personal computer 20 may include a processing unit 21, a system memory 22, and a system bus 23 that couples various system components including the system memory to the processing unit 21. The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system 26 (BIOS) containing the basic routines that helps to transfer information between elements within the personal computer 20, such as during start-up, is stored in ROM 24. The personal computer 20 further includes a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM or other optical media.
  • The [0031] hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical drive interface 34, respectively. The drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the personal computer 20. Exemplary instructions and data structures that may be stored in these computer readable media according to embodiments of the present invention include mail servers, name servers, receiving mail server codes, IP addresses, MX records, A records, or any other instructions and data structures utilized to securely deliver electronic mail to mail servers having dynamic IP addresses. Although the exemplary environment described herein employs a hard disk, a removable magnetic disk 29 and a removable optical disk 31, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs), read only memories (ROM), and the like, may also be used in the exemplary operating environment.
  • A number of program modules may be stored on the hard disk, [0032] magnetic disk 29, optical disk 31, ROM 24 or RAM 25, including an operating system 35, one or more application programs 36, such as mail servers and name servers according to embodiments of the present invention, other program modules 37, and program data 38, such as dynamic IP addresses, domain names, and receiving mail server codes according to embodiments of the present invention. A user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected to the processing unit 21 by other interfaces, such as a parallel port, game port or a universal serial bus (USB). A monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the monitor, personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
  • The [0033] personal computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49. The remote computer 49 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the personal computer 20, although only a memory storage device has been illustrated in FIG. 1. For example, the personal computer 20 may embody a receiving mail server and the remote computer 49 may embody a delivering mail server. The logical connections depicted in FIG. 1 include a local area network (LAN) 51 and a wide area network (WAN) 52. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
  • When used in a LAN networking environment, the [0034] personal computer 20 is connected to the local network 51 through a network interface or adapter 53. The network interface 53 may be connected to a cable modem or ADSL device. When used in a WAN networking environment, the personal computer 20 typically includes a modem 54 or other means for establishing communications over the wide area network 52, such as the Internet. The modem 54, which may be internal or external, is connected to the system bus 23 via the serial port interface 46. In a networked environment, program modules depicted relative to the personal computer 20, or portions thereof, may be stored in the remote memory storage device. Thus, any of the servers, such as the name servers or the mail servers according to embodiments of the present invention, may store program data, such as receiving mail server codes, domain names, and IP addresses, in remote memory storage devices. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
  • FIGS. 2 and 3 illustrate a process, e.g., a set of computer executable instructions, for secure delivery of electronic mail to a mail server having a dynamic IP address according to an embodiment of the present invention. The instructions illustrated in FIGS. 2 and 3 may be stored on a computer-readable medium, for example, any of the computer-readable media illustrated in FIG. 1. In FIG. 2, a receiving [0035] mail server 101, such as an SMTP server, may receive a dynamic IP address, for example, when the receiving mail server accesses a network, such as the Internet. According to an important aspect of the invention, the receiving mail server 101 preferably registers the dynamic IP address along with a receiving mail server code with a dynamic name server 102. (Step ST1) The registration may occur during the connection phase when the receiving mail server accesses the network. The receiving mail server code registered with the dynamic name server 102 is preferably secret, i.e., structured and stored to reduce the likelihood of discovery by someone attempting to impersonate the receiving mail server 101 and steal electronic mail. The generation and storage of an exemplary receiving mail server code are discussed in more detail below.
  • In a preferred embodiment, the [0036] dynamic name server 102 comprises a dynamically updatable name server, such as a “Windows” Internet Name Service (WINS) server. The present invention is not limited to registering the receiving mail server code and the dynamic IP address of the receiving mail server 101 with a WINS server. Any server capable of dynamically updating a database of receiving mail server codes and IP addresses is within the scope of the invention. Using a WINS server is preferred because WINS servers allow users to dynamically register receiving mail server codes and dynamic IP addresses by transmitting a name registration request, including a receiving mail server code and a dynamic IP address, to the WINS server. Thus, unlike conventional DNS servers, WINS servers are capable of maintaining a dynamically updated database of receiving mail server codes and dynamic IP addresses. WINS servers are conventionally used in small business computer networks to allow users to self-register machine names and IP addresses and communicate with other users connected to the small business computer network. In the present embodiment, rather than storing machine names and IP addresses of machines in a local network, the dynamic name server 102 stores receiving mail server codes and dynamic IP addresses for secure delivery of electronic mail to remote mail servers. Moreover, unlike the conventional use of the WINS server, access to the records storing the receiving mail server codes may be limited to prevent unauthorized discovery of the receiving mail server codes. In an alternative embodiment, the dynamic name server 102 may comprise a dynamic DNS server.
  • After registering the receiving mail server code and the dynamic IP address with the [0037] dynamic name server 102, the receiving mail server 101 may request mail delivery for a domain name from a delivering mail server 103 for example, using SMTP. (Step ST2) In response to the request for mail delivery, the delivering mail server 103 transmits a request for the name of the mail server that receives mail for the domain name received in ST2 to a private name server 104. (Step ST3) The private name server 104 is preferably a DNS server. However, instead of storing a record mapping the machine name of the receiving mail server 101 with a domain, the private name server 104 stores a record linking the receiving mail server code and the domain name of a domain for which the receiving mail server receives mail. Multiple domain names can be linked with the same receiving mail server code. This record may be created and stored at some time prior to the request for mail delivery, for example, when the owner of the receiving mail server 101 contracts for services from the owner of the delivering mail server 103, i.e., during the setup phase. The private name server 104 then transmits the record linking the domain name and the receiving mail server code to the delivering mail server 103. (Step ST4) The delivering mail server 103 transmits a request for the dynamic IP address corresponding to the receiving mail server code to the private name server 104. (Step ST5) The private name server 104 may not store a record linking the IP address of the receiving mail server 101 with the receiving mail server code, since the receiving mail server 101 has a dynamic IP address. Once the private name server 104 determines that it does not have the record linking the receiving mail server code with the dynamic IP address, the private name server requests the record from the dynamic name server 102 (Step ST6). The dynamic name server 102, having stored the dynamic IP address and the receiving mail server code during the registration, extracts the record containing the dynamic IP address and transmits the record containing the IP address of the receiving mail server 101 to the private name server 104. (Step ST7) The private name server 104 transmits the record including the dynamic IP address of the receiving mail server 101 to the delivering mail server 103. (Step ST8) Finally, the delivering mail server 103 delivers electronic mail to the receiving mail server 101. (Step ST9) Thus, electronic mail can be securely delivered to a mail server, even when the mail server has a dynamic IP address. The delivery is secure because the receiving mail server code stored by the name servers and the receiving mail server is preferably secret. An unauthorized user cannot impersonate the receiving mail server and receive mail without knowing the receiving mail server code.
  • Each of the steps in FIG. 3 is discussed in more detail below. In Step ST[0038] 1, the receiving mail server 101 registers a dynamic IP address and a receiving mail server code with the dynamic name server 102. The receiving mail server code may be any combination of alphanumeric characters, digits, and/or symbols that are preferably arranged so that the receiving mail server code is difficult to determine. For example, the receiving mail server code may comprise a random or pseudo-random string of characters, such as “AXRY14TJLM.” Alternatively, the receiving mail server code may comprise a pure binary value that does not translate into alphanumeric characters. The length of the receiving mail server code may vary according to the desired level of security. For example, the longer the receiving mail server code, the more difficult the receiving mail server code is to determine through iterative techniques. In this example, the receiving mail server code is a ten-character string.
  • The receiving mail server code may be generated by the receiving [0039] mail server 101, the delivering mail server 103, or by any program in communication with the receiving mail server 101 or the delivering mail server 103. For example, the receiving mail server code may be generated by a program executing on a machine at an ISP and downloaded to the receiving mail server 101 the first time that the receiving mail server 101 connects to the ISP, e.g., during the setup phase. Alternatively, the receiving mail server may include the program for generating the receiving mail server code and upload the receiving mail server code to the ISP when the receiving mail server 101 connects to the ISP for the first time. The program or algorithm for generating the receiving mail server code may comprise any suitable algorithm for generating a code having the characteristics described above. For example, the algorithm may comprise a random or pseudo-random number generation algorithm. Once the receiving mail server code is generated, the receiving mail server code is preferably stored by the receiving mail server 101, e.g., in memory accessible by the receiving mail server 101, to be used in the receiving mail server code registration process.
  • In order to register the receiving mail server code and the dynamic IP address with the [0040] dynamic name server 102, the receiving mail server 101 preferably constructs a packet of registration data in a format recognizable by the dynamic name server 102. If the dynamic name server 102 is a WINS server, the packet may be a name registration request. In general, a name registration request includes a header section, a question section, and a resource record section. Details of the structure of the header section and the question section are described in Request For Comments (RFC) 1002, entitled, “Protocol Standard For NetBIOS Service on a TCP/UDP Transport: Detailed Specifications,” by The NetBIOS Working Group (March 1987), the disclosure of which is incorporated herein by reference. The resource record section contains the data being registered with the dynamic name server 102. Since the data being registered includes the dynamic IP address of the receiving mail server 101, the resource record is an address or A record.
  • FIG. 4 illustrates an exemplary data structure for an A record according to an embodiment of the present invention. The data structure illustrated in FIG. 4 may be embodied in any computer-readable medium, for example, any of the computer-readable media illustrated in FIG. 1. In FIG. 4, the words in parenthesis indicate the field names for each block of the A record. The characters under each field name indicate textual representations of data, which may be stored in each field according to the present embodiment. For example, block [0041] 130 represents the Resource Domain Name field. The Resource Domain Name field is traditionally used to store the domain name of the machine to which the record pertains. For instance, if the name of the receiving mail server is “mailbox” and the domain to which the machine is connected is “smallbiz.com,” then the Resource Domain Name field may store “mailbox.smallbiz.com.” In the illustrated embodiment, the Resource Domain Name field stores the receiving mail server code, for example, “AXRY14TJLM.” Block 138 represents the IP address field for storing the IP address corresponding to the name in block 130. In the illustrated embodiment, block 138 stores the dynamic IP address of the receiving mail server, for example, “131.100.100.13.” Block 136 represents the Type field indicating the type of data contained in the resource record. For an A record, the Type field contains the character “A,” representing “Address.” Blocks 132 and 134 respectively represent the Network Class field and the Time to Live field of the A record.
  • The values in these blocks are not essential to the invention. For purposes of the examples used to illustrate the present embodiment, the characters “IN” for Internet class are used for the Network Class field, and the Time to Live field is blank, since it is optional. Thus, the textural representation of an exemplary A record stored in the [0042] dynamic name server 102 according to the present embodiment using the receiving mail server code and the dynamic IP address of the receiving mail server 101 may be as follows:
  • AXRY14TJLM IN A 131.100.100.13.
  • The [0043] dynamic name server 102 preferably maintains a dynamically updated database of A records containing receiving mail server codes and dynamic IP addresses of a plurality of receiving mail servers.
  • The present invention is not limited to linking dynamic IP addresses with receiving mail server codes using A records. Any data structure for linking a dynamic IP address with a receiving mail server code is within the scope of the invention. In addition, the present invention is not limited to storing the records linking IP addresses and receiving mail server codes in a WINS server. Any type of server capable of dynamically registering records linking receiving mail server codes with dynamic IP addresses is within the scope of the invention. [0044]
  • In Step ST[0045] 2, the receiving mail server 101 transmits a mail delivery request command to the delivering mail server 103. In a preferred embodiment of the invention, the mail delivery request command is the SMTP ETRN command. As discussed above, the ETRN command was developed to allow remote users to receive queued mail over a transient connection to an ISP. The ETRN command is an Internet standard for remote delivery of queued mail. The ETRN command instructs the delivering mail server 103 to establish a separate SMTP connection with the receiving mail server 101 to deliver mail, rather than reversing the mail delivery request connection. Establishing a separate connection enhances security because the delivering mail server accesses a name server to determine where to deliver the mail, instead of relying on a name provided by an unknown requester. For example, prior to the ETRN command, some mail servers used the SMTP TURN command to receive queued mail. The TURN command is not secure because the delivering mail server does not access a DNS server to verify the name of the receiving mail server. For example, after establishing an SMTP connection with an SMTP mail server, a user may enter the command “TURN smallbiz.com.” The delivering mail server then delivers all mail intended for smallbiz.com to the user's IP address without extracting the MX record from a DNS server to determine whether the user is a mail server authorized to receive mail for smallbiz.com. The ETRN command is an improvement over the TURN command because the delivering mail server accesses a domain name server to determine the name of the mail exchanger authorized to receive mail for a domain. However, prior to the present invention, mail delivery using the SMTP ETRN command could not be performed unless the receiving mail server had a static IP address because conventional DNS servers may not be updated when a receiving SMTP server receives a dynamic IP address.
  • The present invention is not limited to using the ETRN command to start delivery of queued mail. Any command that causes the delivering mail server to perform name verification before delivering mail is within the scope of the invention. [0046]
  • In step ST[0047] 3, the delivering mail server 103 requests the name of the mail exchanger authorized to receive mail for the domain specified in the ETRN command. As discussed above, according to SMTP, the delivering mail server 103 requests the MX record to determine the name of the receiving mail server 101. FIG. 5 shows an exemplary format of an MX record according to the present embodiment. The data structure illustrated in FIG. may be embodied in a computer-readable medium, for example, any of the computer-readable media illustrated in FIG. 1. In FIG. 5, the words in parenthesis inside each block indicate the field types for the MX record. The characters under each block illustrate exemplary data in textual format for each field according to the present embodiment. Block 150 indicates the Exchange-Dname field. This field is conventionally used to store the domain name of the mail exchanger, i.e., the receiving mail server. However, according to the present embodiment, block 150 is used to store the receiving mail server code corresponding to the dynamic IP address, for example, “AXRY14TJLM.” Block 140 represents the Resource Domain Name field. This field stores the domain name of the domain for which the receiving mail server handles mail, e.g., smallbiz.com. Block 142 represents the Class field. For purposes of the present example, the Class field is assumed to be IN or Internet. Block 144 represents the Time to Live field. The Time to Live field is used for caching. The Time to Live field is not essential in explaining the present embodiment, and is left blank. Block 46 represents the Preference field. The Preference field stores a numeric priority value that allows the delivering mail server to select among multiple MX records when multiple mail exchangers deliver mail for a domain. The preference value is not important in explaining the present embodiment, since only one receiving mail machine has been described. Thus, in the illustrated embodiment, the preference value is set to 0. An example of an MX record in textual format according to the present embodiment may be as follows:
  • smallbiz.com. IN MX 0 AXRY14TJLM
  • The MX record according to the present embodiment may be stored in the [0048] private name server 104 at any time prior to the request for mail delivery. For example, the MX record may be stored when the owner of the receiving mail server 101 contracts for services with the owner of the delivering mail server 103 and the receiving mail server is added to the network, i.e., during the setup phase. The private name server 104 performs a search of its MX records for the MX record corresponding to the domain for which the receiving mail server 101 receives mail. After locating the MX record, the private name server 104 transmits the MX record including the receiving mail server code to the delivering mail server 103 (Step ST4).
  • The present invention is not limited to using MX records to link receiving mail server codes with domain names of receiving mail servers. Any data structure for linking the receiving mail server codes and the domain names is within the scope of the invention. [0049]
  • After receiving the MX record, the delivering [0050] mail server 103 queries the private name server for the A record corresponding to the receiving mail server code in the MX record. (Step ST5) The private name server 104 performs a search of its resource records, for example, using the receiving mail server code specified in the request received from the delivering mail server 103. However, since the receiving mail server 101 has a dynamic IP address, the private name server 104 may not store an A record for the receiving mail server 101. The private name server 104 preferably does, however, store a record that points to the dynamic name server 102 for A records that it does not contain. When the dynamic name server 102 comprises a WINS server, the record is known as a WINS record. The private name server 104 thus queries the dynamic name server 102 for the A record. (Step ST6) An exemplary format for the query is the name query request, as described in RFC 1002. The dynamic name server 102 stores the A record including the receiving mail server code and the dynamic IP address because the A record was previously registered in Step ST1 by the receiving mail server 101. Thus, the dynamic name server 102 locates the A record, for example, by executing a look-up algorithm of its A records using the receiving mail server code received in the query from the dynamic name server 102. The dynamic name server 102 then transmits the A record including the dynamic IP address and the receiving mail server code to the private name server 104. (Step ST7) The private name server 104 delivers the A record to the delivering mail server 103. (Step ST8) The delivering mail server 103 then establishes an SMTP connection with the machine corresponding to the dynamic IP address specified by the A record and delivers mail to that machine. (Step ST9) Since the receiving mail server code and the dynamic IP address were registered by the receiving mail server 101, the mail reaches its intended destination.
  • Mail delivery following receipt of the dynamic IP address preferably follows the Simple Mail Transfer Protocol, as described, for example, in RFC 821, entitled “Simple Mail Transfer Protocol,” by Jonathan Postel (August 1982), the disclosure of which is incorporated herein by reference. The present invention is not limited to the Simple Mail Transport Protocol as defined in RFC 821. For example, SMTP mail delivery according to the present invention may include any extensions and modifications of the basic protocol, for example, extensions and modifications pursuant to RFC 1869, entitled, “SMTP Service Extensions,” by J. Klensin et al. (November 1995), the disclosure of which is also incorporated herein by reference. [0051]
  • After receiving mail, the receiving [0052] mail server 101 may unregister the A record containing the receiving mail server code from the dynamic name server 102 to reduce the likelihood of discovery of the receiving mail server code. Thus, if the dynamic name server is compromised, only receiving mail server codes being used in pending mail transactions are discoverable. An exemplary command for unregistering data from a WINS server is the name overwrite request described in RFC 1002. Because the receiving mail server code is preferably secret and a separate SMTP connection is established to deliver the mail, mail delivery is secure.
  • FIG. 6 is a network diagram illustrating an exemplary system for securely delivering electronic mail to mail servers having dynamic IP addresses according to an embodiment of the present invention. In the illustrated embodiment, the system includes a [0053] dynamic name server 102 including a first interface in communication with a public network 108, such as the Internet, and a second interface in communication with a private network 109. The dynamic name server 102 is preferably a dynamically updatable server, such as a WINS server. The dynamic name server 102 registers dynamic IP addresses and corresponding receiving mail server codes from receiving mail servers, such as the receiving mail server 101. The dynamic name server 102 preferably stores the receiving mail server codes and the corresponding IP addresses as A records. A private name server 104 includes a first interface coupled to the second interface of the dynamic name server 102 via the private network 109.
  • The [0054] private name server 104 preferably comprises a DNS server. The private name server 104 stores records, preferably MX records, pairing the receiving mail server codes stored by the dynamic name server 102 with domain names. The private name server 104 is preferably hidden from the public network 108 to enhance the security of the receiving mail server codes. A delivering mail server 103 includes a first interface in communication with the public network 108 and a second interface in communication with the private network 109 to deliver mail to the receiving mail server 101 via the public network 108. The delivering mail server 103 may also communicate with additional private or public networks to deliver mail to a plurality of receiving mail servers. The delivering mail server 103 is preferably an SMTP server. In the illustrated embodiment, the dynamic name server 102 and the delivering mail server 103 execute on the same machine.
  • In order to retrieve mail, the receiving [0055] mail server 101 may access the public network 108 through any suitable means, for example, using a modem. The modem may access a communication link 105, such as the public telephone network. A network access server, such as a router 106, including a modem or a plurality of modems, receives calls from mail servers requesting mail delivery. Thus, one of the modems of the router 106 may receive the call from the receiving mail server 101 over the communication link 105. A dialup access network 107 may provide a password authentication service before allowing customer access to the public network 108. Thus, the dialup access network 107 may connect the receiving mail server 101 to the public network 108 only after verifying a password. In an alternative arrangement, customers may connect to the delivering mail server through a private network (not shown), i.e., a network that is not accessible to non-subscribers of the private network. Once connected to the public network 108, the receiving mail server 101 may receive a dynamic IP address and request delivery of electronic mail.
  • The dynamic and [0056] private name servers 102 and 104, the delivering mail server 103, the router 106, and the dialup access network 107 may be managed by an ISP providing electronic mail and Internet services to remote customers. Additional servers, such as public name servers, may communicate with the other servers at the ISP through the public and private networks. These servers are not essential in explaining the present embodiment and are therefore not shown in FIG. 6. The receiving mail server 101 may be located remotely from the ISP, for example, at a company receiving Internet and electronic mail service from the ISP. However, the present invention is not limited to any particular location of the receiving mail server 101.
  • As stated above, the [0057] private name server 104 that stores the MX records pairing the receiving mail server codes and the receiving mail server domain names is preferably hidden from, i.e., not directly connected to, the public network 108. In the illustrated embodiment, the delivering mail server 103 and the dynamic name server 102 are connected to the public network 108. In order to reduce the likelihood of a security breach of the private name server 104, the delivering mail server 103 and the dynamic name server 102 preferably respond to a limited set of commands, e.g., name registration requests and ETRN commands, received from the public network 108. In order to further enhance the security of the receiving mail server codes stored in the private name server 104, a firewall server may be provided at any logical location between the private name server 104 and the public network 108, for example, between the delivering mail server 103 and the public network 108. In addition, the private name server 104 may be directly connected to the public network 108 through the firewall. Implementations of firewall servers, which may be suitable, include packet filters, stateful inspection filters, and combinations of packet and stateful inspection filters. Any type of firewall server for protecting the stored receiving mail server codes is within the scope of the invention. In addition, to further enhance security, the receiving mail server codes stored in the private name server 104, the dynamic name server 102, and/or the receiving mail server 101 may be encrypted.
  • The present invention is not limited to the embodiment illustrated in FIG. 6. For example, because TCP/IP application level communications occur on different logical ports of a machine, the delivering [0058] mail server 103, the dynamic name server 102, and the private name server 104 may execute on the same physical machine. In another alternative, each of the servers may execute on separate machines to enhance processing speed. Any combination of servers and machines is within the scope of the invention.
  • The following example illustrates how a receiving mail server connected to a small business computer network having a domain name of smallbiz.com may utilize the system of FIG. 6 to securely retrieve electronic mail. First, when the owner of the receiving [0059] mail server 101 contracts with the Internet service provider, the Internet service provider may generate the receiving mail server code and store the receiving mail server code in an MX record including the domain name smallbiz.com in the private name server 104. The receiving mail server code is preferably also stored in memory accessible by the receiving mail server 101 to be used in secure mail transactions. For example, the receiving mail server code may be downloaded with the customer's Internet access software. In order to retrieve mail, the receiving mail server 101 connects to the public network 108 through any suitable means, for example, using a modem, as described above. In order to communicate with other machines connected to the public network 108, the receiving mail server preferably receives an IP address. Because available IP addresses may be limited, the receiving mail server may receive a dynamic IP address, for example, from a dynamic host configuration protocol (DHCP) server or a RADIUS server located at the Internet service provider. In this example, it is assumed that the receiving mail server 101 is given a dynamic IP address of 131.100.100.13.
  • After receiving the dynamic IP address, the receiving [0060] mail server 101 executes a program for retrieving its mail. FIG. 7 illustrates exemplary steps which may be performed by the receiving mail server 101 after receiving a dynamic IP address in order to securely retrieve electronic mail. The steps may are preferably computer-executable instructions, i.e., a program, embodied in a computer-readable medium, for example, any of the computer-readable media illustrated in FIG. 1. In order to retrieve mail, the program evaluates network interfaces of the receiving mail server to identify a valid Internet address. (Step ST21) Nonrouteable default IP addresses, which may have been stored by the receiving mail server 101 for use in local area network communications, are preferably ignored. When the program locates the dynamic IP address received from the Internet service provider, that address is selected as the address for mail communications, provided it is a routeable Internet address.
  • After locating the dynamic IP address, the receiving [0061] mail server 101 sends a name registration request to the dynamic name server 102 at the ISP. (Step ST22) The name registration request includes the dynamic IP address and a receiving mail server code. The dynamic name server 102 stores the A record including the dynamic IP address and the receiving mail server code.
  • After sending the name registration request, the receiving [0062] mail server 101 may request delivery of electronic mail. (Step ST23) First, the receiving mail server 101 establishes an SMTP connection with the delivering mail server 103, for example, using logical port 25. After establishing the connection, the receiving mail server 101 may transmit the SMTP command “EHLO” to identify the receiving mail server 101 and determine SMTP commands supported by the delivering mail server 103. The delivering mail server 103 responds by sending a list of SMTP commands that the delivering mail server 103 supports. After receiving the list of commands, the receiving mail server 101 transmits the command “ETRN smallbiz.com.” In response, the delivering mail server 103 first queries the private name server 104 for the MX record to identify the name of the mail server responsible for receiving mail for smallbiz.com. In this example, the private name server 104 may respond by transmitting the MX record, “smallbiz.com. IN MX 0 AXRY14TJLM” to the delivering mail server 103. Alternatively, the private name server may transmit only the receiving mail server code to the delivering mail server 102. The delivering mail server 103 then queries the private name server 104 for the A record corresponding to AXRY14TJLM. The private name server 104 does not have an A record for AXRY14TJLM. However, the private name server 104 may store a WINS record pointing to the dynamic name server 102. The private name server 104 queries the dynamic name server 102 for the A record for AXRY14TJLM. This process is known as a WINS referral. The dynamic name server 102 may respond by transmitting the A record “AXRY14TJLM IN A 131.100.100.13.” to the private name server 104. The private name server 104 transmits the A record to the delivering mail server 103. The delivering mail server 103 establishes an SMTP connection to machine located at the IP address 131.100.100.13 and delivers the mail to that machine. The receiving mail server 101 may then receive the mail (Step ST24) and distribute the mail to users of its site. Thus, secure delivery of electronic mail to a mail server having a dynamic IP address is achieved. Because the receiving mail server code is preferably secret, unauthorized users cannot impersonate the receiving mail server 101 and steal electronic mail. For example, without knowing the receiving mail server code, a user cannot register the receiving mail server code and the user's IP address with the dynamic name server 102. Moreover, as discussed above, the receiving mail server preferably unregisters the receiving mail server code and the dynamic IP address after receiving mail. (Step ST25)
  • While the invention has been described in some detail by way of illustration and example, it should be understood that the invention is susceptible to various modifications and alternative forms, and is not restricted to the specific embodiments set forth. It should be understood that these specific embodiments are not intended to limit the invention but, on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention. [0063]

Claims (30)

What is claimed is:
1. A method for securely delivering electronic mail to a mail server having a dynamic IP address comprising:
registering a dynamic IP address and a receiving mail server code of a receiving mail server with a dynamic name server;
transmitting a request for delivery of electronic mail from the receiving mail server to a delivering mail server;
transmitting a request for the dynamic IP address from the delivering mail server to a private name server;
transmitting a request for determining the dynamic IP address from the private name server to the dynamic name server, the request including the receiving mail server code;
extracting the dynamic IP address from the dynamic name server based on the receiving mail server code;
transmitting the dynamic IP address to the delivering mail server; and
delivering electronic mail from the delivering mail server to the receiving mail server utilizing the dynamic IP address extracted from the dynamic name server.
2. The method of claim 1 wherein registering a dynamic IP address and a receiving mail server code comprises:
allocating memory for an A record having a Resource Domain Name field and an IP address field;
storing the receiving mail server code in the Resource Domain Name field; and
storing the dynamic IP address in the IP address field.
3. The method of claim 1 comprising, before transmitting the request for delivery of electronic mail, storing the dynamic IP address of the receiving mail server and the receiving mail server code in the private name server.
4. The method of claim 3 wherein storing the IP address and the receiving mail server code in the private name server comprises:
allocating memory for an MX record having an Exchange-Dname field and a Resource Domain field;
storing the receiving mail server code in the Exchange-Dname field; and
storing a domain name for which the receiving mail server receives mail in the Resource Domain Name field.
5. The method of claim 4 wherein transmitting a request for the dynamic IP address from the delivering mail server to the private name server comprises:
transmitting a request for the MX record from the delivering mail server to the private name server;
extracting the MX record from the private name server;
transmitting the MX record from the private name server to the delivering mail server; and
transmitting a request for the A record from the delivering mail server to the private name server.
6. The method of claim 1 wherein transmitting a request for delivery of electronic mail comprises transmitting an SMTP ETRN command from the receiving mail server to the delivering mail server.
7. The method of claim 1 wherein registering a dynamic IP address and a receiving mail server code comprises registering a dynamic IP address and a secret receiving mail server code with the dynamic name server.
8. The method of claim 7 wherein registering a dynamic IP address and a secret receiving mail server code comprises transmitting a name registration request including the dynamic IP address and the secret receiving mail server code to a WINS server.
9. A system for securely delivering electronic mail to electronic mail servers having dynamic IP addresses comprising:
a delivering mail server for receiving requests for electronic mail delivery from a plurality of receiving mail servers having dynamic IP addresses via a network and for delivering electronic mail to the plurality of receiving mail servers;
a dynamic name server for receiving and storing receiving mail server codes and corresponding dynamic IP addresses of the receiving mail servers; and
a private name server in communication with the dynamic name server and the delivering mail server for storing the receiving mail server codes and corresponding domain names of the plurality of receiving mail servers, wherein the private name server accesses the dynamic name server to determine dynamic IP addresses of the plurality of receiving mail servers.
10. The system of claim 9 wherein the dynamic name server comprises a WINS server.
11. The system of claim 9 wherein the dynamic name server comprises a dynamic DNS server.
12. The system of claim 9 wherein the private name server comprises a DNS server.
13. The system of claim 9 wherein the delivering mail server comprises an SMTP server.
14. The system of claim 9 wherein the dynamic name server stores a plurality of A records having Resource Domain Name fields and IP address fields, wherein the receiving mail server codes are stored in the Resource Domain Name fields and the dynamic IP addresses are stored in the IP address fields.
15. The system of claim 9 wherein the private name server stores a plurality of MX records having Exchange-Dname fields and Resource Domain Name fields, wherein the receiving mail server codes are stored in the Exchange-Dname fields and domain names for which the plurality of receiving mail servers receive mail are stored in the Resource Domain Name fields.
16. The system of claim 9 wherein the plurality of receiving mail server codes are secret codes.
17. A method for securely communicating a dynamic IP address of a receiving mail server to a delivering mail server comprising:
registering a dynamic IP address and a receiving mail server code of a receiving mail server with a dynamic name server; and
in response to a request for the dynamic IP address of the receiving mail server transmitted from a delivering mail server to a private name server:
searching resource records in the private name server for a record containing the dynamic IP address,
transmitting a request for the dynamic IP address from the private name server to the dynamic name server, the request including the receiving mail server code,
extracting the dynamic IP address from the dynamic name server based on the receiving mail server code, and
transmitting the dynamic IP address to the delivering mail server.
18. The method of claim 17 wherein registering a dynamic IP address and a receiving mail server code comprises:
allocating memory for an A record having a Resource Domain Name field and an IP address field;
storing the receiving mail server code in the Resource Domain Name field; and
storing the dynamic IP address in the IP address field; and
transmitting a name registration request including the A record from the receiving mail server to the dynamic name server.
19. The method of claim 17 further comprising storing the receiving mail server code and a domain name of the receiving mail server with the private name server.
20. The method of claim 19 wherein storing the receiving mail server code and a domain name of the receiving mail server comprises:
allocating memory for an MX record having a Resource Domain Name field and an Exchange-Dname field;
storing the receiving mail server code in the Exchange-Dname field; and
storing the domain name of the receiving mail server in the Resource Domain Name field.
21. The method of claim 17 further comprising generating the receiving mail server code and storing the receiving mail server code in the receiving mail server.
22. The method of claim 17 wherein registering a dynamic IP address and a receiving mail server code comprises registering a dynamic IP address and a secret receiving mail server code with the dynamic name server.
23. A computer-readable medium having computer-executable instructions for performing steps comprising:
(a) identifying a routeable dynamic IP address received from a network; and
(b) registering a receiving mail server code and the dynamic IP address with a dynamic name server.
24. The computer-readable medium of claim 23 having computer executable instructions for performing steps further comprising after step (b),
(c) requesting delivery of electronic mail from a delivering mail server; and
(d) receiving electronic mail routed to the dynamic IP address from the delivering mail server.
25. The computer-readable medium according to claim 23 wherein step (b) comprises:
allocating memory for an A record having a Resource Domain Name field and an IP address field;
storing the receiving mail server code in the Resource Domain Name field; and
storing the dynamic IP address in the IP address field; and
transmitting a name registration request including the A record from the receiving mail server to the dynamic name server.
26. The computer-readable medium of claim 24 comprising, after step (d), unregistering the receiving mail server code and the dynamic IP address from the dynamic name server.
27. A computer-readable medium having stored thereon a data structure, the data structure including an A record comprising:
(a) a first data field containing data representing a receiving mail server code of a receiving mail server; and
(b) a second data field containing data representing a dynamic IP address of the receiving mail server.
28. The computer-readable medium of claim 27 wherein the first data field comprises a Resource Domain Name Field and the second data field comprises an IP Address field.
29. A computer-readable medium having stored thereon a data structure, the data structure including an MX record comprising:
(a) a first data field containing data representing a receiving mail server code of a receiving mail server; and
(b) a second data field containing data representing a domain name of a domain for which the receiving mail server receives mail.
30. The computer-readable medium of claim 29 wherein the first data field comprises an Exchange-Dname field and the second data field comprises a Resource Domain Name field.
US09/153,226 1998-09-15 1998-09-15 Methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses Expired - Lifetime US6434600B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/153,226 US6434600B2 (en) 1998-09-15 1998-09-15 Methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/153,226 US6434600B2 (en) 1998-09-15 1998-09-15 Methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses

Publications (2)

Publication Number Publication Date
US20020004826A1 true US20020004826A1 (en) 2002-01-10
US6434600B2 US6434600B2 (en) 2002-08-13

Family

ID=22546295

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/153,226 Expired - Lifetime US6434600B2 (en) 1998-09-15 1998-09-15 Methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses

Country Status (1)

Country Link
US (1) US6434600B2 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005094022A1 (en) * 2004-03-25 2005-10-06 Teliasonera Finland Oyj Transmission of communication between data transmission networks
US20060174033A1 (en) * 2005-01-31 2006-08-03 Microsoft Corporation Datacenter mail routing
US20060268722A1 (en) * 2005-05-27 2006-11-30 Microsoft Corporation System and method for routing messages within a messaging system
US20070073818A1 (en) * 2005-09-29 2007-03-29 Teamon Systems, Inc. System and method for provisioning an email account using mail exchange records
US20070078934A1 (en) * 2005-09-30 2007-04-05 Teamon Systems, Inc. System and method for provisioning an email account hosted on an assured email service provider
US20070094336A1 (en) * 2005-10-24 2007-04-26 Microsoft Corporation Asynchronous server synchronously storing persistent data batches
US20080034201A1 (en) * 1998-10-30 2008-02-07 Virnetx, Inc. agile network protocol for secure communications with assured system availability
US20100064011A1 (en) * 2008-09-05 2010-03-11 Microsoft Corporation Automatic Non-Junk Message List Inclusion
US20100153510A1 (en) * 2002-02-07 2010-06-17 Canon Kabushiki Kaisha Communications device and control method for transmitting an image by electronic mail
US20110035481A1 (en) * 2008-02-12 2011-02-10 Topeer Corporation System and Method for Navigating and Accessing Resources on Private and/or Public Networks
US8117267B2 (en) 2005-09-29 2012-02-14 Teamon Systems, Inc. System and method for provisioning an email account using mail exchange and address records
US20120151565A1 (en) * 2010-12-10 2012-06-14 Eric Fiterman System, apparatus and method for identifying and blocking anomalous or improper use of identity information on computer networks
US20120226795A1 (en) * 1998-10-30 2012-09-06 Virnetx, Inc. Agile Network Protocol For Secure Communications Using Secure Domain Names
US20130262676A1 (en) * 2012-04-03 2013-10-03 Samsung Electronics Co. Ltd. Apparatus and method for managing domain name system server in communication system
US8943201B2 (en) 1998-10-30 2015-01-27 Virnetx, Inc. Method for establishing encrypted channel
US20150117264A1 (en) * 2013-10-30 2015-04-30 Vivotek Inc. Media stream providing device and method for connecting thereto, media streaming system, and computer-readable medium
US9083669B2 (en) 2010-09-10 2015-07-14 Blackberry Limited System and method for providing plurality of prioritized email domain names
US9860283B2 (en) 1998-10-30 2018-01-02 Virnetx, Inc. Agile network protocol for secure video communications with assured system availability
US10511573B2 (en) 1998-10-30 2019-12-17 Virnetx, Inc. Agile network protocol for secure communications using secure domain names

Families Citing this family (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6308206B1 (en) * 1997-09-17 2001-10-23 Hewlett-Packard Company Internet enabled computer system management
US20040249898A1 (en) * 1998-10-21 2004-12-09 Yasunori Tsukioka Communication terminal apparatus capable of accessing e-mail from multiple networks at variable intervals
US6701432B1 (en) * 1999-04-01 2004-03-02 Netscreen Technologies, Inc. Firewall including local bus
US7107612B1 (en) * 1999-04-01 2006-09-12 Juniper Networks, Inc. Method, apparatus and computer program product for a network firewall
US7058683B1 (en) * 1999-07-20 2006-06-06 Sun Microsystems, Inc. Methods and apparatus for providing a virtual host in electronic messaging servers
JP3596400B2 (en) * 2000-01-21 2004-12-02 日本電気株式会社 DNS server filter
US6769031B1 (en) * 2000-09-29 2004-07-27 Interland, Inc. Dynamically incorporating updates to active configuration information
US7320019B2 (en) * 2000-11-30 2008-01-15 At&T Delaware Intellectual Property, Inc. Method and apparatus for automatically checking e-mail addresses in outgoing e-mail communications
US20020105954A1 (en) * 2001-02-02 2002-08-08 Craig Peter Alan Dynamic update proxy
US8484294B1 (en) * 2001-02-21 2013-07-09 Charles Schwab & Co., Inc. System and method for verified delivery of e-mail messages
US7359987B2 (en) * 2001-07-05 2008-04-15 Enom, Inc. Method and system for providing static addresses for Internet connected devices even if the underlying address is dynamic
DE10139745A1 (en) * 2001-08-13 2003-02-27 Siemens Ag Method and device for establishing a communication link
US8301587B2 (en) * 2001-08-21 2012-10-30 Hewlett-Packard Development Company, L.P. Internet enabled computer system management
US7076529B2 (en) * 2001-09-27 2006-07-11 Bellsouth Intellectual Property Corporation Systems and methods for notification of electronic mail receipt in a shared computer environment via advanced intelligent network systems
US8046832B2 (en) 2002-06-26 2011-10-25 Microsoft Corporation Spam detector with challenges
US7130878B2 (en) * 2002-08-30 2006-10-31 The Go Daddy Group, Inc. Systems and methods for domain name registration by proxy
US7627633B2 (en) * 2002-08-30 2009-12-01 The Go Daddy Group, Inc. Proxy email method and system
US8775675B2 (en) * 2002-08-30 2014-07-08 Go Daddy Operating Company, LLC Domain name hijack protection
US7490128B1 (en) * 2002-09-09 2009-02-10 Engate Technology Corporation Unsolicited message rejecting communications processor
US20040103153A1 (en) * 2002-11-21 2004-05-27 Chang Tsung-Yen Dean Apparatus and method for providing smart network appliances
US7219131B2 (en) * 2003-01-16 2007-05-15 Ironport Systems, Inc. Electronic message delivery using an alternate source approach
US7853652B2 (en) * 2003-01-18 2010-12-14 International Business Machines Corporation Instant messaging system with privacy codes
US20040143632A1 (en) * 2003-01-18 2004-07-22 International Business Machines Corporation Method and system for publication of instant messaging privacy codes
US20040158630A1 (en) * 2003-02-12 2004-08-12 Chang Tsung-Yen Dean Monitoring and controlling network activity in real-time
US20040260801A1 (en) * 2003-02-12 2004-12-23 Actiontec Electronics, Inc. Apparatus and methods for monitoring and controlling network activity using mobile communications devices
US7249162B2 (en) * 2003-02-25 2007-07-24 Microsoft Corporation Adaptive junk message filtering system
US7219148B2 (en) * 2003-03-03 2007-05-15 Microsoft Corporation Feedback loop for spam prevention
US7543053B2 (en) * 2003-03-03 2009-06-02 Microsoft Corporation Intelligent quarantining for spam prevention
DE10310151A1 (en) * 2003-03-07 2004-09-16 Linde Ag Method for operating a fuel system for an LPG engine
US7299491B2 (en) * 2003-04-30 2007-11-20 Microsoft Corporation Authenticated domain name resolution
US7483947B2 (en) * 2003-05-02 2009-01-27 Microsoft Corporation Message rendering for identification of content features
US7272853B2 (en) * 2003-06-04 2007-09-18 Microsoft Corporation Origination/destination features and lists for spam prevention
US7711779B2 (en) * 2003-06-20 2010-05-04 Microsoft Corporation Prevention of outgoing spam
US7519668B2 (en) 2003-06-20 2009-04-14 Microsoft Corporation Obfuscation of spam filter
US8533270B2 (en) * 2003-06-23 2013-09-10 Microsoft Corporation Advanced spam detection techniques
US8254896B2 (en) * 2003-08-25 2012-08-28 Research In Motion Limited Implementing a web server on a mobile station
US7400897B2 (en) * 2003-08-25 2008-07-15 Research In Motion Limited Implementing a web server on a mobile station
US20050120223A1 (en) * 2003-12-01 2005-06-02 Gary Kiwimagi Secure authenticated network connections
US20050120240A1 (en) * 2003-12-01 2005-06-02 Gary Kiwimagi Secure authenticated network connections
US20050120204A1 (en) * 2003-12-01 2005-06-02 Gary Kiwimagi Secure network connection
CA2554915C (en) 2004-02-17 2013-05-28 Ironport Systems, Inc. Collecting, aggregating, and managing information relating to electronic messages
US8214438B2 (en) 2004-03-01 2012-07-03 Microsoft Corporation (More) advanced spam detection features
US8583739B2 (en) * 2004-03-02 2013-11-12 International Business Machines Corporation Facilitating the sending of mail from a restricted communications network
US20050204006A1 (en) * 2004-03-12 2005-09-15 Purcell Sean E. Message junk rating interface
US7673049B2 (en) * 2004-04-19 2010-03-02 Brian Dinello Network security system
US7756930B2 (en) * 2004-05-28 2010-07-13 Ironport Systems, Inc. Techniques for determining the reputation of a message sender
US7849142B2 (en) 2004-05-29 2010-12-07 Ironport Systems, Inc. Managing connections, messages, and directory harvest attacks at a server
US7917588B2 (en) * 2004-05-29 2011-03-29 Ironport Systems, Inc. Managing delivery of electronic messages using bounce profiles
US8166310B2 (en) 2004-05-29 2012-04-24 Ironport Systems, Inc. Method and apparatus for providing temporary access to a network device
US7873695B2 (en) * 2004-05-29 2011-01-18 Ironport Systems, Inc. Managing connections and messages at a server by associating different actions for both different senders and different recipients
US7870200B2 (en) 2004-05-29 2011-01-11 Ironport Systems, Inc. Monitoring the flow of messages received at a server
US7748038B2 (en) * 2004-06-16 2010-06-29 Ironport Systems, Inc. Method and apparatus for managing computer virus outbreaks
US7664819B2 (en) * 2004-06-29 2010-02-16 Microsoft Corporation Incremental anti-spam lookup and update service
US7904517B2 (en) * 2004-08-09 2011-03-08 Microsoft Corporation Challenge response systems
US7660865B2 (en) 2004-08-12 2010-02-09 Microsoft Corporation Spam filtering with probabilistic secure hashes
US7634808B1 (en) * 2004-08-20 2009-12-15 Symantec Corporation Method and apparatus to block fast-spreading computer worms that use DNS MX record queries
US20060088026A1 (en) * 2004-10-27 2006-04-27 Microsoft Corporation Message based network configuration of domain name services
US20060168020A1 (en) 2004-12-10 2006-07-27 Network Solutions, Llc Private domain name registration
US8073971B2 (en) * 2004-12-10 2011-12-06 Microsoft Corporation Message based network configuration of dynamic domain name services
US7930353B2 (en) 2005-07-29 2011-04-19 Microsoft Corporation Trees of classifiers for detecting email spam
US8065370B2 (en) 2005-11-03 2011-11-22 Microsoft Corporation Proofs to filter spam
US8224905B2 (en) 2006-12-06 2012-07-17 Microsoft Corporation Spam filtration utilizing sender activity data
US8856360B2 (en) 2007-06-22 2014-10-07 Microsoft Corporation Automatically identifying dynamic internet protocol addresses
FR2920935B1 (en) 2007-09-06 2009-12-11 Miyowa METHOD FOR EXCHANGING REQUESTS BETWEEN THE COMPUTER APPLICATION OF A MOBILE TERMINAL AND AN INSTANT MESSAGING SERVER
US20090089381A1 (en) * 2007-09-28 2009-04-02 Microsoft Corporation Pending and exclusive electronic mail inbox
FR2923130A1 (en) * 2007-10-24 2009-05-01 Miyowa Sa INSTANT MESSAGING METHOD AND SYSTEM FOR MOBILE TERMINALS EQUIPPED WITH A VIRTUAL PRESENCE SERVER FOR AUTOMATICALLY MANAGING AN INSTANT MESSAGING SESSION
FR2923131B1 (en) * 2007-10-24 2010-01-15 Miyowa INSTANT MESSAGING METHOD AND SYSTEM FOR MOBILE TERMINALS EQUIPPED WITH A VIRTUAL PRESENCE SERVER CONFIGURED TO MANAGE DIFFERENT LISTS OF CONTACTS OF A SAME USER
FR2926176B1 (en) * 2008-01-08 2014-10-10 Miyowa INFORMATION TRANSFER COMMUNICATION NETWORK BETWEEN A MOBILE TERMINAL AND SOURCE SERVERS, AND TERMINAL AND METHOD FOR MANAGING THE TRANSFER OF INFORMATION IN SUCH A NETWORK.
FR2926428B1 (en) * 2008-01-16 2010-03-19 Miyowa METHOD FOR FILTERING MESSAGES IN AN INSTANT MESSAGING SYSTEM OF MOBILE TERMINALS, INSTANT MESSAGING SYSTEM, AND SERVER THEREFOR
US20100179982A1 (en) * 2009-01-15 2010-07-15 Miyowa Method for auditing the data of a computer application of a terminal
US20100228790A1 (en) * 2009-03-03 2010-09-09 Miyowa Method for activating functionalities proposed in a computer terminal
FR2944624A1 (en) * 2009-04-16 2010-10-22 Miyowa METHOD FOR AUTHORIZING A CONNECTION BETWEEN A COMPUTER TERMINAL AND A SOURCE SERVER
US9565147B2 (en) 2014-06-30 2017-02-07 Go Daddy Operating Company, LLC System and methods for multiple email services having a common domain
CN106209600B (en) * 2016-07-28 2019-08-06 武汉闪达科技有限公司 A kind of mail transmission system and method improving mail feedback timeliness and information security

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5307484A (en) * 1991-03-06 1994-04-26 Chrysler Corporation Relational data base repository system for managing functional and physical data structures of nodes and links of multiple computer networks
US5519858A (en) * 1992-01-10 1996-05-21 Digital Equipment Corporation Address recognition engine with look-up database for storing network information
IL102394A (en) * 1992-07-02 1996-08-04 Lannet Data Communications Ltd Method and apparatus for secure data transmission
US5621727A (en) * 1994-09-16 1997-04-15 Octel Communications Corporation System and method for private addressing plans using community addressing
US5623601A (en) * 1994-11-18 1997-04-22 Milkway Networks Corporation Apparatus and method for providing a secure gateway for communication and data exchanges between networks
JP4008049B2 (en) * 1995-03-20 2007-11-14 富士通株式会社 Address transmitting apparatus, address transmitting method and address transmitting system
US5802320A (en) * 1995-05-18 1998-09-01 Sun Microsystems, Inc. System for packet filtering of data packets at a computer network interface
US5777989A (en) * 1995-12-19 1998-07-07 International Business Machines Corporation TCP/IP host name resolution for machines on several domains
US5684951A (en) * 1996-03-20 1997-11-04 Synopsys, Inc. Method and system for user authorization over a multi-user computer system
US5790548A (en) * 1996-04-18 1998-08-04 Bell Atlantic Network Services, Inc. Universal access multimedia data network
US5805820A (en) * 1996-07-15 1998-09-08 At&T Corp. Method and apparatus for restricting access to private information in domain name systems by redirecting query requests
US6012088A (en) * 1996-12-10 2000-01-04 International Business Machines Corporation Automatic configuration for internet access device
US6067568A (en) * 1996-12-10 2000-05-23 International Business Machines Corporation Automatic setup of services for computer system users
US6131095A (en) * 1996-12-11 2000-10-10 Hewlett-Packard Company Method of accessing a target entity over a communications network
US6115545A (en) * 1997-07-09 2000-09-05 Hewlett-Packard Company Automatic internet protocol (IP) address allocation and assignment
US6038601A (en) * 1997-07-21 2000-03-14 Tibco, Inc. Method and apparatus for storing and delivering documents on the internet
US5964891A (en) * 1997-08-27 1999-10-12 Hewlett-Packard Company Diagnostic system for a distributed data access networked system
US6118768A (en) * 1997-09-26 2000-09-12 3Com Corporation Apparatus and methods for use therein for an ISDN LAN modem utilizing browser-based configuration with adaptation of network parameters
US6138146A (en) * 1997-09-29 2000-10-24 Ericsson Inc. Electronic mail forwarding system and method
US5941954A (en) * 1997-10-01 1999-08-24 Sun Microsystems, Inc. Network message redirection
US5862452A (en) * 1997-10-20 1999-01-19 Motorola, Inc. Method, access point device and peripheral devices for low complexity dynamic persistence mode for random access in a wireless communication system
US6175867B1 (en) * 1998-03-23 2001-01-16 Mci World Com, Inc. System and method for managing networks addressed via common network addresses
US6088796A (en) * 1998-08-06 2000-07-11 Cianfrocca; Francis Secure middleware and server control system for querying through a network firewall
US6182136B1 (en) * 1998-09-08 2001-01-30 Hewlett-Packard Company Automated service elements discovery using core service specific discovery templates

Cited By (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9094399B2 (en) 1998-10-30 2015-07-28 Virnetx, Inc. Method for establishing secure communication link between computers of virtual private network
US8868705B2 (en) 1998-10-30 2014-10-21 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US8843643B2 (en) 1998-10-30 2014-09-23 Virnetx, Inc. System and method employing an agile network protocol for secure communications using secure domain names
US10511573B2 (en) 1998-10-30 2019-12-17 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US8850009B2 (en) 1998-10-30 2014-09-30 Virnetx, Inc. System and method employing an agile network protocol for secure communications using secure domain names
US10187387B2 (en) 1998-10-30 2019-01-22 Virnetx, Inc. Method for establishing connection between devices
US9967240B2 (en) 1998-10-30 2018-05-08 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US20080034201A1 (en) * 1998-10-30 2008-02-07 Virnetx, Inc. agile network protocol for secure communications with assured system availability
US9860283B2 (en) 1998-10-30 2018-01-02 Virnetx, Inc. Agile network protocol for secure video communications with assured system availability
US9819649B2 (en) 1998-10-30 2017-11-14 Virnetx, Inc. System and method employing an agile network protocol for secure communications using secure domain names
US9479426B2 (en) 1998-10-30 2016-10-25 Virnetz, Inc. Agile network protocol for secure communications with assured system availability
US8904516B2 (en) 1998-10-30 2014-12-02 Virnetx, Inc. System and method employing an agile network protocol for secure communications using secure domain names
US9413766B2 (en) 1998-10-30 2016-08-09 Virnetx, Inc. Method for establishing connection between devices
US20110191582A1 (en) * 1998-10-30 2011-08-04 Edmund Colby Munger Agile Network Protocol For Secure Communications With Assured System Availability
US20110238993A1 (en) * 1998-10-30 2011-09-29 Virnetx, Inc. Agile Network Protocol For Secure Communications With Assured System Availability
US8943201B2 (en) 1998-10-30 2015-01-27 Virnetx, Inc. Method for establishing encrypted channel
US9386000B2 (en) 1998-10-30 2016-07-05 Virnetx, Inc. System and method for establishing a communication link
US9374346B2 (en) 1998-10-30 2016-06-21 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US20120226795A1 (en) * 1998-10-30 2012-09-06 Virnetx, Inc. Agile Network Protocol For Secure Communications Using Secure Domain Names
US9100375B2 (en) 1998-10-30 2015-08-04 Virnetx, Inc. System and method employing an agile network protocol for secure communications using secure domain names
US9077695B2 (en) 1998-10-30 2015-07-07 Virnetx, Inc. System and method for establishing an encrypted communication link based on IP address lookup requests
US8554899B2 (en) * 1998-10-30 2013-10-08 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US8874771B2 (en) 1998-10-30 2014-10-28 Virnetx, Inc. Agile network protocol for secure communications with assured system availability
US9077694B2 (en) 1998-10-30 2015-07-07 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US9037713B2 (en) 1998-10-30 2015-05-19 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US9038163B2 (en) 1998-10-30 2015-05-19 Virnetx, Inc. Systems and methods for connecting network devices over communication network
US9027115B2 (en) 1998-10-30 2015-05-05 Virnetx, Inc. System and method for using a registered name to connect network devices with a link that uses encryption
US8614816B2 (en) * 2002-02-07 2013-12-24 Canon Kabushiki Kaisha Communications device and control method for transmitting an image by electronic mail
US20100153510A1 (en) * 2002-02-07 2010-06-17 Canon Kabushiki Kaisha Communications device and control method for transmitting an image by electronic mail
WO2005094022A1 (en) * 2004-03-25 2005-10-06 Teliasonera Finland Oyj Transmission of communication between data transmission networks
US20080021980A1 (en) * 2004-03-25 2008-01-24 Teliasonera Finland Oyj Transmission Of Commmunication Between Data Transmission Networks
US20060174033A1 (en) * 2005-01-31 2006-08-03 Microsoft Corporation Datacenter mail routing
US7647380B2 (en) * 2005-01-31 2010-01-12 Microsoft Corporation Datacenter mail routing
US20060268722A1 (en) * 2005-05-27 2006-11-30 Microsoft Corporation System and method for routing messages within a messaging system
US7693071B2 (en) 2005-05-27 2010-04-06 Microsoft Corporation System and method for routing messages within a messaging system
US8117267B2 (en) 2005-09-29 2012-02-14 Teamon Systems, Inc. System and method for provisioning an email account using mail exchange and address records
US8626857B2 (en) 2005-09-29 2014-01-07 Blackberry Limited System and method for provisioning an email account using mail exchange records
US20070073818A1 (en) * 2005-09-29 2007-03-29 Teamon Systems, Inc. System and method for provisioning an email account using mail exchange records
US8078681B2 (en) 2005-09-29 2011-12-13 Teamon Systems, Inc. System and method for provisioning an email account using mail exchange records
US20070078934A1 (en) * 2005-09-30 2007-04-05 Teamon Systems, Inc. System and method for provisioning an email account hosted on an assured email service provider
US20070094336A1 (en) * 2005-10-24 2007-04-26 Microsoft Corporation Asynchronous server synchronously storing persistent data batches
US20110035481A1 (en) * 2008-02-12 2011-02-10 Topeer Corporation System and Method for Navigating and Accessing Resources on Private and/or Public Networks
US20100064011A1 (en) * 2008-09-05 2010-03-11 Microsoft Corporation Automatic Non-Junk Message List Inclusion
US8380793B2 (en) * 2008-09-05 2013-02-19 Microsoft Corporation Automatic non-junk message list inclusion
US9083669B2 (en) 2010-09-10 2015-07-14 Blackberry Limited System and method for providing plurality of prioritized email domain names
US20120151565A1 (en) * 2010-12-10 2012-06-14 Eric Fiterman System, apparatus and method for identifying and blocking anomalous or improper use of identity information on computer networks
US9973373B2 (en) * 2012-04-03 2018-05-15 Samsung Electronics Co., Ltd. Apparatus and method for managing domain name system server in communication system
US20130262676A1 (en) * 2012-04-03 2013-10-03 Samsung Electronics Co. Ltd. Apparatus and method for managing domain name system server in communication system
US20150117264A1 (en) * 2013-10-30 2015-04-30 Vivotek Inc. Media stream providing device and method for connecting thereto, media streaming system, and computer-readable medium
US9559942B2 (en) * 2013-10-30 2017-01-31 Vivotek, Inc. Media stream providing device and method for connecting thereto, media streaming system, and computer-readable medium

Also Published As

Publication number Publication date
US6434600B2 (en) 2002-08-13

Similar Documents

Publication Publication Date Title
US6434600B2 (en) Methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses
US7171453B2 (en) Virtual private volume method and system
US7181195B2 (en) Method and system for tracing missing network devices using hardware fingerprints
US6366950B1 (en) System and method for verifying users' identity in a network using e-mail communication
US7299491B2 (en) Authenticated domain name resolution
US8196189B2 (en) Simple, secure login with multiple authentication providers
US6119234A (en) Method and apparatus for client-host communication over a computer network
US6304908B1 (en) Mechanism for delivering a message based upon a source address
US7133916B2 (en) Asset tracker for identifying user of current internet protocol addresses within an organization's communications network
US9225721B2 (en) Distributing overlay network ingress information
US7197574B1 (en) Domain name system inquiry apparatus, domain name system inquiry method, and recording medium
JPH10254807A (en) Method for reading server site anonymously
US10341286B2 (en) Methods and systems for updating domain name service (DNS) resource records
JP2000349747A (en) Public key managing method
US10033830B2 (en) Requesting web pages and content rating information
US20020103878A1 (en) System for automated configuration of access to the internet
EP1039724A2 (en) Method and apparatus providing for internet protocol address authentication
US7779093B1 (en) Proxy for network address allocation
KR20010091016A (en) Method and system for domain-server management using a personal computer with dynamic IP
WO2000000904A1 (en) Method and apparatus for providing a connect-on-demand server in a data processing network
JP4003634B2 (en) Information processing device
JP4420057B2 (en) Communication method, information processing system, and information processing apparatus
JPH11266279A (en) Electronic mail management system
EP2080404B1 (en) Region descriptor server and method of selecting a wireless network

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LAMBERT, BRUNO;WAITE, RYAN W.J.;REEL/FRAME:009613/0160;SIGNING DATES FROM 19981110 TO 19981117

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034541/0001

Effective date: 20141014