DETECTING METHOD AND DEVICE
First Claim
1. A detecting method which detects a spoofed email to be executed by a computer, the detecting method comprising:
- dividing an email to be transmitted into text information and attached information;
generating first verification information using an algorithm in which shared information is used, with respect to each of the text information and the attached information;
generating a text information mail in which the first verification information is added to a header of an email including the text information;
generating an attached information mail in which the first verification information is added to a header of an email including the attached information;
transmitting the text information mail and the attached information mail;
when the text information mail and the attached information mail are received, generating second verification information using the algorithm with respect to each of the text information which is included in the text information mail and the attached information which is included in the attached information mail;
comparing the first verification information which is included in the received text information mail and the received attached information mail to the second verification information; and
combining the text information included in the text information mail and the attached information included in the attached information mail when the first verification information matches the second verification information.
1 Assignment
0 Petitions
Accused Products
Abstract
A detecting method includes: receiving a text information mail including text information, first verification information on the text information, first verification information of attached information which is attached to the text information, and an attached information mail including the attached information, first verification information of the text information, and first verification information of the attached information from a transmission source; generating second verification information of the text information, and second verification information of the attached information, based on shared information which is shared with the transmission source, and an algorithm; and detecting a spoof, based on a comparison result of the first verification information of the text information and the second verification information of the text information, and a comparison result of the first verification information of the attached information and the second verification information of the attached information.
-
Citations
14 Claims
-
1. A detecting method which detects a spoofed email to be executed by a computer, the detecting method comprising:
-
dividing an email to be transmitted into text information and attached information; generating first verification information using an algorithm in which shared information is used, with respect to each of the text information and the attached information; generating a text information mail in which the first verification information is added to a header of an email including the text information; generating an attached information mail in which the first verification information is added to a header of an email including the attached information; transmitting the text information mail and the attached information mail; when the text information mail and the attached information mail are received, generating second verification information using the algorithm with respect to each of the text information which is included in the text information mail and the attached information which is included in the attached information mail; comparing the first verification information which is included in the received text information mail and the received attached information mail to the second verification information; and combining the text information included in the text information mail and the attached information included in the attached information mail when the first verification information matches the second verification information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable recording medium storing a program for causing a computer to execute a procedure for detecting a spoofed email, the procedure comprising:
-
dividing an email to be transmitted into text information and attached information; generating first verification information using an algorithm in which shared information is used with respect to each of the text information and the attached information; generating a text information mail in which the first verification information is added to a header of an email including the text information; generating an attached information mail in which the first verification information is added to a header of an email including the attached information; transmitting the text information mail and the attached information mail; when the text information mail and the attached information mail are received, generating second verification information using the algorithm with respect to each of the text information which is included in the text information mail and the attached information which is included in the attached information mail; comparing the first verification information which is included in the received text information mail and the received attached information mail to the second verification information; and combining the text information included in the text information mail and the attached information included in the attached information mail when the first verification information matches the second verification information.
-
-
12. A detecting device which detects a spoofed email, comprising:
-
a memory configured to store a program including a procedure; and a processor configured to execute the program, the procedure including; dividing an email to be transmitted into text information and attached information; generating first verification information using an algorithm in which shared information is used with respect to each of the text information and the attached information; generating a text information mail in which the first verification information is added to a header of an email including the text information; generating an attached information mail in which the first verification information is added to a header of an email including the attached information; transmitting the text information mail and the attached information mail; when the text information mail and the attached information mail are received, generating second verification information using the algorithm with respect to each of the text information which is included in the text information mail and the attached information which is included in the attached information mail; comparing the first verification information which is included in the received text information mail and the received attached information mail to the second verification information; and combining the text information included in the text information mail and the attached information included in the attached information mail when the first verification information matches the second verification information.
-
-
13. A transmission terminal comprising:
-
a memory configured to store a program including a procedure; and a processor configured to execute the program, the procedure including; obtaining text information and attached information of a transmission target; generating verification information of the text information and the verification information of the attached information based on shared information which is shared with a transmission destination and an algorithm; generating a text information mail including the text information, verification information of the text information, and verification information of the attached information; generating an attached information mail including the attached information, verification information of the text information, verification information of the attached information; and transmitting the text information mail and the attached information mail to the transmission destination.
-
-
14. A reception terminal comprising:
-
a memory configured to store a program including a procedure; and a processor configured to execute the program, the procedure including; receiving a text information mail including text information, first verification information on the text information, first verification information of attached information which is attached to the text information, and an attached information mail including the attached information, first verification information of the text information, and first verification information of the attached information from a transmission source; generating second verification information of the text information, and second verification information of the attached information, based on shared information which is shared with the transmission source, and an algorithm; and detecting a possibility of a spoof, based on a comparison result of the first verification information of the text information and the second verification information of the text information, and a comparison result of the first verification information of the attached information and the second verification information of the attached information.
-
Specification