Secure Matches of E-mail to Postal Addresses System
Full text | |||
Source | Journal of Information Systems Security Volume 17, Number 1 (2021)
Pages 31–48
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Carlos Gonzalez — Universidad Autonoma de Coahuila, Mexico | ||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
This paper is about a system to securely match e-mail addresses with postal addresses. When a retail provider gets a request from a customer to send merchandise to an e-mail address, the retail provider contacts the matcher to request the postal address of such an e-mail. The matcher then contacts e-mail recipient to request permission to pass his/her postal address to the retail provider. Next, the matcher authenticates the e-mail recipient by means of a previously established interaction with an external customer rhythm entity that stores and verifies the e-mail recipient’s typing rhythm. If the e-mail recipient is authenticated, and gives permission to pass to retail provider his/her postal address, then the matcher sends this information to the retail provider for this to send the e-mail recipient’s merchandise to the approved postal address.
Keywords
Root Secure E-Mail, Secure Software, Match Postal Addresses, Typing Rhythm, Standalone Protected Software.
References
Allocca et al. (2010). “Placing a Purchase Order using one of Multiple Procurement Options”, US Patent 7,720,712 Bl of May 18, 2010.
Bauer, Robert D. (2004). “Electronic Communication Service”, US Patent Application 10/807,697 of March 2004.
Beaver, Kevin (2020). “SMTP Hacks and How to Guard against them”, dummies, A Wiley Brand, [Online]. Available: https://www.dummies.com/programming/networking/smtp-hacks-and-how-to-guard-against-them/. (Accessed on 18 August 2020).
Beck, Mark (2017). “Enhanced services electronic mail”, US Patent 9,571,438 of Feb 2017.
Nitesh, Dhanjani, Rios, Billy, and Hardin, Brett (2009). "Abusing SMTP", Hacking, O'Reilly Media, pp. 77–79, ISBN 9780596154578
Gonzalez, Carlos. (2019). “Adaptive Standalone Secure Software”, US Patent 10,521,613 of December 2019.
Gonzalez, Carlos (2019). “Sistema y Metodo para Mejorar la Seguridad en Mensajes”, Mexican Application Patent MX/a/2019/010831 of November 2019
Gonzalez, Carlos (2019). “System and Method to Improve Message Security”, US Patent # 10,305,898 of May 2019
Hall, Robert (1999). “Communications addressing system”, US Patent 5,930, 479 of July 1999.
Kosachev, Alex and Hamid, R. Nemati (2009). "Chronicle of a journey: an e-mail bounce back system". International Journal of Information Security and Privacy. 3 (2): 10.
Krause et al. (2010). “Systems and methods for providing change of address services over a network”, US Patent 7,778,840 of August 2010.
Lamont et al. (2008). “During An E-Commerce Transaction Sending A Postal Package To A Recipient Based Upon A Recipient's Email Address”, US Patent Application 12/184,828 of August 2008.
Maguire, David et al. (2021). Security and compliance for Exchange Online, Microsoft Corp, 01/08/2021. [Online]. Available: https://docs.microsoft.com/en-us/exchange/security-and-compliance/security-and-compliance. (Accessed on 5 February 2021).
Pearson et al. (2015). “System and method of authentication”, US Patent 9,210,144 of December 2015.
Ronquillo, Jay G, Winterholler J. Erik, Cwikla, Kamil, Szymanski, Raphael, and Levy, Christopher (2018). “Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information,” JAMIA Open, Volume 1, Issue 1, July 2018, Pages 15–19, https://doi.org/10.1093/jamiaopen/ooy019
Sanjay et al. (2012). “System And Method For Generating Postal Address Ed Indexed Email Database”, US Patent Application 13/407,494 of Feb 2012.
Smith et al. (2016). “Method of conveying a location information representing a physical location of a communication device, a computer program product for executing the method, and the communication device for conveying the location information”, US Patent 9,417,313 of August 2016.
Souza et al. (2014). “Verification of user communication addresses”, US Patent 8,892,873 of November 2014.
TowerData (2021). “Email Intelligence provides valuable data on 80% of email or postal addresses in batch or via a real-time API”. (Online). Available: https://www.towerdata.com/email-intelligence. (Accessed on 18 January 2021).
UKEssays (November 2018). Hacking; dangerous effects on the society. (Online). Available: https://www.ukessays.com/essays/it-research/hacking.php?vref=1 (Accessed on 19 September 2020).
Zoken, Jack M. (1999). “Method for automatically finding postal addresses from e-mail addresses.”, US Patent 5,944,787 of August 1999.