You are here: Home Contents V17 N1 V17N1_Gonzalez.html
Personal tools

Secure Matches of E-mail to Postal Addresses System

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 17, Number 1 (2021)
Pages 3148
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Carlos Gonzalez — Universidad Autonoma de Coahuila, Mexico
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

This paper is about a system to securely match e-mail addresses with postal addresses. When a retail provider gets a request from a customer to send merchandise to an e-mail address, the retail provider contacts the matcher to request the postal address of such an e-mail. The matcher then contacts e-mail recipient to request permission to pass his/her postal address to the retail provider. Next, the matcher authenticates the e-mail recipient by means of a previously established interaction with an external customer rhythm entity that stores and verifies the e-mail recipient’s typing rhythm. If the e-mail recipient is authenticated, and gives permission to pass to retail provider his/her postal address, then the matcher sends this information to the retail provider for this to send the e-mail recipient’s merchandise to the approved postal address.

 

 

Keywords

Root Secure E-Mail, Secure Software, Match Postal Addresses, Typing Rhythm, Standalone Protected Software.

 

 

References

Allocca et al. (2010). “Placing a Purchase Order using one of Multiple Procurement Options”, US Patent 7,720,712 Bl of May 18, 2010.

Bauer, Robert D. (2004). “Electronic Communication Service”, US Patent Application 10/807,697 of March 2004.

Beaver, Kevin (2020). “SMTP Hacks and How to Guard against them”, dummies, A Wiley Brand, [Online]. Available: https://www.dummies.com/programming/networking/smtp-hacks-and-how-to-guard-against-them/. (Accessed on 18 August 2020).

Beck, Mark (2017). “Enhanced services electronic mail”, US Patent 9,571,438 of Feb 2017.

Nitesh, Dhanjani, Rios, Billy, and Hardin, Brett (2009). "Abusing SMTP", Hacking, O'Reilly Media, pp. 77–79, ISBN 9780596154578

Gonzalez, Carlos. (2019). “Adaptive Standalone Secure Software”, US Patent 10,521,613 of December 2019.

Gonzalez, Carlos (2019). “Sistema y Metodo para Mejorar la Seguridad en Mensajes”, Mexican Application Patent MX/a/2019/010831 of November 2019

Gonzalez, Carlos (2019). “System and Method to Improve Message Security”, US Patent # 10,305,898 of May 2019

Hall, Robert (1999). “Communications addressing system”, US Patent 5,930, 479 of July 1999.

Kosachev, Alex and Hamid, R. Nemati (2009). "Chronicle of a journey: an e-mail bounce back system". International Journal of Information Security and Privacy. 3 (2): 10.

Krause et al. (2010). “Systems and methods for providing change of address services over a network”, US Patent 7,778,840 of August 2010.

Lamont et al. (2008). “During An E-Commerce Transaction Sending A Postal Package To A Recipient Based Upon A Recipient's Email Address”, US Patent Application 12/184,828 of August 2008.

Maguire, David et al. (2021). Security and compliance for Exchange Online, Microsoft Corp, 01/08/2021. [Online]. Available: https://docs.microsoft.com/en-us/exchange/security-and-compliance/security-and-compliance. (Accessed on 5 February 2021).

Pearson et al. (2015). “System and method of authentication”, US Patent 9,210,144 of December 2015.

Ronquillo, Jay G, Winterholler J. Erik, Cwikla, Kamil, Szymanski, Raphael, and Levy, Christopher (2018). “Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information,” JAMIA Open, Volume 1, Issue 1, July 2018, Pages 15–19, https://doi.org/10.1093/jamiaopen/ooy019

Sanjay et al. (2012). “System And Method For Generating Postal Address Ed Indexed Email Database”, US Patent Application 13/407,494 of Feb 2012.

Smith et al. (2016). “Method of conveying a location information representing a physical location of a communication device, a computer program product for executing the method, and the communication device for conveying the location information”, US Patent 9,417,313 of August 2016.

Souza et al. (2014). “Verification of user communication addresses”, US Patent 8,892,873 of November 2014.

TowerData (2021). “Email Intelligence provides valuable data on 80% of email or postal addresses in batch or via a real-time API”. (Online). Available: https://www.towerdata.com/email-intelligence. (Accessed on 18 January 2021).

UKEssays (November 2018). Hacking; dangerous effects on the society. (Online). Available: https://www.ukessays.com/essays/it-research/hacking.php?vref=1 (Accessed on 19 September 2020).

Zoken, Jack M. (1999). “Method for automatically finding postal addresses from e-mail addresses.”, US Patent 5,944,787 of August 1999.