AN ELECTRONIC MAIL SYSTEM
The present invention relates to an electronic mail (email) system and more particularly to a method of operating such a system to convey mail between users across the Intemet.
Every email account has an associated mail server in which mail posted to that account is received and stored. This mail server may be a dedicated device or be a virtual device hosted by an Intemet Service Provider (ISP). Irrespective of the type of mail server being used it is necessary for the intended mail recipient to establish contact with the mail server to retrieve mail.
The most common method, by which mail is retrieved, requires a user to periodically establish a communication link with the mail server and request delivery of any stored mail. While this ensures cost effective delivery of mail messages the ad hoc user intervention prevents real time mail delivery. Indeed, in certain circumstances, it is possible for a message to remain stored for several days before retrieval which is obviously unacceptable.
To overcome this, systems have been developed to automatically initiate contact with the mail server at predefined intervals and retrieve any stored mail before terminating the connection. While this prevents long term non detection of mail, the communication interval means that the system does not operate in real time. It is possible to reduce is interval to achieve near real time operation but only with a corresponding increase in operating costs.
Larger organisations would generally have dedicated mail servers which are connected to the internet by dedicated 'leased lines'. The mailservers and other computers on the organisations' internal networks are protected from unauthorised users on the internet by 'firewalls' . The cost of leased lines and firewalls are often prohibative for small and medium sized companies.
In the absence of a dedicated leased line, these smaller organisations and individuals periodically establish a communications link to the mail server and request the delivery of any stored mail. While this ensures cost effective delivery of mail messages the ad hoc user
intervention prevents real time mail delivery. Indeed, in certain circumstances, it is possible for a message to remain stored for several days before retrieval which is obviously unacceptable.
When a user or organisation, without a firewall, connects to the mail server, particularly when hosted by an ISP, for the duration of that communication, their computer network is on the public network with no security protection. This can afford an unscrupulous user with access to the system and to the data contained thereon. Timed interval connections, which are not protected are particularly susceptible to unauthorised intrusion as the hacker can prevent termination of the connection and obtain continued access.
The present invention is directed towards overcoming the aforementioned problems.
According to the invention there is provided a system to convey email between users across the Internet comprising a target mail server which receives an email, stores the email and downloads the email to a target subscriber, characterised in that on receiving an email the mail server carries out the following steps:-
opening a communication link with the target subscriber;
downloading the email to the target subscriber; and
terminating the communication.
Advantageously, the entire system is thus protected from hackers by a firewall system which allows in from the internet only SMTP traffic (mail) destined for users of the system (target subscribers)
The advantage of this is that the target subscriber in effect gets all the benefits of an open leased line and firewall without the associated cost premium.
Preferably, the mail server opens communication with the target subscriber, the system performs the preparatory steps of: -
extracting a target subscriber identifier from the received email;
retrieving and interrogating a contact database using the extracted target subscriber identifier to obtain a contact parameter file; and
using the contact parameter file to establish communication.
Ideally, the contact database incorporates encryption means.
In a particularly preferred arrangement, the system incorporates graphic processing means.
Ideally, the mail server is configured to process messages in excess of one hundred and sixty characters.
Ideally, the mail server is also configured to process complex or encoded messages.
According to one aspect of the invention the mail server incorporates an application Program Interface and associated applet for automatically performing the steps of: -
interrogating a user system to determine is a mail receiving function is active; and
in response to a mail receiving function inactive signal, means for initiabsing a mail receiving function prior to down loading the received email.
Preferably, the mail receiving function incorporates alert means for temporarily suspending processing at the user system and alerting a user to the received email.
It is envisaged that if on contacting the target subscriber, the mail server cannot open communication, the mail server stores the email in a priority contact database and after a pre-set time interval has elapsed, again contacts the target subscriber and continues to do so until the email is downloaded. It is lughly unlikely that contact would not obtained, but in this unlikely event then contact will be made as quickly as possible.
Indeed, it is envisaged that on downloading the email to the target subscriber, the mail server carries out the following steps:-
the mail server opens communication with a sending subscriber mail server;
the mail server transmits a confirmation message reporting delivery of email to the sending subscriber mail server; and
the mail server terminates the communication.
In this latter method, if on contacting the sending subscriber mail server, the mail server cannot open communication, the mail server stores the rønfirmation message in a priority confirmation database, and after a pre-set time interval again contacts the sending subscriber and continues to do so until the confirmation message is sent.
When the target subscriber, which is contacted directly by the mail server is a subset of all the subscribers connected to the mail server, the mail server reserves portion of the bandwidth allocated from the communications network for those target subscribers to provide priority of access to the mail server.
When the target subscriber which is contacted directly by the mail server is a subset of all the subscribers connected to the mail server, the mail server stores the originating address of such target subscribers as priority addresses and then on receipt of a message having a destination or originating address which is a priority address, the email is queued for onward processing ahead
of all emails other than those already received emails with priority addresses.
Further the invention provides an internet service system comprising a mail server including:-
a server;
a communications system;
a plurality of subscribers connectable to the server by a communications system;
a processor forming part of the server and programmed to recognise the address of at least some of the subscribers as priority target subscribers; and
on receiving a message for the target subscriber, the processor contacts the target subscriber and opens communication with the target subscriber before downloading the email.
Ideally, the communications system includes a multichannel Integrated Services Digital Network (ISDN) router and individual ISDN routers for each subscriber.
In one embodiment of the invention the server is connected to a priority contact database for emails and the processor is programmed to store those emails which are not downloaded as the processor was unable to open cc»mmunication with the target subscriber.
Ideally the system includes firewall means.
The invention will be more clearly understood from the following description of some embodiments thereof, given by way of example only, with reference to the accompanying drawings in which:-
Fig. 1 is an outline of the system according to the invention; and
Figs. 2 and 3 are flowcharts showing operation of one method according to the invention.
Referring to the drawings and initially to Fig. 1, there is illustrated an internet service provider (ISP) 1 forming part of an email system and including a server (not shown) and various databases which will be described later. The ISP 1 is also referred to as the target ISP in this specification to distinguish it from the other ISPs. The ISP 1 includes a firewall 2 between it and a multichannel ISDN router 3 which in turn is connected by the communications network to various subscribers 4. The ISP 1 comprises a server and programmable processor, not shown. The ISP 1 also includes a priority contact database again not illustrated, which is connected to the server. The ISP 1 is connected to the Intemet which also serves other ISPs 6. Each subscriber 4 is provided with an ISDN router 7 which can make and receive calls on demand of traffic. In use, when the ISP 1 receives an email, it is delivered immediately to the multichannel ISDN router 3 where it is immediately dispatched to the appropriate ISDN router 7. The ISDN router 7 will accept a call presuming a connection can be made and then the email is downloaded immediately to the subscriber 4. Thus, the subscriber 4 has all the advantages of a dedicated ISDN leased line. Effectively, the transmission of email does not wait the next call being made and this means that a significant delay which can occur, even if a company is dialling its target ISP on a 10 to 15 minute basis, is eliminated. A further problem as will be appreciated with the normal situation, is that calls are made regardless of whether an email is ready to be sent or received.
In one particular embodiment of the invention and as described in Fig. 1, the target ISP 1 receives, through the firewall 5 from another ISP 6, an email for one of its subscribers 4. The ISP immediately delivers, through the firewall 2 and the multichannel ISDN router 3 which is capable of making and accepting connections on demand of traffic, the email to the appropriate ISDN router 7 and hence the subscribers 4.
Similarly with outgoing email the target subscribers 4 email is delivered immediately to the multichannel ISDN router where it is received and immediately transferred to another
subscriber 4, or to an ISP 6. The only delay which the sender will experience in the transmission of emails will be the recipients frequency of access. This can be effectively instant transmission where the receiving party has a leased line or is subscribing to the present invention.
Referring now to Figs. 2 and 3, one method according to the invention is described. In this method, there is a need as will be appreciated for various databases, etc. However, rather than describe all these separately, it is better to describe them in conjunction with the flowchart. It is presumed that in this particular email system, all the subscribers that the ISP is serving do not subscribe to this additional service. The effect of this will become apparent later. Therefore, those targeted subscribers of the ISP who are connected to this additional service are described as priority target subscribers and those subscribers who do not or are not connected to the service, although they are served by the particular ISP or target ISP are simply subscribers or targeted subscribers.
In step 10, another ISP sends an email. In step 11 , the target ISP receives the email and in step
12, the target ISP checks a priority database, which priority database has a list of those priority targeted subscribers, i.e. those to whom the method is to be applied and will also have a list of those targeted subscribers who are not subscribers to the system. In the event of the check in step 12 showing that the targeted subscriber is not a priority targeted subscriber, then in step
13, the email is stored in conventional fashion and in step 14, it will be downloaded to the targeted subscriber when the targeted subscriber contacts the ISP in conventional fashion and then the session ends in step 15 for that targeted subscriber. If, however, on the other hand, the targeted subscriber is one of the subscribers utilising the service and thus listed in the priority database, in step 16 the ISP checks the email to find out whether it is one being sent by the targeted priority subscriber or one being sent to the priority targeted subscriber. If the priority target subscriber is sending the email itself, then in step 17, the ISP attempts to send the email as quickly as possible and if unable to send it, in step 18, retries and continues to retry until the email is sent, When the email has been sent, in step 19, the ISP confirms to the priority target subscriber that the email has been sent. If the ISP is unable to contact the
priority target subscriber in step 19, then the confirmation is stored in a corifϊrmation database in step 20 and in step 21, at regular intervals, the ISP continues to try to contact the priority target subscriber to confirm that the email has been sent. When this is done, the session ends in step 22.
If, however, in step 16, it was apparent that the priority target subscriber is the intended recipient of the email, then in step 23, a firewall is consulted and checked. In step 24 it is accepted or rejected. Presuming the email is not accepted, then in step 25, the email is refused. If the message is accepted immediately, then the system attempts to contact the target in step 26. In step 27, the target ISP opens communications with the priority target subscriber and in step 28, presuming that it is unable to open communications, the message is stored in a priority buffer and periodically, over very short periods of time, in step 29, the ISP retries to open communications with the priority target subscriber. In step 30, the email is downloaded and in step 31, the session ends.
The use of the system for sending emails may not be used in all instances. It will be appreciated that in many instances, all the target subscribers connected to an ISP will in fact avail of the service. It is also envisaged that not all of the target subscribers will avail, for example, of the firewall facility. When, for example, the target downloading the email to a target subscriber and both the sending subscriber and the target subscriber are connected to the ISP, then the ISP can additionally add, as explained above, further help in the sense that they can confirm to the sending subscriber that the email has been delivered.
The advantage to the subscribers in the system including a firewall is considerable. The risk of unauthorised access is greatly reduced without the attendant firewall maintenance costs.
It is also envisaged that virus checking will be carried out.
It is envisaged that when the target subscriber, which is contacted directly by the ISP, is a subset of all the subscribers connected to the ISP, the ISP will reserve some portion of the
bandwidth allocated from the communications network to those target subscribers to provide priority of access to the target ISP. In many instances, the servers of ISPs get overloaded at certain periods of time and thus the priority targeted subscribers will be given priority of delivery of emails as well as reception.
It will be appreciated that the invention can be relatively easily carried out by having a processor forming part of the server which is programmed to recognise the address of at least some of the subscribers as priority target subscribers and on receiving a message for the priority target subscriber to contact the priority target subscriber and open coriimunications with it.
Another great advantage of the present invention is that for the small to medium sized company, all the benefits of a leased line have been achieved without the cost. Also, the advantage, for example, of having a shared firewall, will ensure greater security and less lilcelihood of breaches. A major management responsibility is removed.
hi the specification the terms "comprise, comprises, comprised and comprising" or any variation thereof and the terms "include, includes, included and including" or any variation thereof are considered to be totally interchangeable and they should all be afforded the widest possible interpretation.
Another embodiment of the invention is now described. To prevent confusion, the mechanism by which mail is sent across the Internet is not described, as this does not form part of the current invention. When a mail server receives an email, the mail is processed by the mail server to extract a target subscriber identifier. This identifier will typically be the email address to which the mail is sent. A check is then performed by retrieving and hterrogating a contact database using the extracted identifier. This check is particularly useful where the system is being retrofitted to an existing mail server to add nationality. That is to say that existing users may continue to obtain mail in the conventional way or may be offered the real time, cost effective, secure mail system of the current invention as an option. If the user to whom the mail was
addressed is a subscriber, a contact parameter file for that user is retrieved and decoded. Decoding or decryption is a necessary security precaution to prevent hackers obtaining the contact details.
Communication between the mail server and the user is then established and the received mail downloaded before communication is terminated.
The invention the mail server incorporates an Apphcation Program Interface (API) and associated applet for interaction with a user system. The API interacts with the user system when the communication link is established to automatically interrogate the user system to deteπnine is a mail receiving function is active. This may be achieved by memory mapping or simply by interrogation of the task manager. If the interrogation determines that a mail receiving function is not active a mail receiving function inactive signal is generated. This signal is passed to the applet and acts as a trigger to initialise the mail receiving function prior to down loading the received email. The applet may be downloaded during communication or may be provided to the user during installation. It will be understood by those skilled in the art that this functionality may be achieved in a variety of ways without departing from the scope of the invention. For example, a macro may be used instead of an applet.
Preferably, the mail receiving function incorporates alert means for temporarily suspending processing at the user system and alerting a user to the received email.
It will be understood that the system is configured to allow processing of graphic files and text files in excess of one hundred and sixty characters as well as encoded messages such as Hyper Text Markup Language (HTML), Extensible Markup Language (XML) or Standard Generalised Markup Language (SGML) etc. Complex messages, which may be simply text with HTML, tag inserts or text messages with associated text or graphic files may also be processed.
It will also be understood that while reference is made extensively throughout the specification to mail servers and to ISP's that the functions of both may be merged. For example, currently available internet service providers incorporate mail servers, it is important for this invention to realise that each mail item, conveyed across the Internet is delivered in real time without the requirement for a leased line to the desired addressee. The addressee being one of a very large number of possible addresses and that these addressees can operate from many locations and on a disparate array of mail platforms. It will also be understood that the addressee may be an individual within a company and the mail will be routed accordingly.
The invention is not limited to the embodiments hereinbefore described but may be varied in both construction and detail within the scope of the appended claims.