Communication apparatus with relay function and relay method

ABSTRACT

Two kinds of mail addresses, one for reception and the other for a relay, are stored beforehand. A relay is permitted only if the mail address of the received E-mail data is a relay mail address. A password name is deleted from the mail address of the received E-mail whose relay is permitted. Said mail address whose password name has been deleted is used as part of header information and transmitted to a destination terminal together with data.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to relay apparatuses that can be installed in Internet facsimile equipment which transmits/receives image information using E-mail over the Internet, and their relay method.

1. Description of the Related Art

Facsimile apparatuses which transmit image information over the Internet using the same operations as in general facsimile equipment have been developed. Since these apparatuses use the Internet for the entire or part of their communication path, this type of facsimile apparatus is called “Internet facsimile.”

By placing the Internet facsimile at two Internet ends and using the relay function of the Internet facsimile, it is possible to achieve cost reduction taking advantage of the Internet independent of differences in distance. For example, E-mail data is sent to the nearest Internet facsimile of the G3FAX as the destination via the Internet and from the Internet facsimile it is transmitted to the destination G3FAX via a public line.

When using the Internet facsimile as such a relay apparatus, the owner of the relay apparatus pays the communication expenses up to the destination facsimile. Therefore, it is necessary to prevent the use of the Internet facsimile relay function without permission.

Unexamined Japanese Patent Publication No. 9-116728 is disclosed that the password corresponding to a relay apparatus will be searched from the relay apparatus list and encrypted and then E-mail with the encrypted password added will be sent, and the encrypted password added to the received E-mail is decrypted and if it matches the password that the owner registered beforehand, the relay will be permitted.

However, the above relay system requires all apparatuses using a relay apparatus to be equipped with a mechanism to search the password of the relay apparatus and a mechanism to encrypt the searched password. As apparatuses without the password search mechanism and encryption mechanism cannot use the relay apparatus, such a system has a demerit that this system is available to only a limited number of users.

SUMMARY OF THE INVENTION

The present invention has been implemented taking account of such circumstances. The objective of the present invention is to eliminate the necessity of providing special mechanisms for apparatuses on the transmitting side to prevent abuses of the relay apparatus by unauthorized users and provide a communication apparatus with a relay function and a relay method that allow only authorized users to use the relay apparatus by only inputting a secret relay mail address in the apparatus on the transmitting side.

The present invention provides a communication apparatus with a relay function comprising a recognition section that recognizes mail addresses from the received E-mail data, memory that stores two kinds of mail addresses for public use and relay use and control section that executes the relay processing only when said recognized mail address is a relay mail address.

According to the present invention, relay mail addresses are kept in secret to anybody other than the users who are authorized to use the communication apparatus as a relay apparatus, and thus even if a public mail address is disclosed as was previously, it can prevent unauthorized users from abusing them.

Furthermore, the password name is deleted from the mail address during the relay processing, and even when the header information including the mail address is added to the facsimile data and sent to the destination machine, it is possible to prevent the password from being displayed in a form of header information at the destination terminal.

The Internet facsimile converts received E-mail data to data in a format that renders it receivable by the facsimile apparatus and transmits it to the destination terminal according to a facsimile transmission procedure. Incorporating said communication apparatus on this Internet facsimile allows said communication apparatus with a relay function to be used as an Internet facsimile relay apparatus, converting E-mail to facsimile data and transmitting it to the facsimile apparatus via a telephone line.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a network configuration diagram of the Internet facsimile related to an embodiment of the present invention used as a relay apparatus for data communications;

FIG. 2 is a diagram that shows the basic configuration of the Internet facsimile in the embodiment;

FIG. 3 is a functional diagram of the Internet facsimile in the embodiment;

FIG. 4 is a configuration diagram of the mail address table in the embodiment;

FIGS. 5A and 5B are configuration diagrams of the mail address in the embodiment;

FIG. 6 is a configuration diagram of the domain name table in the embodiment; and

FIG. 7 is a flowchart showing the relay procedure in the embodiment.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

With reference now to the attached drawings, the embodiment of the present invention is explained in detail below:

As an operation example of the relay apparatus contained in the Internet facsimile related to the present embodiment, the following describes a case where the transmit data is converted from an E-mail format to a facsimile data format and transferred to the terminal facsimile apparatus.

FIG. 1 shows a network configuration diagram of the relay system using the Internet facsimile in the present embodiment as a relay apparatus. In FIG. 1, Internet facsimile 11 or personal computer 12 functions as a requesting terminal that uses Internet facsimile 14 as a relay apparatus and facsimile 15 functions as a destination terminal that receives data replayed by Internet facsimile 14.

The data sent by E-mail from the requesting terminal (Internet facsimile 11 or personal computer 12) is stored in mail server 13 via the Internet. Internet facsimile 14 converts the E-mail collected from mail server 13 to data in a facsimile data format and transfers it to the destination terminal (facsimile 15) via a telephone line network (PSTN: Public Switched Telephone Network) according to a facsimile procedure.

FIG. 2 shows a schematic hardware configuration of Internet facsimile 14 provided with a relay function. Internet facsimile 14 comprises CPU 21, ROM 22, RAM 23, LAN interface unit 24, data storage section 25, facsimile section 27, modem 28, network control unit 29, a printer 30 and a scanner, etc. which are not shown in the figure.

CPU 21 executes various functions which will be described later, operating according to a program stored in ROM 22. RAM 23 stores data such as mail addresses and domain names required when it functions as a relay apparatus. LAN interface unit 24 executes the necessary procedure for transmitting/receiving E-mail to/from the network, and data storage section 25 is the memory that stores the received data temporarily. Facsimile section 27 transmits the data converted for facsimile and receives facsimile data and stores it in data storage section 25. Modem 28 modulates/demodulates data transmitted/received to/from the telephone line, and network control unit 29 controls the telephone line.

FIG. 3 shows a functional section of the relay apparatus incorporated in Internet facsimile 14. CPU 21 provides various functions which will be described later by executing the relay program stored in ROM 22.

Mail address recognition section 211 recognizes a mail address from the E-mail data stored in data storage section 25 via LAN interface unit 24. Mail address collation section 212 collates the mail address recognized by mail address recognition section 211 with the relay mail address registered in mail address table 231 in RAM 23. If mail address collation section 212 proves that the mail address is a relay mail address, domain name recognition section 213 recognizes the domain name of the requesting node from the data stored in data storage section 25. Domain name collation section 214 collates the domain name of the requesting node recognized by domain name recognition section 213 with the domain name whose relay stored in domain name table 232 in RAM 23 is permitted. When a relay permission signal is received from domain name collation section 214, mail address edit section 215 extracts specific header information from the E-mail data stored in data storage section 25 and transmits it to format conversion section 26. In the case of the present embodiment, the specific header information contains relay mail addresses without password names. When a relay permission signal is received from domain name collation section 214, log information extraction section 216 extracts log information from the E-mail data stored in data storage section 25 and sends the log information to the administrator mail address destination registered in administrator mail address table 233 in RAM 23. In the case of the present embodiment, the log information contains relay mail addresses and domain names of the requesting node.

The memory space of RAM 23 includes mail address table 231, domain name table 232 and administrator mail address table 233. As shown in FIG. 4, mail address table 231 registers two kinds of mail addresses, public mail address and relay mail address. A relay is permitted when the mail address of the received E-mail data matches the relay mail address registered in mail address table 231.

As shown in FIG. 5A, a public mail address is made up of a password name from the start to @ (at mark) and a host name following @. As shown in FIG. 5B, a relay mail address is made up of a password name from the start to # (sharp), a destination telephone number from # (sharp) to @ (at mark) and a host name following @.

Thus, using the password name of the relay mail address different from the password name of the public mail address and making the relay mail address secret can prevent the relay mail address from being abused even if the public mail address is disclosed.

FIG. 6 shows the configuration of domain name table 233. As shown in FIG. 6, domain name table 233 in RAM 203 contains domain names for which the relay processing is permitted. The relay processing is permitted as long as the same domain name of a requesting node in the received data is found in the registered domain names. This control allows the security of the Internet facsimile used as the relay apparatus to be maintained.

Then, the relay operation of the relay system containing the Internet facsimile configured as shown above is explained using FIG. 7. FIG. 7 shows the relay procedure when Internet facsimile 14 is used as the relay apparatus.

Here, two kinds of mail addresses (one for public and the other for relay), domain names for which the relay processing is permitted and mail address of the administrator are registered in each table in RAM 23 beforehand.

When the relay request source, Internet facsimile 11 or personal computer 12, transmits E-mail whose relay mail address has been registered, the E-mail is stored in a mailbox of mail server 13 via the Internet.

Internet facsimile 14 collects the E-mail from mail server 13 installed on the LAN via LAN interface unit 24 (S701). The received E-mail data collected from the network is stored in data storage section 25 in the same E-mail format (S702).

Then, mail address recognition section 211 recognizes the destination mail address from the received E-mail data stored in data storage section 25 (S703). The recognized mail address is handed over to mail address collation section 212. Mail address collation section 212 judges whether the mail address of the received E-mail is a public mail address or relay mail address (S704). Mail address collation section 212 performs this judgment by comparing the password name at the mail address registered in mail address table 231 and the password name registered at the mail address of the received E-mail. If the password name is a public mail address, normal reception processing is performed (S705). That is, since it is data that needs not be relayed to other apparatuses, it is printed out by a printer 30 (S715).

If the mail address is a relay mail address, domain name recognition section 213 recognizes the domain name of the requesting node from the received E-mail stored in data storage section 25 (S706). The recognized domain name is handed over to domain name collation section 214. Domain name collation section 214 checks whether the domain name handed over from domain name recognition section 213 is found in the domain names registered in domain name table 232 (S707).

Since only domain names of terminals for which the relay is permitted are registered in domain name table 232, the data from the requesting node with the domain name that does not match the domain name registered in domain name table 232 is not relayed, resulting in an error (S708). This prevents the Internet facsimile from being abused as the relay apparatus without permission even in the case that the relay mail address is disclosed to users unauthorized to perform the relay processing. Furthermore, for reasons specific to relaying Internet facsimile 14, if the number of domains available or domain name is to be restricted, arrangements can easily be made by only changing the domain name registered in domain name table 232.

On the other hand, if the same domain name of the requesting node has been registered in domain name table 232, the subsequent processing is taken over by mail address edit section 215. Mail address edit section 215 deletes the password name from the mail address the received E-mail data stored in data storage section 25 (S709). Header information containing the mail address whose password name has been deleted is created (S710). This header information is handed over to format conversion section 26.

Then, format conversion section 26 collects the received E-mail data from data storage section 25 and replaces the mail header with the header information created by mail address edit section 215 and executes format conversion (S711). Through format conversion, the received E-mail data is converted from an E-mail format to a facsimile data format. Even if the header information is output from the destination terminal (facsimile apparatus), this prevents the password name of the relay mail address from being displayed, making it possible to maintain the confidentiality of the relay mail address.

This facsimile data is buffered in transmission memory. Furthermore, the telephone number of the relay destination terminal (facsimile apparatus) inserted at the mail address of the received E-mail is stored in a prescribed area in RAM 23.

When facsimile section 27 receives the relay permission signal from CPU 21, it dials up the telephone number stored in the prescribed area in RAM 23, connects the line with the relay destination terminal by controlling modem 28 and network control unit 29 and transmits the facsimile data to the connected terminal via a telephone line network (PSTN) (S712).

Simultaneously with the creation of the header information, log information consisting of a mail address, requesting node domain name, etc. is created (S713) and said log information is E-mailed to the mail address of the administrator (S714).

This helps the Internet facsimile administrator control the situation, for example, investigate the frequency of use, improving the level of administrative convenience. It also allows the administrator to monitor the use of the apparatus as the relay apparatus every time the relay processing is performed and immediately discover any abuse or abnormal use of the apparatus by checking the transmission source/destination and quickly take appropriate action, thus improving the security performance.

Through notification by E-mail each time, describing the transmission source mail address and destination telephone number, etc. according to the subject of the mail makes it possible to know the whole situation of relay processing clearly without opening the mail.

In the network configuration example shown in FIG. 1, the Internet facsimile and mail server are located in the LAN, but it is also possible to configure the system so that the Internet facsimile may have direct dial-up connections with the mail server located on the Internet.

In the explanation above, the relay mail address must always be described in the following format including a private password:

Password#transfer destination telephone number@domain name

On the other hand, the standardized relay mail address is described in the following format including a fixed form statement which indicates that it is a relay mail address. The fixed form portion specified by the IETF (Internet Engineering Task Force) is “FAX=” and since it follows a standardized procedure, everybody can know it.

Fixed form portion=transfer destination telephone number@domain name

When carrying out relay processing by recognizing the standardized relay mail address, the mail is transferred to the telephone number entered between “=” after the fixed form statement and “@”. No processing for restricting the users described in the above embodiment is performed.

The Internet facsimile is configured so that each user may select the relay (special relay) that restricts users by recognizing the relay mail addresses containing private passwords or relay (general relay) that does not restrict users by recognizing standardized relay mail addresses. The Internet facsimile is provided with both the function to perform the special relay and the function to perform the general relay described in said embodiment, and either one is enabled according to the user setting. This setting is implemented by adding it to the facsimile general setting items.

This Internet facsimile allows the relay apparatus side to select a desired relay method.

Furthermore, it can also be configured so that the mail address recognition section may recognize the type of the relay mail address and execute a special relay if it is a relay mail address for special relay and a general relay if it is a relay mail address for general relay.

INDUSTRIAL APPLICABILITY

As described above, the facsimile data relay apparatus related to the present invention is effective in relaying E-mail received from the network by the Internet facsimile via a telephone line to a facsimile (G3FAX), which is suitable for enhancement of the mechanism and security on the transmitting side. 

What is claimed is:
 1. A method for receiving and relaying an E-mail in a receiving node storing a non-public mail address, which is accessible only by an authorized sender having authorization, and a public mail address, which is accessible to a sender regardless of authorization, the method comprising: receiving an E-mail at the receiving node; recognizing a destination mail address of the receiving node from the received E-mail; determining whether the recognized destination mail address is the non-public mail address or the public mail address; converting the E-mail into a facsimile-format data, when the recognized destination mail address is determined to be the non-public mail address; relaying the converted facsimile-format data to a final destination node according to a facsimile procedure through a telephone network; and printing the E-mail, when the recognized destination mail address is determined to be the public mail address, without relaying the E-mail to another node; whereby when an E-mail is sent to the public mail address, E-mail data is conveyed to a user of the receiving node, and when an E-mail is sent to the non-public mail address, E-mail data is conveyed to a user of the final destination node.
 2. The method for receiving and relaying an E-mail according to claim 1, wherein the public mail address includes a first password name and a host name, and the non-public mail address includes a second password name, which is different from the first password name, a destination telephone number indicating a telephone number of the final destination node and the host name.
 3. The method for receiving and relaying an E-mail according to claim 1, further comprising: recognizing a sender domain name contained in the E-mail; and comparing the recognized sender domain name with a preregistered domain name, wherein the relaying is performed only when the recognized domain name agrees with the preregistered domain name.
 4. The method for receiving and relaying an E-mail according to claim 1, further comprising: transmitting log information including the destination mail address of the relayed E-mail and information regarding the sender of the relayed E-mail to a mail address of a manager of the receiving node.
 5. The method for receiving and relaying an E-mail according to claim 1, wherein the receiving node further stores a public relay address, which is accessible to the sender regardless of the authorization, the method further comprising: selecting one of the non-public mail address and the public relay address to be enabled; wherein the determining determines whether the recognized destination mail address is the selected one of the non-public mail address and the public relay address; and the converting converts the E-mail when the recognized destination mail address is the selected one of the non-public mail address and the public relay address.
 6. The method for receiving and relaying an E-mail according to claim 5, wherein the public relay address includes a predetermined template portion, the destination telephone number and a domain name. 