CN110401591A - A kind of mail overall situation examination filtration system and method based on Transparent Proxy - Google Patents
A kind of mail overall situation examination filtration system and method based on Transparent Proxy Download PDFInfo
- Publication number
- CN110401591A CN110401591A CN201910660683.6A CN201910660683A CN110401591A CN 110401591 A CN110401591 A CN 110401591A CN 201910660683 A CN201910660683 A CN 201910660683A CN 110401591 A CN110401591 A CN 110401591A
- Authority
- CN
- China
- Prior art keywords
- keyword
- rule
- match
- protocol
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000001914 filtration Methods 0.000 title claims abstract description 10
- 230000015572 biosynthetic process Effects 0.000 claims description 5
- 238000012546 transfer Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 3
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000011017 operating method Methods 0.000 description 1
- 230000009885 systemic effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The mail overall situation that the present invention relates to a kind of based on Transparent Proxy examines filtration system and method, is related to sensitive information and leaks technical field.The system is transparent mail proxy server, configures in the gateway of the local area network of user, can get all e-mail messages that the user in local area network is sent on gateway.Keyword can be preset on the transparent mail proxy server, after it gets mail specifying information, can be matched with keyword set in advance, if it fails to match, illustrate mail security;If successful match, illustrate that mail is illegal, request is illegal and prompts client; mail sends failure, to prevent sensitive information in local area network from leaking, realizes comprehensive protection to inside information; enhance the protection to built-in system, is finally reached Information Security Standard.
Description
Technical field
It leaks technical field the present invention relates to sensitive information, and in particular to a kind of mail overall situation based on Transparent Proxy examines
Filtration system and method.
Background technique
E-mail system is a application that information interchange is very popular between current person to person, but it is generated like one
Double-edged sword, while offering convenience to user, many unnecessary troubles have also been manufactured.
In internet, there is part in the mail that receives and is not the information that expectation receives, these are referred to as rubbish by we
Mail.Such as some product distributions, website promotion, service of goods etc. are all for a user some valueless practical joke texts
Part.For computer, the memory space of mail is not only taken up, also greatly wastes network bandwidth, will lead to clothes what is more
Business device system congestion finally makes systemic breakdown.
In local area network, IT application in enterprises trend is approached, and e-mail system is easy to use by feat of its, operation is simple
The features such as single, low in cost, under the situation for increasing its application percentage gradually, prevents the confidential document or other heavy of enterprises
Data is wanted to leak, i.e. the sensitive information event of leaking is particularly important.
Summary of the invention
(1) technical problems to be solved
The technical problem to be solved by the present invention is how to prevent sensitive information in local area network from leaking.
(2) technical solution
The mail overall situation based on Transparent Proxy that in order to solve the above-mentioned technical problems, the present invention provides a kind of examines filtering system
System, comprising: protocol-analysis model, keyword configuration management module, keyword-matching module;
Wherein, the protocol-analysis model is for analyzing smtp protocol, and mail is divided into envelope, stem and just
Literary three parts, and stored according to specified format, so that keyword-matching module can take out the matched mail of mail domestic demand
Information carries out keyword match work;The keyword configuration management module is completed for being arranged and managing keyword to key
The rule name that word is finally set increased, deleted, being modified, inquiry operation;The keyword-matching module is used for agreement
Keyword set by the matched e-mail messages of the need extracted in analysis module and keyword configuration management module, is matched,
If successful match, assert and this time request illegal and prompt client;If it fails to match, then it is assumed that request is legal, and mail is sent
Success.
Preferably, the keyword configuration management module is specifically when carrying out keyword configuration by rule setting are as follows: every
Rule includes source address, destination address, sender, addressee, mail matter topics, Mail Contents these keyword config options;Often
A keyword config option has "comprising" or " not including " two states;It is "AND" between each keyword config option condition
Relationship, and can to every rule rise a name, formation rule name;" enabling " is carried out to the rule after name or " is closed
Close " setting;All rules are referred to as rule set.
Preferably, the protocol-analysis model is specifically used for therefrom getting validity feature by the flow arrested, with
Smtp protocol is matched, if successful match, is identified as Mail Transfer protocol, and then obtain the endogenous beginning address of mail, mesh
Address, addressee, sender, mail matter topics, the matched effective information of need for including in Mail Contents these agreements.
Preferably, the keyword-matching module is specifically used in the rule set for taking out the setting of keyword configuration management module
Strictly all rules, successively executed in sequence when strictly all rules are filtered operation, rule match process are as follows: (1) check rule
It whether is " enabling " state, if " enabling " state then carries out keyword match operation;If "Off" state then takes rule set
Interior next rule, checks its state again, not right if being all "Off" state when having traversed strictly all rules in rule set
Mail Contents in protocol-analysis model carry out keyword match operation, and this time request is legal, and mail is sent successfully;Wherein, into
The step of row keyword match operates specifically: (11) keyword taken out in the rule of keyword configuration management module setting is matched
Set option;(12) take out what protocol-analysis model took out out of mail, corresponding config option;(13) step (11)
The value taken in middle taken value and step (12) is matched, and checks whether successful match;If successful match, the request is not
Legal, mail sends failure;If it fails to match, return step (11) removes the rule configuration option in a rule, traversal
In complete keyword configuration management module, all keyword config options in " enabling " state rule, and and protocol-analysis model
After the mail domestic demand match information got carries out keyword match, if keyword match operation is all failed, it is legal to request,
Mail is sent successfully.
The present invention also provides a kind of mail overall situations realized using the system to examine filter method, including following step
It is rapid:
Protocol-analysis model carries out depth analysis to smtp protocol, and mail is divided into envelope, stem and the big portion of text three
Point, and stored according to specified format, so that keyword-matching module can take out the matched e-mail messages of mail domestic demand, carry out
Keyword match work;
Keyword configuration management module is arranged and manages keyword, completes the rule name being finally set to keyword and carries out
The operations such as increase, deletion, modification, inquiry;
Keyword-matching module is the matched e-mail messages of need and keyword configuration management extracted in protocol-analysis model
Keyword set by module, is matched, if successful match, is assert and is this time requested illegal and prompt client;If matching
Failure, then it is assumed that request is legal, and mail is sent successfully.
Preferably, the keyword configuration management module is when carrying out keyword configuration by rule setting are as follows: every rule
Include source address, destination address, sender, addressee, mail matter topics, Mail Contents these keyword config options;Each pass
Key word config option has "comprising" or " not including " two states;It is the pass of "AND" between each keyword config option condition
System, and a name can be played to every rule, formation rule name, rule name is specific to be set as only by number, letter, lower stroke
Line, Chinese character composition;The setting of " enabling " or " closing " is carried out to the rule after name;All rules are referred to as rule set.
Preferably, the protocol-analysis model therefrom gets validity feature especially by the flow arrested, with SMTP
Agreement is matched, if successful match, is identified as Mail Transfer protocol, and then obtain the endogenous beginning address of mail, destination
Location, addressee, sender, mail matter topics, the matched effective information of need for including in Mail Contents these agreements.
Preferably, the keyword-matching module takes out all rule in the rule set of keyword configuration management module setting
Then, it is successively executed in sequence when strictly all rules are filtered operation, rule match process are as follows: (1) check whether rule is " to open
With " state, if " enabling " state then carries out keyword match operation;If "Off" state, then next is taken in rule set
Rule checks its state again, when having traversed strictly all rules in rule set, if being all "Off" state, not to protocal analysis
Mail Contents in module carry out keyword match operation, and this time request is legal, and mail is sent successfully;Wherein, keyword is carried out
The step of matching operation specifically: (11) take out the keyword config option in the rule of keyword configuration management module setting;
(12) take out what protocol-analysis model took out out of mail, corresponding config option;(13) being taken in step (11)
Value and step (12) in the value that is taken matched, check whether successful match;If successful match, the request is illegal,
Mail sends failure;If it fails to match, return step (11) removes the rule configuration option in a rule, has traversed key
In word configuration management module, all keyword config options in " enabling " state rule and are got with protocol-analysis model
Mail domestic demand match information carry out keyword match after, if keyword match operation it is all failed, it is legal to request, mail hair
Send success.
Preferably, the rule name is specific is set as only being made of number, letter, underscore, Chinese character.
(3) beneficial effect
The present invention provides a kind of mail overall situation filtration system based on Transparent Proxy, which is transparent mail agent service
Device configures in the gateway of the local area network of user, can get the user in local area network and be sent to owning on gateway
E-mail messages.Keyword can be preset on the transparent mail proxy server, it, can after it gets mail specifying information
It is matched with keyword set in advance, if it fails to match, illustrates mail security;If successful match, illustrate that mail is illegal,
Request is illegal and prompts client, and mail sends failure, to prevent sensitive information in local area network from leaking, is realized internally
Comprehensive protection of portion's data enhances the protection to built-in system, is finally reached Information Security Standard.The present invention also provides one kind
Corresponding mail overall situation filter method.
Detailed description of the invention
Fig. 1 is the system composition schematic diagram of the mail overall situation filtration system of the invention based on Transparent Proxy;
Fig. 2 is that the mail overall situation of the invention examines rule match flow diagram in filter method;
Fig. 3 is that the mail overall situation of the invention examines keyword match Detailed operating procedures schematic diagram in filter method.
Specific embodiment
To keep the purpose of the present invention, content and advantage clearer, with reference to the accompanying drawings and examples, to of the invention
Specific embodiment is described in further detail.
As shown in Figure 1, a kind of mail overall situation based on Transparent Proxy provided by the invention examines filtration system, the system pair
It is fully transparent for user, so the system is referred to as transparent mail proxy server in the present invention, by protocal analysis mould
Block, keyword configuration management module, keyword-matching module composition, modules cooperative cooperating in Transparent proxy server,
Examination filtering is carried out to Mail Contents.Wherein, protocol-analysis model is used to carry out depth analysis to smtp protocol, and mail is divided into
Envelope, stem and text three parts, and stored according to specified format, so that keyword-matching module can take out mail
The matched e-mail messages of domestic demand carry out keyword match work;Keyword configuration management module is used to being arranged and managing keyword,
It completes the operation such as increase the rule name that keyword is finally set, delete, modifying, inquiring;Keyword-matching module is used
In keyword set by the matched e-mail messages of need that are extracted in protocol-analysis model and keyword configuration management module, into
Row matching is assert if successful match and this time requests illegal and prompt client;If it fails to match, then it is assumed that request legal, postal
Part is sent successfully.
Wherein, keyword configuration management module, by rule setting when carrying out keyword configuration are as follows: every rule is comprising source
The keywords config option such as location, destination address, sender, addressee, mail matter topics, Mail Contents;Each keyword configuration choosing
Item has "comprising" or " not including " two states;It is the relationship of "AND" between each keyword config option condition, and can
One name is played to every rule, formation rule name maintains easily in order to subsequent management, and rule name is specific to be set as only
It can be made of number, letter, underscore, Chinese character;The setting of " enabling " or " closing " is carried out to the rule after name;All
Rule is referred to as rule set.
Protocol-analysis model therefrom gets validity feature by the flow arrested, and is matched with smtp protocol,
If successful match, it is identified as Mail Transfer protocol, and then obtains the endogenous beginning address of mail, destination address, addressee, outbox
The matched effective information of the need for including in the agreements such as people, mail matter topics, Mail Contents does standard for subsequent keyword-matching module
It is standby.
With reference to Fig. 2, keyword-matching module takes out all rule in the rule set of keyword configuration management module setting
Then, it is successively executed in sequence when strictly all rules are filtered operation, rule match process are as follows: (1) check whether rule is " to open
With " state, if " enabling " state then carries out keyword match operation;If "Off" state, then next is taken in rule set
Rule checks its state again, when having traversed strictly all rules in rule set, if being all "Off" state, not to protocal analysis
Mail Contents in module carry out keyword match operation, and this time request is legal, and mail is sent successfully;Wherein, keyword is carried out
The step of matching operation specifically: (11) take out the keyword config option in the rule of keyword configuration management module setting;
(12) take out what protocol-analysis model took out out of mail, corresponding config option;(13) being taken in step (11)
Value and step (12) in the value that is taken matched, check whether successful match;If successful match, the request is illegal,
Mail sends failure;If it fails to match, return step (11) removes the rule configuration option in a rule, has traversed key
In word configuration management module, all keyword config options in " enabling " state rule and are got with protocol-analysis model
Mail domestic demand match information carry out keyword match after, if keyword match operation it is all failed, it is legal to request, mail hair
Send success.To in every rule in rule set set by keyword configuration management module in the present invention, each keyword is configured
Option has the selection of "comprising" Yu " not including " two states, can carry out wider setting to keyword config option, lift
Example explanation: the setting of keyword configuration management module: rule 1 is " enabling " state, and keyword config option " source address " is set as
"comprising" state and its value are " 1.1.1.1 ", are matched with the mail source address got in protocol-analysis model, if matching
Success means that local area network is illegal toward the mail requests that all mail source addresses for being sent to gateway are " 1.1.1.1 ", and mail, which is sent, to be lost
It loses, conversely, mail is sent successfully;If transparent mail proxy server wants the request for preventing source address from not being " 1.1.1.1 ", nothing
A plurality of rule need to be configured and realize the request, the state that keyword config option in rule 1 is " source address " need to be only set as " no
Comprising ".
Using above system realize the mail overall situation examine filter method the following steps are included:
Protocol-analysis model carries out depth analysis to smtp protocol, and mail is divided into envelope, stem and the big portion of text three
Point, and stored according to specified format, so that keyword-matching module can take out the matched e-mail messages of mail domestic demand, carry out
Keyword match work;
Keyword configuration management module is arranged and manages keyword, completes the rule name being finally set to keyword and carries out
The operations such as increase, deletion, modification, inquiry;
Keyword-matching module is the matched e-mail messages of need and keyword configuration management extracted in protocol-analysis model
Keyword set by module, is matched, if successful match, is assert and is this time requested illegal and prompt client;If matching
Failure, then it is assumed that request is legal, and mail is sent successfully.
The concrete operations process of each module is as described above.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the technical principles of the invention, several improvement and deformations can also be made, these improvement and deformations
Also it should be regarded as protection scope of the present invention.
Claims (9)
1. a kind of mail overall situation based on Transparent Proxy examines filtration system characterized by comprising protocol-analysis model, pass
Key word configuration management module, keyword-matching module;
Wherein, mail is divided into envelope, stem and text three for analyzing smtp protocol by the protocol-analysis model
It is most of, and stored according to specified format, so that keyword-matching module can take out the matched e-mail messages of mail domestic demand,
Carry out keyword match work;The keyword configuration management module is completed to keyword most for being arranged and managing keyword
The rule name being set eventually increased, deleted, being modified, inquiry operation;The keyword-matching module is used for protocal analysis
Keyword set by the matched e-mail messages of the need extracted in module and keyword configuration management module, is matched, if
With success, then assert and this time request illegal and prompt client;If it fails to match, then it is assumed that request is legal, and mail is sent successfully.
2. the system as claimed in claim 1, which is characterized in that the keyword configuration management module is specifically carrying out keyword
By rule setting when configuration are as follows: every rule is comprising in source address, destination address, sender, addressee, mail matter topics, mail
Hold these keyword config options;Each keyword config option has "comprising" or " not including " two states;Each key
It is the relationship of "AND" between word config option condition, and a name, formation rule name can be played to every rule;After name
Rule carry out " enabling " or " closing " setting;All rules are referred to as rule set.
3. system as claimed in claim 2, which is characterized in that the protocol-analysis model is specifically used for the stream by arresting
Amount, therefrom gets validity feature, is matched with smtp protocol, if successful match, be identified as Mail Transfer protocol, into
And the endogenous beginning address of mail, destination address are obtained, addressee, mail matter topics, in Mail Contents these agreements includes at sender
Need matched effective information.
4. system as claimed in claim 2, which is characterized in that the keyword-matching module is specifically used for taking-up keyword and matches
The strictly all rules in the rule set of management module setting are set, are successively executed in sequence when strictly all rules are filtered operation, are advised
Then match process are as follows: (1) check whether rule is " enabling " state, if " enabling " state then carries out keyword match operation;
If "Off" state, then next rule in rule set is taken, checks its state again, has traversed strictly all rules in rule set
When, if being all "Off" state, keyword match operation is not carried out to the Mail Contents in protocol-analysis model, this time requested
Legal, mail is sent successfully;Wherein, the step of keyword match operation is carried out specifically: (11) take out keyword configuration management
Keyword config option in the rule of module setting;(12) take out what protocol-analysis model took out out of mail, in contrast
The config option answered;(13) value taken in the value taken in step (11) and step (12) is matched, is checked whether
With success;If successful match, the request is illegal, and mail sends failure;If it fails to match, return step (11) removes one
Rule configuration option in rule has traversed in keyword configuration management module, all keys in " enabling " state rule
Word config option, and after the mail domestic demand match information progress keyword match got with protocol-analysis model, if keyword
Matching operation is all failed, then it is legal to request, and mail is sent successfully.
5. a kind of mail overall situation realized using system described in any one of any one of claims 1 to 44 examines filter method, feature
It is, comprising the following steps:
Protocol-analysis model carries out depth analysis to smtp protocol, and mail is divided into envelope, stem and text three parts, and
It is stored according to specified format, so that keyword-matching module can take out the matched e-mail messages of mail domestic demand, is carried out crucial
Word matches work;
Keyword configuration management module is arranged and manages keyword, and completion increases the rule name that keyword is finally set
The operation such as add, delete, modifying, inquiring;
Keyword-matching module is the matched e-mail messages of need and keyword configuration management module extracted in protocol-analysis model
Set keyword, is matched, if successful match, is assert and is this time requested illegal and prompt client;If it fails to match,
It is legal then to think to request, and mail is sent successfully.
6. method as claimed in claim 5, which is characterized in that the keyword configuration management module is carrying out keyword configuration
When by rule setting are as follows: every rule include source address, destination address, sender, addressee, mail matter topics, Mail Contents this
A little keyword config options;Each keyword config option has "comprising" or " not including " two states;Each keyword is matched
The relationship between option condition for "AND" is set, and a name can be played to every rule, formation rule name, rule name is specific to be set
It is set to and is only made of number, letter, underscore, Chinese character;The setting of " enabling " or " closing " is carried out to the rule after name;Institute
Some rules are referred to as rule set.
7. system as claimed in claim 6, which is characterized in that the protocol-analysis model especially by the flow arrested,
Validity feature is therefrom got, is matched with smtp protocol, if successful match, is identified as Mail Transfer protocol, in turn
Obtain the endogenous beginning address of mail, destination address, addressee, sender, mail matter topics, the need for including in Mail Contents these agreements
Matched effective information.
8. system as claimed in claim 7, which is characterized in that the keyword-matching module takes out keyword configuration management mould
Strictly all rules in the rule set of block setting, successively execute, rule match stream in sequence when strictly all rules are filtered operation
Journey are as follows: (1) check whether rule is " enabling " state, if " enabling " state then carries out keyword match operation;If " closing
Close " state, then next rule in rule set is taken, checks its state again, when having traversed strictly all rules in rule set, if being all
"Off" state does not then carry out keyword match operation to the Mail Contents in protocol-analysis model, this time requests legal, mail
It sends successfully;Wherein, the step of keyword match operation is carried out specifically: (11) take out the setting of keyword configuration management module
Keyword config option in rule;(12) take out what protocol-analysis model took out out of mail, corresponding configuration choosing
;(13) value taken in the value taken in step (11) and step (12) is matched, checks whether successful match;If
With success, then the request is illegal, and mail sends failure;If it fails to match, return step (11) is removed in a rule
Rule configuration option has traversed in keyword configuration management module, all keyword config options in " enabling " state rule,
And after the mail domestic demand match information got with protocol-analysis model carries out keyword match, if keyword match operation is all not
Success, then it is legal to request, and mail is sent successfully.
9. system as claimed in claim 5, which is characterized in that the rule name is specific to be set as only by number, letter, lower stroke
Line, Chinese character composition.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910660683.6A CN110401591A (en) | 2019-07-22 | 2019-07-22 | A kind of mail overall situation examination filtration system and method based on Transparent Proxy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910660683.6A CN110401591A (en) | 2019-07-22 | 2019-07-22 | A kind of mail overall situation examination filtration system and method based on Transparent Proxy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110401591A true CN110401591A (en) | 2019-11-01 |
Family
ID=68325746
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910660683.6A Pending CN110401591A (en) | 2019-07-22 | 2019-07-22 | A kind of mail overall situation examination filtration system and method based on Transparent Proxy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110401591A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111245708A (en) * | 2020-01-08 | 2020-06-05 | 北京小米移动软件有限公司 | Mail processing method and device |
CN112087369A (en) * | 2020-08-31 | 2020-12-15 | 恒安嘉新(北京)科技股份公司 | Mail filtering method, device, equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1350246A (en) * | 2001-12-03 | 2002-05-22 | 上海交通大学 | Intelligent e-mail content filtering method |
US6768988B2 (en) * | 2001-05-29 | 2004-07-27 | Sun Microsystems, Inc. | Method and system for incorporating filtered roles in a directory system |
US20060025114A1 (en) * | 2004-07-29 | 2006-02-02 | Sprint Spectrum L.P. | Method and system for dynamic selection of voice mail system |
CN101136874A (en) * | 2007-07-25 | 2008-03-05 | 华南理工大学 | Anti-spam false filtering method and system based on comprehensive decision |
CN103220213A (en) * | 2013-04-23 | 2013-07-24 | 国网信息通信有限公司 | E-mail filtering method and device thereof |
CN106063189A (en) * | 2014-03-28 | 2016-10-26 | 英特尔公司 | Systems and methods to facilitate multi-factor authentication policy enforcement using one or more policy handlers |
CN107566242A (en) * | 2016-09-14 | 2018-01-09 | 中国移动通信集团广东有限公司 | Rubbish mail filtering method based on rule of combination |
-
2019
- 2019-07-22 CN CN201910660683.6A patent/CN110401591A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6768988B2 (en) * | 2001-05-29 | 2004-07-27 | Sun Microsystems, Inc. | Method and system for incorporating filtered roles in a directory system |
CN1350246A (en) * | 2001-12-03 | 2002-05-22 | 上海交通大学 | Intelligent e-mail content filtering method |
US20060025114A1 (en) * | 2004-07-29 | 2006-02-02 | Sprint Spectrum L.P. | Method and system for dynamic selection of voice mail system |
CN101136874A (en) * | 2007-07-25 | 2008-03-05 | 华南理工大学 | Anti-spam false filtering method and system based on comprehensive decision |
CN103220213A (en) * | 2013-04-23 | 2013-07-24 | 国网信息通信有限公司 | E-mail filtering method and device thereof |
CN106063189A (en) * | 2014-03-28 | 2016-10-26 | 英特尔公司 | Systems and methods to facilitate multi-factor authentication policy enforcement using one or more policy handlers |
CN107566242A (en) * | 2016-09-14 | 2018-01-09 | 中国移动通信集团广东有限公司 | Rubbish mail filtering method based on rule of combination |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111245708A (en) * | 2020-01-08 | 2020-06-05 | 北京小米移动软件有限公司 | Mail processing method and device |
CN111245708B (en) * | 2020-01-08 | 2022-04-08 | 北京小米移动软件有限公司 | Mail processing method and device |
CN112087369A (en) * | 2020-08-31 | 2020-12-15 | 恒安嘉新(北京)科技股份公司 | Mail filtering method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104378283B (en) | A kind of sensitive mail filtering system and method based on customer end/server mode | |
CN1902902A (en) | Data message mirroring and redirection | |
US20090044006A1 (en) | System for blocking spam mail and method of the same | |
JP5148961B2 (en) | User authentication mechanism | |
US7269624B1 (en) | Method and apparatus for dynamically managing electronic mail messages on a remote electronic mail messaging system | |
CN101087259A (en) | A system for filtering spam in Internet and its implementation method | |
CN106059892A (en) | Message engine integrated with communication system | |
CN106656728A (en) | Mail detection and monitoring system | |
US20160112356A1 (en) | Network Device and Method for Processing Email Request | |
US20130247208A1 (en) | System, method, and computer program product for preventing data leakage utilizing a map of data | |
CN110401591A (en) | A kind of mail overall situation examination filtration system and method based on Transparent Proxy | |
US9769099B2 (en) | Systems and methods of handling email communication | |
CN115801719B (en) | Mail processing method, device, equipment and readable storage medium | |
CN109523241A (en) | A kind of E-mail communication method for limiting and system | |
CN1380626A (en) | Method and device for distinguishing rubbish electronic mail and electronic mail servicer | |
CN105827518B (en) | Safe cross-domain mail transmission method, device and system | |
JPH11252158A (en) | E-mail information management method and apparatus, and recording medium recording e-mail information management processing program | |
CN101116349B (en) | Context cognizance enhancing message transform system, and method for the same | |
CN108809813A (en) | File processing method and system using the mail of anti-data-leakage technology | |
KR101148651B1 (en) | An information offer service system and way of an object-oriented contiguity approach format | |
AU2004307532A1 (en) | Protection from undesirable messages | |
CN107295485A (en) | Multimedia message accessory management method, device and communication system | |
JP2011039917A (en) | Mail management apparatus and mail management method | |
CN115484226B (en) | Self-service system for accessing mail sending function of enterprise application system | |
US7539729B1 (en) | Method and apparatus to enable mass message publications to reach a client equipped with a filter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191101 |