Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A sensitive mail filtering system and method based on client/server mode

A server mode, client technology, applied in the field of sensitive mail filtering system, can solve the problems of sensitive data leakage, users do not have control over the server, data theft, etc., to achieve the effect of preventing mail transmission

Active Publication Date: 2017-12-19
STATE GRID CORP OF CHINA +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is mainly reflected in the following aspects: First, the email itself is a channel for leaking secrets. Internal malicious users can actively use the email system to send sensitive information to the external network, causing leaks
Second, the storage range of emails is difficult to control. Sending and receiving emails are stored on the email server, and users have no control over the server; if the server is compromised, sensitive data is easily leaked
The third is that emails are easy to be intercepted during transmission, and emails are transmitted in clear text by default in the network, so user data is easily stolen by malicious users because of "monitoring"; even if secure socket layer (SSL) is used to encrypt E-mail Transmission can only ensure that the data transmission between the user and the mail server cannot be monitored, and the data transmission between the mail servers still uses plaintext data
However, this method can only filter attributes such as attachment type, subject, body, domain name, number of recipients, and sender / recipient, and cannot detect and filter attachment content. The mail proxy servers in this method are connected in series On the network link, the risk of single point failure will be introduced, and at the same time, this method cannot realize the alarm prompt for the client sending sensitive information
[0004] In short, the currently disclosed methods cannot solve the problem of real-time interception of emails containing sensitive information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A sensitive mail filtering system and method based on client/server mode
  • A sensitive mail filtering system and method based on client/server mode
  • A sensitive mail filtering system and method based on client/server mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The first step of implementing the present invention is to build a sensitive mail interception system, which is composed of a client and a server.

[0051] The client is a user computer installed with a sensitive email detection client module, which is responsible for the following work: (1) Sensitive keyword detection, multi-keyword search of email data to determine whether the email contains sensitive keywords; (2) Email Interception, intercepting sensitive emails sent by users; (3) Policy update, the policy service module completes the policy update operation, and executes updates according to the policies issued by the server to adjust the customer's security policy in real time; (4) Sensitive email reminders, put The keywords contained in the intercepted sensitive emails are returned to the user in a pop-up interface.

[0052] The server is a computer installed with a sensitive mail detection server module and a database module, and the computer is deployed at any ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive email filtering system and method based on a client / server mode and particularly relates to a method for filtering out sensitive emails in real time without an email proxy server or an email gateway. The method can be used for detecting, analyzing and intercepting titles, text, attachment names and attachment content of sent emails in real time.

Description

technical field [0001] The invention relates to a sensitive mail filtering system and method based on client / server mode. Background technique [0002] Email (mail for short) has become the most basic communication tool on the Internet. While bringing convenience to people, it also brings many security problems, among which the sensitive leakage of emails is one of the very important problems. It is mainly reflected in the following aspects: First, email itself is a leaking channel, and internal malicious users can actively use the email system to send sensitive information to the external network, causing leaks. Second, the storage range of emails is difficult to control. Sending and receiving emails are stored on the email server, and users have no control over the server; if the server is compromised, sensitive data is easily leaked. The third is that emails are easy to be intercepted during transmission, and emails are transmitted in clear text by default in the networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L29/06
Inventor 田建伟薛海伟田峥漆文辉黎曦刘潇潇刘洁
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products