CN106027382A - Anti-leakage device and method and user terminal - Google Patents

Anti-leakage device and method and user terminal Download PDF

Info

Publication number
CN106027382A
CN106027382A CN201610615474.6A CN201610615474A CN106027382A CN 106027382 A CN106027382 A CN 106027382A CN 201610615474 A CN201610615474 A CN 201610615474A CN 106027382 A CN106027382 A CN 106027382A
Authority
CN
China
Prior art keywords
mail
security strategy
keyword
module
prevention device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610615474.6A
Other languages
Chinese (zh)
Inventor
周小平
姜涛
刘兴安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing VRV Software Corp Ltd
Original Assignee
Beijing VRV Software Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing VRV Software Corp Ltd filed Critical Beijing VRV Software Corp Ltd
Priority to CN201610615474.6A priority Critical patent/CN106027382A/en
Publication of CN106027382A publication Critical patent/CN106027382A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/308Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides an anti-leakage device and method and a user terminal, which are applied to e-mails. The anti-leakage method comprises the following steps: acquiring mails sent to a designated port; matching the mails with a preset security policy; and implementing network blocking on the mails matched with the security policy, and sending the mails unmatched with the security policy to a target server. Therefore, confidential data of enterprises can be prevented from being leaked through the mails, and thus the security of mail data is improved.

Description

Leakage prevention device, method and user terminal
Technical field
The present invention relates to field of information security technology, in particular to a kind of based on Email Leakage prevention device, method and user terminal.
Background technology
Along with the development of network technology, there is more enterprise can join in the network system, no matter be wide Branch's interconnection of territory net or each enterprise, mail becomes one of mutual important means of information, and this is just Facing a problem, the confidential information of enterprise likely can be leaked out by mail, by technology hands Section limits the requirement not allowing receiving and dispatching mail also not meet social informatization development, therefore, is badly in need of a kind of base In the divulgence prevention method of mail so that enterprise can either normal receiving and dispatching mail, the machine of enterprise can be prevented again Ciphertext data is leaked out by mail.
Summary of the invention
It is an object of the invention to provide a kind of leakage prevention device, method and user terminal, to solve enterprise The technical problem that the confidential data of industry leaks out easily by mail.
To achieve these goals, the technical scheme that the embodiment of the present invention uses is as follows:
First aspect, embodiments provides a kind of leakage prevention device, is applied to Email, Described leakage prevention device includes: interception module, for obtaining the mail sent to designated port;Coupling Module, for mating described mail with security strategy set in advance;Perform module, be used for The mail that mates with described security strategy is implemented network block, and will with described security strategy not The mail joined sends to destination server.
Second aspect, the embodiment of the present invention additionally provides a kind of divulgence prevention method, is applied to Email, Described divulgence prevention method includes: obtain the mail sent to designated port;By described mail with set in advance Fixed security strategy is mated;The mail mated with described security strategy is implemented network block, with And mail unmatched with described security strategy is sent to destination server.
The third aspect, the embodiment of the present invention additionally provides a kind of user terminal, and described user terminal includes: Memorizer;Processor;And leakage prevention device, described leakage prevention device is installed in described memorizer And include one or more software function module performed by described processor, described leakage prevention device bag Include: interception module, for obtaining the mail sent to designated port;Matching module, for by described Mail mates with security strategy set in advance;Perform module, for described security strategy The mail of coupling is implemented network and is blocked, and sends mail unmatched with described security strategy to mesh Mark server.
The embodiment of the present invention provides a kind of leakage prevention device, method and user terminal, by obtaining to finger The mail that fixed end mouth sends;Described mail is mated with security strategy set in advance;To with institute The mail stating security strategy coupling implements network blocking-up, and will postal unmatched with described security strategy Part sends to destination server, so, is possible to prevent secret data in enterprise to be leaked out by mail, Improve the safety of mail data.
For making the above-mentioned purpose of the present invention, feature and advantage to become apparent, preferable reality cited below particularly Execute example, and coordinate appended accompanying drawing, be described in detail below.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be to required in embodiment Accompanying drawing to be used is briefly described, it will be appreciated that the following drawings illustrate only some of the present invention Embodiment, is therefore not construed as the restriction to scope, for those of ordinary skill in the art, On the premise of not paying creative work, it is also possible to obtain other according to these accompanying drawings relevant attached Figure.
Fig. 1 shows a kind of leakage prevention device, method and the user terminal that the embodiment of the present invention provides Applied environment schematic diagram;
Fig. 2 shows the structured flowchart of the user terminal that the embodiment of the present invention provides;
Fig. 3 shows the functional block diagram of a kind of leakage prevention device that the embodiment of the present invention provides;
Fig. 4 shows the flow chart of a kind of divulgence prevention method that the embodiment of the present invention provides.
Detailed description of the invention
Leakage prevention device, method and the user terminal that present pre-ferred embodiments is provided can be applicable to as In applied environment shown in Fig. 1.As it is shown in figure 1, user terminal 100, destination server 200 In first network 300, first network 300 can be wireless network or cable network, by this One network 300, user terminal 100 and destination server 200 carry out data interaction, wherein, target Server 200 can collect the Email that user terminal 100 sends.It addition, user terminal 100, Controlling server 500 to be positioned in the second network 400, the second network 400 can be wireless network or have Gauze network, by this second network 400, user terminal 100 carries out data with controlling server 500 Alternately, wherein, control server 500 related data of user terminal 100 can be configured, Management, it is possible to issue related data to user terminal 100.
In the embodiment of the present invention, user terminal 100 is preferably mobile terminal device, such as, can wrap Include smart mobile phone, panel computer, E-book reader, pocket computer on knee, vehicle-mounted computer, Wearable mobile terminal etc..
Leakage prevention device, method and the user terminal that the embodiment of the present invention proposes, it is provided that a kind of new Divulgence prevention method based on Email.This leakage prevention device, method are applicable to have Android behaviour Make system, iOS operating system, Windows Phone operating system or the user terminal of other platforms 100.In the embodiment of the present invention, this user terminal 100 is provided with E-mail address client, should Leakage prevention device, method can run on the E-mail address client of user terminal 100, or, this is prevented Device, the method for divulging a secret also can run on the E-mail address of the webpage version of user terminal 100.
Fig. 2 shows a kind of user terminal applying the leakage prevention device of the embodiment of the present invention, method The structured flowchart of 100.As in figure 2 it is shown, user terminal 100 includes that memorizer 102, storage control Device 104, one or more (only illustrating one in figure) processor 106, Peripheral Interface 108, radio frequency Unit 110, audio unit 112, Touch Screen 114 and photographic head 116 etc..These assemblies lead to Cross the mutual communication of one or more communication bus/holding wire 118.
Memorizer 102 can be used for storing software program and module, as anti-in the embodiment of the present invention lets out Programmed instruction/module that close device, method are corresponding, processor 106 is stored in memorizer by operation Software program in 102 and module, thus perform the application of various function and data process, such as this The divulgence prevention method that inventive embodiments provides.
Memorizer 102 can include high speed random access memory, may also include nonvolatile memory, such as one Individual or multiple magnetic storage device, flash memory or other non-volatile solid state memories.Processor 106 and other possible assemblies can be in the control of storage control 104 to the access of memorizer 102 Under carry out.
Various input/output devices are coupled to processor 106 and memorizer by Peripheral Interface 108 102.In certain embodiments, Peripheral Interface 108, processor 106 and storage control 104 Can realize in one single chip.In some other example, they can be respectively by independent chip Realize.
Radio frequency unit 110 is used for receiving and sending electromagnetic wave, it is achieved electromagnetic wave is mutual with the signal of telecommunication Conversion, thus carry out communication with communication network or other equipment.
Audio unit 112 provides a user with audio interface, its can include one or more mike, one Individual or multiple speaker and voicefrequency circuit.
Touch Screen 114 provides an output and input circle between user terminal 100 and user simultaneously Face.In the present embodiment, described Touch Screen 114 supports single-point and multi-point touch operation, such as, This Touch Screen 114 can be to support single-point and the capacitance type touch control screen of multi-point touch operation or resistance-type Touch screen etc..Support that single-point and multi-point touch operation are that Touch Screen 114 can sense from this touch-control The touch control operation that on screen 11, one or more positions produce simultaneously, and tap what this sensed more Control operation transfers to processor 106 to process.
Described photographic head 116 is used for shooting image.
Being appreciated that the structure shown in Fig. 2 is only signal, user terminal 100 may also include and compares Fig. 2 Shown in more or less assembly, or there is the configuration different from shown in Fig. 2.Institute in Fig. 2 The each assembly shown can use hardware, software or a combination thereof to realize.
Below in conjunction with accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the present invention, Rather than whole embodiments.Generally herein described in accompanying drawing and the group of the embodiment of the present invention that illustrates Part can be arranged with various different configurations and design.Therefore, below to the basis provided in the accompanying drawings The detailed description of inventive embodiment is not intended to limit the scope of claimed invention, but only Only represent the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not having There is on the premise of making creative work the every other embodiment obtained, broadly fall into present invention protection Scope.
It should also be noted that similar label and letter represent similar terms, therefore, one in following accompanying drawing A certain Xiang Yi the accompanying drawing of denier is defined, then need not it is carried out further in accompanying drawing subsequently Definition and explanation.Meanwhile, in describing the invention, term " first ", " second " etc. are only used for district Divide and describe, and it is not intended that indicate or hint relative importance.
First embodiment
Refer to Fig. 3, be the functional block diagram of a kind of leakage prevention device 600 that the embodiment of the present invention provides. A kind of leakage prevention device 600 that the embodiment of the present invention provides includes: acquisition module 610, interception module 620, parsing module 630, matching module 640, execution module 650, alarm module 660 and figure Table output module 670.
Acquisition module 610, is used for obtaining security strategy set in advance.
In embodiments of the present invention, after controlling server 500 startup, formulation security strategy can be configured, And security strategy is saved in the data base controlling server 500.Security strategy can be about enterprise The packet that the confidential information of industry is constituted, the confidential information about enterprise can include that first is crucial Word, such as: secret, secret, password etc..First keyword of enterprise's confidential information is packaged into Packet, and be stored in the data base controlling server 500.Electronics in user terminal 100 After mailbox client is opened, acquisition module 610 can be with control server 500 communication, from control Server 500 obtains security strategy set in advance, and is saved in the memorizer of user terminal 100 In 102.
Interception module 620, for obtaining the mail sent to designated port.
In embodiments of the present invention, when user terminal 100 is connected with destination server 200 foundation, User terminal 100 sends oneself identity (referring here to account and password) to destination server 200 And successfully confirmed by destination server 200, now, user terminal 100 can be to destination server The designated port of 200 sends mail, such as, when destination server 200 is Simple Mail Transfer protocol During (Simple Mail Transfer Protocol, SMTP) server, user terminal 100 can be to The designated port 25 of smtp server sends mail.
Further, interception module 620 can be networks filter driver, by sending out to designated port The mail sent does port redirection, to obtain the mail sent to designated port.Such as, take when target Business device 200 is Simple Mail Transfer protocol (Simple Mail Transfer Protocol, SMTP) clothes During business device, the mail sent to designated port 25 can be done port redirection by interception module 620, So that the mail to designated port 25 transmission is sent to interception module 620, interception module 620 obtain Take.
Parsing module 630, is used for resolving described security strategy and described mail.
In embodiments of the present invention, security strategy can include the first keyword, parsing module 630 The packet of security strategy can be decompressed, the most therefrom parse the first keyword and store In the memorizer 102 of user terminal 100.
Content to the mail of designated port transmission can include text and adnexa, can include in mail Second keyword, the second keyword both can be the content in text, it is also possible to for the content in adnexa, In the first keyword that parsing module may be used for resolving in described security strategy and described mail Two keywords.
Matching module 640, for mating described mail with described security strategy.
In embodiments of the present invention, described mail and described security strategy are carried out by matching module 640 The process joined can be: matching module 640 is by the second keyword in described mail and described safe plan The first keyword in slightly mates, and confirms that the second keyword and the first keyword are the most consistent, if Unanimously, then the second keyword and the first keyword be coupling, if inconsistent, then the second keyword and First keyword is unmatched.
Perform module 650, block for the mail mated with described security strategy is implemented network, with And mail unmatched with described security strategy is sent to destination server 200.
In embodiments of the present invention, when described second keyword is with described first keyword match, should Mail i.e. carries the information relevant to enterprise secret, therefore triggers security strategy, performs module Described mail can be implemented network by 650 to be blocked, and this mail cannot send to destination server 200.
In embodiments of the present invention, when described second keyword does not mates with described first keyword, This mail does not i.e. carry the information relevant to enterprise secret, and therefore, this mail is peace for enterprise Full mail, performing module 650 can send this mail to destination server 200.
Alarm module 660, for reporting to the police, such as after described mail is implemented network blocking-up: Alarm module 660 sends warning message to mailbox management person by the way of mail or note, with this side Formula informs that this mail of manager triggers security strategy.
Chart output module 670, for exporting the chart-information about described mail.
In embodiments of the present invention, the mail sent from user terminal 100 can be to trigger safe plan Mail slightly and do not trigger the mail of security strategy, the mail sent from user terminal 100 can be Control the data base of server 500 backs up, and perform module 650 and send out to mailbox management person The warning message sent can also be saved in the data base controlling server 500.So, chart output Module 670 can export chart according to the mail sent from user terminal 100 and warning message and open up Show the security postures of enterprise.
Second embodiment
Refer to Fig. 4, be the flow chart of a kind of divulgence prevention method that the embodiment of the present invention provides.This A kind of divulgence prevention method that bright embodiment provides comprises the following steps:
Step S1, obtains security strategy set in advance.
In embodiments of the present invention, step S1 can be performed by acquisition module 610.Security strategy can Think the packet that the keyword about enterprise's confidential information is constituted, about the pass of enterprise's confidential information Key word can include the first keyword, such as: secret, secret, password etc..Enterprise's confidential information The first keyword be packaged into packet, and be stored in control server 500.When user terminal 100 In E-mail address client open after, acquisition module 610 can with control server 500 communication, Obtain security strategy set in advance from controlling server 500, and be saved in depositing of user terminal 100 In reservoir 102.
Step S2, obtains the mail sent to designated port.
In embodiments of the present invention, step S2 can be performed by interception module 620.Work as user terminal 100 with destination server 200 set up be connected time, user terminal 100 sends to destination server 200 Oneself identity (referring here to account and password) is also successfully confirmed by destination server 200, now, User terminal 100 can send mail to the designated port of destination server 200, such as, works as target Server 200 is Simple Mail Transfer protocol (Simple Mail Transfer Protocol, SMTP) During server, user terminal 100 can send mail to the designated port 25 of smtp server.
Further, interception module 620 can be networks filter driver, by sending out to designated port The mail sent does port redirection, to obtain the mail sent to designated port.Such as, take when target Business device 200 is Simple Mail Transfer protocol (Simple Mail Transfer Protocol, SMTP) clothes During business device, the mail sent to designated port 25 can be done port redirection by interception module 620, So that the mail to designated port 25 transmission is sent to interception module 620, interception module 620 obtain Take.
Step S3, resolves described security strategy and described mail.
In embodiments of the present invention, step S3 can be performed by parsing module 630.In security strategy Can include the first keyword, parsing module 630 can parse the first keyword from security strategy And be stored in the memorizer 102 of user terminal 100.
Content to the mail of designated port transmission can include text and adnexa, can include in mail Second keyword, the second keyword both can be the content in text, it is also possible to for the content in adnexa, In the first keyword that parsing module 630 may be used for resolving in described security strategy and described mail The second keyword.
Step S4, mates described mail with described security strategy.
In embodiments of the present invention, step S4 can be performed by matching module 640.Matching module 640 The process carrying out described mail with described security strategy mating can be: matching module 640 is by described The second keyword in mail and the first keyword in described security strategy mate, and confirm second Keyword and the first keyword are the most consistent, if unanimously, then the second keyword and the first keyword are Joining, if inconsistent, then the second keyword and the first keyword are unmatched.
Step S5, implements network to the mail mated with described security strategy and blocks, and will be with institute State the unmatched mail of security strategy to send to destination server 200.
In embodiments of the present invention, step S5 can be performed by performing module 650.Described second When keyword and described first keyword match, this mail i.e. carries the letter relevant to enterprise secret Breath, therefore triggers security strategy, performs module 650 and described mail can be implemented network blocking-up, This mail cannot send to destination server 200.At described second keyword and described first keyword When not mating, this mail does not i.e. carry the information relevant to enterprise secret, and therefore, this mail is for enterprise Being safe mail for industry, performing module 650 can send this mail to destination server 200.
Step S6, reports to the police after network blocks implementing described mail, and step S6 can be by Alarm module 660 performs.Such as: alarm module 660 sends warning by the way of mail or note Information, to mailbox management person, informs that this mail of manager triggers security strategy in this way.
Step S7, exports the chart-information about described mail.
In embodiments of the present invention, step S7 can be performed by chart output module 670.From user The mail that terminal 100 sends can be to trigger the mail of security strategy and do not trigger security strategy Mail, the mail sent from user terminal 100 can enter among the data bases controlling server 500 Row backup, and perform module 650 and the warning message sent to mailbox management person can also be uploaded to Control in the data base of server 500.So, chart output module 670 can be according to from user eventually Mail and warning message that end 100 sends export chart to show the security postures of enterprise.
It addition, user can also be according to condition query alarm signal in the data base controlling server 500 Breath, such as, according to inquiry warning messages such as mail date issued, mail matter topics, keywords.
The embodiment of the present invention provides a kind of leakage prevention device, method and user terminal, by obtaining in advance The security strategy set;Obtain the mail sent to designated port;By described mail and described safe plan Slightly mate;The mail mated with described security strategy is implemented network block, and will be with described The unmatched mail of security strategy sends to destination server, so, is possible to prevent enterprise's secret to pass through Mail data leaks out, and can also warn mail when sending the mail triggering security strategy simultaneously Sender or mailbox management person, and remain with outbox content and report in the data base controlling server Alarming information, can show the security postures of enterprise by exporting various charts.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, Can also realize by another way.Device embodiment described above is only schematically, Such as, the flow chart in accompanying drawing and block diagram show the device of multiple embodiments according to the present invention, side Method and architectural framework in the cards, function and the operation of computer program.In this, stream Each square frame in journey figure or block diagram can represent a module, program segment or a part for code, institute The part stating module, program segment or code comprises one or more logic function for realizing regulation Executable instruction.It should also be noted that at some as in the implementation replaced, square frame is marked The function of note can also occur to be different from the order marked in accompanying drawing.Such as, two continuous print sides Frame can essentially perform substantially in parallel, and they can also perform sometimes in the opposite order, and this depends on Depending on involved function.It is also noted that each square frame in block diagram and/or flow chart, with And the combination of the square frame in block diagram and/or flow chart, can be with performing the function of regulation or the special of action Hardware based system realize, or can come with the combination of specialized hardware and computer instruction Realize.
It addition, each functional module in each embodiment of the present invention can integrate formation one Independent part, it is also possible to be modules individualism, it is also possible to two or more module collection It is shaped as an independent part.
If described function realizes using the form of software function module and as independent production marketing or During use, can be stored in a computer read/write memory medium.Based on such understanding, this The part that the most in other words prior art contributed of technical scheme of invention or this technical side The part of case can embody with the form of software product, and this computer software product is stored in one In storage medium, including some instructions with so that computer equipment (can be personal computer, Server, or the network equipment etc.) perform all or part of of method described in each embodiment of the present invention Step.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), The various medium that can store program code such as magnetic disc or CD.
It should be noted that in this article, the relational terms of such as first and second or the like is only used By an entity or operation separate with another entity or operating space, and not necessarily require or Imply relation or the order that there is any this reality between these entities or operation.And, term " include ", " comprising " or its any other variant are intended to comprising of nonexcludability, so that Process, method, article or equipment including a series of key elements not only include those key elements, but also Including other key elements being not expressly set out, or also include for this process, method, article or The key element that person's equipment is intrinsic.In the case of there is no more restriction, by statement " including ... " The key element limited, it is not excluded that in including the process of described key element, method, article or equipment also There is other identical element.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for For those skilled in the art, the present invention can have various modifications and variations.All essences in the present invention Within god and principle, any modification, equivalent substitution and improvement etc. made, should be included in the present invention Protection domain within.It should also be noted that similar label represents similar with letter in following accompanying drawing , therefore, the most a certain Xiang Yi accompanying drawing is defined, then it is right to need not in accompanying drawing subsequently It defines further and explains.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention not office Being limited to this, any those familiar with the art, can in the technical scope that the invention discloses Readily occur in change or replace, all should contain within protection scope of the present invention.Therefore, the present invention Protection domain should described be as the criterion with scope of the claims.

Claims (17)

1. a leakage prevention device, is applied to Email, it is characterised in that described anti-dress of divulging a secret Put and include:
Interception module, for obtaining the mail sent to designated port;
Matching module, for mating described mail with security strategy set in advance;
Perform module, block for the mail mated with described security strategy is implemented network, and will Mail unmatched with described security strategy sends to destination server.
2. leakage prevention device as claimed in claim 1, it is characterised in that described interception module is also For the described mail sent to designated port is done port redirection, described to designated port to obtain The mail sent.
3. leakage prevention device as claimed in claim 1, it is characterised in that described leakage prevention device Also include that parsing module, described parsing module are used for resolving described security strategy and described mail.
4. leakage prevention device as claimed in claim 3, it is characterised in that described parsing module is used In the first keyword resolved in described security strategy and the second keyword in described mail.
5. leakage prevention device as claimed in claim 4, it is characterised in that described matching module is also For the second keyword in described mail and the first keyword in described security strategy being carried out Join.
6. leakage prevention device as claimed in claim 5, it is characterised in that described execution module is also For when described second keyword is with described first keyword match, described mail is implemented network resistance Disconnected, and when described second keyword does not mates with described first keyword, described mail is sent To destination server.
7. leakage prevention device as claimed in claim 1, it is characterised in that described leakage prevention device Also including alarm module, described alarm module is for implementing the mail mated with described security strategy Network is reported to the police after blocking.
8. leakage prevention device as claimed in claim 1, it is characterised in that described leakage prevention device Also include that acquisition module, described acquisition module are used for obtaining described security strategy set in advance.
9. a divulgence prevention method, is applied to Email, it is characterised in that the described anti-side of divulging a secret Method includes:
Obtain the mail sent to designated port;
Described mail is mated with security strategy set in advance;
The mail mated with described security strategy is implemented network block, and will be with described security strategy Unmatched mail sends to destination server.
10. divulgence prevention method as claimed in claim 9, it is characterised in that described acquisition is to appointment The mail that port sends includes: the described mail sent to designated port is done port redirection, to obtain Take the described mail sent to designated port.
11. divulgence prevention methods as claimed in claim 9, it is characterised in that described divulgence prevention method Also include: resolve described security strategy and described mail.
12. divulgence prevention methods as claimed in claim 11, it is characterised in that described in described parsing Security strategy and described mail include: resolve the first keyword in described security strategy and described mail In the second keyword.
13. divulgence prevention methods as claimed in claim 12, it is characterised in that described by described postal Part carries out mating including with described security strategy: by the second keyword in described mail and described safety The first keyword in strategy mates.
14. divulgence prevention methods as claimed in claim 13, it is characterised in that described to described The mail of security strategy coupling is implemented network and is blocked, and will mail unmatched with described security strategy Transmission to destination server includes: when described second keyword is with described first keyword match, right Described mail is implemented network and is blocked, and does not mates with described first keyword at described second keyword Time, described mail is sent to destination server.
15. divulgence prevention methods as claimed in claim 9, it is characterised in that described divulgence prevention method Also include: report to the police after the mail mated with described security strategy is implemented network blocking-up.
16. divulgence prevention methods as claimed in claim 9, it is characterised in that described divulgence prevention method Also include: obtaining before the mail that designated port sends, obtaining described safe plan set in advance Slightly.
17. 1 kinds of user terminals, it is characterised in that described user terminal includes:
Memorizer;
Processor;And
Leakage prevention device, described leakage prevention device is installed in described memorizer and includes one or more The software function module performed by described processor, described leakage prevention device includes:
Interception module, for obtaining the mail sent to designated port;
Matching module, for mating described mail with security strategy set in advance;
Perform module, block for the mail mated with described security strategy is implemented network, and will Mail unmatched with described security strategy sends to destination server.
CN201610615474.6A 2016-07-29 2016-07-29 Anti-leakage device and method and user terminal Pending CN106027382A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610615474.6A CN106027382A (en) 2016-07-29 2016-07-29 Anti-leakage device and method and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610615474.6A CN106027382A (en) 2016-07-29 2016-07-29 Anti-leakage device and method and user terminal

Publications (1)

Publication Number Publication Date
CN106027382A true CN106027382A (en) 2016-10-12

Family

ID=57115024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610615474.6A Pending CN106027382A (en) 2016-07-29 2016-07-29 Anti-leakage device and method and user terminal

Country Status (1)

Country Link
CN (1) CN106027382A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109542847A (en) * 2018-11-05 2019-03-29 努比亚技术有限公司 A kind of document handling method, terminal and readable storage medium storing program for executing
CN110808990A (en) * 2019-11-08 2020-02-18 北京明朝万达科技股份有限公司 Mail transmission method, device, electronic equipment and computer readable storage medium
CN111698236A (en) * 2020-06-05 2020-09-22 浙江华途信息安全技术股份有限公司 Method and system for preventing leakage of browser
CN112214970A (en) * 2020-10-20 2021-01-12 上海科越信息技术股份有限公司 Customs declaration form filling method and device
CN112258137A (en) * 2020-09-06 2021-01-22 厦门天锐科技股份有限公司 Mail blocking method and device
CN114598673A (en) * 2022-05-09 2022-06-07 太平金融科技服务(上海)有限公司深圳分公司 Electronic mailbox system, mailbox processing method, device and computer equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257378A (en) * 2008-04-09 2008-09-03 南京航空航天大学 Anti-disclosure mail safe card and method for detecting disclosure mail
CN101409686A (en) * 2007-10-11 2009-04-15 鸿富锦精密工业(深圳)有限公司 System and method for checking e-mail accessory content
CN104361097A (en) * 2014-11-21 2015-02-18 国家电网公司 Real-time detection method for electric power sensitive mail based on multimode matching
CN104518943A (en) * 2013-09-27 2015-04-15 无锡华润微电子有限公司 Method and system for e-mail management
CN104702451A (en) * 2013-12-04 2015-06-10 大连东浦机电有限公司 Method for monitoring risk of sent public mail based on keyword extraction strategy

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409686A (en) * 2007-10-11 2009-04-15 鸿富锦精密工业(深圳)有限公司 System and method for checking e-mail accessory content
CN101257378A (en) * 2008-04-09 2008-09-03 南京航空航天大学 Anti-disclosure mail safe card and method for detecting disclosure mail
CN104518943A (en) * 2013-09-27 2015-04-15 无锡华润微电子有限公司 Method and system for e-mail management
CN104702451A (en) * 2013-12-04 2015-06-10 大连东浦机电有限公司 Method for monitoring risk of sent public mail based on keyword extraction strategy
CN104361097A (en) * 2014-11-21 2015-02-18 国家电网公司 Real-time detection method for electric power sensitive mail based on multimode matching

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109542847A (en) * 2018-11-05 2019-03-29 努比亚技术有限公司 A kind of document handling method, terminal and readable storage medium storing program for executing
CN110808990A (en) * 2019-11-08 2020-02-18 北京明朝万达科技股份有限公司 Mail transmission method, device, electronic equipment and computer readable storage medium
CN110808990B (en) * 2019-11-08 2021-11-05 北京明朝万达科技股份有限公司 Mail transmission method, device, electronic equipment and computer readable storage medium
CN111698236A (en) * 2020-06-05 2020-09-22 浙江华途信息安全技术股份有限公司 Method and system for preventing leakage of browser
CN112258137A (en) * 2020-09-06 2021-01-22 厦门天锐科技股份有限公司 Mail blocking method and device
CN112214970A (en) * 2020-10-20 2021-01-12 上海科越信息技术股份有限公司 Customs declaration form filling method and device
CN114598673A (en) * 2022-05-09 2022-06-07 太平金融科技服务(上海)有限公司深圳分公司 Electronic mailbox system, mailbox processing method, device and computer equipment

Similar Documents

Publication Publication Date Title
CN106027382A (en) Anti-leakage device and method and user terminal
EP2984863B1 (en) System and method for tracking sms messages
CN105187599B (en) A kind of method for managing contact person information and terminal
CN107122673A (en) A kind of information ciphering method and terminal
CN104657254A (en) Operation information processing method and device
CN106487654A (en) The method of message cluster transmition
CN106034054A (en) Redundant access control list ACL rule file detection method and apparatus thereof
CN104917796A (en) Credit account creating method, system and method
CN104580108B (en) Information cuing method and system, server
JP2020524864A (en) Controlling access to data
CN104281272A (en) Password input processing method and device
CN102271332B (en) End message time slot scrambling and device
Gibson et al. Vulnerability in massive api scraping: 2021 linkedin data breach
CN110175316B (en) Media number interaction method, system and storage medium based on blockchain
CN107315934A (en) Communication message processing method, mobile terminal and storage device
CN110232286A (en) A kind of electric quotient data cochain method and its equipment for applying intelligent contract
CN107124457A (en) Application data synchronous method, application data sychronisation and server
CN106254680A (en) Information processing method and device
CN103795845A (en) Historical interface access method, historical interface access device and mobile terminal
CN110264206A (en) A kind of electric quotient data cochain method and its equipment based on block chain
CN107018224A (en) Contact person's adding method and device during a kind of O2O transaction
CN106295309A (en) The management method of a kind of announcement information and equipment
CN109598601A (en) Account book monitoring method and account book monitoring system based on block chain
CN104301876B (en) The method and apparatus of transmission of message
CN107292194A (en) A kind of data guard method, mobile terminal and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161012