CN101969411A - Method and system for analyzing and restoring unencrypted WEB mail - Google Patents
Method and system for analyzing and restoring unencrypted WEB mail Download PDFInfo
- Publication number
- CN101969411A CN101969411A CN2010102039065A CN201010203906A CN101969411A CN 101969411 A CN101969411 A CN 101969411A CN 2010102039065 A CN2010102039065 A CN 2010102039065A CN 201010203906 A CN201010203906 A CN 201010203906A CN 101969411 A CN101969411 A CN 101969411A
- Authority
- CN
- China
- Prior art keywords
- session
- keyword
- sample storehouse
- analysis
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/216—Handling conversation history, e.g. grouping of messages in sessions or threads
Abstract
The invention discloses a method for analyzing and restoring an unencrypted WEB mail, which comprises the steps of building a mail sample bank corresponding to different types of mail sessions and restoring a mail from the mail session according to the corresponding mail sample bank when a new mail session is intercepted. When the method of the invention is adopted, the unencrypted WEB mail can be monitored conveniently.
Description
Technical field
The present invention relates to communication field, particularly a kind of analysis of non-encrypted WEB mail and method of reducing and system.
Background technology
Use the online computing transmission and receive mail to have obtained general already and application widely,, send and receive mail by surfing Internet with cell phone and also obtained application more and more widely along with the fast development of 3G communication in current society.Yet novel communication mode also is being applied in some unlawful activities, for example mail swindle, and mail sends virus etc.
Needs along with especially anti-terrorism situation of international political situation, each countries and regions are more and more paid close attention to and are adopted various means of communication to carry out unlawful activities, continual renovation and variation along with the communication technology and mode, more urgent to the Lawful Interception demand under the novel communication mode, be mainly reflected in Lawful Interception by traditional voice facsimile class Content of Communication and expand to Lawful Interception IP block domain data content.
Mail under the WEB mode is more common and the higher a kind of novel I P packet domain communication mode of frequency of utilization, terminal by means of multiple extensive use, as PC, mobile phone etc., its user's coverage rate and coverage are very big, so the Lawful Interception of Mail Contents is that IP block domain data content legality is monitored very important part under the WEB mode.
Mail under the WEB mode also has the characteristics of himself:
One, of a great variety.Except the well-known WEB mailing system in some whole world, as Yahoo, Hotma il etc., all there is the comparatively widely used WEB mailing system in locality in each countries and regions.Therefore the practical range and the workload of the Lawful Interception of WEB mode mail can enlarge along with the increase of classification of mail.
Two, application layer protocol unanimity.Owing to all be based on the mail under the WEB mode, therefore the different application layer protocols that mailing system adopted all is http protocol basically, this means that the otherness of distinguishing different types of WEB Mail Contents can be very difficult.
Summary of the invention
The invention provides a kind of analysis and method of reducing of non-encrypted WEB mail, can monitor non-encrypted WEB mail easily.
For solving the problems of the technologies described above, the present invention has adopted following technical scheme:
On the one hand, the invention discloses a kind of analysis and method of reducing of non-encrypted WEB mail, comprise following steps:
Set up the mail sample storehouse of dissimilar mail session correspondences;
After intercepting and capturing the new mail session,, from this mail session, restore mail according to its corresponding mail sample storehouse.
Among the embodiment of the analysis of above-mentioned non-encrypted WEB mail and method of reducing, the described mail sample storehouse of setting up dissimilar mail session correspondences comprises:
Analyze the type of mail session;
Keyword message to the mail session of each type is analyzed, and sets up the mail sample storehouse of the type mail session correspondence.
Among the embodiment of the analysis of above-mentioned non-encrypted WEB mail and method of reducing, described keyword comprises following one or more: sender, recipient, the person of making a copy for, theme, content.
Among the embodiment of the analysis of above-mentioned non-encrypted WEB mail and method of reducing, the keyword message of described mail session to each type is analyzed, and sets up the mail sample storehouse of the type mail session correspondence, carries out as follows:
Analyze the information of message body keyword, set up the text sample storehouse of the type session;
Analyze the information of Email attachment keyword, set up the annex sample storehouse of the type session;
Analyze the information of the keyword in its message body sample storehouse and annex sample storehouse, set up the related of message body and annex.
Among the embodiment of the analysis of above-mentioned non-encrypted WEB mail and method of reducing, the information of the information of described message body keyword and Email attachment keyword is the position of each keyword in the type session.
Among the embodiment of the analysis of above-mentioned non-encrypted WEB mail and method of reducing, described keyword residing position in session comprises following one or more: be in session upstream request, be in the downstream response of session, the original position in session.
Among the embodiment of the analysis of above-mentioned non-encrypted WEB mail and method of reducing, related message body sample of described foundation and accessory association are: the corresponding relation of the same section in message body sample storehouse and the annex sample storehouse keyword message.
Among the embodiment of the analysis of above-mentioned non-encrypted WEB mail and method of reducing, after the session of described intercepting and capturing new mail,, from this mail session, restore mail, comprising according to its corresponding mail sample storehouse:
Intercept and capture the mail session that needs reduction;
Judge the type of this mail session;
In respective type mail session corresponding sample database, contrast mail keyword residing position in session restores mail from this mail session.
Among the embodiment of the analysis of above-mentioned non-encrypted WEB mail and method of reducing, in respective type mail session corresponding sample database, contrast mail keyword residing position in session restores mail from this mail session, carry out as follows:
Contrast each residing position of text keyword, message body sample storehouse restores message body from this mail session;
Contrast each residing position of annex keyword, Email attachment sample storehouse restores Email attachment from this mail session;
According to the association between message body and the annex, the annex after the reduction is attached in the text.
On the other hand, the invention also discloses a kind of analysis and restoring system of non-encrypted WEB mail, comprise e-mail analysis module and mail recovery module, described e-mail analysis module is used to set up the mail sample storehouse of dissimilar mail session correspondences; After described mail recovery module is used to intercept and capture the new mail session,, from this mail session, restore mail according to its corresponding mail sample storehouse.
The invention has the beneficial effects as follows:
Obtain mail session when the present invention analyzes earlier, set up the mail sample storehouse of dissimilar mail session correspondences; Intercept and capture the new mail session when reduction, according to its corresponding mail sample storehouse, restoring from this mail session can be for the mail of reading.The present invention can be reduced to dissimilar mail sessions and can monitor unencrypted WEB mail easily, maintaining network safety for the mail of reading.
Description of drawings
Fig. 1 has exemplarily described the flow chart of the analytical method of non-encrypted WEB mail of the present invention;
Fig. 2 has exemplarily described the flow chart of the method for reducing of non-encrypted WEB mail of the present invention;
Fig. 3 has exemplarily described system construction drawing of the present invention.
Embodiment
In conjunction with the accompanying drawings the present invention is described in further detail below by embodiment.
The invention discloses a kind of analysis and method of reducing of non-encrypted WEB mail, comprise following steps:
Set up the mail sample storehouse of dissimilar mail session correspondences;
After intercepting and capturing the new mail session,, from this mail session, restore mail according to its corresponding mail sample storehouse.
Embodiment one:
As shown in Figure 1, the analytical method of the non-encrypted WEB mail of one embodiment of the invention comprises following steps:
All information that comprise an envelope mail in mail session.
Mail session is with mail packet or data flow after handling such as encode, can transmit, but can't direct reading.Email type difference, the processing difference of mail process, the type of the mail session of generation are also different.
The type of mail is a lot, Yahoo for example, and Hotmail etc. in order to reduce the mail of a certain type, must at first obtain the mail session of the type.
Because internet data can produce situations such as packet loss, duplicate packages, therefore every type mail should obtain a plurality of mail sessions as sample, to reduce the mail reduction mistake that causes owing to the sample data mistake.Generally speaking, two parts of mail session samples should be arranged at least.
The message body keyword comprises Email Sender, recipient, the person of making a copy for, theme, content etc.; If above each the text keyword of the information spinner during analysis residing position in the session of the type.
Text keyword residing position in session comprises that this text keyword is the downstream response that is in the upstream request of session or is in session, also comprises the original position of above-mentioned keyword in session.
The mail sample session of every type acquisition conversation has many parts, if the information of the keyword of these mail sample session is identical, then sets up sample database according to this; If the information difference of these sample keywords is then given up the different sample of minority, set up sample database according to majority principle.
The Email attachment keyword message comprises sender, recipient, the person of making a copy for, theme, content of annex etc.; The information spinner of analysis of key word will be analyzed above each keyword residing position in the session of the type.
Annex keyword residing position in session comprises that this annex keyword is the downstream response that is in the upstream request of session or is in session, also comprises the original position of above-mentioned annex keyword in session.
The corresponding relation of the same section in the information that message body sample of setting up and accessory association are message body sample storehouse and annex sample storehouse keyword.
Set up the related of Email attachment and text mainly in order to determine that annex is to be attached to where to seal in the mail.
Embodiment two:
The reduction process of mail is to extract useful information from the mail session through processing such as codings, and being reduced into can be for the mail of reading.
The method of reducing of the non-encrypted WEB mail of one embodiment of the invention comprises following steps:
Step 201 is intercepted and captured the mail session that needs reduction.
Step 202 judges that it belongs to the session of which kind of type, judges whether the session sample storehouse of the type exists.
Step 205 according to the association between message body and the annex, is put into mail with the annex after the reduction.
If do not have the annex keyword in this mail session, then can omit step 204 and step 205.
Embodiment three:
With the Yahoo mail is example, and a specific embodiment of the analysis of non-encrypted WEB mail of the present invention and method of reducing comprises following steps:
Step 301 is obtained multiple mail session, comprising the Yahoo mail session of http protocol as sample.
Whether step 302 judges every type the sample size that obtains more than or equal to N, and the recommended value of N is at least more than or equal to 2.If sample size more than or equal to N, then continues following steps; If sample size less than N, then continues to obtain the mail data ladle sample originally.
Guarantee sample size be in order to reduce more than or equal to N since when intercepting and capturing sample data because the mistake during the mail reduction that the sample data mistake that other reasonses such as packet loss, time-delay produce causes has improved the accuracy when mail reduces.
Step 303 for the mail session of each type, is analyzed the information of message body keyword.
The message body keyword comprises sender, recipient, the person of making a copy for, theme, content etc.; During the information of analysis of key word mainly according to source IP, purpose IP and port numbers in the packet, from the protocol data bag of HTTP, filter out the packet that belongs to same http session, determine keyword wherein, and determine above each text keyword residing position in this mail session.
Text keyword residing position in mail session comprises that this text keyword is the downstream response that is in the upstream request of session or is in session, also comprises the original position of above-mentioned keyword in session.
For example, can set up a conversational list this moment, each cell is corresponding to one section byte in the http protocol session or address, conversational list is divided into upstream request conversational list and downstream response conversational list, in conversational list, indicate the residing cell of each keyword, corresponding to the one section byte or the address of each keyword in the session in http data, for example " sender " is the first module lattice, corresponding to one section specified byte in the session or address.
Step 304 is set up the text sample database with the information of the text keyword of all sample posts after analyzing.
Step 305 for the mail session of each type, is analyzed the information of Email attachment keyword.
Step 306 is set up the annex sample database with the information of the annex keyword of all sample posts after analyzing.
The method of setting up the annex sample database repeats no more with to set up the text sample database similar herein.
Step 307 is analyzed message body sample storehouse and annex sample storehouse keyword, sets up the related of message body and annex.
For example, in the text upstream request conversational list of setting up, the first module lattice are " senders ", and in the annex upstream request form of setting up, second cell all is " sender ", then sets up the association of text upstream request form first module lattice to annex upstream request form second cell.After the association of all keywords was all set up, this message body had just been set up related with annex.
Step 308 is intercepted and captured the mail session that needs reduction, is the Yahoo mail session of http protocol in the present embodiment.
Step 309 is judged the type of above-mentioned mail session, if the type session sample stock exists, then turns to the type session sample storehouse, if the type session sample storehouse does not exist, then finishes the mail reduction.
Step 310 judges that this session is upstream request or downstream response, if upstream request is then changeed step 311; If descending request then forwards step 314 to.
Step 311, the residing position of text keyword in the upstream request restores message body in the contrast message body sample storehouse from session.
For example in text sample storehouse, in the upstream request, a certain address correspondence be " sender ", think then that in the message body of needs reduction that identical address is also corresponding is " sender ", according to this specifying information of reduction " sender "; If identical address does not have related data, then think and go back primary failure, turn to step 309.
The particular content of all keyword correspondences is restored, promptly reduce except message body.
Step 312, contrast each residing position of annex keyword, annex sample storehouse restores Email attachment from session.
If do not find each annex keyword in the packet that needs to reduce, then showing in this mail does not have annex, can omit this step.
Step 313, if the coupling of the association between message body and the annex, the annex after then will reducing is put into mail, is reduced to complete mail; If do not match, then forward step 309 to.
Step 314, each residing position of text keyword in the downstream response of contrast message body sample storehouse restores message body from session.
Step 315, contrast each residing position of annex keyword, annex sample storehouse restores Email attachment from session.
Step 316, if the coupling of the association between message body and the annex, the annex after then will reducing is put into mail, being reduced to can be for the mail of reading.
If do not have annex in this mail, can omit step relevant in the reduction process with annex.
Embodiment three:
As shown in Figure 3, the branch of one embodiment of the invention is encrypted WEB e-mail analysis and restoring system, and comprise following: comprise e-mail analysis module and mail recovery module, described e-mail analysis module is used to set up the mail sample storehouse of dissimilar mail session correspondences; After described mail recovery module is used to intercept and capture the new mail session,, from this mail session, restore mail according to its corresponding mail sample storehouse.
Obtain mail session when the present invention analyzes earlier, set up the mail sample storehouse of dissimilar mail session correspondences; Intercept and capture the new mail session when reduction, according to its corresponding mail sample storehouse, restoring from this mail session can be for the mail of reading.The present invention can be reduced to dissimilar mail sessions and can monitor unencrypted WEB mail easily for the mail of reading, and has safeguarded network security.In addition, the present invention has adopted for every type mail when setting up the sample storehouse and has obtained a plurality of mail sessions, can improve the accuracy of mail reduction.
Above content be in conjunction with concrete execution mode to further describing that the present invention did, can not assert that concrete enforcement of the present invention is confined to these explanations.For the general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, can also make some simple deduction or replace, all should be considered as belonging to protection scope of the present invention.
Claims (10)
1. the analysis of a non-encrypted WEB mail and method of reducing is characterized in that, comprise following steps:
Set up the mail sample storehouse of dissimilar mail session correspondences;
After intercepting and capturing the new mail session,, from this mail session, restore mail according to its corresponding mail sample storehouse.
2. the analysis of non-encrypted WEB mail as claimed in claim 1 and method of reducing is characterized in that, the described mail sample storehouse of setting up dissimilar mail session correspondences comprises:
Analyze the type of mail session;
Keyword message to the mail session of each type is analyzed, and sets up the mail sample storehouse of the type mail session correspondence.
3. the analysis of non-encrypted WEB mail as claimed in claim 2 and method of reducing is characterized in that, described keyword comprises following one or more: sender, recipient, the person of making a copy for, theme, content.
4. the analysis of non-encrypted WEB mail as claimed in claim 3 and method of reducing is characterized in that, the keyword message of described mail session to each type is analyzed, and sets up the mail sample storehouse of the type mail session correspondence, carries out as follows:
Analyze the information of message body keyword, set up the text sample storehouse of the type session;
Analyze the information of Email attachment keyword, set up the annex sample storehouse of the type session;
Analyze the information of the keyword in its message body sample storehouse and annex sample storehouse, set up the related of message body and annex.
5. the analysis of non-encrypted WEB mail as claimed in claim 4 and method of reducing is characterized in that, the information of the information of described message body keyword and Email attachment keyword is the position of each keyword in the type session.
6. the analysis of non-encrypted WEB mail as claimed in claim 5 and method of reducing, it is characterized in that described keyword residing position in session comprises following one or more: be in session upstream request, be in the downstream response of session, the original position in session.
7. the analysis of non-encrypted WEB mail as claimed in claim 6 and method of reducing is characterized in that, related message body sample of described foundation and accessory association are: the corresponding relation of the same section in message body sample storehouse and the annex sample storehouse keyword message.
8. the analysis of non-encrypted WEB mail as claimed in claim 7 and method of reducing is characterized in that, after the session of described intercepting and capturing new mail, according to its corresponding mail sample storehouse, restore mail from this mail session, comprising:
Intercept and capture the mail session that needs reduction;
Judge the type of this mail session;
In respective type mail session corresponding sample database, contrast mail keyword residing position in session restores mail from this mail session.
9. the analysis of non-encrypted WEB mail as claimed in claim 8 and method of reducing, it is characterized in that, in respective type mail session corresponding sample database, contrast mail keyword residing position in session, from this mail session, restore mail, carry out as follows:
Contrast each residing position of text keyword, message body sample storehouse restores message body from this mail session;
Contrast each residing position of annex keyword, Email attachment sample storehouse restores Email attachment from this mail session;
According to the association between message body and the annex, the annex after the reduction is attached in the text.
10. the analysis of a non-encrypted WEB mail and restoring system is characterized in that, comprise e-mail analysis module and mail recovery module, and described e-mail analysis module is used to set up the mail sample storehouse of dissimilar mail session correspondences; After described mail recovery module is used to intercept and capture the new mail session,, from this mail session, restore mail according to its corresponding mail sample storehouse.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010203906.5A CN101969411B (en) | 2010-06-18 | 2010-06-18 | A kind of analysis-reduction method and system of non-encrypted WEB mail |
PCT/CN2011/075115 WO2011157161A1 (en) | 2010-06-18 | 2011-06-01 | Method and system for analyzing and restoring non-encrypted web mails |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010203906.5A CN101969411B (en) | 2010-06-18 | 2010-06-18 | A kind of analysis-reduction method and system of non-encrypted WEB mail |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101969411A true CN101969411A (en) | 2011-02-09 |
CN101969411B CN101969411B (en) | 2016-01-13 |
Family
ID=43548516
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010203906.5A Active CN101969411B (en) | 2010-06-18 | 2010-06-18 | A kind of analysis-reduction method and system of non-encrypted WEB mail |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101969411B (en) |
WO (1) | WO2011157161A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102130847A (en) * | 2011-02-18 | 2011-07-20 | 杭州迪普科技有限公司 | Audit method and device of web mails |
WO2011157161A1 (en) * | 2010-06-18 | 2011-12-22 | 中兴通讯股份有限公司 | Method and system for analyzing and restoring non-encrypted web mails |
CN102655482A (en) * | 2011-12-26 | 2012-09-05 | 上海西默通信技术有限公司 | HTTP (hyper text transport protocol) protocol analysis based web E-mail recovering method |
CN103631975A (en) * | 2013-12-26 | 2014-03-12 | 成都科来软件有限公司 | Data extraction method and device |
CN104202232A (en) * | 2014-08-07 | 2014-12-10 | 北京网康科技有限公司 | Internet email processing method and device |
CN109600304A (en) * | 2018-12-21 | 2019-04-09 | 成都九洲电子信息系统股份有限公司 | Based on time wheel mail data reduction, threat detection and trend behavior analysis method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105490920A (en) * | 2015-11-25 | 2016-04-13 | 深圳市视维科技有限公司 | Electronic mail sending system and electronic mail monitoring method |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101257378A (en) * | 2008-04-09 | 2008-09-03 | 南京航空航天大学 | Anti-disclosure mail safe card and method for detecting disclosure mail |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969411B (en) * | 2010-06-18 | 2016-01-13 | 中兴通讯股份有限公司 | A kind of analysis-reduction method and system of non-encrypted WEB mail |
-
2010
- 2010-06-18 CN CN201010203906.5A patent/CN101969411B/en active Active
-
2011
- 2011-06-01 WO PCT/CN2011/075115 patent/WO2011157161A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101257378A (en) * | 2008-04-09 | 2008-09-03 | 南京航空航天大学 | Anti-disclosure mail safe card and method for detecting disclosure mail |
Non-Patent Citations (2)
Title |
---|
王亚: "电子邮件监听系统的分析与研究", 《贵州大学学士论文》, 17 March 2008 (2008-03-17) * |
肖道举等: "基于网络数据包的邮件信息获取技术研究", 《微计算机信息》, vol. 23, 25 October 2007 (2007-10-25) * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011157161A1 (en) * | 2010-06-18 | 2011-12-22 | 中兴通讯股份有限公司 | Method and system for analyzing and restoring non-encrypted web mails |
CN102130847A (en) * | 2011-02-18 | 2011-07-20 | 杭州迪普科技有限公司 | Audit method and device of web mails |
CN102655482A (en) * | 2011-12-26 | 2012-09-05 | 上海西默通信技术有限公司 | HTTP (hyper text transport protocol) protocol analysis based web E-mail recovering method |
CN102655482B (en) * | 2011-12-26 | 2014-11-05 | 上海西默通信技术有限公司 | HTTP (hyper text transport protocol) protocol analysis based web E-mail recovering method |
CN103631975A (en) * | 2013-12-26 | 2014-03-12 | 成都科来软件有限公司 | Data extraction method and device |
CN104202232A (en) * | 2014-08-07 | 2014-12-10 | 北京网康科技有限公司 | Internet email processing method and device |
CN109600304A (en) * | 2018-12-21 | 2019-04-09 | 成都九洲电子信息系统股份有限公司 | Based on time wheel mail data reduction, threat detection and trend behavior analysis method |
Also Published As
Publication number | Publication date |
---|---|
CN101969411B (en) | 2016-01-13 |
WO2011157161A1 (en) | 2011-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101969411B (en) | A kind of analysis-reduction method and system of non-encrypted WEB mail | |
CN104462509A (en) | Review spam detection method and device | |
CN101674318A (en) | Method for pushing data to mobile equipment at regular time | |
CN106341303B (en) | Sender reputation's generation method based on mail user behavior | |
Li et al. | Detection method of phishing email based on persuasion principle | |
CN101789105B (en) | Packet-level dynamic mail attachment virus detection method | |
CN101795273B (en) | Method and device for filtering junk mail | |
CN103812679A (en) | Mass log statistical analysis system and method | |
CN103425930B (en) | A kind of online script detection method and system in real time | |
CN102271331A (en) | Method and system for detecting reliability of service provider (SP) site | |
CN102916947A (en) | Cloud computing-based anti-spam system | |
CN102469031A (en) | Method and system for monitoring group members by local area network instant messaging group | |
CN102438233B (en) | Detection method for mobile phone worms | |
Xie et al. | The security issue of WSNs based on cloud computing | |
CN109347727A (en) | A kind of social network information delivery system | |
CN105049456A (en) | Covert communication method based on webpage link request | |
EP2103084B1 (en) | An intelligent system of unified content posting | |
CN103647776B (en) | Media resource synchronization method and system for multiple terminals | |
CN107154926A (en) | A kind of recognition methods and system for forging the fishing mail of sender | |
CN104702451A (en) | Method for monitoring risk of sent public mail based on keyword extraction strategy | |
CN104202232A (en) | Internet email processing method and device | |
CN112087369B (en) | Mail filtering method, device, equipment and storage medium | |
Surakratanasakul et al. | Blockchain Ecosystem to Raise Thailand’s Telecommunication Sector to a Smart Society According to Thailand 4.0 Policy | |
CN106131037A (en) | A kind of internet trade method | |
CN1285200C (en) | Method for safety transmitting wirelss E-mail in local area network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201112 Address after: No.8, wisdom Avenue, Donghu scenic area, Dayu Town, Rudong County, Nantong City, Jiangsu Province, 226000 Patentee after: Nantong Donghu International Travel Agency Co., Ltd Address before: 518057 Zhongxing building, science and technology south road, Nanshan District Science Park, Guangdong, Shenzhen Patentee before: ZTE Corp. |