CN103023655B - Network safety system - Google Patents

Network safety system Download PDF

Info

Publication number
CN103023655B
CN103023655B CN201210540000.1A CN201210540000A CN103023655B CN 103023655 B CN103023655 B CN 103023655B CN 201210540000 A CN201210540000 A CN 201210540000A CN 103023655 B CN103023655 B CN 103023655B
Authority
CN
China
Prior art keywords
email
module
submodule
mail
safety system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210540000.1A
Other languages
Chinese (zh)
Other versions
CN103023655A (en
Inventor
唐焕焕
赵崇山
樊兴军
孙征
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shuguang Cloud Computing Group Co ltd
Original Assignee
SHUGUANG CLOUD COMPUTING TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHUGUANG CLOUD COMPUTING TECHNOLOGY Co Ltd filed Critical SHUGUANG CLOUD COMPUTING TECHNOLOGY Co Ltd
Priority to CN201210540000.1A priority Critical patent/CN103023655B/en
Publication of CN103023655A publication Critical patent/CN103023655A/en
Application granted granted Critical
Publication of CN103023655B publication Critical patent/CN103023655B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a kind of network safety system, comprising: for received Email is carried out safety monitoring monitoring modular, for by E-mail enciphered processing module, be used for checking the deciphering module of the Email deciphering through encryption and being used for through deciphering Email check module.IP Security performance is improved by network safety system described in the invention.

Description

Network safety system
Technical field
The present invention relates generally to network field, more specifically, relates to a kind of network safety system.
Background technology
Email is most popular a kind of service on Internet.As long as user can be connected with Intemet, there is the E-mail address of the program that can send and receive e-mail and individual, just can with Intemet on there are all users of E-mail address exchange Email easily and fast, economically, Email is widely used in the mechanisms such as individual, tissue, government, the wide e-mail system of current application is as follows, based on the mailing system of Postfix/Qmail;Mailbox based on Postfix, yahoo is based on Qmail system;The Exchange mailing system of Microsoft;IBMLotusDomino mailing system;Scalix mailing system;Zimbra mailing system;MDeamon mailing system.
But current e-mail system all also exists following safety problem: password conjecture, user list conjecture, virus email, storage safety etc., what above safety problem was serious have impact on the use of e-mail system.
Summary of the invention
For the defect of above-mentioned prior art, the present invention proposes a kind of network safety system, addresses how to improve the technical problem of IP Security performance.
According to an aspect of the invention, it is provided a kind of network safety system, including: monitoring modular, for received Email is carried out safety monitoring;Processing module, for by described E-mail enciphered;Deciphering module, for by the Email deciphering through encryption;And check module, for checking the Email through deciphering.
In described network safety system, described monitoring modular farther includes: virus monitor submodule, for monitoring whether received Email is infected;And junk mail watch submodule, for monitoring whether received Email is the unauthorized Email of malice.
In described network safety system, described monitoring modular is additionally operable to received information is performed intrusion detection, and wherein, described monitoring modular also includes: intrusion detection submodule, for monitoring whether received information comprises intrusion behavior.
In described network safety system, described monitoring modular also includes: vulnerability scanning submodule, for reporting to the police when finding and having leak in described network safety system.
In described network safety system, if detecting that received Email is infected by described virus monitor submodule, monitor received Email by described junk mail watch submodule to be spam and/or comprise intrusion behavior by the information received by described intrusion detection submodule, then received Email and/or received information are abandoned.
In described network safety system, described processing module is additionally operable to encapsulate described Email with predetermined encapsulation format.
In described network safety system, described processing module farther includes: encapsulation submodule, for by the mail head of received Email carrying out name translation and/or encapsulating described Email by the beginning of the mail body of received Email mark is carried out conversion;And encryption submodule, for received Email not landed encryption.
In described network safety system, the Email deciphered through described deciphering module is still the form after described encapsulation submodule encapsulates.
In described network safety system, described processing module is connected with described deciphering module by the first unidirectional device, with described, described deciphering module checks that module is connected by the second unidirectional device.
In described network safety system, also including: sending module, be used for sending Email, described sending module is independent of described monitoring modular, described processing module, described deciphering module and described checks module.
IP Security performance is improved by network safety system described in the invention.
Accompanying drawing explanation
Accompanying drawing is for providing a further understanding of the present invention, and constitutes a part for description, is used for together with embodiments of the present invention explaining the present invention, is not intended that limitation of the present invention.In the accompanying drawings:
Fig. 1 is the schematic diagram of the embodiment of the network according to the invention security system 100;
Fig. 2 is the schematic diagram of the example of the network according to the invention security system.
Detailed description of the invention
Below in conjunction with accompanying drawing, the preferred embodiments of the present invention are illustrated, it will be appreciated that preferred embodiment described herein is merely to illustrate and explains the present invention, is not intended to limit the present invention.
Fig. 1 is the schematic diagram of the embodiment of the network according to the invention security system 100.In FIG, network safety system 100 includes monitoring modular 102, processing module 104, deciphering module 106 and checks module 108.Wherein, monitoring modular 102 is for carrying out safety monitoring to the Email received from external network.Processing module 104 is for being encrypted the Email received.Deciphering module 106 is for by the Email deciphering through encryption.Check that module 108 is for checking the Email through deciphering.
Specifically, virus and spam can be monitored by monitoring modular, and it can specifically include for monitoring virus monitor submodule that whether received Email be infected and for monitoring the junk mail watch submodule whether received Email is the unauthorized Email of malice.Whether virus monitor submodule can contain virus document in the adnexa in Email and monitor whether this Email is infected by mail by monitoring, and whether junk mail watch submodule can have the content in corresponding authority and Email and whether contain preset keyword and judge whether this Email belongs to maliciously unauthorized mail by monitoring the addresser of Email.The unauthorized mail of this malice includes but not limited to advertisement matter, swindle mail etc..
Except the monitoring carried out at software view above, monitoring modular 102 can also be monitored at hardware view.Specifically, monitoring modular can be also used for received information is performed intrusion detection, and monitoring modular can also include: for monitoring whether received information comprises intrusion behavior intrusion detection submodule.Such as, can be tackled by above-mentioned monitoring modular network can occur by frequently to same target send a large amount of invalid packets the attack of " corpse machine "." corpse machine " can by frequently taking a large amount of system resources of this object in the short time to the same target a large amount of invalid packets of transmission, thus causing that object is paralysed, monitoring modular can tackle this situation by intrusion detection submodule.
Additionally, above-mentioned monitoring modular 102 could be included for the vulnerability scanning submodule carrying out reporting to the police when finding and having leak in described network safety system.
If detecting that received Email is infected by virus monitor submodule, monitor received Email by junk mail watch submodule to be spam and/or comprise intrusion behavior by the information received by intrusion detection submodule, then received Email and/or received information are abandoned.
By the network safety system in the present embodiment, it is possible to improve safety, specifically comprehensively, it is possible to from two aspects of hardware and software, system is carried out full protection.
In a preferred embodiment, processing module is except being encrypted, it is also possible to for encapsulating Email with predetermined encapsulation format.In other words, processing module may further include encapsulation submodule and encryption submodule, this encapsulation submodule for by carrying out name translation and/or encapsulating Email by the beginning of the mail body of received Email mark is carried out conversion to the mail head of received Email, and this encryption submodule for not landing encryption to received Email.Wherein, Email can be encapsulated as predetermined encapsulation format by above-mentioned conversion by encapsulation submodule, such that make this Email be trapped or obtained by other people, it also cannot check the particular content of this envelope Email.Preferably, above-mentioned do not land encryption and refer to and be arranged in internal memory at Email and just this Email be encrypted without when storing in a hard disk.
Preferably, can no longer carry out decapsulation behavior after being packaged, have been used up packaged form and be read out, the operation such as check, say, that the Email through deciphering module deciphering be still the form after encapsulation submodule encapsulates.
Above preferred embodiment strengthens the safety of system in encapsulation and encryption two.
In a further advantageous embodiment, processing module can be connected with deciphering module by the first unidirectional device, and deciphering module can pass through the second unidirectional device and check that module is connected.Unidirectional device is a kind of hardware device, it is ensured that data can only flow to another direction from a direction, and can not be reversed.
In above preferred embodiment, by use unidirectional device can to processing module 104, deciphering module 106 with check that module 108 is isolated with external network further, thus improve security of system.
Additionally, network safety system 100 could be included for sending Email sending module.This sending module is independent of monitoring modular, processing module, deciphering module and checks module.
Fig. 2 is the schematic diagram of the example of the network according to the invention security system.
Present invention achieves a kind of Secure E-Mail System for solving above-mentioned safety problem, native system thoroughly solves the safety problem that existing mailing system exists.The present invention includes two parts, mail reception service end and mail and sends service end.Part receives the safety that service end certified mail receives and stores, and mail sends service end to be only responsible for sending mail, is completely independent with mail reception service end.Mail sends service end and includes a mail sending module, is responsible for sending to mail reception service end mail.Mail reception service end includes three submodules: safety protection module, mail treatment module, mail deciphering module and mail check module.
Mail reception process comprises the following steps, such as Fig. 2:
1) mail enters safety protection module by outer net, the safety protection module mail to receiving carries out the safety monitoring of series, including: intrusion detection, virus monitor, junk mail watch, if there being arbitrary detection to pinpoint the problems, then this envelope mail is then dropped;
2) after mail is by all of safety monitoring, entering mail treatment module, this module is by the form mail received carried out again encapsulation and encryption of not landing, it is ensured that even if having unauthorized user to obtain mail also cannot check the content of mail;
3) mail deciphering module is entered at mail after encapsulation and encryption by a unidirectional device, owing to this module is isolated in external network through unidirectional device, so network environment is perfectly safe, this module is responsible for the mail received is decrypted, recover the plaintext of mail, but at this moment mail is still the form after encapsulation, even if unauthorized user obtains this envelope mail and general Mail Clients still cannot be used to check Mail Contents;
4) enter mail through the mail of deciphering again by a unidirectional device and check module, this module is responsible for specially and the mail of form after this encapsulation is checked, owing to this module employs again unidirectional device and the isolation of mail deciphering module, further ensure safety.
The present invention achieves IP Security protection requirements by safety protection module, it is ensured that the mail entering mail reception service end is safe and reliable;It is packaged and does not land encrypting the safety that ensure that mail in next transmission and storing process to mail by mail treatment module;Pass through unidirectional device, it is ensured that data stream can only flow into from outer net and can not flow out, it is ensured that the mail received cannot illegally be sent to outer net.Check that the operation of mail carries out at internal network completely, it is ensured that user identity, email storage safety.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (7)

1. a network safety system, it is characterised in that including:
Monitoring modular, for carrying out safety monitoring to received Email;
Processing module, is used for described E-mail enciphered, and, encapsulate described Email with predetermined encapsulation format;
Deciphering module, for by the Email deciphering through encryption;And
Check module, for checking the Email through deciphering;
Wherein, described monitoring modular farther includes:
Virus monitor submodule, for monitoring whether received Email is infected;And
Junk mail watch submodule, for monitoring whether received Email is the unauthorized Email of malice;
Wherein, described processing module farther includes:
Encapsulation submodule, for by carrying out name translation and/or encapsulating described Email by the beginning of the mail body of received Email mark is carried out conversion to the mail head of received Email;And
Encryption submodule, for not landing encryption to received Email.
2. network safety system according to claim 1, it is characterized in that, described monitoring modular is additionally operable to received information is performed intrusion detection, wherein, described monitoring modular also includes: intrusion detection submodule, for monitoring whether received information comprises intrusion behavior.
3. network safety system according to claim 1, it is characterised in that described monitoring modular also includes: vulnerability scanning submodule, for reporting to the police when finding and having leak in described network safety system.
4. network safety system according to claim 2, it is characterized in that, if detecting that received Email is infected by described virus monitor submodule, monitor received Email by described junk mail watch submodule to be spam and/or monitor received information by described intrusion detection submodule and comprise intrusion behavior, then received Email and/or received information are abandoned.
5. network safety system according to claim 1, it is characterised in that the Email deciphered through described deciphering module is still the form after described encapsulation submodule encapsulates.
6. network safety system according to claim 1, it is characterised in that described processing module is connected with described deciphering module by the first unidirectional device, with described, described deciphering module checks that module is connected by the second unidirectional device.
7. network safety system according to claim 1, it is characterised in that also include: sending module, is used for sending Email, and described sending module is independent of described monitoring modular, described processing module, described deciphering module and described checks module.
CN201210540000.1A 2012-12-13 2012-12-13 Network safety system Active CN103023655B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210540000.1A CN103023655B (en) 2012-12-13 2012-12-13 Network safety system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210540000.1A CN103023655B (en) 2012-12-13 2012-12-13 Network safety system

Publications (2)

Publication Number Publication Date
CN103023655A CN103023655A (en) 2013-04-03
CN103023655B true CN103023655B (en) 2016-06-29

Family

ID=47971817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210540000.1A Active CN103023655B (en) 2012-12-13 2012-12-13 Network safety system

Country Status (1)

Country Link
CN (1) CN103023655B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830325B (en) * 2019-11-05 2021-05-14 北京云杉世纪网络科技有限公司 Adaptive network bypass path network flow direction speculation method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170401A (en) * 2006-10-27 2008-04-30 鸿富锦精密工业(深圳)有限公司 Email encryption/decryption system and its method
CN102055722A (en) * 2009-10-28 2011-05-11 上海中标软件有限公司 Implementation method for ensuring secure storage of electronic mails

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR9806000A (en) * 1997-06-17 2000-01-25 Purdue Pharma Lp Self-destructive document and system for sending messages by e-mail.

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170401A (en) * 2006-10-27 2008-04-30 鸿富锦精密工业(深圳)有限公司 Email encryption/decryption system and its method
CN102055722A (en) * 2009-10-28 2011-05-11 上海中标软件有限公司 Implementation method for ensuring secure storage of electronic mails

Also Published As

Publication number Publication date
CN103023655A (en) 2013-04-03

Similar Documents

Publication Publication Date Title
US9094338B2 (en) Attributes of captured objects in a capture system
US8010689B2 (en) Locational tagging in a capture system
KR101137089B1 (en) Validating inbound messages
CN110177046B (en) Security exchange chip based on mimicry thought, implementation method and network exchange equipment
CN106060003A (en) Network boundary unidirectional isolated transmission device
CN103181124A (en) System and method for secure use of messaging systems
US20130103944A1 (en) Hypertext Link Verification In Encrypted E-Mail For Mobile Devices
Derouet Fighting phishing and securing data with email authentication
US20160191470A1 (en) Method and apparatus for securely transmitting communication between multiple users
CN101558599A (en) Client device, mail system, program, and recording medium
Punarselvam et al. Effective and Efficient Traffic Scrutiny in Sweet Server with Data Privacy
Castiglione et al. E-mail-based covert channels for asynchronous message steganography
US20140181516A1 (en) Detection method for fraudulent mail, detection program therefor, and detection device therefor
CN103023655B (en) Network safety system
Ahmed et al. Eliminate spoofing threat in IPv6 tunnel
KR102494546B1 (en) A mail security processing device and an operation method of Email access security system providing mail communication protocol-based access management and blocking function
US20070297408A1 (en) Message control system in a shared hosting environment
CA2793422A1 (en) Hypertext link verification in encrypted e-mail for mobile devices
Schulz et al. d 2 Deleting Diaspora: Practical attacks for profile discovery and deletion
León et al. Using of an anonymous communication in e-government services: in the prevention of passive attacks on a network
EP2963864A1 (en) Computing system and method for identifying files transmitted to an external network
CN102300176B (en) Method and system for enhancing security of email of mobile terminal system based on secure TransFlash (TF) card
CN107147607A (en) A kind of safe computer network system
Ahmad et al. Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution
Wolthusen A distributed multipurpose mail guard

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100193 Beijing, Haidian District, northeast Wang West Road, building 8, building 36, floor 5

Patentee after: Shuguang Cloud Computing Group Co.,Ltd.

Address before: 100193 Beijing, Haidian District, northeast Wang West Road, building 8, building 36, floor 5

Patentee before: DAWNING CLOUD COMPUTING TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 100193 5 floor, 36 building, No. 8 Northeast Road, Haidian District, Beijing.

Patentee after: Shuguang Cloud Computing Group Co.,Ltd.

Country or region after: China

Address before: 100193 5 floor, 36 building, No. 8 Northeast Road, Haidian District, Beijing.

Patentee before: Shuguang Cloud Computing Group Co.,Ltd.

Country or region before: China