CN105553956A - Mail blocking method and device based on sensitive information recognition - Google Patents
Mail blocking method and device based on sensitive information recognition Download PDFInfo
- Publication number
- CN105553956A CN105553956A CN201510907418.5A CN201510907418A CN105553956A CN 105553956 A CN105553956 A CN 105553956A CN 201510907418 A CN201510907418 A CN 201510907418A CN 105553956 A CN105553956 A CN 105553956A
- Authority
- CN
- China
- Prior art keywords
- sensitive information
- editor
- described mail
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000000903 blocking effect Effects 0.000 title claims abstract description 21
- 238000005516 engineering process Methods 0.000 claims description 23
- 230000005540 biological transmission Effects 0.000 claims description 17
- 238000001514 detection method Methods 0.000 claims description 11
- 238000012544 monitoring process Methods 0.000 abstract description 10
- 238000001914 filtration Methods 0.000 abstract description 3
- 230000002265 prevention Effects 0.000 abstract description 3
- 230000006399 behavior Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 101001094649 Homo sapiens Popeye domain-containing protein 3 Proteins 0.000 description 1
- 101000608234 Homo sapiens Pyrin domain-containing protein 5 Proteins 0.000 description 1
- 101000578693 Homo sapiens Target of rapamycin complex subunit LST8 Proteins 0.000 description 1
- 102100027802 Target of rapamycin complex subunit LST8 Human genes 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000008140 language development Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Abstract
The invention discloses a mail blocking method and device based on sensitive information recognition, and the method comprises the steps: obtaining a mail which is sent by a user from an intranet to an extranet; carrying out the recognition of sensitive information of the obtained mail, blocking the mail and reminding a user when the mail is recognized to contain the sensitive information; obtaining the mail after the main is edited by the user, and enabling the edited mail to be sent. The method can achieve the complete checking, filtering and monitoring of a Web mail and a client mail, can effectively reduce possibility that employees of enterprises leaks information and secrets through information extranet mails, and achieves the blocking, prevention and monitoring of the leakage of sensitive information of the mails. The method achieves a fine grit purpose of person monitoring, mailbox monitoring, time monitoring and content monitoring. The method greatly improves the capability of information leakage prevention, and reduces the risk of sensitive information leakage of the mails.
Description
Technical field
The present invention relates to technical field of network information, refer to a kind of mail blocking-up method based on sensitive information identification and device especially.
Background technology
Along with developing rapidly of internet, applications, computer network is popularized rapidly in every field that is economic and life, the acquisition of information, shares and propagates convenient.The degree of dependence of enterprise to network is increasing, and the importance of information security is also in continuous lifting.
The Internet is also to the risk that enterprise brings unprecedented mixing to threaten, the random uncontrolled accessing illegal website of employee, transmit sensitive information, issue illegal speech, the sensitive traffic that leaks information etc., have a strong impact on enterprise network security, cause the loss being difficult to make up.Legacy network safeguard (as fire compartment wall, intruding detection system etc.) is the infrastructure device solving network security problem, its function such as the access control possessed, assault detection, can resist the attack of great majority from outer net; But can not the sensitive information comprised in the contents such as the mail header of mail, message body, Email attachment be monitored.But, relative to IP Security, the security incident that the behavior of mailing to outer net mail by Intranet causes, more hidden, not easily discover, so loss is also huger.
Summary of the invention
In view of this, the object of the invention is to propose a kind of efficient, reliable mail blocking-up method based on sensitive information identification and device.
Based on above-mentioned purpose a kind of mail blocking-up method based on sensitive information identification provided by the invention, comprise step:
Obtain user is mail to outer net mail by Intranet;
Sensitive information identification is carried out to the described mail obtained, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Obtain the described mail after user edits, the described mail after editor is sent.
Preferably, the described mail of described acquisition after user edits, comprises further by the step that the described mail after editor sends:
According to the encrypted instruction of user, by the described email encryption after editor.
Preferably, described method also comprises step:
Generate the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
Preferably, after obtaining the described mail after user edits, step is comprised further:
Sensitive information identification is carried out to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editor and pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
Preferably, described sensitive information knowledge method for distinguishing is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
Present invention also offers a kind of mail occluding device based on sensitive information identification, comprising:
Acquisition module, to be mail to the mail of outer net by Intranet for obtaining user;
Identify and block module, the described mail be same as obtaining carries out sensitive information identification, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Sending module, for obtaining the described mail after user edits, sends the described mail after editor.
Preferably, described device also comprises: encrypting module, for the encrypted instruction according to user, by the described email encryption after editor.
Preferably, described device also comprises: mail log pattern, for generating the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
Preferably, described identification blocks module and is further used for: carry out sensitive information identification to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editing and also pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
Preferably, described sensitive information knowledge method for distinguishing is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
As can be seen from above, mail blocking-up method based on sensitive information identification provided by the invention and device, company information outer net outbound is deployed in by series connection, utilize IP Session reassemble technology, by built-in sensitive information strategy, realize auditing to the full mail of Web mail (Webmail) and client mail (SMTP, POP3), filtering and monitoring, effectively can reduce enterprise staff and carry out information leakage and the secret possibility leaked by information outer net mail, blocking-up, protection and monitoring are achieved to mail sensitive information leakage.Achieve and monitor people, monitor mailbox, monitor the time, monitor the fine granularity target of its content.Greatly improve the prevention ability of information leakage, reduce the risk that mail sensitive information leaks.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the mail blocking-up method flow chart based on sensitive information identification of the embodiment of the present invention;
Fig. 2 is the mail occluding device structural representation based on sensitive information identification of the embodiment of the present invention;
Fig. 3 is the structural representation of the mail blocking system of the mail occluding device based on sensitive information identification of the application embodiment of the present invention.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with specific embodiment, and with reference to accompanying drawing, the present invention is described in more detail.
Embodiments provide a kind of mail blocking-up method based on sensitive information identification, comprise the following steps:
Obtain user is mail to outer net mail by Intranet;
Sensitive information identification is carried out to the described mail obtained, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Obtain the described mail after user edits, the described mail after editor is sent.
Visible, the mail blocking-up method based on sensitive information identification of the embodiment of the present invention, based on sensitive information recognition technology, realizes the audit of mail sensitive information, the prompting of mail sensitive information to the mail being mail to outer net by Intranet and blocks.
With reference to figure 1, it is the mail blocking-up method flow chart based on sensitive information identification of the embodiment of the present invention.
As an embodiment more specifically, the described mail blocking-up method based on sensitive information identification, comprises the following steps:
Step 101, obtain user and mail to the mail of outer net by Intranet.
Arrange relevant device in Intranet exit, when making user outwards net transmission mail, mail all by the data transmission link formulated, and can be acquired with pending follow-up sensitive information identification.
Step 102, to obtain described mail carry out sensitive information identification, identify whether to there is sensitive information; If so, then step 104 is performed; If not, then step 103 is performed.
In this step, sensitive information identification is carried out to the mail obtained, concrete can select as: sensitive information identification is carried out in one or more the combination in the sensitive information recognition technologies such as IP Session reassemble technology, protocol identification technology, feature detection techniques, intelligent association analytical technology; According to the sensitive information preset to the comprehensive detection and Identification of mail matter topics, message body, Email attachment title, Email attachment content.
Step 103, when unidentified to described mail package containing sensitive information time, described mail is sent.
In this step, unidentifiedly go out to comprise default sensitive information in mail, then let pass, allow mail sending to the Internet.
Step 104, when recognize described mail package containing sensitive information time, block described mail and point out user.
In this step, identify in mail and comprise default sensitive information, then block this mail, and send corresponding feedback information to user and inform the sensitive information comprised in user mail.User get the mail occluding device feedback information after, the mail comprising sensitive information is confirmed further, after determining really to comprise sensitive information, can select to update transmission.
Step 105, obtain the described mail after user edits, send after the described mail after editor is encrypted.
If user confirms to comprise sensitive information in mail, carry out after editor gets rid of sensitive information to mail, user can send by Choice encryption, and after input Crypted password, this mail is delivered again in the mode of compress-encrypt.
Step 106, generation correspond to the transmission daily record of described mail, and described transmission daily record is stored in network terminal.
In this step, according to all mail behaviors through above-mentioned steps, generate the transmission daily record of mail, the security management center database that the transmission daily record of described mail is stored to network terminal is carried out record, use to investigate and collect evidence.
As preferably, in the present embodiment, after obtaining the described mail after user edits, comprise step further:
Sensitive information identification is carried out to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editor and pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
On the other hand, the embodiment of the present invention additionally provides a kind of mail occluding device based on sensitive information identification.With reference to figure 2, it is the mail occluding device structural representation based on sensitive information identification of the embodiment of the present invention.
The described mail occluding device based on sensitive information identification, comprising:
Acquisition module 201, to be mail to the mail of outer net by Intranet for obtaining user;
Identify and block module 202, the described mail be same as obtaining carries out sensitive information identification, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Sending module 203, for obtaining the described mail after user edits, sends the described mail after editor.
Mail occluding device described in the embodiment of the present invention, by the mail occluding device in Intranet export deployment, realizes the audit of mail sensitive information, the prompting of mail sensitive information and blocks.After enterprises disposes mail occluding device, user send or when accepting mail, packet all will through mail occluding device, mail occluding device carries out protocal analysis to packet, check from packet and identify whether to comprise default sensitive information, if comprise default sensitive information in mail, then carry out blocking-up operation.Record is carried out to responsive mail daily record simultaneously, and send feedback information to user.When user receives sensitive information prompting mail, if user thinks that mail does not comprise sensitive information, after confirming further, can not make an amendment and carry out sending and not blocking.After user receives sensitive information prompting mail, if user confirms to comprise sensitive information in mail, user can send by Choice encryption, and after input Crypted password, this mail is delivered again in the mode of compress-encrypt.
In a preferred embodiment, the described mail occluding device based on sensitive information identification also comprises: encrypting module 204, for the encrypted instruction according to user, by the described email encryption after editor.
In a preferred embodiment, the described mail occluding device based on sensitive information identification also comprises: mail log pattern 205, for generating the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
In a preferred embodiment, described identification blocks module 202 and is further used for: carry out sensitive information identification to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editing and also pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
In a preferred embodiment, described sensitive information knowledge method for distinguishing is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
Further, the mail occluding device described in the present embodiment can be applied to a kind of mail blocking system, and the structure of described mail blocking system can with reference to shown in figure 3.
Described mail blocking system comprises: security management center, web console and mail occluding device.Wherein:
Security management center is mainly used in managing concentratedly mail occluding device, sensitive information strategy and sensitive information daily record etc., operation maintenance personnel can by the visualized operation interface of security management center close friend, multiple stage mail occluding device to be managed concentratedly and strategy is unified issues, greatly reduce the cost of Equipments Setting, management, monitoring and maintenance.Security management center realizes based on high-performance language development, and interface is easy to expansion, and be not that mode is more flexible, and adopt B/S framework, support the major browsers such as IE, the place that can be able to reach at any IP realizes the telemanagement of multiple stage mail occluding device comprehensively.
Web console adopts SSL cryptographic protocol to be encrypted, and realizes, to the telemanagement of single mail occluding device, comprising system configuration, tactical management, log management etc.Web console also supports the major browsers such as IE comprehensively, and the place that also can be able to reach at any IP realizes the telemanagement of single mail occluding device.
Mail occluding device adopts IP Session reassemble, protocol identification, feature detection and intelligent association analytical technology, reproduce all mail behaviors by network egress, realize accurate identification and the detection of sensitive information in mail, responsive e-mail messages in comprehensive filtration and monitoring network bag, Real-time Alarm, blocking-up record responsive mail behavior.
Those of ordinary skill in the field are to be understood that: the discussion of above any embodiment is only exemplary, and not intended to be implies that the scope of the present disclosure (comprising claim) is limited to these examples; Under thinking of the present invention, also can combine between technical characteristic in above embodiment or different embodiment, step can realize with random order, and there are other changes many of different aspect of the present invention as above, and they do not provide in details for the sake of simplicity.Therefore, within the spirit and principles in the present invention all, any omission made, amendment, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1., based on a mail blocking-up method for sensitive information identification, it is characterized in that, comprise step:
Obtain user is mail to outer net mail by Intranet;
Sensitive information identification is carried out to the described mail obtained, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Obtain the described mail after user edits, the described mail after editor is sent.
2. method according to claim 1, is characterized in that, the described mail of described acquisition after user edits, and the step that the described mail after editor sends is comprised further:
According to the encrypted instruction of user, by the described email encryption after editor.
3. method according to claim 1, is characterized in that, also comprises step:
Generate the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
4. method according to claim 1, is characterized in that, after obtaining the described mail after user edits, comprises step further:
Sensitive information identification is carried out to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editor and pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
5. method according to claim 1, is characterized in that, described sensitive information is known method for distinguishing and is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
6., based on a mail occluding device for sensitive information identification, it is characterized in that, comprising:
Acquisition module, to be mail to the mail of outer net by Intranet for obtaining user;
Identify and block module, the described mail be same as obtaining carries out sensitive information identification, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Sending module, for obtaining the described mail after user edits, sends the described mail after editor.
7. device according to claim 6, is characterized in that, also comprises: encrypting module, for the encrypted instruction according to user, by the described email encryption after editor.
8. device according to claim 6, is characterized in that, also comprises: mail log pattern, for generating the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
9. device according to claim 6, it is characterized in that, described identification blocks module and is further used for: carry out sensitive information identification to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editing and also pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
10. device according to claim 6, is characterized in that, described sensitive information is known method for distinguishing and is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510907418.5A CN105553956A (en) | 2015-12-09 | 2015-12-09 | Mail blocking method and device based on sensitive information recognition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510907418.5A CN105553956A (en) | 2015-12-09 | 2015-12-09 | Mail blocking method and device based on sensitive information recognition |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105553956A true CN105553956A (en) | 2016-05-04 |
Family
ID=55832892
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510907418.5A Pending CN105553956A (en) | 2015-12-09 | 2015-12-09 | Mail blocking method and device based on sensitive information recognition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105553956A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453249A (en) * | 2016-08-31 | 2017-02-22 | 杭州华途软件有限公司 | Monitoring method of network mail business |
CN108600081A (en) * | 2018-03-26 | 2018-09-28 | 北京明朝万达科技股份有限公司 | A kind of method and device that mail outgoing achieves, Mail Gateway |
CN108712275A (en) * | 2018-04-19 | 2018-10-26 | 平安科技(深圳)有限公司 | Data transmission methods of risk assessment, device, computer equipment and storage medium |
CN108900468A (en) * | 2018-05-31 | 2018-11-27 | 中融万博网络科技有限公司 | A kind of method of secure storage and transmitting user service data |
CN109218168A (en) * | 2018-09-26 | 2019-01-15 | 江苏神州信源系统工程有限公司 | The blocking-up method and device of sensitive e-mail messages |
CN109639562A (en) * | 2018-11-15 | 2019-04-16 | 厦门笨鸟电子商务有限公司 | A kind of mail marketing method around Anti-Spam |
CN110572358A (en) * | 2019-07-30 | 2019-12-13 | 重庆小雨点小额贷款有限公司 | Data leakage processing method and device, electronic equipment and storage medium |
CN111131183A (en) * | 2019-12-05 | 2020-05-08 | 任子行网络技术股份有限公司 | Network security monitoring method, computer device and computer readable storage medium |
CN112711770A (en) * | 2019-10-25 | 2021-04-27 | 顺丰科技有限公司 | Sensitive behavior blocking method, device, terminal and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101984603A (en) * | 2010-11-11 | 2011-03-09 | 湖北电力信息通信中心 | Power sensitive information detection method based on e-mail interception |
CN104063756A (en) * | 2014-05-23 | 2014-09-24 | 国网辽宁省电力有限公司本溪供电公司 | Electric power utilization information remote control system |
CN104361097A (en) * | 2014-11-21 | 2015-02-18 | 国家电网公司 | Real-time detection method for electric power sensitive mail based on multimode matching |
CN104866780A (en) * | 2015-04-24 | 2015-08-26 | 广东电网有限责任公司信息中心 | Unstructured data asset reveal prevention method based on hierarchical classification |
-
2015
- 2015-12-09 CN CN201510907418.5A patent/CN105553956A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101984603A (en) * | 2010-11-11 | 2011-03-09 | 湖北电力信息通信中心 | Power sensitive information detection method based on e-mail interception |
CN104063756A (en) * | 2014-05-23 | 2014-09-24 | 国网辽宁省电力有限公司本溪供电公司 | Electric power utilization information remote control system |
CN104361097A (en) * | 2014-11-21 | 2015-02-18 | 国家电网公司 | Real-time detection method for electric power sensitive mail based on multimode matching |
CN104866780A (en) * | 2015-04-24 | 2015-08-26 | 广东电网有限责任公司信息中心 | Unstructured data asset reveal prevention method based on hierarchical classification |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453249A (en) * | 2016-08-31 | 2017-02-22 | 杭州华途软件有限公司 | Monitoring method of network mail business |
CN108600081A (en) * | 2018-03-26 | 2018-09-28 | 北京明朝万达科技股份有限公司 | A kind of method and device that mail outgoing achieves, Mail Gateway |
CN108712275A (en) * | 2018-04-19 | 2018-10-26 | 平安科技(深圳)有限公司 | Data transmission methods of risk assessment, device, computer equipment and storage medium |
CN108900468A (en) * | 2018-05-31 | 2018-11-27 | 中融万博网络科技有限公司 | A kind of method of secure storage and transmitting user service data |
CN109218168A (en) * | 2018-09-26 | 2019-01-15 | 江苏神州信源系统工程有限公司 | The blocking-up method and device of sensitive e-mail messages |
CN109639562A (en) * | 2018-11-15 | 2019-04-16 | 厦门笨鸟电子商务有限公司 | A kind of mail marketing method around Anti-Spam |
CN110572358A (en) * | 2019-07-30 | 2019-12-13 | 重庆小雨点小额贷款有限公司 | Data leakage processing method and device, electronic equipment and storage medium |
CN112711770A (en) * | 2019-10-25 | 2021-04-27 | 顺丰科技有限公司 | Sensitive behavior blocking method, device, terminal and storage medium |
CN111131183A (en) * | 2019-12-05 | 2020-05-08 | 任子行网络技术股份有限公司 | Network security monitoring method, computer device and computer readable storage medium |
CN111131183B (en) * | 2019-12-05 | 2022-05-31 | 任子行网络技术股份有限公司 | Network security monitoring method, computer device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105553956A (en) | Mail blocking method and device based on sensitive information recognition | |
CN208227074U (en) | Electric power monitoring system network security monitors terminal | |
TWI254523B (en) | A system and method for managing network equipment via e-mail | |
CN103455763B (en) | A kind of internet log record system and method protecting individual subscriber privacy | |
US7634557B2 (en) | Apparatus and method for network analysis | |
US20120023576A1 (en) | Insider threat correlation tool | |
US8474042B2 (en) | Insider threat correlation tool | |
Chhabra et al. | Review of e-mail system, security protocols and email forensics | |
US20040153515A1 (en) | Methods and systems for auto-marking, watermarking, auditing, reporting, tracing and policy enforcement via e-mail and networking systems | |
CN103560911A (en) | Method and system for financial self-service equipment initiative preventive maintenance | |
CN104518943A (en) | Method and system for e-mail management | |
Pichan et al. | A logging model for enabling digital forensics in iot, in an inter-connected iot, cloud eco-systems | |
CN113194081A (en) | One-way message transmission system and method suitable for physical isolation environment | |
KR100773416B1 (en) | Method and system for controlling network traffic of p2p and instant messenger | |
Magare et al. | Security and privacy issues in smart city: Threats and their countermeasures | |
Kim et al. | Security of the internet‐based instant messenger: Risks and safeguards | |
CN103685137A (en) | Method for preventing instant chat tool information from being stolen based on encryption | |
CN102347849A (en) | Networking behavior information processing system | |
CN105162675B (en) | A kind of conversation recording acquisition methods and device | |
CN107018067A (en) | A kind of malious email method for early warning monitored based on Botnet and system | |
JP2020161017A (en) | Security incident visualization system | |
Settanni et al. | Real-world implementation of an information sharing network lessons learned from the large-scale European Research Project ECOSSIAN | |
CN106941497B (en) | Safety processing system based on information platform data | |
Mugisha et al. | A secured automatic notification system based on short message service | |
Vukovic et al. | CryptoCloak-improvement proposal implementation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160504 |
|
RJ01 | Rejection of invention patent application after publication |