CN105553956A - Mail blocking method and device based on sensitive information recognition - Google Patents

Mail blocking method and device based on sensitive information recognition Download PDF

Info

Publication number
CN105553956A
CN105553956A CN201510907418.5A CN201510907418A CN105553956A CN 105553956 A CN105553956 A CN 105553956A CN 201510907418 A CN201510907418 A CN 201510907418A CN 105553956 A CN105553956 A CN 105553956A
Authority
CN
China
Prior art keywords
mail
sensitive information
editor
described mail
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510907418.5A
Other languages
Chinese (zh)
Inventor
刘世民
齐四清
孙添资
朱继阳
张梦梦
袁野
刘阜阳
范秉旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
East Inner Mongolia Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
East Inner Mongolia Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, East Inner Mongolia Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201510907418.5A priority Critical patent/CN105553956A/en
Publication of CN105553956A publication Critical patent/CN105553956A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Abstract

The invention discloses a mail blocking method and device based on sensitive information recognition, and the method comprises the steps: obtaining a mail which is sent by a user from an intranet to an extranet; carrying out the recognition of sensitive information of the obtained mail, blocking the mail and reminding a user when the mail is recognized to contain the sensitive information; obtaining the mail after the main is edited by the user, and enabling the edited mail to be sent. The method can achieve the complete checking, filtering and monitoring of a Web mail and a client mail, can effectively reduce possibility that employees of enterprises leaks information and secrets through information extranet mails, and achieves the blocking, prevention and monitoring of the leakage of sensitive information of the mails. The method achieves a fine grit purpose of person monitoring, mailbox monitoring, time monitoring and content monitoring. The method greatly improves the capability of information leakage prevention, and reduces the risk of sensitive information leakage of the mails.

Description

A kind of mail blocking-up method based on sensitive information identification and device
Technical field
The present invention relates to technical field of network information, refer to a kind of mail blocking-up method based on sensitive information identification and device especially.
Background technology
Along with developing rapidly of internet, applications, computer network is popularized rapidly in every field that is economic and life, the acquisition of information, shares and propagates convenient.The degree of dependence of enterprise to network is increasing, and the importance of information security is also in continuous lifting.
The Internet is also to the risk that enterprise brings unprecedented mixing to threaten, the random uncontrolled accessing illegal website of employee, transmit sensitive information, issue illegal speech, the sensitive traffic that leaks information etc., have a strong impact on enterprise network security, cause the loss being difficult to make up.Legacy network safeguard (as fire compartment wall, intruding detection system etc.) is the infrastructure device solving network security problem, its function such as the access control possessed, assault detection, can resist the attack of great majority from outer net; But can not the sensitive information comprised in the contents such as the mail header of mail, message body, Email attachment be monitored.But, relative to IP Security, the security incident that the behavior of mailing to outer net mail by Intranet causes, more hidden, not easily discover, so loss is also huger.
Summary of the invention
In view of this, the object of the invention is to propose a kind of efficient, reliable mail blocking-up method based on sensitive information identification and device.
Based on above-mentioned purpose a kind of mail blocking-up method based on sensitive information identification provided by the invention, comprise step:
Obtain user is mail to outer net mail by Intranet;
Sensitive information identification is carried out to the described mail obtained, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Obtain the described mail after user edits, the described mail after editor is sent.
Preferably, the described mail of described acquisition after user edits, comprises further by the step that the described mail after editor sends:
According to the encrypted instruction of user, by the described email encryption after editor.
Preferably, described method also comprises step:
Generate the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
Preferably, after obtaining the described mail after user edits, step is comprised further:
Sensitive information identification is carried out to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editor and pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
Preferably, described sensitive information knowledge method for distinguishing is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
Present invention also offers a kind of mail occluding device based on sensitive information identification, comprising:
Acquisition module, to be mail to the mail of outer net by Intranet for obtaining user;
Identify and block module, the described mail be same as obtaining carries out sensitive information identification, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Sending module, for obtaining the described mail after user edits, sends the described mail after editor.
Preferably, described device also comprises: encrypting module, for the encrypted instruction according to user, by the described email encryption after editor.
Preferably, described device also comprises: mail log pattern, for generating the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
Preferably, described identification blocks module and is further used for: carry out sensitive information identification to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editing and also pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
Preferably, described sensitive information knowledge method for distinguishing is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
As can be seen from above, mail blocking-up method based on sensitive information identification provided by the invention and device, company information outer net outbound is deployed in by series connection, utilize IP Session reassemble technology, by built-in sensitive information strategy, realize auditing to the full mail of Web mail (Webmail) and client mail (SMTP, POP3), filtering and monitoring, effectively can reduce enterprise staff and carry out information leakage and the secret possibility leaked by information outer net mail, blocking-up, protection and monitoring are achieved to mail sensitive information leakage.Achieve and monitor people, monitor mailbox, monitor the time, monitor the fine granularity target of its content.Greatly improve the prevention ability of information leakage, reduce the risk that mail sensitive information leaks.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the mail blocking-up method flow chart based on sensitive information identification of the embodiment of the present invention;
Fig. 2 is the mail occluding device structural representation based on sensitive information identification of the embodiment of the present invention;
Fig. 3 is the structural representation of the mail blocking system of the mail occluding device based on sensitive information identification of the application embodiment of the present invention.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with specific embodiment, and with reference to accompanying drawing, the present invention is described in more detail.
Embodiments provide a kind of mail blocking-up method based on sensitive information identification, comprise the following steps:
Obtain user is mail to outer net mail by Intranet;
Sensitive information identification is carried out to the described mail obtained, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Obtain the described mail after user edits, the described mail after editor is sent.
Visible, the mail blocking-up method based on sensitive information identification of the embodiment of the present invention, based on sensitive information recognition technology, realizes the audit of mail sensitive information, the prompting of mail sensitive information to the mail being mail to outer net by Intranet and blocks.
With reference to figure 1, it is the mail blocking-up method flow chart based on sensitive information identification of the embodiment of the present invention.
As an embodiment more specifically, the described mail blocking-up method based on sensitive information identification, comprises the following steps:
Step 101, obtain user and mail to the mail of outer net by Intranet.
Arrange relevant device in Intranet exit, when making user outwards net transmission mail, mail all by the data transmission link formulated, and can be acquired with pending follow-up sensitive information identification.
Step 102, to obtain described mail carry out sensitive information identification, identify whether to there is sensitive information; If so, then step 104 is performed; If not, then step 103 is performed.
In this step, sensitive information identification is carried out to the mail obtained, concrete can select as: sensitive information identification is carried out in one or more the combination in the sensitive information recognition technologies such as IP Session reassemble technology, protocol identification technology, feature detection techniques, intelligent association analytical technology; According to the sensitive information preset to the comprehensive detection and Identification of mail matter topics, message body, Email attachment title, Email attachment content.
Step 103, when unidentified to described mail package containing sensitive information time, described mail is sent.
In this step, unidentifiedly go out to comprise default sensitive information in mail, then let pass, allow mail sending to the Internet.
Step 104, when recognize described mail package containing sensitive information time, block described mail and point out user.
In this step, identify in mail and comprise default sensitive information, then block this mail, and send corresponding feedback information to user and inform the sensitive information comprised in user mail.User get the mail occluding device feedback information after, the mail comprising sensitive information is confirmed further, after determining really to comprise sensitive information, can select to update transmission.
Step 105, obtain the described mail after user edits, send after the described mail after editor is encrypted.
If user confirms to comprise sensitive information in mail, carry out after editor gets rid of sensitive information to mail, user can send by Choice encryption, and after input Crypted password, this mail is delivered again in the mode of compress-encrypt.
Step 106, generation correspond to the transmission daily record of described mail, and described transmission daily record is stored in network terminal.
In this step, according to all mail behaviors through above-mentioned steps, generate the transmission daily record of mail, the security management center database that the transmission daily record of described mail is stored to network terminal is carried out record, use to investigate and collect evidence.
As preferably, in the present embodiment, after obtaining the described mail after user edits, comprise step further:
Sensitive information identification is carried out to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editor and pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
On the other hand, the embodiment of the present invention additionally provides a kind of mail occluding device based on sensitive information identification.With reference to figure 2, it is the mail occluding device structural representation based on sensitive information identification of the embodiment of the present invention.
The described mail occluding device based on sensitive information identification, comprising:
Acquisition module 201, to be mail to the mail of outer net by Intranet for obtaining user;
Identify and block module 202, the described mail be same as obtaining carries out sensitive information identification, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Sending module 203, for obtaining the described mail after user edits, sends the described mail after editor.
Mail occluding device described in the embodiment of the present invention, by the mail occluding device in Intranet export deployment, realizes the audit of mail sensitive information, the prompting of mail sensitive information and blocks.After enterprises disposes mail occluding device, user send or when accepting mail, packet all will through mail occluding device, mail occluding device carries out protocal analysis to packet, check from packet and identify whether to comprise default sensitive information, if comprise default sensitive information in mail, then carry out blocking-up operation.Record is carried out to responsive mail daily record simultaneously, and send feedback information to user.When user receives sensitive information prompting mail, if user thinks that mail does not comprise sensitive information, after confirming further, can not make an amendment and carry out sending and not blocking.After user receives sensitive information prompting mail, if user confirms to comprise sensitive information in mail, user can send by Choice encryption, and after input Crypted password, this mail is delivered again in the mode of compress-encrypt.
In a preferred embodiment, the described mail occluding device based on sensitive information identification also comprises: encrypting module 204, for the encrypted instruction according to user, by the described email encryption after editor.
In a preferred embodiment, the described mail occluding device based on sensitive information identification also comprises: mail log pattern 205, for generating the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
In a preferred embodiment, described identification blocks module 202 and is further used for: carry out sensitive information identification to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editing and also pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
In a preferred embodiment, described sensitive information knowledge method for distinguishing is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
Further, the mail occluding device described in the present embodiment can be applied to a kind of mail blocking system, and the structure of described mail blocking system can with reference to shown in figure 3.
Described mail blocking system comprises: security management center, web console and mail occluding device.Wherein:
Security management center is mainly used in managing concentratedly mail occluding device, sensitive information strategy and sensitive information daily record etc., operation maintenance personnel can by the visualized operation interface of security management center close friend, multiple stage mail occluding device to be managed concentratedly and strategy is unified issues, greatly reduce the cost of Equipments Setting, management, monitoring and maintenance.Security management center realizes based on high-performance language development, and interface is easy to expansion, and be not that mode is more flexible, and adopt B/S framework, support the major browsers such as IE, the place that can be able to reach at any IP realizes the telemanagement of multiple stage mail occluding device comprehensively.
Web console adopts SSL cryptographic protocol to be encrypted, and realizes, to the telemanagement of single mail occluding device, comprising system configuration, tactical management, log management etc.Web console also supports the major browsers such as IE comprehensively, and the place that also can be able to reach at any IP realizes the telemanagement of single mail occluding device.
Mail occluding device adopts IP Session reassemble, protocol identification, feature detection and intelligent association analytical technology, reproduce all mail behaviors by network egress, realize accurate identification and the detection of sensitive information in mail, responsive e-mail messages in comprehensive filtration and monitoring network bag, Real-time Alarm, blocking-up record responsive mail behavior.
Those of ordinary skill in the field are to be understood that: the discussion of above any embodiment is only exemplary, and not intended to be implies that the scope of the present disclosure (comprising claim) is limited to these examples; Under thinking of the present invention, also can combine between technical characteristic in above embodiment or different embodiment, step can realize with random order, and there are other changes many of different aspect of the present invention as above, and they do not provide in details for the sake of simplicity.Therefore, within the spirit and principles in the present invention all, any omission made, amendment, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1., based on a mail blocking-up method for sensitive information identification, it is characterized in that, comprise step:
Obtain user is mail to outer net mail by Intranet;
Sensitive information identification is carried out to the described mail obtained, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Obtain the described mail after user edits, the described mail after editor is sent.
2. method according to claim 1, is characterized in that, the described mail of described acquisition after user edits, and the step that the described mail after editor sends is comprised further:
According to the encrypted instruction of user, by the described email encryption after editor.
3. method according to claim 1, is characterized in that, also comprises step:
Generate the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
4. method according to claim 1, is characterized in that, after obtaining the described mail after user edits, comprises step further:
Sensitive information identification is carried out to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editor and pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
5. method according to claim 1, is characterized in that, described sensitive information is known method for distinguishing and is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
6., based on a mail occluding device for sensitive information identification, it is characterized in that, comprising:
Acquisition module, to be mail to the mail of outer net by Intranet for obtaining user;
Identify and block module, the described mail be same as obtaining carries out sensitive information identification, when recognizing described mail package containing sensitive information, blocking described mail and pointing out user;
Sending module, for obtaining the described mail after user edits, sends the described mail after editor.
7. device according to claim 6, is characterized in that, also comprises: encrypting module, for the encrypted instruction according to user, by the described email encryption after editor.
8. device according to claim 6, is characterized in that, also comprises: mail log pattern, for generating the transmission daily record corresponding to described mail, described transmission daily record is stored in network terminal.
9. device according to claim 6, it is characterized in that, described identification blocks module and is further used for: carry out sensitive information identification to the described mail after editor, when recognizing the described mail package after editor containing sensitive information, blocking the described mail after editing and also pointing out user; When unidentified described mail package after editor is containing sensitive information, the described mail after editor is sent.
10. device according to claim 6, is characterized in that, described sensitive information is known method for distinguishing and is: IP Session reassemble technology, protocol identification technology, feature detection techniques or intelligent association analytical technology.
CN201510907418.5A 2015-12-09 2015-12-09 Mail blocking method and device based on sensitive information recognition Pending CN105553956A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510907418.5A CN105553956A (en) 2015-12-09 2015-12-09 Mail blocking method and device based on sensitive information recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510907418.5A CN105553956A (en) 2015-12-09 2015-12-09 Mail blocking method and device based on sensitive information recognition

Publications (1)

Publication Number Publication Date
CN105553956A true CN105553956A (en) 2016-05-04

Family

ID=55832892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510907418.5A Pending CN105553956A (en) 2015-12-09 2015-12-09 Mail blocking method and device based on sensitive information recognition

Country Status (1)

Country Link
CN (1) CN105553956A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453249A (en) * 2016-08-31 2017-02-22 杭州华途软件有限公司 Monitoring method of network mail business
CN108600081A (en) * 2018-03-26 2018-09-28 北京明朝万达科技股份有限公司 A kind of method and device that mail outgoing achieves, Mail Gateway
CN108712275A (en) * 2018-04-19 2018-10-26 平安科技(深圳)有限公司 Data transmission methods of risk assessment, device, computer equipment and storage medium
CN108900468A (en) * 2018-05-31 2018-11-27 中融万博网络科技有限公司 A kind of method of secure storage and transmitting user service data
CN109218168A (en) * 2018-09-26 2019-01-15 江苏神州信源系统工程有限公司 The blocking-up method and device of sensitive e-mail messages
CN109639562A (en) * 2018-11-15 2019-04-16 厦门笨鸟电子商务有限公司 A kind of mail marketing method around Anti-Spam
CN110572358A (en) * 2019-07-30 2019-12-13 重庆小雨点小额贷款有限公司 Data leakage processing method and device, electronic equipment and storage medium
CN111131183A (en) * 2019-12-05 2020-05-08 任子行网络技术股份有限公司 Network security monitoring method, computer device and computer readable storage medium
CN112711770A (en) * 2019-10-25 2021-04-27 顺丰科技有限公司 Sensitive behavior blocking method, device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101984603A (en) * 2010-11-11 2011-03-09 湖北电力信息通信中心 Power sensitive information detection method based on e-mail interception
CN104063756A (en) * 2014-05-23 2014-09-24 国网辽宁省电力有限公司本溪供电公司 Electric power utilization information remote control system
CN104361097A (en) * 2014-11-21 2015-02-18 国家电网公司 Real-time detection method for electric power sensitive mail based on multimode matching
CN104866780A (en) * 2015-04-24 2015-08-26 广东电网有限责任公司信息中心 Unstructured data asset reveal prevention method based on hierarchical classification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101984603A (en) * 2010-11-11 2011-03-09 湖北电力信息通信中心 Power sensitive information detection method based on e-mail interception
CN104063756A (en) * 2014-05-23 2014-09-24 国网辽宁省电力有限公司本溪供电公司 Electric power utilization information remote control system
CN104361097A (en) * 2014-11-21 2015-02-18 国家电网公司 Real-time detection method for electric power sensitive mail based on multimode matching
CN104866780A (en) * 2015-04-24 2015-08-26 广东电网有限责任公司信息中心 Unstructured data asset reveal prevention method based on hierarchical classification

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453249A (en) * 2016-08-31 2017-02-22 杭州华途软件有限公司 Monitoring method of network mail business
CN108600081A (en) * 2018-03-26 2018-09-28 北京明朝万达科技股份有限公司 A kind of method and device that mail outgoing achieves, Mail Gateway
CN108712275A (en) * 2018-04-19 2018-10-26 平安科技(深圳)有限公司 Data transmission methods of risk assessment, device, computer equipment and storage medium
CN108900468A (en) * 2018-05-31 2018-11-27 中融万博网络科技有限公司 A kind of method of secure storage and transmitting user service data
CN109218168A (en) * 2018-09-26 2019-01-15 江苏神州信源系统工程有限公司 The blocking-up method and device of sensitive e-mail messages
CN109639562A (en) * 2018-11-15 2019-04-16 厦门笨鸟电子商务有限公司 A kind of mail marketing method around Anti-Spam
CN110572358A (en) * 2019-07-30 2019-12-13 重庆小雨点小额贷款有限公司 Data leakage processing method and device, electronic equipment and storage medium
CN112711770A (en) * 2019-10-25 2021-04-27 顺丰科技有限公司 Sensitive behavior blocking method, device, terminal and storage medium
CN111131183A (en) * 2019-12-05 2020-05-08 任子行网络技术股份有限公司 Network security monitoring method, computer device and computer readable storage medium
CN111131183B (en) * 2019-12-05 2022-05-31 任子行网络技术股份有限公司 Network security monitoring method, computer device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN105553956A (en) Mail blocking method and device based on sensitive information recognition
CN208227074U (en) Electric power monitoring system network security monitors terminal
TWI254523B (en) A system and method for managing network equipment via e-mail
CN103455763B (en) A kind of internet log record system and method protecting individual subscriber privacy
US7634557B2 (en) Apparatus and method for network analysis
US20120023576A1 (en) Insider threat correlation tool
US8474042B2 (en) Insider threat correlation tool
Chhabra et al. Review of e-mail system, security protocols and email forensics
US20040153515A1 (en) Methods and systems for auto-marking, watermarking, auditing, reporting, tracing and policy enforcement via e-mail and networking systems
CN103560911A (en) Method and system for financial self-service equipment initiative preventive maintenance
CN104518943A (en) Method and system for e-mail management
Pichan et al. A logging model for enabling digital forensics in iot, in an inter-connected iot, cloud eco-systems
CN113194081A (en) One-way message transmission system and method suitable for physical isolation environment
KR100773416B1 (en) Method and system for controlling network traffic of p2p and instant messenger
Magare et al. Security and privacy issues in smart city: Threats and their countermeasures
Kim et al. Security of the internet‐based instant messenger: Risks and safeguards
CN103685137A (en) Method for preventing instant chat tool information from being stolen based on encryption
CN102347849A (en) Networking behavior information processing system
CN105162675B (en) A kind of conversation recording acquisition methods and device
CN107018067A (en) A kind of malious email method for early warning monitored based on Botnet and system
JP2020161017A (en) Security incident visualization system
Settanni et al. Real-world implementation of an information sharing network lessons learned from the large-scale European Research Project ECOSSIAN
CN106941497B (en) Safety processing system based on information platform data
Mugisha et al. A secured automatic notification system based on short message service
Vukovic et al. CryptoCloak-improvement proposal implementation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160504

RJ01 Rejection of invention patent application after publication