CN107231286B - Verification method and device for mail approval - Google Patents

Verification method and device for mail approval Download PDF

Info

Publication number
CN107231286B
CN107231286B CN201610172904.1A CN201610172904A CN107231286B CN 107231286 B CN107231286 B CN 107231286B CN 201610172904 A CN201610172904 A CN 201610172904A CN 107231286 B CN107231286 B CN 107231286B
Authority
CN
China
Prior art keywords
mail
mailbox
approval
approver
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610172904.1A
Other languages
Chinese (zh)
Other versions
CN107231286A (en
Inventor
梁晓丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201610172904.1A priority Critical patent/CN107231286B/en
Publication of CN107231286A publication Critical patent/CN107231286A/en
Application granted granted Critical
Publication of CN107231286B publication Critical patent/CN107231286B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention relates to a verification method and a verification device for mail approval. The method comprises the following steps: receiving an approval mail; analyzing the verification code in the mail to obtain approval information; retrieving an approver information base according to the approval information to obtain a legal mailbox corresponding to the approval information; and comparing the mail sending mailbox of the approval mail with the legal mailbox, and performing subsequent operation according to a comparison result. According to the verification method and device for mail approval, provided by the invention, through the verification operation on the approved mail, a background approved mail box verification mechanism can be enhanced, when the verification code is leaked but the mail box is incorrect, the system cannot execute the document approval operation, and the safety of the approval operation through the verification code in the reply mail is enhanced. Meanwhile, on the basis of comparing the mail sending mailboxes, the comparison of mailbox blacklists is further increased, the possibility of library collision can be effectively prevented, and the safety of examining and approving mail verification is further improved.

Description

Verification method and device for mail approval
Technical Field
The invention relates to the technical field of computers, in particular to a verification method and a verification device for mail approval.
Background
At present, many systems use a reply mail mode for approval, a section of verification code with approval operation is sent to an approval special mailbox through a mail, and after a background of the system receives the mail with the verification code and analyzes the mail, the approval operation is executed.
As shown in fig. 1A, the mail generally uses html format, and 2 link buttons [ approve ] and [ reject ] are set in the mail, for example, using codes like the following:
<a href="mailto:aaa@jd.com?subject=bbb&body=ccc"
target ═ blank "> [ approval ] </a >
In the above codes, mailto, aaa @ jd.com, that is, the recipient is aaa @ jd.com, the subject is bbb, that is, the subject of the mail is bbb, and the body is ccc, that is, the mail body is ccc, these pieces of information are hidden as an "approval" button in the mail using an < a > tag, when clicked, the mail is automatically created locally, and automatically filled as the recipient and the mail header/mail body in the above codes, the content of the general mail body is as shown in fig. 1B, and the content of the general mail body includes an authentication code (generally encrypted or transcoded) for approval operation.
After the approver sends out the approval reply mail, the background of the related system extracts the content of the mail, and analyzes the verification code through a defined rule so as to operate the approval action and the approval related documents. In the prior art, if the verification code is revealed once, anyone can send the verification code to the system approval special mailbox, and then can approve the document. If illegal personnel send the verification code to the system approval special mailbox in a similar library collision mode, the approval document can be operated. (note: the database-crashing mode is that the identifying codes obtained from other ways or the random identifying codes generated by the user are sent to the system examination and approval special mail box in batch, and the individual identifying codes are matched successfully to achieve the purpose of examining and approving the documents.)
Therefore, a new verification method and device for mail approval are needed to solve the above problems.
The above information disclosed in this background section is only for enhancement of understanding of the background of the disclosure and therefore it may contain information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
The invention provides a verification method and a verification device for mail examination and approval, which can improve the safety of background verification during mail examination and approval.
Additional features and advantages of the invention will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to a first aspect of the invention, a verification method for mail approval comprises: receiving an approval mail; analyzing the verification code in the mail to obtain approval information; retrieving an approver information base according to the approval information to obtain a legal mailbox corresponding to the approval information; and comparing the mail sending mailbox of the approval mail with the legal mailbox, and performing subsequent operation according to a comparison result.
According to an embodiment of the present invention, after the step of receiving the approval mail, the method further includes: and judging whether the mail sending mailbox is in a mailbox blacklist or not, if the mail sending mailbox is in the blacklist, not receiving the mail content, and if the mail sending mailbox is not in the blacklist, receiving the mail content.
According to an embodiment of the present invention, comparing the mail sending mailbox of the approval mail with the legal mailbox, and performing subsequent operations according to the comparison result includes: and if the sender mailbox is inconsistent with the legal mailbox, adding the sender mailbox with the inconsistent times exceeding a preset value into the mailbox blacklist.
According to an embodiment of the invention, the approval information includes an approver ID, a to-do document ID, and to-do items.
According to an embodiment of the present invention, the approver information base includes: and the approver ID and the legal mailbox corresponding to the approver ID.
According to an embodiment of the present invention, the valid mailbox is a plurality of mailboxes divided according to service types.
According to a second aspect of the invention, a verification device for mail approval comprises:
the receiving module is used for receiving the approval mails;
the analysis module is used for analyzing the verification code in the mail to obtain approval information;
the retrieval module is used for retrieving an approver information base according to the approval information and obtaining a legal mailbox corresponding to the approval information;
and the comparison module is used for comparing the mail sending mailbox of the approval mail with the legal mailbox and carrying out subsequent operation according to a comparison result.
According to an embodiment of the present invention, the apparatus further includes a determining module, configured to determine whether the sender mailbox is in a mailbox blacklist, if the sender mailbox is in the blacklist, the mail content is not received, and if the sender mailbox is not in the blacklist, the mail content is received.
According to an embodiment of the present invention, the comparing module is further configured to: and if the sender mailbox is inconsistent with the legal mailbox, adding the sender mailbox with the inconsistent times exceeding a preset value into the mailbox blacklist.
According to an embodiment of the present invention, the approver information base includes: and the approver ID and the legal mailbox corresponding to the approver ID.
According to an embodiment of the present invention, the approver information base includes: and the approver ID and the legal mailbox corresponding to the approver ID.
According to an embodiment of the present invention, the valid mailbox is a plurality of mailboxes divided according to service types.
According to the verification method and device for mail approval, provided by the invention, through the verification operation on the approved mail, a background approved mail box verification mechanism can be enhanced, when the verification code is leaked but the mail box is incorrect, the system cannot execute the document approval operation, and the safety of the approval operation through the verification code in the reply mail is enhanced. Meanwhile, on the basis of comparing the mail sending mailboxes, the comparison of mailbox blacklists is further increased, the possibility of library collision can be effectively prevented, and the safety of examining and approving mail verification is further improved.
Drawings
The above and other objects, features and advantages of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings.
FIG. 1A schematically illustrates an approval mail according to an exemplary embodiment of the present invention.
FIG. 1B schematically shows a schematic view of a validation code in an approval mail body according to an exemplary embodiment of the present invention.
Fig. 2 schematically shows a flow chart of a verification method for mail approval according to an exemplary embodiment of the present invention.
Fig. 3 schematically shows a flow chart of another verification method for mail approval according to an exemplary embodiment of the present invention.
Fig. 4 schematically shows a schematic view of a verification device for mail approval according to an exemplary embodiment of the present invention.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The drawings are merely schematic illustrations of the invention and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known structures, methods, devices, implementations, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Fig. 2 schematically shows a flow chart of a verification method for mail approval according to an exemplary embodiment of the present invention.
As shown in fig. 2, the verification method for mail approval specifically includes steps S202 to S208:
in step S202, an approval mail is received.
And an approval special mailbox of the system receives an approval mail sent by an approver.
In step S204, the verification code in the mail is analyzed to obtain approval information.
And analyzing the verification code in the mail to obtain the approval information in the mail.
In step S206, the approver information base is retrieved according to the approval information, and a legal mailbox corresponding to the approval information is obtained.
And establishing an approver information base, and searching a legal mailbox corresponding to the approver ID in the approver information base according to the analyzed approver ID.
In step S208, the mail sending mailbox of the approval mail is compared with the legal mailbox, and subsequent operations are performed according to the comparison result.
And comparing the retrieved legal mailbox with a delivery mailbox of the approved mail, judging that the approved mail is normal if the legal mailbox is consistent with the delivery mailbox, and recording the delivery mailbox if the legal mailbox is inconsistent with the delivery mailbox.
According to an example embodiment, the approval information parsed from the validation code may include an approver's ID, a to-do document ID, and to-do.
According to an example embodiment, the approver information base may include an approver ID and a legitimate mailbox corresponding to the approver ID.
According to an example embodiment, the legitimate mailbox may be a plurality of mailboxes divided by the traffic type. For example, mailboxes dedicated to processing internal traffic and mailboxes dedicated to processing external traffic may be included.
According to the method and the system, through the verification operation on the approval mail, a verification mechanism of the background approval mail box can be enhanced, when the verification code is leaked but the mail box is incorrect, the system cannot execute document approval operation, and the safety of the approval operation through the verification code in the reply mail is enhanced.
Fig. 3 schematically shows a flow chart of another verification method for mail approval according to an exemplary embodiment of the present invention.
As shown in fig. 3, the verification method for mail approval specifically includes steps S302 to S310:
in step S302, an approval mail is received.
And an approval special mailbox of the system receives an approval mail sent by an approver. For example, the person to be examined and approved is a financial supervisor, the mailbox is zhang @ jd.com, and the daily work of the person to be examined and approved needs to be performed on the financial statement. After an approver clicks an approval button, a mail box zhang @ jd.com sends an email for approving the financial statement to an approval special mail box of the system, and the mail box for sending is zhang @ jd.com.
In step S304, it is determined whether the sending mailbox is in the mailbox blacklist, if the sending mailbox is in the blacklist, the mail content is not received, and if the sending mailbox is not in the blacklist, the mail content is received.
And establishing a mailbox blacklist, and adding the mailbox with the past abnormality into the blacklist. Before receiving the mail content, judging whether the mail box of the sending part is in a blacklist, if so, not receiving the mail content; and if the mail content is not in the blacklist, the mail content is collected. Before receiving the mail content, the system firstly judges whether the sender mailbox zhang @ jd.com is in a mailbox blacklist, if so, the mail content from zhang @ jd.com is not received, and if not, the mail content is received.
In step S306, the verification code in the mail is parsed to obtain the approval information.
After the comparison of the blacklists, the verification code in the mail is analyzed, and the approval information in the mail is obtained. The approval information may include an approver's ID, a to-do document ID, and to-do. And after the comparison of the blacklists is carried out, after the mail content from zhang @ jd.com is received, analyzing the verification code in the mail body to obtain the ID-370005 of a certain financial supervisor of the approver, the ID of the to-be-handled document and the to-be-handled items.
In step S308, the approver information base is retrieved according to the approval information, and a legal mailbox corresponding to the approval information is obtained.
And establishing an approver information base, wherein the approver information base comprises an approver ID and a legal mailbox corresponding to the approver ID. And searching a legal mailbox corresponding to the ID of the approver in an approver information base by the approver according to the analyzed ID of the approver. And searching by using ID370005 of Zhangiao of a financial supervisor in an approver information base to obtain Zhang @ jd.com which is a legal mailbox of Zhangiao. The legal mailbox corresponding to ID370005 of the finance director can be a plurality of mailboxes divided according to the service types. For example, mailboxes dedicated to processing internal traffic and mailboxes dedicated to processing external traffic may be included.
In step S310, the mail sending mailbox of the approval mail is compared with the legal mailbox, and subsequent operations are performed according to the comparison result.
And comparing the retrieved legal mailbox with a delivery mailbox of the approved mail, judging that the approved mail is normal if the legal mailbox is consistent with the delivery mailbox, and recording the delivery mailbox if the legal mailbox is inconsistent with the delivery mailbox. And when the number of times that the sender mailbox is inconsistent with the legal mailbox exceeds a preset value, adding the sender mailbox into a mailbox blacklist, wherein the preset value can be set manually. And comparing the sender mailbox zhang @ jd.com with the retrieved legal mailbox zhang @ jd.com, and if the comparison result is consistent, judging that the sender mailbox is correct. The preset value may be preset to be 5, when the number of times that the sender mailbox is inconsistent with the legal mailbox exceeds 5 times, the sender mailbox is automatically recorded in the blacklist, and other numerical values may also be set, which is not limited in the present disclosure.
On the basis of comparing the mail sending mailboxes, the embodiment further increases the comparison of mailbox blacklists, can effectively prevent the possibility of library collision, and further improves the safety of examining and approving mail verification.
Fig. 4 schematically shows a schematic view of a verification device for mail approval according to an exemplary embodiment of the present invention.
As shown in fig. 4, the verification apparatus for mail approval includes:
a receiving module 402, configured to receive an approval mail.
And an approval special mailbox of the system receives an approval mail sent by an approver.
The determining module 404 is configured to determine whether the sending mailbox is in the mailbox blacklist, if the sending mailbox is in the blacklist, not receive the mail content, and if the sending mailbox is not in the blacklist, receive the mail content.
And establishing a mail blacklist, and adding the mailbox with the past abnormality into the blacklist. Before receiving the mail content, judging whether the mail box of the sending part is in a blacklist, if so, not receiving the mail content; and if the mail content is not in the blacklist, the mail content is collected.
And the analysis module 406 is configured to analyze the verification code in the email to obtain the approval information.
After the comparison of the blacklists, the verification code in the mail is analyzed, and the approval information in the mail is obtained. The approval information may include an approver's ID, a to-do document ID, and to-do.
And the retrieval module 408 is configured to retrieve the approver information base according to the approval information, and obtain a legal mailbox corresponding to the approval information.
And establishing an approver information base, wherein the approver information base comprises an approver ID and a legal mailbox corresponding to the approver ID. And searching a legal mailbox corresponding to the ID of the approver in an approver information base by the approver according to the analyzed ID of the approver. The legal mailbox may be a plurality of mailboxes divided by service types. For example, a mailbox dedicated to internal services, a mailbox dedicated to external services.
And the comparison module 410 is configured to compare the delivery mailbox of the approved mail with the legal mailbox, and perform subsequent operations according to the comparison result.
And comparing the retrieved legal mailbox with a delivery mailbox of the approved mail, judging that the approved mail is normal if the legal mailbox is consistent with the delivery mailbox, and recording the delivery mailbox if the legal mailbox is inconsistent with the delivery mailbox. And when the number of times that the sender mailbox is inconsistent with the legal mailbox exceeds a preset value, adding the sender mailbox into the mailbox blacklist. The predetermined value may be set manually, for example, the predetermined value is set to 5 in advance, and when the number of times that the sender mailbox is inconsistent with the legal mailbox exceeds 5 times, the sender mailbox is automatically recorded in the blacklist.
With regard to the apparatus in the above embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.

Claims (12)

1. A verification method for mail approval, comprising:
receiving an approval mail;
analyzing the verification code in the mail to obtain approval information; the approval information comprises an approver ID;
retrieving an approver information base according to the approval information to obtain a legal mailbox corresponding to the approval information; the approver information base includes: the ID of the approver and the legal mailbox corresponding to the ID of the approver;
comparing the mail sending mailbox of the approval mail with the legal mailbox, and performing subsequent operation according to a comparison result;
retrieving an approver information base according to the approval information to obtain a legal mailbox corresponding to the approval information, wherein the method comprises the following steps:
and searching a legal mailbox corresponding to the ID of the approver in the approver information base according to the ID of the approver.
2. The verification method for mail approval of claim 1, further comprising, after said step of receiving an approval mail: and judging whether the mail sending mailbox is in a mailbox blacklist or not, if the mail sending mailbox is in the blacklist, not receiving the mail content, and if the mail sending mailbox is not in the blacklist, receiving the mail content.
3. The verification method for mail approval of claim 2, wherein comparing the mail box of the approved mail with the legal mail box, and performing subsequent operations according to the comparison result comprises: and if the sender mailbox is inconsistent with the legal mailbox, adding the sender mailbox with the inconsistent times exceeding a preset value into the mailbox blacklist.
4. The authentication method for mail approval of claim 1, wherein the approval information further comprises a to-do document ID and a to-do.
5. An authentication method for mail approval according to claim 1, wherein the legal mailbox is a plurality of mailboxes divided by service type.
6. An authentication apparatus for mail approval, comprising:
the receiving module is used for receiving the approval mails;
the analysis module is used for analyzing the verification code in the mail to obtain approval information; the approval information comprises an approver ID;
the retrieval module is used for retrieving an approver information base according to the approval information and obtaining a legal mailbox corresponding to the approval information; the approver information base includes: the ID of the approver and the legal mailbox corresponding to the ID of the approver;
the comparison module is used for comparing the mail sending mailbox of the approval mail with the legal mailbox and carrying out subsequent operation according to a comparison result;
the retrieval module is used for retrieving a legal mailbox corresponding to the ID of the approver in the approver information base according to the ID of the approver.
7. The validating apparatus for mail approval of claim 6, further comprising a determining module for determining whether the delivery mailbox is blacklisted in mailboxes, wherein if the delivery mailbox is blacklisted, the content of the mail is not collected, and if the delivery mailbox is not blacklisted, the content of the mail is collected.
8. The apparatus of claim 7, wherein the comparison module is further configured to: and if the sender mailbox is inconsistent with the legal mailbox, adding the sender mailbox with the inconsistent times exceeding a preset value into the mailbox blacklist.
9. An authentication apparatus for mail approval as defined in claim 6, wherein the approval information further comprises a to-do document ID and a to-do.
10. An authentication apparatus for mail approval according to claim 6, wherein the legal mailbox is a plurality of mailboxes divided by service type.
11. An electronic device, comprising:
a processor;
a memory storing computer-executable instructions; the executable instructions, when executed by the processor, implement the method steps of any of claims 1-5.
12. A computer-readable medium having stored thereon computer-executable instructions, which when executed by a processor, perform the method steps of any one of claims 1-5.
CN201610172904.1A 2016-03-24 2016-03-24 Verification method and device for mail approval Active CN107231286B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610172904.1A CN107231286B (en) 2016-03-24 2016-03-24 Verification method and device for mail approval

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610172904.1A CN107231286B (en) 2016-03-24 2016-03-24 Verification method and device for mail approval

Publications (2)

Publication Number Publication Date
CN107231286A CN107231286A (en) 2017-10-03
CN107231286B true CN107231286B (en) 2020-12-22

Family

ID=59931822

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610172904.1A Active CN107231286B (en) 2016-03-24 2016-03-24 Verification method and device for mail approval

Country Status (1)

Country Link
CN (1) CN107231286B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035001A (en) * 2019-02-25 2019-07-19 厦门易维信息技术有限公司 Business approval method and device thereof based on e-mail response
CN113346995B (en) * 2021-06-24 2022-12-09 中电信量子科技有限公司 Method and system for preventing falsification in mail transmission process based on quantum security key

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1707492A (en) * 2004-06-05 2005-12-14 腾讯科技(深圳)有限公司 Method for against refuse E-mail
CN101477659A (en) * 2009-02-10 2009-07-08 百富计算机技术(深圳)有限公司 Method and apparatus for file automatic signature
EP2723023A1 (en) * 2012-10-19 2014-04-23 Lleidanetworks Serveis Telemàtics S.A. Method for the registration and certification of receipt of electronic mail

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1696949A (en) * 2005-02-06 2005-11-16 陈智勇 Method of anti garbage E-Mails for receiving/transmitting server, and system of anti garbage E-mails
CN101068217B (en) * 2006-06-16 2010-06-16 腾讯科技(深圳)有限公司 Method and device for simplifying E-mail operation
CN102170436B (en) * 2011-04-18 2014-03-19 深圳市联软科技有限公司 Mail data filtering method, system and safety getaway
CN104579931B (en) * 2015-01-23 2017-11-03 浪潮通用软件有限公司 The access method and device of a kind of copending document based on mail
CN105243536A (en) * 2015-11-13 2016-01-13 盐城工学院 PDM-based authority application method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1707492A (en) * 2004-06-05 2005-12-14 腾讯科技(深圳)有限公司 Method for against refuse E-mail
CN101477659A (en) * 2009-02-10 2009-07-08 百富计算机技术(深圳)有限公司 Method and apparatus for file automatic signature
EP2723023A1 (en) * 2012-10-19 2014-04-23 Lleidanetworks Serveis Telemàtics S.A. Method for the registration and certification of receipt of electronic mail

Also Published As

Publication number Publication date
CN107231286A (en) 2017-10-03

Similar Documents

Publication Publication Date Title
US8463861B2 (en) Message classification using legitimate contact points
US10044656B2 (en) Statistical message classifier
US20190319905A1 (en) Mail protection system
US10204157B2 (en) Image based spam blocking
US8661545B2 (en) Classifying a message based on fraud indicators
US8132011B2 (en) System and method for authenticating at least a portion of an e-mail message
CN108418777A (en) A kind of fishing mail detection method, apparatus and system
US10848618B1 (en) Dynamically providing safe phone numbers for responding to inbound communications
CN107231286B (en) Verification method and device for mail approval
Sankhwar et al. Email phishing: An enhanced classification model to detect malicious urls
Gansterer et al. Anti-spam methods-state of the art
CN113630397A (en) E-mail security control method, client and system
CN105704100A (en) File identification method and file identification device
CN110995576B (en) Mail detection method, device, equipment and storage medium
JP2008234437A (en) Electronic mail incorrect transmission prevention device and electronic mail incorrect transmission prevention method and program
US11757816B1 (en) Systems and methods for detecting scam emails
JP2018180871A (en) Electronic mail processing device and electronic mail processing program
CN115603924A (en) Detection method and device for phishing mails, electronic equipment and storage medium
Webber et al. Testing phishing detection criteria and methods
Parmar Detection of Phishing URL using Ensemble Learning Techniques
CN115396184A (en) Mail detection method and device and nonvolatile storage medium
CN117220950A (en) Phishing mail identification method, device, equipment and medium
CN117596227A (en) Intercepted mail processing method, device, equipment and medium
Curran et al. Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution
Trevino Improving Filtering of Email Phishing Attacks by Using Three-Way Text Classifiers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant