CN108446543A - A kind of email processing method, system and mail proxy gateway - Google Patents

A kind of email processing method, system and mail proxy gateway Download PDF

Info

Publication number
CN108446543A
CN108446543A CN201810124144.6A CN201810124144A CN108446543A CN 108446543 A CN108446543 A CN 108446543A CN 201810124144 A CN201810124144 A CN 201810124144A CN 108446543 A CN108446543 A CN 108446543A
Authority
CN
China
Prior art keywords
mail
watermark
extraction
watermark information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810124144.6A
Other languages
Chinese (zh)
Other versions
CN108446543B (en
Inventor
杨斌
喻波
王志海
魏效征
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN201810124144.6A priority Critical patent/CN108446543B/en
Publication of CN108446543A publication Critical patent/CN108446543A/en
Application granted granted Critical
Publication of CN108446543B publication Critical patent/CN108446543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes

Abstract

The invention discloses a kind of email processing method, system and mail proxy gateways, and this approach includes the following steps:Extract the Mail Contents of mail to be sent;Rule match is carried out to the Mail Contents of extraction, obtains matching result;Mail watermark information is extracted to the mail of hit rule;The watermark information of extraction is compared with watermark information to be added is needed, is decided whether to add watermark to mail according to comparative situation.Technical scheme of the present invention, it being capable of information leakage caused by during effective solution mail outgoing, repeatedly forwarding, the problems such as can not tracking, the safety that Mail Contents can be improved is transmitted and legal use, promotes the protection of Mail Contents to a new safe altitude.

Description

A kind of email processing method, system and mail proxy gateway
Technical field
The present invention relates to data security arts, and in particular to a kind of email processing method, system and mail proxy gateway.
Background technology
Mail agent sends and receives for mail and provides faster, more as the bridge between Mail Clients and server Efficiently, safer management and control.
Watermark, i.e., a kind of background adding technique, in the background of the contents such as document, picture, multimedia, addition is translucent Word or picture, the content for marking the Email attachment.The important tool that mail is transmitted as information, takes in transmittance process With a large amount of sensitive information, information secondary leakage in order to prevent, tracked information source, to Email attachment when mail is sent Specific watermark is added, the mail so just readily appreciates which company the mail is under the jurisdiction of in transmittance process, which portion Door, if allow the warning information such as unofficial biography, effectively can remind and constrain the secondary forwarding of mail, avoid the secondary of information and let out Leakage.
Mail watermark is on the basis of mail agent, by mail agent repeating process, identifying the sensitivity of mail Keyword or important attribute, and then the mail for meeting policy mandates is added according to the watermark format of setting, it adds successfully Afterwards, mail continues back at agency and is normally delivered.
Mail agent is the terminal of mail, and common mail agent is for the purpose of being forwarded to mail at present, it is difficult to Reach and Mail Contents be detected and added with watermark, watermark addition not only include common office documents, further include picture, The multimedia forms such as video, and ensure that the loss on attribute does not occur for the file after watermark processing.
A kind of audio auditing method and system (application number based on watermark are proposed in the prior art: CN201610035147.3), this technology provides the audio auditing methods and system of a kind of watermark, are flowed in or out by capture All data packets of audio file server carry out the parsing of network layer IP protocol and transport layer Transmission Control Protocol, obtain relevant net Network transmits information;TCP recombinations are carried out, the parsing of application layer protocol is carried out, obtains effective audio fragment, by effective audio piece Duan Jinhang watermarks parse, and obtain the audio key content information for including in audio frequency watermark;It is docked with relevant identity authorization system, The identity information of audio access person is obtained, structure includes visitor, the complete audit chain for accessing behavior, accessing object.
Above-mentioned patent formula, it is characterised in that, including:Packet capture, ICP/IP protocol are handled, at application layer protocol Reason, file fragment reduction, watermark parsing, identity docking, system administration and audit information are shown.
The above-mentioned prior art has the following disadvantages:
(1) above-mentioned technology is by obtaining key content information to the parsing of network packet, being carried out to the information of acquisition Record audit fails to take compulsory measure to needing the mail of outgoing to carry out watermark processing;
(2) above-mentioned technology is audited only for the watermark of audio, is not directed to extended formatting.
It is, therefore, desirable to provide and a kind of mail agent method based on watermark for realizing, this method passes through to Email attachment A series of processing such as parsing, extraction, the analysis of content, the sensitive source of correct identification, and to the watermark of attachment addition setting, then Processed mail continues to be put into proxy server and deliver.
Invention content
In order to solve the above technical problems, the present invention provides a kind of email processing method, this approach includes the following steps:
Extract the Mail Contents of mail to be sent;
Rule match is carried out to the Mail Contents of extraction, obtains matching result;
Mail watermark information is extracted to the mail of hit rule;
The watermark information of extraction is compared with watermark information to be added is needed, is decided whether to postal according to comparative situation Part adds watermark.
With the method for the invention it is preferred to, the Mail Contents include:Mail transmits/receives part people, mail matter topics, postal Part text, Email attachment.
With the method for the invention it is preferred to, the rule match includes:Canonical matching, keyword match, machine learning Matching, file fingerprint matching.
With the method for the invention it is preferred to, to the watermark information of the Email attachment extraction document of hit rule, according to postal The file format of part attachment extracts the watermark information of different-format.
With the method for the invention it is preferred to, the watermark information of extraction is compared with watermark information to be added is needed;
If it is text watermark, then whether identical both compare, watermark no longer is added to the mail when identical, it otherwise will be new Text watermark replaces old text watermark;
If it is picture watermark, then compare whether the two similarity is more than given threshold, more than given threshold then not to this Mail adds watermark, otherwise replaces old picture watermark with new picture watermark.
In order to solve the above technical problems, the present invention provides a kind of mail proxy gateway, which includes:
Mail Contents extraction module extracts the Mail Contents of mail to be sent;
Mail matching module carries out rule match to the Mail Contents of extraction, obtains matching result;
Mail watermark extracting module extracts mail watermark information to the mail of hit rule;
Mail watermark identification module, is identified the watermark information of extraction;
Mail watermark add module compares the watermark information of extraction with watermark information to be added is needed, according to right Decide whether to add watermark to mail than situation.
According to an embodiment of the invention, it is preferred that the Mail Contents include:Mail transmit/receive part people, mail matter topics, Message body, Email attachment.
According to an embodiment of the invention, it is preferred that the rule match includes:Canonical matching, keyword match, engineering Practise matching, file fingerprint matching.
According to an embodiment of the invention, it is preferred that the mail watermark add module, to the watermark information and needs of extraction The watermark information of addition is compared;
If it is text watermark, then whether identical both compare, watermark no longer is added to the mail when identical, it otherwise will be new Text watermark replaces old text watermark;
If it is picture watermark, then compare whether the two similarity is more than given threshold, more than given threshold then not to this Mail adds watermark, otherwise replaces old picture watermark with new picture watermark.
In order to solve the above technical problems, the present invention provides a kind of mail proxy gateway, which includes computer disposal Device and computer storage media, the computer storage media are stored with computer program instructions, are filled by computer disposal It sets and executes the computer program instructions realization such as one of above-mentioned method.
In order to solve the above technical problems, the present invention provides a kind of post-processing system, which includes:Mail sends clothes Business device, mail reception server and such as one of above-mentioned mail proxy gateway.
The mail watermark processing proposed by this method, can information caused by during effective solution mail outgoing let out Dew, multiple the problems such as forwarding, can not tracking, the multiple transmission of mail and illegal purposes can be effectively avoided, information leakage is avoided The loss that enterprise is caused not retrieving.
The complete skill solution proposed by this method, can improve the safety transmission of Mail Contents makes with legal With protecting privately owned intellectual property, promote the protection of Mail Contents to a new safe altitude.
Description of the drawings
Fig. 1 is flow chart of the method for the present invention.
Fig. 2 is the gateway composition frame chart of the present invention.
Fig. 3 is the mailing system composition frame chart of the present invention.
Specific implementation mode
Such as Fig. 1, it is flow chart of the method for the present invention, specifically includes:
Mail treatment process proposed by the present invention is as shown in Figure 1, which includes extraction Mail Contents, Mail Contents and rule It then matches, extract mail watermark information, watermark identification, addition watermark totally 5 processing steps sequentially carried out, it is a series of by this Mail treatment, there is specific filtering, normal mail security to be sent to mail server in the mail of outgoing.Below to this 5 A information handling step is introduced one by one:
(1) Mail Contents are extracted
Part people (including make a copy for, close send), theme, text, attachment are transmitted/received according to what the original document of mail extracted mail (including attachment format, size, content) etc. carries out content detection convenient for subsequent module;
(2) Mail Contents and rule match
Rule match carried out to the Mail Contents of extraction, definition rule when defines according to the risk class of Rule content Different severity is matched according to the harm severity of rule, and matching way includes canonical, keyword, engineering Habit, fingerprint recognition etc..
(3) mail watermark information is extracted
Only there may be watermarks for Email attachment, and attachment format is office documents, PDF, picture, multimedia etc..It is right The watermark information for hitting the Email attachment extraction document of rule extracts the watermark letter of different-format according to the file format of attachment Breath.Such as:For office documents, N (N are randomly selected>1) background picture of page document, and compare pixel and the spy of picture Point is levied, if identical illustrate that this document has added watermark, which is watermark information.
(4) watermark identifies
The watermark information of extraction is compared with watermark information to be added is needed, it is if it is text watermark, then more literary Whether word content is identical, identical, no longer adds watermark, and when different, old watermark is replaced with new watermark;, if it is picture watermark, Then compare picture similarity, if similarity is more than 80%, addition watermark is not repeated to this document, is otherwise needed to this article Part repeats addition watermark information and replaces original picture watermark with new picture watermark.
(5) watermark is added
To needing the file for adding watermark according to watermark style (text watermark and the picture watermark, wherein word water of setting Print includes font, color, interval, angle;Picture watermark includes transparency, angle) addition watermark information, keep former after having added The integrality of beginning file, and the mail is sent to mail outgoing queue and is forwarded.
Such as Fig. 2, it is the mail proxy gateway block diagram of the present invention, specifically includes:
Mail Contents module transmits/receives part people (including make a copy for, close send), main according to what the original document of mail extracted mail Topic, text, attachment (including attachment format, size, content) etc. carry out content detection convenient for subsequent module;
Mail matching module carries out rule match to the Mail Contents of extraction, is matched according to the extent of injury of rule, Matching way includes canonical, keyword, machine learning, fingerprint recognition etc., and matching result is then passed to module (3).
Mail watermark extracting module, to the watermark information of the Email attachment extraction document of hit rule, according to the text of attachment Part format extracts the watermark information of different-format.
Mail watermark identification module compares the watermark information of extraction with watermark information to be added is needed, if it is Text watermark, then whether identical, if it is picture watermark, then compare picture similarity, if similarity is more than if comparing word 80%, then addition watermark is not repeated to this document, be responsible for needing to repeat addition watermark information to this document.
Mail watermark add module, to needing the file for adding watermark to add watermark information according to the watermark style of setting, The integrality of original document is kept after having added, and the mail is sent to mail outgoing queue and is forwarded.
Such as Fig. 3, Mail Gateway is deployed to by way of agency in mailing system, then outgoing mail server is directed toward The next hop address of the agency, agency are configured to mail reception server, allow for all mails of outgoing in this way and all need to pass through Mail Gateway forwarding could realize that delivery, Mail Gateway set up successive check being ultimately forwarded to mail service to the mail of outgoing Device, detailed process are described as follows:
First, industry sensitive keys word and important rule where user sets can select setting keyword, regular expressions Formula, fuzzy keyword, machine learning, document fingerprint etc., and to the corresponding response mode of these Rulemakings;
Secondly, user, which can simulate, sends the mail comprising sensitive keys word and carries attachment transmission, mail recognition to attachment Watermark information simultaneously judges whether to add watermark information again, adds watermark information if necessary.
Then, user can check whether the Email attachment content has added watermark letter by mailing in receiving terminal Whether breath and watermark meet the requirements.
Finally, by above step, it can be seen that in the actual environment, mail agent during mail outgoing for adding water Whether print operation achievees the effect that anticipation.
The mail watermark processing proposed by this method, can information caused by during effective solution mail outgoing let out Dew, multiple the problems such as forwarding, can not tracking, the multiple transmission of mail and illegal purposes can be effectively avoided, information leakage is avoided The loss that enterprise is caused not retrieving.
The complete skill solution proposed by this method, can improve the safety transmission of Mail Contents makes with legal With protecting privately owned intellectual property, promote the protection of Mail Contents to a new safe altitude.
For system embodiments, since it is basically similar to the method embodiment, so fairly simple, the correlation of description Place illustrates referring to the part of embodiment of the method.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with The difference of other embodiment, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can be provided as method, system or calculate Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present invention be with reference to according to the method for the embodiment of the present invention, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in flow and/or box combination.These can be provided Computer program instructions send terminal to all-purpose computer, special purpose computer, embedded transmitter or other programmable datas and set Standby transmitter is to generate a machine so that the transmitter that terminal device is sent by computer or other programmable datas is held Capable instruction generates for realizing in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes The system of specified function.
These computer program instructions, which may also be stored in, can guide computer or other programmable datas to send terminal device In computer-readable memory operate in a specific manner so that instruction stored in the computer readable memory generates packet The manufacture of instruction system is included, which realizes in one flow of flow chart or multiple flows and/or one side of block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable datas are sent on terminal device so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented transmission, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one flow of flow chart or multiple flows And/or in one box of block diagram or multiple boxes specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also include other elements that are not explicitly listed, or further include for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device including the element.
Above to a kind of email processing method provided by the present invention, system and Mail Gateway, it is described in detail, Principle and implementation of the present invention are described for specific case used herein, and the explanation of above example is only used In facilitating the understanding of the method and its core concept of the invention;Meanwhile for those of ordinary skill in the art, according to the present invention Thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not be construed as Limitation of the present invention.

Claims (11)

1. a kind of email processing method, which is characterized in that this approach includes the following steps:
Extract the Mail Contents of mail to be sent;
Rule match is carried out to the Mail Contents of extraction, obtains matching result;
Mail watermark information is extracted to the mail of hit rule;
The watermark information of extraction is compared with watermark information to be added is needed, decides whether to add mail according to comparative situation Watermarking.
2. according to the method described in claim 1, the Mail Contents include:Mail transmits/receives part people, mail matter topics, mail Text, Email attachment.
3. according to the method described in claim 1, the rule match includes:Canonical matching, keyword match, machine learning Match, file fingerprint matching.
4. according to the method described in claim 1, to the watermark information of the regular Email attachment extraction document of hit, according to mail The file format of attachment extracts the watermark information of different-format.
5. according to the method described in claim 1, the watermark information to extraction is compared with watermark information to be added is needed;
If it is text watermark, then whether identical both compare, watermark no longer is added to the mail when identical, otherwise by new literacy Old text watermark is replaced in watermark;
If it is picture watermark, then compare whether the two similarity is more than given threshold, more than given threshold then not to the mail Watermark is added, otherwise replaces old picture watermark with new picture watermark.
6. a kind of mail proxy gateway, which is characterized in that the gateway includes:
Mail Contents extraction module extracts the Mail Contents of mail to be sent;
Mail matching module carries out rule match to the Mail Contents of extraction, obtains matching result;
Mail watermark extracting module extracts mail watermark information to the mail of hit rule;
Mail watermark identification module, is identified the watermark information of extraction;
Mail watermark add module compares the watermark information of extraction with watermark information to be added is needed, according to comparison feelings Condition decides whether to add watermark to mail.
7. gateway according to claim 6, the Mail Contents include:Mail transmits/receives part people, mail matter topics, mail Text, Email attachment.
8. gateway according to claim 6, the rule match include:Canonical matching, keyword match, machine learning Match, file fingerprint matching.
9. gateway according to claim 6, the mail watermark add module, to the watermark information of extraction with need to add Watermark information compared;
If it is text watermark, then whether identical both compare, watermark no longer is added to the mail when identical, otherwise by new literacy Old text watermark is replaced in watermark;
If it is picture watermark, then compare whether the two similarity is more than given threshold, more than given threshold then not to the mail Watermark is added, otherwise replaces old picture watermark with new picture watermark.
10. a kind of mail proxy gateway, which includes computer processor unit and computer storage media, and the computer is deposited Storage media is stored with computer program instructions, and executing the computer program instructions by computer processor unit realizes such as right It is required that the method described in one of 1-5.
11. a kind of post-processing system, the system include:Outgoing mail server, mail reception server and as right is wanted Seek the mail proxy gateway described in one of 6-9.
CN201810124144.6A 2018-02-07 2018-02-07 Mail processing method, system and mail proxy gateway Active CN108446543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810124144.6A CN108446543B (en) 2018-02-07 2018-02-07 Mail processing method, system and mail proxy gateway

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810124144.6A CN108446543B (en) 2018-02-07 2018-02-07 Mail processing method, system and mail proxy gateway

Publications (2)

Publication Number Publication Date
CN108446543A true CN108446543A (en) 2018-08-24
CN108446543B CN108446543B (en) 2020-06-12

Family

ID=63191793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810124144.6A Active CN108446543B (en) 2018-02-07 2018-02-07 Mail processing method, system and mail proxy gateway

Country Status (1)

Country Link
CN (1) CN108446543B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083041A (en) * 2019-11-29 2020-04-28 百度在线网络技术(北京)有限公司 Mail processing method and device and electronic equipment
CN112688858A (en) * 2020-12-18 2021-04-20 合肥高维数据技术有限公司 Mail sending method and device
CN112799676A (en) * 2021-02-01 2021-05-14 长沙市到家悠享网络科技有限公司 Data feedback method and device, equipment and medium
CN113923482A (en) * 2021-09-02 2022-01-11 北京奇艺世纪科技有限公司 Video playing method, system, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090265439A1 (en) * 2008-01-31 2009-10-22 Koki Nakashiro E-mail repeater and relay method of the same
CN102480492A (en) * 2010-11-22 2012-05-30 中国电信股份有限公司 Method and device for monitoring input/output of sensitive file
CN107172081A (en) * 2017-06-28 2017-09-15 北京明朝万达科技股份有限公司 A kind of method and apparatus of data check

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090265439A1 (en) * 2008-01-31 2009-10-22 Koki Nakashiro E-mail repeater and relay method of the same
CN102480492A (en) * 2010-11-22 2012-05-30 中国电信股份有限公司 Method and device for monitoring input/output of sensitive file
CN107172081A (en) * 2017-06-28 2017-09-15 北京明朝万达科技股份有限公司 A kind of method and apparatus of data check

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083041A (en) * 2019-11-29 2020-04-28 百度在线网络技术(北京)有限公司 Mail processing method and device and electronic equipment
CN112688858A (en) * 2020-12-18 2021-04-20 合肥高维数据技术有限公司 Mail sending method and device
CN112799676A (en) * 2021-02-01 2021-05-14 长沙市到家悠享网络科技有限公司 Data feedback method and device, equipment and medium
CN112799676B (en) * 2021-02-01 2023-08-15 长沙市到家悠享网络科技有限公司 Data feedback method and device, equipment and medium
CN113923482A (en) * 2021-09-02 2022-01-11 北京奇艺世纪科技有限公司 Video playing method, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN108446543B (en) 2020-06-12

Similar Documents

Publication Publication Date Title
US9454672B2 (en) Message distribution control
CN108446543A (en) A kind of email processing method, system and mail proxy gateway
US8661545B2 (en) Classifying a message based on fraud indicators
Panchenko et al. Website fingerprinting in onion routing based anonymization networks
US20140189879A1 (en) Method for identifying file type and apparatus for identifying file type
US8011003B2 (en) Method and apparatus for handling messages containing pre-selected data
US20170251001A1 (en) Metadata information based file processing
Medvet et al. Visual-similarity-based phishing detection
CN103430504B (en) For protecting the system and method specifying data combination
EP2411913B1 (en) Method and system for identifying suspected phishing websites
EP1891571B1 (en) Resisting the spread of unwanted code and data
US6880087B1 (en) Binary state machine system and method for REGEX processing of a data stream in an intrusion detection system
EP1853976B1 (en) Method and apparatus for handling messages containing pre-selected data
US20060184549A1 (en) Method and apparatus for modifying messages based on the presence of pre-selected data
US20080033913A1 (en) Techniques for Preventing Insider Theft of Electronic Documents
US10038706B2 (en) Systems, devices, and methods for separating malware and background events
CN111147489B (en) Link camouflage-oriented fishfork attack mail discovery method and device
WO2017162997A1 (en) A method of protecting a user from messages with links to malicious websites containing homograph attacks
US11936686B2 (en) System, device and method for detecting social engineering attacks in digital communications
Shupo et al. Toward efficient detection of child pornography in the network infrastructure
Zhang et al. An information protection system for intranets
JP5643357B2 (en) Electronic digital data concealment inspection apparatus and method and computer-readable storage medium thereof
US20240039948A1 (en) Mail protection system
Al Zahmi Protection Against Illicit Email Tracking
US8749807B2 (en) Method, system, and terminal for printed matter security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant