CN109660453A - A kind of safety monitoring method and its system - Google Patents

A kind of safety monitoring method and its system Download PDF

Info

Publication number
CN109660453A
CN109660453A CN201910069392.XA CN201910069392A CN109660453A CN 109660453 A CN109660453 A CN 109660453A CN 201910069392 A CN201910069392 A CN 201910069392A CN 109660453 A CN109660453 A CN 109660453A
Authority
CN
China
Prior art keywords
user
logs
behavior
logon information
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910069392.XA
Other languages
Chinese (zh)
Inventor
徐建红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TAICANG REDCODE SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
TAICANG REDCODE SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TAICANG REDCODE SOFTWARE TECHNOLOGY Co Ltd filed Critical TAICANG REDCODE SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201910069392.XA priority Critical patent/CN109660453A/en
Publication of CN109660453A publication Critical patent/CN109660453A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The present invention relates to a kind of safety monitoring method and its systems, comprising: monitoring user debarkation point is monitored user operation habits if user's login place is inconsistent with common site;The duration that user inputs logon information is obtained, and commonly uses input logon information time length ratio pair with user;The fault rate that user inputs logon information is obtained, and is compared with the common input logon information fault rate of user;The errors present that user inputs logon information is obtained, and is compared with the common input logon information errors present of user;It obtains the icon after user logs in and clicks order, if icon clicks order and user habit not being overlapped there are preset ratio after currently logging in, then determine dangerous to log in behavior;If single is logged in, there are the danger of preset times to log in behavior, determines that this time logs in and logs in be abnormal, logs in behavior to this time and is recorded and exited and logs in.

Description

A kind of safety monitoring method and its system
Technical field
The present invention relates to network security, in particular to a kind of safety monitoring method and its system.
Background technique
Email is most popular a kind of service on Internet.As long as user can have energy with network connection The address E-mail of the program and individual sent and received e-mail, so that it may with all user sides on network with the address E-mail Just, quickly, economically exchange Email, Email is widely used in the mechanisms such as individual, tissue, government, current application Wide e-mail system is as follows, the mailing system based on Postfix/Qmail;Based on Postfix, the mailbox of yahoo It is based on Qmail system;The Exchange mailing system of Microsoft;IBM Lotus Domino mailing system;Scalix mail system System;Zimbra mailing system;MDeamon mailing system.
But there are certain safety problems for Email, the problem of especially landing safely, in username and password quilt In the case where stealing, it is easy to be logged in by other people, personal information cannot be protected.Existing verification mode can not root User's operation is determine whether according to the operating habit of user.
Summary of the invention
Goal of the invention:
Aiming at the problem that mentioning in background technique, the present invention provides a kind of safety monitoring method and its system.
Technical solution:
A kind of safety monitoring method, comprising:
User debarkation point is monitored, if user's login place is inconsistent with common site, user operation habits are monitored;
The duration that user inputs logon information is obtained, and commonly uses input logon information time length ratio pair with user;Current input logs in The duration of information extends preset time or more, then determines dangerous log in compared with the common input logon information duration of user Behavior;
The fault rate that user inputs logon information is obtained, and is compared with the common input logon information fault rate of user;Current input The fault rate of logon information exceeds preset threshold, then determines dangerous compared with the common input logon information fault rate of user Log in behavior;
The errors present that user inputs logon information is obtained, and is compared with the common input logon information errors present of user;Currently The errors present of logon information is inputted compared with the common input logon information errors present of user, errors present is then sentenced without coincidence It is calmly dangerous to log in behavior;
It obtains the icon after user logs in and clicks order, if after currently logging in, icon click order is accustomed to existing default with user Ratio is not overlapped, then determines dangerous to log in behavior;
If single is logged in, there are the danger of preset times to log in behavior, determines that this time logs in and logs in be abnormal, logs in this time Behavior is recorded and is exited and logged in.
As a kind of preferred embodiment of the invention, comprising:
Determine that this time logs in push safety alarm to the secondary user after abnormal log in;
It obtains user and receives the operation after safety alarm;
If user accurately provides safe word, releases exception and log in judgement;If user cannot accurately provide safe word, continue pair This time, which logs in behavior and recorded and exited, to be logged in.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm includes providing the safety figure of user preset, if user accurately clicks the predeterminated position for presetting safe figure, is sentenced Determine user and safe word is accurately provided, releases exception and log in binding;If user cannot accurately click the predeterminated position for presetting safe figure, Then continue to log in this time behavior to be recorded and exited and log in.
As a kind of preferred embodiment of the invention, comprising:
Virtual new mail is preset to the secondary login user offer, and the behavior of the user is obtained, if the operation of the user It is inconsistent with predetermined registration operation, then determine dangerous to log in behavior.
As a kind of preferred embodiment of the invention, comprising:
If it is determined that the position is logged in there are secondary after exception logs in;Abnormal log in as login location user will be then determined A subsidiary risk log in behavior;
To it is secondary log in carry out danger log in behavior determine, if this time is logged in, there are the danger of preset times to log in behavior, sentences This fixed time logs in log in extremely, logs in behavior to this time and is recorded and exited and logs in.
A kind of system of safety monitoring method, comprising:
Address monitoring modular is recorded for monitoring the debarkation point of user, and to the common debarkation point of user;
It logs in duration and obtains module, the duration of logon information is inputted for obtaining user;
Duration comparison module is logged in, the common input logon information duration of duration and user for comparing input logon information;
It logs in fault rate and obtains module, the fault rate of logon information is inputted for obtaining user;
Fault rate comparison module is logged in, the common input logon information fault of the fault rate and user for comparing input logon information Rate;
It logs in mistake and obtains module, the mistake of logon information is inputted for obtaining user;
Wrong comparison module is logged in, for comparing the mistake and the common input logon information mistake of user of input logon information;
Judgment module logs in behavior and logs in the presence or absence of abnormal for judging whether there is danger;
Logging modle logs in behavior for recording danger;
Module is exited, is logged in for exiting this time.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm pushing module, for thinking that user pushes safety alarm after determining abnormal log in;
Safe word detection module, for detecting the safe word of user's input;
Safe word judgment module, for determining whether the safe word of user's input is accurate.
As a kind of preferred embodiment of the invention, comprising:
Safe figure pushing module, for pushing safety figure to user;
Safe figure identification module, for identification operation of the user to safety figure;
Safe figure determination module, for determining whether user's operation is consistent with predetermined registration operation.
As a kind of preferred embodiment of the invention, comprising:
Virtual mail provides module, for for providing virtual mail;
User behavior obtains module, for obtaining operation of the user to virtual mail;
User behavior determination module, for determining whether user behavior is consistent with default behavior.
As a kind of preferred embodiment of the invention, comprising:
Determination module is repeatedly logged in, logs in and records for the exception to same position, and the danger for increasing the position logs in Behavior determines.
The present invention realize it is following the utility model has the advantages that
1. the case where pair strange land logs in carries out the acquisition of user behavior, including the input time to user's logon information, input is stepped on The judgement of the fault rate, the errors present of input logon information of land information, traditionally determines whether user from user, mentions For the judgement of more details.
2. a pair judgement exception carries out secondary verifying after logging in, presupposed information is provided and is verified, if active user passes through two Secondary verifying then releases exception and logs in judgement.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and consistent with the instructions for explaining the principles of this disclosure.
Fig. 1 is a kind of system flow chart of safety monitoring method provided by the invention;
Fig. 2 is that a kind of safety monitoring method provided by the invention logs in duration decision flowchart;
Fig. 3 is that a kind of safety monitoring method provided by the invention logs in fault rate decision flowchart;
Fig. 4 is a kind of logon information mistake decision flowchart of safety monitoring method provided by the invention;
Fig. 5 is that a kind of exception of safety monitoring method provided by the invention logs in releasing decision flowchart;
Fig. 6 is that the exception of another safety monitoring method provided by the invention logs in releasing decision flowchart;
Fig. 7 is a kind of virtual mail decision flowchart of safety monitoring method provided by the invention;
Fig. 8 is that a kind of the secondary of safety monitoring method provided by the invention logs in decision flowchart.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Embodiment one
With reference to Fig. 1-8.
A kind of safety monitoring method, comprising:
User debarkation point is monitored, if user's login place is inconsistent with common site, user operation habits are monitored. User debarkation point is monitored, can specifically monitor user logs in IP address.As another embodiment, user can be monitored Beaching accommodation, logged in address very much if logging in also to can be used as in non-commonly used equipment.If user is being logged in address very much, Then user's operation is monitored.User operation habits include input habit, click habit etc..
The duration that user inputs logon information is obtained, and commonly uses input logon information time length ratio pair with user.Current input The duration of logon information extends preset time or more, then determines dangerous compared with the common input logon information duration of user Log in behavior.
A length of user, which starts to input logon information, when inputting logon information starts, cut-off logon information end of input when Between.Logon information includes user name, login password.As an implementation, when record user normally logs in, input logs in letter The duration of breath, and as the common input logon information duration of user.
Preset time may be configured as 20-60s, may be configured as 30s in the present embodiment.If the logon information currently logged in is defeated Enter duration beyond common input logon information duration preset time, then can determine that this time logs in and dangerous log in behavior.
The fault rate that user inputs logon information is obtained, and is compared with the common input logon information fault rate of user.Currently The fault rate of logon information is inputted compared with the common input logon information fault rate of user, exceeds preset threshold, then determines exist Danger logs in behavior.
User inputs the ratio that the fault rate of logon information inputs the information and gross information content modified in logon information for user Value, such as: logon information includes 28 characters, currently logs in and has modified 5 characters, then fault rate is 18%.As a kind of implementation Mode, input fault rate when record user normally logs in is as the common input logon information fault rate of user.
Preset threshold may be configured as 5%-10%, may be configured as 8% in the present embodiment.If active user logs in input and logs in When the fault rate of information and the common input logon information fault rate of user are compared beyond 8%, it is different in the presence of logging in will to determine that this time is logged in Often.
The errors present that user inputs logon information is obtained, and is compared with the common input logon information errors present of user. The errors present of current input logon information compared with the common input logon information errors present of user, errors present without coincidence, Then determine dangerous to log in behavior.
The errors present that user inputs logon information includes user in input logon information and verifies unsuccessful rear mistake Character position, character position are ranked up with sequence from left to right, from top to bottom.As an implementation, user is obtained The errors present of input logon information when normally logging in, and conclusion integration is carried out to it, most error-prone position conduct is discharged The common input logon information errors present of use.
Current input logon information errors present is compared with the common input logon information errors present of user, if wrong Accidentally position then determines that this dangerous logs in behavior without coincidence.
It obtains the icon after user logs in and clicks order, if after currently logging in, icon clicks order and user is accustomed to existing Preset ratio is not overlapped, then determines dangerous to log in behavior.
The click sequence for commonly using icon after user normally logs in is obtained, and compares and currently logs in down, user's click sequence, if There is the inconsistent of preset ratio, then determines that this is logged in and dangerous log in behavior.
Preset ratio may be configured as 50%-70%.
If single is logged in, there are the danger of preset times to log in behavior, determines that this time logs in and logs in be abnormal, to this time The behavior of logging in is recorded and is exited and logged in.Preset times may be configured as 2-4 times, and the danger for preset times occur logs in behavior, It then can determine that abnormal log in.
As a kind of preferred embodiment of the invention, comprising:
Determine that this time logs in push safety alarm to the secondary user after abnormal log in.
It obtains user and receives the operation after safety alarm.
If user accurately provides safe word, releases exception and log in judgement.If user cannot accurately provide safe word, after It is continuous behavior is logged in this time recorded and exited log in.
Safe word is the safe word of user preset, and active user inputs safe word after receiving safety alarm, if safe word Inaccuracy will continue to execute the subsequent operation logged in extremely.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm includes providing the safety figure of user preset, if user accurately clicks the predeterminated position for presetting safe figure, is sentenced Determine user and safe word is accurately provided, releases exception and log in binding.If user cannot accurately click the predeterminated position for presetting safe figure, Then continue to log in this time behavior to be recorded and exited and log in.
Safety figure is that user preset is schemed safely, and specified default click location, safe figure can be the picture of arbitrary content, packet Text can be had by including in picture.
As a kind of preferred embodiment of the invention, comprising:
Virtual new mail is preset to the secondary login user offer, and the behavior of the user is obtained, if the operation of the user It is inconsistent with predetermined registration operation, then determine dangerous to log in behavior.
Presetting virtual mail is to be shown as new mail after logging in, and operation of the user preset to the virtual mail currently logs in User need to complete the predetermined registration operation to the virtual mail.
As a kind of preferred embodiment of the invention, comprising:
If it is determined that the position is logged in there are secondary after exception logs in.Abnormal log in as login location user will be then determined A subsidiary risk log in behavior.
To it is secondary log in carry out danger log in behavior determine, if this time is logged in, there are the danger of preset times to log in behavior, Then determine that this time logs in log in be abnormal, behavior is logged in this time is recorded and exited and log in.
Behavior is logged in the exception of position with the period, and the danger after being marked as secondary log in is logged in into behavior.
Embodiment two
A kind of system of safety monitoring method, comprising:
Address monitoring modular is recorded for monitoring the debarkation point of user, and to the common debarkation point of user.
It logs in duration and obtains module, the duration of logon information is inputted for obtaining user.
Duration comparison module is logged in, when the duration and user for comparing input logon information commonly use input logon information It is long.
It logs in fault rate and obtains module, the fault rate of logon information is inputted for obtaining user.
Fault rate comparison module is logged in, the common input logon information of fault rate and user for comparing input logon information Fault rate.
It logs in mistake and obtains module, the mistake of logon information is inputted for obtaining user.
Wrong comparison module is logged in, the mistake and the common input logon information of user for comparing input logon information are wrong Accidentally.
Judgment module logs in behavior and logs in the presence or absence of abnormal for judging whether there is danger.
Logging modle logs in behavior for recording danger.
Module is exited, is logged in for exiting this time.
As a kind of preferred embodiment of the invention, comprising:
Safety alarm pushing module, for thinking that user pushes safety alarm after determining abnormal log in.
Safe word detection module, for detecting the safe word of user's input.
Safe word judgment module, for determining whether the safe word of user's input is accurate.
As a kind of preferred embodiment of the invention, comprising:
Safe figure pushing module, for pushing safety figure to user.
Safe figure identification module, for identification operation of the user to safety figure.
Safe figure determination module, for determining whether user's operation is consistent with predetermined registration operation.
As a kind of preferred embodiment of the invention, comprising:
Virtual mail provides module, for for providing virtual mail.
User behavior obtains module, for obtaining operation of the user to virtual mail.
User behavior determination module, for determining whether user behavior is consistent with default behavior.
As a kind of preferred embodiment of the invention, comprising:
Determination module is repeatedly logged in, logs in and records for the exception to same position, and the danger for increasing the position logs in Behavior determines.
The above embodiments merely illustrate the technical concept and features of the present invention, and the purpose is to allow the skill for being familiar with the technical field Art personnel can understand the content of the present invention and implement it accordingly, and can not be limited the scope of the invention with this.All bases Equivalent changes or modifications made by spirit of the invention, should be covered by the protection scope of the present invention.

Claims (10)

1. a kind of safety monitoring method characterized by comprising
User debarkation point is monitored, if user's login place is inconsistent with common site, user operation habits are monitored;
The duration that user inputs logon information is obtained, and commonly uses input logon information time length ratio pair with user;Current input logs in The duration of information extends preset time or more, then determines dangerous log in compared with the common input logon information duration of user Behavior;
The fault rate that user inputs logon information is obtained, and is compared with the common input logon information fault rate of user;Current input The fault rate of logon information exceeds preset threshold, then determines dangerous compared with the common input logon information fault rate of user Log in behavior;
The errors present that user inputs logon information is obtained, and is compared with the common input logon information errors present of user;Currently The errors present of logon information is inputted compared with the common input logon information errors present of user, errors present is then sentenced without coincidence It is calmly dangerous to log in behavior;
It obtains the icon after user logs in and clicks order, if after currently logging in, icon click order is accustomed to existing default with user Ratio is not overlapped, then determines dangerous to log in behavior;
If single is logged in, there are the danger of preset times to log in behavior, determines that this time logs in and logs in be abnormal, logs in this time Behavior is recorded and is exited and logged in.
2. a kind of safety monitoring method according to claim 1 characterized by comprising
Determine that this time logs in push safety alarm to the secondary user after abnormal log in;
It obtains user and receives the operation after safety alarm;
If user accurately provides safe word, releases exception and log in judgement;If user cannot accurately provide safe word, continue pair This time, which logs in behavior and recorded and exited, to be logged in.
3. a kind of safety monitoring method according to claim 2 characterized by comprising
Safety alarm includes providing the safety figure of user preset, if user accurately clicks the predeterminated position for presetting safe figure, is sentenced Determine user and safe word is accurately provided, releases exception and log in binding;If user cannot accurately click the predeterminated position for presetting safe figure, Then continue to log in this time behavior to be recorded and exited and log in.
4. a kind of safety monitoring method according to claim 1 characterized by comprising
Virtual new mail is preset to the secondary login user offer, and the behavior of the user is obtained, if the operation of the user It is inconsistent with predetermined registration operation, then determine dangerous to log in behavior.
5. a kind of safety monitoring method according to claim 1 characterized by comprising
If it is determined that the position is logged in there are secondary after exception logs in;Abnormal log in as login location user will be then determined A subsidiary risk log in behavior;
To it is secondary log in carry out danger log in behavior determine, if this time is logged in, there are the danger of preset times to log in behavior, sentences This fixed time logs in log in extremely, logs in behavior to this time and is recorded and exited and logs in.
6. a kind of system of safety monitoring method according to claim 1-5 characterized by comprising
Address monitoring modular is recorded for monitoring the debarkation point of user, and to the common debarkation point of user;
It logs in duration and obtains module, the duration of logon information is inputted for obtaining user;
Duration comparison module is logged in, the common input logon information duration of duration and user for comparing input logon information;
It logs in fault rate and obtains module, the fault rate of logon information is inputted for obtaining user;
Fault rate comparison module is logged in, the common input logon information fault of the fault rate and user for comparing input logon information Rate;
It logs in mistake and obtains module, the mistake of logon information is inputted for obtaining user;
Wrong comparison module is logged in, for comparing the mistake and the common input logon information mistake of user of input logon information;
Judgment module logs in behavior and logs in the presence or absence of abnormal for judging whether there is danger;
Logging modle logs in behavior for recording danger;
Module is exited, is logged in for exiting this time.
7. a kind of system of safety monitoring method according to claim 6 characterized by comprising
Safety alarm pushing module, for thinking that user pushes safety alarm after determining abnormal log in;
Safe word detection module, for detecting the safe word of user's input;
Safe word judgment module, for determining whether the safe word of user's input is accurate.
8. a kind of system of safety monitoring method according to claim 7 characterized by comprising
Safe figure pushing module, for pushing safety figure to user;
Safe figure identification module, for identification operation of the user to safety figure;
Safe figure determination module, for determining whether user's operation is consistent with predetermined registration operation.
9. a kind of system of safety monitoring method according to claim 6 characterized by comprising
Virtual mail provides module, for for providing virtual mail;
User behavior obtains module, for obtaining operation of the user to virtual mail;
User behavior determination module, for determining whether user behavior is consistent with default behavior.
10. according to right to go 6 described in a kind of system of safety monitoring method characterized by comprising
Determination module is repeatedly logged in, logs in and records for the exception to same position, and the danger for increasing the position logs in Behavior determines.
CN201910069392.XA 2019-01-24 2019-01-24 A kind of safety monitoring method and its system Pending CN109660453A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910069392.XA CN109660453A (en) 2019-01-24 2019-01-24 A kind of safety monitoring method and its system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910069392.XA CN109660453A (en) 2019-01-24 2019-01-24 A kind of safety monitoring method and its system

Publications (1)

Publication Number Publication Date
CN109660453A true CN109660453A (en) 2019-04-19

Family

ID=66121412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910069392.XA Pending CN109660453A (en) 2019-01-24 2019-01-24 A kind of safety monitoring method and its system

Country Status (1)

Country Link
CN (1) CN109660453A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301286A (en) * 2013-07-15 2015-01-21 中国移动通信集团黑龙江有限公司 User login authentication method and device
CN109040103A (en) * 2018-08-27 2018-12-18 深信服科技股份有限公司 A kind of mail account is fallen detection method, device, equipment and readable storage medium storing program for executing

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301286A (en) * 2013-07-15 2015-01-21 中国移动通信集团黑龙江有限公司 User login authentication method and device
CN109040103A (en) * 2018-08-27 2018-12-18 深信服科技股份有限公司 A kind of mail account is fallen detection method, device, equipment and readable storage medium storing program for executing

Similar Documents

Publication Publication Date Title
CA2747601C (en) Message filter with replacement text
US9454672B2 (en) Message distribution control
US9253207B2 (en) Collaborative phishing attack detection
US8108528B2 (en) System and method for verifying the identity of a chat partner during an instant messaging session
US7840997B2 (en) Method and device for computer memory protection against unauthorized access
Brocklehurst et al. On measurement of operational security
US20080084972A1 (en) Verifying that a message was authored by a user by utilizing a user profile generated for the user
US7016937B1 (en) Method and apparatus for generating reminders to transmit electronic mail attachments by parsing e-mail message text
WO2009109046A1 (en) Multiple-layer chat filter system and method
CN105553996B (en) Handle the method and device of data access request
CN104363240A (en) Unknown threat comprehensive detection method based on information flow behavior validity detection
CN107241192A (en) The method and device that a kind of use fingerprint key is logged in
CN105955566A (en) Method for information prompt, and terminal
US20090006561A1 (en) Method of and system for retracting instant messages
CN109660453A (en) A kind of safety monitoring method and its system
CN106791036A (en) A kind of information processing method, device and mobile terminal
JP2012037948A (en) Method for changing device setting
CN109660566A (en) A kind of safety detection method and its system logging in risk control for strange land
CN109428804B (en) Account management method and device
CN104363160B (en) It is a kind of to carry the email processing method of document attachment, device and system
DEALVARE et al. A framework for password selection
CN104253809B (en) The method and system of content in a kind of detection network
CN109889507A (en) It is a kind of for monitoring the monitoring method and its system of mailbox safe operation
CN109617795A (en) A kind of method and system sending message
CN106293361A (en) A kind of information replying method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190419