CN115801719A - Mail processing method, device, equipment and readable storage medium - Google Patents
Mail processing method, device, equipment and readable storage medium Download PDFInfo
- Publication number
- CN115801719A CN115801719A CN202211696660.9A CN202211696660A CN115801719A CN 115801719 A CN115801719 A CN 115801719A CN 202211696660 A CN202211696660 A CN 202211696660A CN 115801719 A CN115801719 A CN 115801719A
- Authority
- CN
- China
- Prior art keywords
- verification
- mailbox address
- sender
- key information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 24
- 238000012795 verification Methods 0.000 claims abstract description 172
- 238000000034 method Methods 0.000 claims abstract description 57
- 238000012545 processing Methods 0.000 claims abstract description 29
- 238000013507 mapping Methods 0.000 claims description 10
- 230000002159 abnormal effect Effects 0.000 abstract description 12
- 238000001914 filtration Methods 0.000 abstract description 6
- 230000000875 corresponding effect Effects 0.000 description 17
- 101001094649 Homo sapiens Popeye domain-containing protein 3 Proteins 0.000 description 13
- 101000608234 Homo sapiens Pyrin domain-containing protein 5 Proteins 0.000 description 13
- 101000578693 Homo sapiens Target of rapamycin complex subunit LST8 Proteins 0.000 description 13
- 102100027802 Target of rapamycin complex subunit LST8 Human genes 0.000 description 13
- 238000010586 diagram Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Abstract
The application provides a mail processing method, a mail processing device, mail processing equipment and a readable storage medium. The method comprises the following steps: receiving a first mail sent by a sender server; acquiring mail key information of a first mail, wherein the mail key information comprises at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving a first mail; generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to a sender server; receiving a verification mail sent by a sender server, verifying that the recipient address of the mail is a virtual mailbox address, and verifying that the mail comprises information to be verified; and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification. The method simplifies the service flow of filtering and intercepting the abnormal mails, and improves the success rate of intercepting the abnormal mails.
Description
Technical Field
The present application relates to the field of network security technologies, and in particular, to a method, an apparatus, a device, and a readable storage medium for processing a mail.
Background
With the further development of the information-oriented era, enterprise informatization is also deepened, wherein enterprise informatization solutions including mail systems, database systems and the like become infrastructure of enterprises.
The employee mailboxes of large enterprises belong to public information due to a large number of business relations and work requirements; for the reason of information disclosure, providing a contact mailbox is a necessary option for special enterprises. Such information is all valid target information for spammers. If the preposition detection and interception are not carried out, all the e-mails, including junk mails and fishing mails, can reach the server of the receiver.
Detecting and classifying e-mail requires a large number of servers and computing power, and false reports with a certain probability generally occur. The e-mail which is not reported can reach the server of the receiving party, so that the possibility of information leakage exists in enterprises and clients.
Disclosure of Invention
The application provides a mail processing method, a mail processing device, mail processing equipment and a readable storage medium, which are used for isolating an internal server of a receiver and filtering and intercepting abnormal mails in advance.
In a first aspect, the present application provides a mail processing method, including:
receiving a first mail sent by a sender server;
acquiring mail key information of the first mail, wherein the mail key information comprises at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail;
generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to the sender server;
receiving a verification mail sent by the sender server, wherein the recipient address of the verification mail is the virtual mailbox address, and the verification mail comprises information to be verified;
and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the recipient when the verification mail passes verification.
Optionally, the verifying the verification email includes:
determining a valid time period corresponding to the verification mail;
acquiring a first moment when the verification mail is received;
and verifying the verification mail according to the effective time period, the first moment and the information to be verified.
Optionally, performing verification processing on the verification email according to the valid period, the first time and the information to be verified, including:
judging whether the first time is within the effective time period;
if yes, verifying the verification mail according to the to-be-verified information;
if not, determining that the verification mail fails to be verified.
Optionally, performing verification processing on the verification email according to the to-be-verified information, including:
inquiring the mail key information corresponding to the virtual mailbox address in a mapping table;
judging whether the information to be verified is the same as the key information of the mail;
if yes, determining that the verification mail passes verification;
if not, determining that the verification mail fails to be verified.
Optionally, generating a virtual mailbox address according to the mail key information includes:
judging whether a white list or a black list comprises the sender mailbox address or not;
and if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the mail key information.
Optionally, the method further comprises:
if the white list comprises the sender mailbox address, the first mail is sent according to the receiver mailbox address;
and if the blacklist list comprises the sender mailbox address, discarding the first mail.
Optionally, generating a virtual mailbox address according to the mail key information includes:
performing HASH operation or MD5 operation on the mail key information to obtain first information;
and generating the virtual mailbox address according to the first information and the mailbox address rule.
In another aspect, the present application provides a mail processing apparatus including:
the receiving module is used for receiving a first mail sent by a sender server;
an obtaining module, configured to obtain mail key information of the first mail, where the mail key information includes at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail;
the generating module is used for generating a virtual mailbox address according to the mail key information and sending the virtual mailbox address to the sender server;
the receiving module is further used for receiving a verification mail sent by the sender server, wherein the recipient address of the verification mail is the virtual mailbox address, and the verification mail comprises information to be verified;
and the verification module is used for verifying the verification mail and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification.
In a possible implementation manner, the verification module is specifically configured to:
determining a valid time period corresponding to the verification mail;
acquiring a first moment when the verification mail is received;
and verifying the verification mail according to the effective time period, the first moment and the information to be verified.
In a possible implementation manner, the verification module is specifically configured to:
judging whether the first time is within the effective time period;
if yes, verifying the verification mail according to the to-be-verified information;
if not, determining that the verification mail fails to be verified.
In one possible implementation, the verification module is specifically configured to:
inquiring the mail key information corresponding to the virtual mailbox address in a mapping table;
judging whether the information to be verified is the same as the key information of the mail;
if yes, determining that the verification mail passes verification;
if not, determining that the verification mail fails to be verified.
In a possible implementation manner, the generating module is specifically configured to:
judging whether a white list or a black list comprises the sender mailbox address or not;
and if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the mail key information.
In a possible implementation manner, the generating module is specifically configured to:
if the white list comprises the sender mailbox address, the first mail is sent according to the receiver mailbox address;
and if the blacklist list comprises the sender mailbox address, discarding the first mail.
In a possible implementation manner, the generating module is specifically configured to:
performing HASH operation or MD5 operation on the mail key information to obtain first information;
and generating the virtual mailbox address according to the first information and the mailbox address rule.
In a third aspect of the present application, there is provided an electronic device including:
a processor and a memory;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored by the memory to cause the electronic device to perform the method of any of the first aspects.
In a fourth aspect of the present application, a computer-readable storage medium is provided, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the method for determining a driver of a hardware peripheral according to any one of the first aspect is implemented.
The embodiment provides a mail processing method, a device, equipment and a readable storage medium, wherein the method comprises the steps of receiving a first mail sent by a sender server; acquiring mail key information of the first mail; generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to the sender server; receiving a verification mail sent by the sender server, wherein the recipient address of the verification mail is the virtual mailbox address, and the verification mail comprises information to be verified; and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification. The method generates the virtual mailbox address according to the mail key information of the first mail and communicates with the server of the sender in the verification process through the virtual mailbox address, so that the server in the receiver is isolated, and meanwhile, abnormal mails are filtered and intercepted in advance.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a specific application scenario diagram of the mail processing method provided in the present application;
fig. 2 is a first flowchart of a mail processing method according to an embodiment of the present application;
fig. 3 is a flowchart of a mail processing method according to an embodiment of the present application;
fig. 4 is a flowchart of a mail processing method provided in the embodiment of the present application;
fig. 5 is a schematic flowchart of a mail processing method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a mail processing apparatus according to an embodiment of the present application;
fig. 7 is a hardware structure diagram of an electronic device according to an embodiment of the present application.
Description of reference numerals:
101-sender;
102-sender SMTP server;
103-receiver SMTP server;
104-receiver POP3/IMAP server;
105-a receiving party;
106-a receiver external server;
107-receiver internal server.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element.
Fig. 1 is a specific application scenario diagram of the mail processing method provided in the present application. As shown in fig. 1, the conventional mail system is composed of an SMTP server + POP3 (or IMAP), and a sender SMTP server 102, a receiver SMTP server 103, and a receiver POP3/IMAP server 104 are connected via the internet. If the sender 101 needs to send a mail to the receiver 105, the following process is performed: the sender 101 sends SMTP message to the sender SMTP server 102, the sender SMTP server 102 encapsulates the mail in the SMTP message and transmits the mail to the receiver SMTP server 103, the receiver SMTP server 103 sends the mail to the receiver POP3/IMAP server 104, and then the receiver POP3/IMAP server 104 sends the POP3 message or IMAP message to the receiver 105. Fig. 1 omits the POP3/IMAP server diagram of the sender.
The SMTP is called "Simple Mail Transfer Protocol" as a whole, i.e., the Simple Mail Transfer Protocol. It is a set of specifications for transmitting mail from a source address to a destination address, by which the transit mode of the mail is controlled. The SMTP protocol belongs to the TCP/IP protocol cluster and helps each computer find the next destination when sending or relaying a letter. The SMTP server is a sending mail server following the SMTP protocol. SMTP authentication simply requires that the SMTP server be logged in after the account name and password are provided, which makes the spammer improbable. SMTP authentication is added to protect users from spam.
POP3 is short for Post Office Protocol3, i.e. the 3 rd version of the mail Protocol, and is an electronic Protocol that specifies how to connect a personal computer to a mail server on the Internet and download electronic mail. It is the first offline protocol standard for internet e-mail, POP3 allows a user to store mail from a server onto a local host (i.e., his own computer) while deleting the mail stored on the mail server, and POP3 is a receiving mail server following the POP3 protocol and used for receiving e-mail.
IMAP is generally called Internet Mail Access Protocol (Internet Mail Access Protocol), which is one of Mail Access standard protocols similar to POP 3. Different from the above, after the IMAP is started, the mail received by the email client is still retained on the server, and the operations on the client are all fed back to the server, such as: deleting the mail, marking the mail as read, and the like, and the mail on the server can also do corresponding actions. So the mail and status seen are consistent whether the mailbox is logged in from the browser or the mailbox is logged in by the client software.
In order to prevent junk e-mails from reaching the server of the receiving party, if the function of detecting classified e-mails is set, a large amount of servers and calculation power are consumed, and false reports are generated at a high rate. The e-mail which is not reported can reach the client, and the enterprise and the client have the possibility of information leakage.
The method comprises the steps of receiving a first mail sent by a sender server, acquiring key information of the first mail, generating a virtual mailbox address according to the key information of the first mail, sending the virtual mailbox address to the sender server, finally receiving a verification mail sent by the sender server for verification processing, and sending the first mail according to a receiver mailbox address if the verification mail passes the verification processing. The method isolates the internal server of the receiver in the verification process, and simultaneously filters and intercepts abnormal mails in advance.
The technical means shown in the present application will be described in detail below with reference to specific examples. It should be noted that the following embodiments may exist alone or in combination with each other, and description of the same or similar contents is not repeated in different embodiments.
Fig. 2 is a first flowchart of a mail processing method according to an embodiment of the present application. Referring to fig. 2, the method may include:
s201, receiving a first mail sent by a sender server;
in this embodiment, the sender server and the receiver server usually use the same protocol, and may both be SMTP servers. The server of the receiving party is divided into an internal server and an external server, the external server is exposed in a public network, the internal server of the receiving party can be hidden inside, and the receiving frequency of abnormal mails is reduced. The abnormal mails refer to various non-manually sent e-mails including junk mails, phishing mails and the like. The server outside the receiving party serves as a gateway of the server inside the receiving party, receives the first mail sent by the server of the sending party, and carries out subsequent filtering and intercepting operation.
S202, mail key information of the first mail is obtained, wherein the mail key information comprises at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving a first mail;
in this embodiment, after receiving the first mail, the server outside the receiving party analyzes the first mail to obtain the mail key information of the first mail, where the mail key information includes a sender mailbox address, a recipient mailbox address, a mail subject, a mail body, a mail attachment, or a time when the first mail is received. The server outside the receiving party can generate a verification strategy according to the mail key information of the first mail and carry out verification according to the verification strategy.
S203, generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to a sender server;
in this embodiment, the verification policy adopted by the server outside the receiving party is to generate a virtual mailbox address according to the mail key information, and send the virtual mailbox address to the server of the sending party. The purpose of generating the virtual mailbox address is to have the sender send a mail containing the verification message to this mailbox. In the process of verification by adopting the method, the actual mailbox of the receiver is invisible, and the sender can only communicate with the receiver through the generated virtual mailbox.
Those skilled in the art will appreciate that the external server of the recipient may send the virtual mailbox address to the server of the recipient through a virtual mailbox, or may send the virtual mailbox address through the actual mailbox address of the recipient. In practice, the virtual mailbox is located on the external server of the receiving party.
Optionally, generating a virtual mailbox address according to the mail key information includes:
HASH operation or MD5 operation is carried out on the mail key information to obtain first information;
and generating a virtual mailbox address according to the first information and the mailbox address rule.
In this embodiment, the server outside the receiving party first extracts and processes the key information of the mail. Because the essence of the e-mail is a piece of data, extraction is required according to the attributes included in the key information of the e-mail. The sender mailbox address, the receiver mailbox address and the time of receiving the first mail are indispensable attributes. Since HASH operation or MD5 operation is required to be performed on the mail key information, it is necessary to aggregate the extracted data items to obtain a numerical value. On the basis, HASH operation or MD5 operation is carried out on the numerical value to obtain a unique encrypted virtual E-mail address corresponding to the key information of the mail. For example, the actual recipient address is receiver @ domain, the virtual mailbox address should be in the form of receiver _ encryption _ string @ domain.
Those skilled in the art will understand that the algorithm for encrypting the key information of the email is not limited to HASH operation or MD5 operation, and the selected algorithm can be used to generate the above virtual email address.
S204, receiving a verification mail sent by the sender server, verifying that the receiving address of the mail is a virtual mailbox address, and verifying that the mail comprises information to be verified;
in this embodiment, after receiving the virtual mailbox address sent by the external server of the receiving party, the sending party sends the verification email to the virtual mailbox address. The verification mail comprises information to be verified, and the verification information is used for verifying the identity and the mail content of the sender by the server outside the receiver.
S205, verifying the verified mail, and sending the first mail according to the mailbox address of the receiver when the verified mail is verified.
In this embodiment, after receiving the verification email sent by the sender server, the external receiver server may analyze and process the verification email to obtain verification information for verification.
The authentication information includes various forms such as an authentication code or an authentication link, etc. If the verification information is a verification code, which typically is time-bounded, i.e., the verification code is sent to the specified mailbox address within a specified time interval before it can be verified, the sender server is required to send the verification code to the specified mailbox address, e.g., a virtual mailbox address.
The server outside the receiving party can also verify the verification information by comparing the verification information with the mail key information of the first mail, and the attribute of the verification information is basically the same as the mail key information of the first mail and comprises a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail. Verification of the verification information mail key information of the first mail is referenced. And determining that the sender of the first mail is safe by comparing the mail key information and the verification information of the first mail, and the body and the attachment of the first mail are also safe.
And after the mail is verified to be successful, the server outside the receiving party forwards the first mail to the actual mailbox address of the receiving party.
As will be appreciated by those skilled in the art, when the mail key information of the verification mail and the first mail contain the same content, the verification mail can be sent to the actual mailbox address of the receiver.
The embodiment provides a mail processing method, which comprises the steps of receiving a first mail sent by a sender server; acquiring mail key information of a first mail; generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to a sender server; receiving a verification mail sent by a sender server, wherein the recipient address of the verification mail is a virtual mailbox address, and the verification mail comprises information to be verified; and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification. The method generates the virtual mailbox address according to the mail key information of the first mail and communicates with the server of the sender in the verification process through the virtual mailbox address, so that the server in the receiver is isolated, and meanwhile, abnormal mails are filtered and intercepted in advance.
Fig. 3 is a schematic flowchart of a mail processing method according to an embodiment of the present application. Referring to fig. 3, the method provides a detailed description of the process of verifying the mail based on the process shown in fig. 2.
S301, determining an effective time period corresponding to the verification mail;
in this embodiment, the verification mail is verified by the server outside the receiving party. The receiving-side external server firstly verifies the valid period of the mail. And after receiving the first mail, the external server of the receiving party generates a virtual mailbox address according to the key information of the first mail. At this time, in addition to the virtual mailbox address, a mapping table of the recipient mailbox address and the virtual mailbox address is generated, as shown in table 1. The mapping table may include, in addition to the sender mailbox address, the recipient mailbox address and the virtual mailbox address, a validity period of the virtual mailbox, that is, the virtual mailbox is valid only at a time before the validity period. Therefore, when the server outside the receiving party determines the valid period corresponding to the verification email, the server outside the receiving party queries the valid period in the mapping table, and the expiration time from the current time to the valid period is the valid period corresponding to the verification email.
TABLE 1
Those skilled in the art will understand that the information included in the mapping table is not limited to the attributes shown in table 1, and may include mail key information attributes such as the mail subject of the first mail and the verification mail, the mail body, the mail attachment, or the time when the first mail is received.
S302, acquiring a first moment when the verification mail is received;
in this embodiment, the verification mail is verified according to the valid period, the first time and the information to be verified. After receiving the verification mail, the receiving-side external server obtains the time when the verification mail reaches the receiving-side external server, namely the first moment, through analyzing the verification mail.
S303, judging whether the first time is in an effective time period;
in this embodiment, in order to determine whether the time when the verification email reaches the server outside the receiving party is within the valid period of the virtual mailbox address, it is determined whether the first time is within the valid period. This measure allows simple and effective preliminary filtering of abnormal mail.
S304, if yes, inquiring mail key information corresponding to the virtual mailbox address in the mapping table;
in this embodiment, if the determination result is that the time when the verification email reaches the server outside the receiving party is within the valid time period of the virtual mailbox address, the verification email is further verified according to the information to be verified.
S305, judging whether the information to be verified is the same as the key information of the mail;
in this embodiment, it is determined whether the information to be verified is the same as the key mail information, that is, whether the corresponding attributes in the key mail information, such as the sender's mailbox address, the recipient's mailbox address, the mail subject, the mail body, and the first mail, in the verification information are the same. Because if the mail containing the virtual mailbox address is intercepted, the non-artificial email is basically impossible to be completely the same as the key information of the mail when imitating the sender mailbox address, the receiver mailbox address, the mail subject and the mail body. This measure allows a simple and effective further filtering of abnormal mail.
S306, if yes, determining that the verification mail passes the verification;
in this embodiment, if the sender mailbox address, the recipient mailbox address, the mail subject, and the corresponding attributes in the mail body and the key mail information of the first mail in the verification information are all the same, it indicates that the verification of the verification mail is passed.
And S307, if not, determining that the verification of the verification mail fails.
In this embodiment, if one or more attributes of the corresponding attributes in the key mail information of the sender mailbox address, the recipient mailbox address, the mail subject and the mail body in the verification information are different from those in the sender mailbox address, the recipient mailbox address, the mail subject and the mail body in the verification information, it is determined that the verification of the verification mail fails.
The embodiment provides a mail processing method, which comprises the steps of determining a valid time period corresponding to a verification mail; acquiring a first moment when a verification mail is received; judging whether the first time is within the effective time period; if yes, inquiring mail key information corresponding to the virtual mailbox address in the mapping table; judging whether the information to be verified is the same as the mail key information; if yes, determining that the verification mail passes verification; if not, determining that the verification mail fails to be verified. The method firstly compares the first moment of verifying the mail with the effective time of the virtual mailbox to preliminarily filter the abnormal mail, and further filters and intercepts by comparing whether the information to be verified and the key information of the mail are the same, thereby improving the interception rate of the abnormal mail.
Fig. 4 is a schematic flowchart of a third method for processing an email according to an embodiment of the present application. Referring to fig. 4, the method provides a detailed description of the process of verifying the mail based on the process shown in fig. 2.
S401, judging whether the white list or the black list comprises a sender mailbox address;
in this embodiment, before the receiving-side external server performs the verification measure, the sending-side external server may filter the email address of the sender by combining a highly accurate listing method. The method is combined by methods such as static blacklist, static white list, RBL (Real-time Black Lists) and the like.
S402, if the white list and the black list do not include the address of the sender mailbox, generating a virtual mailbox address according to the key information of the mail;
in this embodiment, for the case that the mailbox address of the sender is in the grey list (i.e., not in the white list nor in the black list), it is considered that the first mail of the sender needs further verification, i.e., the above-mentioned verification measure is performed.
S403, if the white list comprises the sender mailbox address, sending a first mail according to the receiver mailbox address;
in this embodiment, for the case that the sender mailbox address is in the white list, it may be considered that the first mail of the sender passes the verification and is directly forwarded to the recipient mailbox address.
S404, if the blacklist list comprises the address of the sender mailbox, the first mail is discarded.
In this embodiment, for the case that the mailbox address of the sender is in the blacklist, it may be considered that the first mail of the sender cannot pass the verification, and the first mail is directly discarded without performing subsequent processing.
The embodiment provides a mail processing method, which judges whether a white list or a black list comprises a sender mailbox address or not; if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the key information of the mail; if the white list comprises the sender mailbox address, sending a first mail according to the receiver mailbox address; and if the blacklist list comprises the address of the sender mailbox, discarding the first mail. The method combines a highly accurate listing method to screen the email address of the sender of the first email in advance before verification measures are taken, so that the efficiency of intercepting and filtering the email is further improved.
The technical solution of the present application is described in detail by a specific example.
Fig. 5 is a schematic flowchart of a mail processing method according to an embodiment of the present application. Referring to fig. 5, the receiver server includes an external receiver server 106 and an internal receiver server 107, both of which are SMTP servers, and the sender server is also an SMTP server. If a sender 101 needs to send a mail to a receiver 105, the sender 101 sends a first mail to a sender SMTP server 102, the sender SMTP server 102 sends the first mail to a receiver external server 106, the receiver external server 106 obtains mail key information of the first mail after receiving the first mail, including a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or a time of receiving the first mail, and the like, generates a virtual mailbox address according to the mail key information, sends the virtual mailbox address to the sender SMTP server 102, and forwards the virtual mailbox address to the sender 101. The sender 101 sends an authentication mail, for example, an authentication mail containing the same key information of the mail as the first mail, to the sender SMTP server 102 according to the virtual mailbox address, and the authentication mail is forwarded to the out-of-receiver server 106 by the sender SMTP server 102. The server 106 outside the receiving party performs verification processing on the verification mail, and sends the first mail to the server 107 inside the receiving party after the verification is passed. The receiver server 107 sends the first mail to the receiver POP3/IMAP server 104, and the receiver POP3/IMAP server 104 sends the first mail to the receiver 105.
Fig. 6 is a schematic structural diagram of a mail processing apparatus according to an embodiment of the present application. The apparatus of the present embodiment may be in the form of software and/or hardware. As shown in fig. 6, a mail processing apparatus 600 provided in the embodiment of the present application includes a receiving module 601, an obtaining module 602, a generating module 603, and a verifying module 604,
a receiving module 601, configured to receive a first email sent by a sender server;
an obtaining module 602, configured to obtain mail key information of a first mail, where the mail key information includes at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving a first mail;
the generating module 603 is configured to generate a virtual mailbox address according to the mail key information, and send the virtual mailbox address to the sender server;
the receiving module 601 is further configured to receive a verification mail sent by the sender server, where the recipient address of the verification mail is a virtual mailbox address, and the verification mail includes information to be verified;
the verification module 604 is configured to perform verification processing on the verification email, and send the first email according to the email address of the recipient when the verification email passes verification.
In a possible implementation manner, the verification module is specifically configured to:
determining a valid time period corresponding to the verification mail;
acquiring a first moment when a verification mail is received;
and verifying the verification mail according to the effective time period, the first moment and the information to be verified.
In one possible implementation, the verification module is specifically configured to:
judging whether the first time is within the effective time period;
if yes, verifying the verification mail according to the information to be verified;
if not, determining that the verification mail fails to be verified.
In one possible implementation, the verification module is specifically configured to:
inquiring mail key information corresponding to the virtual mailbox address in a mapping table;
judging whether the information to be verified is the same as the mail key information;
if yes, determining that the verification mail passes verification;
if not, determining that the verification mail fails to be verified.
In a possible implementation manner, the generating module is specifically configured to:
judging whether the white list or the black list comprises a sender mailbox address or not;
and if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the mail key information.
In a possible implementation manner, the generating module is specifically configured to:
if the white list comprises the sender mailbox address, sending a first mail according to the receiver mailbox address;
and if the blacklist list comprises the address of the sender mailbox, discarding the first mail.
In a possible implementation manner, the generating module is specifically configured to:
HASH operation or MD5 operation is carried out on the mail key information to obtain first information;
and generating a virtual mailbox address according to the first information and the mailbox address rule.
The device for processing mails provided by this embodiment may be used to implement the above method embodiments, and the implementation principle and technical effect are similar, which are not described herein again.
The execution main body of the embodiment of the application can be computer equipment, and can also be a mail processing method device arranged in the computer equipment. The mail processing method and the device can be realized by software, and also can be realized by the combination of software and hardware. The mail processing method device can be a processor in computer equipment. For ease of understanding, the following description will be made by taking an execution subject as an example of a computer device. The device for processing the mail provided in the embodiment of the present application may implement the technical solutions shown in the above method embodiments, and the implementation principles and beneficial effects are similar, which are not described herein again.
Referring to fig. 7, the electronic device 20 may include a processor 21 and a memory 22. The processor 21, the memory 22, and the various parts are illustratively interconnected by a bus 23.
The memory 22 stores computer-executable instructions;
All or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The foregoing program may be stored in a readable memory. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned memory (storage medium) includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape, floppy disk, optical disk, and any combination thereof.
The embodiment of the application provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is used for implementing the mail processing method of the above method embodiment.
Embodiments of the present application may also provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the method for processing a mail shown in the foregoing method embodiments may be implemented.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.
In this application, the terms "include," "includes," and variations thereof may refer to non-limiting inclusions; the term "or" and variations thereof may mean "and/or". The terms "first," "second," and the like in this application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. In the present application, "a plurality" means two or more. "and/or" describes the association relationship of the associated object, indicating that there may be three relationships, for example, a and/or B, which may indicate: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Claims (10)
1. A method for processing mail, comprising:
receiving a first mail sent by a sender server;
acquiring mail key information of the first mail, wherein the mail key information comprises at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail;
generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to the sender server;
receiving a verification mail sent by the sender server, wherein the recipient address of the verification mail is the virtual mailbox address, and the verification mail comprises information to be verified;
and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification.
2. The method of claim 1, wherein the authenticating the authentication mail comprises:
determining a valid time period corresponding to the verification mail;
acquiring a first moment when the verification mail is received;
and verifying the verification mail according to the effective time period, the first moment and the information to be verified.
3. The method of claim 2, wherein the verifying the verification email according to the valid period, the first time and the information to be verified comprises:
judging whether the first time is within the effective time period;
if yes, verifying the verification mail according to the to-be-verified information;
if not, determining that the verification mail fails to be verified.
4. The method of claim 3, wherein the verifying the verification mail according to the information to be verified comprises:
inquiring the mail key information corresponding to the virtual mailbox address in a mapping table;
judging whether the information to be verified is the same as the key information of the mail;
if yes, determining that the verification mail passes verification;
if not, determining that the verification mail fails to be verified.
5. The method according to any one of claims 1-4, wherein generating a virtual mailbox address according to the mail key information comprises:
judging whether a white list or a black list comprises the sender mailbox address or not;
and if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the mail key information.
6. The method of claim 5, further comprising:
if the white list comprises the sender mailbox address, the first mail is sent according to the receiver mailbox address;
and if the blacklist list comprises the sender mailbox address, discarding the first mail.
7. The method according to any one of claims 1-4, wherein generating a virtual mailbox address according to the mail key information comprises:
performing HASH operation or MD5 operation on the mail key information to obtain first information;
and generating the virtual mailbox address according to the first information and the mailbox address rule.
8. A mail processing apparatus, comprising:
the receiving module is used for receiving a first mail sent by a sender server;
an obtaining module, configured to obtain mail key information of the first mail, where the mail key information includes at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail;
the generating module is used for generating a virtual mailbox address according to the mail key information and sending the virtual mailbox address to the sender server;
the receiving module is further configured to receive a verification email sent by the sender server, where a recipient address of the verification email is the virtual mailbox address, and the verification email includes information to be verified;
and the verification module is used for verifying the verification mail and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification.
9. An electronic device, comprising: a processor and a memory;
the memory stores computer execution instructions;
the processor executes the computer-executable instructions stored by the memory to cause the electronic device to perform the method of any of claims 1-7.
10. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, implement a mail processing method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211696660.9A CN115801719A (en) | 2022-12-28 | 2022-12-28 | Mail processing method, device, equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211696660.9A CN115801719A (en) | 2022-12-28 | 2022-12-28 | Mail processing method, device, equipment and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115801719A true CN115801719A (en) | 2023-03-14 |
Family
ID=85427985
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211696660.9A Pending CN115801719A (en) | 2022-12-28 | 2022-12-28 | Mail processing method, device, equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115801719A (en) |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020029249A1 (en) * | 2000-03-17 | 2002-03-07 | Campbell Leo J. | Methods and systems for providing an electronic account to a customer |
KR20020030704A (en) * | 2001-09-28 | 2002-04-25 | 이계철 | An E-mail service system with anti-spam mail using virtual E-mail addresses and method therefor |
JP2003060710A (en) * | 2001-08-09 | 2003-02-28 | Yuji Hibi | Distributed mail system having inter-attribute as object |
JP2003141042A (en) * | 2001-11-01 | 2003-05-16 | Sony Corp | Communication system and method, information processor and method, information processing terminal and method, and program |
JP2005149049A (en) * | 2003-11-14 | 2005-06-09 | Nippon Telegr & Teleph Corp <Ntt> | Address generation system, address generation method, and address generation program |
CN1707492A (en) * | 2004-06-05 | 2005-12-14 | 腾讯科技(深圳)有限公司 | Method for against refuse E-mail |
JP2006053644A (en) * | 2004-08-10 | 2006-02-23 | Nippon Telegr & Teleph Corp <Ntt> | Access control system, method, and program |
CN1819563A (en) * | 2005-02-10 | 2006-08-16 | 吉尼柯斯微系统公司 | System and method for treating electronic messages |
JP2006227892A (en) * | 2005-02-17 | 2006-08-31 | Fujitsu Peripherals Ltd | Electronic mail relay system, electronic mail relay method and computer program |
JP2009110403A (en) * | 2007-10-31 | 2009-05-21 | Linuon Inc | E-mail transmission/reception system |
FR2928512A1 (en) * | 2008-03-06 | 2009-09-11 | Teixis Consulting Entpr Uniper | Electronic mail e.g. advertising junk mail, sending and receiving device for postal letter box, has recipient selecting distribution notice, where notice points on mail and retrieves mail and recipient classifies mail on support |
JP2013171473A (en) * | 2012-02-21 | 2013-09-02 | Fujitsu Ltd | Information processing method, information processing device and program |
KR20140066526A (en) * | 2012-11-23 | 2014-06-02 | 네이버 주식회사 | System, method and computer readable recording medium for checking the receive receipt of a send mail on a mobile terminal |
CN103841006A (en) * | 2014-02-25 | 2014-06-04 | 汉柏科技有限公司 | Method and device for intercepting junk mails in cloud computing system |
WO2016156858A1 (en) * | 2015-03-31 | 2016-10-06 | Gordon Tees | Email management and control system |
CN109787990A (en) * | 2014-10-28 | 2019-05-21 | 网易(杭州)网络有限公司 | A kind of method and device for verifying mail |
CN113132476A (en) * | 2021-04-16 | 2021-07-16 | 中国工商银行股份有限公司 | Mail synchronization system, method and device and electronic equipment |
US20210306160A1 (en) * | 2020-03-26 | 2021-09-30 | Issam ANDONI | Systems and methods for facilitating policy-compliant end-to-end encryption for individuals between organizations |
CN114143282A (en) * | 2021-11-30 | 2022-03-04 | 中国建设银行股份有限公司 | Mail processing method, device, equipment and storage medium |
CN114945918A (en) * | 2020-12-03 | 2022-08-26 | 谷歌有限责任公司 | Privacy-preserving virtual e-mail system |
US20220279015A1 (en) * | 2021-02-26 | 2022-09-01 | ArmorBlox, Inc. | Method for detecting financial attacks in emails |
-
2022
- 2022-12-28 CN CN202211696660.9A patent/CN115801719A/en active Pending
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020029249A1 (en) * | 2000-03-17 | 2002-03-07 | Campbell Leo J. | Methods and systems for providing an electronic account to a customer |
JP2003060710A (en) * | 2001-08-09 | 2003-02-28 | Yuji Hibi | Distributed mail system having inter-attribute as object |
KR20020030704A (en) * | 2001-09-28 | 2002-04-25 | 이계철 | An E-mail service system with anti-spam mail using virtual E-mail addresses and method therefor |
JP2003141042A (en) * | 2001-11-01 | 2003-05-16 | Sony Corp | Communication system and method, information processor and method, information processing terminal and method, and program |
JP2005149049A (en) * | 2003-11-14 | 2005-06-09 | Nippon Telegr & Teleph Corp <Ntt> | Address generation system, address generation method, and address generation program |
CN1707492A (en) * | 2004-06-05 | 2005-12-14 | 腾讯科技(深圳)有限公司 | Method for against refuse E-mail |
JP2006053644A (en) * | 2004-08-10 | 2006-02-23 | Nippon Telegr & Teleph Corp <Ntt> | Access control system, method, and program |
CN1819563A (en) * | 2005-02-10 | 2006-08-16 | 吉尼柯斯微系统公司 | System and method for treating electronic messages |
JP2006227892A (en) * | 2005-02-17 | 2006-08-31 | Fujitsu Peripherals Ltd | Electronic mail relay system, electronic mail relay method and computer program |
JP2009110403A (en) * | 2007-10-31 | 2009-05-21 | Linuon Inc | E-mail transmission/reception system |
FR2928512A1 (en) * | 2008-03-06 | 2009-09-11 | Teixis Consulting Entpr Uniper | Electronic mail e.g. advertising junk mail, sending and receiving device for postal letter box, has recipient selecting distribution notice, where notice points on mail and retrieves mail and recipient classifies mail on support |
JP2013171473A (en) * | 2012-02-21 | 2013-09-02 | Fujitsu Ltd | Information processing method, information processing device and program |
KR20140066526A (en) * | 2012-11-23 | 2014-06-02 | 네이버 주식회사 | System, method and computer readable recording medium for checking the receive receipt of a send mail on a mobile terminal |
CN103841006A (en) * | 2014-02-25 | 2014-06-04 | 汉柏科技有限公司 | Method and device for intercepting junk mails in cloud computing system |
CN109787990A (en) * | 2014-10-28 | 2019-05-21 | 网易(杭州)网络有限公司 | A kind of method and device for verifying mail |
WO2016156858A1 (en) * | 2015-03-31 | 2016-10-06 | Gordon Tees | Email management and control system |
US20210306160A1 (en) * | 2020-03-26 | 2021-09-30 | Issam ANDONI | Systems and methods for facilitating policy-compliant end-to-end encryption for individuals between organizations |
CN114945918A (en) * | 2020-12-03 | 2022-08-26 | 谷歌有限责任公司 | Privacy-preserving virtual e-mail system |
US20220279015A1 (en) * | 2021-02-26 | 2022-09-01 | ArmorBlox, Inc. | Method for detecting financial attacks in emails |
CN113132476A (en) * | 2021-04-16 | 2021-07-16 | 中国工商银行股份有限公司 | Mail synchronization system, method and device and electronic equipment |
CN114143282A (en) * | 2021-11-30 | 2022-03-04 | 中国建设银行股份有限公司 | Mail processing method, device, equipment and storage medium |
Non-Patent Citations (2)
Title |
---|
罗倩;秦玉平;王春立;: "反垃圾邮件技术综述", 渤海大学学报(自然科学版), no. 04, 15 December 2008 (2008-12-15) * |
胡文广;张颖江;兰义华;: "蜜罐研究与应用", 网络安全技术与应用, no. 05, 1 May 2006 (2006-05-01) * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11044267B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
KR101137089B1 (en) | Validating inbound messages | |
US11722513B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
US9177293B1 (en) | Spam filtering system and method | |
US20190319905A1 (en) | Mail protection system | |
US8073912B2 (en) | Sender authentication for difficult to classify email | |
US8756289B1 (en) | Message authentication using signatures | |
US8751808B2 (en) | Method and system for sharing trusted contact information | |
US20160014151A1 (en) | Systems and methods for electronic message analysis | |
KR101109817B1 (en) | Method and apparatus for reducing e-mail spam and virus distribution in a communications network by authenticating the origin of e-mail messages | |
US20080313704A1 (en) | Electronic Message Authentication | |
US20080282344A1 (en) | E-mail authentication | |
US20060149823A1 (en) | Electronic mail system and method | |
US20140215571A1 (en) | E-mail authentication | |
JP2012511842A (en) | Electronic messaging integration engine | |
AU2009299539B2 (en) | Electronic communication control | |
US8850569B1 (en) | Instant messaging malware protection | |
Gupta et al. | Forensic analysis of E-mail address spoofing | |
Khan et al. | Introduction to email, web, and message forensics | |
CN115801719A (en) | Mail processing method, device, equipment and readable storage medium | |
Mishra et al. | Forensic analysis of e-mail date and time spoofing | |
CN113938311A (en) | Mail attack tracing method and system | |
US11916873B1 (en) | Computerized system for inserting management information into electronic communication systems | |
LAZIĆ et al. | E-mail forensics: techniques and tools for forensic investigation | |
Chauhan et al. | Effectiveness of Anti-Spoofing Protocols for Email Authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |