CN115801719A - Mail processing method, device, equipment and readable storage medium - Google Patents

Mail processing method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN115801719A
CN115801719A CN202211696660.9A CN202211696660A CN115801719A CN 115801719 A CN115801719 A CN 115801719A CN 202211696660 A CN202211696660 A CN 202211696660A CN 115801719 A CN115801719 A CN 115801719A
Authority
CN
China
Prior art keywords
mail
verification
mailbox address
sender
key information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211696660.9A
Other languages
Chinese (zh)
Inventor
曹京卫
余思阳
李发财
郭钰璐
贺译册
王向华
徐瑶
雷鹏飞
焦利红
尹娇
寇东梅
徐人勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202211696660.9A priority Critical patent/CN115801719A/en
Publication of CN115801719A publication Critical patent/CN115801719A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application provides a mail processing method, a mail processing device, mail processing equipment and a readable storage medium. The method comprises the following steps: receiving a first mail sent by a sender server; acquiring mail key information of a first mail, wherein the mail key information comprises at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving a first mail; generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to a sender server; receiving a verification mail sent by a sender server, verifying that the recipient address of the mail is a virtual mailbox address, and verifying that the mail comprises information to be verified; and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification. The method simplifies the service flow of filtering and intercepting the abnormal mails, and improves the success rate of intercepting the abnormal mails.

Description

Mail processing method, device, equipment and readable storage medium
Technical Field
The present application relates to the field of network security technologies, and in particular, to a method, an apparatus, a device, and a readable storage medium for processing a mail.
Background
With the further development of the information-oriented era, enterprise informatization is also deepened, wherein enterprise informatization solutions including mail systems, database systems and the like become infrastructure of enterprises.
The employee mailboxes of large enterprises belong to public information due to a large number of business relations and work requirements; for the reason of information disclosure, providing a contact mailbox is a necessary option for special enterprises. Such information is all valid target information for spammers. If the preposition detection and interception are not carried out, all the e-mails, including junk mails and fishing mails, can reach the server of the receiver.
Detecting and classifying e-mail requires a large number of servers and computing power, and false reports with a certain probability generally occur. The e-mail which is not reported can reach the server of the receiving party, so that the possibility of information leakage exists in enterprises and clients.
Disclosure of Invention
The application provides a mail processing method, a mail processing device, mail processing equipment and a readable storage medium, which are used for isolating an internal server of a receiver and filtering and intercepting abnormal mails in advance.
In a first aspect, the present application provides a mail processing method, including:
receiving a first mail sent by a sender server;
acquiring mail key information of the first mail, wherein the mail key information comprises at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail;
generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to the sender server;
receiving a verification mail sent by the sender server, wherein the recipient address of the verification mail is the virtual mailbox address, and the verification mail comprises information to be verified;
and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the recipient when the verification mail passes verification.
Optionally, the verifying the verification email includes:
determining a valid time period corresponding to the verification mail;
acquiring a first moment when the verification mail is received;
and verifying the verification mail according to the effective time period, the first moment and the information to be verified.
Optionally, performing verification processing on the verification email according to the valid period, the first time and the information to be verified, including:
judging whether the first time is within the effective time period;
if yes, verifying the verification mail according to the to-be-verified information;
if not, determining that the verification mail fails to be verified.
Optionally, performing verification processing on the verification email according to the to-be-verified information, including:
inquiring the mail key information corresponding to the virtual mailbox address in a mapping table;
judging whether the information to be verified is the same as the key information of the mail;
if yes, determining that the verification mail passes verification;
if not, determining that the verification mail fails to be verified.
Optionally, generating a virtual mailbox address according to the mail key information includes:
judging whether a white list or a black list comprises the sender mailbox address or not;
and if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the mail key information.
Optionally, the method further comprises:
if the white list comprises the sender mailbox address, the first mail is sent according to the receiver mailbox address;
and if the blacklist list comprises the sender mailbox address, discarding the first mail.
Optionally, generating a virtual mailbox address according to the mail key information includes:
performing HASH operation or MD5 operation on the mail key information to obtain first information;
and generating the virtual mailbox address according to the first information and the mailbox address rule.
In another aspect, the present application provides a mail processing apparatus including:
the receiving module is used for receiving a first mail sent by a sender server;
an obtaining module, configured to obtain mail key information of the first mail, where the mail key information includes at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail;
the generating module is used for generating a virtual mailbox address according to the mail key information and sending the virtual mailbox address to the sender server;
the receiving module is further used for receiving a verification mail sent by the sender server, wherein the recipient address of the verification mail is the virtual mailbox address, and the verification mail comprises information to be verified;
and the verification module is used for verifying the verification mail and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification.
In a possible implementation manner, the verification module is specifically configured to:
determining a valid time period corresponding to the verification mail;
acquiring a first moment when the verification mail is received;
and verifying the verification mail according to the effective time period, the first moment and the information to be verified.
In a possible implementation manner, the verification module is specifically configured to:
judging whether the first time is within the effective time period;
if yes, verifying the verification mail according to the to-be-verified information;
if not, determining that the verification mail fails to be verified.
In one possible implementation, the verification module is specifically configured to:
inquiring the mail key information corresponding to the virtual mailbox address in a mapping table;
judging whether the information to be verified is the same as the key information of the mail;
if yes, determining that the verification mail passes verification;
if not, determining that the verification mail fails to be verified.
In a possible implementation manner, the generating module is specifically configured to:
judging whether a white list or a black list comprises the sender mailbox address or not;
and if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the mail key information.
In a possible implementation manner, the generating module is specifically configured to:
if the white list comprises the sender mailbox address, the first mail is sent according to the receiver mailbox address;
and if the blacklist list comprises the sender mailbox address, discarding the first mail.
In a possible implementation manner, the generating module is specifically configured to:
performing HASH operation or MD5 operation on the mail key information to obtain first information;
and generating the virtual mailbox address according to the first information and the mailbox address rule.
In a third aspect of the present application, there is provided an electronic device including:
a processor and a memory;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored by the memory to cause the electronic device to perform the method of any of the first aspects.
In a fourth aspect of the present application, a computer-readable storage medium is provided, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the method for determining a driver of a hardware peripheral according to any one of the first aspect is implemented.
The embodiment provides a mail processing method, a device, equipment and a readable storage medium, wherein the method comprises the steps of receiving a first mail sent by a sender server; acquiring mail key information of the first mail; generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to the sender server; receiving a verification mail sent by the sender server, wherein the recipient address of the verification mail is the virtual mailbox address, and the verification mail comprises information to be verified; and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification. The method generates the virtual mailbox address according to the mail key information of the first mail and communicates with the server of the sender in the verification process through the virtual mailbox address, so that the server in the receiver is isolated, and meanwhile, abnormal mails are filtered and intercepted in advance.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a specific application scenario diagram of the mail processing method provided in the present application;
fig. 2 is a first flowchart of a mail processing method according to an embodiment of the present application;
fig. 3 is a flowchart of a mail processing method according to an embodiment of the present application;
fig. 4 is a flowchart of a mail processing method provided in the embodiment of the present application;
fig. 5 is a schematic flowchart of a mail processing method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a mail processing apparatus according to an embodiment of the present application;
fig. 7 is a hardware structure diagram of an electronic device according to an embodiment of the present application.
Description of reference numerals:
101-sender;
102-sender SMTP server;
103-receiver SMTP server;
104-receiver POP3/IMAP server;
105-a receiving party;
106-a receiver external server;
107-receiver internal server.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element.
Fig. 1 is a specific application scenario diagram of the mail processing method provided in the present application. As shown in fig. 1, the conventional mail system is composed of an SMTP server + POP3 (or IMAP), and a sender SMTP server 102, a receiver SMTP server 103, and a receiver POP3/IMAP server 104 are connected via the internet. If the sender 101 needs to send a mail to the receiver 105, the following process is performed: the sender 101 sends SMTP message to the sender SMTP server 102, the sender SMTP server 102 encapsulates the mail in the SMTP message and transmits the mail to the receiver SMTP server 103, the receiver SMTP server 103 sends the mail to the receiver POP3/IMAP server 104, and then the receiver POP3/IMAP server 104 sends the POP3 message or IMAP message to the receiver 105. Fig. 1 omits the POP3/IMAP server diagram of the sender.
The SMTP is called "Simple Mail Transfer Protocol" as a whole, i.e., the Simple Mail Transfer Protocol. It is a set of specifications for transmitting mail from a source address to a destination address, by which the transit mode of the mail is controlled. The SMTP protocol belongs to the TCP/IP protocol cluster and helps each computer find the next destination when sending or relaying a letter. The SMTP server is a sending mail server following the SMTP protocol. SMTP authentication simply requires that the SMTP server be logged in after the account name and password are provided, which makes the spammer improbable. SMTP authentication is added to protect users from spam.
POP3 is short for Post Office Protocol3, i.e. the 3 rd version of the mail Protocol, and is an electronic Protocol that specifies how to connect a personal computer to a mail server on the Internet and download electronic mail. It is the first offline protocol standard for internet e-mail, POP3 allows a user to store mail from a server onto a local host (i.e., his own computer) while deleting the mail stored on the mail server, and POP3 is a receiving mail server following the POP3 protocol and used for receiving e-mail.
IMAP is generally called Internet Mail Access Protocol (Internet Mail Access Protocol), which is one of Mail Access standard protocols similar to POP 3. Different from the above, after the IMAP is started, the mail received by the email client is still retained on the server, and the operations on the client are all fed back to the server, such as: deleting the mail, marking the mail as read, and the like, and the mail on the server can also do corresponding actions. So the mail and status seen are consistent whether the mailbox is logged in from the browser or the mailbox is logged in by the client software.
In order to prevent junk e-mails from reaching the server of the receiving party, if the function of detecting classified e-mails is set, a large amount of servers and calculation power are consumed, and false reports are generated at a high rate. The e-mail which is not reported can reach the client, and the enterprise and the client have the possibility of information leakage.
The method comprises the steps of receiving a first mail sent by a sender server, acquiring key information of the first mail, generating a virtual mailbox address according to the key information of the first mail, sending the virtual mailbox address to the sender server, finally receiving a verification mail sent by the sender server for verification processing, and sending the first mail according to a receiver mailbox address if the verification mail passes the verification processing. The method isolates the internal server of the receiver in the verification process, and simultaneously filters and intercepts abnormal mails in advance.
The technical means shown in the present application will be described in detail below with reference to specific examples. It should be noted that the following embodiments may exist alone or in combination with each other, and description of the same or similar contents is not repeated in different embodiments.
Fig. 2 is a first flowchart of a mail processing method according to an embodiment of the present application. Referring to fig. 2, the method may include:
s201, receiving a first mail sent by a sender server;
in this embodiment, the sender server and the receiver server usually use the same protocol, and may both be SMTP servers. The server of the receiving party is divided into an internal server and an external server, the external server is exposed in a public network, the internal server of the receiving party can be hidden inside, and the receiving frequency of abnormal mails is reduced. The abnormal mails refer to various non-manually sent e-mails including junk mails, phishing mails and the like. The server outside the receiving party serves as a gateway of the server inside the receiving party, receives the first mail sent by the server of the sending party, and carries out subsequent filtering and intercepting operation.
S202, mail key information of the first mail is obtained, wherein the mail key information comprises at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving a first mail;
in this embodiment, after receiving the first mail, the server outside the receiving party analyzes the first mail to obtain the mail key information of the first mail, where the mail key information includes a sender mailbox address, a recipient mailbox address, a mail subject, a mail body, a mail attachment, or a time when the first mail is received. The server outside the receiving party can generate a verification strategy according to the mail key information of the first mail and carry out verification according to the verification strategy.
S203, generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to a sender server;
in this embodiment, the verification policy adopted by the server outside the receiving party is to generate a virtual mailbox address according to the mail key information, and send the virtual mailbox address to the server of the sending party. The purpose of generating the virtual mailbox address is to have the sender send a mail containing the verification message to this mailbox. In the process of verification by adopting the method, the actual mailbox of the receiver is invisible, and the sender can only communicate with the receiver through the generated virtual mailbox.
Those skilled in the art will appreciate that the external server of the recipient may send the virtual mailbox address to the server of the recipient through a virtual mailbox, or may send the virtual mailbox address through the actual mailbox address of the recipient. In practice, the virtual mailbox is located on the external server of the receiving party.
Optionally, generating a virtual mailbox address according to the mail key information includes:
HASH operation or MD5 operation is carried out on the mail key information to obtain first information;
and generating a virtual mailbox address according to the first information and the mailbox address rule.
In this embodiment, the server outside the receiving party first extracts and processes the key information of the mail. Because the essence of the e-mail is a piece of data, extraction is required according to the attributes included in the key information of the e-mail. The sender mailbox address, the receiver mailbox address and the time of receiving the first mail are indispensable attributes. Since HASH operation or MD5 operation is required to be performed on the mail key information, it is necessary to aggregate the extracted data items to obtain a numerical value. On the basis, HASH operation or MD5 operation is carried out on the numerical value to obtain a unique encrypted virtual E-mail address corresponding to the key information of the mail. For example, the actual recipient address is receiver @ domain, the virtual mailbox address should be in the form of receiver _ encryption _ string @ domain.
Those skilled in the art will understand that the algorithm for encrypting the key information of the email is not limited to HASH operation or MD5 operation, and the selected algorithm can be used to generate the above virtual email address.
S204, receiving a verification mail sent by the sender server, verifying that the receiving address of the mail is a virtual mailbox address, and verifying that the mail comprises information to be verified;
in this embodiment, after receiving the virtual mailbox address sent by the external server of the receiving party, the sending party sends the verification email to the virtual mailbox address. The verification mail comprises information to be verified, and the verification information is used for verifying the identity and the mail content of the sender by the server outside the receiver.
S205, verifying the verified mail, and sending the first mail according to the mailbox address of the receiver when the verified mail is verified.
In this embodiment, after receiving the verification email sent by the sender server, the external receiver server may analyze and process the verification email to obtain verification information for verification.
The authentication information includes various forms such as an authentication code or an authentication link, etc. If the verification information is a verification code, which typically is time-bounded, i.e., the verification code is sent to the specified mailbox address within a specified time interval before it can be verified, the sender server is required to send the verification code to the specified mailbox address, e.g., a virtual mailbox address.
The server outside the receiving party can also verify the verification information by comparing the verification information with the mail key information of the first mail, and the attribute of the verification information is basically the same as the mail key information of the first mail and comprises a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail. Verification of the verification information mail key information of the first mail is referenced. And determining that the sender of the first mail is safe by comparing the mail key information and the verification information of the first mail, and the body and the attachment of the first mail are also safe.
And after the mail is verified to be successful, the server outside the receiving party forwards the first mail to the actual mailbox address of the receiving party.
As will be appreciated by those skilled in the art, when the mail key information of the verification mail and the first mail contain the same content, the verification mail can be sent to the actual mailbox address of the receiver.
The embodiment provides a mail processing method, which comprises the steps of receiving a first mail sent by a sender server; acquiring mail key information of a first mail; generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to a sender server; receiving a verification mail sent by a sender server, wherein the recipient address of the verification mail is a virtual mailbox address, and the verification mail comprises information to be verified; and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification. The method generates the virtual mailbox address according to the mail key information of the first mail and communicates with the server of the sender in the verification process through the virtual mailbox address, so that the server in the receiver is isolated, and meanwhile, abnormal mails are filtered and intercepted in advance.
Fig. 3 is a schematic flowchart of a mail processing method according to an embodiment of the present application. Referring to fig. 3, the method provides a detailed description of the process of verifying the mail based on the process shown in fig. 2.
S301, determining an effective time period corresponding to the verification mail;
in this embodiment, the verification mail is verified by the server outside the receiving party. The receiving-side external server firstly verifies the valid period of the mail. And after receiving the first mail, the external server of the receiving party generates a virtual mailbox address according to the key information of the first mail. At this time, in addition to the virtual mailbox address, a mapping table of the recipient mailbox address and the virtual mailbox address is generated, as shown in table 1. The mapping table may include, in addition to the sender mailbox address, the recipient mailbox address and the virtual mailbox address, a validity period of the virtual mailbox, that is, the virtual mailbox is valid only at a time before the validity period. Therefore, when the server outside the receiving party determines the valid period corresponding to the verification email, the server outside the receiving party queries the valid period in the mapping table, and the expiration time from the current time to the valid period is the valid period corresponding to the verification email.
TABLE 1
Figure BDA0004023738740000101
Those skilled in the art will understand that the information included in the mapping table is not limited to the attributes shown in table 1, and may include mail key information attributes such as the mail subject of the first mail and the verification mail, the mail body, the mail attachment, or the time when the first mail is received.
S302, acquiring a first moment when the verification mail is received;
in this embodiment, the verification mail is verified according to the valid period, the first time and the information to be verified. After receiving the verification mail, the receiving-side external server obtains the time when the verification mail reaches the receiving-side external server, namely the first moment, through analyzing the verification mail.
S303, judging whether the first time is in an effective time period;
in this embodiment, in order to determine whether the time when the verification email reaches the server outside the receiving party is within the valid period of the virtual mailbox address, it is determined whether the first time is within the valid period. This measure allows simple and effective preliminary filtering of abnormal mail.
S304, if yes, inquiring mail key information corresponding to the virtual mailbox address in the mapping table;
in this embodiment, if the determination result is that the time when the verification email reaches the server outside the receiving party is within the valid time period of the virtual mailbox address, the verification email is further verified according to the information to be verified.
S305, judging whether the information to be verified is the same as the key information of the mail;
in this embodiment, it is determined whether the information to be verified is the same as the key mail information, that is, whether the corresponding attributes in the key mail information, such as the sender's mailbox address, the recipient's mailbox address, the mail subject, the mail body, and the first mail, in the verification information are the same. Because if the mail containing the virtual mailbox address is intercepted, the non-artificial email is basically impossible to be completely the same as the key information of the mail when imitating the sender mailbox address, the receiver mailbox address, the mail subject and the mail body. This measure allows a simple and effective further filtering of abnormal mail.
S306, if yes, determining that the verification mail passes the verification;
in this embodiment, if the sender mailbox address, the recipient mailbox address, the mail subject, and the corresponding attributes in the mail body and the key mail information of the first mail in the verification information are all the same, it indicates that the verification of the verification mail is passed.
And S307, if not, determining that the verification of the verification mail fails.
In this embodiment, if one or more attributes of the corresponding attributes in the key mail information of the sender mailbox address, the recipient mailbox address, the mail subject and the mail body in the verification information are different from those in the sender mailbox address, the recipient mailbox address, the mail subject and the mail body in the verification information, it is determined that the verification of the verification mail fails.
The embodiment provides a mail processing method, which comprises the steps of determining a valid time period corresponding to a verification mail; acquiring a first moment when a verification mail is received; judging whether the first time is within the effective time period; if yes, inquiring mail key information corresponding to the virtual mailbox address in the mapping table; judging whether the information to be verified is the same as the mail key information; if yes, determining that the verification mail passes verification; if not, determining that the verification mail fails to be verified. The method firstly compares the first moment of verifying the mail with the effective time of the virtual mailbox to preliminarily filter the abnormal mail, and further filters and intercepts by comparing whether the information to be verified and the key information of the mail are the same, thereby improving the interception rate of the abnormal mail.
Fig. 4 is a schematic flowchart of a third method for processing an email according to an embodiment of the present application. Referring to fig. 4, the method provides a detailed description of the process of verifying the mail based on the process shown in fig. 2.
S401, judging whether the white list or the black list comprises a sender mailbox address;
in this embodiment, before the receiving-side external server performs the verification measure, the sending-side external server may filter the email address of the sender by combining a highly accurate listing method. The method is combined by methods such as static blacklist, static white list, RBL (Real-time Black Lists) and the like.
S402, if the white list and the black list do not include the address of the sender mailbox, generating a virtual mailbox address according to the key information of the mail;
in this embodiment, for the case that the mailbox address of the sender is in the grey list (i.e., not in the white list nor in the black list), it is considered that the first mail of the sender needs further verification, i.e., the above-mentioned verification measure is performed.
S403, if the white list comprises the sender mailbox address, sending a first mail according to the receiver mailbox address;
in this embodiment, for the case that the sender mailbox address is in the white list, it may be considered that the first mail of the sender passes the verification and is directly forwarded to the recipient mailbox address.
S404, if the blacklist list comprises the address of the sender mailbox, the first mail is discarded.
In this embodiment, for the case that the mailbox address of the sender is in the blacklist, it may be considered that the first mail of the sender cannot pass the verification, and the first mail is directly discarded without performing subsequent processing.
The embodiment provides a mail processing method, which judges whether a white list or a black list comprises a sender mailbox address or not; if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the key information of the mail; if the white list comprises the sender mailbox address, sending a first mail according to the receiver mailbox address; and if the blacklist list comprises the address of the sender mailbox, discarding the first mail. The method combines a highly accurate listing method to screen the email address of the sender of the first email in advance before verification measures are taken, so that the efficiency of intercepting and filtering the email is further improved.
The technical solution of the present application is described in detail by a specific example.
Fig. 5 is a schematic flowchart of a mail processing method according to an embodiment of the present application. Referring to fig. 5, the receiver server includes an external receiver server 106 and an internal receiver server 107, both of which are SMTP servers, and the sender server is also an SMTP server. If a sender 101 needs to send a mail to a receiver 105, the sender 101 sends a first mail to a sender SMTP server 102, the sender SMTP server 102 sends the first mail to a receiver external server 106, the receiver external server 106 obtains mail key information of the first mail after receiving the first mail, including a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or a time of receiving the first mail, and the like, generates a virtual mailbox address according to the mail key information, sends the virtual mailbox address to the sender SMTP server 102, and forwards the virtual mailbox address to the sender 101. The sender 101 sends an authentication mail, for example, an authentication mail containing the same key information of the mail as the first mail, to the sender SMTP server 102 according to the virtual mailbox address, and the authentication mail is forwarded to the out-of-receiver server 106 by the sender SMTP server 102. The server 106 outside the receiving party performs verification processing on the verification mail, and sends the first mail to the server 107 inside the receiving party after the verification is passed. The receiver server 107 sends the first mail to the receiver POP3/IMAP server 104, and the receiver POP3/IMAP server 104 sends the first mail to the receiver 105.
Fig. 6 is a schematic structural diagram of a mail processing apparatus according to an embodiment of the present application. The apparatus of the present embodiment may be in the form of software and/or hardware. As shown in fig. 6, a mail processing apparatus 600 provided in the embodiment of the present application includes a receiving module 601, an obtaining module 602, a generating module 603, and a verifying module 604,
a receiving module 601, configured to receive a first email sent by a sender server;
an obtaining module 602, configured to obtain mail key information of a first mail, where the mail key information includes at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving a first mail;
the generating module 603 is configured to generate a virtual mailbox address according to the mail key information, and send the virtual mailbox address to the sender server;
the receiving module 601 is further configured to receive a verification mail sent by the sender server, where the recipient address of the verification mail is a virtual mailbox address, and the verification mail includes information to be verified;
the verification module 604 is configured to perform verification processing on the verification email, and send the first email according to the email address of the recipient when the verification email passes verification.
In a possible implementation manner, the verification module is specifically configured to:
determining a valid time period corresponding to the verification mail;
acquiring a first moment when a verification mail is received;
and verifying the verification mail according to the effective time period, the first moment and the information to be verified.
In one possible implementation, the verification module is specifically configured to:
judging whether the first time is within the effective time period;
if yes, verifying the verification mail according to the information to be verified;
if not, determining that the verification mail fails to be verified.
In one possible implementation, the verification module is specifically configured to:
inquiring mail key information corresponding to the virtual mailbox address in a mapping table;
judging whether the information to be verified is the same as the mail key information;
if yes, determining that the verification mail passes verification;
if not, determining that the verification mail fails to be verified.
In a possible implementation manner, the generating module is specifically configured to:
judging whether the white list or the black list comprises a sender mailbox address or not;
and if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the mail key information.
In a possible implementation manner, the generating module is specifically configured to:
if the white list comprises the sender mailbox address, sending a first mail according to the receiver mailbox address;
and if the blacklist list comprises the address of the sender mailbox, discarding the first mail.
In a possible implementation manner, the generating module is specifically configured to:
HASH operation or MD5 operation is carried out on the mail key information to obtain first information;
and generating a virtual mailbox address according to the first information and the mailbox address rule.
The device for processing mails provided by this embodiment may be used to implement the above method embodiments, and the implementation principle and technical effect are similar, which are not described herein again.
The execution main body of the embodiment of the application can be computer equipment, and can also be a mail processing method device arranged in the computer equipment. The mail processing method and the device can be realized by software, and also can be realized by the combination of software and hardware. The mail processing method device can be a processor in computer equipment. For ease of understanding, the following description will be made by taking an execution subject as an example of a computer device. The device for processing the mail provided in the embodiment of the present application may implement the technical solutions shown in the above method embodiments, and the implementation principles and beneficial effects are similar, which are not described herein again.
Referring to fig. 7, the electronic device 20 may include a processor 21 and a memory 22. The processor 21, the memory 22, and the various parts are illustratively interconnected by a bus 23.
The memory 22 stores computer-executable instructions;
processor 21 executes computer-executable instructions stored by memory 22 to cause processor 21 to perform mail processing methods as shown in the above-described method embodiments.
All or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The foregoing program may be stored in a readable memory. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned memory (storage medium) includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape, floppy disk, optical disk, and any combination thereof.
The embodiment of the application provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is used for implementing the mail processing method of the above method embodiment.
Embodiments of the present application may also provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the method for processing a mail shown in the foregoing method embodiments may be implemented.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.
In this application, the terms "include," "includes," and variations thereof may refer to non-limiting inclusions; the term "or" and variations thereof may mean "and/or". The terms "first," "second," and the like in this application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. In the present application, "a plurality" means two or more. "and/or" describes the association relationship of the associated object, indicating that there may be three relationships, for example, a and/or B, which may indicate: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.

Claims (10)

1. A method for processing mail, comprising:
receiving a first mail sent by a sender server;
acquiring mail key information of the first mail, wherein the mail key information comprises at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail;
generating a virtual mailbox address according to the mail key information, and sending the virtual mailbox address to the sender server;
receiving a verification mail sent by the sender server, wherein the recipient address of the verification mail is the virtual mailbox address, and the verification mail comprises information to be verified;
and carrying out verification processing on the verification mail, and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification.
2. The method of claim 1, wherein the authenticating the authentication mail comprises:
determining a valid time period corresponding to the verification mail;
acquiring a first moment when the verification mail is received;
and verifying the verification mail according to the effective time period, the first moment and the information to be verified.
3. The method of claim 2, wherein the verifying the verification email according to the valid period, the first time and the information to be verified comprises:
judging whether the first time is within the effective time period;
if yes, verifying the verification mail according to the to-be-verified information;
if not, determining that the verification mail fails to be verified.
4. The method of claim 3, wherein the verifying the verification mail according to the information to be verified comprises:
inquiring the mail key information corresponding to the virtual mailbox address in a mapping table;
judging whether the information to be verified is the same as the key information of the mail;
if yes, determining that the verification mail passes verification;
if not, determining that the verification mail fails to be verified.
5. The method according to any one of claims 1-4, wherein generating a virtual mailbox address according to the mail key information comprises:
judging whether a white list or a black list comprises the sender mailbox address or not;
and if the white list and the black list do not comprise the sender mailbox address, generating a virtual mailbox address according to the mail key information.
6. The method of claim 5, further comprising:
if the white list comprises the sender mailbox address, the first mail is sent according to the receiver mailbox address;
and if the blacklist list comprises the sender mailbox address, discarding the first mail.
7. The method according to any one of claims 1-4, wherein generating a virtual mailbox address according to the mail key information comprises:
performing HASH operation or MD5 operation on the mail key information to obtain first information;
and generating the virtual mailbox address according to the first information and the mailbox address rule.
8. A mail processing apparatus, comprising:
the receiving module is used for receiving a first mail sent by a sender server;
an obtaining module, configured to obtain mail key information of the first mail, where the mail key information includes at least one of the following: a sender mailbox address, a receiver mailbox address, a mail subject, a mail body, a mail attachment or the time of receiving the first mail;
the generating module is used for generating a virtual mailbox address according to the mail key information and sending the virtual mailbox address to the sender server;
the receiving module is further configured to receive a verification email sent by the sender server, where a recipient address of the verification email is the virtual mailbox address, and the verification email includes information to be verified;
and the verification module is used for verifying the verification mail and sending the first mail according to the mailbox address of the receiver when the verification mail passes verification.
9. An electronic device, comprising: a processor and a memory;
the memory stores computer execution instructions;
the processor executes the computer-executable instructions stored by the memory to cause the electronic device to perform the method of any of claims 1-7.
10. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, implement a mail processing method according to any one of claims 1 to 7.
CN202211696660.9A 2022-12-28 2022-12-28 Mail processing method, device, equipment and readable storage medium Pending CN115801719A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211696660.9A CN115801719A (en) 2022-12-28 2022-12-28 Mail processing method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211696660.9A CN115801719A (en) 2022-12-28 2022-12-28 Mail processing method, device, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN115801719A true CN115801719A (en) 2023-03-14

Family

ID=85427985

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211696660.9A Pending CN115801719A (en) 2022-12-28 2022-12-28 Mail processing method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN115801719A (en)

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020029249A1 (en) * 2000-03-17 2002-03-07 Campbell Leo J. Methods and systems for providing an electronic account to a customer
KR20020030704A (en) * 2001-09-28 2002-04-25 이계철 An E-mail service system with anti-spam mail using virtual E-mail addresses and method therefor
JP2003060710A (en) * 2001-08-09 2003-02-28 Yuji Hibi Distributed mail system having inter-attribute as object
JP2003141042A (en) * 2001-11-01 2003-05-16 Sony Corp Communication system and method, information processor and method, information processing terminal and method, and program
JP2005149049A (en) * 2003-11-14 2005-06-09 Nippon Telegr & Teleph Corp <Ntt> Address generation system, address generation method, and address generation program
CN1707492A (en) * 2004-06-05 2005-12-14 腾讯科技(深圳)有限公司 Method for against refuse E-mail
JP2006053644A (en) * 2004-08-10 2006-02-23 Nippon Telegr & Teleph Corp <Ntt> Access control system, method, and program
CN1819563A (en) * 2005-02-10 2006-08-16 吉尼柯斯微系统公司 System and method for treating electronic messages
JP2006227892A (en) * 2005-02-17 2006-08-31 Fujitsu Peripherals Ltd Electronic mail relay system, electronic mail relay method and computer program
JP2009110403A (en) * 2007-10-31 2009-05-21 Linuon Inc E-mail transmission/reception system
FR2928512A1 (en) * 2008-03-06 2009-09-11 Teixis Consulting Entpr Uniper Electronic mail e.g. advertising junk mail, sending and receiving device for postal letter box, has recipient selecting distribution notice, where notice points on mail and retrieves mail and recipient classifies mail on support
JP2013171473A (en) * 2012-02-21 2013-09-02 Fujitsu Ltd Information processing method, information processing device and program
KR20140066526A (en) * 2012-11-23 2014-06-02 네이버 주식회사 System, method and computer readable recording medium for checking the receive receipt of a send mail on a mobile terminal
CN103841006A (en) * 2014-02-25 2014-06-04 汉柏科技有限公司 Method and device for intercepting junk mails in cloud computing system
WO2016156858A1 (en) * 2015-03-31 2016-10-06 Gordon Tees Email management and control system
CN109787990A (en) * 2014-10-28 2019-05-21 网易(杭州)网络有限公司 A kind of method and device for verifying mail
CN113132476A (en) * 2021-04-16 2021-07-16 中国工商银行股份有限公司 Mail synchronization system, method and device and electronic equipment
US20210306160A1 (en) * 2020-03-26 2021-09-30 Issam ANDONI Systems and methods for facilitating policy-compliant end-to-end encryption for individuals between organizations
CN114143282A (en) * 2021-11-30 2022-03-04 中国建设银行股份有限公司 Mail processing method, device, equipment and storage medium
CN114945918A (en) * 2020-12-03 2022-08-26 谷歌有限责任公司 Privacy-preserving virtual e-mail system
US20220279015A1 (en) * 2021-02-26 2022-09-01 ArmorBlox, Inc. Method for detecting financial attacks in emails

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020029249A1 (en) * 2000-03-17 2002-03-07 Campbell Leo J. Methods and systems for providing an electronic account to a customer
JP2003060710A (en) * 2001-08-09 2003-02-28 Yuji Hibi Distributed mail system having inter-attribute as object
KR20020030704A (en) * 2001-09-28 2002-04-25 이계철 An E-mail service system with anti-spam mail using virtual E-mail addresses and method therefor
JP2003141042A (en) * 2001-11-01 2003-05-16 Sony Corp Communication system and method, information processor and method, information processing terminal and method, and program
JP2005149049A (en) * 2003-11-14 2005-06-09 Nippon Telegr & Teleph Corp <Ntt> Address generation system, address generation method, and address generation program
CN1707492A (en) * 2004-06-05 2005-12-14 腾讯科技(深圳)有限公司 Method for against refuse E-mail
JP2006053644A (en) * 2004-08-10 2006-02-23 Nippon Telegr & Teleph Corp <Ntt> Access control system, method, and program
CN1819563A (en) * 2005-02-10 2006-08-16 吉尼柯斯微系统公司 System and method for treating electronic messages
JP2006227892A (en) * 2005-02-17 2006-08-31 Fujitsu Peripherals Ltd Electronic mail relay system, electronic mail relay method and computer program
JP2009110403A (en) * 2007-10-31 2009-05-21 Linuon Inc E-mail transmission/reception system
FR2928512A1 (en) * 2008-03-06 2009-09-11 Teixis Consulting Entpr Uniper Electronic mail e.g. advertising junk mail, sending and receiving device for postal letter box, has recipient selecting distribution notice, where notice points on mail and retrieves mail and recipient classifies mail on support
JP2013171473A (en) * 2012-02-21 2013-09-02 Fujitsu Ltd Information processing method, information processing device and program
KR20140066526A (en) * 2012-11-23 2014-06-02 네이버 주식회사 System, method and computer readable recording medium for checking the receive receipt of a send mail on a mobile terminal
CN103841006A (en) * 2014-02-25 2014-06-04 汉柏科技有限公司 Method and device for intercepting junk mails in cloud computing system
CN109787990A (en) * 2014-10-28 2019-05-21 网易(杭州)网络有限公司 A kind of method and device for verifying mail
WO2016156858A1 (en) * 2015-03-31 2016-10-06 Gordon Tees Email management and control system
US20210306160A1 (en) * 2020-03-26 2021-09-30 Issam ANDONI Systems and methods for facilitating policy-compliant end-to-end encryption for individuals between organizations
CN114945918A (en) * 2020-12-03 2022-08-26 谷歌有限责任公司 Privacy-preserving virtual e-mail system
US20220279015A1 (en) * 2021-02-26 2022-09-01 ArmorBlox, Inc. Method for detecting financial attacks in emails
CN113132476A (en) * 2021-04-16 2021-07-16 中国工商银行股份有限公司 Mail synchronization system, method and device and electronic equipment
CN114143282A (en) * 2021-11-30 2022-03-04 中国建设银行股份有限公司 Mail processing method, device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
罗倩;秦玉平;王春立;: "反垃圾邮件技术综述", 渤海大学学报(自然科学版), no. 04, 15 December 2008 (2008-12-15) *
胡文广;张颖江;兰义华;: "蜜罐研究与应用", 网络安全技术与应用, no. 05, 1 May 2006 (2006-05-01) *

Similar Documents

Publication Publication Date Title
US11044267B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
KR101137089B1 (en) Validating inbound messages
US11722513B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US9177293B1 (en) Spam filtering system and method
US20190319905A1 (en) Mail protection system
US8073912B2 (en) Sender authentication for difficult to classify email
US8756289B1 (en) Message authentication using signatures
US8751808B2 (en) Method and system for sharing trusted contact information
US20160014151A1 (en) Systems and methods for electronic message analysis
KR101109817B1 (en) Method and apparatus for reducing e-mail spam and virus distribution in a communications network by authenticating the origin of e-mail messages
US20080313704A1 (en) Electronic Message Authentication
US20080282344A1 (en) E-mail authentication
US20060149823A1 (en) Electronic mail system and method
US20140215571A1 (en) E-mail authentication
JP2012511842A (en) Electronic messaging integration engine
AU2009299539B2 (en) Electronic communication control
US8850569B1 (en) Instant messaging malware protection
Gupta et al. Forensic analysis of E-mail address spoofing
Khan et al. Introduction to email, web, and message forensics
CN115801719A (en) Mail processing method, device, equipment and readable storage medium
Mishra et al. Forensic analysis of e-mail date and time spoofing
CN113938311A (en) Mail attack tracing method and system
US11916873B1 (en) Computerized system for inserting management information into electronic communication systems
LAZIĆ et al. E-mail forensics: techniques and tools for forensic investigation
Chauhan et al. Effectiveness of Anti-Spoofing Protocols for Email Authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination