CN117254971A - Mail transmission method, device, equipment and storage medium based on blockchain network - Google Patents

Mail transmission method, device, equipment and storage medium based on blockchain network Download PDF

Info

Publication number
CN117254971A
CN117254971A CN202311331183.0A CN202311331183A CN117254971A CN 117254971 A CN117254971 A CN 117254971A CN 202311331183 A CN202311331183 A CN 202311331183A CN 117254971 A CN117254971 A CN 117254971A
Authority
CN
China
Prior art keywords
mail
mailbox
information
security
receiving end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311331183.0A
Other languages
Chinese (zh)
Inventor
郑广昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202311331183.0A priority Critical patent/CN117254971A/en
Publication of CN117254971A publication Critical patent/CN117254971A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The disclosure provides a mail transmission method, device, equipment and storage medium based on a blockchain network, which can be applied to the technical fields of mail transmission and finance. The method comprises the following steps: acquiring a mail sent by a sender through a target block chain node; performing security detection on the mail by using a block chain network to obtain a detection result; under the condition that the detection result shows that the mail passes the detection, responding to a mail checking request from the receiving end, and acquiring the safety authentication information of the receiving end; verifying the security authentication information through the target block chain node to obtain a verification result; and sending the mail to the receiving end under the condition that the verification result shows that the security authentication information passes verification.

Description

Mail transmission method, device, equipment and storage medium based on blockchain network
Technical Field
The present disclosure relates to the field of mail transmission and finance, and more particularly, to a block chain network-based mail transmission method, a block chain network-based mail transmission apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
Background
Email is a widely used communication tool that provides a quick and inexpensive way of communication between individuals and parties. However, spam, phishing, and emails that include or link to malicious programs (e.g., malware, luxury software) are increasingly risky for users, companies, and computing devices to build.
In the process of implementing the disclosed concept, the inventor finds that at least the following problems exist in the related art: in the transmission process of the E-mail, the mail content has larger leakage risk and lower safety.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a blockchain network-based mail transmission method, a blockchain network-based mail transmission apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
According to a first aspect of the present disclosure, there is provided a mail transmission method based on a blockchain network including a plurality of blockchain nodes, the method comprising:
acquiring a mail sent by a sender through a target block chain node;
performing security detection on the mail by using the blockchain network to obtain a detection result;
Under the condition that the detection result shows that the mail passes the detection, responding to a mail checking request from a receiving end to acquire the safety authentication information of the receiving end;
verifying the security authentication information through the target block chain node to obtain a verification result;
and sending the mail to the receiving end under the condition that the verification result shows that the safety authentication information passes verification.
According to an embodiment of the present disclosure, performing security detection on the mail by using the blockchain network to obtain a detection result includes:
performing security verification on the issuing equipment and the issuing address through the target block chain node to obtain a verification result;
under the condition that the verification result shows that the sending equipment and the sending address pass verification, sharing the mailbox security level of the receiving end by using other nodes except the target block link point in the block chain network to obtain a sharing result;
and under the condition that the consensus result shows that the mailbox security level of the receiver is agreed, confirming the detection result of the mail as the mail which can be sent.
According to an embodiment of the present disclosure, the mail transmission method further includes:
When the consensus result shows that the mailbox security level of the addressee does not reach consensus, utilizing the blockchain to send a modification instruction to the sender;
and the sender responds to the modification instruction to modify the mail so as to obtain the modified mail.
According to an embodiment of the present disclosure, the sharing of the mailbox security level of the receiving end by using other nodes except for the target block link point in the block chain network to obtain a sharing result includes:
acquiring a first historical mail from the receiving end through the target block chain link point;
determining the mailbox security level of the receiving end according to the first historical mail;
determining whether the mailbox security levels of the plurality of blockchain nodes are consistent with each other through the blockchain network;
and determining that the blockchain network agrees with the mailbox security level under the condition that the mailbox security level of nodes exceeding the preset number among the other nodes and the mailbox security level determined by the target blockchain link point are consistent with each other.
According to an embodiment of the present disclosure, the first historical mail includes a historical sent mail and a historical received mail;
The determining the mailbox security level of the receiving end according to the first historical mail includes:
in the case where copyrighted contents which do not meet the copyright conditions are included in the mail contents of the first history mail, a copyright weight is determined,
determining a first weight corresponding to each of the change information when the mail content of the history sent mail includes at least one change information that does not satisfy a preset content rule, wherein the change information includes a forward mail content different from an original mail content or a target transaction information different from a transaction information of the original mail;
determining a second weight corresponding to each of the target information in a case where mail contents of the history received mail include at least one target information for the history received mail, wherein the target information includes non-authentication information, junk mail, and non-business information satisfying a preset number;
generating the weight score according to the copyright weight, the first weights and the second weights;
and determining the mailbox security level of the receiving end according to the weight score and a preset score threshold.
According to an embodiment of the present disclosure, determining, according to the first historical mail, a mailbox security level of the receiving end includes:
acquiring a second historical mail of the receiver, wherein mail content of the second historical mail comprises copyright content, change information and target information, the change information comprises forwarding mail information different from original mail content and target transaction information different from transaction information of the original mail, and the target information comprises non-authentication information, junk mail and non-business information meeting the preset quantity;
inputting the mail content of the historical mail into a mailbox security detection model, and outputting security scores;
and determining the mailbox security level of the receiving end according to the security score and a preset score range.
According to an embodiment of the present disclosure, the mailbox security detection model is trained by:
acquiring a training sample set, wherein the training sample set comprises historical training mails of a plurality of training mailboxes and mailbox labels, the training mail content comprises training copyright content, training change information and training target information, and the mailbox labels represent the security level of the training mailboxes;
Aiming at the training mail content of each training mailbox, generating a common influence formula according to training copyright content, training change information, training target information and a plurality of influence weights;
converting the common influence formula based on a regression function to obtain the safety probability of the training mailbox;
determining a prediction grade identification of the training mailbox according to the security probability and the probability threshold;
inputting the prediction grade identification and the mailbox label into a loss function to obtain a loss result;
and iteratively adjusting a plurality of influence weights and the probability threshold according to the loss result to obtain the trained mailbox security detection model.
According to an embodiment of the present disclosure, security verification is performed on an issuing device and an issuing address by the target blockchain node, to obtain a verification result, including:
and under the condition that the sending equipment belongs to equipment in a preset safety equipment list and the sending address is in a preset safety address range, determining that the verification result of the mail is verification passing.
According to an embodiment of the present disclosure, before determining that the detection result of the mail is verification, the method further includes:
Under the condition that the mail is of a forwarding type, comparing the mail content with other mails related to the mail content to obtain a comparison result;
and if the comparison result shows that the mail content is consistent with other related mails, confirming that the mail detection result is verification passing.
According to an embodiment of the present disclosure, the security authentication information includes a mail receiving address, a mail receiving device, identity information, and identity level information of the recipient;
the target blockchain node is used for verifying the security authentication information to obtain a verification result, and the method comprises the following steps:
and determining the security authentication information as verification passing under the condition that the mail receiving address meets the preset receiving address range, the mail receiving equipment belongs to equipment in a preset receiving equipment list, the identity information belongs to a user in a preset identity list and the identity grade information meets the mail importance grade.
A second aspect of the present disclosure provides a mail transmission apparatus based on a blockchain network including a plurality of blockchain nodes, the apparatus comprising:
The first acquisition module is used for acquiring the mail sent by the sender through the target blockchain node;
the detection module is used for carrying out safety detection on the mails by utilizing the blockchain network to obtain a detection result;
the second acquisition module is used for responding to a mail check request from a receiving end to acquire the safety authentication information of the receiving end under the condition that the detection result shows that the mail is detected to pass;
the verification module is used for verifying the security authentication information through the target blockchain node to obtain a verification result;
and the sending module is used for sending the mail to the receiving end when the verification result shows that the safety authentication information passes verification.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method described above.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described method.
A fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the above method.
According to the embodiment of the disclosure, after the target blockchain acquires the sent mail, the safety detection is carried out on the mail through the blockchain nodes in the blockchain network, so that the safety of the mail after the mail is sent is ensured, after the mail receiving end sends a mail checking request, the target blockchain link point verifies the safety authentication information sent by the receiving end, and after verification is passed, the mail is sent to the receiving end. Because the blockchain network performs the security detection once in the process of sending and receiving the mails, the possibility of leakage of the mails caused by potential safety hazards existing in the process of sending the mails or receiving the mails is avoided, and the safety of mail transmission is improved.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario diagram of a mail transmission method according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a mail transmission method according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart for confirming that mail can be sent in accordance with an embodiment of the present disclosure;
fig. 4 schematically illustrates a flow chart for generating mailbox security levels according to embodiments of the present disclosure;
fig. 5 schematically shows a block diagram of a mail transmission apparatus according to an embodiment of the present disclosure; and
fig. 6 schematically illustrates a block diagram of an electronic device adapted to implement a mail transfer method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, the related data (such as including but not limited to personal information of users and mails) are collected, stored, used, processed, transmitted, provided, disclosed, applied and the like, all meet the requirements of related laws and regulations, necessary security measures are adopted, and the public welfare is not violated.
Mail is an important way of daily work communication, however, in the process of transmitting the mail, because the work content of different recipients is different, the sender is required to spend a great deal of effort and manage and maintain the recipient information, meanwhile, because the sender does not know whether the recipients in the mail have the authority to view the mail, the condition that the recipients override to view after sending the mail to the recipients can be caused, and meanwhile, in the process of transmitting the mail, the sender does not know whether the recipients are in a safe and suitable environment, thereby affecting the safety of the mail.
In view of the above, embodiments of the present disclosure provide a method, an apparatus, a device, and a storage medium for transmitting mail based on a blockchain network, where the method includes obtaining, by a target blockchain node, mail sent by an sender; performing security detection on the mail by using a block chain network to obtain a detection result; under the condition that the detection result shows that the mail passes the detection, responding to a mail checking request from the receiving end, and acquiring the safety authentication information of the receiving end; verifying the security authentication information through the target block chain node to obtain a verification result; and sending the mail to the receiving end under the condition that the verification result shows that the security authentication information passes verification.
Fig. 1 schematically illustrates an application scenario diagram of a mail transmission method according to an embodiment of the present disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include corporate employees communicating information between employees using corporate distributed mailboxes. The blockchain network 104 is used as a medium to provide a communication link between the first terminal device 101, the second terminal device 102, and the third terminal device 103. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, etc., wherein the blockchain network 104 includes a plurality of blockchain nodes, such as the target blockchain nodes and other nodes of the present disclosure, which may be servers.
The user can use at least one of the first terminal device 101, the second terminal device 102, and the third terminal device 103 to transmit mail through the blockchain network 104. Various communication client applications, such as mail class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the first terminal device 101, the second terminal device 102, and the third terminal device 103.
The first terminal device 101, the second terminal device 102, the third terminal device 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
It should be noted that the mail transmission method provided in the embodiments of the present disclosure may be generally performed by the blockchain network 104. Accordingly, mail transfer devices provided by embodiments of the present disclosure may be generally disposed in the blockchain network 104. It should be understood that the number of blockchain nodes in the end device, blockchain network 104 in fig. 1 is merely illustrative. There may be any number of end devices and blockchain nodes as desired for implementation.
The mail transmission method of the disclosed embodiment will be described in detail below with reference to fig. 2 to 4 based on the scenario described in fig. 1.
Fig. 2 schematically shows a flow chart of a mail transmission method according to an embodiment of the present disclosure.
As shown in fig. 2, the blockchain network includes a plurality of blockchain nodes, and the blockchain network-based mail transmission method of the embodiment includes operations S210 to S250.
In operation S210, acquiring, by the target blockchain node, a mail transmitted by the sender;
in operation S220, performing security detection on the mail by using the blockchain network to obtain a detection result;
in operation S230, if the detection result indicates that the mail detection is passed, the security authentication information of the receiving end is obtained in response to the mail viewing request from the receiving end;
in operation S240, the security authentication information is verified through the target blockchain node to obtain a verification result;
in operation S250, in the case that the verification result indicates that the security authentication information is verified, the mail is transmitted to the receiving end.
According to the embodiment of the disclosure, the security detection of the mail may refer to detecting the address of the sending end, the device number and the security level of the receiving end of the mail. Verification of the security authentication information may refer to verifying the device number and device address of the recipient end and the authority of the recipient (whether or not there is authority to view the mail of the importance level).
According to the embodiment of the disclosure, after the mail is edited, the sender clicks a target block chain link point in the block chain network to obtain the mail after 'sending', and at this time, all block chain nodes in the block chain network are utilized to carry out security detection on the mail to obtain a detection result. And under the condition that the detection result shows that the mail passes the detection, the block chain network informs the receiving end of an unread mail, and under the condition that a mail receiving button is clicked on the receiving end, the target block chain link point acquires the safety authentication information of the mobile phone end, and the target block chain node is utilized to verify the safety authentication information to obtain a verification result. And when the verification result shows that the security authentication information passes the verification, the target block link point sends the stored mail to the receiving end.
According to the embodiment of the disclosure, after the target blockchain acquires the sent mail, the safety detection is carried out on the mail through the blockchain nodes in the blockchain network, so that the safety of the mail after the mail is sent is ensured, after the mail receiving end sends a mail checking request, the target blockchain link point verifies the safety authentication information sent by the receiving end, and after verification is passed, the mail is sent to the receiving end. Because the blockchain network performs the security detection once in the process of sending and receiving the mails, the possibility of leakage of the mails caused by potential safety hazards existing in the process of sending the mails or receiving the mails is avoided, and the safety of mail transmission is improved.
Fig. 3 schematically illustrates a flow chart for confirming that mail can be sent according to an embodiment of the present disclosure.
As shown in fig. 3, the block chain network is used to perform security detection on the mail, so as to obtain a detection result, which includes:
performing security verification on the issuing equipment and the issuing address through the target block chain node to obtain a verification result;
under the condition that the verification result shows that the sending equipment and the sending address pass verification, sharing the mailbox security level of the receiving end by utilizing other nodes except the target block link point in the block chain network to obtain a sharing result;
and under the condition that the consensus result shows that the mailbox security level of the receiver reaches consensus, confirming the detection result of the mail as that the mail can be sent.
According to the embodiment of the disclosure, the mailbox security level may refer to a security level of a receiver mailbox determined according to whether a virus is in the receiver mailbox or whether the mailbox is an attack, whether a domain name is hijacked, and the like.
According to the embodiment of the disclosure, when the target block link point receives the mail, the sender device identifier and the sender address of the sender are synchronously acquired, after the sender device and the sender address are checked to pass, the mailbox security level determined by the target block link point is commonly known by using other nodes in the block chain network, so as to obtain a common result, for example, the current target block link point determines that the receiver is a secure mailbox, and the mailbox of the receiver stored by other nodes is an unsafe mailbox with higher risk level, which may be that the current receiver is possibly tampered into the secure mailbox, so that the other nodes cannot commonly know the target block link point, and thus the mail cannot be determined to be a transmittable mail.
According to the embodiment of the disclosure, if other nodes and the target blockchain node confirm that the mailbox of the receiving end is a safe mailbox, consensus is achieved at the moment, so that the mail can be confirmed as a transmittable mail.
According to the embodiment of the disclosure, the mailbox security level is commonly known through the blockchain network, so that the receiving end can be prevented from being tampered by lawbreakers to receive the mail, thereby avoiding the leakage of the mail content, improving the mail security and avoiding the property loss caused by the mail content leakage.
As shown in fig. 3, the mail transmission method further includes:
under the condition that the consensus result shows that the mailbox security level of the receiver does not reach consensus, utilizing the blockchain to send a modification instruction to the sender;
the sender responds to the modification instruction to modify the mail, and the modified mail is obtained.
According to the embodiment of the disclosure, if other nodes and the target blockchain node do not agree on the mailbox security level of the receiver, the receiver is indicated to have a possibility of being tampered, and at this time, the sender can be notified to modify the mail, for example, modify the mail content, or notify the sender of the mailbox security level of the receiver, so as to prompt the sender to delete the receiver from the mail, so as to avoid the occurrence of mail leakage caused by sending the mail to the receiver. After the sender modifies the mail, the modified mail is uploaded to the blockchain network again for corresponding security detection.
According to an embodiment of the disclosure, the mailbox security level of the receiving end is commonly identified by using other nodes except for the target block link point in the block chain network, so as to obtain a commonly identified result, including:
acquiring a first historical mail from a receiving end through a target block chain link point;
determining the mailbox security level of the receiving end according to the first historical mail;
determining whether mailbox security levels of a plurality of blockchain nodes are consistent with each other through a blockchain network;
and under the condition that the mailbox security levels of nodes exceeding the preset number in the plurality of other nodes are consistent with the mailbox security levels determined by the target block link points, determining that the block chain network agrees with the mailbox security levels.
According to the embodiment of the disclosure, the target block link point judges the mailbox security level of the current receiving end according to the first historical mail of the receiving end, and if the mailbox security level of the preset number of nodes in other nodes is the same as the mailbox security level of the target block link point, the block link network can be considered to agree on the mailbox security level of the receiving end.
It should be noted that the preset number may refer to 1/2 of the total number of all other nodes, and the specific numerical value thereof may be adjusted according to the actual requirement, for example, may be adjusted to 2/3 of the total number.
According to the embodiment of the disclosure, the mailbox security level determined by the link points of the target block is commonly known through other nodes, and the preset number can be adjusted according to actual requirements, so that a certain fault tolerance is provided for secure transmission of mails, and the loss caused by untimely learning of mail contents due to the fact that the mails cannot be transmitted by the mailboxes only when all nodes are consistent with each other is avoided.
Fig. 4 schematically illustrates a flow chart for generating mailbox security levels according to embodiments of the present disclosure.
According to an embodiment of the present disclosure, the first historical mail includes a historical sent mail and a historical received mail;
as shown in fig. 4, determining the mailbox security level of the receiving end according to the first historical mail includes operations S401 to S405.
In the case where copyrighted contents that do not meet the copyright condition are included in the mail contents of the first history mail in operation S401, a copyright weight is determined,
in operation S402, for the history transmission mail, in a case where the mail content of the history transmission mail includes at least one change information that does not satisfy the preset content rule, determining a first weight corresponding to each change information, wherein the change information includes forwarding mail content different from the original mail content or target transaction information different from the transaction information of the original mail;
In operation S403, for the history reception mail, in a case where the mail content of the history reception mail includes at least one target information, determining a second weight corresponding to each target information, wherein the target information includes non-authentication information, junk mail, and non-business information satisfying a preset number;
in operation S404, a weight score is generated according to the copyright weight, the plurality of first weights, and the plurality of second weights;
in operation S405, the mailbox security level of the receiving end is determined according to the weight score and the preset score threshold.
According to embodiments of the present disclosure, copyrighted content may refer to content or attachments, etc., that are not copyrighted or pirated. The change information may include a forward mail content with a different original mail content or a target transaction information with a different transaction information from the original mail in the historical transmitted mail of the receiving end, for example, the original mail content is "the project is responsible for person to be three", and the receiving end modifies "three to" four in the process of forwarding the mail, which indicates that the mail content of the historical transmitted mail of the receiving end includes change information which does not satisfy the rule of the preset content, for example, the account of the transaction information in the original mail is "101010101", and the receiving end modifies the account to "101010102" when forwarding the mail, thereby determining that the mail content of the historical transmitted mail of the receiving end includes change information which does not satisfy the rule of the preset content.
According to embodiments of the present disclosure, non-authentication information may refer to certain non-securely authenticated programs or software, etc., such as Trojan horses, viruses, etc., in the historically received mail. The non-business information may refer to information unrelated to work content such as birthday blessings, sports activities or hobbies.
According to the embodiment of the disclosure, m copyright weights are determined under the condition that m emails at the receiving end all have copyright contents which do not meet the copyright conditions; generating n first weights under the condition that n pieces of change information exist at a receiving end; and generating p second weights under the condition that p pieces of mail of target information exist at the receiving end.
In an exemplary embodiment, the m copyright weights, the n first weights and the p second weights are summed, and the obtained weight sum may be used as a weight score, if the weight sum is greater than a preset score threshold (for example, may be 90 minutes), the mailbox security level of the receiving end may be determined as a mailbox with security risk, and if the weight sum is not greater than the preset score threshold, the mailbox security level of the receiving end may be determined as a secure mailbox.
In an alternative embodiment, the m copyright weights, the n first weights and the p second weights are summed to obtain a weight sum, a difference value based on a preset initial reputation value (for example, 100 minutes) and the weight sum may be used as a weight score, if the difference value is greater than a preset score threshold (for example, may be 90 minutes), the mailbox security level of the receiving end may be determined to be a secure mailbox, and if the difference value is not greater than the preset score threshold, the mailbox security level of the receiving end may be determined to be a mailbox with a security risk. If the content of the mail exists in the subsequent new historical mails at the receiving end, the difference value can be updated based on the new historical mails on the basis of the existing difference value.
According to the embodiment of the disclosure, through the calculation of the multiple weights, the real-time detection of the safety of the mailbox at the receiving end can be realized based on the historical mails at the receiving end, so that the leakage of mail information caused by the potential safety risk existing at the receiving end is avoided.
According to the embodiment of the disclosure, after determining any one of the copyright weight, the first weight and the second weight of the receiving end, the target blockchain node respectively sends a first control instruction and a second control instruction to the sending end and the receiving end, the sending end responds to the first control instruction to control target operations of the sending end, for example, the sending end cannot send a mail to the receiving end in a group sending or independent sending mode, and the receiving end responds to the second control instruction to control the receiving end and receiving equipment to copy, forward, scan, download, screen capture and other operations on mail content, and meanwhile illegal domain name detection is performed on the receiving end.
It should be noted that, before the above operations, the operation authority for operating the mailbox and the mailbox device is obtained under the condition of the agreement of the user.
In an alternative embodiment, determining the mailbox security level of the receiving end according to the first historical mail includes:
Acquiring a second historical mail of a receiver, wherein mail content of the second historical mail comprises copyright content, change information and target information, the change information comprises forwarding mail information different from original mail content and target transaction information different from transaction information of the original mail, and the target information comprises non-authentication information, junk mail and non-business information meeting the preset quantity;
inputting mail content of the historical mail into a mailbox security detection model, and outputting security scores;
and determining the mailbox security level of the receiving end according to the security score and the preset score range.
According to the embodiment of the disclosure, when determining the mailbox security level of the receiving end, the acquired second historical mail of the receiving end can be input into the mailbox security detection model, so that a security score can be obtained, the mailbox security level of the receiving end mailbox can be determined based on the security score and a preset score range, for example, the security score is 59 points, the preset score range is greater than or equal to 60 points, and the mailbox security level of the receiving end can be determined to be a risk mailbox.
It should be noted that the preset score range may be specifically set according to actual requirements, and the above embodiment is described only as an example.
According to an embodiment of the present disclosure, a mailbox security detection model is trained by:
acquiring a training sample set, wherein the training sample set comprises historical training mails of a plurality of training mailboxes and mailbox labels, the training mail content comprises training copyright content, training change information and training target information, and the mailbox labels represent the security level of the training mailboxes;
aiming at the training mail content of each training mailbox, generating a common influence formula according to the training copyright content, the training change information, the training target information and a plurality of influence weights;
converting the common influence formula based on the regression function to obtain the safety probability of the training mailbox;
determining a prediction grade identification of the training mailbox according to the safety probability and the probability threshold;
inputting the prediction grade identification and the mailbox label into a loss function to obtain a loss result;
and iteratively adjusting a plurality of influence weights and probability thresholds according to the loss result to obtain a trained mailbox security detection model.
According to the embodiment of the present disclosure, the training copyright content, the training modification information, and the training target information are substantially the same as the copyright content, the modification information, and the target information, respectively, and are not described herein.
According to the embodiment of the disclosure, any one item of the training copyright content, the training change information and the training target information corresponds to an influence weight, and the influence weight can be set according to the influence on the mailbox security, for example, a larger-value influence weight can be set for the non-authentication information in the training target information.
According to an embodiment of the present disclosure, the common influence formula Z is shown as formula (1):
z=β 01 X 12 X 2 +...+β m X m (1)
wherein X is m For the mth item in training copyrighted content, training change information and training target information, e.g. Trojan horse program, beta m Is the influence weight of the mth item.
According to the embodiment of the disclosure, the regression function may refer to a logic function or a sigmoid function, and the conversion process shown in the formula (2) is performed on the common influence formula, so that the security probability P of the training mailbox shown in the formula (3) may be obtained, where the purpose of the regression function is to convert the security probability P into a [0,1] interval.
According to an embodiment of the present disclosure, a predictive level identification of the training mailbox is determined from the security probability P and a probability threshold (e.g., may be 0.6), and when the security probability P is 0.8, the predictive level identification is confirmed as risky. Inputting the prediction grade identification and the mailbox label into a loss function to obtain a loss result; and iteratively adjusting a plurality of influence weights and probability thresholds according to the loss result to obtain a trained mailbox security detection model.
It should be noted that the loss function may be a cross entropy function, or may be another type of function.
According to an embodiment of the present disclosure, security verification is performed on an issuing device and an issuing address by a target blockchain node, to obtain a verification result, including:
and under the condition that the sending equipment belongs to equipment in a preset safety equipment list and the sending address is in a preset safety address range, determining that the verification result of the mail is verification passing.
According to an embodiment of the present disclosure, the blockchain node stores a preset security device list corresponding to each user, such as serial numbers of mobile phones, computers or tablets, MAC information, etc., and also stores preset security address ranges preset, such as within 1 km around a company.
According to the embodiment of the disclosure, for the sender device identifier, the sender device identifier is compared with a preset security device list stored in the blockchain node, and if the identifier information of the sender device exists in the preset security device list and the sender address is located in a preset security address range, the security check of the mail can be determined to be in a passing state.
According to the embodiment of the disclosure, by detecting the equipment and the address of the sending terminal, the sending terminal can be prevented from sending the mail under the condition that the sending terminal does not belong to a safety environment to cause the leakage of mail content, the safety of the mail is standardized from the source of the mail, and the safety of mail transmission is improved.
According to an embodiment of the present disclosure, before determining that the detection result of the mail is verification, the method further includes:
under the condition that the mail is of a forwarding type, comparing the mail content with other mails related to the mail content to obtain a comparison result;
and if the comparison result shows that the mail content is consistent with other related mails, confirming the detection result of the mail as passing verification.
According to the embodiment of the disclosure, in the process of forwarding the mail, in order to avoid the modification of the mail content by the sender, the receiver causes loss when performing operations such as payment based on the modified mail content, so if the mail is a forwarding type mail, the target blockchain node also needs to compare the mail content with other related mails. And if the mail detection result is consistent with the mail detection result, determining that the mail detection result passes the verification.
According to an embodiment of the present disclosure, the security authentication information includes a mail receiving address, a mail receiving device, identity information, and identity level information of a recipient;
the method comprises the steps of verifying the security authentication information through a target blockchain node to obtain a verification result, wherein the verification result comprises the following steps:
and determining the security authentication information as passing verification under the condition that the mail receiving address meets the preset receiving address range, the mail receiving equipment belongs to equipment in a preset receiving equipment list, the identity information belongs to a user in a preset identity list and the identity grade information meets the mail importance grade.
According to an embodiment of the disclosure, the identity information may include a name, a mobile phone number, a photo, and the like, and the mail receiving address may refer to a location of a current mail receiving device when the receiving endpoint clicks to receive the mail, and the mail receiving device may be a serial number of a unique identifier of a computer, a mobile phone, and the like.
It should be noted that, the identity information, the mail receiving address, and the mail receiving device are all authorized by the user before being sent to the target blockchain node.
According to embodiments of the present disclosure, the identity level information may include a post, a job number, for example, when the sender marks an important category of the mail, it may be indicated that the mail is readable only by a manager, and it may be determined whether the recipient has permission to view the mail by judging the post of the recipient or judging the post of the recipient based on the job number.
According to the embodiment of the disclosure, the target blockchain node determines the security authentication information as verification passing when the mail receiving address satisfies a preset receiving address range, the mail receiving device belongs to a device in a preset receiving device list, the identity information belongs to a user in a preset identity list, and the identity class information satisfies a mail importance class.
According to the embodiment of the disclosure, by judging the user identity information and the identity grade information, unauthorized mail checking by an unauthorized recipient (such as an informal employee or an off-office employee) or leakage of mail contents caused by false mail sending by a sender to the recipient can be avoided. Meanwhile, various identity information of the addressees are judged, so that secret leakage caused by that the mails are sent to the addressees with the same name by mistake can be avoided.
Based on the mail transmission method, the disclosure also provides a mail transmission device. The device will be described in detail below in connection with fig. 5.
Fig. 5 schematically shows a block diagram of a mail transmission apparatus according to an embodiment of the present disclosure.
As shown in fig. 5, the blockchain network includes a plurality of blockchain nodes, and the blockchain network-based mail transmission device 500 of this embodiment includes a first acquisition module 510, a detection module 520, a second acquisition module 530, a verification module 540, and a transmission module 550.
A first obtaining module 510, configured to obtain, by using a target blockchain node, a mail sent by an sender;
the detection module 520 is configured to perform security detection on the mail by using a blockchain network to obtain a detection result;
A second obtaining module 530, configured to obtain, in response to a mail viewing request from the receiving end, security authentication information of the receiving end when the detection result indicates that the mail detection is passed;
the verification module 540 is configured to verify the security authentication information through the target blockchain node to obtain a verification result;
and the sending module 550 is configured to send the mail to the receiving end if the verification result indicates that the security authentication information passes verification.
According to the embodiment of the disclosure, after the target blockchain acquires the sent mail, the safety detection is carried out on the mail through the blockchain nodes in the blockchain network, so that the safety of the mail after the mail is sent is ensured, after the mail receiving end sends a mail checking request, the target blockchain link point verifies the safety authentication information sent by the receiving end, and after verification is passed, the mail is sent to the receiving end. Because the blockchain network performs the security detection once in the process of sending and receiving the mails, the possibility of leakage of the mails caused by potential safety hazards existing in the process of sending the mails or receiving the mails is avoided, and the safety of mail transmission is improved.
According to an embodiment of the present disclosure, the detection module 520 includes a verification sub-module, a consensus sub-module, a first validation sub-module.
The verification sub-module is used for carrying out safety verification on the issuing equipment and the issuing address through the target block chain node to obtain a verification result;
the common identification sub-module is used for carrying out common identification on the mailbox security level of the receiving end by utilizing other nodes except the target block link point in the block chain network under the condition that the verification result shows that the sending equipment and the sending address pass verification, so as to obtain a common identification result;
and the first confirming sub-module is used for confirming the detection result of the mail as the mail which can be sent under the condition that the consensus result shows that the mail box security level of the recipient reaches consensus.
The detection module 520 also includes a modification sub-module, a get sub-module, according to an embodiment of the present disclosure.
The modification submodule is used for utilizing the blockchain to send a modification instruction to the sender under the condition that the consensus result shows that the mailbox security level of the receiver does not reach consensus;
the obtaining sub-module is used for the sender to respond to the modification instruction to modify the mail so as to obtain the modified mail.
According to an embodiment of the present disclosure, the consensus sub-module includes a first acquisition unit, a first determination unit, a second determination unit, a third determination unit.
The first acquisition unit is used for acquiring a first historical mail from the receiving end through the target block chain link point;
the first determining unit is used for determining the mailbox security level of the receiving end according to the first historical mail;
a second determining unit for determining whether mailbox security levels of the plurality of blockchain nodes are consistent with each other through the blockchain network;
and the third determining unit is used for determining that the block chain network agrees with the mailbox security level under the condition that the mailbox security level of the nodes exceeding the preset number in the plurality of other nodes and the mailbox security level determined by the target block chain link point are consistent with each other.
According to an embodiment of the present disclosure, the first historical mail includes a historical sent mail and a historical received mail.
According to an embodiment of the present disclosure, the first determining unit includes a first determining subunit, a second determining subunit, a third determining subunit, a first generating subunit, a fourth determining subunit.
A first determination subunit for determining a copyright weight in the case where copyright contents that do not meet the copyright condition are included in the mail contents of the first history mail,
a second determining subunit, configured to determine, for the historical transmission mail, a first weight corresponding to each of the change information if the mail content of the historical transmission mail includes at least one change information that does not satisfy the preset content rule, where the change information includes a forwarding mail content different from the original mail content or a target transaction information different from the transaction information of the original mail;
A third determining subunit, configured to determine, for the historically received mail, a second weight corresponding to each target information in a case where the mail content of the historically received mail includes at least one target information, where the target information includes non-authentication information, junk mail, and non-service information satisfying a preset number;
the first generation subunit is used for generating weight scores according to the copyright weights, the first weights and the second weights;
and the fourth determining subunit is used for determining the mailbox security level of the receiving end according to the weight score and a preset score threshold.
According to an embodiment of the present disclosure, the first determining unit includes a first acquiring subunit, a detecting subunit, and a fifth determining subunit.
A first obtaining subunit, configured to obtain a second historical email of the recipient, where the email content of the second historical email includes copyrighted content, change information and target information, the change information includes forwarding email information different from the original email content and target transaction information different from the transaction information of the original email, and the target information includes non-authentication information, junk email and non-business information meeting a preset number;
the detection subunit is used for inputting the mail content of the historical mail into the mailbox security detection model and outputting security scores;
And the fifth determining subunit is used for determining the mailbox security level of the receiving end according to the security score and the preset score range.
According to an embodiment of the disclosure, the mailbox security detection model is trained by a second acquisition subunit, a second generation subunit, a first derivation subunit, a sixth determination subunit, a second derivation subunit, and an iteration subunit.
The second acquisition subunit is used for acquiring a training sample set, wherein the training sample set comprises historical training mails of a plurality of training mailboxes and mailbox tags, the training mail content comprises training copyright content, training change information and training target information, and the mailbox tags represent the security level of the training mailboxes;
the second generation subunit is used for generating a common influence formula according to the training copyright content, the training change information, the training target information and the influence weights aiming at the training mail content of each training mailbox;
the first obtaining subunit is used for converting the common influence formula based on the regression function to obtain the safety probability of the training mailbox;
a sixth determining subunit, configured to determine a prediction class identifier of the training mailbox according to the security probability and the probability threshold;
The second obtaining subunit is used for inputting the prediction grade identification and the mailbox label into the loss function to obtain a loss result;
and the iteration subunit is used for iteratively adjusting a plurality of influence weights and probability thresholds according to the loss result to obtain a trained mailbox security detection model.
According to an embodiment of the disclosure, the verification sub-module comprises a fourth determination unit.
And the fourth determining unit is used for determining that the verification result of the mail passes the verification when the sending equipment belongs to equipment in a preset safety equipment list and the sending address is in a preset safety address range.
According to the embodiment of the disclosure, the verification sub-module further comprises a comparison unit and a fifth determination unit.
The comparison unit is used for comparing the mail content with other mails related to the mail content under the condition that the mail is of a forwarding type to obtain a comparison result;
and a fifth determining unit for confirming the detection result of the mail as passing the verification in the case that the comparison result shows that the mail content is consistent with other related mails.
According to an embodiment of the present disclosure, the security authentication information includes a mail receiving address of a recipient, a mail receiving apparatus, identity information, and identity level information.
According to an embodiment of the present disclosure, the verification module 540 includes a second validation sub-module.
And the second confirmation sub-module is used for determining the security authentication information as verification passing under the condition that the mail receiving address meets the preset receiving address range, the mail receiving equipment belongs to equipment in a preset receiving equipment list, the identity information belongs to a user in the preset identity list and the identity grade information meets the mail importance grade.
According to an embodiment of the present disclosure, any of the first acquisition module 510, the detection module 520, the second acquisition module 530, the verification module 540, and the transmission module 550 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the present disclosure, at least one of the first acquisition module 510, the detection module 520, the second acquisition module 530, the verification module 540, the transmission module 550 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable way of integrating or packaging the circuitry, or in any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, at least one of the first acquisition module 510, the detection module 520, the second acquisition module 530, the authentication module 540, the transmission module 550 may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
Fig. 6 schematically illustrates a block diagram of an electronic device adapted to implement a mail transfer method according to an embodiment of the present disclosure.
As shown in fig. 6, an electronic device 600 according to an embodiment of the present disclosure includes a processor 601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. The processor 601 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. Processor 601 may also include on-board memory for caching purposes. The processor 601 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flows according to embodiments of the disclosure.
In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are stored. The processor 601, the ROM 602, and the RAM 603 are connected to each other through a bus 604. The processor 601 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 602 and/or the RAM 603. Note that the program may be stored in one or more memories other than the ROM 602 and the RAM 603. The processor 601 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the electronic device 600 may also include an input/output (I/O) interface 605, the input/output (I/O) interface 605 also being connected to the bus 604. The electronic device 600 may also include one or more of the following components connected to an input/output (I/O) interface 605: an input portion 606 including a keyboard, mouse, etc.; an output portion 607 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The drive 610 is also connected to an input/output (I/O) interface 605 as needed. Removable media 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on drive 610 so that a computer program read therefrom is installed as needed into storage section 608.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 602 and/or RAM 603 and/or one or more memories other than ROM 602 and RAM 603 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to implement the mail transmission method provided by the embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 601. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of signals over a network medium, and downloaded and installed via the communication section 609, and/or installed from the removable medium 611. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication portion 609, and/or installed from the removable medium 611. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 601. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (14)

1. A method of mail transmission based on a blockchain network, the blockchain network including a plurality of blockchain nodes, the method comprising:
Acquiring a mail sent by a sender through a target block chain node;
performing security detection on the mail by using the blockchain network to obtain a detection result;
under the condition that the detection result shows that the mail detection is passed, responding to a mail checking request from a receiving end, and acquiring security authentication information of the receiving end;
verifying the security authentication information through a target block chain node to obtain a verification result;
and sending the mail to the receiving end under the condition that the verification result shows that the safety authentication information passes verification.
2. The method of claim 1, wherein the performing security detection on the mail by using the blockchain network to obtain a detection result comprises:
performing security verification on the issuing equipment and the issuing address through the target block chain node to obtain a verification result;
under the condition that the verification result shows that the sending equipment and the sending address pass verification, sharing the mailbox security level of the receiving end by utilizing other nodes except the target block chain link point in the block chain network to obtain a sharing result;
and under the condition that the consensus result shows that the mailbox security level of the receiver is agreed, confirming the detection result of the mail as the mail which can be sent.
3. The method of claim 2, further comprising:
when the consensus result shows that the mailbox security level of the receiver does not reach consensus, utilizing the blockchain to send a modification instruction to the sender;
and the sender responds to the modification instruction to modify the mail so as to obtain the modified mail.
4. The method of claim 2, wherein the sharing the mailbox security level at the receiving end with the nodes in the blockchain network other than the target blockchain link point to obtain a shared result comprises:
acquiring a first historical mail from the receiving end through the target block chain link point;
determining the mailbox security level of the receiving end according to the first historical mail;
determining, by the blockchain network, whether the mailbox security levels of the plurality of blockchain nodes are consistent with each other;
and under the condition that the mailbox security levels of nodes exceeding the preset number in the plurality of other nodes are consistent with the mailbox security level determined by the target block link point, determining that the block chain network agrees with the mailbox security level.
5. The method of claim 4, the first historical mail comprising historical sent mail and historical received mail;
the determining the mailbox security level of the receiving end according to the first historical mail comprises the following steps:
in the case where copyrighted contents that do not meet the copyright conditions are included in the mail contents of the first history mail, determining a copyright weight,
determining a first weight corresponding to each change information in the case that the mail content of the historical sent mail comprises at least one change information which does not meet a preset content rule, wherein the change information comprises forwarding mail content different from the original mail content or target transaction information different from the transaction information of the original mail;
determining a second weight corresponding to each target information in the case that the mail content of the historical received mail comprises at least one target information aiming at the historical received mail, wherein the target information comprises non-authentication information, junk mails and non-business information meeting a preset quantity;
generating the weight score according to the copyright weight, the first weights and the second weights;
And determining the mailbox security level of the receiving end according to the weight score and a preset score threshold.
6. The method of claim 4, wherein determining the mailbox security level for the recipient according to the first historical mail comprises:
acquiring a second historical mail of the receiver, wherein mail content of the second historical mail comprises copyright content, change information and target information, the change information comprises forwarding mail information different from original mail content and target transaction information different from transaction information of the original mail, and the target information comprises non-authentication information, junk mail and non-business information meeting the preset quantity;
inputting the mail content of the historical mail into a mailbox security detection model, and outputting security scores;
and determining the mailbox security level of the receiving end according to the security score and a preset score range.
7. The method of claim 6, wherein the mailbox security detection model is trained by:
acquiring a training sample set, wherein the training sample set comprises historical training mails of a plurality of training mailboxes and mailbox labels, the training mail content comprises training copyright content, training change information and training target information, and the mailbox labels represent the security level of the training mailboxes;
Aiming at the training mail content of each training mailbox, generating a common influence formula according to training copyright content, training change information, training target information and a plurality of influence weights;
converting the common influence formula based on a regression function to obtain the safety probability of the training mailbox;
determining a prediction grade identification of the training mailbox according to the security probability and the probability threshold;
inputting the prediction grade identification and the mailbox label into a loss function to obtain a loss result;
and iteratively adjusting a plurality of influence weights and the probability threshold according to the loss result to obtain the trained mailbox security detection model.
8. The method of claim 2, wherein security checking the sender device and the sender address by the target blockchain node results in a check result, comprising:
and under the condition that the sending equipment belongs to equipment in a preset safety equipment list and the sending address is in a preset safety address range, determining that the verification result of the mail is verification passing.
9. The method of claim 8, wherein prior to determining that the detection of the mail is verification pass, further comprising:
Under the condition that the mail is of a forwarding type, comparing the mail content with other mails related to the mail content to obtain a comparison result;
and if the comparison result shows that the mail content is consistent with other related mails, confirming the detection result of the mail as passing verification.
10. The method of claim 1, the security authentication information comprising a mail receiving address, a mail receiving device, identity information, and identity level information of the recipient;
the security authentication information is verified through the target blockchain node to obtain a verification result, which comprises the following steps:
and under the condition that the mail receiving address meets the preset receiving address range, the mail receiving equipment belongs to equipment in a preset receiving equipment list, the identity information belongs to a user in a preset identity list and the identity grade information meets the mail importance grade, determining the security authentication information as passing verification.
11. A blockchain network-based mail transmission device, the blockchain network including a plurality of blockchain nodes, the device comprising:
the first acquisition module is used for acquiring the mail sent by the sender through the target blockchain node;
The detection module is used for carrying out safety detection on the mails by utilizing the blockchain network to obtain detection results;
the second acquisition module is used for responding to a mail check request from a receiving end to acquire the safety authentication information of the receiving end under the condition that the detection result shows that the mail is detected to pass;
the verification module is used for verifying the security authentication information through the target blockchain node to obtain a verification result;
and the sending module is used for sending the mail to the receiving end under the condition that the verification result shows that the safety authentication information passes verification.
12. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-10.
13. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1 to 10.
14. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 10.
CN202311331183.0A 2023-10-13 2023-10-13 Mail transmission method, device, equipment and storage medium based on blockchain network Pending CN117254971A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311331183.0A CN117254971A (en) 2023-10-13 2023-10-13 Mail transmission method, device, equipment and storage medium based on blockchain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311331183.0A CN117254971A (en) 2023-10-13 2023-10-13 Mail transmission method, device, equipment and storage medium based on blockchain network

Publications (1)

Publication Number Publication Date
CN117254971A true CN117254971A (en) 2023-12-19

Family

ID=89129279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311331183.0A Pending CN117254971A (en) 2023-10-13 2023-10-13 Mail transmission method, device, equipment and storage medium based on blockchain network

Country Status (1)

Country Link
CN (1) CN117254971A (en)

Similar Documents

Publication Publication Date Title
US11044267B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US10027701B1 (en) Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system
US11722513B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US10715543B2 (en) Detecting computer security risk based on previously observed communications
US10063584B1 (en) Advanced processing of electronic messages with attachments in a cybersecurity system
US10243989B1 (en) Systems and methods for inspecting emails for malicious content
US10769706B2 (en) Providing access to a networked application without authentication
US20190319905A1 (en) Mail protection system
US10303889B2 (en) System and method to reduce inappropriate email and online behavior
KR102464629B1 (en) Device and its operation methods for providing E-mail security service using hierarchical architecture based on security level
US20210058358A1 (en) Email Sender and Reply-To Authentication to Prevent Interception of Email Replies
US20210126944A1 (en) Analysis of potentially malicious emails
US10044735B2 (en) System and method for authentication of electronic communications
US11416858B2 (en) Providing access to a networked application without authentication
US20230086249A1 (en) Email Verification Using Injected Tokens for Message Authentication
KR102648653B1 (en) Mail security-based zero-day URL attack defense service providing device and method of operation
US8655959B2 (en) System, method, and computer program product for providing a rating of an electronic message
US9887950B2 (en) Validating E-mails using message posting services
US20220394047A1 (en) Multi-tiered approach to payload detection for incoming communications
KR102546068B1 (en) Device and its operation methods for providing E-mail security service using hierarchical architecture based on security level
CN117254971A (en) Mail transmission method, device, equipment and storage medium based on blockchain network
RU2787303C1 (en) System and method for restricting reception of electronic messages from a mass spam mail sender
US20230198926A1 (en) System and method for restricting the reception of e-mails from a sender of bulk spam mail
EP4199471A1 (en) System and method for restricting the reception of e-mails from a sender of bulk spam mail
KR20240019673A (en) A email security system for preventing targeted email attacks processing a detection of social engineering attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination