WO2014205669A1 - 网络设备及电子邮件请求处理方法 - Google Patents
网络设备及电子邮件请求处理方法 Download PDFInfo
- Publication number
- WO2014205669A1 WO2014205669A1 PCT/CN2013/077995 CN2013077995W WO2014205669A1 WO 2014205669 A1 WO2014205669 A1 WO 2014205669A1 CN 2013077995 W CN2013077995 W CN 2013077995W WO 2014205669 A1 WO2014205669 A1 WO 2014205669A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- email message
- request
- partial
- client device
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/06—Message adaptation to terminal or network requirements
- H04L51/066—Format adaptation, e.g. format conversion or compression
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a network device and an email request processing method.
- E-mail is a communication method that provides information exchange by electronic means. Through the network's email system, users can connect with network users in any corner of the world in a very fast way. Email messages can be in various forms such as text, images, sounds, and more.
- the fourth version of the Interactive Message Access Protocol (IMAP4) is a protocol that specifies how a personal computer can remotely access a mail server on the Internet for sending and receiving mail. IMAP4 allows clients to access and read email messages on the server online or offline. Users can directly manipulate email messages on the server through the client device. Here's how to read email messages online or view email subject, size or shipping address online.
- IMAP4 allows users to browse the header to decide whether to retrieve or delete a specific part of the message, and to create or change a folder or mailbox on the mail server.
- P0P3 Post Office Protocol 3, the third version of the post office protocol
- IMAP4 also supports online operations and disconnected operations.
- IMAP4 provides users with the ability to selectively receive mail messages from a mail server, server-based information processing, and shared mailbox functionality.
- IMAP4 has been widely used as an important mail protocol.
- security gateway devices support IMAP4.
- Security gateway devices typically implement a proxy for the mail server based on IMAP4.
- the security gateway receives the mail operation request sent by the client, and requests an email message obtained from the mail server to be forwarded to the client according to the mail operation request.
- the security gateway can implement security operations such as anti-virus or mail filtering of email messages in this proxy process. To protect the security of the client.
- the network device and the email request processing method provided in the embodiment of the present invention may obtain the partial email on the network device if the client device only obtains other partial email messages that do not include the mail header.
- the content of the decoded form of the message may be obtained.
- an embodiment of the present invention provides a network device, including:
- a communication interface for communicating with a client device and a mail server
- a processor configured to receive a first request sent by the client device, where the first request is used to obtain a partial email message, where the partial email message does not include a mail header of the email message; A request is converted to a request for obtaining an entire email message;
- the email message being an email message in an encoded form
- an embodiment of the present invention provides an email request processing method, including: receiving a first request sent by a client device, where the first request is used to obtain a partial email message, where the part is The email message does not include the header of the email message;
- an embodiment of the present invention provides a non-transitory machine-readable medium shield for storing computer instructions that can execute the above method.
- the network device provided by the embodiment of the present invention can be converted from the mail server by using a request for the client device to obtain other partial email messages except the mail header to be converted into a request for obtaining the entire email message. Obtain the transmission code information of some email messages to be obtained by the client device in the entire email message. Further, the network device decodes the email message by using the transmission encoding information of the email message, so that the network device can also be used in an application scenario in which the client device only obtains some email messages that do not include the email header. The content of the partial email message in decoded form is obtained.
- the network device provided by the embodiment of the invention enhances the protection of the client device.
- FIG. 1 is an application scenario diagram of an email request processing method according to an embodiment of the present invention.
- FIG. 2 is a schematic structural diagram of an email message according to an embodiment of the present invention.
- FIG. 3 is a schematic diagram of a physical structure of a security gateway according to an embodiment of the present invention.
- FIG. 5 is a flowchart of still another method for processing an email request according to an embodiment of the present invention.
- FIG. 6 is a schematic signaling diagram of still another method for processing an email request according to an embodiment of the present invention. detailed description
- FIG. 1 is an application scenario diagram of an email request processing method according to an embodiment of the present invention.
- a client device 100, a switch 105, a security gateway 110, a router 115, and a mail server 120 are included.
- the client device 100, the security gateway 110, and the mail server 120 are all capable of supporting the fourth version of the interactive message access protocol (Int erne t Mes s Age Acces s Pro t oco l 4, IMAP4).
- the security gateway 110 can be deployed at the egress of the intranet, the Internet egress, or the front end of the mail server 120.
- the secure gateway 110 can establish the connection of the client device 100 to the mail server 120 in the form of a transparent proxy or a non-transparent proxy.
- the security gateway 110 can perform security processing such as virus detection, mail filtering, and the like on the email message sent by the mail server 120 to the client device 100 to protect the security of the client device 100 of the intranet.
- the transparent proxy means that the client device 100 does not know the existence of the proxy device (for example, the security gateway 110 in FIG. 1), and the client device 100 and the mail server 120 can communicate through the transparent channel established by the security gateway 110.
- the non-transparent agent means that the client device 100 knows the existence of the security gateway 110, and the client device 100 has to go through the security gateway 110 to access the mail server 120.
- the security gateway 110 is deployed at an outlet of the intranet, and establishes a connection between the client device 100 and the mail server 120 in a transparent proxy manner.
- the client device 100 accesses the mail server 120 on the Internet based on IMAP4.
- the access request of the client device 100 arrives at the security gateway 110 via the switch 105.
- the security gateway 110 can determine whether the email message required by the client device 100 is cached in the security gateway 110 according to the access request of the client device 100. If the email message required by the client device 100 is cached, the secure gateway 110 can send the email message directly to the client device 100.
- the security gateway 110 may send the access request of the client device 100 to the mail server 120 via the router 115, and perform an email detection, email, and email message returned by the mail server 120. After the security processing such as filtering, it is forwarded to the client device 100.
- a plurality of client devices 100 may be included.
- Client device 100 It can be a device such as a mobile phone or a computer that can access the network.
- the security gateway 110 in the embodiment of the present invention is only an example of a network device.
- the embodiments of the present invention can also be applied to other network devices capable of implementing the mail proxy function based on IMAP4, such as a firewall.
- the network device may be deployed in the network as a separate device, or may be located in other devices such as a firewall and a security gateway, and is not limited herein.
- MIME Multipurpose Internet Mail Extensions
- the MIME protocol is an extended e-mail standard that supports e-mail messages in multiple formats, such as non-ASCII characters, binary format attachments, and more.
- an email message is divided into three parts: a mail header, a mail body, and an attachment.
- the header includes information such as the date the message was sent, the sender's address, the recipient's address, and the subject of the message.
- the MIME protocol is implemented by standardizing additional fields of the header of the email message.
- the additional fields of these headers describe the content and organization of the new message type.
- the MIME formatted email message is divided into a MIME header and a MIME body.
- the MIME header is implemented by adding a field to the header of the header of the email message. In this way, the content of the header is included in the MIME header.
- the field information recorded in the additional field in the MIME header will be applied to the entire mail message.
- the following fields can be included in the MIME header:
- MIME-Version MIME version used to indicate the version of the MIME protocol that the ⁇ ⁇ Compliance, such as Mime-Vers ion: 1.0;
- a Content-Type content type for specifying the type of the text.
- Content-Type can include text, image, audio, video, appl icat ions, multipart ⁇ message, etc., for example, Content-Type: mult ipar t/mixed.
- Content-Type in the character set may further comprise (char set) like text character character set coding mode 0 (char set) may include ASCI I, GB2312, Times New Roman and Arial other character types;
- Content-Transfer-Encoding Content transmission encoding, which is used to specify the encoding method to be performed on the data, including transmission encoding types such as 7bit, 8bit, base64, binary, quoted-printable, and custom, for example: Content-Transfer-Encoding: Base64;
- Content-Disposition content attribute used to prompt the customer to decide whether to display in the line Attached as a separate attachment, for example: Content-Di spos it ion: at tachment ;
- MIME segments may be included in the MIME body.
- Each MIME segment is implemented by adding a header additional field to the body of the email or attachment. In this way, the body of the email or attachment is included in each MIME segment.
- each MIME segment is divided into a MIME segment header and a MIME segment body.
- the MIME section header may include any field other than MIME-Vers ion in the MIME header.
- the field information recorded in the MIME section header can only be applied to this MIME section. For example, if Content-Transfer-Encoding appears in the MIME header, it will be applied to the entire body of information.
- the client device can use the Content-Transfer-Encoding information to decode the received e-mail message.
- the MIME section contains the body of the email or attachment encoded by Content-Transfer-Encoding in the header of the MIME section.
- the MIME section body is the email body or attachment encoded by the Content-Trans- er-Encoding information contained in the MIME header. .
- FIG. 1 is a schematic structural diagram of an email message according to an embodiment of the present invention.
- the email message 200 includes a mail header 202, a mail body 204, and a mail attachment 206.
- the mail attachment 206 includes two attachments: Annex 1 and Annex 2.
- the email message 200 can be divided into two parts, a MIME header 208 and a MIME body 210.
- the MIME information header 208 includes the information in the mail header 202, and specifically includes: information such as an email message sending date, a sender address, a recipient address, and an email subject.
- the MIME body 210 in turn contains three MIME segments: MIME segment 1, MIME segment 2, and MIME segment 3.
- the MIME segment 1 contains the contents of the message body 204.
- MIME segment 1 contains the contents of Annex 1.
- MIME segment 3 contains the contents of Annex 2.
- Each MIME segment is further divided into a MIME segment header and a MIME segment body.
- M spirit segment 1 is divided into MIME segment 1 header and MIME segment 1 body
- M spirit segment 2 is divided into MIME segment 2 header and MIME segment 2 body
- MIME segment 3 is divided into MIME segment 3 header and MIME segment 3 body.
- Field information such as Content-Type, Content-Transfer-Encoding, etc. may be included in the MIME segment 1 header.
- a character set (char set) of the message body 204 may also be included in the Content-Type field.
- the MIME segment 1 body includes the content of the message body 204 encoded by the encoding method specified by the Content-Transfer-Encoding field in the MIME segment 1 header.
- Field information such as Content-Type, Content-Trans- er-Encoding 3 ⁇ 4 Content-Di spos it ion may be included in the MIME segment 2 header.
- the file name of the attachment can also be indicated in the Con t en t -D is po siti on field.
- the content of the attachment 1 encoded by the encoding method specified by the Content-Transfer-Encod ing field in the header of the MIME segment 2 is included.
- the structure of MIME segment 3 is similar to the structure of MIME segment 1, and is not mentioned here.
- IMAP4 allows a client device to obtain some or all of an email message. Therefore, when the client device only wants to obtain the message body or attachment, the mail server will only return the MIME segment 1 body, the MIME segment 2 body or the MIME segment 3 body as in the above FIG. 2, and will not return the MIME segment 1 Header, MIME segment 1 header or MIME segment 3 header information. Therefore, network devices such as firewalls and gateways cannot know the encoding information of the message body or attachments. Thus the network device is unable to perform a decoding operation to learn the message body or attachment in the form of a decoding. In addition, the network device cannot perform security processing such as anti-virus or mail filtering on the content of the decrypted mail message.
- FIG. 3 is a schematic diagram of a physical structure of the security gateway 110 of FIG. 1 according to an embodiment of the present invention.
- the security gateway 110 includes: a communication interface 310, a memory 320, a processor sor 330, and a communication bus 340.
- Communication interface 310, memory 320, and processor 330 communicate with each other via communication bus 340.
- the communication interface 310 is configured to communicate with other devices.
- other devices may include devices such as client devices, switches, routers, or mail servers.
- the memory 320 is configured to store the program 322, cache the email obtaining request 326 sent by the client device 100, and cache the email message 324 sent by the mail server 120.
- Memory 320 may include high speed RAM memory and may also include non-volatile memory, such as at least one disk memory. It can be understood that the memory 320 can be a non-t rans i tory machine readable medium that can store program code, such as ROM, RAM, disk, hard disk, optical disk or non-volatile memory. .
- the memory 320 can also cache other email operation requests such as email message read requests.
- Program 322 can include program code, the program code including computer operating instructions.
- the processor 330 may be a central processing unit CPU, or a specific integrated circuit ASIC, or one or more integrated circuits configured to implement embodiments of the present invention.
- the processor 330 is configured to execute the program 322, and specifically, the related steps in the method embodiments shown in FIG. 4 to FIG. 5 are performed.
- FIG. 4 is a flowchart of an email request processing method according to an embodiment of the present invention. This method can be performed by the security gateway 110 of Figures 1 and 3.
- the security gateway 110 is configured to process a mail acquisition request sent by the client device, and the mail acquisition request is used to obtain the mail from the mail server.
- the method in Fig. 4 will be described below with reference to Figs. 1 and 6.
- the method can include:
- the security gateway 110 receives the first request sent by the client device 100.
- the first request is for obtaining a partial email message.
- the partial email message does not include the header of the email message.
- FIG. 6 is a schematic signaling diagram of still another method for processing an email request according to an embodiment of the present invention.
- client device 100 sends a first request 600 to secure gateway 110 for obtaining a partial email message.
- the first request 600 sent by the client device 100 carries the email identifier of the email message and the identifier of the partial email message to be obtained.
- the first request 600 can be constructed in accordance with IMAP4. Specifically, the first request 600 can be constructed based on the FETCH command of IMAP4.
- the first request may be: fhn6 UID FETCH 77 (BODY. PEEK [2] ), the first request is used to obtain the first attachment of the email message with the message identifier 77.
- fhn6 is the label of the request, which is used to identify the request
- UID is the mail identifier of the email message, which can uniquely identify the email message.
- the UID can be a specific value or a list or range.
- the value of the UID is a list or range, it is used to represent multiple email messages; "FETCH” is the command specified by IMAP4 for obtaining an email message; “77” is the value of the UID for the message; “2" is The identifier of the partial email message to be obtained, representing the first attachment of the email message; "(BODY. PEEK [2] )" indicates the first attachment to request an email message Pieces. It can be understood that the identifier of a part of the email message to be obtained can also be a specific value, a list or a range. When the identifier of the obtained partial email message is a list or range, it is used to indicate that multiple parts of the email message are obtained. For example, "(BODY. PEEK [2-4] )," is used to indicate the first 1-3 attachments requesting to get the email message.
- the security gateway 110 may intercept the acquisition request of the email message sent by the client device 100 to the mail server 120.
- the security gateway 110 may intercept the acquisition request of the email message sent by the client device 100 to the mail server 120.
- the security gateway 110 is acting as a non-transparent proxy, the client device 100 can directly send an acquisition request for the email message to the secure gateway 110.
- the proxy mode of the security gateway 110 is not limited in the embodiment of the present invention.
- the security gateway 110 converts the first request 600 into a request 605 for obtaining an entire email message.
- the security gateway 110 may construct a request 605 for obtaining an entire email message according to the first request 600 according to a command format specified by the IMAP4 protocol.
- a request to obtain an entire email message can be constructed according to the first request 600: fhn6 UID FETCH 77 (BODY. PEEK [2] ) 605: fhn6 UID FETCH 77 (BODY. PEEK [] ).
- the request 605 for obtaining an entire email message may be referred to herein as a first conversion request 605.
- the security gateway 110 may cache the first request 600 sent by the client device 100, and construct an email for obtaining an entire email according to the identifier of the email message in the first request 600. Request 605 for the message.
- step 410 the security gateway 110 sends a first conversion request to the mail server 120.
- the security gateway 110 may send a first conversion request 605 to the mail server 120: fhn6 UID FETCH 77 (BODY. PEEK []) for requesting the mail server 120 to return an entire email message in accordance with the first conversion request 605.
- the security gateway 110 receives an email message 610 returned by the mail server 120, the email message 610 being an email message in encoded form.
- the mail server 120 After receiving the first conversion request, the mail server 120 returns an email message 610 pointed to by the UID according to the first conversion request.
- the email message 610 returned by the mail server 120 is an email message conforming to the format specified by the MIME protocol.
- the MIME-formatted email message contains the encoded message content.
- the encoded content of the mail content refers to the encoding generated by encoding the content of the mail by the content transmission encoded information. The content of the mail after the code.
- the specific structure of the email message 610 returned by the mail server 120 can be seen in FIG. 2 and related description.
- the MIME header of the email message 610 returned by the mail server 120 may include the content of the header and the MIME header field such as the MIME version and the content type.
- the MIME header of the email message returned by the p-packet server 120 based on the first translation request 605 with a UID of 77 is:
- Content-Type mul t ipart/mixed
- the MIME segment 1 of the email message with the UID 77 returned by the mail server 120 contains the body of the email message in encoded form.
- the MIME segment 1 header contains the encoding information of the body of the email message, and the MIME segment 1 body contains the content of the body of the encoded email message.
- the MIME segment 1 of an email message with a UID of 77 is:
- Content-Type text/pla in
- Char set "gb2312" indicates that the content type of MIME segment 1 is text/pla in, and the character set of the text in MIME segment 1 is " gb2312 " ;
- base64 indicates that the transport encoding type of the MIME segment 1 is base64;
- the first attachment of the email message in encoded form is included in the MIME segment 2 of the email message with the UID 77 returned by the mail server 120.
- the MIME segment 2 header contains the encoding information of the first attachment of the email message, and the MIME segment 2 body contains the content of the first attachment after being encoded.
- the second attachment of the email message in encoded form is included in MIME segment 3. Its
- the MIME segment 3 header contains the encoding information of the second attachment of the email message, and the MIME segment 3 body contains the content of the second attachment after being encoded.
- the MIME segment 2 of the email message with a UID of 77 is:
- Name " f i lel. txt " indicates that the content type of MIME segment 2 is arbitrary binary data, the name is "f i lel. txt "
- base64 indicates that the transport encoding type of MIME segment 2 is base64
- f i lename f i lel. txt " indicates that the content of MIME segment 2 is an attachment, and the attachment name is "f i lel. txt "
- the security gateway 110 analyzes the email message 610 to obtain the encoded information of the email message 610.
- the coded information includes Content-Transfer-Encoding information.
- the security gateway 110 can obtain the content of the email message 610 by analyzing the MIME header or MIME segment header of the email message 610. -Transfer-Encoding information. The corresponding portion of the email message 610 can be decoded using the Content-Transfer-Encoding information of the email message 610.
- the security gateway 110 may obtain Content-Transfer-Encoding: base64 from the MIME segment 1 header of the above-mentioned UID 77 email message, so that the transmission encoding information of the first attachment of the email message can be obtained as ba s e64 .
- the Content-Transfer-Encoding information can be used to decode the entire email message. If the Content-Transfer-Encoding information is included in a MIME section header, the Content-Transfer-Encoding information can only be applied to the MIME section to decode the MIME section of the MIME section.
- the security gateway 110 may also obtain the electrical information by analyzing the email message 610.
- the character set information (char set) in the sub-mail message 610 may obtain the content type Content-Type information of each MIME segment of the email message 610 from the email message 610 returned by the mail server 120. Therefore, the security gateway 110 can determine the packet type of the MIME segment according to the obtained Content-Type information.
- the message type can be, for example, text, image, or audio.
- the Content-Type message may also contain characters (char set) 0
- char set "gb2312"
- the character set of the text in MIME segment 1 is "gb2312”.
- the MIME header and MIME segment 2 do not contain char set information, so the character set type in MIME segment 2 is the default character set type: ASCI I.
- the security gateway 110 decodes the email message 610 with the encoded information to obtain the partial email message in decoded form. Specifically, the encoding information is obtained to know which encoding method is used, and then decoding is performed in a decoding manner corresponding to the encoding method to obtain the mail content in the decoded form of the partial email message.
- the security gateway 110 can decode the entire email message 610, and can only decode part of the email message required by the client device 100, which is not limited herein.
- the security gateway 110 may decode the entire email message 610 according to the Content-Transfer-Encoding information in the MIME header, or may use the Content-Transfer-Encoding information in the MIME header to the MIME in the MIME segment. The content of the segment body is decoded. If the Content-Transfer-Encoding information is not included in a MIME section header, the security gateway 110 can decode the content of the MIME section body part according to the Content-Transfer-Encoding information in the MIME header.
- step 430 the security gateway 110 determines whether the partial email message is secure by performing security processing on the partial email message in decoded form. In an actual application, after the security gateway 110 decodes the email message, the security gateway 110 may further perform security processing on the partial email message in the decoded form according to the set security policy. If it is handled safely Having acknowledged that the email message 610 is a secure email message, the method can proceed to step 435, otherwise proceeding to step 440.
- the security policy set therein may include a virus killing policy, a filtering policy, and the like.
- the decoded email message may be subjected to security operations such as killing viruses according to a preset virus killing policy, or according to character set information (char set) in the email message and a preset filtering policy.
- Email messages for content filtering Prevents client device 100 from receiving email messages, spam, or email messages with sensitive fields to protect the client.
- the filtering policy may be pre-generated according to the string to be filtered and the preset character set char set.
- the content of the email message decoded by the partial email message needs to be converted according to the char set information in the filtering policy, and then filtered.
- the string to be filtered in the policy is matched. To determine whether the partial email message contains a string that needs to be filtered.
- the security gateway 110 may obtain the decoded form according to the set filtering policy.
- the filtering policy set in the security gateway 110 may be: filtering the email message with the "advertisement," string, and setting the character set char set information of the filter string to "gb2312".
- security The gateway 110 may compile and generate a state machine according to the string to be filtered and the char set information configured in the filtering policy. Since the char set information of the first attachment of the email message with the UID of 77 is ASCI I, the generated state machine is in the state machine. The char set information is "gb2312", the char set information of the first attachment is inconsistent with the cha rset information in the state machine.
- the content of the first attachment is converted to the content of the format "gb2312".
- the converted content is then matched by the state machine to determine whether the second attachment contains the string "advertisement" to be filtered. If the first one If the attached string "advertising" is not included in the attachment, the email message 610 is considered safe. Otherwise, the electricity is considered Mail message 610 is an unsecured email message.
- the security processing such as anti-virus or email filtering of the email content of the partial email message is only listed in the embodiment of the present invention. Several ways of processing. In the actual application, the content of the mail can be further processed, which is not limited herein.
- the security gateway 110 forwards the partial email message 615 to the client device 100.
- the secure gateway 110 determines that the partial email message 615 is secure
- the partial email message 615 can be forwarded to the client device 100.
- the security gateway 110 performs security processing on the email message 610, it confirms that the email message 610 is a secure email message, or the security gateway 110 performs a process such as virus checking and killing the email message 610, and then confirms the processing.
- the subsequent email message 610 is a secure email message, and the security gateway 110 can forward the partial email to the client device 100 only after the identifier of the partial email message carried in the first request 600. Message 615. End the method flow.
- the security gateway 110 may return the first attachment in the email message with the UID 77 to the client device according to the first request: the attachment identifier "2" in the fhn7 UID FETCH 77 (BODY. PEEK [2] ) request 100.
- the security gateway 110 refuses to forward the partial email message to the client device. If the security gateway 110 securely processes the email message 610 and confirms that the email message 610 is an unsecured email, then the partial email message 615 may be denied forwarding to the client device 100.
- the secure gateway 110 may send an email message acquisition failure message to the client device 100, or may discard the email message 610 or modify the email message 610 to the client device 100.
- the security gateway 110 may mask or modify certain statements in the email message 610 to the client device 100 to secure the client device 100.
- the security gateway 110 converts a request 600 for obtaining a partial email message other than a mail header by the client device 100 into a request 605 for obtaining a whole email message. .
- the security gateway 110 can obtain the content transmission encoded information of the partial email message 615 to be acquired by the client device 100 from the entire email message 610 returned by the mail server 120.
- the security gateway 110 can utilize the content transmission of the part of the email message
- the encoded information decodes the portion of the email message 615.
- the security gateway 110 can also obtain the content of the partial email message in the decoded form in the application scenario in which the client device 100 only acquires other partial email messages that do not include the mail header. Enhanced protection of client device 100.
- the secure gateway 110 may also cache the email message obtained from the mail server 120.
- the security gateway 110 can also process the mail obtaining request sent by the client device 100 in the method shown in FIG. 5, and the mail obtaining request is used to obtain a partial email message from the mail server 120.
- FIG. 5 is a flowchart of another email request processing method according to an embodiment of the present invention. The method can also be performed by the security gateway 110 of Figures 1, 3 and 6. The method in Fig. 5 will be described below with reference to Figs. As shown in FIG. 5, the method may include:
- step 500 the security gateway 110 receives a second request sent by the client device 100, the second request is used to obtain a partial email message, wherein the partial email message does not include the header of the email message .
- the second request is also constructed based on the IMAP4 FETCH command.
- the second request can be: fhn7 UID FETCH 77 (BODY. PEEK [3] ) , which is used to request the mail server to return the second attachment of the email message with the message ID 77.
- the "77" is the email identifier of the email message
- the "3" is the identifier of the partial email message to be obtained.
- first and second of the first request, the second request, the first conversion request, and the second conversion request in the embodiment of the present invention are only for clear description, and the request sent to the client is clear. The distinction made is not any limitation on the time, order, etc. of the request sent by the client.
- the security gateway 110 determines whether the email message is cached in the security gateway 110. Since in the network system described in FIG. 1, the security gateway 110 typically processes the mail operation request sent by the client device 100 in a proxy manner.
- the security gateway 110 has a caching function. For example, the security gateway 110 can continuously cache the email messages obtained from the mail server 120 in the local Cache.
- the security gateway 110 determines, according to the second request, whether the client device 100 has been stored on the security gateway 110. Need to get an email message. If the email message that the client device 100 needs to acquire is not stored on the security gateway 110, the security gateway 110 may perform step 510.
- the security gateway 110 may directly perform step 550 to directly send the stored partial email message to the client device 100. This can significantly improve the speed and efficiency of the acquisition of the email message of the client device 100.
- the security gateway 110 may determine whether the email message is cached according to the email identifier carried in the second request.
- the security gateway 110 converts the second request into a request to obtain a full email message.
- the security gateway 110 may construct a request 605 for obtaining the entire email message in the message identifier carried in the second request and the command format specified by the IMAP4.
- a request to fetch an entire email message can be constructed according to the second request: fhn7 UID FETCH 77 (BODY. PEEK [3] ): fhn7 UID FETCH 77 (BODY. PEEK [] ), which can be used here for
- the request for the entire email message is called the second conversion request.
- the network device 110 may first cache the second request sent by the client device 100 in the memory 320, and then construct a message according to the message identifier in the second request. Request 605 to get the entire email message.
- the security gateway 110 sends a second conversion request to the mail server.
- the security gateway 110 may send a second conversion request fhn7 UID FETCH 77 (BODY. PEEK [] ) to the mail server 120 for requesting the mail server 120 to return an entire email message with a UID of 77 according to the second conversion request. .
- the security gateway 110 receives the email message 610 in encoded form returned by the mail server 120.
- the email message 610 returned by the mail server 120 has a format specified by the MIME. For details, refer to the related description of the embodiment shown in FIG. 2 and FIG.
- step 525 the security gateway 110 parses the email message 610 to obtain encoded information for the email message.
- step 530 the security gateway 110 associates the encoded information with the email message.
- step 535 the security gateway 110 passes the partial email cancellation of the decoded form.
- the security process is performed to determine whether the partial email message is secure. If the security gateway 110 determines through the security process that the email message is a secure email message, then proceeds to step 545, otherwise proceeds to step 540.
- step 540 the security gateway 110 refuses to forward the partial email message to the client device.
- the security gateway 110 stores the email message in a cache of the network device. Specifically, when it is determined in step 505 that the email message 610 is not cached in the network device according to the mail identifier carried in the second request, it is indicated that the security gateway 110 has not obtained the electronic device from the mail server 120. Mail message 610.
- the secure gateway 110 may store the email message 610 in the cache of the secure gateway 110 when it securely processes the decoded email message 610 and confirms that the email message 610 is secure.
- the security gateway 110 receives the request to obtain the email message 610 again, the secure gateway 110 can directly forward the email message 610 in the cache or any portion of the email message 610 directly to the client device 100. To increase the speed and efficiency with which client device 100 obtains email messages.
- the security gateway 110 forwards the partial email message 615 to the client device.
- the security gateway 110 may forward the part to the client device 100 by using the identifier of the partial email message carried in the second request.
- Email message 615 may return the second attachment in the email message with the UID of 77 to the client according to the second request: fhn7 UID FETCH 77 (BODY. PEEK [3]) attachment identifier "3" in the request Device 100.
- the security gateway 110 may directly perform step 550 according to the second The identification of the portion of the email message 615 carried in the request forwards the portion of the email message 615 cached in the security gateway 110 to the client device 100. To increase the speed and efficiency with which client device 100 obtains email messages.
- the step of caching the email message 610 may be executed after obtaining the email message 610 from the mail server 120, or after the security processing of the email message 610 is completed, and may also be performed before forwarding the partial email message 615 to the client device 100.
- the method may be performed at the same time as the partial email message 615 is forwarded to the client device 100, which is not limited herein. It can be understood that if the email message 610 is cached after the email message 610 is obtained and before the security processing of the email message 610 is completed, the email message 610 is found to be securely processed. When not secure, the email message 610 can be deleted from the cache.
- the security gateway 110 can determine whether the client device 100 is stored in the cache after receiving the request for acquiring the partial email message sent by the client device 100. The email message you need to get. If the email message that the client device 100 needs to acquire is already stored on the security gateway 110, the partial email message stored by the client device 100 can be directly sent to the client device 100, so that the client device 100 can be significantly improved. The speed and efficiency of getting email messages. If the email message that the client device 100 needs to obtain is not stored on the security gateway 110, the request of the client device 100 is converted into a request to obtain an entire email message.
- the security gateway 110 may obtain the content transmission coded information of the partial email message to be acquired by the client device 100 from the entire email message returned by the mail server 120 according to the converted request. Further, the security gateway 110 may decode the partial email message by using the content transmission coded information of the partial email message to enable the security gateway.
- the security gateway 110 can also identify and obtain the content of a portion of the email message obtained by client device 100.
- the security gateway 110 may perform a security processing operation such as mail filtering or virus killing on the content of the partially decoded email message, and then forward the security to the client device 100 to ensure the security of the client device 100.
- the security gateway 110 can also cache the email message obtained from the mail server 120. The cached email message can be returned to the client device 100 after subsequent receipt of the mail operation request from the client device 100. To improve the acquisition speed and efficiency of the email message of the client device 100.
- the embodiments provided in the present application are merely illustrative, and the present invention is implemented.
- the security gateway described in the example is only an example of a network device, and the embodiment of the present invention can also be applied to other network devices, such as a firewall, etc., as long as it is a network device capable of implementing a mail proxy function based on IMAP4. There is no limit here.
- the network device in the embodiment of the present invention may be deployed in the network as a separate device, or may be located in other devices such as a firewall and a gateway, and is not limited herein.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2013/077995 WO2014205669A1 (zh) | 2013-06-26 | 2013-06-26 | 网络设备及电子邮件请求处理方法 |
JP2016518819A JP6156765B2 (ja) | 2013-06-26 | 2013-06-26 | 電子メール要求を処理するためのネットワークデバイスおよび方法 |
ES13887614T ES2747380T3 (es) | 2013-06-26 | 2013-06-26 | Dispositivo de red y método de procesamiento de solicitud de correo electrónico |
EP13887614.9A EP2985957B1 (en) | 2013-06-26 | 2013-06-26 | Network device and e-mail request processing method |
CN201380000623.2A CN103609078B (zh) | 2013-06-26 | 2013-06-26 | 网络设备及电子邮件请求处理方法 |
KR1020157034364A KR101729637B1 (ko) | 2013-06-26 | 2013-06-26 | 네트워크 장치 및 이메일 요구 처리 방법 |
US14/978,975 US20160112356A1 (en) | 2013-06-26 | 2015-12-22 | Network Device and Method for Processing Email Request |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2013/077995 WO2014205669A1 (zh) | 2013-06-26 | 2013-06-26 | 网络设备及电子邮件请求处理方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/978,975 Continuation US20160112356A1 (en) | 2013-06-26 | 2015-12-22 | Network Device and Method for Processing Email Request |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014205669A1 true WO2014205669A1 (zh) | 2014-12-31 |
Family
ID=50126080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/077995 WO2014205669A1 (zh) | 2013-06-26 | 2013-06-26 | 网络设备及电子邮件请求处理方法 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20160112356A1 (zh) |
EP (1) | EP2985957B1 (zh) |
JP (1) | JP6156765B2 (zh) |
KR (1) | KR101729637B1 (zh) |
CN (1) | CN103609078B (zh) |
ES (1) | ES2747380T3 (zh) |
WO (1) | WO2014205669A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635250A (zh) * | 2018-12-14 | 2019-04-16 | 万兴科技股份有限公司 | 文档格式转换方法、装置、计算机设备及存储介质 |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103888348B (zh) * | 2014-03-28 | 2017-10-27 | 新浪网技术(中国)有限公司 | 电子邮件应用系统和电子邮件传送方法、装置 |
US10666659B2 (en) * | 2015-08-24 | 2020-05-26 | Bravatek Solutions, Inc. | System and method for protecting against E-mail-based cyberattacks |
US10313316B2 (en) * | 2016-05-26 | 2019-06-04 | Pepsico, Inc. | Secure gateways for connected dispensing machines |
JP6836773B2 (ja) * | 2016-11-15 | 2021-03-03 | 株式会社エヴリカ | 情報処理装置、方法およびプログラム |
US10839353B2 (en) | 2018-05-24 | 2020-11-17 | Mxtoolbox, Inc. | Systems and methods for improved email security by linking customer domains to outbound sources |
CN114500444B (zh) * | 2022-03-18 | 2024-02-23 | 网易(杭州)网络有限公司 | 邮件数据处理方法、装置及电子设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859332A (zh) * | 2006-03-23 | 2006-11-08 | 华为技术有限公司 | 一种采用数据同步处理电子邮件的系统、装置及方法 |
CN1921485A (zh) * | 2005-08-25 | 2007-02-28 | 国际商业机器公司 | 在客户端-服务器环境中管理电子邮件的方法和系统 |
CN101106537A (zh) * | 2006-07-14 | 2008-01-16 | 华为技术有限公司 | 一种选择性下载电子邮件的方法 |
CN102158819A (zh) * | 2011-01-25 | 2011-08-17 | 华为终端有限公司 | 用于移动设备显示电子邮件处理方法、服务器及移动设备 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5923846A (en) * | 1995-11-06 | 1999-07-13 | Microsoft Corporation | Method of uploading a message containing a file reference to a server and downloading a file from the server using the file reference |
CA2327409A1 (en) * | 1998-04-08 | 1999-10-14 | Opentv, Inc. | System and method for one-touch e-mail reply |
US6735770B1 (en) * | 1998-04-27 | 2004-05-11 | Sun Microsystems, Inc. | Method and apparatus for high performance access to data in a message store |
US6654787B1 (en) * | 1998-12-31 | 2003-11-25 | Brightmail, Incorporated | Method and apparatus for filtering e-mail |
US6647409B1 (en) * | 1999-07-13 | 2003-11-11 | Microsoft Corporation | Maintaining a sliding view of server based data on a handheld personal computer |
US6850968B1 (en) * | 2000-02-01 | 2005-02-01 | Service Co. | Reduction of network server loading |
US6993559B2 (en) * | 2000-02-14 | 2006-01-31 | Bigbow.Com, Inc. | System, method, apparatus and computer program product for operating a web site by electronic mail |
US6697843B1 (en) * | 2000-04-13 | 2004-02-24 | United Parcel Service Of America, Inc. | Method and system for hybrid mail with distributed processing |
US7039678B1 (en) * | 2000-09-07 | 2006-05-02 | Axis Mobile, Ltd. | E-mail proxy |
CN1145316C (zh) * | 2001-01-23 | 2004-04-07 | 联想(北京)有限公司 | 互联网中过滤电子邮件内容的方法 |
US7640434B2 (en) * | 2001-05-31 | 2009-12-29 | Trend Micro, Inc. | Identification of undesirable content in responses sent in reply to a user request for content |
US7607010B2 (en) * | 2003-04-12 | 2009-10-20 | Deep Nines, Inc. | System and method for network edge data protection |
JP4036333B2 (ja) * | 2003-05-23 | 2008-01-23 | 日本アイ・ビー・エム株式会社 | 送信側メールサーバ、受信側メールサーバ、電子メールシステム、署名データ管理方法、およびプログラム |
JP4703333B2 (ja) * | 2005-09-26 | 2011-06-15 | エヌ・ティ・ティ・ソフトウェア株式会社 | 電子メール処理プログラム |
US20070094605A1 (en) * | 2005-10-20 | 2007-04-26 | Dietz Timothy A | System for transforming selected sections of a network, e.g. Web documents accessed from network sites, e.g. Web sites, into e-mail messages |
CN101589588A (zh) * | 2006-04-26 | 2009-11-25 | 摩邮有限公司 | 用于电子邮件网关的方法和装置 |
KR100859664B1 (ko) * | 2006-11-13 | 2008-09-23 | 삼성에스디에스 주식회사 | 전자메일의 바이러스 감염여부 판정방법 |
JP4374027B2 (ja) | 2007-01-15 | 2009-12-02 | ソフトバンクモバイル株式会社 | メールプロキシサーバ装置 |
KR101351751B1 (ko) * | 2007-01-16 | 2014-01-15 | 엘지전자 주식회사 | 이동통신단말기의 첨부파일 리스트 디스플레이 방법,이메일 프로토콜을 이용한 첨부파일의 다운로드 및 업로드방법, 및 이를 수행하기 위한 이동통신단말기 |
JP5124527B2 (ja) * | 2009-05-26 | 2013-01-23 | 株式会社日立製作所 | メール中継装置 |
CN101789105B (zh) * | 2010-03-15 | 2013-01-30 | 北京安天电子设备有限公司 | 一种在数据包的级别动态检测邮件附件病毒的方法 |
US10409982B2 (en) * | 2012-07-18 | 2019-09-10 | Zixcorp Systems, Inc. | Secure data access for multi-purpose mobile devices |
US9794203B2 (en) * | 2012-12-07 | 2017-10-17 | Linkedin Corporation | Communication systems and methods |
-
2013
- 2013-06-26 CN CN201380000623.2A patent/CN103609078B/zh active Active
- 2013-06-26 WO PCT/CN2013/077995 patent/WO2014205669A1/zh active Application Filing
- 2013-06-26 KR KR1020157034364A patent/KR101729637B1/ko active IP Right Grant
- 2013-06-26 EP EP13887614.9A patent/EP2985957B1/en active Active
- 2013-06-26 ES ES13887614T patent/ES2747380T3/es active Active
- 2013-06-26 JP JP2016518819A patent/JP6156765B2/ja active Active
-
2015
- 2015-12-22 US US14/978,975 patent/US20160112356A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921485A (zh) * | 2005-08-25 | 2007-02-28 | 国际商业机器公司 | 在客户端-服务器环境中管理电子邮件的方法和系统 |
CN1859332A (zh) * | 2006-03-23 | 2006-11-08 | 华为技术有限公司 | 一种采用数据同步处理电子邮件的系统、装置及方法 |
CN101106537A (zh) * | 2006-07-14 | 2008-01-16 | 华为技术有限公司 | 一种选择性下载电子邮件的方法 |
CN102158819A (zh) * | 2011-01-25 | 2011-08-17 | 华为终端有限公司 | 用于移动设备显示电子邮件处理方法、服务器及移动设备 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635250A (zh) * | 2018-12-14 | 2019-04-16 | 万兴科技股份有限公司 | 文档格式转换方法、装置、计算机设备及存储介质 |
CN109635250B (zh) * | 2018-12-14 | 2024-02-13 | 万兴科技股份有限公司 | 文档格式转换方法、装置、计算机设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
US20160112356A1 (en) | 2016-04-21 |
EP2985957A4 (en) | 2016-04-20 |
CN103609078B (zh) | 2017-02-08 |
KR101729637B1 (ko) | 2017-04-24 |
JP2016523408A (ja) | 2016-08-08 |
CN103609078A (zh) | 2014-02-26 |
EP2985957B1 (en) | 2019-08-07 |
JP6156765B2 (ja) | 2017-07-05 |
ES2747380T3 (es) | 2020-03-10 |
KR20160003265A (ko) | 2016-01-08 |
EP2985957A1 (en) | 2016-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014205669A1 (zh) | 网络设备及电子邮件请求处理方法 | |
US8090782B2 (en) | Electronic messaging system and method | |
US8364780B2 (en) | Gateway-assisted file transfer | |
US8516067B2 (en) | Clearinghouse for messages between disparate networks | |
US20070100999A1 (en) | Method, system and software for rendering e-mail messages | |
US20170230320A1 (en) | Transmitting Media Content During Instant Messaging | |
US10812421B2 (en) | Conveying instant messages via HTTP | |
CN102394839A (zh) | 邮件附件的下载方法及邮件系统 | |
US8140628B2 (en) | Enforcing conformance in email content | |
US10250543B2 (en) | Deduplication of e-mail content by an e-mail server | |
US8676907B2 (en) | Relay apparatus, relay method and recording medium | |
JP2018101424A (ja) | ダイレクト電子メール | |
US9207953B1 (en) | Method and apparatus for managing a proxy autoconfiguration in SSL VPN | |
JP2005317029A (ja) | セキュアな電子メールフォーマットの伝送 | |
US20100070591A1 (en) | Address replacement in electronic communication | |
JP2009188805A (ja) | 電子メールシステム | |
Jenkins et al. | The JSON Meta Application Protocol (JMAP) for Mail | |
US9143472B2 (en) | Updating an e-mail recipient list | |
JP2010219731A (ja) | 中継装置およびプログラム | |
Jenkins et al. | RFC 8621: The JSON Meta Application Protocol (JMAP) for Mail | |
Sharp | Network Applications | |
Ryan et al. | Usable Encryption Enabled by AJAX | |
JP2024520974A (ja) | 内部ネットワーク分離セキュリティネットワークにおける内部ネットワーク内の大容量ファイルが添付されたメールを外部ネットワークに安全に転送するためのメール変換処理装置及びその動作方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13887614 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013887614 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20157034364 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2016518819 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |