Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for analyzing and restoring unencrypted WEB mail

A non-encrypted, mail technology, applied in the field of communication, can solve the problem of the difficulty of WEB mail content differences, and achieve the effect of maintaining network security

Active Publication Date: 2011-02-09
南通东湖国际旅行社有限公司
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since they are all based on WEB mail, the application layer protocols adopted by different mail systems are basically HTTP protocol, which means that it will be difficult to distinguish the differences of different types of WEB mail content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for analyzing and restoring unencrypted WEB mail
  • Method and system for analyzing and restoring unencrypted WEB mail
  • Method and system for analyzing and restoring unencrypted WEB mail

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Such as figure 1 Shown, the analysis method of the non-encrypted WEB mail of an embodiment of the present invention, comprises the following steps:

[0044] In step 101, multiple types of mail conversations are acquired as mail sample conversations.

[0045] A mail thread contains all the information of a mail.

[0046] A mail session is a data packet or data stream after encoding and other processing of mail, which can be transmitted, but cannot be read directly. Depending on the type of email, the processing the email goes through varies, resulting in a different type of email conversation.

[0047] There are many types of mail, such as Yahoo, Hotmail, etc. In order to restore a certain type of mail, you must first obtain the mail session of this type.

[0048] Since data on the Internet may cause packet loss, repeated packets, etc., each type of mail should obtain multiple mail sessions as samples to reduce mail restoration errors caused by wrong sample data. In ...

Embodiment 2

[0062] The restoration process of emails is to extract useful information from the encoded email conversations and restore them into readable emails.

[0063] The restoration method of the non-encrypted WEB mail of one embodiment of the present invention comprises the following steps:

[0064] Step 201, intercepting the mail conversation that needs to be restored.

[0065] Step 202, judging which type of conversation it belongs to, and judging whether a conversation sample database of this type exists.

[0066] Step 203 , according to the conversation type of the mail, compare the position of each text keyword in the mail text sample database in the sample database of the corresponding type, and restore the mail text from the conversation.

[0067] Step 204, comparing the positions of the keywords of each attachment in the attachment sample library, and recovering the email attachments from the session.

[0068] Step 205, put the restored attachment into the email according ...

Embodiment 3

[0071] Taking Yahoo mail as an example, a specific embodiment of the analysis and restoration method of non-encrypted WEB mail of the present invention comprises the following steps:

[0072] In step 301, various mail sessions are acquired, including Yahoo mail sessions of the HTTP protocol as samples.

[0073] Step 302, judging whether the number of acquired samples of each type is greater than or equal to N, and the suggested value of N is at least greater than or equal to 2. If the number of samples is greater than or equal to N, continue to the following steps; if the number of samples is less than N, continue to obtain mail data packet samples.

[0074] Ensuring that the number of samples is greater than or equal to N is to reduce errors during email restoration caused by sample data errors caused by packet loss, delay, and other reasons when intercepting sample data, and improve the accuracy of email restoration.

[0075] Step 303, for each type of mail conversation, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for analyzing and restoring an unencrypted WEB mail, which comprises the steps of building a mail sample bank corresponding to different types of mail sessions and restoring a mail from the mail session according to the corresponding mail sample bank when a new mail session is intercepted. When the method of the invention is adopted, the unencrypted WEB mail can be monitored conveniently.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and system for analyzing and restoring non-encrypted WEB mails. Background technique [0002] Sending and receiving e-mails by using computers to go online has been widely and widely used in today's society. With the rapid development of 3G communication, sending and receiving e-mails by using mobile phones to go online has also been more and more widely used. However, new communication methods are also being used in some illegal activities, such as mail fraud, mail sending viruses and so on. [0003] With the needs of the international political situation, especially the anti-terrorism situation, various countries and regions are paying more and more attention to the use of various means of communication to carry out illegal activities. The demand is more urgent, which is mainly reflected in the expansion from the legal interception of traditional voice and fax communication ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/58G06F17/30
CPCH04L12/586H04L51/16H04L51/216
Inventor 简化池艳广郭红涛
Owner 南通东湖国际旅行社有限公司