Method and system for analyzing and restoring unencrypted WEB mail
A non-encrypted, mail technology, applied in the field of communication, can solve the problem of the difficulty of WEB mail content differences, and achieve the effect of maintaining network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] Such as figure 1 Shown, the analysis method of the non-encrypted WEB mail of an embodiment of the present invention, comprises the following steps:
[0044] In step 101, multiple types of mail conversations are acquired as mail sample conversations.
[0045] A mail thread contains all the information of a mail.
[0046] A mail session is a data packet or data stream after encoding and other processing of mail, which can be transmitted, but cannot be read directly. Depending on the type of email, the processing the email goes through varies, resulting in a different type of email conversation.
[0047] There are many types of mail, such as Yahoo, Hotmail, etc. In order to restore a certain type of mail, you must first obtain the mail session of this type.
[0048] Since data on the Internet may cause packet loss, repeated packets, etc., each type of mail should obtain multiple mail sessions as samples to reduce mail restoration errors caused by wrong sample data. In ...
Embodiment 2
[0062] The restoration process of emails is to extract useful information from the encoded email conversations and restore them into readable emails.
[0063] The restoration method of the non-encrypted WEB mail of one embodiment of the present invention comprises the following steps:
[0064] Step 201, intercepting the mail conversation that needs to be restored.
[0065] Step 202, judging which type of conversation it belongs to, and judging whether a conversation sample database of this type exists.
[0066] Step 203 , according to the conversation type of the mail, compare the position of each text keyword in the mail text sample database in the sample database of the corresponding type, and restore the mail text from the conversation.
[0067] Step 204, comparing the positions of the keywords of each attachment in the attachment sample library, and recovering the email attachments from the session.
[0068] Step 205, put the restored attachment into the email according ...
Embodiment 3
[0071] Taking Yahoo mail as an example, a specific embodiment of the analysis and restoration method of non-encrypted WEB mail of the present invention comprises the following steps:
[0072] In step 301, various mail sessions are acquired, including Yahoo mail sessions of the HTTP protocol as samples.
[0073] Step 302, judging whether the number of acquired samples of each type is greater than or equal to N, and the suggested value of N is at least greater than or equal to 2. If the number of samples is greater than or equal to N, continue to the following steps; if the number of samples is less than N, continue to obtain mail data packet samples.
[0074] Ensuring that the number of samples is greater than or equal to N is to reduce errors during email restoration caused by sample data errors caused by packet loss, delay, and other reasons when intercepting sample data, and improve the accuracy of email restoration.
[0075] Step 303, for each type of mail conversation, an...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 