Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mail blocking method and device based on sensitive information recognition

A sensitive information identification and email blocking device technology, applied in the field of network information, can solve problems affecting enterprise network security, huge losses, and inability to monitor sensitive information, so as to reduce risks, improve prevention capabilities, and reduce information leakage and confidentiality. The effect of the possibility of ejaculation

Inactive Publication Date: 2016-05-04
STATE GRID CORP OF CHINA +1
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The Internet also brings unprecedented risks of mixed threats to enterprises. Employees freely and uncontrollably access illegal websites, transmit sensitive information, publish illegal speeches, leak sensitive business information, etc., seriously affecting enterprise network security and causing irreparable losses.
Traditional network protection equipment (such as firewalls, intrusion detection systems, etc.) is the basic equipment to solve network security problems. Its access control, network attack event detection and other functions can resist most attacks from the external network; Sensitive information contained in email titles, email texts, email attachments, etc.
However, compared with the security of the network layer, the security incidents caused by the behavior of sending emails from the internal network to the external network are more hidden and difficult to detect, so the losses are even greater

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail blocking method and device based on sensitive information recognition
  • Mail blocking method and device based on sensitive information recognition
  • Mail blocking method and device based on sensitive information recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0030] An embodiment of the present invention provides a method for blocking emails based on sensitive information identification, including the following steps:

[0031] Obtain the mail sent by the user from the internal network to the external network;

[0032] Sensitive information identification is performed on the obtained email, and when it is identified that the email contains sensitive information, block the email and prompt the user;

[0033] Obtain the email edited by the user, and send the edited email.

[0034] It can be seen that the mail blocking method based on sensitive information identification in the embodiment of the present invention, based on the sensitive information identification technology, impl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mail blocking method and device based on sensitive information recognition, and the method comprises the steps: obtaining a mail which is sent by a user from an intranet to an extranet; carrying out the recognition of sensitive information of the obtained mail, blocking the mail and reminding a user when the mail is recognized to contain the sensitive information; obtaining the mail after the main is edited by the user, and enabling the edited mail to be sent. The method can achieve the complete checking, filtering and monitoring of a Web mail and a client mail, can effectively reduce possibility that employees of enterprises leaks information and secrets through information extranet mails, and achieves the blocking, prevention and monitoring of the leakage of sensitive information of the mails. The method achieves a fine grit purpose of person monitoring, mailbox monitoring, time monitoring and content monitoring. The method greatly improves the capability of information leakage prevention, and reduces the risk of sensitive information leakage of the mails.

Description

technical field [0001] The invention relates to the field of network information technology, in particular to a method and device for blocking emails based on sensitive information identification. Background technique [0002] With the rapid development of Internet applications, computer networks are rapidly becoming popular in various fields of economy and life, and information acquisition, sharing and dissemination are more convenient. Enterprises rely more and more on the network, and the importance of information security is also increasing. [0003] The Internet also brings unprecedented risks of mixed threats to enterprises. Employees freely and uncontrollably access illegal websites, transmit sensitive information, publish illegal speeches, and leak sensitive business information, etc., seriously affecting enterprise network security and causing irreparable losses. Traditional network protection equipment (such as firewalls, intrusion detection systems, etc.) is the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/10H04L63/14H04L51/212
Inventor 刘世民齐四清孙添资朱继阳张梦梦袁野刘阜阳范秉旭
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products