E-mail communication limiting method and system

A technology of e-mail and mail, applied in the direction of instruments, data processing applications, office automation, etc., can solve the problems of difficult black and white lists, failure to proceed normally, exhaustive enumeration, etc.

Inactive Publication Date: 2019-03-26
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, manual maintenance will bring the following disadvantages: with the increasing number of e-mail users and the increasing number of e-mail addresses, it is difficult to list all the black and white lists, and the list is not set in time, resulting in blocked e-mail communication
For example, due to business changes, e-mail communication with e

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • E-mail communication limiting method and system
  • E-mail communication limiting method and system
  • E-mail communication limiting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Please refer to figure 1 , figure 1 It is a flow chart of an e-mail communication restriction method in an embodiment of the present invention, and the method includes the following steps:

[0049] S101. Obtain a target mail data packet, and analyze the target mail data packet to obtain a target MTA.

[0050] In the embodiment of the present invention, the mail server to be protected can be configured, specifically, the IP of the mail server to be detected, the service port, and the MTA of the mail server can be configured. Programs used to send and receive mail are generally referred to as mail user agent MUA (Mail User Agent). The program that forwards letters from MUA to designated users is generally called MTA (Mail Transfer Agent, Internet mail transfer agent). On linux / Unix systems, the most famous MTAs include programs such as sendmail and qmail. That is, the MTA is an email transmission agent, which is specifically represented by the part after @ in an email...

Embodiment 2

[0076] In order to facilitate those skilled in the art to better understand the email communication restriction method provided by the embodiment of the present invention, the email communication restriction method provided by the embodiment of the present invention will be described in detail below with reference to specific application scenarios as examples.

[0077] First, configure the mail server information: configure the mail server IP, service port, and mail server MTA to be detected. For the convenience of subsequent expression, set the mail server MTA of the protected object to M.

[0078] If M is abc, that is, the part after @ in the e-mail is aaa.

[0079] After the configuration is complete, traffic mirroring can be used to obtain the traffic passing through the mail server to be detected according to the configuration information of the mail server.

[0080] Analyze the obtained traffic. Specifically, according to the mail protocol, the recipient and sender inf...

Embodiment 3

[0090] Corresponding to the above method embodiment, the embodiment of the present invention also provides an email communication restriction system, and the email communication restriction system described below and the email communication restriction method described above can be referred to in correspondence with each other.

[0091] see figure 2 As shown, the system includes the following modules:

[0092] The target MTA acquisition module 101 is used to obtain the target mail data packet, and analyze the target mail data packet to obtain the target MTA;

[0093] Judgment module 102, for judging whether there is target MTA in the MTA black and white list of current moment;

[0094] Black and white list update module 103, for when there is no target MTA in the MTA black and white list, then output the mark entry prompt information, and receive the MTA mark; Add the target MTA and the MTA mark in the MTA black and white list;

[0095] The communication restriction process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an E-mail communication limiting method which comprises the following steps: obtaining a target mail data packet, and analyzing the target mail data packet to obtain a target MTA; Judging whether a target MTA exists in the MTA black and white list at the current moment or not; If not, outputting a mark input prompt message, and receiving an MTA mark; Adding a target MTA andan MTA mark into the MTA black and white list; And after the addition is completed, carrying out communication limitation on the target mail data packet by utilizing a black and white list judgment rule. According to the method, when business change and demand conversion occur, the black and white list is updated in time, and the workload of mail server maintenance personnel is reduced. The invention further discloses an E-mail communication limiting system and device and a readable storage medium which have corresponding technical effects.

Description

technical field [0001] The invention relates to the technical field of safety assurance, in particular to an e-mail communication restriction method, system, device and readable storage medium. Background technique [0002] E-mail is convenient and fast to send and receive, and has become an indispensable office and communication tool for enterprises. However, with the development of the network, information is highly shared, making it difficult to guarantee the privacy and security of information. [0003] Many enterprises, especially government institutions, require restrictions on information transmission on the public network. Especially for work-related e-mail content, in order to prevent some business information or work-related content involved in the e-mail from being leaked, the e-mail user communication objects will be limited. [0004] At present, the administrator of the e-mail server restricts communication by manually maintaining a black and white list of com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/10
CPCG06Q10/107
Inventor 邵宛岩范渊龙文洁刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products