Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Counterfeit checking and processing method and device for mails

A processing method and email technology, applied in the communication field, can solve problems such as high difficulty in common user identification, imprecise reminder of counterfeit results, user network threats, etc., and achieve the effect of personalized inspection and accurate counterfeit email reminder

Inactive Publication Date: 2019-04-02
BEIJING QIANXIN TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of attack is extremely difficult for ordinary users to identify, it is difficult to be discovered by traditional security detection systems, and it poses a huge network threat to users
[0003] Counterfeiting checks in the prior art are based on the detection of email content, attachments, and metadata, and identify whether an email is malicious through methods such as black and white lists, feature matching, and behavior detection, but it is not possible to determine whether the email has a targeted attack nature. However, the use of uniform rules cannot be customized according to the specific conditions of the enterprise, resulting in inaccurate reminders of counterfeit results and easily misleading users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Counterfeit checking and processing method and device for mails
  • Counterfeit checking and processing method and device for mails
  • Counterfeit checking and processing method and device for mails

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0037] figure 1 It shows a schematic flow chart of a mail counterfeit check processing method provided in this embodiment, including:

[0038] S101. If a new email is received, obtain the key information of the mailbox and the contact person of the enterprise locally.

[0039] Wherein, the new email is any new email received by the user's mailbox.

[0040] The key information is important information of each email stored locally in the mailbox, such as an email address.

[0041] The enterprise contact is the contact information of each email locally stored in the mailbox, such as the name of the enterprise contact.

[0042] S102. Check the new email for counterfei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a counterfeit checking and processing method and device for mails. The method comprises the steps of if a new mail is received, obtaining key information andenterprise contacts of the mailbox locally; carrying out counterfeit checking on the new mail according to the key information, the enterprise contacts and checking rules; and if the new mail is checked to be a counterfeiting mail, obtaining and displaying target information of the new mail. The embodiment of the invention carries out counterfeit checking on the local key information and enterprise contacts of the mailbox according to the checking rules, thereby realizing enterprise customized counterfeit checking. In addition, appropriate checking rules can be formulated according to the actual situation so as to realize personalized checking and obtain an accurate counterfeiting mail reminder.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of communications, and in particular to a method and device for checking and processing email counterfeit. Background technique [0002] With the rapid development of Internet technology, network attack incidents also occur frequently, especially for mailboxes that are frequently used in daily office and life, counterfeit emails emerge in endlessly. Phishers will obtain the target's common contact information through information theft, such as email contact addresses, and then "tailor-made" a sender's email address that is extremely difficult to identify. Targeted attacks, such as changing passwords. This kind of attack is extremely difficult for ordinary users to identify, and it is difficult to be discovered by traditional security detection systems, which poses a huge network threat to users. [0003] Counterfeiting checks in the prior art are based on the detection of email co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L29/06
CPCH04L63/1441H04L51/212H04L51/42
Inventor 刘宇龙军楚赟
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products