Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for cracking encrypted mails

A mail and mail server technology, applied in the direction of electrical components, digital transmission systems, transmission systems, etc., can solve problems such as low cracking efficiency and affect user behavior, and achieve high cracking efficiency

Inactive Publication Date: 2019-06-21
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing technology is low in cracking efficiency and affects user behavior. A method is needed to enable the original encrypted email data to be parsed without the user's perception

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for cracking encrypted mails
  • A method for cracking encrypted mails

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Attached below figure 1 , the present invention is further elaborated:

[0021] A method for decrypting encrypted emails, its implementation is as follows:

[0022] DNS pollutes the real mail server, so that the data originally sent to the real server is forwarded to the mail monitoring device.

[0023] The monitoring device uses the forged certificate of Openssl to deceive the monitored host.

[0024] The monitoring device uses the local private key to decrypt the network data from the monitored host.

[0025] The monitoring host sends the analyzed real data to the real server.

[0026] Combined with the accompanying drawings, the system is mainly composed of monitoring equipment and monitored hosts. The monitoring device is deployed on the switch bypass branch, and the monitored hosts are all hosts under the switch. The monitoring equipment mainly cracks and records the encrypted email behavior generated by the monitored host.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

At present, in the rapid development process of the network technology, E-mail communication is a popular application technology emerging on a personal computer, and information of many company levelsis transmitted through mails. In order to prevent employees from leaking confidential information of companies through mail channels, auditing and sensitive information identification need to be carried out on mail contents. Indeed actually, At present, many users actively adopt an encryption mode to transmit mails; In the prior art, if a conventional protocol analysis means is used, only a conventional non-encrypted mail can be cracked, the encrypted mail cannot be cracked, or a cracking client is directly installed on a client, but the means affects the use of a user, so that the delay is very high. Therefore, the invention aims to provide a method for cracking encrypted mails. In the flow transmission process, the proxy server is used for completing cracking. And compared with some conventional means, the efficiency is more efficient and convenient.

Description

technical field [0001] The invention relates to electronic information, a method of forging a certificate to deceive a client, and deciphering encrypted mail flow in the flow transmission process. Background technique [0002] The cracking efficiency of the existing technology is low and affects user behavior. A method is needed to enable the original encrypted email data to be parsed without the user's awareness. The analysis efficiency is also more efficient and convenient than the original technology. Contents of the invention [0003] In view of the defects of the existing technology, the present invention proposes a method for decrypting encrypted emails. For encrypted emails, the existing technology either cannot be cracked, or the cracking efficiency is low, which affects user behavior. In view of the above problems, this patent proposes A method for analyzing encrypted messages based on network traffic. [0004] The technical solutions adopted are as follows: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/58
Inventor 傅涛王力郑轶陆陈飞
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More