Method for judging e-mail address scanning behaviors
A technology of email address and email address, which is applied in the field of judgment of email address scanning behavior, can solve the problems of no identification and interception of email address scanning behavior, theft of important data information of users, etc., and achieve effective identification and interception of email address scanning Behavior, improve security and privacy, improve the effect of user experience
Inactive Publication Date: 2019-12-03
SICHUAN XW BANK CO LTD
4 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The invention relates to a method for judging an address scanning behavior of an email box, which comprises the following steps of: A, if an external email and/or an external email source can be matched with a blacklist record in safety equipment, disconnecting network connection and an email communication protocol, otherwise, continuing to execute; B, a mailbox address scanning analysis system analyzing whether an external mail and/or an external mail source has an electronic mailbox address scanning behavior or not, wherein the electronic mailbox address scanning behavior comprises at leastone of mailbox address invalid frequency analysis, enumeration address analysis, same sender analysis, same theme or content analysis or mailbox suffix analysis in unit time; and C, if a scanning behavior is judged, adding the sender into a blacklist to intercept, otherwise, processing according to a normal mail. According to the invention, the problem that the traditional mail security gateway cannot effectively identify and intercept the address scanning behavior of the email box is solved, the address scanning behavior of the email box can be effectively identified and intercepted, and thesecurity and privacy of a mail system are obviously improved.
Application Domain
Data switching networks
Technology Topic
Internet privacySafety Equipment +3
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Method and system for controlling air conditioner
Owner:GD MIDEA AIR-CONDITIONING EQUIP CO LTD +1
Video photographing control device and method, and unmanned aerial vehicle
Owner:ZEROTECH (BEIJING) INTELLIGENCE TECH CO LTD
Text error correction method and device based on artificial intelligence recurrent neural network
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Method and system for managing chat messages of instant message temporary session group
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD
Intelligent household electrical appliance control system with integration of face recognition function
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD
Classification and recommendation of technical efficacy words
- Avoid wasting resources
- Improve user experience
Visual detection equipment of circuit board
Owner:GUANGDONG LYRIC ROBOT INTELLIGENT AUTOMATION CO LTD
WEB GIS-based information management system of bridges in region
Owner:CCCC HIGHWAY CONSULTANTS
Cooperative transmission routing method for wireless sensor network based on multi-relay multi-hop
Owner:JIANGSU COMSOFT TECH
Control method and device, and electronic units
Owner:LENOVO (BEIJING) CO LTD