Mail security check method and device, computer equipment and storage medium

An inspection method and security technology, applied in the field of information security, can solve problems such as taking too long

Active Publication Date: 2020-04-21
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the recognition of image steganography is mainly through training models (such as deep learning neural network recognition model or multi-directional Markov model), and then through the trained model to identify whether there is steganography in the image. However, it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail security check method and device, computer equipment and storage medium
  • Mail security check method and device, computer equipment and storage medium
  • Mail security check method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] see figure 1 , figure 1 The application environment of the email security checking method provided by the embodiment of the present invention is shown. The email security checking method is applied in the scene of checking the security of the content in the email when the email is sent and received. The security check scenario includes the client, server and management, where the client and server, and the server and management are connected t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mail security check method and device, computer equipment and a storage medium. The method comprises the following steps of: when a mail receiving and sending request is detected, obtaining an information carrier contained in the mail receiving and sending request, identifying the format of the information carrier; if a JPEG format exists, acquiring an information carriercorresponding to the JPEG format as a target carrier, and analyzing the target carrier to obtain parsed content; through a dual-probe mode, carrying out bidirectional detection on the parsed contentto determine real positions of a file header identifier and a file tail identifier contained in the parsed content; based on the real positions, determining steganography recognition results; and whenthe steganography recognition result shows that steganography exists, refusing the mail receiving and sending request, and sending the steganography recognition result to the management end. Whethersteganography exists or not is judged by obtaining the real positions of the file header identifier and/or the file tail identifier, so that pertinence is high, rapid steganography recognition is achieved, and the safety detection efficiency in the mail receiving and sending process is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a mail security checking method, device, computer equipment and storage medium. Background technique [0002] With the rapid development of computer technology, electronic office has gradually formed a trend. Through electronic office, the efficiency of various transaction processing can be accelerated. Among them, information transmission by email is an important link in electronic office. Between enterprises and other enterprises, it is often necessary to carry out information transmission and communication by mail. [0003] When using emails for information transmission, sometimes pictures are inserted into the content or background of emails for the sake of aesthetics or publicity, and sometimes pictures are inserted into email attachments as attachments, and emails are used as a carrier of electronic information , its data security cannot be ignored. Therefore, when tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/58H04L29/06
CPCH04L63/1416H04L69/22H04L51/42
Inventor 敖琦唐炳武
Owner CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products