CN104980469A - E-mail extraction method and system - Google Patents

E-mail extraction method and system Download PDF

Info

Publication number
CN104980469A
CN104980469A CN201410141635.3A CN201410141635A CN104980469A CN 104980469 A CN104980469 A CN 104980469A CN 201410141635 A CN201410141635 A CN 201410141635A CN 104980469 A CN104980469 A CN 104980469A
Authority
CN
China
Prior art keywords
mail
mailbox
proxy server
unit
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410141635.3A
Other languages
Chinese (zh)
Inventor
修超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410141635.3A priority Critical patent/CN104980469A/en
Publication of CN104980469A publication Critical patent/CN104980469A/en
Priority to HK16101013.3A priority patent/HK1213112A1/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application discloses an E-mail extraction method. The method comprises the following steps that: a proxy server logs in a mailbox server with the authorization information of a user; the mailbox server authenticates the authorization information, and keeps the proxy server in a logging status; the proxy server sends a search request to the mailbox server; the mailbox server searches for a specified E-mail according to the search request, and transmits information of the specified E-mail to the proxy server; the proxy server downloads and saves the specified E-mail according to the information of the specified E-mail; and the proxy server transmits the saved specified E-mail to the user. Through adoption of the E-mail extraction method, the proxy server can automatically log in mailboxes authorized by the user, and extract specified E-mails in a plurality of mailboxes according to the demand of the user, so that the user can read the specified E-mails conveniently. The application also discloses an embodiment of a system for extracting E-mails. Through adoption of the system, the E-mail extraction method in the application can be implemented.

Description

Method and system for extracting mails
Technical Field
The present application relates to the field of electronic mail technologies, and in particular, to a method and a system for extracting a mail.
Background
Electronic mail (E-mail) is one of the most widely used services of the Internet (Internet). Through the network's email system, a user can contact network users in any one of the corners of the world very quickly. The content of the e-mail may be text, images, sound, etc. The e-mail has the advantages of simple use, quick delivery and the like, so that the e-mail is widely applied.
The working process of the e-mail comprises the following steps: and sending the edited electronic mail to a mail sending server, judging a mail receiving server of the electronic mail according to the address of a mail receiver, sending the electronic mail to the mail receiving server, and accessing the mail receiving server by the receiver to complete the receiving of the electronic mail.
Web mail (WebMail) refers to a service or technology for sending and receiving electronic mail via a web using a browser. The WebMail realizes sending and receiving of the mail based on a Protocol mode of HTTP (Hypertext transfer Protocol) or HTTPs (Hypertext transfer Protocol over Secure Socket Layer). The WebMail does not need to use a client, so that the trouble of configuring E-mail client software (such as Foxmail, Outlook and the like) by a user is avoided, the WebMail can be used as long as the user can surf the internet, and the user can conveniently receive and send mails. Meanwhile, WebMail does not occupy the storage space of a client computer, functions are rich and expansibility is strong, most mailbox providers provide services for accessing mailboxes based on HTTP or HTTPS protocols, and users can use emails conveniently.
Due to the widespread use of email, a user mailbox typically receives a large amount of mail, which may be from any contact, whose content may pertain to any event. In the process of using the e-mail, a user often only needs to read the specified e-mail, which may include e-mail sent by a specific sender or e-mail related to a certain event. The user needs to extract and read the specified mail among the large number of received emails.
The existing method for extracting and reading the specified mail by the user may include a method for extracting and reading the specified mail by the user using WebMail. Specifically, the method comprises the following steps: the user logs in a mail page provided by an email service provider (such as an internet phone 163 mailbox, a 126 mailbox and the like) through a browser, inputs a user name and a password for logging in, and then searches for a designated mail according to the user requirement and reads the mail under a webpage interface.
In the process of implementing the present application, the inventor finds that at least the following problems exist in the prior art: when a user extracts and reads a designated mail by using the WebMail, the user can search and read the designated mail only by opening a web browser and logging in a mailbox. If a user has electronic mailboxes of a plurality of electronic mailbox service providers, the user needs to log in mail interfaces provided by the plurality of electronic mailbox service providers through a browser, log in mailboxes and search mails respectively, and then read the searched mails on each browser mail interface respectively. Moreover, the operation is required to be carried out every time a designated mail is read, which is very complicated.
Disclosure of Invention
The embodiment of the application aims to provide a method and a system for extracting mails, so that a user can conveniently read a designated mail.
In order to solve the above technical problem, an embodiment of the present application provides a method and a system for extracting an email, which are implemented as follows:
a method of extracting mail, comprising: the proxy server logs in the mailbox server by using the user authorization information; the mailbox server authenticates the authorization information; the proxy server sends a search request to the mailbox server; the mailbox server searches according to the search request to obtain an appointed mail and sends the information of the appointed mail to the proxy server; the proxy server receives the information of the specified mail returned after the mailbox server searches according to the search request; the proxy server downloads and stores the specified mail according to the information of the specified mail; and the proxy server sends the saved designated mail to the user.
A method of extracting mail, comprising: the proxy server logs in the mailbox server by using the user authorization information; the proxy server sends a search request to the mailbox server; the proxy server receives the information of the specified mail returned after the mailbox server searches according to the search request; the proxy server downloads and stores the specified mail according to the information of the specified mail; and the proxy server sends the saved designated mail to the user.
In a preferred embodiment, the process that the proxy server sends the search request to the mailbox server and the process that the proxy server downloads and stores the specified mail further includes: and the proxy server carries temporary data returned after the mailbox server successfully authenticates and sends the temporary data to the mailbox server.
In a preferred embodiment, the sending the stored designated mail to the user by the proxy server includes: when the proxy server receives a reading request of a user, the stored designated mail is sent to the user; or the proxy server sends the appointed mail to the user when the second preset time is up.
Preferably, the search request includes at least one of the following: mail search scope, search keywords, search rules.
Preferably, the mail search range includes at least one of: unread mail in the user mailbox, read mail in the user mailbox.
In a preferred embodiment, the user authorization information includes: authorization information pre-stored on the proxy server, or authorization information sent by the user.
In a preferred scheme, the user authorization information includes a mailbox username and a corresponding mailbox password.
In a preferred embodiment, the information for specifying the mail includes: specifying the storage address of the mail and specifying the subject of the mail.
In a preferred embodiment, the search rule includes: and in the searched address range, matching the search keywords with the mail index words according to a preset matching rule, wherein if the search keywords accord with the preset matching rule, the mail corresponding to the mail index word is the specified mail.
In a preferred embodiment, the preset matching rule at least includes one of the following matching rules:
(A) fuzzy matching rules; the method comprises the following steps: comparing the mail index word with each search keyword, and if the mail index word at least comprises one search keyword, conforming to the simple matching rule;
(B) a single matching rule; the method comprises the following steps: setting one of the search keywords as a forced matching keyword, comparing the mail index word with the forced matching keyword, and if the mail index word contains the forced matching keyword, conforming to the single matching rule;
(C) combining the matching rules; the method comprises the following steps: setting at least two search keywords in the search keywords as forced matching keywords, comparing the mail index word with each forced matching keyword, and if the mail index word contains all the forced matching keywords, conforming to the combined matching rule.
In a preferred embodiment, the communication between the proxy server and the mailbox server is performed based on a hypertext transfer protocol.
A system for extracting mail, comprising: the mail box comprises a mail box login unit, a mail searching unit, an information receiving unit, a mail downloading unit and a mail providing unit; the mailbox login unit is used for logging in a mailbox server by using user authorization information; the mail searching unit is used for sending a searching request to the mailbox server; the information receiving unit is used for receiving the information of the specified mails returned by the mailbox server according to the search request; the mail downloading unit is used for downloading and storing the specified mail according to the information of the specified mail received by the information receiving unit; and the mail providing unit is used for sending the saved specified mail to the user.
In a preferred embodiment, the mailbox logging unit includes: a login address setting unit and a login request sending unit; the system comprises a login address setting unit, a mail box login instruction setting unit and a mail box login control unit, wherein the login address setting unit is used for setting a login request address in the mail box login instruction according to the authorization information; the login request sending unit is used for sending a login request to the mailbox server to log in the mailbox authorized by the user;
in a preferred scheme, the mailbox login unit further comprises a login information storage unit; and the login information storage unit is used for storing temporary data fed back by the mailbox server after the proxy server successfully logs in the mailbox server.
In a preferred embodiment, the mail downloading unit includes: a download address setting unit, a download request sending unit and a designated mail storage unit; the download address setting unit is used for setting the storage address of the designated mail in the information receiving unit as a download request address in the mail download instruction; the download request sending unit is used for sending a download request to the mailbox server; and the designated mail storage unit is used for storing the designated mail.
In a preferred embodiment, the mail providing unit includes: a transmission time setting unit and a mail transmission unit; the sending time setting unit is used for setting the sending time of the mail; the sending time of the mail comprises the following steps: presetting time or receiving a request for reading a designated mail from a user; the preset time is set according to actual needs; and the mail sending unit is used for sending the mail saved on the proxy server in the mail downloading unit to the user.
According to the method and the system for extracting the mails, the proxy server can automatically log in the mail box authorized by the user, the mail index words matched with the search keywords are searched in the mail box according to the search keywords, and the specified mails are searched according to the mail index words. The mail searching process can quickly find the mail which needs to be read by the user. And downloading the searched specified mail and storing the specified mail on a proxy server. The proxy server can send the stored mail to the user at a preset time or when receiving a reading request sent by the user. In the implementation process of the method for extracting the mails, the proxy server and the mailbox server communicate based on an http protocol. Compared with the POP3 and IMAP mailbox service protocols, mailbox providers providing mailbox services based on the http protocol are more popular, so the method for extracting the mails can carry out data transmission with mailboxes provided by most mailbox providers to realize the extraction of the mails. The method for extracting the mails can automatically extract the designated mails which need to be read by the user in the plurality of the mailboxes, and does not need the user to manually search each mailbox for searching and reading, thereby facilitating the reading of the designated mails by the user.
In addition, the method and the system for extracting the mails can add steps and units for recording the execution log and monitoring whether the execution log has instruction execution error information. And by recording the execution log, searching whether the execution log records the information of instruction execution errors in real time, and judging whether the currently executed instruction content is matched with the parameters of the service protocol provided by the mailbox provider. If the currently executed instruction is not matched with the service protocol provided by the mailbox provider, the content of the executed instruction is immediately changed, and the mail extraction process can be ensured to be continuously executed.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
FIG. 1 is a flow chart of an embodiment of a method for extracting mail according to the present application;
FIG. 2 is a flowchart of an embodiment of a method for extracting mail with a proxy server as a main body;
FIG. 3 is a block diagram of an embodiment of a system for extracting mails mainly based on a proxy server;
FIG. 4 is a block diagram of a mailbox registration unit in an embodiment of the system for extracting mails according to the present application;
FIG. 5 is a block diagram of a mail download unit in an embodiment of the system for extracting mails according to the present application;
FIG. 6 is a block diagram of a mail providing unit in an embodiment of the system for extracting mails according to the present application;
FIG. 7 is a flow chart of another embodiment of a method for extracting mail that is subject to proxy server according to the present application;
FIG. 8 is a block diagram of a second embodiment of the mail extraction system based on a proxy server according to the present application;
fig. 9 is a structural diagram of an early warning unit in a second embodiment of the system for extracting mails according to the present application.
Detailed Description
The embodiment of the application provides a method and a system for extracting mails.
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a flowchart of an embodiment of a method for extracting mails according to the present application. As shown in fig. 1, the method for extracting the mail includes:
s101: and the proxy server logs in the mailbox server by using the user authorization information.
And the proxy server logs in the mailbox server by using the user authorization information. The authorization information includes: mailbox username and corresponding mailbox password. The authorization information may be authorization information sent by a user, or may be authorization information pre-stored in the proxy server. The authorization information is provided by the user, which may provide the authorization information only once.
The proxy server logs in the mailbox server by using the user authorization information, and can be realized by executing a mailbox login instruction form. Specifically, the method may include the proxy server sending a mailbox login request to a mailbox server. The mailbox login request comprises the following steps: a login request address and authorization information. The login request address can adopt a mailbox login address.
The mailbox login instruction may be in the form of code. The content of the mailbox login instruction can be written based on an http protocol and a mailbox service protocol of a mailbox provider, and the proxy server can perform data transmission with the mailbox server in the form of http protocol transmission data. The specific content of the mailbox login instruction may be different for different mailbox providers. When the mailbox service protocol of the mailbox provider is changed, the content of the mailbox login instruction can be changed correspondingly.
And the proxy server executes the mailbox login instruction, sends a login request to the mailbox server and logs in the mailbox authorized by the user.
S102: and the mailbox server authenticates the authorization information.
And after the mailbox server receives the login request sent by the proxy server, the mailbox server authenticates the proxy server. After the proxy server successfully logs in the mailbox server, the mailbox server keeps the proxy server in a logging state. The mailbox server keeps the proxy server in a login state, and the method comprises the following steps: setting the proxy server to be in a login state within a first preset time length after authentication, wherein the first preset time length is set according to the actual situation 5; or the mailbox server sends temporary data for keeping the login state to the proxy server, and the proxy server carries the temporary data and sends the temporary data to the mailbox server, so that the mailbox server keeps the proxy server in the login state. The temporary data is used for indicating that the proxy server has logged in the mailbox, so that the proxy server can continue to further operate the content in the mailbox. The temporary data may reside on a proxy server.
S103: and the proxy server sends a search request to the mailbox server.
The proxy server sends a search request to the mailbox server, and the search request can be realized by executing a mail search instruction.
The mail search instruction may be in the form of a code. The contents of the mail search instruction may be written based on an http protocol and a mailbox service protocol of a mailbox provider. Thus, the proxy server can search the mailbox server in an http protocol mode. The content of the mail search instruction may be different for different mailbox providers. When the mailbox service protocol of the mailbox provider is changed, the content of the mail search instruction can be changed correspondingly.
The search request may include at least one of: mail search scope, search rules. The search request may also include a search keyword. When the mailbox server feeds back temporary data to the proxy server, the search request may further include the temporary data. The temporary data may indicate that the current proxy server has logged into the mailbox.
The mail search scope includes at least one of: unread mail in the user mailbox, read mail in the user mailbox.
The search keyword may be stored on the proxy server or on the mailbox server. The search keyword is determined according to the designated mail which needs to be read by the user. The search keywords may include keywords describing the subject of the mail, content keywords describing the content of the mail, name keywords describing the name of the sender, address keywords describing the address of the sender, and the like. The search keyword may include one or more. For example, if the designated mail desired by the user includes mails from "three-piece" and "four-piece", the search keyword may select the name keywords "three-piece" and "four-piece".
The search rule may specifically include: and in the searched address range, matching the search keywords with the mail index words according to a preset matching rule, wherein if the search keywords accord with the preset matching rule, the mail corresponding to the mail index word is the specified mail. The mail index word may be provided by a mailbox service provider. The mail index word may include: the words are extracted from the information such as the mail subject, the mail sender name, the sender address, the sending time, the attachment number or the attachment name and the like. The mail index words and the mails have a corresponding relationship, and the corresponding relationship may be a one-to-one relationship, a one-to-many relationship, a many-to-one relationship, or a many-to-many relationship.
The preset matching rule may include at least one of the following matching rules: fuzzy matching rules, single matching rules, and combined matching rules.
The fuzzy matching rule may include: and comparing the mail index word with each search keyword, wherein if the mail index word at least comprises one search keyword, the mail index word conforms to the simple matching rule.
The single matching rule may include: selecting a search keyword from the search keywords, setting the selected search keyword as a forced matching keyword, comparing the mail index word with the forced matching keyword, and if the mail index word contains the forced matching keyword, conforming to the single matching rule.
The combination matching rule may include: selecting at least two search keywords from the search keywords, setting the selected at least two search keywords as compulsory matching keywords, comparing the mail index word with each compulsory matching keyword, and if the mail index word contains all the compulsory matching keywords, conforming to the combined matching rule.
For example:
mailbox a contains three-way incoming mail 1 about a party and a king-sent mail 2 about a party. Mailbox B contains mail 3 about the conference from plum four times. According to the correspondence between the mail index word provided by the mailbox service provider and the mail, the mail index word corresponding to the mail 1 may include: zhang III, party; the mail index word corresponding to the mail 2 may include: xiaowang and Kai; the mail index word corresponding to the mail 3 may include: li Si and Happy party. The correspondence between the mail index word and the mail is shown in table 1, for example.
TABLE 1
If the search keyword is: zhang three, Li four, and Kai Hui. And respectively searching for the specified mails in the mailbox A and the mailbox B according to the search keyword and a preset matching rule.
And comparing the mail index word with each search keyword when the fuzzy matching rule is adopted, wherein if the mail index word at least comprises one search keyword, the simple matching rule is met. The matched mail index words and corresponding mails may be as shown in table 2. The specified mails found by adopting the fuzzy matching rule comprise: mail 1, mail 2, and mail 3.
TABLE 2
When the single matching rule is adopted, one search keyword is selected from the search keywords, and the selected search keyword is set as a forced matching keyword, for example, a user can set the search keyword "meeting" as a forced keyword. And comparing the mail index word with the forced matching keyword, and if the mail index word contains the forced matching keyword, conforming to the single matching rule. The matched mail index words and corresponding mails may be as shown in table 3. The specified mails found by adopting the single matching rule comprise: mail 2 and mail 3.
TABLE 3
When the combined matching rule is adopted, at least two search keywords are selected from the search keywords, and the selected at least two search keywords are set as the forced matching keywords, for example, a user can set the search keywords 'meeting' and 'Liquan' as the forced keywords. And comparing the mail index word with each forced matching keyword, wherein if the mail index word contains all the forced matching keywords, the mail index word accords with the combined matching rule. The matched mail index words and corresponding mails may be as shown in table 4. The specified mails found by adopting the combined matching rule comprise: the mail 3.
TABLE 4
Mailbox Mail index word Corresponding mail
Mail box B Li Si and Kai Hui Mail 3
S104: and the mailbox server searches according to the search request to obtain an appointed mail and sends the information of the appointed mail to the proxy server.
And the mailbox server performs searching operation on the mails in the mailbox according to the searching range, the searching keyword and the searching rule to find out the specified mail.
And after the mailbox server finishes mail searching according to the content of the searching request, feeding back the information of the searched specified mail to the proxy server. The information specifying the mail may include: specifying the storage address of the mail, specifying the subject of the mail, and the like.
For example, if the designated mail searched in table 4 is "mail 3", the mailbox server sends the information of "mail 3" to the proxy server, where the information of "mail 3" may include: the subject of the mail 3, the storage address of the mail 3 on the mailbox server, and the like.
S105: and the proxy server receives the information of the specified mail returned after the mailbox server searches according to the search request.
The proxy server receives the information of the specified mail sent from the mailbox server in S104.
S106: and the proxy server downloads and stores the specified mail according to the information of the specified mail.
The information for specifying the mail includes: specifying the storage address of the mail, specifying the mail name of the mail, and the like. And the proxy server sets a download request address in the mail download instruction according to the information of the specified mail. The storage address of the specified mail on the mailbox server can be set as the download request address in the download instruction.
The proxy server downloads and stores the specified mail according to the information of the specified mail, and can be realized in a mode of executing a mail downloading instruction, including the proxy server sending a downloading request to a mailbox server. The mail download instructions may be in the form of code. The mail download instruction may be written based on an http protocol and a mailbox service protocol of a mailbox provider. The content of the mail download instructions may be different for different mailbox providers. When the mailbox service protocol of the mailbox provider is changed, the content of the mail downloading instruction can be changed correspondingly.
The download request may include: specifying the address of the mail, specifying the subject of the mail. When the mailbox server feeds back temporary data to the proxy server, the download request may further include the temporary data.
The proxy server may download the specified mail and save the specified mail on a storage device of the proxy server.
When the mailbox server feeds back temporary data to the proxy server, the proxy server can delete the temporary data stored in the proxy server after the mail downloading is completed. After the proxy server deletes the temporary data, the mail in the mailbox can be searched and downloaded only by re-executing the mailbox login instruction for login.
S107: and the proxy server sends the saved designated mail to a user.
The proxy server may send the specified mail stored on the proxy server to the user. The proxy server sends the specified mail to the user, and may include:
when the user needs to read the designated mail, the user can send a reading request to the proxy server through the client. When the proxy server receives the reading request of the user, the specified mail stored on the proxy server can be sent to the user.
Or,
the proxy server can actively send the designated mail to the user at a preset time. The preset time can be set according to the actual situation.
On the basis of the first embodiment described above, a second embodiment of the method of extracting mail is described with a proxy server as a main body of the method of implementing the method of extracting mail.
Fig. 2 is a flowchart of an embodiment of a method for extracting mail with a proxy server as a main body according to the present application. As shown in fig. 2, the method for extracting the mail includes:
s201: and the proxy server logs in the mailbox server by using the user authorization information.
And the proxy server logs in the mailbox server by using the user authorization information. The authorization information includes: mailbox username and corresponding mailbox password. The proxy server logs in the mailbox server by using the user authorization information, and can be realized by executing a mailbox login instruction form. Specifically, the method may include the proxy server sending a mailbox login request to a mailbox server. The mailbox login request comprises the following steps: a login request address and authorization information. The login request address can adopt a mailbox login address. And the proxy server executes the mailbox login instruction, sends a login request to the mailbox server and logs in the mailbox authorized by the user. And the mailbox server authenticates the proxy server, and after the proxy server successfully logs in the mailbox server, the mailbox server keeps the proxy server in a logging state.
S202: and the proxy server sends a search request to the mailbox server.
The proxy server sends a search request to the mailbox server, and the search request can be realized by executing a mail search instruction. The search request may include at least one of: mail search scope, search keywords, search rules. When the mailbox server feeds back temporary data to the proxy server, the search request may further include the temporary data. The temporary data may indicate that the current proxy server has logged into the mailbox.
S203: and the proxy server receives the information of the specified mail returned after the mailbox server searches according to the search request.
And the mailbox server performs searching operation on the content in the mailbox according to the searching range, the searching keyword and the searching rule to find out the specified mail. And the mailbox server feeds back the information of the specified mail to the proxy server. The information for specifying the mail includes: specifying the storage address of the mail, specifying the mail name of the mail, and the like.
S204: and the proxy server downloads and stores the specified mail according to the information of the specified mail.
The proxy server downloads and stores the specified mail according to the information of the specified mail, and can be realized in a mode of executing a mail downloading instruction, including the proxy server sending a downloading request to a mailbox server.
And the proxy server sets a download request address in the mail download instruction according to the information of the specified mail. The storage address of the specified mail on the mailbox server can be set as the download request address in the download instruction.
The download request may include: specifying the address of the mail, specifying the subject of the mail. When the mailbox server feeds back temporary data to the proxy server, the download request may further include the temporary data.
The proxy server may download the specified mail and save the specified mail on a storage device of the proxy server. When the mailbox server feeds back temporary data to the proxy server, the proxy server can delete the temporary data stored in the proxy server after the mail downloading is completed. After the proxy server deletes the temporary data, the mail in the mailbox can be searched and downloaded only by re-executing the mailbox login instruction for login.
S205: and the proxy server sends the saved designated mail to the user.
The proxy server may send the specified mail stored on the proxy server to the user. The proxy server sends the specified mail to the user, and may include:
when the user needs to read the designated mail, the user can send a reading request to the proxy server through the client. When the proxy server receives the reading request of the user, the specified mail stored on the proxy server can be sent to the user.
Or,
the proxy server can actively send the designated mail to the user at a preset time. The preset time can be set according to the actual situation.
In the methods of extracting mails disclosed in the first and second embodiments, the proxy server may automatically log in a mailbox authorized by the user, search for a mail index word matching the search keyword in the mailbox according to the search keyword, and then find the designated mail according to the mail index word. The mail searching process can quickly find the mail which needs to be read by the user. And downloading the searched specified mail and storing the specified mail on a proxy server. The proxy server can send the stored mail to the user at a preset time or when receiving a reading request sent by the user. In the implementation process of the method for extracting the mails, the proxy server and the mailbox server communicate based on an http protocol. Compared with the POP3 and IMAP mailbox service protocols, mailbox providers providing mailbox services based on the http protocol are more popular, so the method for extracting the mails can carry out data transmission with mailboxes provided by most mailbox providers to realize the extraction of the mails. The method for extracting the mails can automatically extract the designated mails which need to be read by the user in the plurality of the mailboxes, and does not need the user to manually search each mailbox for searching and reading, thereby facilitating the reading of the designated mails by the user.
Fig. 3 is a block diagram of an embodiment of a system for extracting mails mainly using a proxy server according to the present application. As shown in fig. 3, the extraction mail system includes: a mailbox registration unit 100, a mail search unit 200, an information receiving unit 300, a mail download unit 400, and a mail providing unit 500. Wherein,
the mailbox login unit 100 is configured to log in a mailbox server by using user authorization information, including sending a login request to the mailbox server. The login request may include: a login request address and authorization information. The login request address can adopt a mailbox login address.
The mail searching unit 200 is configured to send a search request to the mailbox server. The search request may include at least one of: mail search scope, search keywords, search rules. When the mailbox server feeds back temporary data to the proxy server, the search request may further include the temporary data.
The information receiving unit 300 is configured to receive information of a specified mail returned by the mailbox server according to the search request. The information specifying the mail may include: specifying the storage address of the mail, specifying the subject of the mail, and the like.
The mail downloading unit 400 is configured to download and store the specified mail according to the information of the specified mail received by the information receiving unit 300, including sending a download request to a mailbox server. The download request may include: specifying the address of the mail, specifying the subject of the mail. When the mailbox server feeds back temporary data to the proxy server, the download request may further include the temporary data.
The mail providing unit 500 is configured to send the specified mail stored by the mail downloading unit 400 to the user.
Fig. 4 is a structural diagram of a mailbox login unit in an embodiment of the system for extracting mails according to the present application. As shown in fig. 4, the mailbox registration unit 100 includes a registration address setting unit 110 and a registration request sending unit 120. Wherein,
the login address setting unit 110 is configured to set a login request address in the mailbox login instruction according to the authorization information.
The login request sending unit 120 is configured to send a login request to a mailbox server to log in a mailbox authorized by a user.
When the mailbox server feeds back temporary data to the proxy server in order to maintain the login state of the proxy server. The mailbox login unit 100 may further include a log information saving unit 130. The login information saving unit 130 is configured to save temporary data fed back by the mailbox server after the proxy server successfully logs in the mailbox server.
Fig. 5 is a structural diagram of a mail downloading unit in the system embodiment for extracting mails according to the present application. As shown in fig. 5, the mail downloading unit 400 may include: download address setting section 410, download request transmitting section 420, and designated mail holding section 430. Wherein,
the download address setting unit 410 may be configured to set a storage address of the mail specified in the information receiving unit as a download request address in the mail download instruction.
The download request sending unit 420 may be configured to send a download request to a mailbox server. .
The designated mail holding unit 430 may be configured to hold the designated mail. The specified mail may be stored on a storage device of the proxy server.
Fig. 6 is a structural diagram of a mail providing unit in the system embodiment for extracting mails according to the present application. As shown in fig. 6, the mail providing unit 500 includes a transmission time setting unit 510 and a mail transmitting unit 520. Wherein,
the sending time setting unit 510 is configured to set a sending time of the mail. The sending time of the mail may include: the preset time or the request of reading the designated mail sent by the user is received. The preset time can be set according to actual needs.
The mail sending unit 520 is configured to send the mail stored in the proxy server in the mail downloading unit 400 to the user who sends the reading request.
The system embodiment for extracting mails mainly using a proxy server disclosed in this embodiment corresponds to the method embodiment for extracting mails mainly using a proxy server, and can realize the process of the method embodiment for extracting mails mainly using a proxy server, thereby achieving the effect of the method embodiment for extracting mails.
Another embodiment of the method for extracting mail based on a proxy server according to the present application is described below.
The communication between the proxy server and the mailbox server is based on an http protocol, and the instruction executed by the proxy server can be written according to the parameters of the mailbox service protocol of the mailbox service provider. In the process of executing the instruction, parameters of a mailbox service protocol of a mailbox provider may change at any time, in order to ensure that the whole process of extracting the mail can be completed, a log reflecting the instruction execution condition can be recorded in the process of executing the instruction, the log is monitored, and when the log records error information of instruction execution, the instruction content is adjusted, so that the whole process of extracting the mail can be ensured to be completed.
Fig. 7 is a flowchart of another embodiment of the method for extracting mail with a proxy server as a main body. As shown in fig. 7, the present embodiment is different from the first embodiment of the method of extracting mail in that the method of extracting mail may further include:
s206: recording a log of the execution instruction of the proxy server, searching whether the log records information of instruction execution error or not in real time, and if the information of instruction execution error is recorded, correspondingly changing the instruction content executed by the proxy server according to the information of instruction execution error.
And recording instruction execution logs, wherein the instruction execution logs comprise a login instruction execution log, a mail search instruction execution log and a mail download instruction execution log which are generated in the process of executing the instructions in S202-S204. And searching whether the information of instruction execution errors is recorded in the log-in instruction execution log, the mail search instruction execution log and the mail download instruction execution log in real time. If the log records the information of instruction execution error, the currently executed instruction content is not matched with the service protocol parameters provided by the mailbox provider, and the data transmission between the proxy server and the mailbox server cannot be realized. And correspondingly changing the executed instruction content according to the instruction execution error information so as to ensure that the currently executed mail extraction process is continuously executed.
The log records information of instruction execution errors, and may include: the error code is recorded in the log. The error code may be generated when the executed instruction does not match a parameter of a service agreement provided by the mailbox provider.
Compared with the second embodiment of the method for extracting the mails, the method for extracting the mails has the advantages that the steps of recording the execution log and monitoring whether the execution log has instruction execution error information or not are added. The execution log includes: log instruction execution log, mail search instruction execution log, and mail download instruction execution log. And by recording the execution log, searching whether the execution log records the information of instruction execution errors in real time, and judging whether the currently executed instruction is matched with the parameters of the service protocol provided by the mailbox provider. If the currently executed instruction is not matched with the parameters in the service protocol provided by the mailbox provider, the content of the executed instruction is immediately changed, and the mail extraction process can be ensured to be continuously executed.
Fig. 8 is a configuration diagram of a second embodiment of the mail extraction system mainly including a proxy server according to the present application. As shown in fig. 8, the present embodiment is different from the first embodiment of the system for extracting mail in that the system for extracting mail further includes: an early warning unit 600.
The early warning unit 600 is configured to record a log of the instruction executed by the proxy server, search whether an instruction execution error message is recorded in the log in real time, and if an instruction execution error message is recorded, correspondingly change the instruction content executed by the proxy server according to the instruction execution error message.
Fig. 9 is a structural diagram of an early warning unit in a second embodiment of the system for extracting mails according to the present application. As shown in fig. 9, the early warning unit 600 includes: a log recording unit 610, an error information searching unit 620, an instruction content changing unit 630 and an instruction content returning unit 640. Wherein,
the log recording unit 610 is configured to record instruction execution logs generated by the mailbox logging unit 100, the mail searching unit 200, and the mail downloading unit 400. The instruction execution log may include: log instruction execution log, mail search instruction execution log, and mail download instruction execution log.
The error information searching unit 620 is configured to check the content of the instruction execution log recorded by the log recording unit 610 in real time, and determine whether an error occurs in the process of executing the instruction by the mailbox logging unit 100, the mail searching unit 200, and the mail downloading unit 400 according to the content of the instruction execution log. The occurrence of the error may be manifested as an error code recorded in the execution log, which may be generated when the content of the executed instruction does not match the parameters of the service protocol provided by the mailbox provider.
The instruction content changing unit 630 is configured to, when the instruction execution log recorded by the error information searching unit 620 finds the information of the instruction execution error, immediately change the content of the corresponding execution instruction according to the information of the instruction execution error, so as to ensure that the changed instruction content does not generate the information of the instruction execution error in the execution process.
The instruction content returning unit 640 is configured to return the instruction content modified by the instruction modifying unit 630 to the corresponding system unit. The respective system unit may include: a mailbox registration unit 100, a mail search unit 200, and a mail download unit 400.
The second embodiment of the mail extracting system with the proxy server as the main body corresponds to another embodiment of the mail extracting method with the proxy server as the main body, and an early warning unit is added on the basis of the first embodiment of the mail extracting system, and can record and monitor the instruction execution condition in the mail extracting process to ensure that the mail extracting process can be completed.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate a dedicated integrated circuit chip 2. Furthermore, nowadays, instead of manually making an integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Language Description Language), traffic, pl (core unified Programming Language), HDCal, JHDL (Java Hardware Description Language), langue, Lola, HDL, laspam, hardsradware (Hardware Description Language), vhjhd (Hardware Description Language), and vhigh-Language, which are currently used in most popular applications. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: the ARC625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. With this understanding in mind, the present solution, or portions thereof that contribute to the prior art, may be embodied in the form of a software product, which in a typical configuration includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The computer software product may include instructions for causing a computing device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in the various embodiments or portions of embodiments of the present application. The computer software product may be stored in a memory, which may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium. Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transient media), such as modulated data signals and carrier waves.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
While the present application has been described with examples, those of ordinary skill in the art will appreciate that there are numerous variations and permutations of the present application without departing from the spirit of the application, and it is intended that the appended claims encompass such variations and permutations without departing from the spirit of the application.

Claims (17)

1. A method of extracting mail, comprising:
the proxy server logs in the mailbox server by using the user authorization information;
the mailbox server authenticates the authorization information;
the proxy server sends a search request to the mailbox server;
the mailbox server searches according to the search request to obtain an appointed mail and sends the information of the appointed mail to the proxy server;
the proxy server receives the information of the specified mail returned after the mailbox server searches according to the search request;
the proxy server downloads and stores the specified mail according to the information of the specified mail;
and the proxy server sends the saved designated mail to the user.
2. A method of extracting mail, comprising:
the proxy server logs in the mailbox server by using the user authorization information;
the proxy server sends a search request to the mailbox server;
the proxy server receives the information of the specified mail returned after the mailbox server searches according to the search request;
the proxy server downloads and stores the specified mail according to the information of the specified mail;
and the proxy server sends the saved designated mail to the user.
3. The method as claimed in claim 2, wherein the proxy server sends the search request to the mailbox server, and the proxy server downloads and stores the specific mail, further comprising:
and the proxy server carries temporary data returned after the mailbox server successfully authenticates and sends the temporary data to the mailbox server.
4. The method of claim 2, wherein the proxy server sends the saved designated mail to the user, comprising:
when the proxy server receives a reading request of a user, the stored designated mail is sent to the user;
or,
and the proxy server sends the appointed mail to the user when the second preset time is up.
5. The method of claim 2, wherein the search request comprises at least one of: mail search scope, search keywords, search rules.
6. The method of claim 5, wherein the mail search scope comprises at least one of: unread mail in the user mailbox, read mail in the user mailbox.
7. The method for extracting mail according to claim 2, wherein the user authorization information includes: authorization information pre-stored on the proxy server, or authorization information sent by the user.
8. The method of claim 2, wherein the user authorization information comprises a mailbox username and a corresponding mailbox password.
9. The method for extracting mails according to claim 2, wherein said information for specifying mails comprises: specifying the storage address of the mail and specifying the subject of the mail.
10. The method of claim 5, wherein the search rule comprises: and in the searched address range, matching the search keywords with the mail index words according to a preset matching rule, wherein if the search keywords accord with the preset matching rule, the mail corresponding to the mail index word is the specified mail.
11. The method of claim 10, wherein the preset matching rule at least comprises one of the following matching rules:
(A) fuzzy matching rules; the method comprises the following steps: comparing the mail index word with each search keyword, and if the mail index word at least comprises one search keyword, conforming to the simple matching rule;
(B) a single matching rule; the method comprises the following steps: setting one of the search keywords as a forced matching keyword, comparing the mail index word with the forced matching keyword, and if the mail index word contains the forced matching keyword, conforming to the single matching rule;
(C) combining the matching rules; the method comprises the following steps: setting at least two search keywords in the search keywords as forced matching keywords, comparing the mail index word with each forced matching keyword, and if the mail index word contains all the forced matching keywords, conforming to the combined matching rule.
12. The method of claim 2, wherein the communication between the proxy server and the mailbox server is based on hypertext transfer protocol.
13. A system for extracting mail, comprising: the mail box comprises a mail box login unit, a mail searching unit, an information receiving unit, a mail downloading unit and a mail providing unit; wherein,
the mailbox login unit is used for logging in a mailbox server by using user authorization information;
the mail searching unit is used for sending a searching request to the mailbox server;
the information receiving unit is used for receiving the information of the specified mails returned by the mailbox server according to the search request;
the mail downloading unit is used for downloading and storing the specified mail according to the information of the specified mail received by the information receiving unit;
and the mail providing unit is used for sending the saved specified mail to the user.
14. The system for extracting mails according to claim 13, wherein said mailbox registration unit comprises: a login address setting unit and a login request sending unit; wherein,
the login address setting unit is used for setting a login request address in a mailbox login instruction according to the authorization receiving information;
and the login request sending unit is used for sending a login request to the mailbox server to log in the mailbox authorized by the user.
15. The system for extracting mails according to claim 14, wherein said mailbox login unit further comprises a save login information unit; and the login information storage unit is used for storing temporary data fed back by the mailbox server after the proxy server successfully logs in the mailbox server.
16. The system for extracting mail according to claim 13, wherein said mail downloading unit comprises: a download address setting unit, a download request sending unit and a designated mail storage unit; wherein,
the download address setting unit is used for setting the storage address of the designated mail in the information receiving unit as a download request address in the mail download instruction;
the download request sending unit is used for sending a download request to the mailbox server;
and the designated mail storage unit is used for storing the designated mail.
17. The system for extracting mail according to claim 13, wherein the mail providing unit includes: a transmission time setting unit and a mail transmission unit; wherein,
the sending time setting unit is used for setting the sending time of the mail; the sending time of the mail comprises the following steps: presetting time or receiving a request for reading a designated mail from a user; the preset time is set according to actual needs;
and the mail sending unit is used for sending the mail saved on the proxy server in the mail downloading unit to the user.
CN201410141635.3A 2014-04-10 2014-04-10 E-mail extraction method and system Pending CN104980469A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410141635.3A CN104980469A (en) 2014-04-10 2014-04-10 E-mail extraction method and system
HK16101013.3A HK1213112A1 (en) 2014-04-10 2016-01-29 Method and system for extracting email

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410141635.3A CN104980469A (en) 2014-04-10 2014-04-10 E-mail extraction method and system

Publications (1)

Publication Number Publication Date
CN104980469A true CN104980469A (en) 2015-10-14

Family

ID=54276569

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410141635.3A Pending CN104980469A (en) 2014-04-10 2014-04-10 E-mail extraction method and system

Country Status (2)

Country Link
CN (1) CN104980469A (en)
HK (1) HK1213112A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196850A (en) * 2017-05-19 2017-09-22 网易(杭州)网络有限公司 A kind of method and apparatus for preserving Email attachment
CN110837996A (en) * 2018-08-16 2020-02-25 深圳市唯德科创信息有限公司 Method and system for intelligently analyzing and managing mails
CN110855698A (en) * 2019-11-19 2020-02-28 成都知道创宇信息技术有限公司 Terminal information obtaining method, device, server and storage medium
CN111628927A (en) * 2020-05-28 2020-09-04 泰康保险集团股份有限公司 Mail management method and device, storage medium and electronic terminal
CN112433989A (en) * 2020-12-14 2021-03-02 国网辽宁省电力有限公司葫芦岛供电公司 System and method for automatically collecting e-mails based on web mode
CN113435862A (en) * 2021-07-20 2021-09-24 支付宝(杭州)信息技术有限公司 Bill processing method and device based on mailbox
CN114172860A (en) * 2020-09-11 2022-03-11 华为技术有限公司 Mail processing method and device
CN118691095A (en) * 2024-08-26 2024-09-24 九科信息技术(深圳)有限公司 Method, device, server and storage medium for generating company risk assessment report

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1312509A (en) * 2001-04-29 2001-09-12 国家数字交换系统工程技术研究中心 Automatic e-mail treatment method and device
US20020065892A1 (en) * 2000-11-30 2002-05-30 Malik Dale W. Method and apparatus for minimizing storage of common attachment files in an e-mail communications server
CN101072197A (en) * 2007-03-30 2007-11-14 腾讯科技(深圳)有限公司 Method and system for integrating electronic mails provided by multi servicers
CN101150529A (en) * 2006-09-21 2008-03-26 腾讯科技(深圳)有限公司 A method and system for mail search
CN102761843A (en) * 2012-08-10 2012-10-31 上海洲信信息技术有限公司 System and method for mobile terminal user to obtain mails and based on full-text search and WAPPUSH
CN103607342A (en) * 2013-11-07 2014-02-26 北京奇虎科技有限公司 Mail content loading method and apparatus
CN103634420A (en) * 2013-11-22 2014-03-12 北京极客优才科技有限公司 Resume e-mail screening system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020065892A1 (en) * 2000-11-30 2002-05-30 Malik Dale W. Method and apparatus for minimizing storage of common attachment files in an e-mail communications server
CN1312509A (en) * 2001-04-29 2001-09-12 国家数字交换系统工程技术研究中心 Automatic e-mail treatment method and device
CN101150529A (en) * 2006-09-21 2008-03-26 腾讯科技(深圳)有限公司 A method and system for mail search
CN101072197A (en) * 2007-03-30 2007-11-14 腾讯科技(深圳)有限公司 Method and system for integrating electronic mails provided by multi servicers
CN102761843A (en) * 2012-08-10 2012-10-31 上海洲信信息技术有限公司 System and method for mobile terminal user to obtain mails and based on full-text search and WAPPUSH
CN103607342A (en) * 2013-11-07 2014-02-26 北京奇虎科技有限公司 Mail content loading method and apparatus
CN103634420A (en) * 2013-11-22 2014-03-12 北京极客优才科技有限公司 Resume e-mail screening system and method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196850A (en) * 2017-05-19 2017-09-22 网易(杭州)网络有限公司 A kind of method and apparatus for preserving Email attachment
CN110837996A (en) * 2018-08-16 2020-02-25 深圳市唯德科创信息有限公司 Method and system for intelligently analyzing and managing mails
CN110855698A (en) * 2019-11-19 2020-02-28 成都知道创宇信息技术有限公司 Terminal information obtaining method, device, server and storage medium
CN111628927A (en) * 2020-05-28 2020-09-04 泰康保险集团股份有限公司 Mail management method and device, storage medium and electronic terminal
CN114172860A (en) * 2020-09-11 2022-03-11 华为技术有限公司 Mail processing method and device
CN112433989A (en) * 2020-12-14 2021-03-02 国网辽宁省电力有限公司葫芦岛供电公司 System and method for automatically collecting e-mails based on web mode
CN113435862A (en) * 2021-07-20 2021-09-24 支付宝(杭州)信息技术有限公司 Bill processing method and device based on mailbox
CN118691095A (en) * 2024-08-26 2024-09-24 九科信息技术(深圳)有限公司 Method, device, server and storage medium for generating company risk assessment report

Also Published As

Publication number Publication date
HK1213112A1 (en) 2016-06-24

Similar Documents

Publication Publication Date Title
CN104980469A (en) E-mail extraction method and system
US10986062B2 (en) Subscription transfer
US10320623B2 (en) Techniques for tracking resource usage statistics per transaction across multiple layers of protocols
WO2016206600A1 (en) Information flow data processing method and device
US8862675B1 (en) Method and system for asynchronous analysis of URLs in messages in a live message processing environment
US10084734B2 (en) Automated spam filter updating by tracking user navigation
US9253133B2 (en) Message thread identification and management
US20110314064A1 (en) Notifications Platform
US9876744B2 (en) Information sending method and information sending apparatus
JP2017509048A (en) Anti-malware type mobile content data management apparatus and method
US10693820B2 (en) Adding images to a text based electronic message
US20170155607A1 (en) Electronic message conglomeration
WO2017152765A1 (en) Automatic fusing-based message sending method, device and system
US9176970B2 (en) Processing electronic messages
US20170005965A1 (en) Information sending method and information sending apparatus
US10250543B2 (en) Deduplication of e-mail content by an e-mail server
US10069780B2 (en) Methods and systems for structuring information of email messages
US20200396615A1 (en) Messaging source verification method, apparatus, and system
US10243900B2 (en) Using private tokens in electronic messages associated with a subscription-based messaging service
US11531716B2 (en) Resource distribution based upon search signals
CN104683213A (en) A mail sending method and device
CN111078697B (en) Data storage method and device, storage medium and electronic equipment
CN104811418A (en) Virus detection method and apparatus
US20180191852A1 (en) Intelligently delivering notifications including summary of followed content and related content
US20170324800A1 (en) Adding contextual clarity to shared links

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1213112

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20151014

RJ01 Rejection of invention patent application after publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1213112

Country of ref document: HK