CN101330377B - Method for conveying secret mail - Google Patents

Method for conveying secret mail Download PDF

Info

Publication number
CN101330377B
CN101330377B CN200710123034XA CN200710123034A CN101330377B CN 101330377 B CN101330377 B CN 101330377B CN 200710123034X A CN200710123034X A CN 200710123034XA CN 200710123034 A CN200710123034 A CN 200710123034A CN 101330377 B CN101330377 B CN 101330377B
Authority
CN
China
Prior art keywords
mail
appended document
encryption
transfer approach
appended
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200710123034XA
Other languages
Chinese (zh)
Other versions
CN101330377A (en
Inventor
林峻德
沈一弘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Compal Electronics Inc
Original Assignee
Compal Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Compal Electronics Inc filed Critical Compal Electronics Inc
Priority to CN200710123034XA priority Critical patent/CN101330377B/en
Publication of CN101330377A publication Critical patent/CN101330377A/en
Application granted granted Critical
Publication of CN101330377B publication Critical patent/CN101330377B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a method for delivering a confidential mail. The method comprises the following steps: firstly reading a first mail by a mail application program; judging whether an appended document has an encryption setting or not if the first mail is provided with the appended document, wherein an address set by the encryption is found according to the format of the appended document; judging whether the encryption setting address is powered or not, if so, representing the appended document having the encryption setting, and then opening a second mail for sending a password of the appended document if the appended document has encryption set; and loading a receiver of the first mail to the second mail to send off the second mail.

Description

The transfer approach of secret mail
Technical field
The present invention relates to a kind of transfer approach of secret mail, the transfer approach of the secret mail in particularly a kind of local area-specific network.
Background technology
Quick transition along with the company information environment, information security events emerges in an endless stream in recent years, wherein many is mail security problems about enterprises, this focus that also allows information security pay close attention to was the malicious link attack of Passive Defence outside by the past, turned to the keyholed back plate of initiatively paying attention to internal applications and data security.Point out according to Forrester Research survey report in 2005; 35% the suspection employee of enterprise can be leaked confidential data by Email; wherein; post outward the managing risk that has finance or legality up to 25% mail is arranged in the mail; therefore beyond enterprise's threat that internally transmission of (Incoming) information causes except passive protection, more initiatively keyholed back plate comes from the hiding crisis of interior externally (Outgoing) information contact.
In addition, owing to can in the lump send appended document among the Email of posting outward, therefore the employee can use the classified papers of E-mail conveyance enterprises easily, if the appended document of mail by malicious intercepted, will cause the situation that enterprise's secret is leaked to become even more serious in the transmission way.
Therefore, need the transfer approach of a new secret mail, guarantee the fail safe of mail appended document in the transmission way, make unlikely the leaking of content of appended document, reduce the danger that enterprise's secret is leaked.
Summary of the invention
Main purpose of the present invention is, a kind of transfer approach of secret mail is provided, and appended document and password can be separated transmission, even secret mail suffers malicious intercepted, and also unlikely the leaking of secret that is comprised in the appended document.In addition, the person that posts the part does not need to repeat to import the addresses of items of mail of receiver, and the password that can send appended document is to receiver.
To achieve these goals, according to one embodiment of the invention, the transfer approach of secret mail at first reads one first mail by a mail applications, if this first mail has an appended document, judge then whether this appended document has one and encrypt setting, wherein be to find out the address that this encryption is set, judge that on behalf of this appended document, whether this encryption setting address is enabled, then have this encryption setting if be enabled according to the form of this appended document.If finding that this appended document has to encrypt sets, then open one second mail transmitting the password of this appended document, and the receiver that loads first mail second mail so far, to send second mail.
The transfer approach of the secret mail among the present invention, appended document and password not only can be separated transmission, lowered the risk that secret leaked when appended document was blocked, the addresses of items of mail that can also load receiver automatically is to transmit mail, do not need to repeat to import the addresses of items of mail of receiver, increased the convenience when using.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
Fig. 1 is the flow chart of a kind of secret mail transfer approach of one embodiment of the invention;
Fig. 2 is the detailed execution in step of the encryption determining step of one embodiment of the invention.
Wherein, Reference numeral:
The 101-first mail read step
103-appended document determining step
105-encrypts determining step
The 107-second mail edit step
109-second mail is sent step
111-unencryption mail treatment step
201-password setting address searching step
203-password setting determining step
Embodiment
Please refer to Fig. 1, this is the flow chart of a kind of secret mail transfer approach of one embodiment of the invention.Secret mail transfer approach among the present invention is by the mail applications on the main frame, for example the outlook application program is carried out, its step is the first mail read step 101, appended document determining step 103 in regular turn, encrypt determining step 105, the second mail edit step 107, second mail are sent step 109, and a unencryption mail treatment step 111.
When the user opened a mail applications and sends one first mail, this mail applications can be carried out first mail read step 101 earlier, reads this first mail; Then, carry out appended document determining step 103, judge whether have an appended document in first mail.If mail applications finds to have appended document in this first mail, then then carry out encryption determining step 105 and judge whether this appended document has encryption and set.
If having to encrypt, this appended document sets, then this mail applications can be carried out the second mail edit step 107, send first mail earlier with appended document, and open one second mail and come the requirement user to write the password of appended document, this moment, this second mail can load the receiver addresses of items of mail of this first mail automatically, then, mail applications can be carried out second mail and send step 109, to send this second mail that transmits the appended document password, that is to say, appended document and its password transmit with two envelope mails respectively, can avoid when appended document during by malicious intercepted, and the interceptor can directly access to your password and open appended document.
In the middle of encryption determining step 105,, then carry out unencryption mail treatment step 111 if mail applications is found appended document and unencryption.In the middle of unencryption mail treatment step 111, the mode of multiple processing unencryption mail is arranged, wherein a kind of is directly to send first mail with unencryption appended document.This processing mode is fit to be used for handling the lower appended document of confidentiality, for example private letter of enterprise staff etc.
Another processing mode, then be that the requirement user encrypts for appended document, after the user encrypts this appended document, just continue to carry out second mail edit step 107 and the subsequent step, thereby send first mail with appended document and second mail with password.This method go for confidentiality be in high appended document, the proposal of enterprise for example, research and development of products time-histories table etc.In addition, also having a kind of processing mode, is when the appended document unencryption, does not send any mail and directly finishes mail applications, this mode goes for the high appended document of confidentiality, sends mail again after forcing the user for each appended document encryption.
See also Fig. 2, this is the detailed execution in step of the encryption determining step 105 of one embodiment of the invention.When judging that appended document is denied encrypted, mail applications at first can be carried out password setting address searching step 201, finds out corresponding password setting address according to the form of appended document.For example find out the password setting address of word file, PowerPoint file, picture file, Excel file.Carry out password setting determining step 203 then, judge this password setting address whether be enabled (enable).If be enabled, then represent this appended document to be set password, then mail applications will carry out second mail edit step 107 and the subsequent step.Otherwise, then represent appended document not to be set password, mail applications will carry out unencryption mail treatment step 111 and handle this not encrypted appended document.
Embodiment by the invention described above as can be known, the transfer approach of the secret mail among the present invention, the appended document that can remind user's privacy enhanced mail to be comprised, and appended document and password separated transmission, lowered the risk that secret leaked when appended document was blocked; Simultaneously, the addresses of items of mail that can also load receiver does not automatically need to repeat to import the addresses of items of mail of receiver to transmit password, has increased the convenience when using.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.

Claims (9)

1. the transfer approach of a secret mail is characterized in that, comprises:
Read one first mail by a mail applications;
Whether an appended document of judging this first mail has an encryption setting, wherein be to find out the address that this encryption is set according to the form of this appended document, judge that on behalf of this appended document, whether this encryption setting address is enabled, then have this encryption setting if be enabled;
If this appended document has this encryptions setting, then open one second mail transmitting the password of this appended document, and the receiver that loads this first mail is to this second mail, to send this second mail.
2. transfer approach as claimed in claim 1 is characterized in that, also comprises when this appended document has this encryption setting, sends this first mail with this appended document.
3. transfer approach as claimed in claim 1 is characterized in that, also comprises when this appended document when this encryption is set, and sends this first mail with this appended document.
4. transfer approach as claimed in claim 1 is characterized in that, also comprises when this appended document when this encryption is set, and requires a user to encrypt this appended document.
5. transfer approach as claimed in claim 1 is characterized in that, also comprises when this appended document when this encryption is set, and finishes this mail applications.
6. transfer approach as claimed in claim 1 is characterized in that this mail applications is carried out on a main frame.
7. transfer approach as claimed in claim 1 is characterized in that, this appended document is a text.
8. transfer approach as claimed in claim 1 is characterized in that, this appended document is a PowerPoint file.
9. transfer approach as claimed in claim 1 is characterized in that, this appended document is a picture file.
CN200710123034XA 2007-06-22 2007-06-22 Method for conveying secret mail Expired - Fee Related CN101330377B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200710123034XA CN101330377B (en) 2007-06-22 2007-06-22 Method for conveying secret mail

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200710123034XA CN101330377B (en) 2007-06-22 2007-06-22 Method for conveying secret mail

Publications (2)

Publication Number Publication Date
CN101330377A CN101330377A (en) 2008-12-24
CN101330377B true CN101330377B (en) 2011-05-04

Family

ID=40205989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200710123034XA Expired - Fee Related CN101330377B (en) 2007-06-22 2007-06-22 Method for conveying secret mail

Country Status (1)

Country Link
CN (1) CN101330377B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833181B (en) * 2011-12-08 2015-12-16 上海华御信息技术有限公司 E-mail processing method and system
CN104317976A (en) * 2014-11-21 2015-01-28 四川智诚天逸科技有限公司 Method for storing information

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1329407A (en) * 2000-06-14 2002-01-02 索尼公司 Information processing equipment and method, information management system and program storage medium
CN1722710A (en) * 2004-11-23 2006-01-18 杭州华为三康技术有限公司 E-mail management system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1329407A (en) * 2000-06-14 2002-01-02 索尼公司 Information processing equipment and method, information management system and program storage medium
CN1722710A (en) * 2004-11-23 2006-01-18 杭州华为三康技术有限公司 E-mail management system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CN 1329407 A,全文.

Also Published As

Publication number Publication date
CN101330377A (en) 2008-12-24

Similar Documents

Publication Publication Date Title
US11044267B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US11722513B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US20210344724A1 (en) Systems and Methods for Protecting Contents and Accounts
US11412385B2 (en) Methods for a secure mobile text message and object sharing application and system
US9852276B2 (en) System and methods for validating and managing user identities
US10540637B2 (en) Intelligent, context-based delivery of sensitive email content to mobile devices
US20100077205A1 (en) System and Method for Cipher E-Mail Protection
CN101944168A (en) Electronic file authority control and management system
US10462185B2 (en) Policy-managed secure code execution and messaging for computing devices and computing device security
CN105227570A (en) A kind of safe e-mail system of integrated campaign
US9967242B2 (en) Rich content scanning for non-service accounts for email delivery
Milligan et al. Business risks and security assessment for mobile devices
CN101330377B (en) Method for conveying secret mail
NL2011857C2 (en) Secure single sign-on exchange of electronic data.
CN109033872A (en) A kind of secure operating environment building method of identity-based
CN106936686A (en) A kind of immediate communication platform for supporting safety moving to handle official business
Om Secure email gateway
Romansky Internet of Things and User Privacy Protection
Feigelson et al. New Federal Guidance on Cybersecurity for Mobile Devices
Harauz et al. A new era of presidential security: The president and his blackberry
US20240195630A1 (en) System and method of privacy-aware inter-channel communication between a business entity and a person
CN101957895A (en) External rights control management system of electronic record and method thereof
Brashear et al. UNITED STATES DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Al-Haiqi et al. Insider threats+ disruptive smart phone technology= new challenges to corporate security
Sakurai et al. Actual condition and issues for mobile security system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110504

Termination date: 20170622