CN101330377B - Method for conveying secret mail - Google Patents
Method for conveying secret mail Download PDFInfo
- Publication number
- CN101330377B CN101330377B CN200710123034XA CN200710123034A CN101330377B CN 101330377 B CN101330377 B CN 101330377B CN 200710123034X A CN200710123034X A CN 200710123034XA CN 200710123034 A CN200710123034 A CN 200710123034A CN 101330377 B CN101330377 B CN 101330377B
- Authority
- CN
- China
- Prior art keywords
- appended document
- encryption
- transfer approach
- appended
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to a method for delivering a confidential mail. The method comprises the following steps: firstly reading a first mail by a mail application program; judging whether an appended document has an encryption setting or not if the first mail is provided with the appended document, wherein an address set by the encryption is found according to the format of the appended document; judging whether the encryption setting address is powered or not, if so, representing the appended document having the encryption setting, and then opening a second mail for sending a password of the appended document if the appended document has encryption set; and loading a receiver of the first mail to the second mail to send off the second mail.
Description
Technical field
The present invention relates to a kind of transfer approach of secret mail, the transfer approach of the secret mail in particularly a kind of local area-specific network.
Background technology
Quick transition along with the company information environment, information security events emerges in an endless stream in recent years, wherein many is mail security problems about enterprises, this focus that also allows information security pay close attention to was the malicious link attack of Passive Defence outside by the past, turned to the keyholed back plate of initiatively paying attention to internal applications and data security.Point out according to Forrester Research survey report in 2005; 35% the suspection employee of enterprise can be leaked confidential data by Email; wherein; post outward the managing risk that has finance or legality up to 25% mail is arranged in the mail; therefore beyond enterprise's threat that internally transmission of (Incoming) information causes except passive protection, more initiatively keyholed back plate comes from the hiding crisis of interior externally (Outgoing) information contact.
In addition, owing to can in the lump send appended document among the Email of posting outward, therefore the employee can use the classified papers of E-mail conveyance enterprises easily, if the appended document of mail by malicious intercepted, will cause the situation that enterprise's secret is leaked to become even more serious in the transmission way.
Therefore, need the transfer approach of a new secret mail, guarantee the fail safe of mail appended document in the transmission way, make unlikely the leaking of content of appended document, reduce the danger that enterprise's secret is leaked.
Summary of the invention
Main purpose of the present invention is, a kind of transfer approach of secret mail is provided, and appended document and password can be separated transmission, even secret mail suffers malicious intercepted, and also unlikely the leaking of secret that is comprised in the appended document.In addition, the person that posts the part does not need to repeat to import the addresses of items of mail of receiver, and the password that can send appended document is to receiver.
To achieve these goals, according to one embodiment of the invention, the transfer approach of secret mail at first reads one first mail by a mail applications, if this first mail has an appended document, judge then whether this appended document has one and encrypt setting, wherein be to find out the address that this encryption is set, judge that on behalf of this appended document, whether this encryption setting address is enabled, then have this encryption setting if be enabled according to the form of this appended document.If finding that this appended document has to encrypt sets, then open one second mail transmitting the password of this appended document, and the receiver that loads first mail second mail so far, to send second mail.
The transfer approach of the secret mail among the present invention, appended document and password not only can be separated transmission, lowered the risk that secret leaked when appended document was blocked, the addresses of items of mail that can also load receiver automatically is to transmit mail, do not need to repeat to import the addresses of items of mail of receiver, increased the convenience when using.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
Fig. 1 is the flow chart of a kind of secret mail transfer approach of one embodiment of the invention;
Fig. 2 is the detailed execution in step of the encryption determining step of one embodiment of the invention.
Wherein, Reference numeral:
The 101-first mail read step
103-appended document determining step
105-encrypts determining step
The 107-second mail edit step
109-second mail is sent step
111-unencryption mail treatment step
201-password setting address searching step
203-password setting determining step
Embodiment
Please refer to Fig. 1, this is the flow chart of a kind of secret mail transfer approach of one embodiment of the invention.Secret mail transfer approach among the present invention is by the mail applications on the main frame, for example the outlook application program is carried out, its step is the first mail read step 101, appended document determining step 103 in regular turn, encrypt determining step 105, the second mail edit step 107, second mail are sent step 109, and a unencryption mail treatment step 111.
When the user opened a mail applications and sends one first mail, this mail applications can be carried out first mail read step 101 earlier, reads this first mail; Then, carry out appended document determining step 103, judge whether have an appended document in first mail.If mail applications finds to have appended document in this first mail, then then carry out encryption determining step 105 and judge whether this appended document has encryption and set.
If having to encrypt, this appended document sets, then this mail applications can be carried out the second mail edit step 107, send first mail earlier with appended document, and open one second mail and come the requirement user to write the password of appended document, this moment, this second mail can load the receiver addresses of items of mail of this first mail automatically, then, mail applications can be carried out second mail and send step 109, to send this second mail that transmits the appended document password, that is to say, appended document and its password transmit with two envelope mails respectively, can avoid when appended document during by malicious intercepted, and the interceptor can directly access to your password and open appended document.
In the middle of encryption determining step 105,, then carry out unencryption mail treatment step 111 if mail applications is found appended document and unencryption.In the middle of unencryption mail treatment step 111, the mode of multiple processing unencryption mail is arranged, wherein a kind of is directly to send first mail with unencryption appended document.This processing mode is fit to be used for handling the lower appended document of confidentiality, for example private letter of enterprise staff etc.
Another processing mode, then be that the requirement user encrypts for appended document, after the user encrypts this appended document, just continue to carry out second mail edit step 107 and the subsequent step, thereby send first mail with appended document and second mail with password.This method go for confidentiality be in high appended document, the proposal of enterprise for example, research and development of products time-histories table etc.In addition, also having a kind of processing mode, is when the appended document unencryption, does not send any mail and directly finishes mail applications, this mode goes for the high appended document of confidentiality, sends mail again after forcing the user for each appended document encryption.
See also Fig. 2, this is the detailed execution in step of the encryption determining step 105 of one embodiment of the invention.When judging that appended document is denied encrypted, mail applications at first can be carried out password setting address searching step 201, finds out corresponding password setting address according to the form of appended document.For example find out the password setting address of word file, PowerPoint file, picture file, Excel file.Carry out password setting determining step 203 then, judge this password setting address whether be enabled (enable).If be enabled, then represent this appended document to be set password, then mail applications will carry out second mail edit step 107 and the subsequent step.Otherwise, then represent appended document not to be set password, mail applications will carry out unencryption mail treatment step 111 and handle this not encrypted appended document.
Embodiment by the invention described above as can be known, the transfer approach of the secret mail among the present invention, the appended document that can remind user's privacy enhanced mail to be comprised, and appended document and password separated transmission, lowered the risk that secret leaked when appended document was blocked; Simultaneously, the addresses of items of mail that can also load receiver does not automatically need to repeat to import the addresses of items of mail of receiver to transmit password, has increased the convenience when using.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.
Claims (9)
1. the transfer approach of a secret mail is characterized in that, comprises:
Read one first mail by a mail applications;
Whether an appended document of judging this first mail has an encryption setting, wherein be to find out the address that this encryption is set according to the form of this appended document, judge that on behalf of this appended document, whether this encryption setting address is enabled, then have this encryption setting if be enabled;
If this appended document has this encryptions setting, then open one second mail transmitting the password of this appended document, and the receiver that loads this first mail is to this second mail, to send this second mail.
2. transfer approach as claimed in claim 1 is characterized in that, also comprises when this appended document has this encryption setting, sends this first mail with this appended document.
3. transfer approach as claimed in claim 1 is characterized in that, also comprises when this appended document when this encryption is set, and sends this first mail with this appended document.
4. transfer approach as claimed in claim 1 is characterized in that, also comprises when this appended document when this encryption is set, and requires a user to encrypt this appended document.
5. transfer approach as claimed in claim 1 is characterized in that, also comprises when this appended document when this encryption is set, and finishes this mail applications.
6. transfer approach as claimed in claim 1 is characterized in that this mail applications is carried out on a main frame.
7. transfer approach as claimed in claim 1 is characterized in that, this appended document is a text.
8. transfer approach as claimed in claim 1 is characterized in that, this appended document is a PowerPoint file.
9. transfer approach as claimed in claim 1 is characterized in that, this appended document is a picture file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710123034XA CN101330377B (en) | 2007-06-22 | 2007-06-22 | Method for conveying secret mail |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710123034XA CN101330377B (en) | 2007-06-22 | 2007-06-22 | Method for conveying secret mail |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101330377A CN101330377A (en) | 2008-12-24 |
CN101330377B true CN101330377B (en) | 2011-05-04 |
Family
ID=40205989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200710123034XA Expired - Fee Related CN101330377B (en) | 2007-06-22 | 2007-06-22 | Method for conveying secret mail |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101330377B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102833181B (en) * | 2011-12-08 | 2015-12-16 | 上海华御信息技术有限公司 | E-mail processing method and system |
CN104317976A (en) * | 2014-11-21 | 2015-01-28 | 四川智诚天逸科技有限公司 | Method for storing information |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1329407A (en) * | 2000-06-14 | 2002-01-02 | 索尼公司 | Information processing equipment and method, information management system and program storage medium |
CN1722710A (en) * | 2004-11-23 | 2006-01-18 | 杭州华为三康技术有限公司 | E-mail management system and method |
-
2007
- 2007-06-22 CN CN200710123034XA patent/CN101330377B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1329407A (en) * | 2000-06-14 | 2002-01-02 | 索尼公司 | Information processing equipment and method, information management system and program storage medium |
CN1722710A (en) * | 2004-11-23 | 2006-01-18 | 杭州华为三康技术有限公司 | E-mail management system and method |
Non-Patent Citations (1)
Title |
---|
CN 1329407 A,全文. |
Also Published As
Publication number | Publication date |
---|---|
CN101330377A (en) | 2008-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11044267B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
US11722513B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
US20210344724A1 (en) | Systems and Methods for Protecting Contents and Accounts | |
US11412385B2 (en) | Methods for a secure mobile text message and object sharing application and system | |
US9852276B2 (en) | System and methods for validating and managing user identities | |
US10540637B2 (en) | Intelligent, context-based delivery of sensitive email content to mobile devices | |
US20100077205A1 (en) | System and Method for Cipher E-Mail Protection | |
CN101944168A (en) | Electronic file authority control and management system | |
US10462185B2 (en) | Policy-managed secure code execution and messaging for computing devices and computing device security | |
CN105227570A (en) | A kind of safe e-mail system of integrated campaign | |
US9967242B2 (en) | Rich content scanning for non-service accounts for email delivery | |
Milligan et al. | Business risks and security assessment for mobile devices | |
CN101330377B (en) | Method for conveying secret mail | |
NL2011857C2 (en) | Secure single sign-on exchange of electronic data. | |
CN109033872A (en) | A kind of secure operating environment building method of identity-based | |
CN106936686A (en) | A kind of immediate communication platform for supporting safety moving to handle official business | |
Om | Secure email gateway | |
Romansky | Internet of Things and User Privacy Protection | |
Feigelson et al. | New Federal Guidance on Cybersecurity for Mobile Devices | |
Harauz et al. | A new era of presidential security: The president and his blackberry | |
US20240195630A1 (en) | System and method of privacy-aware inter-channel communication between a business entity and a person | |
CN101957895A (en) | External rights control management system of electronic record and method thereof | |
Brashear et al. | UNITED STATES DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY | |
Al-Haiqi et al. | Insider threats+ disruptive smart phone technology= new challenges to corporate security | |
Sakurai et al. | Actual condition and issues for mobile security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110504 Termination date: 20170622 |