WO2006059383A1 - Procede et programme d’envoi de courrier electronique, programme d’approbation de courrier electronique, dispositif d’envoi de courrier electronique et systeme d’approbation/envoi de courrier electronique - Google Patents

Procede et programme d’envoi de courrier electronique, programme d’approbation de courrier electronique, dispositif d’envoi de courrier electronique et systeme d’approbation/envoi de courrier electronique Download PDF

Info

Publication number
WO2006059383A1
WO2006059383A1 PCT/JP2004/017876 JP2004017876W WO2006059383A1 WO 2006059383 A1 WO2006059383 A1 WO 2006059383A1 JP 2004017876 W JP2004017876 W JP 2004017876W WO 2006059383 A1 WO2006059383 A1 WO 2006059383A1
Authority
WO
WIPO (PCT)
Prior art keywords
mail
approval
transmission
computer
authority
Prior art date
Application number
PCT/JP2004/017876
Other languages
English (en)
Japanese (ja)
Inventor
Osamu Aoki
Hiroaki Kawano
Original Assignee
Intelligent Wave Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intelligent Wave Inc. filed Critical Intelligent Wave Inc.
Priority to PCT/JP2004/017876 priority Critical patent/WO2006059383A1/fr
Priority to JP2006515529A priority patent/JPWO2006059383A1/ja
Publication of WO2006059383A1 publication Critical patent/WO2006059383A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/08Annexed information, e.g. attachments

Definitions

  • the present invention relates to an e-mail transmission for preventing information leakage by allowing only an e-mail that has been approved by an approval authority to be transmitted for an e-mail that satisfies a predetermined condition such as including important information.
  • the present invention relates to a method, an e-mail transmission program, an e-mail approval program, an e-mail transmission apparatus, an e-mail approval apparatus, and an e-mail transmission system.
  • E-mail is the most convenient means for the internal power of companies to bring information to the outside.
  • the important information is neglected due to mistaken address designation. Is often sent to a third party.
  • an attribute or an approver of an e-mail to be transmitted is determined according to whether the sender needs to approve or not. set, the invention executes the transmission of e-mail is disclosed approval by an approver triggers (e.g., Patent Document 1, Patent Document 2.) 0
  • an approver triggers e.g., Patent Document 1, Patent Document 2.
  • the sender Must make the necessary settings for approval, When used in conjunction with a system that filters email based on a pre-set security policy, even email that has been approved by an approver cannot be sent if it violates the security policy There was a problem.
  • Patent Document 1 Japanese Patent Laid-Open No. 6-205043
  • Patent Document 2 JP 2002-63117 A
  • Patent Document 3 Japanese Patent Laid-Open No. 2002-217980
  • the terminal device power operated by the sender is sent and approved by a server or the like installed in the in-house network. It is configured to control the transmission to the external network by confirming the approval etc. by the user.
  • the e-mail system using the encryption key such as PKI mentioned above is used together, the e-mail that has been encrypted at the sending terminal will be controlled by the server.
  • the authentication process using the confirmation by the authorization authority and the hash value there is a problem that the encryption / decryption of data must be repeated! /.
  • Patent Documents 1 to 3 require a dedicated mailer or network monitoring server, so companies have introduced these technologies. In doing so, it will be necessary to construct a dedicated network system and to customize a general-purpose mailer or mail server, and so installation and maintenance costs will be appropriate.
  • the present invention has been made in order to cope with such a problem.
  • a predetermined condition such as including important information
  • E-mail transmission method to prevent information leakage by enabling transmission, especially in companies such as e-mails sent by e-mail systems using encryption keys such as PKI, and Web mail
  • e-mail transmission method that can handle e-mails sent without using a mail server that can be used, and can be easily introduced using a general-purpose mailer or mail server It is intended.
  • the present invention that solves such a problem is a method for transmitting an e-mail that enables transmission of only an e-mail that has been approved by an approval authority for an e-mail that satisfies a predetermined condition.
  • the first computer operated by the e-mail sender determines whether the e-mail for which the transmission instruction has been accepted is an e-mail that requires approval by the approval authority, and the first computer sends A step of determining whether the e-mail that has received the instruction is an e-mail that has been approved by an approval authority, and the first computer is determined to require approval by the approval authority, and the approval authority
  • the approval request mail including the contents of the e-mail is sent to the second computer operated by the approval authority, after the e-mail has been approved.
  • the approval authority Receiving a confirmation result of the content of the email by a person, and when the second computer approves the transmission of the email, the second computer receives at least one of the content of the email.
  • the first computer includes the password in the email.
  • the password is generated from a digest of at least part of the content of the email.
  • the password which is an electronic mail transmission method according to claim that you determined that the e-mail is an e-mail that was approved by the approval authority.
  • the first computer is an e-mail that has been determined not to require approval by an authorized person, or has been approved by an authorized person but has been approved by an authorized person. And e-mail determined to be sent to a destination specified in the e-mail.
  • an e-mail that is not judged by a mail server or the like after sending the e-mail to the network is determined by determining whether or not to approve the e-mail to be sent. Easily install using a general-purpose mailer or mail server by configuring the computer operated by the sender to acquire and determine the e-mail that has been accepted by the mailer.
  • An e-mail transmission method that can be used.
  • the e-mail transferred to the approval authority is given the password created by the e-mail body, etc. if approved, and given by the approver when re-sending after approval. E-mail can be sent to the specified destination only when the password and the text of the e-mail to be sent match. Therefore, it is guaranteed that an e-mail that needs to be approved can be sent only by an e-mail that has been approved by the approval authority and has the same contents as that confirmed by the approval authority.
  • the password used here is derived from at least part of the digest of the email content. The power of the e-mail subject to the digest is included in the e-mail body, attachments, e-mail recipients, and other mail headers such as sender and title May be included.
  • the first computer transmits an e-mail when a new e-mail is detected in the transmission tray of the e-mail transmission / reception program or when an e-mail transmission process is executed in the Web browser. Detecting instructions and determining whether the e-mail is an e-mail that requires approval by an approval authority or determining whether the e-mail is an e-mail approved by an approval authority This is characterized by the fact that
  • a Web browser is used on a computer operated by a sender who transmits e-mail.
  • a sender who transmits e-mail.
  • the present invention provides an e-mail transmission program stored in a computer operated by an e-mail sender, which is necessary for carrying out the e-mail transmission method according to the present invention.
  • the e-mail transmission program provides an e-mail sender for enabling transmission of only e-mail that has been approved by an approval authority for e-mail that satisfies a predetermined condition.
  • the e-mail is sent to the second computer indicating that the e-mail has been approved by the approval authority.
  • the e-mail transmission program determines that the e-mail is an e-mail that has been approved by an approval authority if it matches a password generated from a part of the digest.
  • the first computer is determined not to require approval by the approval authority, or it is determined that approval by the approval authority is required but is approved by the approval authority.
  • the step of transmitting the e-mail to the destination specified in the e-mail may be executed.
  • the first computer detects an e-mail transmission instruction when a new e-mail is detected in the transmission tray of the e-mail transmission / reception program or when an e-mail transmission process is executed in the Web browser. Determining whether the e-mail is an e-mail that requires approval by an approval authority, or determining whether the e-mail is an e-mail that has been approved by an approval authority. May be a feature.
  • the e-mail approval program according to the present invention is operated by the e-mail approval authority to enable transmission of only e-mails that have been approved by the approval authority for e-mails satisfying predetermined conditions.
  • An e-mail approval program stored on the computer of the first computer, and the second computer requires approval by the approval authority from the first computer operated by the e-mail sender.
  • Receiving an approval request mail including the content of the email determined to be a step of receiving a confirmation result of the content of the email by the approval authority, and the confirmation result approves the transmission of the email If it is, the email Generating a password indicating that approval by the approval authority has been obtained from at least a part of the digest of the content of the content, and sending a transmission approval mail including the password for notifying the transmission approval of the email.
  • the first computer that has received the transmission approval mail receives an instruction to send an e-mail that requires approval by the authorized person, the password is added to the e-mail.
  • the email is approved by the authorizing authority. It is determined that the e-mail is mail, and the e-mail is transmitted to the destination specified in the e-mail. E-mail approval program.
  • the present invention provides an e-mail transmission device operated by an e-mail sender and e-mail approval operated by an e-mail approval authority necessary for implementing the e-mail transmission method according to the present invention. It can also be understood as a first computer operated by the device or the e-mail sender and a second computer-powered e-mail transmission system operated by the e-mail approval authority.
  • the e-mail transmission apparatus is an e-mail transmission apparatus for enabling transmission of only an e-mail that has been approved by an approval authority for an e-mail that satisfies a predetermined condition.
  • the first determination means for determining whether the e-mail that has received the transmission instruction is an e-mail that requires approval by the approval authority, and the e-mail that has received the transmission instruction has been approved by the approval authority.
  • the second determination means for determining whether it is an email and the first determination means determine that approval by an approval authority is required, and the second determination means has received approval by the approval authority.
  • sending means for sending an approval request mail including the contents of the e-mail to a computer operated by the approval authority. !
  • the second determination means is generated from a digest of at least part of the contents of the e-mail in the computer indicating that the e-mail has been approved by the approval authority.
  • the password matches a password generated from a digest of at least part of the email content.
  • the electronic mail transmitting apparatus determines that the electronic mail has been approved by an approval authority. An e-mail that is determined not to require approval by an approval authority or an e-mail that is determined to require approval by an approval authority but is approved by the approval authority A second transmission means for transmitting to the destination specified in the e-mail may be provided.
  • the e-mail transmission instruction accepted by the first determination means or the second determination means is that a new e-mail is detected in the transmission tray of the e-mail transmission / reception program or the e-mail transmission is performed in the web browser.
  • An electronic mail transmission instruction may be detected when the process is executed.
  • An e-mail approval device is an e-mail approval device for enabling transmission of only an e-mail that has been approved by an approval authority for an e-mail corresponding to a predetermined condition.
  • Generating means for generating a password indicating approval by an authorized person, and the password for notifying the approval of transmission of the e-mail A transmission means for transmitting a transmission approval mail to the computer, and the computer that has received the transmission approval mail receives the e-mail transmission instruction that requires approval by the approval authority, and then receives the e-mail. If the password contains the password and the password matches a password generated from a digest of at least a portion of the content of the email, the email has been approved by an authorized person
  • An e-mail approving apparatus characterized in that it is determined to be an e-mail, and the e-mail is transmitted to a destination specified in the e-mail.
  • An e-mail transmission system provides an e-mail sender for enabling transmission of only e-mails that have been approved by an approval authority for e-mails satisfying predetermined conditions.
  • First computer to operate and authorized person to approve the e-mail
  • the first judging means, the second judging means for judging whether the e-mail that has received the transmission instruction is an e-mail approved by the authorizing authority, and the approval by the authorizing authority by the first judging means.
  • the contents of the e-mail are transferred to the second computer operated by the approval authority.
  • Accepting means for receiving the confirmation result of the content of the e-mail, and if the confirmation result approves the transmission of the e-mail, the approval is received from at least a part of the digest of the e-mail content.
  • the second determination means provided includes the password when the email includes the password, and the password matches a password generated from a digest of at least a part of the content of the email.
  • An e-mail transmission system characterized by determining that the e-mail is an e-mail that has been approved by an approval authority. It is.
  • the first computer is determined to be approved by the approval authority although it has been determined that the approval is not required by the approval authority, or the approval authority is required.
  • a second transmission means for transmitting the electronic mail to the destination specified in the electronic mail may be provided.
  • the e-mail transmission instruction accepted by the first determination means or the second determination means provided in the first computer is that a new e-mail is detected in the e-mail transmission / reception program transmission tray.
  • an e-mail transmission instruction may be detected when an e-mail transmission process is executed in a Web browser.
  • the present invention approves emails that meet certain conditions, including important information. By making it possible to send only e-mails approved by the authorized person, it is possible to contribute to prevention of information leakage.
  • e-mails sent by e-mail systems using encryption keys such as PKI and Web mails are used without sending mail servers such as POP mails. Since it is possible to respond to e-mails that are received, a wide range of e-mails can be approved.
  • FIG. 1 is a block diagram showing a configuration of an e-mail transmission system according to the present invention.
  • FIGS. 2 to 8 are first to seventh diagrams showing the processing procedure of the e-mail transmission method according to the present invention.
  • FIG. 9 and FIG. 10 are flowcharts showing the first and second processing flows of the e-mail transmission program stored in the computer operated by the sender in the present invention, respectively.
  • FIG. 11 is a flowchart showing a processing flow of the e-mail approval program stored in the computer operated by the approval authority in the present invention.
  • the sender terminal 10 has a mail control program 143 and a judgment rule table 144 in addition to the mailer 241.
  • Each email approval program 242 is installed.
  • the sender terminal 10 includes a CPU 11, a RAM 12, and a ROM 13, and in order to execute predetermined processing by an application program stored in the HDD 14, input control, output control, etc. stored in the ROM 13 are performed.
  • Basics for hardware control The CPU 11 performs arithmetic processing while starting the program and causing the RAM 12 to function as a work area for the application program.
  • various basic programs for hardware control such as input control and output control stored in the ROM 23 are stored.
  • the CPU 21 performs arithmetic processing while starting up and making the RAM 22 function as a work area for application programs.
  • the mailer 141 When an e-mail sender transmits an e-mail from the sender terminal 10, the mailer 141 is read from the HDD 14 and activated to create an e-mail to be transmitted. In a state where the mailer 141 is activated and an e-mail can be sent, the mail control program 143 is read from the HDD 14 and the transmission of the e-mail from the mailer 141 is monitored.
  • the mail control program 143 may be activated at all times while the mailer 141 is operating, or may be constantly monitored regardless of whether the mailer 141 is activated while the sender terminal 10 is operating. As well as to do.
  • the monitoring of the email transmission from the mailer 141 executed by the mail control program 143 is to accept the transmission instruction of the email created by the mailer 141, specifically, to be placed in the transmission tray of the mailer 141.
  • the mail control program 144 determines whether the approval authority needs to approve the mail file for transmission placed in the transmission tray.
  • the e-mail body and the attached file can be used for the determination of the file before being encrypted by PKI or the like.
  • E-mail transmission from the sender terminal 10 is not performed by POP mail using the mailer 141, but the HDD 14 is also activated by reading the browser 142 and accessing a site that can send Web mail. An e-mail may be sent.
  • the mail control program 143 that has also read the HDD 14 power hooks the operation of the browser 142 and monitors the transmission of the e-mail. In this case as well, the mail control program 143 continues to monitor at least as long as the browser 144 is operating. If the browser 142 operates to detect the transmission of an email, the mail control program 143 Acquire the file and execute the judgment of approval necessity by the approval authority.
  • the mail control program 143 determines whether or not the approval by the approval authority is necessary for the transmission mail file acquired by the transmission tray or the like. Whether or not approval is required is determined in the determination rule table 144 of the HDD 14, and the determination is made based on whether or not the rule is applicable.
  • the content of the judgment rule is not particularly limited. It is possible to make a judgment using the text strength key of the outgoing mail, etc., and the mail with the destination address strength of the mail header specified. It's also possible to judge against the address. These rules are not based on a single rule, but may be determined by combining multiple rules.
  • determining whether approval is required different rules may be applied depending on whether the transmission e-mail is addressed outside the company. For example, it is possible to use only important emails for approval within the company, and all emails for approval outside the company. Whether the mail address is internal or external can be determined by the type of mailer if the mailer used is different, and if the same mailer is used, it can be determined by the domain name of the specified mail address. ,.
  • the determination rule table 144 is provided in the sender terminal 10.
  • the storage location of the powerful table is not limited to the sender terminal 10.
  • It can be stored in another computer such as an information leakage monitoring server connected via a network, and the judgment rules for terminals in the network can be centrally managed based on the security policy! .
  • the processing procedure up to the e-mail transmission will be described more specifically with reference to FIGS.
  • the outline of the e-mail transmission processing procedure is as shown in FIG.
  • Sender (A) The approval request email is forwarded to the approver (B) who has the authority to approve the transmission (1).
  • the sender (A) sends an approval notification with a password (2), and the sender (A) sends an email to the recipient (X) using the password ( 3). If approval is not required, mail is sent directly to the recipient (X) ( ⁇ ).
  • the mail file for sending is returned to the outbox, Sent as normal mail.
  • Sent as normal mail.
  • an e-mail of a sender ( ⁇ ) who specified the recipient (X) as a destination is transmitted to the recipient (X) ( ⁇ ).
  • the transmitted e-mail passes through the gateway 40 from the mail server 30 and is transmitted to the destination mail server via the Internet.
  • the e-mail control program 143 designates the destination of the approval authority as the destination address, and the e-mail described in the e-mail file for transmission
  • An approval request e-mail with the main text created is sent from the main text, attached file, destination and title described in the e-mail header.
  • the designation of the approval authority's address for example, a pop-up window that asks which approval authority should be examined on the screen pops up, and the mail control program 143 can specify the approver by selecting the sender. You can also set it! /
  • the destination of the authorization authority is not limited to one address, and different addresses may be designated depending on the judgment result. Multiple authorization authorities may be designated by designating multiple addresses for one email. The person may give approval. The address specified as the destination can also be acquired from Active Directory. Similar to the above-described determination rule, it may be configured to acquire another computer connected via the network.
  • FIG. 4 shows an example of an approval request email that is forwarded to an approver (B) who has authorization to send an email when approval is required for the email sent by the sender (A).
  • Sent as an approval request email (1) is transmitted to the approver terminal 20 via the route of the internal network for internal mail transmission. Internal mail can be transmitted using the same mail server 30 as external mail via the Internet.
  • the HDD 24 also reads and activates the mailer 241 and receives an email from the POP server of the mail server 30.
  • the approval request email is also received at the approver terminal 20 in the same way as a normal email, and the approval authority confirms the address and contents of the email that he / she tried to open and send the received approval request email, and decides whether to approve it. To decide.
  • the transmission approval process in the approver terminal 20 is executed by the mail approval program 242 read from the HDD 24.
  • a button for selecting permission or disapproval by the mail approval program 242 is displayed.
  • the sender terminal 10 is not permitted to transmit.
  • a notification email is sent.
  • the display of the selection button to be used automatically is, for example, if an approval request mail is recorded with a unique identifier in the mail header or the like, and if this identifier is detected by the mail approval program 242, the selection button will pop up automatically. Display can be made.
  • the specific operation added to the general-purpose mailer may be processed by a program different from the general-purpose mailer, or may be added to the general-purpose mailer as add-in software.
  • add-in software for example, a selection button for selecting approval is added as one of the menu buttons of the general mailer.
  • FIG. 5 shows an example in which the approver (B) having the authorization authority does not approve the email sent by the sender (A).
  • the e-mail to notify the unauthorized disapproval is addressed to the sender (A), and the body text contains a standard comment that the transmission of the e-mail is not approved, and the address of the e-mail to be sent included in the approval request e-mail , Title, text, etc.
  • comments about the reasons for disapproval may be attached in the text or attached file.
  • the e-mail notifying permission is sent from the approver (B) to the sender (A) (2).
  • an approval notification mail for notifying the sender terminal 10 that the transmission is approved is transmitted.
  • Create an email notification for approval This is executed by Gram 242 but specifies the destination address from the sender address included in the email header and body of the approval request email, and the digest (optional) A long word is reduced to a fixed-size, small-size data.)
  • the generated password may be described in the body of the approval notification email, or it may be attached to the approval notification email as an attached file.
  • FIG. 6 shows an example in which an approver (B) having approval authority approves an electronic mail transmitted by the sender (A) and transmits an approval notification mail.
  • Approval notification emails are addressed to the sender (A), and the body text contains a standard comment to approve the transmission of the email, the destination email address, title, body text, etc. included in the approval request email
  • the password generated from the digest of the approval request email is described as part of the text or attached as an attached file.
  • the approval notification mail is sent from the approver (B) to the sender (A) (2).
  • the sender terminal 10 When the sender terminal 10 receives the approval notification mail, the sender terminal 10 creates a mail for transmission approved by the approval authority using the password included in the approval notification mail.
  • the password written as part of the body of the approval notification email or the password attached to the approval notification email is cut out and attached to the email for sending or for sending Used as part of the email text.
  • the content of the text described in the outgoing mail and the destination to be sent are required to be the same as those approved by the approver, but the content of the main text and the address of the destination to be used are extracted. It is also possible to cut the sent filer of the approval request email sent to the approval authority for approval! /.
  • FIG. 7 shows an example of the approved transmission mail created by the sender (A) using the approval notification mail received by the approver (B).
  • the received approval notification email includes the recipient (X) that is the destination of the approved sending email and the contents described in the text, and further indicates that the approval has been approved by the approval authority.
  • a nose word generated from the digest of the trusted email is attached.
  • An approved outgoing e-mail is specified with the same address as the one that has been approved, the body of the same content is described, and a nose word generated from the digest is attached.
  • the mailer 141 activates an email transmission process.
  • the power of the approved sending mail that received the sending instruction is placed in the sending tray of the mailer 141. Since the sending tray is monitored in the same manner as the first sending process described above, it is sent to the specified destination. Before being sent, a determination is made as to whether approval by the approval authority is necessary.
  • the method for determining whether a password indicating approval by an approval authority is attached to the email to be sent is particularly limited, for example, by recording a predetermined identifier indicating the presence of the password in the email header.
  • the password is generated from the body of the outgoing e-mail using the same function that is used for generating the password at the approver terminal 20. It is done by comparing with the attached password.
  • the mail approval program 242 of the approver terminal 20 includes a function for generating a password from a digest such as a mail text and an attached file, but the sender terminal 1
  • the mail control program 143 of 0 includes a similar function, so that a password is generated by the function from the body of the transmission mail and the like, and the comparison with the attached password is executed. If the sender's approved e-mail address, title, text, etc. are tampered with and sent, the original data of the digest is included in the e-mail approved by the approver terminal 20 Therefore, it is possible to verify that the e-mail for sending has been altered in the approved content. Therefore, if the passwords do not match, the transmission mail is not transmitted, and an error screen is displayed on the display of the sender terminal 10, for example, in order to notify the sender.
  • FIG. 8 shows an example in which the approved transmission mail created by the sender (A) is transmitted.
  • Approved outgoing mail has the recipient (X) specified as the recipient, the password attached to the approval notification mail, the password is attached, and the password is valid If it is confirmed, it has been approved by the approval authority and it has been determined that the content has not been tampered with since the approval, and the password is deleted and sent to the recipient (X). (3).
  • the determination of the transmission mail in the sender terminal 10 is performed by monitoring the transmission file placed in the transmission tray of the mailer 141, and after the determination, the transmission file is returned to the transmission file.
  • the e-mail is transmitted to a predetermined destination.
  • the mail control program 143 determines the outgoing mail by the mailer 141. It can be executed as an additional process to the normal e-mail transmission / reception process.
  • the general applicator terminal 20 only needs to have a function for generating a password from the mail text and the attached file. Even an email system using a mail server can be installed simply by installing a special program on the client terminal.
  • a powerful mail control program and mail approval program may be added to the general-purpose mailer as add-in software.
  • buttons for executing an application for approval and replying the approval result are displayed on the toolbar of the general-purpose mailer. Processing can be executed.
  • the e-mail transmission program stored in the computer operated by the sender is used to determine whether the e-mail to be sent has been approved by the approval authority.
  • the flowchart in FIG. 9 is a first processing flow in which it is first determined whether or not approval has been received from the approval authority.
  • the flowchart in Fig. 10 is a second processing flow in which it is first determined whether approval by an approval authority is required.
  • the password is valid, it is determined that the e-mail can be sent, the password is deleted from the sending file (S04), and the e-mail is sent to the designated destination. (S05), the process ends. On the other hand, if the password is not valid, it is determined that the e-mail cannot be sent, an error is displayed on the terminal (S06), and the process is terminated.
  • the password is not attached to the transmission file, it is not an approved email, so the keywords such as the specified destination and the body of the email do not meet the predetermined rules, or the transmission instruction is It is determined whether or not approval by the approval authority is required for transmission based on whether or not the unique behavior of the terminal is applicable (S07).
  • the electronic mail is transmitted to a designated destination (S05), and the process ends. If approval is required, an approver selected by the sender or an approver designated in advance in the program is selected (S08), and an approval request e-mail addressed to the selected approver is sent. (S09), and the process ends.
  • the password is valid, it is determined that the email can be sent, The password is deleted from the transmission file (S15), an e-mail is sent to the designated destination (S16), and the process is terminated. On the other hand, if the password is not valid, it is determined that the e-mail cannot be sent, an error is displayed on the terminal (S17), and the process is terminated.
  • the approver specified by the sender or selected in advance by the sender is selected to receive approval by the approval authority (S18).
  • An approval request e-mail addressed to the approver is sent (S19), and the process ends.
  • the processing flow for e-mail approval in the computer operated by the approval authority is as shown in the flowchart of FIG.
  • the approval request mail transferred from the sender is received (S21).
  • a button for selecting approval / disapproval is displayed on the display (S22), and it is detected that the selection of any button has been accepted (S23).
  • the selected button approves the transmission, a word is generated from the digest of the destination, title, text, etc. of the mail approved for transmission (S24). It also creates an approval notification email to be sent to the sender who requested the approval, and attaches the generated password as a part of the body text or an attached file (S25). The approval notification mail with the password attached is transmitted to the sender who requested the approval (S26). If the selected button does not approve the transmission, a notification mail indicating that the transmission has been disallowed is created and transmitted to the sender who requested the approval (S27).
  • FIG. 1 is a block diagram showing a configuration of an e-mail transmission system according to the present invention.
  • FIG. 2 is a first diagram showing a processing procedure of an e-mail transmission method according to the present invention.
  • FIG. 3 is a second diagram showing a processing procedure of the e-mail transmission method according to the present invention.
  • FIG. 4 is a third diagram showing a processing procedure of the e-mail transmission method according to the present invention.
  • FIG. 5 is a fourth diagram showing the processing procedure of the e-mail transmission method according to the present invention.
  • FIG. 6 is a fifth diagram showing the processing procedure of the e-mail transmission method according to the present invention.
  • FIG. 7 is a sixth diagram showing the processing procedure of the e-mail transmission method according to the present invention.
  • FIG. 8 is a seventh diagram showing a processing procedure of the e-mail transmission method according to the present invention.
  • 9 In the present invention, it is a flowchart showing a first processing flow of an e-mail transmission program stored in a computer operated by a sender.
  • FIG. 10 is a flowchart showing a second processing flow of the e-mail transmission program stored in the computer operated by the sender in the present invention.
  • FIG. 11 is a flowchart showing a processing flow of an e-mail approval program stored in a computer operated by an approval authority in the present invention.

Abstract

Le problème à résoudre dans le cadre de la présente invention est que seul un courrier électronique contenant des informations importantes et approuvé par un approbateur autorisé peut être envoyé de manière à empêcher les fuites d’informations. En particulier, un système de courrier électronique qui est adapté aux courriers électroniques tels que les courriers électroniques cryptés et les courriers électroniques par Internet peut être facilement introduit à l’aide d’un logiciel de courrier électronique polyvalent et un serveur de courrier électronique est prévu. La solution proposée consiste à déterminer si un courrier électronique envoyé par un expéditeur doit être approuvé ou non. S’il doit être approuvé, un courrier de demande d’approbation est transféré à un approbateur autorité à approuver des envois. Si l’approbateur approuve l’envoi, une notification d’approbation avec un mot de passe est créée par le condensé de telle sorte que le texte du courrier soit envoyé à l’expéditeur et l’expéditeur envoie le courrier avec le mot de passe. Quand le courrier est envoyé, un mot de passe est créé pour le texte du courrier. Si le mot de passe correspond au mot de passe attaché, le courrier est considéré comme n’ayant pas été modifié fallacieusement et le courrier peut être envoyé.
PCT/JP2004/017876 2004-12-01 2004-12-01 Procede et programme d’envoi de courrier electronique, programme d’approbation de courrier electronique, dispositif d’envoi de courrier electronique et systeme d’approbation/envoi de courrier electronique WO2006059383A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2004/017876 WO2006059383A1 (fr) 2004-12-01 2004-12-01 Procede et programme d’envoi de courrier electronique, programme d’approbation de courrier electronique, dispositif d’envoi de courrier electronique et systeme d’approbation/envoi de courrier electronique
JP2006515529A JPWO2006059383A1 (ja) 2004-12-01 2004-12-01 電子メール送信方法、電子メール送信プログラム及び電子メール承認プログラム、電子メール送信装置及び電子メール承認装置、並びに電子メール送信システム

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2004/017876 WO2006059383A1 (fr) 2004-12-01 2004-12-01 Procede et programme d’envoi de courrier electronique, programme d’approbation de courrier electronique, dispositif d’envoi de courrier electronique et systeme d’approbation/envoi de courrier electronique

Publications (1)

Publication Number Publication Date
WO2006059383A1 true WO2006059383A1 (fr) 2006-06-08

Family

ID=36564827

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2004/017876 WO2006059383A1 (fr) 2004-12-01 2004-12-01 Procede et programme d’envoi de courrier electronique, programme d’approbation de courrier electronique, dispositif d’envoi de courrier electronique et systeme d’approbation/envoi de courrier electronique

Country Status (2)

Country Link
JP (1) JPWO2006059383A1 (fr)
WO (1) WO2006059383A1 (fr)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008027424A (ja) * 2006-06-21 2008-02-07 Sharp Corp データ送受信装置、サーバ装置、データ送受信システムおよびそれらの制御方法、制御プログラムおよびそれを記録したコンピュータ読み取り可能な記録媒体
JP2008242919A (ja) * 2007-03-28 2008-10-09 Japan Research Institute Ltd メール誤送信防止システム、メール誤送信防止方法およびメール誤送信防止プログラム
JP2008250983A (ja) * 2007-03-05 2008-10-16 Yahoo Japan Corp 送信内容監視装置
WO2010050108A1 (fr) * 2008-10-31 2010-05-06 パナソニック株式会社 Dispositif, procédé et programme d’exécution de fonction de courrier
US8224908B2 (en) 2007-12-28 2012-07-17 Canon Kabushiki Kaisha Information processing system, E-mail transmission control apparatus, information processing method and program
JP2012169778A (ja) * 2011-02-10 2012-09-06 Fujitsu Broad Solution & Consulting Inc 暗号処理プログラム、暗号処理装置および暗号処理方法
JP2014186666A (ja) * 2013-03-25 2014-10-02 Fujitsu Ltd メール処理プログラム、メール処理方法及びメール処理装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002217980A (ja) * 2001-01-17 2002-08-02 Mitsubishi Electric Corp データ中継装置、データ送信装置、送信承認装置、データ中継方法、データ送信方法及び送信承認方法
JP2002288087A (ja) * 2001-03-23 2002-10-04 Humming Heads Inc 情報処理装置及びその方法、情報処理システム及びその制御方法、プログラム

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002217980A (ja) * 2001-01-17 2002-08-02 Mitsubishi Electric Corp データ中継装置、データ送信装置、送信承認装置、データ中継方法、データ送信方法及び送信承認方法
JP2002288087A (ja) * 2001-03-23 2002-10-04 Humming Heads Inc 情報処理装置及びその方法、情報処理システム及びその制御方法、プログラム

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008027424A (ja) * 2006-06-21 2008-02-07 Sharp Corp データ送受信装置、サーバ装置、データ送受信システムおよびそれらの制御方法、制御プログラムおよびそれを記録したコンピュータ読み取り可能な記録媒体
JP2008250983A (ja) * 2007-03-05 2008-10-16 Yahoo Japan Corp 送信内容監視装置
JP2008242919A (ja) * 2007-03-28 2008-10-09 Japan Research Institute Ltd メール誤送信防止システム、メール誤送信防止方法およびメール誤送信防止プログラム
US8224908B2 (en) 2007-12-28 2012-07-17 Canon Kabushiki Kaisha Information processing system, E-mail transmission control apparatus, information processing method and program
WO2010050108A1 (fr) * 2008-10-31 2010-05-06 パナソニック株式会社 Dispositif, procédé et programme d’exécution de fonction de courrier
JP2012169778A (ja) * 2011-02-10 2012-09-06 Fujitsu Broad Solution & Consulting Inc 暗号処理プログラム、暗号処理装置および暗号処理方法
JP2014186666A (ja) * 2013-03-25 2014-10-02 Fujitsu Ltd メール処理プログラム、メール処理方法及びメール処理装置

Also Published As

Publication number Publication date
JPWO2006059383A1 (ja) 2008-06-05

Similar Documents

Publication Publication Date Title
US7422115B2 (en) Techniques for to defeat phishing
JP4667361B2 (ja) 適応的透過暗号化
AU2006208324B2 (en) Securing computer network interactions between entities with authorization assurances
US7413085B2 (en) Techniques for displaying emails listed in an email inbox
CN102227734B (zh) 用于保护机密文件的客户端计算机和其服务器计算机以及其方法
US7743413B2 (en) Client apparatus, server apparatus and authority control method
JP4703333B2 (ja) 電子メール処理プログラム
US20060075027A1 (en) User interface and anti-phishing functions for an anti-spam micropayments system
KR101387600B1 (ko) 전자 파일 전달 방법
JP2011501578A (ja) セキュア通信の信頼性を示すための方法及びシステム
WO2007052342A1 (fr) Programme de preservation d’informations, procede de preservation d’informations et systeme de preservation d’informations
WO2004001540A2 (fr) Procede et systeme de protection d'objets numeriques distribues sur un reseau au moyen d'une interface de courrier electronique
JP2007102334A (ja) 電子メールによる情報漏洩の防止システム、方法、コンピュータプログラム
JP3749129B2 (ja) 電子メールシステム及び電子メール送信制御方法並びに中継装置
JP2007133475A (ja) メール文書管理システムおよび方法、ならびにそのプログラム
JP4471129B2 (ja) 文書管理システム及び文書管理方法、文書管理サーバ、作業端末、並びにプログラム
WO2006059383A1 (fr) Procede et programme d’envoi de courrier electronique, programme d’approbation de courrier electronique, dispositif d’envoi de courrier electronique et systeme d’approbation/envoi de courrier electronique
JP3994657B2 (ja) サービス提供システム
CN113098899B (zh) 无形资产保护方法、装置及计算机可读介质
CN111291366B (zh) 安全中间件系统
EP1532505A2 (fr) Garantie de l'application d'une politique avant l'autorisation d'utilisation d'une cle privee
JP2008269544A (ja) 利用対象情報管理装置及び利用対象情報管理方法ならびにそのプログラム
JP4159444B2 (ja) 画像送信システム及び画像送信装置
WO2008040996A2 (fr) SÉCURITÉ d'un dispositif Électronique personnel
JP2002207694A (ja) 情報転送追跡装置、個人情報管理システム、その方法及びプログラムを記録した記録媒体

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2006515529

Country of ref document: JP

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 04822482

Country of ref document: EP

Kind code of ref document: A1

WWW Wipo information: withdrawn in national office

Ref document number: 4822482

Country of ref document: EP