Method for identifying e-mail text and appendix
A technology of e-mail and attachments, applied in the direction of electronic digital data processing, special data processing applications, instruments, etc., can solve problems such as incomprehension and inconvenient use, achieve the effect of simple and feasible methods, and improve effectiveness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0012] The method for confirming email text and attachments described in the present invention is completed by the following two steps, and is described in detail as follows:
[0013] Step 1: Add the following processing to the existing email server:
[0014] 1. After each e-mail is received by the e-mail server, it performs mathematical processing on the received e-mail text and attachments to obtain a corresponding string identifier;
[0015] 2. The email server stores the string identifier on a storage device of a third party other than the sender or receiver;
[0016] The above-mentioned mathematical processing method can utilize the widely used MD5 hash algorithm (hash algorithm) or other algorithms with similar functions.
[0017] Step 2: Confirmation of email text and attachments by a third party:
[0018] Suppose user A receives an e-mail sent to him by user B, and then for some reason, user A tampers with the received e-mail or user B tampers with the sent e-mail. ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com