Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for identifying e-mail text and appendix

A technology of e-mail and attachments, applied in the direction of electronic digital data processing, special data processing applications, instruments, etc., can solve problems such as incomprehension and inconvenient use, achieve the effect of simple and feasible methods, and improve effectiveness

Inactive Publication Date: 2009-06-03
刘怡梅
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are some methods, such as digital signatures, which can theoretically confirm whether the email text and attachments have been tampered with, they are difficult to be accepted by the public due to reasons such as inconvenient use, difficulty in understanding, and no third-party proof.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The method for confirming email text and attachments described in the present invention is completed by the following two steps, and is described in detail as follows:

[0013] Step 1: Add the following processing to the existing email server:

[0014] 1. After each e-mail is received by the e-mail server, it performs mathematical processing on the received e-mail text and attachments to obtain a corresponding string identifier;

[0015] 2. The email server stores the string identifier on a storage device of a third party other than the sender or receiver;

[0016] The above-mentioned mathematical processing method can utilize the widely used MD5 hash algorithm (hash algorithm) or other algorithms with similar functions.

[0017] Step 2: Confirmation of email text and attachments by a third party:

[0018] Suppose user A receives an e-mail sent to him by user B, and then for some reason, user A tampers with the received e-mail or user B tampers with the sent e-mail. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method of confirming e-mail text and appendix is for the e-mail server to treat each received e-mail mathematically to obtain one corresponding character string mark and to save the character string mark in one third party memory device other than the emitter and the receiver. In case that either the emitter or the receiver juggle the e-mail text and appendix, the third party can provide the intact e-mail text and appendix with the stored character string mark. The present invention makes it possible for the e-mail to be used as the effective evidence simply and practically.

Description

1. Technical field [0001] The invention relates to a method capable of confirming email texts and attachments. 2. Background technology [0002] E-mail is one of the most widely used applications on the Internet. It has penetrated into people's work and life. However, because the text and attachments of e-mail are easy to be tampered with, it does not have the same features as traditional handwritten letters, Like the signed contract text, it can serve as valid evidence. Although there are some methods, such as digital signatures, which can theoretically confirm whether the text and attachments of emails have been tampered with, they are difficult to be accepted by the public due to reasons such as inconvenient use, difficulty in understanding, and no third-party proof. 3. Contents of the invention [0003] 1. Purpose of the invention: The purpose of the present invention is to provide a method that can confirm whether the email text and attachments have been tampered wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/00
Inventor 刘怡梅
Owner 刘怡梅
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products