Mail encryption method, mail decryption method, mail encryption unit, mail decryption unit and mail security system

An encryption method and encryption device technology, applied to key distribution, can solve the problems of cumbersomeness and user inconvenience, and achieve the effect of ensuring safety, reliable safety performance, and convenient use

Inactive Publication Date: 2013-09-04
FUJIAN ETIM INFORMATION & TECH
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, this method is very cumbersome and brings inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail encryption method, mail decryption method, mail encryption unit, mail decryption unit and mail security system
  • Mail encryption method, mail decryption method, mail encryption unit, mail decryption unit and mail security system
  • Mail encryption method, mail decryption method, mail encryption unit, mail decryption unit and mail security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0043] refer to figure 1 , figure 1 It is a flow chart of the steps of the first embodiment of the email encryption method of the present invention.

[0044] This embodiment includes the following steps: intercepting step S110, automatically intercepting the mail sending event, and obtaining the mail text and mail attachments; the first storage step S120, storing the mail attachments to the predetermined encryption directory of the local system; the first encryption step S130, encrypting and storing Email attachments, and add the encrypted email attachments to the email object.

[0045] The mail encryption method in this embodiment can be encapsulated in a plug-in program, so that automatic en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mail encryption method, a mail decryption method, a mail encryption unit, a mail decryption unit and a mail security system. The mail encryption method includes the following steps: automatically intercepting a mail sending event, and obtaining a mail text and mail attachments; storing the mail attachments; encrypting the stored mail attachments, and adding the encrypted mail attachments into the mail object. The invention can more conveniently and rapidly encrypt and decrypt mails, so that convenience is brought to users, and moreover, the invention has more reliable security performance.

Description

technical field [0001] The invention relates to the field of computer data communication and network security, in particular to a mail encryption and decryption method, a mail encryption and decryption device and a mail security system. Background technique [0002] E-mail has become the most commonly used Internet communication tool for enterprises because of its most effective, direct and lowest-cost functions. SMTP and POP3 protocols are standards for sending and receiving e-mail on the Internet. Since these two standards do not require encryption of e-mail content, most e-mails are almost transmitted and stored in plain text, and e-mail content often involves privacy and Important data, there is a great risk of leaking business secrets or personal privacy. [0003] Existing secure email technology is divided into two aspects: one is to use the encryption mechanism that comes with Windows, that is, there are the following functions in the Outlook Express mail program: se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 许元进李朋辉魏明张伟
Owner FUJIAN ETIM INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products