Method and system for safely receiving and sending mails

An e-mail system and e-mail technology, applied in the field of safe e-mail sending and receiving methods and systems, can solve the problems that the SMTP server cannot verify MAILFROM, lack of strict identity authentication mechanism, etc., and achieve the effect of ensuring safety

Active Publication Date: 2013-12-04
北京明朝万达科技股份有限公司
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. The mail forwarding function may cause the mail server to send spam
[0007] 2. Lack of strict identity authentication mechanism
[0009] 4. The SMTP server cannot verify MAIL FROM
In fact, it is also a matter of data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safely receiving and sending mails
  • Method and system for safely receiving and sending mails
  • Method and system for safely receiving and sending mails

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] Embodiment 1 provides an overall architecture diagram for sending and receiving secure emails. attached image 3 The system framework of the present invention includes an external mail client for sending and receiving mail, an intranet mail client for sending and receiving mail, a single sign-on (SSO) system, a security management platform, a secure mail gateway, and a mail server.

[0099] The external mail client can be a mobile mail client, such as a smart phone (such as a common Andriod mobile phone in the prior art, an IPHONE mobile phone of Apple's IOS system), a tablet computer, a PDA and other mobile terminal devices that have the function of sending and receiving mail. The email client can also be various computer terminals with the function of sending and receiving emails, such as PC / notebook based on Windows operating system and PC / notebook based on MAC OS. The mail client of the present invention includes but is not limited to the above-mentioned terminal e...

Embodiment 2

[0108] Embodiment 2 provides a method for sending and receiving emails by a mobile terminal on an external network. Figure 4 It is the working sequence diagram of the external network mobile terminal. The external network mobile terminal is a mobile email client, which includes a single sign-on (SSO) application component (APP), a mobile security management component (APP), and a mobile security software development kit (SDK).

[0109] The specific working sequence of the mobile mail client to send and receive emails is as follows:

[0110] 1) The single sign-on APP connects to the single sign-on platform for identity authentication.

[0111] 2) After the authentication is successful, the token token is returned to the single sign-on APP.

[0112] 3) The single sign-on APP starts the mobile mail client and passes the token to the mobile mail client.

[0113] 4) The mobile mail client accesses the URL1 address in the token.

[0114] 5) During the access process, the SSO se...

Embodiment 3

[0124] Embodiment 3 provides a method for a mobile terminal to encrypt sent mail data. Figure 5 It is a flow chart of encrypting mail data when the mobile terminal of the present invention sends mail. The method includes:

[0125] 1) The mobile email client starts sending emails.

[0126] 2) The mobile mail client first inquires whether the recipient's public key exists in the local encrypted database.

[0127] 3) If the recipient's public key exists in the local encrypted database, obtain the recipient's public key directly in the local encrypted database.

[0128] 4) If not found, go to the security management platform to use the email address to obtain the receiver's public key, and cache a copy in the local database.

[0129] 5) Encrypt the symmetric key used to encrypt the email with the receiver's public key.

[0130] 6) The mobile mail client accesses the secure mail gateway to obtain the gateway public key returned by the secure mail gateway.

[0131] 7) Encrypt ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for safely receiving and sending mails. Mail receiving and sending safety authentication and safety transmission of the mails are realized. The method includes the steps: connecting a mail client with a login platform to perform identity authentication; returning a token message to the mail client after authentication success; accessing a first address in the token message by the mail client; receiving a first message including a second address by the mail client; calling an interface of a safety management platform and transmitting the first message to the safety management platform by the mail client; generating a second message and transmitting the second message to the mail client and a mail gateway by the safety management platform; acquiring a user policy message from the safety management platform through the second message by the mail client; carrying the second message by the mail client and authenticating the second message at the mail gateway; connecting the mail gateway with a mail server and starting receiving and sending the mails after passing authentication.

Description

technical field [0001] The present invention relates to a mail sending and receiving technology, in particular to a safe mail sending and receiving method and system. Background technique [0002] With the further development of the information age, enterprise informatization is also deepening, and various enterprise informatization solutions (OA, mail system, database system) have become the infrastructure of enterprises. However, the resulting data security issues are also becoming more and more serious, and various corporate leaks occur frequently, posing a serious threat to the survival and legal competition of companies, and even endangering the information security of the country. This application focuses on the identity authentication and information security of the internal mail of the enterprise. [0003] The existing enterprise email systems that are widely used are all email protocols based on the smtp / pop3 protocol. This protocol only supports username and pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L29/06H04L9/32
Inventor 张帅王志海何晋昊喻波
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products