Mail security protection method based on security level control

A security protection and confidentiality technology, applied in electrical components, digital transmission systems, transmission systems, etc., can solve the problems of spreading viruses, denial of service, tampering with data, etc., and achieve the effect of email information security

Inactive Publication Date: 2017-01-18
西安交大捷普网络科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while e-mail brings great convenience to people, it also brings worrying e-mail security issues, such as stealing, tampering with dat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail security protection method based on security level control

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0015] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0016] The embodiment of the present invention provides a mail security protection method based on secret level control, such as figure 1 As shown, the method is as follows: the server classifies users and mails by secret level, and configures the corresponding secret level of the mail according to the keywords. When the user sends the mail, the server searches for and sets the corresponding secret level according to the keywords in the mail, and at the same time according to The secret level of the user who sends the mail is matched with the secret level of the mail setting, and the mail is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mail security protection method based on security level control. A server carries out security level classification on users and mails, and configures corresponding security levels of the mails according to keywords; and when a user sends a mail, the server searches and sets corresponding security level according to the keywords in the mail, meanwhile, carries out security level matching according to the security level of the user sending the mail and the mail set security level, and sends the mail when the security levels match. The method can provide a mail security level function; the security level of the user is corresponding to the security levels of the mail and attachments; and people having low security levels cannot see the high-security-level mails and attachments, thereby ensuring that mail information is safe and controllable.

Description

technical field [0001] The invention relates to the technical field of email security protection, in particular to an email security protection method based on secret level control. Background technique [0002] In the era of big data, the value of information and data is getting higher and higher. However, the awareness of data protection is still very weak, resulting in frequent leaks. However, confidential content such as decisions, patented technologies, and sales quotations of most enterprises and companies are often transmitted by email, making email increasingly an important means of communication. However, while e-mail brings great convenience to people, it also brings worrying e-mail security problems, such as stealing, tampering with data, forging e-mails, denial of service, spreading viruses and so on. Therefore, we must face up to the security issues of e-mail to minimize losses. Contents of the invention [0003] In view of this, the main purpose of the pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/58H04L29/06
CPCH04L51/08H04L63/105H04L63/168H04L51/42
Inventor 陈晓兵陈宏伟焦小涛何建锋同元峰
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products