Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data leakage prevention method and system for realizing non-perception encryption and decryption of e-mail attachment

An email, encryption and decryption technology, applied in the field of data security, can solve problems such as unfavorable device promotion and application, occupation of PC terminal resources, impact of auxiliary functions, etc., to avoid interception and tampering, ensure correctness and security, and improve security. Effect

Inactive Publication Date: 2020-05-12
北京明朝万达科技股份有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing encryption methods, the gateway centralized scanning method and the terminal distributed scanning method are generally adopted. The gateway centralized scanning often requires special equipment, and the configuration requirements are relatively high, which causes a certain burden on the actual customers of the data leakage prevention system, which is not conducive to the The promotion and application of such equipment; the terminal distributed scanning is based on the client's PC terminal. Due to the limitation of the existing technology, it often takes up more resources of the PC terminal when scanning, especially when scanning a large amount of data, causing serious damage to the user's other work. A certain impact, resulting in the possibility that the auxiliary function affects the normal business development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data leakage prevention method and system for realizing non-perception encryption and decryption of e-mail attachment
  • Data leakage prevention method and system for realizing non-perception encryption and decryption of e-mail attachment
  • Data leakage prevention method and system for realizing non-perception encryption and decryption of e-mail attachment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0063] A data leakage prevention method and system for implementing non-perceptual encryption and decryption of email attachments provided by the present invention will be described in more detail below with reference to the accompanying drawings and embodiments.

[0064] Such as figure 1 As shown, the data leakage prevention system for real...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data leakage prevention method and system for realizing non-perception encryption and decryption of email attachment, and the method comprises the steps that an email client transmits an email obtaining request; a redirection module requests the information, carries out the verification, and transmits the information to an email server; the mail server establishes connection with the mail client through the redirection module; the mail server sends a mail and an attachment of the current mail client to the redirection module; the redirection module intercepts and analyzes the email, encrypts the attachment, reassembles the email, and sends the email to the email client; and the mail client decrypts the mail attachment. According to the invention, the mail client isauthenticated through the redirection module, and mail interception, mail analysis, attachment encryption, attachment decryption, mail recombination and other operations are carried out on the mail and the attachment of the mail client passing the authentication, so that the attachment in the sent mail is an encrypted file in a network environment, and the security of the mail attachment is improved.

Description

technical field [0001] The invention belongs to the technical field of data security, and in particular relates to a data leakage prevention method and system for realizing non-perceptual encryption and decryption of email attachments. Background technique [0002] With the rapid development of computer technology, e-mail is more and more used in all aspects of social production, life and study, playing a pivotal role. While enjoying the convenience and speed brought by e-mail, people must also face the e-mail security problems brought about by the openness of the Internet and computer software vulnerabilities, such as: attackers obtain or tamper with e-mails, virus e-mails, spam e-mails, Mail bombs seriously endanger the normal use of e-mail, and even cause serious damage to computers and networks. E-mail attachments are the most important carrier of information transmission in e-mails. Certain attachments are intercepted or tampered with, which will bring unspeakable damag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L29/06
CPCH04L63/0236H04L63/0428H04L63/308H04L63/08H04L51/42H04L51/212
Inventor 闫晶王志海喻波秦凯安鹏
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products