Mail sending method and device

The technology of a sending method and a sending device, which is applied in the field of electronic information, can solve problems such as inability to locate files, poor vision, and insufficient protection measures

Active Publication Date: 2021-04-20
HEFEI HIGH DIMENSIONAL DATA TECH CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the Internet age, sending out electronic documents is a daily task. Different departments and companies have email exchanges. In some electronic documents involving commercial secrets and technical secrets, many companies adopt electronic watermarks and leak retrospective clauses. It has a deterrent effect, but if an electronic document is sent to multiple other units, it is found that the leak incident does not know where it leaked from
Moreover, there are many ways to directly erase or modify the clear watermark, and the content of the clear watermark can be modified to the information of other persons who own the document, which causes great trouble for the traceability of the document watermark leakage
[0003] At present, in order to prevent leakage of conventional electronic documents, clear watermark information is usually added to the document. The clear watermark is visible to the naked eye and is easily erased by people. Moreover, adding watermarks to some official documents is not visually very good.
The content of the watermark is generally based on company information, and it is impossible to locate who leaked the file, and it can only serve as a deterrent
[0004] Most people add some leak retroactive clauses when sending out emails, but there are many people who send files, and it is not known who the specific leaker is, which plays a very small deterrent effect
[0005] There are also some units that use a centralized document printing system. This document management method can play a very good role in protecting confidential documents from leaking within the enterprise, but it cannot protect when interacting with documents from other units.
If other units have permission to download in the system, and then forward due to insufficient protection measures, the leak still cannot be located, and it is not a safe practice to open the management authority of the unit’s system to other units

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail sending method and device
  • Mail sending method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] A mail sending device mainly includes an attachment processing module, an intercepting module, a white list confirmation module, an invisible watermark adding module and a mail sending module.

[0045] The attachment processing module is configured to add an attachment to the email to be sent, and obtain the content in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mail sending method and device. The device mainly comprises an attachment processing module, an interception module, a white list confirmation module, an invisible watermark adding module and a mail sending module. The method mainly comprises the following steps: firstly, adding an attachment to an email and acquiring attachment content, searching keywords in the attachment content to judge and confirm whether the email needs to be intercepted or not, and then acquiring the name of an addressee email box to judge a white list; and adding the invisible watermark to the recipient attachment which is not in the white list, and finally sending the new attachment to which the invisible watermark is added to the recipient. The added invisible watermark adopts a font transformation technology, the document content is not obviously different from that of an original document in appearance, no professional tool and algorithm exist, watermark information cannot be modified, and the anti-counterfeiting capacity is high; watermarking information is richer and comprises information of a receiver and a sender and sending time information, and a document transmission path can be accurately positioned.

Description

technical field [0001] The invention belongs to the field of electronic information, in particular to a mail sending method and device thereof. Background technique [0002] In the Internet age, sending out electronic documents is a daily task. Different departments and companies have email exchanges. In some electronic documents involving commercial secrets and technical secrets, many companies adopt electronic watermarks and leak retrospective clauses. It has a deterrent effect, but if an electronic document is sent to multiple other units, it is found that the leak incident does not know where it leaked from. Moreover, there are many ways to directly erase or modify the clear watermark, and the content of the clear watermark can be modified to the information of other persons who own the document. This has caused great trouble for the traceability of document watermark leaks. [0003] At present, in order to prevent leakage of conventional electronic documents, watermark...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L29/06
Inventor 田辉王学钾
Owner HEFEI HIGH DIMENSIONAL DATA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products