Email encryption/decryption system and its method

An encryption key and email technology, which is applied in the field of email encryption/decryption systems, can solve problems such as the inability to effectively guarantee the security of email transmission, and achieve the effect of avoiding leakage

Inactive Publication Date: 2011-02-02
HONG FU JIN PRECISION IND (SHENZHEN) CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, people usually use the traditional cryptosystem to encrypt the transmitted emails. However, in the traditional cryptosystem algorithm, if the encryption process is known, the decryption process can be introduced. In today's era of rampant network hackers, the traditional cryptosystem can no longer effectively guarantee Security of mail transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Email encryption/decryption system and its method
  • Email encryption/decryption system and its method
  • Email encryption/decryption system and its method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Such as figure 1 Shown is a hardware architecture diagram of a preferred embodiment of the mail encryption / decryption system of the present invention. The system includes a network 2 for data communication, and a plurality of computers 1 (taking four computers as an example) for communication connection through the network 2 . The network 2 may be the Internet, an intranet or other applicable networks. Described computer 1 can be any applicable data processing equipment, and it is installed with a mail communication software (for example: the Lotus Notes software that U.S. Lotus Company develops), and also is installed with a mail encryption / decryption unit 3 (as figure 2 shown). The computer 1 realizes the mail communication between computers by utilizing the mail communication software. The mail encryption / decryption unit 3 is used for encrypting the mail sent by the computer 1 and decrypting the encrypted mail received by the computer 1 .

[0015] Such as figu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mail encryption / decryption system comprising a plurality of computers with communication connection mutually. The computer is arranged with mail communication software and a mail encryption / decryption unit which comprises a mail encryption module which is used to set parameters for mail encryption / decryption. The mail communication software is applied to establish a mail text and / or an attachment file to be encrypted. The mail text and / or the attachment file is / are encrypted in accordance with the set mail encryption parameters and the encrypted mail is sent to the computer which receives the mail. The mail encryption / decryption unit also comprises a mail decryption module, which is used to monitor and receive the sent encryption mail. The received encryption mailis decrypted in accordance with the mail decryption parameters and the decrypted mail content is displayed through the mail communication software. The mail encryption / decryption system and the method of the invention avoid the leak of the confidential materials.

Description

technical field [0001] The invention relates to a mail processing system and method, in particular to a mail encryption / decryption system and method. Background technique [0002] Due to various reasons such as the unknowability of the boundary of the computer network, the uncertainty of the routing of the transmitted data, and the sharing of resources, the security of the data transmitted in the computer network is usually not effectively guaranteed. [0003] Many companies use plain text to communicate with the outside world through computer networks, and emails transmitted in plain text are easily intercepted by malicious persons during the transmission process, and the content of the email is easily deciphered, resulting in the leakage of confidential information. vent. Based on the consideration of data security, a reliable and secure transmission mechanism is required during the delivery of emails. [0004] At present, people usually use the traditional cryptosystem ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L29/06H04L12/58
Inventor 蔡旭东
Owner HONG FU JIN PRECISION IND (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products