Anti-disclosure mail safe card and method for detecting disclosure mail

An anti-leakage, security card technology, applied in secure communication devices, electrical components, digital transmission systems, etc., can solve problems such as information leakage, loss, email security loopholes, etc.

Inactive Publication Date: 2010-06-02
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the inherent deficiencies of e-mail related protocols, many e-mail security vulnerabilities have been caused, especially the information leakage incidents caused by people with ulterior motives in the system through e-mail have caused serious losses to some military enterprises and institutions and the country

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-disclosure mail safe card and method for detecting disclosure mail
  • Anti-disclosure mail safe card and method for detecting disclosure mail
  • Anti-disclosure mail safe card and method for detecting disclosure mail

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0039] The anti-leakage email security card can be arranged in ordinary PCs or various servers supporting PCI interfaces, and can be plugged and played.

[0040] The recommended configuration is: CPU P4 2.0GHz memory 1G or more.

[0041] There are 2 configurations available for the anti-disclosure email security card:

[0042] (1) Integrated type: directly insert the card into the PCI card slot of the original gateway server, and connect the network cable of the original gateway server to the network interface of the card. In this configuration mode, the anti-leakage security card and the mail server are located in the same machine, which is very convenient for configuration and operation.

[0043] (2) Separate type: insert the anti-leakage security card into any PC, connect the PC in series to the original mail server network, and connect the network cable to the network controller of the anti-leakage security card 1 interface from the network controller at the same time 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An anti-leakage mail security card and its leakage mail detecting method belong to the computer network information security technology. The security card comprises a network host processing module and a data assistant processing module. The network host processing module comprises a main processor, a first Flash memory, a first internal memory, a first serial controller, a first network controller and a second network controller. The data assistant processing module comprises a first assistant processor, a second assistant processor, a second Flash memory, a second internal memory, a second serial controller. The detecting method comprises: recovering and analyzing the text and the accessory of the read mail; judging the mail information security classification; detecting the mail path security; anti-leakage detecting based on the regulation and the algorithm; actively blocking the leakage mail and the suspected leakage mail; manual audit; sending alarm information to the leakage mailand automatically generating evidence. The invention has security, anti-leakage performance, reliability, source authentication and non-repudiation.

Description

technical field [0001] The invention belongs to the field of computer network and information security. Especially network information security. Background technique [0002] At present, the SMTP (Simple Mail Transfer Protocol) protocol is the most popular email transfer protocol, and most of the mail servers and mail gateway products use SMTP as the main mail transfer protocol. However, there are some fatal flaws in the SMTP protocol. For example, SMTP transmits plain text, and the content of the letter body is very easy to be monitored and stolen, resulting in content leakage. Therefore, the ESMTP (Extended SMTP) protocol appeared, which extended the standard SMTP protocol. The difference between it and the SMTP protocol is: when using SMTP to send a letter, there is no need to verify the user account, but when using ESMTP to send a letter, the server will ask the user to provide a user name and password for identity verification. However, the mail sending process after...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L12/58
Inventor 庄毅章勇许斌刘子豪唐骏
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products