×

Perimeter enforcement of encryption rules

  • US 10,263,966 B2
  • Filed: 04/14/2016
  • Issued: 04/16/2019
  • Est. Priority Date: 04/14/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product for securing network traffic comprising computer executable code embodied in a non-transitory computer readable medium that, when executing on one or more computing devices, performs the steps of:

  • receiving an electronic mail message from a sender for transmittal to a recipient different from the sender, the electronic mail message including an attachment containing at least one file;

    removing the attachment from the electronic mail message;

    wrapping the attachment into a portable encrypted container that contains an encrypted instance of the file, an encrypted instance of a decryption key to decrypt the file, and program code providing a user interface that supports a first mode of decryption using remote resources and authentication credentials for the recipient and a second mode of decryption based on local input of a password for decrypting the decryption key;

    attaching the portable encrypted container to the electronic mail message; and

    transmitting the electronic mail message and the portable encrypted container to an electronic mail gateway for communication from the sender to the recipient.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×