E-mail firewall with stored key encryption/decryption
First Claim
1. A computer based encryption and decryption system comprising:
- (a) means (i) for determining whether digital input information including as content at least one of a body of a message and a file attachment is encrypted using a cryptographic key, and (ii) for decrypting the digital input information using a private decryption key of a public key pair prior to applying policies that analyze the content of the digital input information; and
(b) a policy manager configured to apply the policies, the policies including a virus policy for detecting and eradicating a detected virus;
wherein;
(c) the private decryption key is apart from the content of the digital input information and (d) decryption is done without using decryption executables contained in a header corresponding to the digital input information when a header is present.
0 Assignments
0 Petitions
Accused Products
Abstract
An e-mail firewall (105) applies policies to e-mail messages (204) between a first 5 site and a plurality of second sites in accordance with a plurality of administrator selectable policies (216). The firewall comprises a simple mail transfer protocol (SMTP) relay (202) for causing the e-mail messages (204) to be transmitted between the first site and selected ones of the second sites. A plurality of policy managers (216) enforce-administrator selectable policies. The policies, such as encryption and decryption policies, comprise at least a first source/destination policy (218), at least a first content policy (202) and at least a first virus policy (224). The policies are characterized by a plurality of administrator selectable criteria (310), a plurality of administrator selectable exceptions (312) to the criteria and a plurality of administrator selectable actions (314, 316, 322) associated with the criteria and exceptions. The policy managers comprise an access manager (218) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the source/destination policy (218). The policy managers (216) further comprise a content manager (220) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the content policy (220), and a virus manager (224) for restriction transmission of e-mail messages (204) between the first site and the second sites in accordance with the virus policy (224).
-
Citations
18 Claims
-
1. A computer based encryption and decryption system comprising:
-
(a) means (i) for determining whether digital input information including as content at least one of a body of a message and a file attachment is encrypted using a cryptographic key, and (ii) for decrypting the digital input information using a private decryption key of a public key pair prior to applying policies that analyze the content of the digital input information; and
(b) a policy manager configured to apply the policies, the policies including a virus policy for detecting and eradicating a detected virus;
wherein;
(c) the private decryption key is apart from the content of the digital input information and (d) decryption is done without using decryption executables contained in a header corresponding to the digital input information when a header is present. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer based encryption and decryption method, said method comprising the steps of:
-
(a) determining whether digital input information that includes as content at least one of a body of a message and a file attachment is encrypted;
(b) decrypting the digital input information without using decryption executables included in a header corresponding to the digital input information when a header is present if it is determined that the digital input information is encrypted; and
(c) providing content analysis including performing virus detection to facilitate eradication of a detected virus subsequent to decrypting the digital information. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A storage medium comprising:
a program executable by a computing mechanism that facilitates the following steps;
(i) determining whether digital input information that includes as content at least one of a body of a message and a file attachment is encrypted;
(ii) decrypting the digital input information without using decryption executables included in a header corresponding to the digital input information when a header is present if it is determined that the digital input information is encrypted; and
(iii) applying content analysis to the decrypted digital input information prior to allowing use of the decrypted digital input information, wherein content analysis includes performing virus detection to facilitate eradication of a detected virus. - View Dependent Claims (14, 15)
-
16. A computer based encryption and decryption system comprising:
-
(a) means (i) for determining whether digital input information including as content at least one of a body of a message and a file attachment is encrypted using a cryptographic key, and (ii) for decrypting the digital input information using a private decryption key of a public key pair prior to applying policies that analyze the content of the digital input information; and
(b) a policy manager configured to apply the policies, the policies including a virus policy for detecting and eradicating a detected virus;
wherein;
(c) the private decryption key is apart from the content of the digital input information and (d) has been stored by the system for access at the time of decryption. - View Dependent Claims (17)
-
-
18. An encryption and decryption method comprising:
-
providing content analysis by determining whether digital input information that includes at least one of a file, document and at least part of a body of a message is encrypted and generating a decryption request to a decryptor to decrypt the encrypted digital input information prior to applying content analysis to facilitate content analysis within the encrypted digital input information; and
decrypting the encrypted digital input information prior to completion of the content analysiswherein content analysis includes performing virus detection to facilitate eradication of a detected virus, wherein decrypting is done without using decryption executables contained in a header corresponding to the digital input information, if a header is present.
-
Specification