E-mail firewall with stored key encryption/decryption
First Claim
1. A method for transmitting a message between a sender associated with a first e-mail firewall and a recipient associated with a second e-mail firewall, the method comprising:
- intercepting a message from the sender intended for the recipient;
searching an encryption directory for an entry associated with the recipient;
retrieving an encryption key associated with a second firewall, the second firewall associated with the recipient;
encoding the message with the encryption key of the second e-mail firewall to provide an encrypted message; and
allowing the message to proceed through the firewall.
0 Assignments
0 Petitions
Accused Products
Abstract
An e-mail firewall (105) applies policies to e-mail messages (204) between a first site and a plurality of second sites in accordance with a plurality of administrator selectable policies (216). The firewall comprises a simple mail transfer protocol (SMTP) relay (202) for causing the e-mail messages (204) to be transmitted between the first site and selected ones of the second sites. A plurality of policy managers (216) enforce administrator selectable policies. The policies, such as encryption and decryption policies, comprise at least a first source/destination policy (218), at least a first content policy (202) and at least a first virus policy (224). The policies are characterized by a plurality of administrator selectable criteria (310), a plurality of administrator selectable exceptions (312) to the criteria and a plurality of administrator selectable actions (314, 316, 322) associated with the criteria and exceptions. The policy managers comprise an access manager (218) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the source/destination policy (218). The policy managers (216) further comprise a content manager (220) for restricting transmission of e-mail messages (204) between the first site and the second sites in accordance with the content policy (220), and a virus manager (224) for restriction transmission of e-mail messages (204) between the first site and the second sites in accordance with the virus policy (224).
-
Citations
15 Claims
-
1. A method for transmitting a message between a sender associated with a first e-mail firewall and a recipient associated with a second e-mail firewall, the method comprising:
-
intercepting a message from the sender intended for the recipient;
searching an encryption directory for an entry associated with the recipient;
retrieving an encryption key associated with a second firewall, the second firewall associated with the recipient;
encoding the message with the encryption key of the second e-mail firewall to provide an encrypted message; and
allowing the message to proceed through the firewall. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for receiving a message from a sender associated with a first e-mail firewall, the first e-mail firewall encoding the message by using an encryption key of the second e-mail firewall, comprising:
-
intercepting the message by the second e-mail firewall;
decoding the message with a private key of the second e-mail firewall; and
allowing the message to proceed through the firewall to the recipient.
-
-
7. A method for controlling e-mail message transmission across an e-mail firewall, the e-mail firewall interposed between an internal network and external networks, the method comprising:
-
intercepting a message from a sender associated with the internal network to a recipient associated with an external network;
filtering the message by examining content associated with the message by employing user defined content filter conditions of the e-mail firewall; and
restricting the transmission of the message in accordance with the results of said filtering. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
Specification