CONTROLLING TRANSMISSION OF UNAUTHORIZED UNOBSERVABLE CONTENT IN EMAIL USING POLICY
First Claim
Patent Images
1. An apparatus for controlling email transmission of encrypted content comprisingan email receiver circuit to receive an electronic mail messagean email analysis circuit to determine if an electronic mail message contains unauthorized encrypted content,an email transmitter circuit andan encrypted email block circuit.
3 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and apparatus is disclosed to control mail server in handling encrypted messages.
-
Citations
30 Claims
-
1. An apparatus for controlling email transmission of encrypted content comprising
an email receiver circuit to receive an electronic mail message an email analysis circuit to determine if an electronic mail message contains unauthorized encrypted content, an email transmitter circuit and an encrypted email block circuit.
-
14. A computer-implemented method comprising controlling a processor to perform the steps of
opening an smtp body, scanning for a string comprising - - - BEGIN PGP MESSAGE - - - scanning for a block of text; -
scanning far a string comprising - - - END PGP MESSAGE - - - , and applying a policy to determine a selected disposition of the smtp body. - View Dependent Claims (15)
-
-
16. A computer-implemented method comprising controlling a processor to perform the steps of
opening an smtp message, and applying a policy to determine a selected disposition of the smtp message.
-
26. A computer-implemented method comprising controlling a processor to perform the steps of
opening a message body, performing a statistical analysis on the number of characters between full stops, performing a statistical analysis on the number of characters between spaces, and counting the percentage of words recognized by a dictionary program and applying a policy to determine a selected disposition of the message body.
- 28. A computer-implemented method comprising controlling a processor to perform the steps of reading a file extension of a file attached to an email and deleting the email if the file extension is an encrypted file extension.
-
30. A computer-implemented method comprising controlling a processor to perform the step of checking the initial and final bytes of a file attached to an email for consistency with its file extension.
Specification