Method and system for securing E-mail transmissions
First Claim
1. A method for frustrating unauthorized access to an electronic mail message having address, body and attachment information and being transmitted from a first computing device to a second computing device, comprising:
- at the first computing device;
detecting a request to send the message from a mall user agent application being executed at the first computing device;
extracting the body information from the message;
encrypting the extracted body information;
replacing the extracted body information in the message with the encrypted body information;
extracting the attachment information from the message;
encrypting the extracted attachment information;
replacing the extracted attachment information in the message with the encrypted attachment information; and
,returning the message having the encrypted body and attachment information to the mail user application for transmission to the second computing device in accordance with the address information; and
transmitting the message having the encrypted body and attachment information in lieu of the extracted body and attachment information to a third computing device distinct from the second computing device; and
,at the third computing device;
decrypting and re-encrypting the transmitted body information;
decrypting and re-encrypting the transmitted attachment information; and
,transmitting the re-encrypted body and attachment information in lieu of the extracted body and attachment information to the second computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for frustrating unauthorized access to an electronic mail message having address, body and attachment information and being transmitted from a first computer to a second computer, including: at the first computer: detecting a request to send the message; encrypting the extracted body information; replacing the extracted body information with the encrypted body information; extracting the attachment information; encrypting the extracted attachment information; replacing the extracted attachment information with the encrypted attachment information; returning the message having the encrypted body and attachment information to the mail user application; and transmitting the message having the encrypted body and attachment information to a third computer; and, at the third computer: decrypting and re-encrypting the transmitted body information; decrypting and re-encrypting the transmitted attachment information; and, transmitting the re-encrypted body and attachment information to the second computer.
-
Citations
21 Claims
-
1. A method for frustrating unauthorized access to an electronic mail message having address, body and attachment information and being transmitted from a first computing device to a second computing device, comprising:
-
at the first computing device; detecting a request to send the message from a mall user agent application being executed at the first computing device; extracting the body information from the message; encrypting the extracted body information; replacing the extracted body information in the message with the encrypted body information; extracting the attachment information from the message; encrypting the extracted attachment information; replacing the extracted attachment information in the message with the encrypted attachment information; and
,returning the message having the encrypted body and attachment information to the mail user application for transmission to the second computing device in accordance with the address information; and transmitting the message having the encrypted body and attachment information in lieu of the extracted body and attachment information to a third computing device distinct from the second computing device; and
,at the third computing device; decrypting and re-encrypting the transmitted body information; decrypting and re-encrypting the transmitted attachment information; and
,transmitting the re-encrypted body and attachment information in lieu of the extracted body and attachment information to the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for frustrating unauthorized access to an electronic mail message having address, body and attachment information and being transmitted from a first computing device executing a mail user agent application to a second computing device executing a mail user agent application, comprising:
-
at a third computing device; receiving the electronic mail message; decrypting and re-encrypting the body information; decrypting and re-encrypting the received attachment information; and
,transmitting the re-encrypted body and attachment information in lieu of the decrypted body and attachment information to the second computing device; and at the second computing device; extracting the re-encrypted body information from the transmitted message; decrypting the extracted body information; lacing the extracted body information in the message with the decrypted extracted body information; extracting the attachment information from the message; decrypting the extracted attachment information; replacing the extracted attachment information in the message with the decrypted extracted attachment information. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system for frustrating unauthorized access to an electronic mail message having address, body and attachment information and being transmitted from a first computing device to a second computing device, comprising:
-
a first computer readable medium being accessible by said first computing device and comprising code, which when executed by the first computing device causes the first computing device to; detect a request to send the message from a mail user agent application also being executed by the first computing device; extract the body information from the message;
encrypt the extracted body information;replace the extracted body information in the message with the encrypted body information; extract the attachment information from the message; encrypt the extracted attachment information; replace the extracted attachment information in the message with the encrypted attachment information; and
,return the message having the encrypted body and attachment information to the mail user application for transmission to the second computing device in accordance with the address information; and transmit the message having the encrypted body and attachment information in lieu of the extracted body and attachment information to a third computing device distinct from the second computing device; and
,a second computer readable medium being accessible by the third computing device and comprising code, which when executed by the third computing device causes the third computing device to; decrypt and re-encrypt the transmitted body information; decrypt and re-encrypt the transmitted attachment information; and
,transmit the re-encrypted body and attachment information in lieu of the extracted body and attachment information to the second computing device. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A system for frustrating unauthorized access to an electronic mail message having address, body and attachment information and being transmitted from a first computing device executing a mail user agent application to a second computing device executing a mail user agent application, comprising:
-
a first computer readable medium being accessible by a third computing device and comprising code, which when executed by the third computing device causes the third computing device to; receive the electronic mail message; decrypt and re-encrypt the body information; decrypt and re-encrypt the received attachment information; and
,transmit the re-encrypted body and attachment information in lieu of the decrypted body and attachment information to the second computing device; and a second computer readable medium being accessible by the second computing device and comprising code, which when executed by the second computing device causes the second computing device to; extract the re-encrypted body information from the transmitted message; decrypt the extracted body information; replace the extracted body information in the message with the decrypted extracted body information; extract the attachment information from the message;
decrypt the extracted attachment information;replace the extracted attachment information in the message with the decrypted extracted attachment information; and provide the message with the decrypted extracted body and attachment information to the mail user agent being executed by the second computing device.
-
Specification