Protecting sensitive email
First Claim
Patent Images
1. A system comprising:
- a computer hardware processor operable to;
receive an email comprising a designation, the designation indicating whether the email communicates sensitive information; and
divert the email; and
an adjudicator computer processor operable to;
receive the email diverted from the computer hardware processor;
apply one or more policies to the email, the one or more policies selected according to the designation, the one or more policies comprising rules for assuring email; and
determine whether to allow or block the email based on the policies; and
a mail transfer computer processor operable to direct the email to one or more recipients if the email is allowed;
the adjudicator computer processor further operable to;
receive a first copy of the email, the first copy encrypted according to an encryption certificate associated with the adjudicator computer processor;
receive a second copy of the email, the second copy encrypted according to an encryption certificate associated with at least one of the recipients;
decrypt the first copy of the email prior to applying the one or more policies; and
direct the second copy of the email to the mail transfer computer processor upon a determination that the first copy of the email complies with the selected one or more policies.
10 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, a plurality of components are located within an appliance configured to send and receive email. The appliance receives an email and selects one or more policies to apply based on a designation indicating that the email communicates sensitive information. The policies determine whether to allow or block the email according to rules for assuring email. If the email is allowed, the appliance directs the email to one or more recipients.
-
Citations
14 Claims
-
1. A system comprising:
-
a computer hardware processor operable to; receive an email comprising a designation, the designation indicating whether the email communicates sensitive information; and divert the email; and an adjudicator computer processor operable to; receive the email diverted from the computer hardware processor; apply one or more policies to the email, the one or more policies selected according to the designation, the one or more policies comprising rules for assuring email; and determine whether to allow or block the email based on the policies; and a mail transfer computer processor operable to direct the email to one or more recipients if the email is allowed; the adjudicator computer processor further operable to; receive a first copy of the email, the first copy encrypted according to an encryption certificate associated with the adjudicator computer processor; receive a second copy of the email, the second copy encrypted according to an encryption certificate associated with at least one of the recipients; decrypt the first copy of the email prior to applying the one or more policies; and direct the second copy of the email to the mail transfer computer processor upon a determination that the first copy of the email complies with the selected one or more policies. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving an email at a computer hardware processor; determining using the computer hardware processor that the email is designated as communicating sensitive information; applying using the computer hardware processor one or more policies selected according to the designation, the one or more policies comprising rules for assuring email; determining using the computer hardware processor whether to allow or block the email based on the policies; and directing using the computer hardware processor the email to one or more recipients if the email is allowed; and
further comprising;receiving in the computer hardware processor a first copy of the email, the first copy encrypted according to an encryption certificate associated with the appliance; receiving a second copy of the email, the second copy encrypted according to an encryption certificate associated with at least one of the recipients; decrypting the first copy of the email prior to applying the one or more policies; and directing the second copy of the email to the recipient upon a determination that the first copy of the email complies with the selected one or more policies. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
a computer hardware processor configured to; receive an email comprising a designation, the designation indicating whether the email communicates sensitive information; and divert the email; and an adjudicator computer processor operable to; receive the email diverted from the computer hardware processor; apply one or more policies to the email, the one or more policies selected according to the designation, the one or more policies comprising rules for assuring email; and determine whether to allow or block the email based on the policies; and a mail transfer computer processor operable to direct the email to one or more recipients if the email is allowed; the adjudicator computer processor further operable to; receive a first copy of the email, the first copy encrypted according to an encryption certificate associated with the adjudicator computer processor; receive a second copy of the email, the second copy encrypted according to an encryption certificate associated with at least one of the recipients; decrypt the first copy of the email prior to applying the one or more policies; and direct the second copy of the email to the mail transfer computer processor upon a determination that the first copy of the email complies with the selected one or more policies; wherein a determination that the email is designated as communicating sensitive information includes a determination that the sensitive information is in proximity to other sensitive information and a determination of the frequency of the sensitive information in the email.
-
Specification