Secure electronic mail system
    1.
    发明授权

    公开(公告)号:US10348670B2

    公开(公告)日:2019-07-09

    申请号:US16109525

    申请日:2018-08-22

    摘要: An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may include various features, including but not limited to: (1) secure transfer of e-mail messages, without the need for users to replace existing e-mail clients or to change e-mail addresses; (2) tracking of all actions performed in connection with an e-mail transmission; (3) the ability for a recipient to view information about an e-mail message, optionally including information about how other addressees have responded to it, before deciding whether to retrieve the e-mail message; (4) the aggregation of entire e-mail conversations into a single threaded view; (5) the ability to include both private and public messages in a single e-mail communication; (6) sender control over downstream actions performed in connection with an e-mail message; (7) flexible control over cryptographic methods used to encrypt emails messages for storage.

    Split-architecture message processing system

    公开(公告)号:US09948585B2

    公开(公告)日:2018-04-17

    申请号:US14702494

    申请日:2015-05-01

    IPC分类号: G06F15/16 H04L12/58 H04L29/06

    摘要: A message processing device with a split-architecture is described that allows for flexible control over data flow while enabling optimal processing based on available system resources. In one particular example, messages are processed in two stages prior to transmission to a destination. A cursory evaluation of each message determines whether a deeper level of processing is to be performed using additional resources. Then, messages capable of transmission with no perceivable delay may be transmitted directly, whereas messages to be processed using greater resources are directed to a workflow pipeline engine for more expensive processing at a later stage. The result is a low latency system allowing for efficient resource management, whose architecture is scalable and readily extendible, for example, to increase resources available during periods of high data flow.

    Secure electronics mail system
    5.
    发明授权

    公开(公告)号:US10171413B2

    公开(公告)日:2019-01-01

    申请号:US15989017

    申请日:2018-05-24

    摘要: An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may include various features, including but not limited to: (1) secure transfer of e-mail messages, without the need for users to replace existing e-mail clients or to change e-mail addresses; (2) tracking of all actions performed in connection with an e-mail transmission; (3) the ability for a recipient to view information about an e-mail message, optionally including information about how other addressees have responded to it, before deciding whether to retrieve the e-mail message; (4) the aggregation of entire e-mail conversations into a single threaded view; (5) the ability to include both private and public messages in a single e-mail communication; (6) sender control over downstream actions performed in connection with an e-mail message; (7) flexible control over cryptographic methods used to encrypt emails messages for storage.

    Data leak protection system and processing methods thereof

    公开(公告)号:US09754217B2

    公开(公告)日:2017-09-05

    申请号:US14702504

    申请日:2015-05-01

    摘要: A data leak protection system and methods thereof are described that identify and analyze a digital fingerprint for a data package, the digital fingerprint characterizing the data package based on a corpus of data within the data package. In one embodiment, an asset descriptor is configured to identify one or more assets within the corpus of data while a contextual analyzer frames the one or more assets into the prevailing contextual environment. Then, a domain identifier further identifies a data perimeter based on the assets identified for the prevailing contextual environment. A comparison of the digital fingerprint to a collection of domain specific identifiers allows further actions responsive to a digital fingerprint falling outside of the data perimeter for an identified contextual environment. In one example, a data leak triggers quarantining of the data package for further manual processing.