CN115426331B - Mail transmission method, mail transmission device, computer equipment and storage medium - Google Patents

Mail transmission method, mail transmission device, computer equipment and storage medium Download PDF

Info

Publication number
CN115426331B
CN115426331B CN202211044342.4A CN202211044342A CN115426331B CN 115426331 B CN115426331 B CN 115426331B CN 202211044342 A CN202211044342 A CN 202211044342A CN 115426331 B CN115426331 B CN 115426331B
Authority
CN
China
Prior art keywords
information
mail
mailbox
blockchain
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211044342.4A
Other languages
Chinese (zh)
Other versions
CN115426331A (en
Inventor
王绍刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC, ICBC Technology Co Ltd filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202211044342.4A priority Critical patent/CN115426331B/en
Publication of CN115426331A publication Critical patent/CN115426331A/en
Application granted granted Critical
Publication of CN115426331B publication Critical patent/CN115426331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present application relates to a mail transmission method, apparatus, computer device, storage medium and computer program product. The application relates to the technical field of artificial intelligence. The method comprises the following steps: acquiring mail information, a mail receiving address and user information of a mail sending address; generating private key information corresponding to user information of the sending mailbox based on a blockchain secret key generation strategy, and uploading the private key information to a blockchain, wherein the private key information is used for carrying out identity verification on the user information; encrypting the mail information, and carrying out digital signature processing on the mail information according to the private key information and a blockchain digital signature strategy to obtain encrypted mail information containing digital signature information; uploading the digital signature information to a blockchain; and transmitting the encrypted mail information to a mail receiving end corresponding to the mail receiving address. By adopting the method, the safety of mail transmission can be improved.

Description

Mail transmission method, mail transmission device, computer equipment and storage medium
Technical Field
The present application relates to the field of artificial intelligence technologies, and in particular, to a mail transmission method, apparatus, computer device, and storage medium.
Background
The current email protocol consists of three major protocols, smtp (Simple Mail Transfer Protocol ), pop3 (Post Office Protocol-Version 3, post office protocol Version 3), imap (Internet Message Access Protoco, mail acquisition protocol). Although each of the three protocols has advantages and disadvantages, the security of the three protocols has certain problems.
The traditional mail transmission safety protection method mostly relies on a third party to carry out real-time safety protection on each mail system, so that the damage operation of external virus mails and attack mails on the mail system is avoided, however, the third party carries out unified safety management on the mail systems of all agents through a universality principle, so that the protection effect on single mail transmission is poor, and the mail transmission safety is low.
Disclosure of Invention
Based on this, it is necessary to provide a mail transmission method, an apparatus, a computer device, a computer readable storage medium, and a computer program product in view of the above technical problems.
In a first aspect, the present application provides a mail transmission method. The method comprises the following steps:
acquiring mail information, a mail receiving address and user information of a mail sending address;
Generating private key information corresponding to user information of the sending mailbox based on a blockchain secret key generation strategy, and uploading the private key information to a blockchain, wherein the private key information is used for carrying out identity verification on the user information;
encrypting the mail information, and carrying out digital signature processing on the mail information according to the private key information and a blockchain digital signature strategy to obtain encrypted mail information containing digital signature information; uploading the digital signature information to a blockchain;
and transmitting the encrypted mail information to a mail receiving end corresponding to the mail receiving address.
Optionally, the generating, based on the blockchain key generating policy, private key information corresponding to the user information of the sender mailbox includes:
acquiring block chain account information corresponding to the mail sending mailbox; the blockchain account information is account information of user information of the sender mailbox on a blockchain;
establishing public key information of the mail sending mailbox according to a mailbox address corresponding to the user information of the mail sending mailbox and block chain account information corresponding to the mail sending mailbox;
and determining private key information corresponding to the user information of the sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the sending mailbox.
Optionally, the encrypting the mail information and performing digital signature processing on the mail information according to the private key information and the blockchain digital signature policy to obtain encrypted mail information including digital signature information includes:
encrypting the mail information through an encryption algorithm to obtain initial encrypted mail information;
generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and a blockchain digital signature strategy through the private key information; the digital signature information is identification information of the private key information;
and taking the initial encrypted mail information containing the digital signature information as the encrypted mail information.
Optionally, after obtaining the encrypted mail information containing the digital signature information, the method further includes:
generating mail certificates of the encrypted mail information according to the encrypted mail information and a blockchain certificate generation strategy; uploading the mail voucher to the blockchain; the mail certificate is used for proving that the user information of the encrypted mail information is the user information of the mail sending box.
In a second aspect, the present application provides a mail transmission method. The method comprises the following steps:
Receiving encrypted mail information, wherein the encrypted mail information comprises digital signature information; the digital signature information is obtained through a blockchain digital signature generation strategy;
acquiring private key information from a blockchain according to the digital signature information of the encrypted mail information, and verifying whether the user information of the mail sending mailbox corresponding to the private key information is identical to the user information of a preset mail sending mailbox;
and under the condition that the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox, carrying out decryption processing on the encrypted mail information through a decryption algorithm to obtain the mail information.
Optionally, the encrypted mail information includes a mail certificate, and after the user information of the sending mailbox corresponding to the private key information is the same as the user information of the preset sending mailbox, the method further includes:
verifying whether the mail certificate is the same as a preset mail certificate;
and under the condition that the mail certificate is the same as the preset mail certificate, executing the step of decrypting the encrypted mail information through a decryption algorithm to obtain the mail information.
Optionally, the method further comprises:
Responding to evaluation operation of a user of a receiving mailbox, and acquiring an evaluation value of a sending mailbox corresponding to the evaluation operation;
determining a new evaluation value of the sending mailbox according to the evaluation value of the sending mailbox and the historical evaluation value of the sending mailbox;
and under the condition that the new evaluation value is smaller than a preset evaluation threshold value, storing the account information of the mail sending mailbox and the user information of the mail sending mailbox into a blacklist database.
In a third aspect, the present application further provides a mail transmission apparatus. The device comprises:
the acquisition module is used for acquiring mail information, a mail receiving address and user information of a mail sending address;
the generation module is used for generating private key information corresponding to the user information of the sending mailbox based on a blockchain secret key generation strategy and uploading the private key information to a blockchain; the private key information is used for carrying out identity verification on the user information
The encryption module is used for carrying out encryption processing on the mail information, and carrying out digital signature processing on the mail information according to the private key information and the blockchain digital signature strategy to obtain encrypted mail information containing digital signature information; uploading the digital signature information to a blockchain;
And the transmission module is used for transmitting the encrypted mail information to a mail receiving end corresponding to the mail receiving address.
Optionally, the generating module is specifically configured to:
acquiring block chain account information corresponding to the mail sending mailbox; the blockchain account information is account information of user information of the sender mailbox on a blockchain;
establishing public key information of the mail sending mailbox according to a mailbox address corresponding to the user information of the mail sending mailbox and block chain account information corresponding to the mail sending mailbox;
and determining private key information corresponding to the user information of the sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the sending mailbox.
Optionally, the encryption module is specifically configured to:
encrypting the mail information through an encryption algorithm to obtain initial encrypted mail information;
generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and a blockchain digital signature strategy through the private key information; the digital signature information is identification information of the private key information;
and taking the initial encrypted mail information containing the digital signature information as the encrypted mail information.
Optionally, the apparatus further includes:
the certificate generation module is used for generating a mail certificate of the encrypted mail information according to the encrypted mail information and a blockchain certificate generation strategy; uploading the mail voucher to the blockchain; the mail certificate is used for proving that the user information of the encrypted mail information is the user information of the mail sending box.
In a fourth aspect, the present application further provides a mail transmission apparatus. The device comprises:
the receiving module is used for receiving the encrypted mail information, wherein the encrypted mail information comprises digital signature information; the digital signature information is obtained through a blockchain digital signature generation strategy;
the verification module is used for acquiring private key information from the blockchain according to the digital signature information of the encrypted mail information and verifying whether the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox;
and the decryption module is used for decrypting the encrypted mail information through a decryption algorithm under the condition that the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox, so as to obtain the mail information.
Optionally, the apparatus further includes:
the judging module is used for verifying whether the mail certificate is the same as a preset mail certificate or not;
and the execution module is used for executing the step of decrypting the encrypted mail information through a decryption algorithm to obtain the mail information under the condition that the mail certificate is the same as the preset mail certificate.
Optionally, the apparatus further includes:
the response module is used for responding to the evaluation operation of the user of the receiving mailbox and obtaining the evaluation value of the sending mailbox corresponding to the evaluation operation;
the evaluation module is used for determining a new evaluation value of the mail sending box according to the evaluation value of the mail sending box and the historical evaluation value of the mail sending box;
and the storage module is used for storing the account information of the mail sending mailbox and the user information of the mail sending mailbox into a blacklist database under the condition that the new evaluation value is smaller than a preset evaluation threshold value.
In a fifth aspect, the present application further provides a mail transmission system. The system is characterized by comprising a mail sending end, a mail receiving end and a blockchain system, wherein:
the mail sending end is used for acquiring mail information, a mail receiving address and user information of a mail sending box; generating private key information corresponding to the user information of the sending mailbox based on a blockchain secret key generation strategy, and uploading the private key information to a blockchain; encrypting the mail information, and carrying out digital signature processing on the mail information according to the private key information and a blockchain digital signature strategy to obtain encrypted mail information containing digital signature information; uploading the digital signature information to a blockchain; transmitting the encrypted mail information to a mail receiving end corresponding to the mail receiving address;
The block chain system is used for storing the private key information and the digital signature information;
the mail receiving end is used for receiving encrypted mail information, and the encrypted mail information comprises private key information; the private key information is obtained through a blockchain key generation strategy; acquiring private key information from the encrypted mail information on a blockchain, and verifying whether user information of an outgoing mail box corresponding to the private key information is identical to user information of a preset outgoing mail box; and under the condition that the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox, carrying out decryption processing on the encrypted mail information through a decryption algorithm to obtain the mail information.
In a sixth aspect, the present application provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the steps of the method of any of the first or second aspects when the computer program is executed.
In a seventh aspect, the present application provides a computer-readable storage medium. On which a computer program is stored which, when being executed by a processor, implements the steps of the method of any of the first or second aspects.
In an eighth aspect, the present application provides a computer program product. The computer program product comprising a computer program which, when executed by a processor, implements the steps of the method of any of the first or second aspects.
The mail transmission method, the mail transmission device, the computer equipment, the storage medium and the computer program product are realized by acquiring mail information, a mail receiving mailbox address and user information of a mail sending mailbox; generating private key information corresponding to the user information of the sending mailbox based on a blockchain secret key generation strategy, and uploading the private key information to a blockchain; the private key information is used for carrying out identity verification on the user information; encrypting the mail information, and carrying out digital signature processing on the mail information according to the private key information and a blockchain digital signature strategy to obtain encrypted mail information containing digital signature information; uploading the digital signature information to a blockchain; and transmitting the encrypted mail information to a mail receiving end corresponding to the mail receiving address. By encrypting and signing each mail message, the security protection is provided for each mail, so that the security of mail transmission is improved.
Drawings
FIG. 1 is an application environment diagram of a mail transfer method in one embodiment;
FIG. 2 is a flow diagram of a method of mail transmission (mail sender) in one embodiment;
FIG. 3 is a flow chart of a method of mail transmission (mail receiving end) in one embodiment;
FIG. 4 is a flow diagram of an example of mail transfer (mail sender) in one embodiment;
FIG. 5 is a flow diagram of an example of mail transfer (mail receiving end) in one embodiment;
FIG. 6 is a flow diagram of an example mail transfer interaction in one embodiment;
FIG. 7 is a block diagram showing the structure of a mail transmission (mail sender) device in one embodiment;
FIG. 8 is a block diagram showing the structure of a mail transmission (mail receiving side) apparatus in one embodiment;
fig. 9 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The mail transmission method provided by the embodiment of the application can be applied to an application environment shown in fig. 1, wherein a mail transmission system comprises a mail sending end 101, a mail receiving end 102 and a blockchain system 103, and the mail sending end 101 and the mail receiving end 102 interact through the blockchain system 103. The mail transmission system can be applied to a terminal, a server and a system comprising the terminal and the server, and is realized through interaction of the terminal and the server. The terminal may include, but is not limited to, various personal computers, notebook computers, tablet computers, and the like. The terminal encrypts and signs each mail message to provide security protection for each mail, thereby improving the security of mail transmission.
In one embodiment, as shown in fig. 2, a mail transmission method is provided, and the method is applied to a terminal for illustration, and includes the following steps:
step S201, acquiring mail information, an address of a mail receiving mailbox, and user information of a mail sending mailbox.
In this embodiment, the terminal obtains the mail information, the mail receiving address, the mail sending address, and the account information of the mail sending mailbox by responding to the mail writing operation of the user of the mail sending mailbox. The terminal takes the address of the mail sending mailbox and the account information of the mail sending mailbox as the user information of the mail sending mailbox.
Step S202, based on the block chain secret key generation strategy, generating private key information corresponding to the user information of the sending mailbox, and uploading the private key information to the block chain.
The private key information is used for carrying out identity verification on the user information.
In this embodiment, the terminal generates private key information corresponding to the user information according to the user information of the sender mailbox through a key generation policy of the blockchain. The terminal then uploads the private key information to the blockchain, synchronizing to nodes on each chain of the blockchain. The private key information comprises private key content information and private key name information. The specific process of generating the private key information will be described in detail later.
Step S203, the mail information is encrypted, and the mail information is digitally signed according to the private key information and the blockchain digital signature strategy, so as to obtain encrypted mail information containing the digital signature information, and the digital signature information is uploaded to the blockchain.
In this embodiment, the terminal encrypts the acquired mail information according to the private key information, to obtain initial encrypted mail information. And the terminal carries out digital signature processing on the initial encrypted mail information through a blockchain digital signature strategy to obtain digital signature information corresponding to the initial encrypted mail information. The terminal takes the initial encrypted mail information subjected to digital signature processing as encrypted mail information. And upload the digital signature information to the blockchain. The specific encryption process will be described in detail later.
Specifically, the process of performing digital signature processing on the initial encrypted mail information according to the private key information and the blockchain digital signature strategy is as follows: the terminal obtains the request data from the user information of the mail sending mailbox and generates initial digital signature information according to the private key information corresponding to the user information. Wherein the initial digital signature information includes private key name information. The terminal transmits the initial digital signature information and the request data to the prophetic intelligent contract system. And the intelligent contract system of the prophetic machine performs aggregate signature on the initial digital signature information and the request data according to the requirement of the request data to obtain the digital signature information. The terminal uploads the digital signature information to the blockchain.
Step S204, the encrypted mail information is transmitted to the target mail address.
In this embodiment, the terminal transmits the encrypted mail information to the target recipient mailbox address through the conventional mail transmission channel.
Based on the scheme, the mail information is encrypted and signed, so that safety protection is provided for each mail, and the mail transmission safety is improved.
Optionally, generating private key information corresponding to user information of the sender mailbox based on the blockchain key generation policy includes: acquiring block chain account information corresponding to a mail sending mailbox; the block chain account information is the account information of the user information of the sending mailbox on the block chain; establishing public key information of the mail sending mailbox according to the mailbox address corresponding to the user information of the mail sending mailbox and the blockchain account information; and determining private key information corresponding to the user information of the mail sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the mail sending mailbox.
In this embodiment, the user information of the sender mailbox includes a mailbox address of the sender mailbox, and the terminal obtains the blockchain account information corresponding to the sender mailbox through the user information of the sender mailbox. The terminal generates public key information of the mail sending mailbox through a mailbox address of the mail sending mailbox and a blockchain account corresponding to the mail sending mailbox, and establishes private key information corresponding to the user information of the mail sending mailbox based on a blockchain key generation strategy according to the public key information and the user information of the mail sending mailbox.
The blockchain key generation policy may be, but not limited to, any blockchain key generation policy, for example, the terminal uses the mailbox address of the outgoing mailbox as public key information, and sends the user information of the outgoing mailbox and the blockchain account information corresponding to the outgoing mailbox to the SM9 (GM/T0044-2016 SM9 identification cryptographic algorithm) or SM2 (elliptic curve public key cryptographic algorithm) key generation center. And the private key information corresponding to the user information is generated by the user information of the sending mailbox and the public key information corresponding to the sending mailbox by any one of the key generation centers. And the private key information is sent to the terminal by any one of the key generating centers, and the terminal acquires the private key information corresponding to the user information of the mail sending mailbox. The terminal uploads the private key information to the blockchain and synchronizes to nodes on each chain of the blockchain through the blockchain.
Based on the scheme, the private key information corresponding to the user information of the sending mailbox is determined through the secret key generation strategy, and a data basis is provided for carrying out digital signature on the encrypted mail.
Optionally, the encrypting processing is performed on the mail information, and the digital signature processing is performed on the mail information according to the private key information and the blockchain digital signature policy to obtain the encrypted mail information containing the digital signature information, which comprises the following steps: encrypting the mail information through an encryption algorithm to obtain initial encrypted mail information; generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and the blockchain digital signature strategy through the private key information; the digital signature information is identification information of private key information; the initial encrypted mail information containing the digital signature is used as the encrypted mail information.
In this embodiment, the terminal performs encryption processing on the acquired mail information by presetting a mail encryption algorithm (i.e., encryption algorithm), to obtain initial encrypted mail information. The encryption algorithm may be, but not limited to, any mail encryption algorithm that can implement the above steps.
And the terminal carries out digital signature processing on the initial encrypted mail information based on a blockchain digital signature strategy through private key information to obtain signature data information of the initial encrypted mail information. The terminal uses the initial encrypted mail information containing the digital signature information as the encrypted mail information. The terminal presets the user information of the mail sending mailbox, the digital signature information is identification information of private key information, the terminal can acquire the private key information corresponding to the digital signature information on the blockchain through the digital signature information, and the terminal verifies whether the user information of the mail sending mailbox corresponding to the private key information is the preset user information or not.
Based on the scheme, the security of single mail transmission is improved by encrypting the mail information and performing double protection operation of digital signature on the mail information.
Optionally, after obtaining the encrypted mail information, the method further includes: generating mail credentials of the encrypted mail information according to the encrypted mail information and the blockchain credential generation strategy; uploading the mail certificate to the blockchain; the mail voucher is used for proving that the user information of the encrypted mail information is the user information of the sending mailbox.
In this embodiment, the terminal generates the mail certificate of the encrypted mail information according to the blockchain certificate generation policy. The blockchain credential generation policy is a generation rule of five elements of the blockchain credential. The terminal uploads the mail voucher to the blockchain and synchronizes to nodes on each chain of the blockchain through the blockchain.
Based on the scheme, the mail certificate of the encrypted mail information is generated, so that a user receiving the mail can verify whether the user information of the mail sending mailbox corresponding to the mail certificate is preset user information or not, and a multiple verification strategy is provided.
In one embodiment, as shown in fig. 3, a mail transmission method is provided, and the method is applied to a terminal for illustration, and includes the following steps:
step S301, receiving encrypted mail information, where the encrypted mail information includes digital signature information.
The private key information is obtained through a blockchain digital signature generation strategy.
In this embodiment, the terminal receives encrypted mail information including encrypted mail information, digital signature information, and mail certificates of the encrypted mail information through a conventional mail transmission path.
Step S302, the private key information is obtained from the blockchain according to the digital signature information of the encrypted mail information, and whether the user information of the mail sending mailbox corresponding to the private key information is identical to the user information of the preset mail sending mailbox is verified.
In this embodiment, the terminal presets the account address of the user information of the sender mailbox, sends the digital signature information of the encrypted mail information to the blockchain, and sends a query request to the blockchain through the request data in the digital signature information, and the blockchain queries the private key information corresponding to the digital signature information on the blockchain through an SM9 (GM/T0044-2016 SM9 identification cryptographic algorithm) or SM2 (elliptic curve public key cryptographic algorithm) algorithm, and feeds back the private key information to the terminal. And the terminal judges whether the account address of the user information of the mail sending mailbox corresponding to the private key information is the same as the preset account address of the user information of the mail sending mailbox according to the public key information (namely the account address of the user information of the mail sending mailbox) corresponding to the private key information.
Step S303, under the condition that the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox, the encrypted mail information is decrypted through a decryption algorithm, and the mail information is obtained.
In this embodiment, when the user information of the sending mailbox corresponding to the private key information is different from the user information of the preset sending mailbox, the terminal sends a prompt such as "mail source is unknown and risk is high" to the display end of the user of the receiving mailbox. And under the condition that the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox, the terminal decrypts the encrypted mail information through a decryption algorithm to obtain the mail information corresponding to the encrypted mail information. The decryption algorithm corresponds to the mail encryption algorithm, namely, the mail encrypted by the mail encryption algorithm can only be decrypted by the decryption algorithm.
Based on the scheme, whether the user information of the mail sending box corresponding to the private key information is the same as the user information of the preset mail sending box is verified, so that the problem that a mail receiving box user is attacked and destroyed due to the fact that the mail receiving box user opens risk type mails by mistake is avoided.
Optionally, the encrypted mail information includes a mail certificate, and after the user information of the sending mailbox corresponding to the private key information is the same as the user information of the preset sending mailbox, the method further includes: verifying whether the mail certificate is the same as a preset mail certificate; and under the condition that the mail certificate is the same as the preset mail certificate, executing the step of decrypting the encrypted mail information through a decryption algorithm to obtain the mail information.
In this embodiment, the terminal presets a mail credential of user information of the sending mailbox, and obtains, on the blockchain, a mail credential corresponding to the private key information according to the private key information of the encrypted mail information. The terminal judges whether the mail certificate corresponding to the private key information is the same as the mail certificate of the preset user information. Under the condition that the mail certificate of the private key information is different from the mail certificate of the preset user information, the terminal sends prompt messages such as unknown mail source, high risk and the like to the display end of the user of the receiving mailbox. In the case where the mail certificate of the encrypted mail information is the same as the mail certificate of the preset user information, step S303 is performed. The present step may be executed separately from step S302, simultaneously with the execution of the step, or only any one of the steps may be executed.
Based on the scheme, through the mail certificate, whether the user information of the mail sending mailbox corresponding to the mail certificate is preset user information or not is verified for the user receiving the mail, and a multiple verification strategy is provided.
Optionally, the method further comprises: responding to the evaluation operation of the user of the receiving mailbox, and acquiring an evaluation value of the sending mailbox corresponding to the evaluation operation; determining a new evaluation value of the mail sending box according to the evaluation value of the mail sending box and the historical evaluation value of the mail sending box; and under the condition that the new evaluation value is smaller than the preset evaluation threshold value, storing the account information of the mail sending mailbox and the user information of the mail sending mailbox into a blacklist database.
In this embodiment, after the user opens the mail information, the evaluation operation may be selectively performed on the mail sending box corresponding to the mail information. And the terminal responds to the evaluation operation of the user of the receiving mailbox and acquires the evaluation value of the sending mailbox corresponding to the evaluation operation. Wherein the evaluation value can be, but is not limited to, a value corresponding to a good-bad evaluation system such as a score, a rating, etc. The terminal obtains the historical evaluation value of the mail sending box, and updates the evaluation value of the mail sending box through the evaluation value of the mail sending box by the user of the mail receiving box, so as to obtain the new evaluation value of the mail sending box. The evaluation value of the sending mailbox is updated by carrying out weighted summation operation on the historical evaluation value of the sending mailbox and the evaluation value of the sending mailbox, so that the evaluation value of the sending mailbox is updated. Or the historical evaluation value of the mailboxes can be replaced by the evaluation value of the mailboxes, so that the evaluation value of the mailboxes is updated.
The terminal presets an evaluation threshold value and judges whether the new evaluation value of the mail sending mailbox is smaller than the preset evaluation threshold value. And under the condition that the new evaluation value of the mail sending box is not smaller than a preset evaluation threshold, the terminal takes the new evaluation value as the evaluation value of the mail sending box and stores the new evaluation value into a mail sending box evaluation value database. And under the condition that the new evaluation value of the mail sending mailbox is smaller than a preset evaluation threshold value, storing account information of the terminal mail sending mailbox and user information of the mail sending mailbox into a blacklist database.
Based on the scheme, by evaluating the mail sending mailbox, the mail sending mailbox with higher risk is further subjected to risk prevention on the double-layer mail transmission safety prevention through the blockchain digital signature technology and the mail encryption technology, so that the safety protection effect on a mail receiving system is improved.
In one embodiment, as shown in FIG. 1, a mail transmission system is provided, the system comprising a mail sender 101, a mail receiver 102, and a blockchain system 103, wherein:
a mail sending end 101, configured to obtain mail information, a mail receiving address, and user information of a mail sending box; generating private key information corresponding to user information of the sending mailbox based on a blockchain secret key generation strategy; uploading private key information to a blockchain; encrypting the mail information, and carrying out digital signature processing on the mail information according to the private key information and the blockchain digital signature strategy to obtain encrypted mail information containing the digital signature information; uploading the digital signature information to a blockchain; transmitting the encrypted mail information to a target mail receiving address;
a blockchain system 103 for storing digital signature information and private key information;
The mail receiving end 102 is configured to receive encrypted mail information, where the encrypted mail information includes private key information, and the private key information is obtained through a blockchain key generation policy; acquiring private key information on a blockchain according to the encrypted mail information, and verifying whether user information of an email sending box corresponding to the private key information is identical to user information of a preset email sending box; and under the condition that the user information of the mail sending box corresponding to the private key information is the same as the user information of the preset mail sending box, the encrypted mail information is decrypted through a decryption algorithm to obtain the mail information.
In this embodiment, the mail sending end 101 and the mail receiving end 102 perform an interactive operation through the blockchain system 103, and both the mail sending end 101 and the mail receiving end 102 may be implemented through terminals. The mail sender 101 is configured to encrypt mail information, and upload private key information and digital signature information that generate encrypted mail information to the blockchain system 103. The mail transmitting end 101 is configured to execute all contents of steps S201 to S204. The mail receiving end 102 is configured to obtain, through digital signature information of encrypted mail information, private key information corresponding to the digital signature information on the blockchain system 103, verify whether user information corresponding to the private key information of the encrypted mail information is preset user information, and decrypt the encrypted mail information. The mail receiving end 102 is configured to execute all contents of steps S301 to S303. The blockchain system 103 is configured to receive the private key information and the digital signature information of the mail sender 101, store the private key information and the digital signature information, and simultaneously, the blockchain system 103 is configured to receive the digital signature information of the encrypted mail information sent by the mail receiver 102, and query the private key information corresponding to the digital signature information.
The application also provides an example of mail transmission, as shown in fig. 4, the specific processing procedure includes the following steps:
step S401, obtaining mail information, mail receiving address, and user information of mail sending mailbox.
Step S402, obtaining the block chain account information corresponding to the sender mailbox.
Step S403, the public key information of the mail sending mailbox is established according to the mailbox address corresponding to the user information of the mail sending mailbox and the blockchain account information corresponding to the mail sending mailbox.
Step S404, determining private key information corresponding to the user information of the mail sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the mail sending mailbox.
Step S405, the private key information is uploaded to the blockchain.
In step S406, the mail information is encrypted by an encryption algorithm to obtain initial encrypted mail information.
Step S407, generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and the blockchain digital signature strategy through private key information; the digital signature is identification information of private key information.
In step S408, the digital signature information is uploaded to the blockchain.
Step S409, the initial encrypted mail information including the digital signature is taken as the encrypted mail information.
The application also provides an example of mail transmission, as shown in fig. 5, and the specific processing procedure includes the following steps.
In step S501, encrypted mail information is received, the encrypted mail information including digital signature information.
Step S502, obtaining private key information from the blockchain according to the digital signature information of the encrypted mail information, and verifying whether the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox.
In step S503, when the user information of the sender mailbox corresponding to the private key information is the same as the user information of the preset sender mailbox, the encrypted mail information is decrypted by a decryption algorithm to obtain the mail information.
Step S504, responding to the evaluation operation of the user of the receiving mailbox, and acquiring the evaluation value of the sending mailbox corresponding to the evaluation operation.
Step S505, determining a new evaluation value of the mailboxes according to the evaluation value of the mailboxes and the historical evaluation values of the mailboxes.
Step S506, under the condition that the new evaluation value is smaller than the preset evaluation threshold, the account information of the mail sending mailbox and the user information of the mail sending mailbox are stored in the blacklist database.
The application also provides an email transmission interaction example, as shown in fig. 6, the specific processing procedure includes the following steps:
In step S601, the mail sender uploads the private key information and the digital signature information to the blockchain.
In step S602, the mail sender transmits the encrypted mail information to the mail receiver.
In step S603, the mail receiving end sends the digital signature to the blockchain, and obtains private key information corresponding to the digital signature through the blockchain.
It is understood that the terminal may perform S401 to S409, S501 to S506, or S601 to S603.
It should be understood that, although the steps in the flowcharts related to the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a mail transmission device for realizing the mail transmission method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of one or more mail transmission devices provided below may refer to the limitation of the mail transmission method hereinabove, and will not be repeated herein.
In one embodiment, as shown in fig. 7, there is provided a mail transmission apparatus including: an acquisition module 710, a generation module 720, an encryption module 730, and a transmission module 740, wherein:
an acquiring module 710, configured to acquire mail information, an address of a mail receiving mailbox, and user information of a mail sending mailbox;
the generating module 720 is configured to generate private key information corresponding to user information of the sender mailbox based on a blockchain key generating policy, and upload the private key information to the blockchain; the private key information is used for carrying out identity verification on the user information;
the encryption module 730 is configured to encrypt the mail information, and perform digital signature processing on the mail information according to the private key information and the blockchain digital signature policy, so as to obtain encrypted mail information containing digital signature information; uploading the digital signature information to a blockchain;
And the transmission module 740 is used for transmitting the encrypted mail information to the mail address of the receiving mail.
Optionally, the generating module 720 is specifically configured to:
acquiring block chain account information corresponding to a mail sending mailbox; the block chain account information is the account information of the user information of the sending mailbox on the block chain;
establishing public key information of the mail sending mailbox according to a mailbox address corresponding to the user information of the mail sending mailbox and block chain account information corresponding to the mail sending mailbox;
and determining private key information corresponding to the user information of the mail sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the mail sending mailbox.
Optionally, the encryption module 730 is specifically configured to:
encrypting the mail information through an encryption algorithm to obtain initial encrypted mail information;
generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and the blockchain digital signature strategy through the private key information; the digital signature is the identification information of the private key information;
the initial encrypted mail information containing the digital signature is used as the encrypted mail information.
Optionally, the apparatus further comprises:
the certificate generation module is used for generating a mail certificate of the encrypted mail information according to the encrypted mail information and the blockchain certificate generation strategy; uploading the mail certificate to the blockchain; the mail voucher is used for proving that the user information of the encrypted mail information is the user information of the sending mailbox.
In one embodiment, as shown in fig. 8, there is provided a mail transmission apparatus including: a receiving module 810, a verifying module 820, and a decrypting module 830, wherein:
a receiving module 810 for receiving encrypted mail information, the encrypted mail information including digital signature information; the digital signature information is obtained through a block chain digital signature generation strategy;
the verification module 820 is configured to obtain private key information from the blockchain according to digital signature information of the encrypted mail information, and verify whether user information of an outgoing mailbox corresponding to the private key information is the same as user information of a preset outgoing mailbox;
the decryption module 830 is configured to decrypt the encrypted mail information by using a decryption algorithm to obtain the mail information when the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox.
Optionally, the apparatus further comprises:
the judging module is used for verifying whether the mail certificate is the same as a preset mail certificate;
and the execution module is used for executing the step of decrypting the encrypted mail information through a decryption algorithm to obtain the mail information under the condition that the mail certificate is the same as the preset mail certificate.
Optionally, the apparatus further comprises:
the response module is used for responding to the evaluation operation of the user of the receiving mailbox and obtaining an evaluation value of the sending mailbox corresponding to the evaluation operation;
the evaluation module is used for determining a new evaluation value of the mail sending box according to the evaluation value of the mail sending box and the historical evaluation value of the mail sending box;
and the storage module is used for storing the account information of the mail sending mailbox and the user information of the mail sending mailbox into the blacklist database under the condition that the new evaluation value is smaller than the preset evaluation threshold value.
The various modules in the mail transfer device described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure thereof may be as shown in fig. 9. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a mail transfer method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 9 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the computer device to which the present application applies, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In an embodiment, a computer device is provided, comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of the method embodiments described above when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, user information (including but not limited to user equipment information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (11)

1. A mail transmission method, the method comprising:
acquiring mail information, a mail receiving address and user information of a mail sending address;
acquiring block chain account information corresponding to the mail sending mailbox; the blockchain account information is account information of user information of the sender mailbox on a blockchain;
establishing public key information of the mail sending mailbox according to a mailbox address corresponding to the user information of the mail sending mailbox and block chain account information corresponding to the mail sending mailbox;
Determining private key information corresponding to the user information of the mail sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the mail sending mailbox;
uploading the private key information to a blockchain; the private key information is used for carrying out identity verification on the user information;
encrypting the mail information through an encryption algorithm to obtain initial encrypted mail information;
generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and a blockchain digital signature strategy through the private key information; the digital signature information is identification information of the private key information;
taking the initial encrypted mail information containing the digital signature information as encrypted mail information;
uploading the digital signature information to a blockchain;
and transmitting the encrypted mail information to a mail receiving end corresponding to the mail receiving address.
2. The method of claim 1, wherein after obtaining the encrypted mail message containing the digital signature information, further comprising:
generating mail certificates of the encrypted mail information according to the encrypted mail information and a blockchain certificate generation strategy; uploading the mail voucher to the blockchain; the mail certificate is used for proving that the user information of the encrypted mail information is the user information of the mail sending box.
3. A mail transmission method, the method comprising:
receiving encrypted mail information, wherein the encrypted mail information comprises digital signature information; the digital signature information is obtained through a blockchain digital signature generation strategy;
acquiring private key information from a blockchain according to the digital signature information of the encrypted mail information, and verifying whether the user information of the mail sending mailbox corresponding to the private key information is identical to the user information of a preset mail sending mailbox; the determining process of the private key information comprises the following steps: acquiring block chain account information corresponding to the mail sending mailbox; the blockchain account information is account information of user information of the sender mailbox on a blockchain; establishing public key information of the mail sending mailbox according to a mailbox address corresponding to the user information of the mail sending mailbox and block chain account information corresponding to the mail sending mailbox; determining private key information corresponding to the user information of the mail sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the mail sending mailbox;
under the condition that the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox, the encrypted mail information is decrypted through a decryption algorithm to obtain mail information; the determination process of the encrypted mail information comprises the following steps: encrypting the mail information through an encryption algorithm to obtain initial encrypted mail information; and generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and a blockchain digital signature strategy through the private key information, and taking the initial encrypted mail information containing the digital signature information as encrypted mail information.
4. The method of claim 3, wherein the encrypted mail information includes mail credentials, and further comprising, after the case that the user information of the outgoing mailbox corresponding to the private key information is the same as the user information of the preset outgoing mailbox:
verifying whether the mail certificate is the same as a preset mail certificate;
and under the condition that the mail certificate is the same as the preset mail certificate, executing the step of decrypting the encrypted mail information through a decryption algorithm to obtain the mail information.
5. A method according to claim 3, characterized in that the method further comprises:
responding to evaluation operation of a user of a receiving mailbox, and acquiring an evaluation value of a sending mailbox corresponding to the evaluation operation;
determining a new evaluation value of the sending mailbox according to the evaluation value of the sending mailbox and the historical evaluation value of the sending mailbox;
and under the condition that the new evaluation value is smaller than a preset evaluation threshold value, storing the account information of the mail sending mailbox and the user information of the mail sending mailbox into a blacklist database.
6. A mail transmission system, the system comprising a mail sender, a mail receiver, and a blockchain system, wherein:
The mail sending end is used for acquiring mail information, a mail receiving address and user information of a mail sending box; acquiring block chain account information corresponding to the mail sending mailbox; the blockchain account information is account information of user information of the sender mailbox on a blockchain; establishing public key information of the mail sending mailbox according to a mailbox address corresponding to the user information of the mail sending mailbox and block chain account information corresponding to the mail sending mailbox; determining private key information corresponding to the user information of the mail sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the mail sending mailbox; uploading the private key information to a blockchain; the private key information is used for carrying out identity verification on the user information; encrypting the mail information through an encryption algorithm to obtain initial encrypted mail information; generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and a blockchain digital signature strategy through the private key information; the digital signature information is identification information of the private key information; taking the initial encrypted mail information containing the digital signature information as encrypted mail information; uploading the digital signature information to a blockchain; transmitting the encrypted mail information to a mail receiving end corresponding to the mail receiving address;
The block chain system is used for storing the private key information and the digital signature information;
the mail receiving end is used for receiving encrypted mail information, and the encrypted mail information comprises digital signature information; the digital signature information is obtained through a blockchain digital signature generation strategy; acquiring private key information on a blockchain according to the digital signature information of the encrypted mail information, and verifying whether the user information of the mail sending mailbox corresponding to the private key information is identical to the user information of a preset mail sending mailbox; and under the condition that the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox, carrying out decryption processing on the encrypted mail information through a decryption algorithm to obtain the mail information.
7. A mail transfer device, the device comprising:
the acquisition module is used for acquiring mail information, a mail receiving address and user information of a mail sending address;
the generation module is used for acquiring the block chain account information corresponding to the sender mailbox; the blockchain account information is account information of user information of the sender mailbox on a blockchain; establishing public key information of the mail sending mailbox according to a mailbox address corresponding to the user information of the mail sending mailbox and block chain account information corresponding to the mail sending mailbox; determining private key information corresponding to the user information of the mail sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the mail sending mailbox; uploading the private key information to a blockchain; the private key information is used for carrying out identity verification on the user information;
The encryption module is used for carrying out encryption processing on the mail information through an encryption algorithm to obtain initial encrypted mail information; generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and a blockchain digital signature strategy through the private key information; the digital signature information is identification information of the private key information; taking the initial encrypted mail information containing the digital signature information as encrypted mail information; uploading the digital signature information to a blockchain;
and the transmission module is used for transmitting the encrypted mail information to a mail receiving end corresponding to the mail receiving address.
8. A mail transfer device, the device comprising:
the receiving module is used for receiving the encrypted mail information, wherein the encrypted mail information comprises digital signature information; the digital signature information is obtained through a blockchain digital signature generation strategy;
the verification module is used for acquiring private key information on a blockchain according to the digital signature information of the encrypted mail information and verifying whether the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of a preset mail sending mailbox; the determining process of the private key information comprises the following steps: acquiring block chain account information corresponding to the mail sending mailbox; the blockchain account information is account information of user information of the sender mailbox on a blockchain; establishing public key information of the mail sending mailbox according to a mailbox address corresponding to the user information of the mail sending mailbox and block chain account information corresponding to the mail sending mailbox; determining private key information corresponding to the user information of the mail sending mailbox through a blockchain key generation strategy according to the public key information and the user information of the mail sending mailbox;
The decryption module is used for decrypting the encrypted mail information through a decryption algorithm under the condition that the user information of the mail sending mailbox corresponding to the private key information is the same as the user information of the preset mail sending mailbox, so as to obtain mail information; the determination process of the encrypted mail information comprises the following steps: encrypting the mail information through an encryption algorithm to obtain initial encrypted mail information; and generating digital signature information of the initial encrypted mail information according to the initial encrypted mail information and a blockchain digital signature strategy through the private key information, and taking the initial encrypted mail information containing the digital signature information as encrypted mail information.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 2 or 3 to 5 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 2 or of claims 3 to 5.
11. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any one of claims 1 to 2 or claims 3 to 5.
CN202211044342.4A 2022-08-30 2022-08-30 Mail transmission method, mail transmission device, computer equipment and storage medium Active CN115426331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211044342.4A CN115426331B (en) 2022-08-30 2022-08-30 Mail transmission method, mail transmission device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211044342.4A CN115426331B (en) 2022-08-30 2022-08-30 Mail transmission method, mail transmission device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115426331A CN115426331A (en) 2022-12-02
CN115426331B true CN115426331B (en) 2024-03-22

Family

ID=84199921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211044342.4A Active CN115426331B (en) 2022-08-30 2022-08-30 Mail transmission method, mail transmission device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115426331B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193750A (en) * 2020-01-06 2020-05-22 李蕴光 Mailbox encryption method, mailbox decryption method and mailbox processing method based on block chain
CN111241533A (en) * 2020-01-08 2020-06-05 深圳壹账通智能科技有限公司 Block chain-based password management method and device and computer-readable storage medium
CN112822255A (en) * 2020-12-31 2021-05-18 平安科技(深圳)有限公司 Block chain-based mail processing method, mail sending end, receiving end and equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193750A (en) * 2020-01-06 2020-05-22 李蕴光 Mailbox encryption method, mailbox decryption method and mailbox processing method based on block chain
CN111241533A (en) * 2020-01-08 2020-06-05 深圳壹账通智能科技有限公司 Block chain-based password management method and device and computer-readable storage medium
CN112822255A (en) * 2020-12-31 2021-05-18 平安科技(深圳)有限公司 Block chain-based mail processing method, mail sending end, receiving end and equipment

Also Published As

Publication number Publication date
CN115426331A (en) 2022-12-02

Similar Documents

Publication Publication Date Title
US9825919B2 (en) Public key encryption algorithms for hard lock file encryption
US8379857B1 (en) Secure key distribution for private communication in an unsecured communication channel
CN104901942B (en) A kind of distributed access control method based on encryption attribute
US10148438B2 (en) Methods and apparatus for protecting sensitive data in distributed applications
CN106576043B (en) Virally allocatable trusted messaging
US11457018B1 (en) Federated messaging
US9203610B2 (en) Systems and methods for secure peer-to-peer communications
CN112822255B (en) Block chain-based mail processing method, mail sending end, receiving end and equipment
JP2016158189A (en) Change direction with key control system and change direction with key control method
CN109905229B (en) Anti-quantum computing Elgamal encryption and decryption method and system based on group asymmetric key pool
US20140281485A1 (en) Efficient Encryption, Escrow and Digital Signatures
CN111294203A (en) Information transmission method
CN110597836A (en) Information query request response method and device based on block chain network
CN103731423A (en) Safe method for repeated data deleting
US20160359822A1 (en) Sovereign share encryption protocol
US20140237239A1 (en) Techniques for validating cryptographic applications
US20160080336A1 (en) Key Usage Detection
CN113365264B (en) Block chain wireless network data transmission method, device and system
US20210144002A1 (en) Secondary Channel Authentication of Public Keys
JP7247332B2 (en) Systems and methods for transmitting and retrieving messages using blockchain
Kılıç Encryption methods and comparison of popular chat applications
CN116684102A (en) Message transmission method, message verification method, device, equipment, medium and product
CN109120576A (en) Data sharing method and device, computer equipment and storage medium
CN115426331B (en) Mail transmission method, mail transmission device, computer equipment and storage medium
US20220109657A1 (en) Email encryption system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant