CN116192466A - Letter processing method, device, electronic equipment and storage medium - Google Patents

Letter processing method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116192466A
CN116192466A CN202310005756.4A CN202310005756A CN116192466A CN 116192466 A CN116192466 A CN 116192466A CN 202310005756 A CN202310005756 A CN 202310005756A CN 116192466 A CN116192466 A CN 116192466A
Authority
CN
China
Prior art keywords
mail
client
letter
ciphertext
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310005756.4A
Other languages
Chinese (zh)
Inventor
祝鹏
彭莎莎
陈琰
汪红刚
李钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongdawei Technology Co ltd
Original Assignee
Shenzhen Zhongdawei Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongdawei Technology Co ltd filed Critical Shenzhen Zhongdawei Technology Co ltd
Priority to CN202310005756.4A priority Critical patent/CN116192466A/en
Publication of CN116192466A publication Critical patent/CN116192466A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

The embodiment of the disclosure provides a mail encryption method, a mail decryption method, electronic equipment and a storage medium. The method is based on an authenticated public key exchange service, wherein the first client is a sender of mail and the second client is a receiver of mail. Both the first client and the second client possess public keys in a public key exchange service. Before the first client sends the mail, the first client obtains the public key of the second client from the public key exchange service after authentication, and encrypts the mail communication content by using the public key. After receiving the mail, the second client decrypts the mail content based on the local private key.

Description

Letter processing method, device, electronic equipment and storage medium
Technical Field
The disclosure relates to the technical field of artificial intelligence, and in particular relates to a letter processing method, a letter processing device, electronic equipment and a storage medium.
Background
With the development of internet technology, people pay more and more attention to the security protection of network information. Wherein, the secure transmission of the mail is one of the network information security. Mailboxes are common communication tools for people, and if an email is stolen, confidential resources are caused to be mistakenly entered into the hands of other people, which can suffer economic or other losses to individuals or enterprises. Therefore, it is a technical problem to be solved for how to improve the security of mail.
Disclosure of Invention
The embodiment of the disclosure provides an information processing method, an information processing device, electronic equipment and a storage medium, which are used for solving or relieving one or more technical problems in the prior art.
As a first aspect of the embodiments of the present disclosure, the embodiments of the present disclosure provide an information processing method, including:
in response to a mail sending request for sending a first mail to a second client, encrypting the first mail based on a session key to obtain a first ciphertext mail;
encrypting the session key based on the public key of the second client to obtain an encrypted session key;
splicing the first ciphertext mail and the encryption session key to obtain a second ciphertext mail;
and sending the second ciphertext to the second client.
As a second aspect of the embodiments of the present disclosure, the embodiments of the present disclosure provide an information processing method, including:
acquiring a second ciphertext mail from the first client;
splitting the second ciphertext information to obtain a first ciphertext mail and an encryption session key;
decrypting the encrypted session key based on the private key of the second client to obtain a session key; and decrypting the first ciphertext mail based on the session key to obtain a first mail, and storing the first mail into an inbox of the second client.
As a third aspect of the embodiments of the present disclosure, the embodiments of the present disclosure provide an electronic device, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the letter processing methods provided by embodiments of the present disclosure.
As a fourth aspect of the embodiments of the present disclosure, the embodiments of the present disclosure provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the information processing method provided by the embodiments of the present disclosure.
As a fourth aspect of the disclosed embodiments, the disclosed embodiments provide a computer program product comprising a computer program which, when executed by a processor, implements the information method provided by the disclosed embodiments.
According to the technical scheme provided by the embodiment of the disclosure, when a letter is sent, the information is encrypted by using the session key to obtain a ciphertext letter, the session key is encrypted by using the public key of a receiver receiving the letter to obtain an encrypted session key, and then the ciphertext letter information and the encrypted session key are sent to the receiver together. Thus, the letters can be prevented from being read by other people, and the security of the letters is improved.
The foregoing summary is for the purpose of the specification only and is not intended to be limiting in any way. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features of the present disclosure will become apparent by reference to the drawings and the following detailed description.
Drawings
In the drawings, the same reference numerals refer to the same or similar parts or elements throughout the several views unless otherwise specified. The figures are not necessarily drawn to scale. It is appreciated that these drawings depict only some embodiments according to the disclosure and are not to be considered limiting of its scope.
FIG. 1 is a flow chart of a letter processing method according to an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of key exchange according to an embodiment of the present disclosure;
FIG. 3 is a flow chart of a letter processing method according to an embodiment of the present disclosure;
FIG. 4 is a flow chart of a letter processing method according to another embodiment of the present disclosure;
FIG. 5 is a flow chart of a letter processing method according to another embodiment of the present disclosure;
fig. 6 is a schematic diagram of an electronic device of an embodiment of the present disclosure.
Detailed Description
Hereinafter, only certain exemplary embodiments are briefly described. As will be recognized by those of skill in the pertinent art, the described embodiments may be modified in various different ways without departing from the spirit or scope of the present disclosure. Accordingly, the drawings and description are to be regarded as illustrative in nature and not as restrictive.
Fig. 1 is a flow chart of a letter processing method provided in an embodiment of the present disclosure. As shown in fig. 1, the letter processing method may be applied to a first client, and includes the following steps:
s110, in response to a mail sending request for sending a first mail to a second client, encrypting the first mail based on a session key to obtain a first ciphertext mail;
s120, encrypting the session key based on the public key of the second client to obtain an encrypted session key;
s130, splicing the first ciphertext mail and the encryption session key to obtain a second ciphertext mail;
and S140, sending the second ciphertext to the second client.
Illustratively, the first letter is a plaintext letter, the user writes the first letter, and clicks the send button, at this time, the mail system receives the mail sending request, performs steps S110 to S140 described above, encrypts the first letter, and sends the encrypted first letter.
In this process, the user is a non-sensitive encrypted letter, and the mail system can encrypt and send the first letter only by clicking the send button.
Illustratively, the first client may be a mail application installed on one terminal device and the second client may be a mail application installed on another terminal device. The terminal device can be a mobile phone, a computer, a tablet and the like. The mail application may be yahoo, gmail, outlook, homtmail, etc.
The session key is illustratively generated by the first client, which may be generated from some information of the first letter, e.g., from a digest, a title, or some paragraph in the body. The session key may also be randomly generated using a random encryptor.
In some embodiments, in step S110, in response to the mail sending request for sending the first letter to the second client, an encryption check box is displayed, where the encryption check box is a selected encryption, and the first letter is encrypted based on the session key, to obtain the first ciphertext letter. In addition, the first letter is sent to the second client if the encryption check box is not selected for encryption.
In some embodiments, before encrypting the letter with the session key, the tag information extracted from the letter may be encrypted with the private key of the first client and added to the letter to be encrypted with the session key, so that even if the letter is stolen, and a dummy letter is provided to the second client, it may be determined whether the letter is a dummy letter by the encrypted tag information.
Illustratively, in the step S110, in response to the mail sending request for sending the first letter to the second client, encrypting the first letter based on the session key to obtain a first ciphertext mail, including:
in response to a mail sending request for sending a first letter to a second client, encrypting the mark information in the first letter based on a private key of the first client to obtain encrypted mark information;
splicing the encryption mark information and the first letter to obtain a second letter;
and encrypting the second mail based on the session key to obtain the first ciphertext mail.
In this example, the tag information is extracted from the plaintext mail based on the private key of the first client to encrypt, and the encrypted tag information spliced together with the original plaintext mail is encrypted by using the session key, so that even if the ciphertext mail is sent to a fake mail to the second client after being cracked, the second client can determine whether the mail is a fake mail or not through the encrypted tag information, so as to determine whether to discard the fake mail.
In some embodiments, the tag information may be encrypted after being processed using a predetermined algorithm, so that it may be more accurately found whether the letter has been tampered with.
Illustratively, the encrypting the tag information in the first letter based on the private key of the first client to obtain encrypted tag information includes:
processing the mark information in the first letter based on a first algorithm to obtain a first mark;
and encrypting the first mark based on the private key of the first client to obtain encrypted mark information.
In this example, the tag information may be encrypted after being processed by a predetermined algorithm, so that whether the letter is tampered with can be found more accurately.
Illustratively, the first algorithm may be an MD5 (Message-DigestAlgorithm) algorithm.
Illustratively, the tag information may be a mail digest, a title, a specified paragraph or signature in the mail body, or the like.
In some embodiments, after the encrypted tag information is spliced with the first letter to obtain the second letter, the second letter may be compressed and then encrypted, or may be encrypted and then compressed.
Illustratively, encrypting the second letter based on the session key to obtain the first ciphertext letter includes:
compressing the second letter;
and encrypting the compressed second mail based on the session key to obtain the first ciphertext mail.
In some embodiments, a key server may be provided for exchanging public keys between any two mutually authorized clients, such that both pairs of keys may be used for encryption or decryption.
In some embodiments, the key management functionality may be provided in the mail application, such as generating a session key using the key management functionality, a key pair for the first client, uploading a public key for the first client to a key server, retrieving public keys for other clients from the key server, and so forth.
Illustratively, the above method may further comprise:
in response to an authorization setting request for the second client, sending a key distribution instruction to the key server, wherein the key distribution instruction is used for instructing the key server to distribute the public key of the second client to the first client and distribute the public key of the first client to the second client;
in the event that the public key of the second client is received, the public key of the second client is stored.
In this example, the first client may obtain the public key of the other clients from the key server, or may let the key server distribute the public key of the first client to the other clients.
In some embodiments, the above method may further comprise:
prompting the second client to be an unauthorized client when the mail sending request is detected and the second client is an unauthorized client;
in response to an authorization setting request for the second client, sending a key distribution instruction to the key server, wherein the key distribution instruction is used for instructing the key server to distribute the public key of the second client to the first client and distribute the public key of the first client to the second client;
in the case of receiving the public key of the second client, the request is sent in response to the mail.
In this example, when the mail sending request in the above step S110 is detected, but the second client is an unauthorized client, i.e., the public key of the second client is not stored locally, at this time, a prompt is made to the user as to whether the second client is to be determined as an authorized client, i.e., a client that needs to perform encrypted transmission of the mail. Thus, when the second client is determined to be an authorized client, the public key of the second client may be obtained from the key server and stored in the keystore of the first client.
In some embodiments, the key may be generated by key registration and uploaded to a server of the key.
Illustratively, in response to a key registration request for a first client, generating a key pair of the first client with a random encryptor, the key pair comprising a private key and a public key of the first client; storing a private key of the first client in the first client; the public key of the first client is sent to the key server to store the public key of the first client at the key server.
In this example, the key registration request may be made upon the first client logging in.
In some embodiments, the key pair of the first client may also be updated.
Illustratively, the above method may further comprise:
responding to a key update request for a first client, and displaying an information verification window;
determining whether the key update request is legal based on user information input to the information verification window;
under the condition that the key updating request is legal, generating a new key pair of the first client by utilizing a random cipher device, wherein the new key pair comprises a new private key and a new public key of the first client;
updating the private key stored by the first client to be a new private key of the first client;
the new public key of the first client is sent to the key server to update the public key of the first client in the key server.
Illustratively, the above method may further comprise:
and under the condition that the new public key of the second client is received, updating the public key belonging to the second client in the first client based on the new public key of the second client.
As shown in fig. 3, in the disclosed embodiment, the channels of the key exchange are channels independent of mail transmission. Public keys of the two parties are exchanged between the first client and the second client through a key server, and the key server is used for storing public keys of all registered clients and sending corresponding public keys to corresponding clients. Whereas the transmission of the mail is carried out through a mail server or mail transmission channel, which is not related to the key server.
Fig. 4 is a flowchart of a letter processing method according to another embodiment of the present disclosure, which can be applied to a second client, including the steps of:
s210, acquiring a second ciphertext mail from the first client;
s220, splitting the second ciphertext information to obtain a first ciphertext mail and an encrypted session key;
s230, decrypting the encrypted session key based on the private key of the second client to obtain the session key;
s240, decrypting the first ciphertext mail based on the session key to obtain a first mail, and storing the first mail into an inbox of the second client.
In this example, which corresponds to the letter encryption process provided in fig. 1, this example is a specific process of decrypting a letter.
Wherein, the letter transmission between the first client and the second client is through a letter transmission channel or a mail server.
Illustratively, the encrypted session key is encrypted by the first client using the public key of the second client, and thus decrypting the encrypted session key with the private key of the second client results in the session key.
The public key of the second client may be transferred to the key server by the second client, and then sent to the first client by the key server for the first client to encrypt the session key.
Illustratively, since the first ciphertext mail is encrypted by the session key, the session key may be used to decrypt the first ciphertext mail to obtain the plaintext first mail.
In the example, the first letter obtained through decryption can be directly stored in the inbox of the second client, so that the user does not need to decrypt when viewing the letter, response efficiency of viewing the letter is improved, waiting time of the user is very short, and user experience is improved.
In some embodiments, the second client may verify that the decrypted first letter is a fake or tampered letter. If so, it is discarded, and if not, it is deposited into the inbox.
Illustratively, in the step S140, decrypting the first ciphertext mail based on the session key to obtain a first mail, and storing the first mail in the inbox of the second client, including:
decrypting the first ciphertext mail based on the session key to obtain a second mail;
splitting the second letter to obtain encryption mark information and the first letter;
decrypting the encrypted marking information based on the public key of the first client to obtain marking information, and storing the first letter into an inbox of the second client when the marking information meets the set condition.
In this example, the encrypted mail is decrypted using the session key to obtain a second mail, encrypted tag information in the second mail is decrypted using the public key of the first client to obtain a tag mail, and the first mail is stored in an inbox of the second client under the condition that the tag mail satisfies the set condition. This prevents false letters or tampered letters from being received into the inbox.
Illustratively, the first letter is discarded and the first client is notified that the letter is rejected if the marking information does not satisfy the set condition. In this way, the first client can resend the letter upon receipt of the rejection information.
In this example, the encrypted tag information is encrypted by the first client using its private key, and thus the tag information may be obtained by decrypting the encrypted tag information using the first client's public key.
In some embodiments, the first client may encrypt the tag information using a predetermined algorithm before encrypting the tag information, so that the algorithm is also required to determine whether the tag information meets the set condition.
Illustratively, decrypting the encrypted tag information based on the public key of the first client to obtain the tag information, and storing the first letter in the inbox of the second client when the tag information meets the set condition may include:
decrypting the encrypted marking information based on the public key of the first client to obtain a first mark;
processing the mark information in the first letter based on a first algorithm to obtain a second mark;
the first letter is stored in the inbox of the second client if the first tag and the second tag are the same.
In this example, the recognition accuracy of whether the tag information is tampered can be further improved.
Illustratively, the first algorithm may be an MD5 algorithm.
In some embodiments, the tag information is a mail digest, a header, a specified paragraph in the mail body, or a signature.
In the embodiments of the present disclosure, the foregoing embodiment of encrypting the letters of the first client application may also be applied to the second client, and the foregoing embodiment of decrypting the letters of the second client application may also be applied to the first client, which is not described in detail herein.
As shown in fig. 4 and 5, an example of an application of encryption and decryption will be described below with a first client being Alice and a second client being Bob.
The functions of each unit, module or sub-module in each apparatus of the embodiments of the present disclosure may be referred to the corresponding descriptions in the above method embodiments, which are not repeated herein.
According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium and a computer program product.
Fig. 6 shows a schematic block diagram of an example electronic device 800 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 6, the electronic device 800 includes a computing unit 801 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 802 or a computer program loaded from a storage unit 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data required for the operation of the electronic device 800 can also be stored. The computing unit 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. An input output (I/O) interface 805 is also connected to the bus 804.
Various components in electronic device 800 are connected to I/O interface 805, including: an input unit 806 such as a keyboard, mouse, etc.; an output unit 807 such as various types of displays, speakers, and the like; a storage unit 808, such as a magnetic disk, optical disk, etc.; and a communication unit 809, such as a network card, modem, wireless communication transceiver, or the like. The communication unit 809 allows the electronic device 800 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The computing unit 801 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 801 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 801 performs the various methods and processes described above, such as the audio and text combining method. For example, in some embodiments, the audio and text combining method may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as the storage unit 808. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 800 via the ROM 102 and/or the communication unit 809. When a computer program is loaded into RAM 803 and executed by computing unit 801, one or more of the steps of the audio and text combining method described above may be performed. Alternatively, in other embodiments, the computing unit 801 may be configured to perform the audio and text combining method in any other suitable way (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), complex Programmable Logic Devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer or other programmable atmosphere lamp fixture such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be carried out. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server incorporating a blockchain.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel, sequentially, or in a different order, provided that the desired results of the disclosed aspects are achieved, and are not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.

Claims (12)

1. A mail encryption method, applied to a first client, comprising:
responding to a mail sending request for sending the first mail to the second client, generating a session key, and acquiring a public key of the second client from a key exchange server;
encrypting the first mail based on the session key to obtain a first ciphertext mail;
encrypting the session key based on the public key of the second client to obtain an encrypted session key;
splicing the first ciphertext mail and the encryption session key to obtain a second ciphertext mail;
and sending the second ciphertext to the second client.
2. The method of claim 1, wherein encrypting the first letter based on the session key in response to a mail transmission request for transmitting the first letter to the second client, to obtain the first ciphertext letter, comprises:
in response to a mail sending request for sending a first letter to a second client, encrypting the mark information in the first letter based on a private key of the first client to obtain encrypted mark information;
splicing the encryption mark information and the first letter to obtain a second letter;
and encrypting the second mail based on the session key to obtain a first ciphertext mail.
3. The method of claim 2, wherein encrypting the tag information in the first letter based on the private key of the first client to obtain encrypted tag information comprises:
processing the mark information in the first letter based on a first algorithm to obtain a first mark;
and encrypting the first mark based on the private key of the first client to obtain encrypted mark information.
4. A method according to claim 3, wherein the tag information is a mail digest, a header, a specified paragraph in the mail body, or a signature.
5. The method of claim 2, wherein encrypting the second letter based on the session key results in a first ciphertext letter, comprising:
compressing the second letter;
and encrypting the compressed second mail based on the session key to obtain a first ciphertext mail.
6. A mail decrypting method, applied to a second client, comprising:
acquiring a second ciphertext mail from the first client;
splitting the second ciphertext information to obtain a first ciphertext mail and an encryption session key;
decrypting the encrypted session key based on the private key of the second client to obtain a session key;
decrypting the first ciphertext mail based on the session key to obtain a first mail, storing the first ciphertext mail into an inbox of the first client under the condition that the first mail meets the set condition, and storing the session key into a key store of the first client.
7. The method as recited in claim 6, further comprising:
responding to a viewing request for a first ciphertext mail in the inbox, and extracting a session key corresponding to the first ciphertext mail from the key bank;
decrypting the first ciphertext mail based on the session key to obtain a first mail;
the first letter is displayed in a display interface.
8. The method of claim 6, wherein decrypting the first ciphertext message based on the session key to obtain a first mail, and storing the first ciphertext message in an inbox of the first client if the first mail meets a set condition, comprises:
decrypting the first ciphertext mail based on the session key to obtain a second mail;
splitting the second letter to obtain encryption mark information and a first letter;
decrypting the encrypted marking information based on the public key of the first client to obtain marking information, and storing the first ciphertext mail in an inbox of the second client when the marking information meets a set condition.
9. The method of claim 8, wherein decrypting the encrypted tag information based on the public key of the first client to obtain tag information, and storing the first ciphertext mail to the inbox of the second client if the tag information satisfies a set condition, comprises:
decrypting the encrypted marking information based on the public key of the first client to obtain a first mark;
processing the mark information in the first letter based on a first algorithm to obtain a second mark;
and storing the first ciphertext letter in an inbox of the second client under the condition that the first mark and the second mark are the same.
10. The method of claim 9, wherein the tag information is a mail digest, a header, a specified paragraph in a mail body, or a signature.
11. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-10.
12. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1-10.
CN202310005756.4A 2023-01-04 2023-01-04 Letter processing method, device, electronic equipment and storage medium Pending CN116192466A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310005756.4A CN116192466A (en) 2023-01-04 2023-01-04 Letter processing method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310005756.4A CN116192466A (en) 2023-01-04 2023-01-04 Letter processing method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116192466A true CN116192466A (en) 2023-05-30

Family

ID=86433737

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310005756.4A Pending CN116192466A (en) 2023-01-04 2023-01-04 Letter processing method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116192466A (en)

Similar Documents

Publication Publication Date Title
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
CN112822255B (en) Block chain-based mail processing method, mail sending end, receiving end and equipment
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN111914291A (en) Message processing method, device, equipment and storage medium
CN109272314B (en) Secure communication method and system based on two-party collaborative signature calculation
CN104992100A (en) Iris dynamic encryption and decryption system and method for electronic document flowing
CN110771190A (en) Controlling access to data
US11190345B2 (en) Email verification
CN112437044A (en) Instant messaging method and device
CN114205084B (en) Quantum key-based electronic mail multi-operation encryption method and device
Rahman et al. Development of cryptography-based secure messaging system
CN111181920A (en) Encryption and decryption method and device
CN108055271B (en) Encryption and decryption method for electronic mail, storage medium and electronic equipment
CN113243093A (en) System and method for message transmission and retrieval using blockchains
CN112966287B (en) Method, system, device and computer readable medium for acquiring user data
US10205599B2 (en) Methods and systems of increasing security quality of computing-device communications
CN113626848A (en) Sample data generation method and device, electronic equipment and computer readable medium
CN112987942B (en) Method, device and system for inputting information by keyboard, electronic equipment and storage medium
CN112637230B (en) Instant messaging method and system
US11863538B2 (en) Methods and systems for generating a symmetric key for mobile device encryption
CN116192466A (en) Letter processing method, device, electronic equipment and storage medium
CN112565156B (en) Information registration method, device and system
CN116016417A (en) Letter processing method, device, electronic equipment and storage medium
CN112785240A (en) Method and device for processing e-mail, computer readable medium and electronic equipment
CN109474592B (en) Public key binding method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination