CN101083524A - Method and system for encrypting and deciphering E-mail - Google Patents

Method and system for encrypting and deciphering E-mail Download PDF

Info

Publication number
CN101083524A
CN101083524A CNA2007100750421A CN200710075042A CN101083524A CN 101083524 A CN101083524 A CN 101083524A CN A2007100750421 A CNA2007100750421 A CN A2007100750421A CN 200710075042 A CN200710075042 A CN 200710075042A CN 101083524 A CN101083524 A CN 101083524A
Authority
CN
China
Prior art keywords
encryption
email
information
folder
mailbox
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007100750421A
Other languages
Chinese (zh)
Inventor
李明强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CNA2007100750421A priority Critical patent/CN101083524A/en
Publication of CN101083524A publication Critical patent/CN101083524A/en
Priority to PCT/CN2008/071120 priority patent/WO2008151542A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention is applied to the communication safety field, providing an E-mail encrypting and decrypting method and system, and the method comprises the steps of: receiving input encryption cipher information and selected folder information in mainbox; adopting encryption algorithm to generate encryption cipher according to the encryption cipher information and encrypting the selected folder in mailbox. Thus, the method provides secondary cipher protection for E-mail in encrypted folder, and assures E-mail security, and especially provides full safety assurance for users' important and private data.

Description

A kind of encrypting and decrypting method of Email and system
Technical field
The invention belongs to field of communication security, relate in particular to a kind of encrypting and decrypting method and system of Email.
Background technology
Along with networks development and universal, Email (Email) has become important media of communication now, and its fail safe also more and more comes into one's own.
The fail safe of current email is that the login password by mailbox guarantees, Email is to be kept on the mail server with the form of (unencryption) expressly, after the user is by password login mailbox, comprise in the mailbox that the mail that has sent, all e-mail messages such as mail that received will be covered all at one glance, make the fail safe of user email be subjected to bigger threat.And the login password of subscriber mailbox is stolen easily, as selected as the user browser remember cryptographic function the time, as long as usurp the user's computer password, mailbox that can free login user; It is away from keyboard after the user logins mailbox, when perhaps having revealed the login password of subscriber mailbox by alternate manner, the fail safe of the Email in the subscriber mailbox can't be guaranteed, and this is to many enterprises, and especially the business people may cause the loss that can't retrieve.
Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of encryption method of Email, is intended to solve the problem that the Email that exists in the prior art can't obtain safety assurance.
The embodiment of the invention is achieved in that a kind of encryption method of Email, and described method comprises the steps:
Folder information in the Crypted password information of reception input and the selected mailbox;
Adopt cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
Another purpose of the embodiment of the invention is to provide a kind of decryption method of Email, and described method comprises the steps:
Receive the clear crytpographic key information of input and selected encryption folder;
Adopt the decipherment algorithm corresponding that described encryption folder is decrypted according to described clear crytpographic key information with cryptographic algorithm.
Another purpose of the embodiment of the invention is to provide a kind of encryption system of Email, and described system comprises:
The enciphered message receiving element is used for receiving the Crypted password information of input and the folder information of selected mailbox;
Cryptographic processing unit is used for adopting cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
Another purpose of the embodiment of the invention is to provide a kind of decryption system of Email, and described system comprises:
The decryption information receiving element is used to receive the clear crytpographic key information of input and selected encryption folder information; And
The decryption processing unit is used for adopting the decipherment algorithm corresponding with cryptographic algorithm that described encryption folder is decrypted according to described clear crytpographic key information.
In embodiments of the present invention; Crypted password information according to input adopts cryptographic algorithm to generate cryptographic keys; file in the mailbox that the user is selected is encrypted; for the Email in this encryption folder provides secondary cryptoguard; thereby guaranteed the fail safe of Email in the mailbox, especially the important private data to the user provides sufficient safety guarantee.
Description of drawings
Fig. 1 is the realization flow figure of the E-mail enciphered method that provides of the embodiment of the invention;
Fig. 2 is the encryption folder that provides of the embodiment of the invention or the use process chart of encrypted E-mail;
Fig. 3 is the realization flow figure of the Email decryption method that provides of the embodiment of the invention;
Fig. 4 is the structure chart of the E-mail enciphered system that provides of the embodiment of the invention;
Fig. 5 is the structure chart of the Email decryption system that provides of the embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
In embodiments of the present invention, by receiving the Crypted password information of user's input, encrypt according to the file that this Crypted password information produces in the mailbox that cryptographic keys selectes the user, thereby realized the superencipher of the Email in this encryption folder in the mailbox, guaranteed the fail safe of user email.
Fig. 1 shows the realization flow of the encryption method of the Email that the embodiment of the invention provides, and details are as follows:
In step S101, the folder information in the mailbox that the Crypted password information of reception user input and user select.Wherein the Email Information that the user needs encipherment protection can be comprised in the file in the mailbox selected of user, also the file of sky can be.
In step S102, adopt corresponding cryptographic algorithm to produce cryptographic keys according to the Crypted password information of user input, the file in the mailbox that the user is selected is encrypted.In embodiments of the present invention, the corresponding cryptographic algorithm that is adopted can be open key-encryption algorithm (as RSA cryptographic algorithms), data encryption standard (Digital Encryption Standard, DES) algorithm, Digital Signature Algorithm (as ElGamal cryptographic algorithm, DSA cryptographic algorithm), md5 encryption algorithm or FLOWFISH cryptographic algorithm etc.After this document folder was encrypted, any Email in visit this document folder all needed to import the Crypted password of this document folder, thereby made the Email in the subscriber mailbox obtain the superencipher protection, had guaranteed the fail safe of the Email in this encryption folder.
In order to reach better cryptoguard effect; the embodiment of the invention is in step S101; when receiving the folder information in the Crypted password information of user's input and the mailbox that the user selectes; receive the fetching cipher information of user's input; as fetching cipher problem, secret email address etc. and store this fetching cipher information, after step S102, also comprise the steps: simultaneously
In step S103, when the user loses the Crypted password of above-mentioned encryption folder, according to the Crypted password of above-mentioned this encryption folder of fetching cipher information retrieval.
When the Email that needs encipherment protection was not included in this encryption folder, in order to realize that this Email that needs protection is carried out encipherment protection, this E-mail enciphered method also comprised the steps:
In step S104, receive the Email transfer instruction that needs encipherment protection beyond this encryption folder, and the Email of this needs encipherment protection is transferred to described encryption folder according to this transfer instruction.
For fear of logining mailbox because of the user and away from keyboard or log off because of the user in browsing the process of encryption folder, and cause the e-mail data in the encryption folder to be stolen by the disabled user, in embodiments of the present invention, after step S104, also comprise the steps:
In step S105, after the user stops to browse this encryption folder a period of time (as 2 minutes), after perhaps the user withdraws from the login of mailbox, according to the Crypted password information that receives among the step S101 this encryption folder is encrypted again automatically.When the user logins mailbox again or browses and operate in the mailbox Email in this encryption folder again, need re-enter the Crypted password of this encryption folder.
Be appreciated that, the user can adopt above-mentioned E-mail enciphered method selectively file in the mailbox or Email to be encrypted, simultaneously different passwords can be set for different encryption folders, thereby provide sufficient safety guarantee for user's important private data.
After adopting said method that the file in the selected mailbox is encrypted, the user is not when knowing the Crypted password of this document folder, can't carry out any Email in this encryption folder as any operation such as browsing, when the user opens and browse in this email process by Crypted password, if the user is away from keyboard, by this encryption folder is encrypted again, thereby guaranteed the fail safe of Email.
In actual application, the user can need select the file of encryption by the folder management page of mailbox, can encrypt the file of selected mailbox behind (as twice input password) input Crypted password on request.
The encryption folder that Fig. 2 shows the embodiment of the invention to be provided uses handling process.
After the user logins mailbox by password, the Email that selection need be browsed; Judge whether the file at selected Email place is encrypted, if the file unencryption at this Email place, then the user can normal browsing or is operated this Email, if the file at this Email place is encrypted, then points out the user to import Crypted password; Whether the Crypted password of checking user input correct, if the password mistake then changes error processing procedure over to, as prompting user cipher mistake etc., and if correctly the user can normal browsing or operates this Email; When the user forgets Crypted password, then according to the fetching cipher information of user input, as the Crypted password of these encryption folders of information retrieval such as fetching cipher problem and secret email address; When the user stops to browse or this Email of shut-down operation after a period of time, perhaps after the user withdrawed from the mailbox login, the file at this Email place was encrypted again.
Fig. 3 shows the realization flow of the decryption method of the Email that the embodiment of the invention provides, and details are as follows:
In step S301, the encryption folder information in the mailbox that the clear crytpographic key information of reception user input and user select.In actual application, the user passes through the folder management page in the mailbox, the file that selection has been encrypted, and input clear crytpographic key information, and when this clear crytpographic key information is encrypted for this document is pressed from both sides, the Crypted password information that the user imports.
In step S302, adopt the decipherment algorithm corresponding according to this Crypted password information with above-mentioned cryptographic algorithm, selected encryption folder is decrypted.After this encryption folder is decrypted, the state of this encryption folder with encrypt before consistent, the mailbox login user can be random browses or operates any Email in the file after decrypted in this mailbox.
Fig. 4 shows the structure of the encryption system of the Email that the embodiment of the invention provides, and for better explanation, only shows the part relevant with the embodiment of the invention.
Folder information in the mailbox that the Crypted password information of enciphered message receiving element 41 reception user inputs and user select.Adopt corresponding cryptographic algorithm to produce cryptographic keys by cryptographic processing unit 42 according to the Crypted password information of user input, the file in the mailbox that the user is selected is encrypted, and wherein the corresponding cryptographic algorithm of Cai Yonging does not repeat them here as mentioned above.The Email that the user needs encipherment protection can be comprised in the file in the mailbox that the user selectes, also empty folder can be.
When the Email that needs encipherment protection is not included in this encryption folder; receive the Email transfer instruction that needs encipherment protection beyond these encryption folders by the Email buanch unit 43 of the encryption system of this Email, and the Email of this needs encipherment protection is transferred to this encryption folder according to this transfer instruction.
When the user forgets above-mentioned Crypted password, receive the fetching cipher information of user's input by fetching cipher information receiving unit 44, as information such as fetching cipher problem, secret mailboxes, by the Crypted password of fetching cipher unit 45 according to this this encryption folder of fetching cipher information retrieval.
After the user stops to browse this encryption folder a period of time (as 2 minutes), after perhaps the user withdraws from the login of mailbox, for fear of logining mailbox because of the user and away from keyboard or log off because of the user in browsing the process of encryption folder, and cause the e-mail data in the encryption folder to be stolen by the disabled user, re-encryption unit 46 is after the user stops to browse this encryption folder a period of time (as 2 minutes), after perhaps the user withdrawed from the login of mailbox, the Crypted password information that receives according to enciphered message receiving element 41 was encrypted again to this encryption folder automatically.
After the file in the mailbox was encrypted, the mailbox login user need be by the Email in this encryption folder of cryptographic acess, when the user logins mailbox again or browses and operate Email in the mailbox again, need re-enter Crypted password.
Fig. 5 is the structure of the decryption system of the Email that provides of the embodiment of the invention, for better explanation, only shows the part relevant with the embodiment of the invention.
Encryption folder information in the mailbox that the clear crytpographic key information of decryption information receiving element 51 reception user inputs and user select.This clear crytpographic key information when this document folder or Email are encrypted, the Crypted password information of user's input.Decryption processing unit 52 adopts the decipherment algorithm corresponding with cryptographic algorithm according to this decryption information, and the encryption folder in the mailbox that the user is selected is decrypted.When the Email in the file after the user capture deciphering, do not need to input password.
In sum; in embodiments of the present invention; Crypted password information according to user's input generates cryptographic keys; file in the mailbox that the user is selected is encrypted; thereby make Email in this encryption folder by superencipher; simultaneously the Email that needs encipherment protection can be transferred to this encryption folder; the fail safe of the Email in the subscriber mailbox is protected; stop to browse or operate this encryption folder after a period of time as the user simultaneously; when perhaps the user withdraws from the mailbox login; automatically again this encryption folder is encrypted according to the Crypted password information of user's input; when the user browses again or logins mailbox again, need re-enter password, make the user after being gone for a season; Email can not be stolen yet, and has further guaranteed the fail safe of user email.In addition, when the user forgot the password of encryption folder, the user can be by this Crypted password of fetching cipher information retrieval of input.When the user does not need when E-mail enciphered, the Email decryption method that provides by the embodiment of the invention can be removed the password of this Email, and it is convenient, freely to use.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, a kind of encryption method of Email is characterized in that, described method comprises the steps:
Folder information in the Crypted password information of reception input and the selected mailbox;
Adopt cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
2, the encryption method of Email as claimed in claim 1 is characterized in that, described method also comprises the steps:
Receive the described encryption folder Email transfer instruction that needs encipherment protection in addition;
According to described instruction described Email is transferred to described encryption folder.
3, the encryption method of Email as claimed in claim 1 is characterized in that, described method also comprises the steps:
Receive the fetching cipher information of input;
Crypted password according to the described encryption folder of described fetching cipher information retrieval.
As the encryption method of claim 1 or 2 or 3 described Emails, it is characterized in that 4, described method also comprises the steps:
When stopping to browse described encryption folder after a period of time or when withdrawing from the mailbox login, utilize the described Crypted password information that receives again described encryption folder to be encrypted.
5, a kind of decryption method of Email is characterized in that, described method comprises the steps:
Receive the clear crytpographic key information of input and selected encryption folder;
Adopt the decipherment algorithm corresponding that described encryption folder is decrypted according to described clear crytpographic key information with cryptographic algorithm.
6, a kind of encryption system of Email is characterized in that, described system comprises:
The enciphered message receiving element is used for receiving the Crypted password information of input and the folder information of selected mailbox;
Cryptographic processing unit is used for adopting cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
7, the encryption system of Email as claimed in claim 6 is characterized in that, described system further comprises:
The Email buanch unit is used to receive the described encryption folder Email transfer instruction that needs encipherment protection in addition, and according to described instruction described Email is transferred to described encryption folder.
8, the encryption system of Email as claimed in claim 6 is characterized in that, described system further comprises:
The fetching cipher information receiving unit is used to receive the fetching cipher information of input; And
The fetching cipher unit is used for the Crypted password according to the described encryption folder of described fetching cipher information retrieval.
As the encryption system of claim 6 or 7 or 8 described Emails, it is characterized in that 9, described system further comprises:
The re-encryption unit is used for utilizing the described Crypted password information that receives again described encryption folder to be encrypted when stopping to browse described encryption folder after a period of time or when withdrawing from the mailbox login.
10, a kind of decryption system of Email is characterized in that, described system comprises:
The decryption information receiving element is used to receive the clear crytpographic key information of input and selected encryption folder information; And
The decryption processing unit is used for adopting the decipherment algorithm corresponding with cryptographic algorithm that described encryption folder is decrypted according to described clear crytpographic key information.
CNA2007100750421A 2007-06-14 2007-06-14 Method and system for encrypting and deciphering E-mail Pending CN101083524A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNA2007100750421A CN101083524A (en) 2007-06-14 2007-06-14 Method and system for encrypting and deciphering E-mail
PCT/CN2008/071120 WO2008151542A1 (en) 2007-06-14 2008-05-28 Method for controlling accessing to an electronic mail and electronic mail server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007100750421A CN101083524A (en) 2007-06-14 2007-06-14 Method and system for encrypting and deciphering E-mail

Publications (1)

Publication Number Publication Date
CN101083524A true CN101083524A (en) 2007-12-05

Family

ID=38912825

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007100750421A Pending CN101083524A (en) 2007-06-14 2007-06-14 Method and system for encrypting and deciphering E-mail

Country Status (2)

Country Link
CN (1) CN101083524A (en)
WO (1) WO2008151542A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008151542A1 (en) * 2007-06-14 2008-12-18 Tencent Technology (Shenzhen) Company Limited Method for controlling accessing to an electronic mail and electronic mail server
CN102281140A (en) * 2011-06-24 2011-12-14 上海合合信息科技发展有限公司 Acquisition method and system thereof for designated information
CN102316051A (en) * 2011-09-14 2012-01-11 中兴通讯股份有限公司 Method for offline browsing history mail and system thereof
CN102361479A (en) * 2011-06-24 2012-02-22 上海合合信息科技发展有限公司 Method and system for obtaining designated information
CN101710879B (en) * 2009-01-14 2012-05-02 中国传媒大学 Novel identity-based privacy enhanced mail forwarding system
CN103188246A (en) * 2011-12-31 2013-07-03 上海格尔软件股份有限公司 Safe E-mail system
CN103188129A (en) * 2011-12-29 2013-07-03 盈世信息科技(北京)有限公司 E-mail encryption method, mail server and system
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device
CN103929312A (en) * 2014-04-29 2014-07-16 深圳市中兴移动通信有限公司 Mobile terminal and method and system for protecting individual information of mobile terminal
CN104065681A (en) * 2013-03-20 2014-09-24 腾讯科技(深圳)有限公司 Method and system for previewing encryption compression packet in appendix
CN104732159A (en) * 2013-12-24 2015-06-24 北京慧眼智行科技有限公司 File processing method and file processing device
CN105530331A (en) * 2015-12-16 2016-04-27 小米科技有限责任公司 Method for establishing name card file and method and device for registering or logging in website
CN103188129B (en) * 2011-12-29 2016-12-14 盈世信息科技(北京)有限公司 A kind of E-mail encryption method, mail server and system
CN106874738A (en) * 2017-01-25 2017-06-20 广东欧珀移动通信有限公司 The response method and mobile terminal of a kind of touch control operation
CN107888475A (en) * 2016-09-30 2018-04-06 中国石油天然气股份有限公司 The decryption method and server of mail

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003152803A (en) * 2001-11-14 2003-05-23 Nec Corp System and method for mail reception substitute agent, server, and program
JP2005128996A (en) * 2003-09-30 2005-05-19 Dainippon Printing Co Ltd Information processing apparatus and system, and program
CN100353787C (en) * 2004-06-23 2007-12-05 华为技术有限公司 Security guarantee for memory data information of mobile terminal
CN101083524A (en) * 2007-06-14 2007-12-05 腾讯科技(深圳)有限公司 Method and system for encrypting and deciphering E-mail

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008151542A1 (en) * 2007-06-14 2008-12-18 Tencent Technology (Shenzhen) Company Limited Method for controlling accessing to an electronic mail and electronic mail server
CN101710879B (en) * 2009-01-14 2012-05-02 中国传媒大学 Novel identity-based privacy enhanced mail forwarding system
CN102281140A (en) * 2011-06-24 2011-12-14 上海合合信息科技发展有限公司 Acquisition method and system thereof for designated information
CN102361479A (en) * 2011-06-24 2012-02-22 上海合合信息科技发展有限公司 Method and system for obtaining designated information
CN102316051A (en) * 2011-09-14 2012-01-11 中兴通讯股份有限公司 Method for offline browsing history mail and system thereof
WO2012152002A1 (en) * 2011-09-14 2012-11-15 中兴通讯股份有限公司 Method and system for browsing email history offline
CN102316051B (en) * 2011-09-14 2018-06-19 中兴通讯股份有限公司 A kind of method and system of off-line browsing history mail
CN103188129B (en) * 2011-12-29 2016-12-14 盈世信息科技(北京)有限公司 A kind of E-mail encryption method, mail server and system
CN103188129A (en) * 2011-12-29 2013-07-03 盈世信息科技(北京)有限公司 E-mail encryption method, mail server and system
WO2013097326A1 (en) * 2011-12-29 2013-07-04 盈世信息科技(北京)有限公司 Electronic mail encryption method, mail server, and system
CN103188246B (en) * 2011-12-31 2016-12-14 上海格尔软件股份有限公司 Safe e-mail system
CN103188246A (en) * 2011-12-31 2013-07-03 上海格尔软件股份有限公司 Safe E-mail system
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device
CN104065681A (en) * 2013-03-20 2014-09-24 腾讯科技(深圳)有限公司 Method and system for previewing encryption compression packet in appendix
CN104732159A (en) * 2013-12-24 2015-06-24 北京慧眼智行科技有限公司 File processing method and file processing device
CN104732159B (en) * 2013-12-24 2019-01-25 北京慧眼智行科技有限公司 A kind of document handling method and device
CN103929312A (en) * 2014-04-29 2014-07-16 深圳市中兴移动通信有限公司 Mobile terminal and method and system for protecting individual information of mobile terminal
CN105530331A (en) * 2015-12-16 2016-04-27 小米科技有限责任公司 Method for establishing name card file and method and device for registering or logging in website
CN107888475A (en) * 2016-09-30 2018-04-06 中国石油天然气股份有限公司 The decryption method and server of mail
CN107888475B (en) * 2016-09-30 2020-09-08 中国石油天然气股份有限公司 Mail decryption method and server
CN106874738A (en) * 2017-01-25 2017-06-20 广东欧珀移动通信有限公司 The response method and mobile terminal of a kind of touch control operation

Also Published As

Publication number Publication date
WO2008151542A1 (en) 2008-12-18

Similar Documents

Publication Publication Date Title
CN101083524A (en) Method and system for encrypting and deciphering E-mail
US20080019530A1 (en) Message archival assurance for encrypted communications
US8484459B2 (en) Secure transfer of information
US11570155B2 (en) Enhanced secure encryption and decryption system
EP3282670B1 (en) Maintaining data security in a network device
CN101197822B (en) System for preventing information leakage and method based on the same
US11163892B2 (en) Buffering data until encrypted destination is unlocked
CN107733841A (en) Method for message transmission and device based on multi-enciphering
CN103634313B (en) Address list processing method and device, as well as mobile terminal
US8601603B1 (en) Secure information transmission over a network
JP2008219743A (en) File encryption management system and method of implementing same system
JP4140617B2 (en) Authentication system using authentication recording medium and method of creating authentication recording medium
JP4562200B2 (en) Cryptographic management apparatus, cryptographic management method and cryptographic management program in the apparatus
CN101009878A (en) Data secrecy system and method
JP2005326933A (en) Electronic mail transmission/reception method and electronic mail transmission/reception system
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
US20070076880A1 (en) Secure digital transmission
JP2004112571A (en) Mobile communication terminal, encryption system, mobile communication method, and encryption method
Liu et al. Design and Implementation of a PKI-Based Electronic Documents Protection Management System
JP2014115972A (en) File security ensuring system
CN116319059A (en) Multi-party simultaneous authentication mechanism for end-to-end encryption
Revathi Secure sharing data using constant key size-aggregate key system
EP1320958B1 (en) Method for transmitting, storing and accessing a secret
JP2007233983A (en) System for protecting cellular telephone mail, and cellular telephone server
CN109687955A (en) A kind of method and device for protecting data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20071205