CN101083524A - Method and system for encrypting and deciphering E-mail - Google Patents
Method and system for encrypting and deciphering E-mail Download PDFInfo
- Publication number
- CN101083524A CN101083524A CNA2007100750421A CN200710075042A CN101083524A CN 101083524 A CN101083524 A CN 101083524A CN A2007100750421 A CNA2007100750421 A CN A2007100750421A CN 200710075042 A CN200710075042 A CN 200710075042A CN 101083524 A CN101083524 A CN 101083524A
- Authority
- CN
- China
- Prior art keywords
- encryption
- information
- folder
- mailbox
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention is applied to the communication safety field, providing an E-mail encrypting and decrypting method and system, and the method comprises the steps of: receiving input encryption cipher information and selected folder information in mainbox; adopting encryption algorithm to generate encryption cipher according to the encryption cipher information and encrypting the selected folder in mailbox. Thus, the method provides secondary cipher protection for E-mail in encrypted folder, and assures E-mail security, and especially provides full safety assurance for users' important and private data.
Description
Technical field
The invention belongs to field of communication security, relate in particular to a kind of encrypting and decrypting method and system of Email.
Background technology
Along with networks development and universal, Email (Email) has become important media of communication now, and its fail safe also more and more comes into one's own.
The fail safe of current email is that the login password by mailbox guarantees, Email is to be kept on the mail server with the form of (unencryption) expressly, after the user is by password login mailbox, comprise in the mailbox that the mail that has sent, all e-mail messages such as mail that received will be covered all at one glance, make the fail safe of user email be subjected to bigger threat.And the login password of subscriber mailbox is stolen easily, as selected as the user browser remember cryptographic function the time, as long as usurp the user's computer password, mailbox that can free login user; It is away from keyboard after the user logins mailbox, when perhaps having revealed the login password of subscriber mailbox by alternate manner, the fail safe of the Email in the subscriber mailbox can't be guaranteed, and this is to many enterprises, and especially the business people may cause the loss that can't retrieve.
Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of encryption method of Email, is intended to solve the problem that the Email that exists in the prior art can't obtain safety assurance.
The embodiment of the invention is achieved in that a kind of encryption method of Email, and described method comprises the steps:
Folder information in the Crypted password information of reception input and the selected mailbox;
Adopt cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
Another purpose of the embodiment of the invention is to provide a kind of decryption method of Email, and described method comprises the steps:
Receive the clear crytpographic key information of input and selected encryption folder;
Adopt the decipherment algorithm corresponding that described encryption folder is decrypted according to described clear crytpographic key information with cryptographic algorithm.
Another purpose of the embodiment of the invention is to provide a kind of encryption system of Email, and described system comprises:
The enciphered message receiving element is used for receiving the Crypted password information of input and the folder information of selected mailbox;
Cryptographic processing unit is used for adopting cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
Another purpose of the embodiment of the invention is to provide a kind of decryption system of Email, and described system comprises:
The decryption information receiving element is used to receive the clear crytpographic key information of input and selected encryption folder information; And
The decryption processing unit is used for adopting the decipherment algorithm corresponding with cryptographic algorithm that described encryption folder is decrypted according to described clear crytpographic key information.
In embodiments of the present invention; Crypted password information according to input adopts cryptographic algorithm to generate cryptographic keys; file in the mailbox that the user is selected is encrypted; for the Email in this encryption folder provides secondary cryptoguard; thereby guaranteed the fail safe of Email in the mailbox, especially the important private data to the user provides sufficient safety guarantee.
Description of drawings
Fig. 1 is the realization flow figure of the E-mail enciphered method that provides of the embodiment of the invention;
Fig. 2 is the encryption folder that provides of the embodiment of the invention or the use process chart of encrypted E-mail;
Fig. 3 is the realization flow figure of the Email decryption method that provides of the embodiment of the invention;
Fig. 4 is the structure chart of the E-mail enciphered system that provides of the embodiment of the invention;
Fig. 5 is the structure chart of the Email decryption system that provides of the embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
In embodiments of the present invention, by receiving the Crypted password information of user's input, encrypt according to the file that this Crypted password information produces in the mailbox that cryptographic keys selectes the user, thereby realized the superencipher of the Email in this encryption folder in the mailbox, guaranteed the fail safe of user email.
Fig. 1 shows the realization flow of the encryption method of the Email that the embodiment of the invention provides, and details are as follows:
In step S101, the folder information in the mailbox that the Crypted password information of reception user input and user select.Wherein the Email Information that the user needs encipherment protection can be comprised in the file in the mailbox selected of user, also the file of sky can be.
In step S102, adopt corresponding cryptographic algorithm to produce cryptographic keys according to the Crypted password information of user input, the file in the mailbox that the user is selected is encrypted.In embodiments of the present invention, the corresponding cryptographic algorithm that is adopted can be open key-encryption algorithm (as RSA cryptographic algorithms), data encryption standard (Digital Encryption Standard, DES) algorithm, Digital Signature Algorithm (as ElGamal cryptographic algorithm, DSA cryptographic algorithm), md5 encryption algorithm or FLOWFISH cryptographic algorithm etc.After this document folder was encrypted, any Email in visit this document folder all needed to import the Crypted password of this document folder, thereby made the Email in the subscriber mailbox obtain the superencipher protection, had guaranteed the fail safe of the Email in this encryption folder.
In order to reach better cryptoguard effect; the embodiment of the invention is in step S101; when receiving the folder information in the Crypted password information of user's input and the mailbox that the user selectes; receive the fetching cipher information of user's input; as fetching cipher problem, secret email address etc. and store this fetching cipher information, after step S102, also comprise the steps: simultaneously
In step S103, when the user loses the Crypted password of above-mentioned encryption folder, according to the Crypted password of above-mentioned this encryption folder of fetching cipher information retrieval.
When the Email that needs encipherment protection was not included in this encryption folder, in order to realize that this Email that needs protection is carried out encipherment protection, this E-mail enciphered method also comprised the steps:
In step S104, receive the Email transfer instruction that needs encipherment protection beyond this encryption folder, and the Email of this needs encipherment protection is transferred to described encryption folder according to this transfer instruction.
For fear of logining mailbox because of the user and away from keyboard or log off because of the user in browsing the process of encryption folder, and cause the e-mail data in the encryption folder to be stolen by the disabled user, in embodiments of the present invention, after step S104, also comprise the steps:
In step S105, after the user stops to browse this encryption folder a period of time (as 2 minutes), after perhaps the user withdraws from the login of mailbox, according to the Crypted password information that receives among the step S101 this encryption folder is encrypted again automatically.When the user logins mailbox again or browses and operate in the mailbox Email in this encryption folder again, need re-enter the Crypted password of this encryption folder.
Be appreciated that, the user can adopt above-mentioned E-mail enciphered method selectively file in the mailbox or Email to be encrypted, simultaneously different passwords can be set for different encryption folders, thereby provide sufficient safety guarantee for user's important private data.
After adopting said method that the file in the selected mailbox is encrypted, the user is not when knowing the Crypted password of this document folder, can't carry out any Email in this encryption folder as any operation such as browsing, when the user opens and browse in this email process by Crypted password, if the user is away from keyboard, by this encryption folder is encrypted again, thereby guaranteed the fail safe of Email.
In actual application, the user can need select the file of encryption by the folder management page of mailbox, can encrypt the file of selected mailbox behind (as twice input password) input Crypted password on request.
The encryption folder that Fig. 2 shows the embodiment of the invention to be provided uses handling process.
After the user logins mailbox by password, the Email that selection need be browsed; Judge whether the file at selected Email place is encrypted, if the file unencryption at this Email place, then the user can normal browsing or is operated this Email, if the file at this Email place is encrypted, then points out the user to import Crypted password; Whether the Crypted password of checking user input correct, if the password mistake then changes error processing procedure over to, as prompting user cipher mistake etc., and if correctly the user can normal browsing or operates this Email; When the user forgets Crypted password, then according to the fetching cipher information of user input, as the Crypted password of these encryption folders of information retrieval such as fetching cipher problem and secret email address; When the user stops to browse or this Email of shut-down operation after a period of time, perhaps after the user withdrawed from the mailbox login, the file at this Email place was encrypted again.
Fig. 3 shows the realization flow of the decryption method of the Email that the embodiment of the invention provides, and details are as follows:
In step S301, the encryption folder information in the mailbox that the clear crytpographic key information of reception user input and user select.In actual application, the user passes through the folder management page in the mailbox, the file that selection has been encrypted, and input clear crytpographic key information, and when this clear crytpographic key information is encrypted for this document is pressed from both sides, the Crypted password information that the user imports.
In step S302, adopt the decipherment algorithm corresponding according to this Crypted password information with above-mentioned cryptographic algorithm, selected encryption folder is decrypted.After this encryption folder is decrypted, the state of this encryption folder with encrypt before consistent, the mailbox login user can be random browses or operates any Email in the file after decrypted in this mailbox.
Fig. 4 shows the structure of the encryption system of the Email that the embodiment of the invention provides, and for better explanation, only shows the part relevant with the embodiment of the invention.
Folder information in the mailbox that the Crypted password information of enciphered message receiving element 41 reception user inputs and user select.Adopt corresponding cryptographic algorithm to produce cryptographic keys by cryptographic processing unit 42 according to the Crypted password information of user input, the file in the mailbox that the user is selected is encrypted, and wherein the corresponding cryptographic algorithm of Cai Yonging does not repeat them here as mentioned above.The Email that the user needs encipherment protection can be comprised in the file in the mailbox that the user selectes, also empty folder can be.
When the Email that needs encipherment protection is not included in this encryption folder; receive the Email transfer instruction that needs encipherment protection beyond these encryption folders by the Email buanch unit 43 of the encryption system of this Email, and the Email of this needs encipherment protection is transferred to this encryption folder according to this transfer instruction.
When the user forgets above-mentioned Crypted password, receive the fetching cipher information of user's input by fetching cipher information receiving unit 44, as information such as fetching cipher problem, secret mailboxes, by the Crypted password of fetching cipher unit 45 according to this this encryption folder of fetching cipher information retrieval.
After the user stops to browse this encryption folder a period of time (as 2 minutes), after perhaps the user withdraws from the login of mailbox, for fear of logining mailbox because of the user and away from keyboard or log off because of the user in browsing the process of encryption folder, and cause the e-mail data in the encryption folder to be stolen by the disabled user, re-encryption unit 46 is after the user stops to browse this encryption folder a period of time (as 2 minutes), after perhaps the user withdrawed from the login of mailbox, the Crypted password information that receives according to enciphered message receiving element 41 was encrypted again to this encryption folder automatically.
After the file in the mailbox was encrypted, the mailbox login user need be by the Email in this encryption folder of cryptographic acess, when the user logins mailbox again or browses and operate Email in the mailbox again, need re-enter Crypted password.
Fig. 5 is the structure of the decryption system of the Email that provides of the embodiment of the invention, for better explanation, only shows the part relevant with the embodiment of the invention.
Encryption folder information in the mailbox that the clear crytpographic key information of decryption information receiving element 51 reception user inputs and user select.This clear crytpographic key information when this document folder or Email are encrypted, the Crypted password information of user's input.Decryption processing unit 52 adopts the decipherment algorithm corresponding with cryptographic algorithm according to this decryption information, and the encryption folder in the mailbox that the user is selected is decrypted.When the Email in the file after the user capture deciphering, do not need to input password.
In sum; in embodiments of the present invention; Crypted password information according to user's input generates cryptographic keys; file in the mailbox that the user is selected is encrypted; thereby make Email in this encryption folder by superencipher; simultaneously the Email that needs encipherment protection can be transferred to this encryption folder; the fail safe of the Email in the subscriber mailbox is protected; stop to browse or operate this encryption folder after a period of time as the user simultaneously; when perhaps the user withdraws from the mailbox login; automatically again this encryption folder is encrypted according to the Crypted password information of user's input; when the user browses again or logins mailbox again, need re-enter password, make the user after being gone for a season; Email can not be stolen yet, and has further guaranteed the fail safe of user email.In addition, when the user forgot the password of encryption folder, the user can be by this Crypted password of fetching cipher information retrieval of input.When the user does not need when E-mail enciphered, the Email decryption method that provides by the embodiment of the invention can be removed the password of this Email, and it is convenient, freely to use.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1, a kind of encryption method of Email is characterized in that, described method comprises the steps:
Folder information in the Crypted password information of reception input and the selected mailbox;
Adopt cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
2, the encryption method of Email as claimed in claim 1 is characterized in that, described method also comprises the steps:
Receive the described encryption folder Email transfer instruction that needs encipherment protection in addition;
According to described instruction described Email is transferred to described encryption folder.
3, the encryption method of Email as claimed in claim 1 is characterized in that, described method also comprises the steps:
Receive the fetching cipher information of input;
Crypted password according to the described encryption folder of described fetching cipher information retrieval.
As the encryption method of claim 1 or 2 or 3 described Emails, it is characterized in that 4, described method also comprises the steps:
When stopping to browse described encryption folder after a period of time or when withdrawing from the mailbox login, utilize the described Crypted password information that receives again described encryption folder to be encrypted.
5, a kind of decryption method of Email is characterized in that, described method comprises the steps:
Receive the clear crytpographic key information of input and selected encryption folder;
Adopt the decipherment algorithm corresponding that described encryption folder is decrypted according to described clear crytpographic key information with cryptographic algorithm.
6, a kind of encryption system of Email is characterized in that, described system comprises:
The enciphered message receiving element is used for receiving the Crypted password information of input and the folder information of selected mailbox;
Cryptographic processing unit is used for adopting cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
7, the encryption system of Email as claimed in claim 6 is characterized in that, described system further comprises:
The Email buanch unit is used to receive the described encryption folder Email transfer instruction that needs encipherment protection in addition, and according to described instruction described Email is transferred to described encryption folder.
8, the encryption system of Email as claimed in claim 6 is characterized in that, described system further comprises:
The fetching cipher information receiving unit is used to receive the fetching cipher information of input; And
The fetching cipher unit is used for the Crypted password according to the described encryption folder of described fetching cipher information retrieval.
As the encryption system of claim 6 or 7 or 8 described Emails, it is characterized in that 9, described system further comprises:
The re-encryption unit is used for utilizing the described Crypted password information that receives again described encryption folder to be encrypted when stopping to browse described encryption folder after a period of time or when withdrawing from the mailbox login.
10, a kind of decryption system of Email is characterized in that, described system comprises:
The decryption information receiving element is used to receive the clear crytpographic key information of input and selected encryption folder information; And
The decryption processing unit is used for adopting the decipherment algorithm corresponding with cryptographic algorithm that described encryption folder is decrypted according to described clear crytpographic key information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100750421A CN101083524A (en) | 2007-06-14 | 2007-06-14 | Method and system for encrypting and deciphering E-mail |
PCT/CN2008/071120 WO2008151542A1 (en) | 2007-06-14 | 2008-05-28 | Method for controlling accessing to an electronic mail and electronic mail server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100750421A CN101083524A (en) | 2007-06-14 | 2007-06-14 | Method and system for encrypting and deciphering E-mail |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101083524A true CN101083524A (en) | 2007-12-05 |
Family
ID=38912825
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007100750421A Pending CN101083524A (en) | 2007-06-14 | 2007-06-14 | Method and system for encrypting and deciphering E-mail |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101083524A (en) |
WO (1) | WO2008151542A1 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008151542A1 (en) * | 2007-06-14 | 2008-12-18 | Tencent Technology (Shenzhen) Company Limited | Method for controlling accessing to an electronic mail and electronic mail server |
CN102281140A (en) * | 2011-06-24 | 2011-12-14 | 上海合合信息科技发展有限公司 | Acquisition method and system thereof for designated information |
CN102316051A (en) * | 2011-09-14 | 2012-01-11 | 中兴通讯股份有限公司 | Method for offline browsing history mail and system thereof |
CN102361479A (en) * | 2011-06-24 | 2012-02-22 | 上海合合信息科技发展有限公司 | Method and system for obtaining designated information |
CN101710879B (en) * | 2009-01-14 | 2012-05-02 | 中国传媒大学 | Novel identity-based privacy enhanced mail forwarding system |
CN103188246A (en) * | 2011-12-31 | 2013-07-03 | 上海格尔软件股份有限公司 | Safe E-mail system |
CN103188129A (en) * | 2011-12-29 | 2013-07-03 | 盈世信息科技(北京)有限公司 | E-mail encryption method, mail server and system |
CN103825999A (en) * | 2012-11-19 | 2014-05-28 | 腾讯科技(深圳)有限公司 | Application program function display method and device |
CN103929312A (en) * | 2014-04-29 | 2014-07-16 | 深圳市中兴移动通信有限公司 | Mobile terminal and method and system for protecting individual information of mobile terminal |
CN104065681A (en) * | 2013-03-20 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Method and system for previewing encryption compression packet in appendix |
CN104732159A (en) * | 2013-12-24 | 2015-06-24 | 北京慧眼智行科技有限公司 | File processing method and file processing device |
CN105530331A (en) * | 2015-12-16 | 2016-04-27 | 小米科技有限责任公司 | Method for establishing name card file and method and device for registering or logging in website |
CN103188129B (en) * | 2011-12-29 | 2016-12-14 | 盈世信息科技(北京)有限公司 | A kind of E-mail encryption method, mail server and system |
CN106874738A (en) * | 2017-01-25 | 2017-06-20 | 广东欧珀移动通信有限公司 | The response method and mobile terminal of a kind of touch control operation |
CN107888475A (en) * | 2016-09-30 | 2018-04-06 | 中国石油天然气股份有限公司 | The decryption method and server of mail |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003152803A (en) * | 2001-11-14 | 2003-05-23 | Nec Corp | System and method for mail reception substitute agent, server, and program |
JP2005128996A (en) * | 2003-09-30 | 2005-05-19 | Dainippon Printing Co Ltd | Information processing apparatus and system, and program |
CN100353787C (en) * | 2004-06-23 | 2007-12-05 | 华为技术有限公司 | Security guarantee for memory data information of mobile terminal |
CN101083524A (en) * | 2007-06-14 | 2007-12-05 | 腾讯科技(深圳)有限公司 | Method and system for encrypting and deciphering E-mail |
-
2007
- 2007-06-14 CN CNA2007100750421A patent/CN101083524A/en active Pending
-
2008
- 2008-05-28 WO PCT/CN2008/071120 patent/WO2008151542A1/en active Application Filing
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008151542A1 (en) * | 2007-06-14 | 2008-12-18 | Tencent Technology (Shenzhen) Company Limited | Method for controlling accessing to an electronic mail and electronic mail server |
CN101710879B (en) * | 2009-01-14 | 2012-05-02 | 中国传媒大学 | Novel identity-based privacy enhanced mail forwarding system |
CN102281140A (en) * | 2011-06-24 | 2011-12-14 | 上海合合信息科技发展有限公司 | Acquisition method and system thereof for designated information |
CN102361479A (en) * | 2011-06-24 | 2012-02-22 | 上海合合信息科技发展有限公司 | Method and system for obtaining designated information |
CN102316051A (en) * | 2011-09-14 | 2012-01-11 | 中兴通讯股份有限公司 | Method for offline browsing history mail and system thereof |
WO2012152002A1 (en) * | 2011-09-14 | 2012-11-15 | 中兴通讯股份有限公司 | Method and system for browsing email history offline |
CN102316051B (en) * | 2011-09-14 | 2018-06-19 | 中兴通讯股份有限公司 | A kind of method and system of off-line browsing history mail |
CN103188129B (en) * | 2011-12-29 | 2016-12-14 | 盈世信息科技(北京)有限公司 | A kind of E-mail encryption method, mail server and system |
CN103188129A (en) * | 2011-12-29 | 2013-07-03 | 盈世信息科技(北京)有限公司 | E-mail encryption method, mail server and system |
WO2013097326A1 (en) * | 2011-12-29 | 2013-07-04 | 盈世信息科技(北京)有限公司 | Electronic mail encryption method, mail server, and system |
CN103188246B (en) * | 2011-12-31 | 2016-12-14 | 上海格尔软件股份有限公司 | Safe e-mail system |
CN103188246A (en) * | 2011-12-31 | 2013-07-03 | 上海格尔软件股份有限公司 | Safe E-mail system |
CN103825999A (en) * | 2012-11-19 | 2014-05-28 | 腾讯科技(深圳)有限公司 | Application program function display method and device |
CN104065681A (en) * | 2013-03-20 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Method and system for previewing encryption compression packet in appendix |
CN104732159A (en) * | 2013-12-24 | 2015-06-24 | 北京慧眼智行科技有限公司 | File processing method and file processing device |
CN104732159B (en) * | 2013-12-24 | 2019-01-25 | 北京慧眼智行科技有限公司 | A kind of document handling method and device |
CN103929312A (en) * | 2014-04-29 | 2014-07-16 | 深圳市中兴移动通信有限公司 | Mobile terminal and method and system for protecting individual information of mobile terminal |
CN105530331A (en) * | 2015-12-16 | 2016-04-27 | 小米科技有限责任公司 | Method for establishing name card file and method and device for registering or logging in website |
CN107888475A (en) * | 2016-09-30 | 2018-04-06 | 中国石油天然气股份有限公司 | The decryption method and server of mail |
CN107888475B (en) * | 2016-09-30 | 2020-09-08 | 中国石油天然气股份有限公司 | Mail decryption method and server |
CN106874738A (en) * | 2017-01-25 | 2017-06-20 | 广东欧珀移动通信有限公司 | The response method and mobile terminal of a kind of touch control operation |
Also Published As
Publication number | Publication date |
---|---|
WO2008151542A1 (en) | 2008-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101083524A (en) | Method and system for encrypting and deciphering E-mail | |
US20080019530A1 (en) | Message archival assurance for encrypted communications | |
US8484459B2 (en) | Secure transfer of information | |
US11570155B2 (en) | Enhanced secure encryption and decryption system | |
EP3282670B1 (en) | Maintaining data security in a network device | |
CN101197822B (en) | System for preventing information leakage and method based on the same | |
US11163892B2 (en) | Buffering data until encrypted destination is unlocked | |
CN107733841A (en) | Method for message transmission and device based on multi-enciphering | |
CN103634313B (en) | Address list processing method and device, as well as mobile terminal | |
US8601603B1 (en) | Secure information transmission over a network | |
JP2008219743A (en) | File encryption management system and method of implementing same system | |
JP4140617B2 (en) | Authentication system using authentication recording medium and method of creating authentication recording medium | |
JP4562200B2 (en) | Cryptographic management apparatus, cryptographic management method and cryptographic management program in the apparatus | |
CN101009878A (en) | Data secrecy system and method | |
JP2005326933A (en) | Electronic mail transmission/reception method and electronic mail transmission/reception system | |
Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
US20070076880A1 (en) | Secure digital transmission | |
JP2004112571A (en) | Mobile communication terminal, encryption system, mobile communication method, and encryption method | |
Liu et al. | Design and Implementation of a PKI-Based Electronic Documents Protection Management System | |
JP2014115972A (en) | File security ensuring system | |
CN116319059A (en) | Multi-party simultaneous authentication mechanism for end-to-end encryption | |
Revathi | Secure sharing data using constant key size-aggregate key system | |
EP1320958B1 (en) | Method for transmitting, storing and accessing a secret | |
JP2007233983A (en) | System for protecting cellular telephone mail, and cellular telephone server | |
CN109687955A (en) | A kind of method and device for protecting data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20071205 |