CN102118381A - Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method - Google Patents

Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method Download PDF

Info

Publication number
CN102118381A
CN102118381A CN2010102872694A CN201010287269A CN102118381A CN 102118381 A CN102118381 A CN 102118381A CN 2010102872694 A CN2010102872694 A CN 2010102872694A CN 201010287269 A CN201010287269 A CN 201010287269A CN 102118381 A CN102118381 A CN 102118381A
Authority
CN
China
Prior art keywords
mail
usbkey
private key
dish
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102872694A
Other languages
Chinese (zh)
Inventor
张欢
郅帅杰
刘冬冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NFS-CHINA SOFTWARE Co Ltd
Original Assignee
NFS-CHINA SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NFS-CHINA SOFTWARE Co Ltd filed Critical NFS-CHINA SOFTWARE Co Ltd
Priority to CN2010102872694A priority Critical patent/CN102118381A/en
Publication of CN102118381A publication Critical patent/CN102118381A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a safe mail system based on a USBKEY (Universal Serial Bus Key) and a mail encrypting-decrypting method. The system mainly comprises a first mail system, a second mail system, a mail encrypting system and a mail decrypting system. When logging in the mail system, a user is required to insert a USBKEY disc (including a private key certificate) and input the password of a certificate, besides inputting the password of an account; and if the input password is wrong, the user is refused to log in the system. When a mail is transmitted, a COM (Component Object Model) assembly calls a private key in the USBKEY disc to generate a Hash value, the mail is signed up by using the Hash value, and a public key of an addressee is called to encrypt the mail; and when the mail is looked up, the private key in the USBKEY disc is required to be called to decrypt a key to generate a Hash value by a browser COM assembly after the key of the addressee is obtained, the mail is decrypted and the signature of the mail is checked by using the Hash value, therefore, the mail is safer in the transmitting process, and the authenticity of the mail is also ensured.

Description

Based on the secure e-mail system of USBKEY and email encryption, decryption method
Technical field
The present invention relates to the internet communication safe practice, relate in particular to a kind of secure e-mail system and email encryption, decryption method based on USBKEY.
Background technology
Along with internet scale is constantly developed, Email also grows up thereupon and touches daily life and work, but the opening of the Internet, popularity and anonymity bring many potential safety hazards also for enterprises and external electrical mail.Thing followed safety problem is also more and more paid attention to, and Email hovers just as postcard in network on the net, and there are the risk of being intercepted and captured and browsing at any time in individual privacy and company's secret.
Mail Transfer protocol commonly used is a simple relatively text based agreement as Simple Mail Transfer protocol (SMTP, Simple Mail Transfer Protocol).Specify one or more recipients (in most of the cases be identified and exist) of a piece of news thereon, Message-text can be transmitted then.
Post Office Protocol,Version 3 (POP3 for example again, Protocol Of Post version 3), its concrete course of work is: mail is sent on the server, and email client calls the e-mail client program with the Connection Service device, and downloads the Email that all are not read.This offline access pattern is a kind of storage/forwarding service, and mail is sent to (generally being PC or MAC) on the client terminal from mail server side.In case mail sends to client terminal, then the mail on the mail server will be deleted.But present POP3 mail server can be accomplished " only download mail, server end is not deleted " greatly, promptly improved POP3 agreement.
Interactive Mail Access Protocol (IMAP and for example, Internet Message Access Protocol), it is an application layer protocol, be used for from the local mail client, for example Microsoft Outlook, Outlook Express, Foxmail, Mozilla Thunderbird etc. visit remote servers, thus the mail on the reception server.Described IMAP and POP3 are the most general Internet standard agreements of mail access.The two all allows canned data on the Mail Clients access mail server.
Use SMTP, POP3, IMAP agreement successfully to solve the transmission and the reception problem of mail.The mail structure of this class surface mail generally includes mail head and mail body two parts; Wherein, the mail head comprises relevant informations such as sender, recipient, time; The mail body comprises Mail Contents, accessory information etc.(use smtp protocol) may be blocked and distort e-mail messages at any time in the mail transmission process; When the mail arrives mail server, mail is deposited with the form of file, the information of mail structure (mail head and mail body) also may be attacked at any time and be distorted, (using POP3 or IMAP agreement) when receiving mail also may be distorted, and SMTP, POP3, IMAP agreement rely on the mechanism of himself not discern, also can't take precautions against for distorting.
The mail security measure of extensively adopting at present, for example: PGP (Pretty Good Privacy) is the email encryption software based on the public spoon of RSA encryption system.Can maintain secrecy to prevent that the unauthorized person from reading to mail with it, thereby can also make the receiver can confirm the sender of mail by mail is increased digital signature, and can be sure of that mail is not distorted, a kind of safe communication modes promptly is provided, and is used for transmitting secret key in advance and without any need for the channel of maintaining secrecy.Here, described RSA (Rivest-Shamir-Adleman) is a kind of public spoon system of decomposing hypothesis based on the impossible prime factor of big number.Briefly be exactly to look for two very big prime numbers, one openly is PKI, and another does not tell that anyone is a private key.And these two secret keys are complementary, can use private spoon deciphering with public spoon encrypted ciphertext in other words, vice versa.
But because the public spoon of RSA encryption system self, arithmetic speed is its maximum shortcoming slowly always, therefore can only be applicable to the occasion that low volume data is encrypted, and is not suitable for the mail communication occasion that contains mass data.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of secure e-mail system and email encryption, decryption method based on USBKEY, use public-key by the private key certificate in the checking USBKEY dish, to the mail that sends and to encrypt and the mail that receives is used the private key deciphering, guarantee the fail safe and the authenticity of Mail Contents, to solve the safety problem of mailing system.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of secure e-mail system based on USBKEY, this secure e-mail system mainly comprises first mailing system, email encryption system, first mail server, second mail server, mail decryption system and second mailing system; Wherein, described
First mailing system is used for user login with the checking username and password, and private key for user certificate in the checking USBKEY dish, and cooperates email encryption with first mail server by calling described email encryption system when sending mail;
The email encryption system, comprise the browser com component, private key safety certificate and USBKEY dish, between described first mailing system and first mail server, be used for when sending mail, using the public key safety certificate of first mail server and cooperate the private key safety certificate of USBKEY dish that Mail Contents is encrypted;
First mail server is used for stored user essential information, safety certificate information, public key certificate and private key certificate, and the function that private key certificate downloads and mail to be sent is encrypted and the service of forwarding by mail are provided;
Second mail server is used for stored user essential information, safety certificate information, public key certificate and private key certificate, provides private key certificate to download and receive mail service, and the function that the mail that is received is decrypted;
The mail decryption system, comprise the browser com component, private key safety certificate and USBKEY dish, between described second mailing system and second mail server, be used for after receiving mail, cooperating the private key safety certificate of the USBKEY dish that is inserted in second mailing system and cooperate addressee's key that Mail Contents is tested label and deciphering;
Second mailing system is used for user login with the checking username and password, and the fail safe of private key for user safety certificate in the checking USBKEY dish, and calls described mail decryption system when being used to receive mail and Mail Contents is tested signed and deciphering.
Wherein, the com component of described email encryption system is used for calling the private key certificate of USBKEY dish to generate hash value in first mailing system during to email encryption.
The com component of described mail decryption system returns the deciphering hash value when being used for after second mailing system receives mail mail is decrypted.
Described privacy enhanced mail comprises mail body, comprises enciphered message, signing messages in this mail body.
A kind of email encryption method of the secure e-mail system based on USBKEY, this method comprises the steps:
A, user insert the USBKEY dish in first mailing system, enter login interface, and input the private key password in user name, password and the USBKEY dish; If by verifying then execution in step B, otherwise refusing user's login mailing system and return steps A;
After B, user edit mail, call private key certificate in the USBKEY dish and the public key certificate in first mail server mail is encrypted, signed;
C, send described privacy enhanced mail then.
Wherein, the described process that mail is encrypted, signed of step B comprises:
B1, initiate request to first mail server, generate the BASE64 coding at described server end, and be back to described mailing system by first mailing system at user place;
B2, by the request of initiate encrypting of user place first mailing system to described server, in described server, verify the addressee one by one, the people that makes a copy for is or/and close public key safety certificate of making a gift to someone, and the private key that calls in the USBKEY dish by the browser com component generates hash value, uses described BASE64 coding to obtain the signature value then;
B3, initiate the signAndSendMail request, after server is received this request, described hash value added in the described mail body this mail is signed, finish encryption mail in conjunction with described signature value by described first mailing system.
A kind of mail decryption method of the secure e-mail system based on USBKEY, this method comprises the steps:
A, user insert the USBKEY dish in second mailing system, enter login interface, and input the private key password in user name, password and the USBKEY dish; If by verifying then execution in step b, otherwise refusing user's login mailing system and return step a;
B, user consult, receive mail from second mail server, the mail deciphering to being received if desired, and the private key that then calls in the described USBKEY dish is decrypted, tests label;
The content of c, the described reception mail of demonstration.
What wherein, the private key butt joint receiving emails in the described USBKEY of the calling dish of step b was decrypted is specially:
In conjunction with the private key in the described USBKEY dish hash value that is included in the described reception mail is verified, and by using com component to call private key in the USBKEY dish, Email address according to the active user generates decrypted private key, key after the described deciphering is passed to second mail server side, uses described decrypted private key that Mail Contents is decrypted then.
Secure e-mail system and email encryption, decryption method based on USBKEY provided by the present invention has the following advantages:
When logging in system by user, except the checking username and password, also to verify the fail safe of private key certificate in the USBKEY dish, guarantee fail safe from the system source; When mail sends, this mail of signing, and use addressee's public key encryption mail, the addressee uses private key (depositing in the USBKEY dish) the deciphering mail of oneself when consulting mail, and tests label, because of private key has only portion, deposit in the USBKEY dish, have private key and could decipher mail, guaranteed that mail can not be distorted in process of transmitting, receiving course, make that the receiving-transmitting sides of mail is undeniable, thereby solve the safety problem of mailing system.
Description of drawings
Fig. 1 is the sending and receiving mail principle schematic of existing email system;
Fig. 2 is the secure e-mail system principle schematic diagram that the present invention is based on USBKEY;
Fig. 3 the present invention is based on the secure e-mail system encryption of USBKEY and sends mail, deciphering and reception mail schematic diagram;
Fig. 4 is a safety certificate allocative decision schematic diagram of the present invention.
Embodiment
Below in conjunction with accompanying drawing and embodiments of the invention method of the present invention is described in further detail.
Basic thought of the present invention is: safety measure and mailing system are combined closely, when the user logins mailing system, except the checking username and password, also need to verify the fail safe of private key in the USBKEY dish; When sending out mail, use private key and PKI that mail is encrypted, signed; When receiving emails, use the private key in the USBKEY dish that mail is decrypted, tests label; To prevent that mail from being consulted, distorting in transmission, receiving course, the fail safe and the authenticity of abundant certified mail.
Fig. 1 is the sending and receiving mail principle schematic of existing email system, as shown in Figure 1, mail sends to first mail server from first mailing system, be forwarded to second mail server from first mail server again, from described second mail server, collect this mail by second mailing system again.Otherwise, send the process of mail from second mailing system to first mailing system, also similar.It does not all take any security precautions in the sending and receiving process of mail, thereby safety that can't certified mail.
Fig. 2 is the secure e-mail system principle schematic diagram that the present invention is based on USBKEY, as shown in Figure 2, this secure e-mail system comprises first mailing system, email encryption system, first mail server, second mail server, mail decryption system and second mailing system; Wherein,
First mailing system is used for user login with the checking username and password, and private key for user certificate in the checking USBKEY dish, and cooperates email encryption with first mail server by calling described email encryption system when sending mail.
The email encryption system, comprise the browser com component, private key safety certificate (can be called for short private key) and USBKEY dish, between described first mailing system and first mail server, be used for when sending mail, using the public key safety certificate of first mail server and cooperate the private key safety certificate of USBKEY dish that Mail Contents is encrypted.
First mail server is used for stored user essential information, safety certificate information, public key certificate (can be called for short PKI) and private key certificate, and the function that private key certificate downloads and mail to be sent is encrypted and the service of forwarding by mail are provided.
Second mail server is used for stored user essential information, safety certificate information, public key certificate and private key certificate, provides private key certificate to download and receive mail service, and the function that the mail that is received is decrypted.
The mail decryption system, comprise the browser com component, private key safety certificate and USBKEY dish, between described second mailing system and second mail server, be used for after receiving mail, cooperating the private key safety certificate of the USBKEY dish that is inserted in second mailing system that Mail Contents is tested label and deciphering.
Second mailing system is used for user login with the checking username and password, and the fail safe of private key for user safety certificate in the checking USBKEY dish, and calls described mail decryption system when being used to receive mail and Mail Contents is tested signed and deciphering.
Here, described USBKEY dish is similar to USB flash disk, is used to store the private key safety certificate that the user downloads from first or second mail server.And essential information of user, safety certificate information, safety certificate (comprising PKI, private key safety certificate) etc. are all deposited in first, second mail server.
Described browser com component, between first or second mailing system and USBKEY dish, calling com component is that an indispensable step is encrypted, deciphered to mail.Com component, the private key certificate that is used for calling the USBKEY dish during to email encryption in first mailing system to be generating hash value, and return the deciphering hash value when being used for after second mailing system receives mail mail is decrypted.
Described public key safety certificate calls when being used for email encryption, signature and transmission mail.
Described private key safety certificate calls when being used for the mail deciphering, testing label and receiving mail.
Described enciphered message, signing messages are included in through in the mail body after the encryption.
Here, described first, second mailing system only is that in an embodiment effect has difference, and the effect in the reality does not have difference, and the two can send, receive mail.Equally, email encryption system and mail decryption system, the two also has the encryption and decryption function concurrently, does not repeat them here.
As seen, use this secure e-mail system, in the process of transmitting of mail, be in original safe condition all the time by encryption, signature certified mail to mail; When consulting mail, by to the deciphering of mail, test and sign the authenticity of judging mail.
Fig. 3 is based on the secure e-mail system encryption of USBKEY and sends mail, deciphering and receive the mail schematic diagram that as shown in Figure 3, this process comprises the steps:
Step 301, user are inserted the USBKEY dish in first, second mailing system, enter login interface, require the user to input private key password in user name, password and the USBKEY dish.
Whether step 302, the described private key password of checking safety, if then execution in step 303; Otherwise, return step 301, and refusing user's login mailing system.
Here, the private key password of described user's input is consistent with preset password in the USBKEY dish, thinks that then the private key password is safe.When logging in system by user, need the fail safe of the private key in the checking USBKEY dish earlier, if checking passes through, and the username and password checking passes through, could login system, allow to carry out business logical operation; If private key certificate and the wherein any checking of user name password are not passed through, then can not login system.
Step 303, by checking, allow the user to login mailing system, and execution in step 304 or step 309.
Step 304, user edit mail, and are ready for sending mail, execution in step 305.
Described editor's mail, be meant that in the mail editing interface input recipient, the people that makes a copy for are or/and close Email address of making a gift to someone, and the processes such as content text of editing mail to be sent, identical or similar with the editing process before the present transmission mail, do not repeat them here.
Step 305, judge whether and to encrypt, to sign to sent mail that if desired, then execution in step 306; Otherwise, execution in step 307.
Step 306, the private key and the PKI in the server that call in the USBKEY dish are encrypted, are signed described mail, and execution in step 307 then.
Here, when sending mail, must use private key and PKI that mail is encrypted, described concrete ciphering process is as follows:
Step 3061, user edit the mail interface and choose ' signature ' and " encryption " option, initiate request by first mailing system at user place to server, generate the BASE64 coding at described server end, and are back to described mailing system.
Step 3062, by the request of initiate encrypting of user place first mailing system to described server, by server verify the addressee one by one, make a copy for the people or/and close public key safety certificate of making a gift to someone whether exist, if exist, then the private key that calls in the USBKEY dish by the browser com component generates hash value, use described BASE64 coding to obtain the signature value then, execution in step 3063 again; If the non-existent situation of public key safety certificate is arranged among described addressee, the people that makes a copy for, close the making a gift to someone, then eject prompting, the user can do corresponding processing according to prompting.
Step 3063, initiate the signAndSendMail request, after server is received this request, described hash value added in the described mail body this mail is signed, finish encryption mail in conjunction with described signature value by described first mailing system.
Step 307, send described mail, and execution in step 308.
Step 308, prompting mail send successfully, and finish process of transmitting.
Step 309, user consult, receive mail from described server, and execution in step 310.
Step 310, judging whether need be to the deciphering of described mail, test label, if mail be encrypt promptly need deciphering, then execution in step 311, otherwise at common non-encrypted mail, then execution in step 312.
Step 311, the private key that calls in the described USBKEY dish are decrypted, test label, and execution in step 312 then.
Here,, use the private key in the USBKEY dish that mail is decrypted, tests label,, can not consult mail so, guaranteed that so promptly mail all can not be consulted, distort at any time and any place if there is not the private key in the USBKEY dish at privacy enhanced mail.Described mail is decrypted, tests the process of label, be specially:
Step 3111, examine to test the privacy enhanced mail that is received and sign and deciphering, execution in step 3112 then.
Step 3112, the described hash value in the mail is verified (promptly testing label) in conjunction with the private key in the USBKEY dish, and generate decrypted private key according to active user's Email address by the private key that uses com component to call in the USBKEY dish, key after the described deciphering is passed to second mail server side, uses described decrypted private key that Mail Contents is decrypted then.
Here, if described hash value correspondence does not go up, then test and sign failure, illustrate that this mail is not a legitimate mail of issuing this user, can not show the Mail Contents that is received this moment.
The content of step 312, the described reception mail of demonstration.
Fig. 4 is a safety certificate allocative decision schematic diagram of the present invention, and as shown in Figure 4, the essential information when the user imports the user by the certificate generator of server end, generates this user's public key certificate and private key certificate; Wherein public key certificate is deposited on the server, and private key certificate has only portion, and the user is by downloading, and is kept in this user's the USBKEY dish to get final product.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.

Claims (8)

1. the secure e-mail system based on USBKEY is characterized in that, this secure e-mail system mainly comprises first mailing system, email encryption system, first mail server, second mail server, mail decryption system and second mailing system; Wherein, described
First mailing system is used for user login with the checking username and password, and private key for user certificate in the checking USBKEY dish, and cooperates email encryption with first mail server by calling described email encryption system when sending mail;
The email encryption system, comprise the browser com component, private key safety certificate and USBKEY dish, between described first mailing system and first mail server, be used for when sending mail, using the public key safety certificate of first mail server and cooperate the private key safety certificate of USBKEY dish that Mail Contents is encrypted;
First mail server is used for stored user essential information, safety certificate information, public key certificate and private key certificate, and the function that private key certificate downloads and mail to be sent is encrypted and the service of forwarding by mail are provided;
Second mail server is used for stored user essential information, safety certificate information, public key certificate and private key certificate, provides private key certificate to download and receive mail service, and the function that the mail that is received is decrypted;
The mail decryption system, comprise the browser com component, private key safety certificate and USBKEY dish, between described second mailing system and second mail server, be used for after receiving mail, cooperating the private key safety certificate of the USBKEY dish that is inserted in second mailing system and cooperate addressee's key that Mail Contents is tested label and deciphering;
Second mailing system is used for user login with the checking username and password, and the fail safe of private key for user safety certificate in the checking USBKEY dish, and calls described mail decryption system when being used to receive mail and Mail Contents is tested signed and deciphering.
2. the secure e-mail system based on USBKEY according to claim 1 is characterized in that, the com component of described email encryption system is used for calling the private key certificate of USBKEY dish to generate hash value in first mailing system during to email encryption.
3. the secure e-mail system based on USBKEY according to claim 1 is characterized in that, the com component of described mail decryption system returns the deciphering hash value when being used for after second mailing system receives mail mail is decrypted.
4. the secure e-mail system based on USBKEY according to claim 1 is characterized in that described privacy enhanced mail comprises mail body, comprises enciphered message, signing messages in this mail body.
5. the email encryption method based on the secure e-mail system of USBKEY is characterized in that this method comprises the steps:
A, user insert the USBKEY dish in first mailing system, enter login interface, and input the private key password in user name, password and the USBKEY dish; If by verifying then execution in step B, otherwise refusing user's login mailing system and return steps A;
After B, user edit mail, call private key certificate in the USBKEY dish and the public key certificate in first mail server mail is encrypted, signed;
C, send described privacy enhanced mail then.
6. the email encryption method of the secure e-mail system of USBKEY according to claim 5 is characterized in that, the described process that mail is encrypted, signed of step B comprises:
B1, initiate request to first mail server, generate the BASE64 coding at described server end, and be back to described mailing system by first mailing system at user place;
B2, by the request of initiate encrypting of user place first mailing system to described server, in described server, verify the addressee one by one, the people that makes a copy for is or/and close public key safety certificate of making a gift to someone, and the private key that calls in the USBKEY dish by the browser com component generates hash value, uses described BASE64 coding to obtain the signature value then;
B3, initiate the signAndSendMail request, after server is received this request, described hash value added in the described mail body this mail is signed, finish encryption mail in conjunction with described signature value by described first mailing system.
7. the mail decryption method based on the secure e-mail system of USBKEY is characterized in that this method comprises the steps:
A, user insert the USBKEY dish in second mailing system, enter login interface, and input the private key password in user name, password and the USBKEY dish; If by verifying then execution in step b, otherwise refusing user's login mailing system and return step a;
B, user consult, receive mail from second mail server, the mail deciphering to being received if desired, and the private key that then calls in the described USBKEY dish is decrypted, tests label;
The content of c, the described reception mail of demonstration.
8. the mail decryption method of the secure e-mail system based on USBKEY according to claim 7 is characterized in that, what the private key butt joint receiving emails in the described USBKEY of the calling dish of step b was decrypted is specially:
In conjunction with the private key in the described USBKEY dish hash value that is included in the described reception mail is verified, and by using com component to call private key in the USBKEY dish, Email address according to the active user generates decrypted private key, key after the described deciphering is passed to second mail server side, uses described decrypted private key that Mail Contents is decrypted then.
CN2010102872694A 2010-09-20 2010-09-20 Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method Pending CN102118381A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102872694A CN102118381A (en) 2010-09-20 2010-09-20 Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102872694A CN102118381A (en) 2010-09-20 2010-09-20 Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method

Publications (1)

Publication Number Publication Date
CN102118381A true CN102118381A (en) 2011-07-06

Family

ID=44216974

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102872694A Pending CN102118381A (en) 2010-09-20 2010-09-20 Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method

Country Status (1)

Country Link
CN (1) CN102118381A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300176A (en) * 2011-10-24 2011-12-28 郑州信大捷安信息技术股份有限公司 Method and system for enhancing security of email of mobile terminal system based on secure TransFlash (TF) card
CN102438216A (en) * 2011-12-26 2012-05-02 郑州信大捷安信息技术股份有限公司 Method for enhancing safety of short message, e-mail and voice communication of intelligent mobile phone
CN103546284A (en) * 2012-07-10 2014-01-29 北京虎符科技有限公司 Hufu token authentication system
CN103973713A (en) * 2014-05-29 2014-08-06 华翔腾数码科技有限公司 Transfer method, extraction method and processing system for electronic mail information
CN104023028A (en) * 2014-06-19 2014-09-03 江苏威盾网络科技有限公司 Anti-eavesdrop method based on WEB E-mails
CN104065558A (en) * 2013-03-20 2014-09-24 东方斯泰克信息技术研究院(北京)有限公司 Sending and accepting methods and sending and accepting devices for email
CN104253694A (en) * 2014-09-27 2014-12-31 杭州电子科技大学 Encrypting method for network data transmission
CN108388788A (en) * 2018-03-12 2018-08-10 山东渔翁信息技术股份有限公司 A kind of method and device for calling USB KEY bottoms library
CN109409046A (en) * 2018-09-26 2019-03-01 北京天地和兴科技有限公司 A kind of secure log authentication method of industrial safety system
CN109460651A (en) * 2018-10-17 2019-03-12 航天信息股份有限公司 The login method and device of billing system
CN109729088A (en) * 2018-12-29 2019-05-07 广东盈世计算机科技有限公司 A kind of method of mail treatment
CN110493212A (en) * 2019-08-13 2019-11-22 上海威尔立杰网络科技发展有限公司 A kind of general purpose mail End to End Encryption method
CN111181841A (en) * 2019-12-29 2020-05-19 航天信息股份有限公司 E-mail receiving and sending method and device
CN112149097A (en) * 2020-09-22 2020-12-29 龙芯中科(合肥)技术有限公司 Identity authentication method, device, equipment and storage medium
CN112995204A (en) * 2021-04-09 2021-06-18 厦门市美亚柏科信息股份有限公司 Method, device, equipment and storage medium for safely reading Protonmail encrypted mail
CN113438074A (en) * 2021-06-24 2021-09-24 中电信量子科技有限公司 Decryption method of received mail based on quantum security key
CN113923053A (en) * 2021-12-09 2022-01-11 华中科技大学 Cross-equipment safety synchronization method and system for encrypted mail
CN116032509A (en) * 2021-10-27 2023-04-28 中移系统集成有限公司 Mail encryption and decryption method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030015068A (en) * 2001-08-14 2003-02-20 아리온 주식회사 The authentication method using USB key in WEB environment
CN1835434A (en) * 2006-04-10 2006-09-20 北京易恒信认证科技有限公司 Electronic mail system and method based on CPK safety authentication
CN1961525A (en) * 2003-05-02 2007-05-09 吉瑞泰克有限公司 Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030015068A (en) * 2001-08-14 2003-02-20 아리온 주식회사 The authentication method using USB key in WEB environment
CN1961525A (en) * 2003-05-02 2007-05-09 吉瑞泰克有限公司 Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
CN1835434A (en) * 2006-04-10 2006-09-20 北京易恒信认证科技有限公司 Electronic mail system and method based on CPK safety authentication

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300176B (en) * 2011-10-24 2014-06-11 郑州信大捷安信息技术股份有限公司 Method and system for enhancing security of email of mobile terminal system based on secure TransFlash (TF) card
CN102300176A (en) * 2011-10-24 2011-12-28 郑州信大捷安信息技术股份有限公司 Method and system for enhancing security of email of mobile terminal system based on secure TransFlash (TF) card
CN102438216A (en) * 2011-12-26 2012-05-02 郑州信大捷安信息技术股份有限公司 Method for enhancing safety of short message, e-mail and voice communication of intelligent mobile phone
CN102438216B (en) * 2011-12-26 2013-11-20 郑州信大捷安信息技术股份有限公司 Method for enhancing safety of short message, e-mail and voice communication of intelligent mobile phone
CN103546284A (en) * 2012-07-10 2014-01-29 北京虎符科技有限公司 Hufu token authentication system
CN104065558A (en) * 2013-03-20 2014-09-24 东方斯泰克信息技术研究院(北京)有限公司 Sending and accepting methods and sending and accepting devices for email
CN103973713A (en) * 2014-05-29 2014-08-06 华翔腾数码科技有限公司 Transfer method, extraction method and processing system for electronic mail information
CN104023028A (en) * 2014-06-19 2014-09-03 江苏威盾网络科技有限公司 Anti-eavesdrop method based on WEB E-mails
CN104253694A (en) * 2014-09-27 2014-12-31 杭州电子科技大学 Encrypting method for network data transmission
CN104253694B (en) * 2014-09-27 2018-03-27 杭州电子科技大学 A kind of time slot scrambling for network data transmission
CN108388788A (en) * 2018-03-12 2018-08-10 山东渔翁信息技术股份有限公司 A kind of method and device for calling USB KEY bottoms library
CN108388788B (en) * 2018-03-12 2019-11-26 山东渔翁信息技术股份有限公司 A kind of method and device for calling USB KEY bottom library
CN109409046A (en) * 2018-09-26 2019-03-01 北京天地和兴科技有限公司 A kind of secure log authentication method of industrial safety system
CN109460651A (en) * 2018-10-17 2019-03-12 航天信息股份有限公司 The login method and device of billing system
CN109729088B (en) * 2018-12-29 2022-01-25 广东盈世计算机科技有限公司 Mail processing method
CN109729088A (en) * 2018-12-29 2019-05-07 广东盈世计算机科技有限公司 A kind of method of mail treatment
CN110493212A (en) * 2019-08-13 2019-11-22 上海威尔立杰网络科技发展有限公司 A kind of general purpose mail End to End Encryption method
CN111181841B (en) * 2019-12-29 2022-07-08 航天信息股份有限公司 E-mail receiving and sending method and device
CN111181841A (en) * 2019-12-29 2020-05-19 航天信息股份有限公司 E-mail receiving and sending method and device
CN112149097A (en) * 2020-09-22 2020-12-29 龙芯中科(合肥)技术有限公司 Identity authentication method, device, equipment and storage medium
CN112149097B (en) * 2020-09-22 2023-02-28 龙芯中科(合肥)技术有限公司 Identity authentication method, device, equipment and storage medium
CN112995204A (en) * 2021-04-09 2021-06-18 厦门市美亚柏科信息股份有限公司 Method, device, equipment and storage medium for safely reading Protonmail encrypted mail
CN112995204B (en) * 2021-04-09 2022-07-08 厦门市美亚柏科信息股份有限公司 Method, device, equipment and storage medium for safely reading Protonmail encrypted mail
CN113438074A (en) * 2021-06-24 2021-09-24 中电信量子科技有限公司 Decryption method of received mail based on quantum security key
CN113438074B (en) * 2021-06-24 2022-11-11 中电信量子科技有限公司 Decryption method of received mail based on quantum security key
CN116032509A (en) * 2021-10-27 2023-04-28 中移系统集成有限公司 Mail encryption and decryption method and device
CN113923053A (en) * 2021-12-09 2022-01-11 华中科技大学 Cross-equipment safety synchronization method and system for encrypted mail
CN113923053B (en) * 2021-12-09 2022-02-08 华中科技大学 Cross-equipment safety synchronization method and system for encrypted mail

Similar Documents

Publication Publication Date Title
CN102118381A (en) Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method
US9917828B2 (en) Secure message delivery using a trust broker
US6904521B1 (en) Non-repudiation of e-mail messages
US7673004B1 (en) Method and apparatus for secure IM communications using an IM module
US20090210708A1 (en) Systems and Methods for Authenticating and Authorizing a Message Receiver
US7328351B2 (en) Mail processing apparatus and method
US20080285756A1 (en) Random shared key
CN113346995B (en) Method and system for preventing falsification in mail transmission process based on quantum security key
JP4434680B2 (en) E-mail processing device program
EP2562958A1 (en) Digital signature method and apparatus
CN101924710A (en) Management system and method for enterprise email box
Castiglione et al. E-mail-based covert channels for asynchronous message steganography
CN103973713A (en) Transfer method, extraction method and processing system for electronic mail information
JP4367546B2 (en) Mail relay device
CN106603388A (en) Email sending method, email check method, email view control method and devices
CN111541603B (en) Independent intelligent safety mail terminal and encryption method
Shukla et al. Open PGP based secure web email
CN113923053B (en) Cross-equipment safety synchronization method and system for encrypted mail
JP4760839B2 (en) E-mail relay device and e-mail relay method
Dumka et al. Taxonomy of E-Mail Security Protocol
CN112785240A (en) Method and device for processing e-mail, computer readable medium and electronic equipment
Shitole et al. Secure email software using e-smtp
Ojha et al. Pretty Good Privacy: An e-mail Security Protocol
Nourai et al. Securing email for the average users via a new architecture
Banday et al. S/MIME with multiple e-mail address certificates: A usability study

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110706