CN103200074B - Information processor, information processing method - Google Patents

Information processor, information processing method Download PDF

Info

Publication number
CN103200074B
CN103200074B CN201210523657.7A CN201210523657A CN103200074B CN 103200074 B CN103200074 B CN 103200074B CN 201210523657 A CN201210523657 A CN 201210523657A CN 103200074 B CN103200074 B CN 103200074B
Authority
CN
China
Prior art keywords
password
email
unit
accept
mail
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210523657.7A
Other languages
Chinese (zh)
Other versions
CN103200074A (en
Inventor
村田充昭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon IT Solutions Inc
Original Assignee
Canon IT Solutions Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon IT Solutions Inc filed Critical Canon IT Solutions Inc
Publication of CN103200074A publication Critical patent/CN103200074A/en
Application granted granted Critical
Publication of CN103200074B publication Critical patent/CN103200074B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The present invention is provided to make the structure of the appended document that inspection person is prone to be identified through password protection.File additional in the Email as inspection object be by the file of password protection in the case of, retrieval describes the Email of the password for this document of reading, and is prompted to inspection person.

Description

Information processor, information processing method
Technical field
The present invention relates to the technology in the reading of mail data.
Background technology
In recent years, as the means sending reception of the information of carrying out, it is widely used Email.In order to reduce the leakage of information risk that Email is caused, carry out achieving sending the mail received, confirm the such measure of content afterwards.
It addition, in order to reduce leakage of information risk, when sending vital document with Email, carry out file additional passwords and be attached to the measure that Email sends.In this case, for the password for file of reading, notified by other Emails afterwards.
In patent documentation 1, disclose the file for being attached to Email to prevent leakage of information and be encrypted the standard sent afterwards.
[patent documentation 1] Japanese Unexamined Patent Publication 2010-21746 publication
Summary of the invention
Addition of the Email by the file of password protection (encryption) as described above archived in the case of, need to input password to open this appended document when content check.In this case, confirm that the user (inspection person) of the Email achieved in most cases does not knows password.Accordingly, it would be desirable to from achieving the Email (password description mail) additionally searched for for notifying password, and input the password found, and become trouble.
Even if it addition, in the case of the recipient of Email reads the Email that receives, if the appended document of this Email by password protection, need to search for password the most similarly and describe mail and become trouble.
Therefore, it is an object of the invention to provide the standard of a kind of appended document for being prone to be identified through password protection.
The present invention provides a kind of information processor, stores Email, possesses: reading mail selects to accept unit, accepts the selection of the Email of reading object from user;Retrieval unit, selected by described reading mail to accept unit accepted file additional in the Email selected encrypted in the case of, retrieval represents the Email for the password being decrypted this document;And notification unit, described user is notified the Email retrieved by described retrieval unit.
It addition, the present invention provides a kind of information processor, store Email, possess: reading mail selects to accept unit, accept the selection of the Email of reading object from user;Retrieval unit, selected by described reading mail to accept unit accepted file additional in the Email selected encrypted in the case of, retrieval describes the Email for the password being decrypted this document;And decryption unit, by the password described in the Email that retrieved by described retrieval unit, described appended document is decrypted.
It addition, the present invention provides a kind of information processor, possess: receive unit, receive Email;Unit extracted out in password, extracts the password described in the Email received by described reception unit out;Memory element, stores and is extracted out, by described password, the password that unit is extracted out;And decryption unit, by the password of storage in described memory element, described reception unit file additional in the Email received is decrypted.
Additionally, the present invention provides a kind of information processing method, being the information processing method in the information processor of storage Email, possess: reading mail selects to accept operation, the reading mail of described information processor selects to accept the selection of the Email that unit accepts reading object from user;Retrieval operation, selected by described reading mail to accept operation accepted file additional in the Email selected encrypted in the case of, the retrieval unit retrieval of described information processor represents the Email for the password being decrypted this document;And notice operation, the notification unit of described information processor notifies the Email retrieved by described retrieval operation to described user.
Additionally, the present invention provides a kind of information processing method, being the information processing method in the information processor of storage Email, possess: reading mail selects to accept operation, the reading mail of described information processor selects to accept the selection of the Email that unit accepts reading object from user;Retrieval operation, selected by described reading mail to accept operation accepted file additional in the Email selected encrypted in the case of, the retrieval unit retrieval of described information processor describes the Email for the password being decrypted this document;And deciphering operation, the decryption unit of described information processor is utilized the password described in the Email retrieved by described retrieval operation, is decrypted described appended document.
It addition, the present invention provides a kind of information processing method, being the information processing method in information processor, possess: receive operation, the reception unit of described information processor receives Email;Operation extracted out in password, and the password of described information processor is extracted unit out and is drawn through in the Email that described reception operation receives the password described;Storage operation, the memory element storage of described information processor extracts, by described password, the password that operation is extracted out out;And deciphering operation, the decryption unit of described information processor utilizes the password by the storage of described storage operation, is decrypted file additional in the Email received by described reception operation.
In accordance with the invention it is possible to provide for being prone to be identified through the standard of the appended document of password protection.
Accompanying drawing explanation
Fig. 1 is the figure of an example of the structure of the information processing system of the present invention.
Fig. 2 is the figure of an example of the hardware configuration illustrating the information processor can applied as the proxy server of Fig. 1.
Fig. 3 is the flow chart of the detailed content of the Email preservation process illustrating that proxy server 101 is carried out in embodiments of the present invention.
Fig. 4 is to be shown in the flow chart of the detailed content of the appended document decryption processing that proxy server 101 is carried out in the 1st embodiment.
Fig. 5 is to illustrate that the password that proxy server 101 is carried out in embodiments of the present invention describes email search and processes the flow chart of (detailed content of the process of step S407).
Fig. 6 is an example of the picture of the setting of the search condition accepting the Email as inspection object, retrieval instruction.
Fig. 7 is the figure of the mail data illustrating archive.
Fig. 8 is an example of the picture showing retrieval result guide look.
Fig. 9 is to show the example being designated as supervising the picture of the detailed content of the Email of object.
Figure 10 is an example of the picture of the candidate guide look showing that password describes mail.
Figure 11 is the flow chart of the example illustrating the password registration process in the 2nd embodiment.
Figure 12 is the flow chart of the example illustrating the appended document decryption processing in the 2nd embodiment.
Figure 13 is the figure of the example illustrating password data form.
Figure 14 is the flow chart of the example illustrating the appended document decryption processing in the 3rd embodiment.
Figure 15 is the figure of the example illustrating Email list screen.
Figure 16 is the figure of the example illustrating error notification picture.
Figure 17 is an example of the picture of the candidate guide look showing that password describes mail.
Figure 18 is an example of the picture of the candidate guide look showing that password describes mail.
Figure 19 is an example of the picture of the selection for accepting application password.
Figure 20 is an example of the picture for registering password.
Figure 21 is the flow chart of the example illustrating the appended document decryption processing in the 4th embodiment.
Figure 22 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
Figure 23 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
Figure 24 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
Figure 25 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
Figure 26 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
Figure 27 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
(symbol description)
101: proxy server (information processor);102: mail server;103-1,103-2: client terminal device (information processor);104:LAN;105: wide area network;106-1,106-2: Outside Mail server;107: inspection person's terminal.
Detailed description of the invention
<the 1st embodiment>
Hereinafter, referring to the drawings, the 1st embodiment of the present invention is described in detail.
Fig. 1 is the figure of an example of the system structure of the information processing system illustrating the present invention.
As it is shown in figure 1, the information processing system of present embodiment possesses proxy server 101, mail server 102, client terminal device 103-1, below 103-2(, be generically and collectively referred to as client terminal device 103), inspection person's terminal 107.It addition, said apparatus is via LAN(Local Area Network, LAN) 104 can connect with being in communication with each other.
It addition, mail server 102, client terminal device 103, inspection person's terminal 107 can connect with Outside Mail server 106-1, the 106-2 being connected with wide area network 105 via proxy server 101 with being in communication with each other.
Proxy server 101 be by preserve (archive) from mail server 102, client terminal device 103 send e-mail data function, for the e-mail data sent relay and control process server unit.
Mail server 102 is to receive and the server unit that uses to carry out sending of Email, is the server unit of the function such as addresses of items of mail management with Email.
Client terminal device 103 is the termination of the user operation using the addresses of items of mail managed by mail server 102.
Inspection person's terminal 107 is the termination operated by inspection person, carries out the reading etc. of the mail data of storage in proxy server 101.
It follows that use Fig. 2, illustrate can apply to an example of the hardware configuration of the information processor of the proxy server 101 shown in Fig. 1.
In fig. 2,201 is CPU, controls each equipment, the controller being connected with system bus 204 generally.Additionally, in ROM203 or external memory storage 211, store the BIOS(Basic Input/Output System of the control program as CPU201, basic input/output), operating system program (following, OS), in order to realize each server or function that each PC performs and required various programs etc..
202 is RAM, as the main storage of CPU201, working area etc. and function.CPU201 is by being loaded in program etc. required when execution processes from ROM203 or external memory storage 211 to RAM202, and performs the program of this loading, realizes various action.
It addition, 205 is input controller, control the input from input equipment 209 grade.206 is Video Controller, controls the display to the display equipments such as liquid crystal display 210.It addition, display equipment is not limited to liquid crystal display, it is also possible to be CRT monitor etc..As required, client uses them.
207 is Memory Controller, controls the access of the external memory storages 211 such as the hard disk (HD) to storage bootstrap, various application program, character font data, user file, editing files, various data etc., floppy disk (FD) or compact flash (registered trade mark) memorizer that is connected via adapter with pcmcia card groove.
208 is communication I/F controller, is connected communication with external mechanical via network (such as, the LAN400 shown in Fig. 1), performs the Control on Communication in network and processes.For instance, it is possible to carry out employing the communication etc. of TCP/IP.
It addition, the expansion (rasterizing) that CPU201 performs cutline font by the display information in such as RAM202 with region processes, it is possible to realize the display on display equipment 210.It addition, CPU201 can carry out user's instruction by the not shown cursor of mouse etc. on display equipment 210.
On hardware, the various programs of action are recorded in external memory storage 211, perform by CPU201 by being loaded into RAM202 as required.
It addition, also not all device possesses these structures, and possesses the part of necessity.
<the 1st embodiment>
It follows that use Fig. 3, illustrate that the Email preservation that proxy server 101 is carried out in the 1st embodiment of the present invention processes.
It addition, for the process shown in the flow chart of Fig. 3, be that the CPU201 of proxy server 101 reads and performs the process of the control program specified.
In step S301, the CPU201 of proxy server 101 receives the Email sent from client terminal device 103.
In step s 302, the CPU201 of proxy server 101 judges whether that the Email to receiving in step S301 is attached with file.
In the case of being judged as being attached with file (step S302: "Yes"), process is made to transfer to step S303.
In the case of being judged as not being attached with file (step S302: "No"), process is made to transfer to step S304.
Herein, in the present embodiment, the most only to be judged with or without on the basis of appended document but it also may judge according to whether be attached with the file by password protection.In this case, in the case of the Email received in step S301 is attached with password imparting file, process is made to transfer to step S303.Non-appended document situation, appended document is not had imparting password in the case of, make process transfer to step S304.
It addition, for the judgement whether protected by password, it is possible to by using known technology to realize, so for detailed description, omitting.
In step S303, the data of the Email received in step S301 are saved in memory area (Fig. 7) by the CPU201 of proxy server 101.Herein, create and preserve expression mark of additional documentary situation in this Email.
In step s 304, the data of the Email received in step S301 are saved in memory area (Fig. 7) by the CPU201 of proxy server 101.
Fig. 7 is an example of the form registering the e-mail data received in step S301.As it is shown in fig. 7, storage is had part name, sender, sending destination (To, Cc, Bcc), date of shipping time, the data of appended document, indicates whether the mark protected this appended document by password.It addition, although it is not shown, also storage has the data relevant to Email Body.
It follows that use Fig. 4, the appended document decryption processing that proxy server 101 is carried out in the 1st embodiment is described.
It addition, for the process shown in the flow chart of Fig. 4, be that the CPU201 of proxy server 101 reads and performs the process of the control program specified.
In step S401, the CPU201 of proxy server 101 accepts the condition of Email for retrieving reading object from inspection person, retrieves the Email met with this condition from the form shown in Fig. 7.As search condition, it is possible to as shown in Figure 6, set the condition of time, utilize the condition etc. of keyword.
If accepted the input of search condition through picture as shown in Figure 6, and accept pressing of index button 601, then perform retrieval.Retrieval process herein is equivalent to the process reduced the scope the Email as inspection object for inspection person.
In step S402, the CPU201 of proxy server 101 shows the result retrieved in step S401.Fig. 8 is an example of the retrieval result list screen of display in step S402.
Example shown in Fig. 8 is shown through search condition shown in Fig. 6 (when the 00 of December in 2011 20 days 00 point ~ 24 time 00 distribution send, including the Email of " meeting material " such character string) and retrieved the result of the data of Fig. 7.
In step S403, the CPU201 of proxy server 101 accepts selection in the Email shown in retrieval result list screen (Fig. 8) demonstrated in step S402, as the Email supervising object (reading object), the detailed content of the Email that display is selected.Fig. 9 is an example of the picture (inspection picture) of display in step S403.
In the inspection picture shown in Fig. 9, display supervises the information (901) such as the sender of Email of object, sending destination, part name, date of shipping time.It addition, the text (902) of display Email.
It addition, in the case of addition of file, show the situation of appended document, for each file, it is shown that for selecting to obtain the check box the most or not.
Such as, it is shown that the inspection object mail shown in Fig. 9 be addition of " meeting material " and " reference material " these 2 files.
Then, if selected for the check box shown in appended document 903, then it is set to obtain object by " meeting material " file of password protection and these both sides of " reference material " file.
In the case of have selected the check box of 904,905, it is set as " meeting material " file, " reference material " file independently respectively obtaining object.
For appended document (unprotect) 906, be after the process performing step S409, Or the check box of display in the case of file additional in do not supervised the Email of object by password protection.If selected for 906, the file (unprotected file) the most deciphered is set to obtain object.
In the case of have selected the check box of 906 in the same manner as the check box of 903 ~ 905, these both sides of meeting material, reference material are set to obtain object.In the case of have selected the check box of 907,908, each file is independently selected as obtaining object.
By after some that have selected in 903 ~ 908, press appended document and obtain button 909, accept appended document and obtain instruction (step S404).
In step s 404, the CPU201 of proxy server 101 accepts the acquirement instruction (being accepted by appended document the pressing of button 909 of acquirement of Fig. 9) of appended document additional the Email of this inspection object via the inspection picture demonstrated in step S403 from inspection person.
Herein, obtain button 909 and only can also show (or can press) in the case of the Email becoming inspection object be addition of appended document.
In step S405, the CPU201 of proxy server 101 judges to have accepted in step s 404 to obtain whether the appended document indicated is the file by password protection.That is, it is judged that when reading this appended document, if need the input of password.
Step S405 is judged as YES by (step S405: "Yes") in the case of the file of password protection, makes process transfer to step S407.
Step S405 is judged as, not by (step S405: "No") in the case of the file of password protection, make process transfer to step S406.
In step S 407, the CPU201 retrieval of proxy server 101 describes the Email (password description mail) of required password in order to read (inspection) is designated as the appended document of Email of inspection object.Use the flow chart of Fig. 5, the detailed content of the retrieval process in later-mentioned step S407.
Herein, use Fig. 5, illustrate that the password that proxy server 101 is carried out in embodiments of the present invention describes email search and processes (detailed content of the process of step S407).
It addition, for the process shown in the flow chart of Fig. 5, be that the CPU201 of proxy server 101 reads and performs the process of the control program specified.
In step S500, the CPU201 of proxy server 101, from mail archived markings (Fig. 7), obtains the archived markings relevant to the Email sent after the date of shipping time of the Email being selected as inspection object in step S403.
It is more in the situation being the most then designated as being sent after the Email of inspection object that password describes mail.That is, after just have sent the file with password protection, the situation sending password description mail in order to notify this password is more.Therefore, it is possible to by as the process of step S500, priority treatment is the data of the Email of transmission after the date of shipping time of the Email of inspection object, and find that password describes mail efficiently.
In this case, after process after the Email sent after have sent the date-time of the Email of inspection object is performed step S502, carry out the process for remaining Email (Email sent before the Email than inspection object) (describing in detail in step S511).
In step S501, the CPU201 of proxy server 101 reads in the mail data of 1 row amount from the mail archived markings obtained step S500.
In step S502, the CPU201 of proxy server 101 judges that the recipient information (transmission source, sending destination) of the mail read in step S501 is the most identical with the recipient information of the Email of inspection object.
Under being judged as identical situation (step S502: "Yes"), process is made to transfer to step S503.
Under being judged as different situations (step S502: "No"), process is made to transfer to step S507.
In step S503, the CPU201 of proxy server 101 judges that the part name of the mail read in step S501 is the most identical with the part name of the Email of inspection object.
Under being judged as identical situation (step S503: "Yes"), process is made to transfer to step S504.
Under being judged as different situations (step S503: "No"), process is made to transfer to step S507.
In step S502, on the basis of recipient information is the most identical.For the Email (addition of the Email of the file by password protection) of inspection object and notice for the Email (password description mail) of password of this document of reading; it is more that transmission source sending destination is the same from situation; so by judging according to such condition, it is possible to obtain the retrieval result being suitable for.
Even if it addition, do not perform the process shown in step S502, it is also possible to retrieval password describes mail, and the purpose of the present invention can be reached.
It addition, for the process in step S503, the process that the situation by same part name transmission inspection subject electronic mail and password description mail that is also based on is more.Therefore, even if not performing the process shown in step S503, it is also possible to retrieval password describes mail, and the purpose of the present invention can be reached.
It addition, in step S503, on the basis of part name whether " identical ", but the most sometimes describe at password in the part name of mail, the part name of inspection subject electronic mail adds " password notice " such character string and sends.It addition, the most sometimes send simply by " password notice " such part name.
Therefore, the process of step S503 can also be to judge to eliminate, from part name, the process that the part of " password notice " such character string is the most identical.
Or, it is also possible to it is such as will to include that the Email of " password notice " such character string is defined as the process reduced the scope that password describes the candidate of mail in part name.
It addition, with the processing similarly for the condition in step S503 of step S502, owing to being for finding that password describes an example of the condition of mail, so being not limited to this condition, and can also being retrieved by other conditions.
In step S504, the CPU201 of proxy server 101 obtains the textual data of the Email read in step S501.
In step S505, the CPU201 of proxy server 101 judges whether record password in the beginning part of the textual data of acquirement in step S504.
Under being judged as the situation (step S505: "Yes") describing password, process is made to transfer to step S506.
Under being judged as the situation (step S505: "No") not describing password, process is made to transfer to step S507.
Describe the text of mail as password, such as, consider " password of the file just now sent is * * * * " such content.Therefore, in step S505, use the known technology such as approximation literary composition retrieval to retrieve the Email including the character string with such " password is * * * * " such character string approximation, it may be judged whether to describe and have password.
It addition, in step S505, it is judged that in the beginning part of text, whether describe password, but be not limited to the beginning part, it is also possible to if somewhere in the body of the email describes above-mentioned character string, then be judged as describing password.
Alternatively, it is also possible to for the Email not describing concrete password, be also judged as "Yes".
Such as, as the character string approximated with " password is * * * * " such character string, it is believed that be " password is the most identical " such character string.For describing the Email of such character string, it is impossible to say and describe concrete password.But, if it is possible to such Email is prompted in later-mentioned step S509 password and describes mail candidate, then for user, it is possible to grasp the password that should apply.
That is, even if concrete password cannot be learnt, it is also possible to grasp such as " the most only this special password and can be deciphered by the password used always ".
So, the process in step S505 is the process that the retrieval Email (password description mail) that describes concrete password, the Email etc. of information that describes expressions " the most identical " such password describe the expression Email of the information of password for being decrypted file.
In step S506, the CPU201 of proxy server 101 by the e-mail storage being judged to "Yes" in step S505 be password describe mail candidate.
In step s 507, the CPU201 of proxy server 101 judge whether in step S500(after performing step S511, step S511) in all labellings of archived markings of reading in perform the process of step S502 ~ S506.
In the situation (step S507: "Yes") being judged as YES last labelling, process is made to transfer to step S508.
It is being judged as and in the situation (step S507: "No") of interlocutory labelling, is making process return to step S501, reading in ensuing mail archived markings.
Process shown in above-mentioned Fig. 5 is that even if being configured to retrieve by the process step beyond it and determine that password describes mail, the problem of the present invention also is able to solution for determining that password describes mail and extracts the example of process of password out.
In step S508, the CPU201 of proxy server 101 judges whether to be found that password describes mail.Specifically, according to or without being judged to "Yes" in step S505, and the data being stored in memory area in step S506 judge.
Under being found that the situation (step S508: "Yes") that password describes mail, process is made to transfer to step S509.
Under not finding the situation (step S508: "No") that password describes mail, process is made to transfer to step S510.
In step S509, the picture that the candidate that the CPU201 of proxy server 101 makes display password describe mail is had a guide look of is shown in inspection person's terminal 107.Then, the process shown in process ends figure.
Figure 10, Figure 17, Figure 18 are shown in step S509, at an example of the picture of inspection person's terminal 107 display.
Figure 10 is the example that password describes mail candidate list screen.Candidate at the picture shown in Figure 10 is had a guide look of in display part 1001, and guide look display is judged as likely describing the mail of the password of file additional in the Email of inspection object of reading by the process shown in the flow chart of Fig. 5.That is, display is stored in the Email of memory area in step S506.
In the picture shown in Figure 10, it is shown that select the mail determined by part name " password notifies: the meeting material of yesterday ", in Mail Contents display part 1002, show the part name of this mail, recipient information, date of shipping time, the content etc. of message body.For the password in text, identifiably show.
For describing, from password, the method that mail extracts password out, owing to can be realized by the known technology both deposited, so detailed description is omitted, but an example described herein as.
For example, it is contemplated that will and then the such method of password be defined as after " password: " such character string.Alternatively, it is also possible to use known technology to detect and the character string of " password is * * * * " such character string approximation, and the part suitable with * * * * is defined as password.It is not limited to method shown here, and any known technology can be used.
In the picture of Figure 10, there is password application button 1003, by pressing this button, the password described in the Email gone out selected by application, file additional in the Email of inspection object is decrypted (step S409).
It addition, in fig. 10 it is shown that retrieve the example that multiple password describes the situation of mail.But, in the case of password description mail is only 1 envelope, it is also possible to be not to wait for pressing of password application button, and automatically apply the password described in this mail.
Figure 17 be be not transmitted person, judgement that sending destination is the most identical, and simply the Email comprising the such character string of pass word in message body, part name is had a guide look of as candidate the example of display.
Although it is the most not shown, it is also possible to possess password application button as shown in Figure 10, password entry hurdle as shown in Figure 18.Or, it is also possible in different pictures, show password entry picture.
Figure 18 is in the picture of Figure 10, is provided with the picture on password entry hurdle 1803.In the picture example shown in Figure 18, by being inputted password in password entry hurdle 1803 by inspection person, and press password application button 1804, and apply inputted password that file additional in the Email of inspection object is decrypted (step S409).
So, showing together with password entry hurdle by making password describe mail, inspection person can input password while observing the text of password description mail.
In step S510, the CPU201 of proxy server 101 determines whether the labelling to the relevant archived markings of Email sent before being selected as the date of shipping time supervising the Email of object and the process that is not carried out step S501 ~ S507.
Under being judged to the situation (step S510: "Yes") having, process is made to transfer to step S511.
In the situation (step S510: "No") of nothing, process is made to transfer to step S512.
In step S511, the CPU201 of proxy server 101 obtains the archived markings relevant to the Email sent before being selected as the date of shipping time supervising the Email of object.Then, make process return to step S501, the labelling obtained in step S511 is performed the process of step S501 ~ S507.
In step S512, the CPU201 of proxy server 101 makes the error picture not finding the situation of password description mail be shown in inspection person's terminal 107, the process shown in process ends figure.
Figure 16 is shown in step S512 in inspection person's terminal 107 example of the picture of display.
It addition, for step S510, the process of S511, be not to reach the purpose of the present invention and required process, so can not also perform.That is, only the mail archived markings obtained in step S500 is being performed the process of S501 ~ S507, and do not finding that password describes in the case of mail (step S508: "No"), it is also possible to controlling as transferring to step S512, and show error picture.
Step S510, S511 is performed, it is possible to find password with not omitting describe mail by the process as shown in this flow chart.
It addition, in the present embodiment, it is configured to show the picture of Figure 10 in the process of step S508, inspection person points out that password describe the candidate of mail, but this process is not intended to reach the purpose of the present invention and required process.That is, do not perform the process of step S508, and describe, by the password found in step S506, the password described in mail, perform decryption processing (S409), thus the problem of the present invention can solve the problem that.
It addition, do not carry out the process of step S500, S510, S511, and from the beginning for all mail archived markings, the process of step S501 ~ S506 repeatedly.
Return to the explanation of Fig. 4.
In step S408, the CPU201 of proxy server 101 judges whether to have accepted the input of password from inspection person.
Such as, in the picture of Figure 10, some password is selected to describe mail, and in the case of pressing password application button 1003, it is judged that for having accepted the input of password.
It addition, in the picture of Figure 18, password entry hurdle 1803 inputs password, and in the case of pressing password application button 1804, it is judged that for having accepted the input of password.
It addition, in the error picture of Figure 16, password entry hurdle 1601 inputs password, and in the case of pressing OK button, it is judged that for having accepted the input of password.
On the other hand, in the case of the cancel button in pressing Figure 10, Figure 18, Figure 16 (1004,1805,1603), it is judged that for not carrying out the input of password.
Under having accepted the situation of input of password (step S408: "Yes"), process is made to transfer to step S409.
Under not accepting the situation of input of password (step S408: "No"), process is made to transfer to step S406.
In step S409, the CPU201 of proxy server 101 uses the password having accepted input in step S408, have received the deciphering (being set to the state that can read) of the appended document obtaining instruction in step s 404.
Herein, for the file of deciphering in step S409, be mapped storage with the Email being designated as inspection object.
Thus, in the case of having accepted the acquirement instruction of the file having released password in step s 404, it is possible to the file of deciphering in step S409 is sent to inspection person.Thus, it is not necessary to perform the process shown in flow chart of Fig. 5, it is possible to the high efficiency that realization processes every time.
In step S410, the appended document of deciphering in step S410 is sent to inspection person's (management terminal) by the CPU201 of proxy server 101.Then, the process shown in process ends figure.
In the case of being judged as the situation of the file not by password protection in step S405 and being judged as not finding that password describes mail in step S408, step S406 directly sends the file to inspection person.Then, the process shown in process ends figure.
<the 2nd embodiment>
It follows that use Figure 11, Figure 12, the 2nd embodiment of the present invention is described.In the 2nd embodiment, even if describing mail at such as password is that " password is the password used " is such, in the case of the Reusability past is by the password of email notification, it is also possible to determine password efficiently always.
In fig. 11, illustrate that the password preservation that proxy server 101 is carried out in the 2nd embodiment processes.
It addition, for the process shown in the flow chart of Figure 11, be that the CPU201 of proxy server 101 reads and performs the process of the control program specified.
In step S1101, the CPU201 of proxy server 101 receives the Email sent from client terminal device 103.
In step S1102, the CPU201 of proxy server 101 judges whether the Email received in step S1101 is that password describes mail.
In the situation (step S1102: "Yes") being judged as YES password description mail, process is made to transfer to step S1103.
Under being judged as that not password describes the situation (step S1102: "No") of mail, the process shown in process ends figure.
Whether illustrate in step S1102 is the password determination methods that describes mail.
For password describe mail, in the part name of Email input " password notice ", " contact of password " such character string, in the text of Email input " password is * * * * " such character string situation more.Therefore, it is possible to whether to include that such character string is as judgment standard.In addition it is possible to simply whether to include that the such character string of pass word is as judgment standard.In addition it is possible to use the known technology such as approximation literary composition retrieval to judge whether to include the character string approximated with above-mentioned " password is * * * * ".
So, for being whether the password judgement that describes mail, it is possible to realized by the known technology both deposited, it is possible to use any means.
In step S1103, the CPU201 of proxy server 101, from being judged as that step S1102 password describes the Email of mail, extracts password out, is registered in password DB(as an example, Figure 13).Now, in this password DB, be mapped information and the passwords such as registration transmission source, sending destination, date of shipping time.
For describing, from password, the method that mail extracts password out, it is possible to realized by the known technology both deposited, so while detailed description is omitted, but an example described herein as.
For example, it is contemplated that will and then the such method of password be defined as after " password: " such character string.Alternatively, it is also possible to use known technology to detect and the character string of " password is * * * * " such character string approximation, and the part suitable with * * * * is defined as password.As it has been described above, be not limited to method shown here, and any known technology can be used.
It follows that use Figure 12, the appended document decryption processing in present embodiment is described.
It addition, in fig. 12, to the process shown in the flow chart of Fig. 4, add the process of step S1201 ~ S1207, and delete step S407, S408.Therefore, herein, the process of step S1201 ~ S1207 is only described.Other process identical with the process of Fig. 4 of explanation in the 1st embodiment.
In step S1201, the CPU201 of proxy server 101 is from password DB(Figure 13) retrieve for the password being judged as that step S405 the appended document protected by password is decrypted.Now, use addition of the transmission source of Email (inspection object mail) of this document, the information of sending destination is retrieved.
Specifically, from the data that password DB retrieval is consistent with the transmission source of inspection object mail and sending destination.
Herein, even if when retrieving password DB, it is also possible to the data of the date-time after preferentially the project of retrieval date of shipping time is the date of shipping time of inspection object mail.Thereby, it is possible to more efficiently retrieve password.
In step S1202, the CPU201 of proxy server 101 judges whether the retrieval process by utilizing step S1201, it was found that consistent data.
In the situation (step S1202: "Yes") being found that consistent data, process is made to transfer to step S1206.
In the situation (step S1202: "No") not finding data, process is made to transfer to step S1203.
In step S1203, CPU201 display error picture (Figure 16) of proxy server 101, and accept the input of password.
In step S1204, the CPU201 of proxy server 101 judges whether to input password in the password entry hurdle 1601 of Figure 16, and presses OK button 1602.
In the case of pressing OK button, it is judged that be input to the password (step S1204: "Yes") on password entry hurdle 1601 for application, make process transfer to step S1205.
In the case of pressing cancel button 1603, cancel decryption processing (step S1204: "No"), make process transfer to step S406.
In step S1205, the password being input to password entry hurdle in step S1203 is registered in password DB(Figure 13 by the CPU201 of proxy server 101).
As shown in figure 11, not only extract password out from Email and register, and in password DB in the case of nothing registration, it is also possible to manually input password and register its content, after next time, retrieving password from password DB.
That is, the situation performing to accept the process of the input of password in step S1203 is not by the situation of email notification password.Therefore, in this case, by advance the password being manually entered being registered in password DB, can decipher without input after next time.
In step S1206, the CPU201 of proxy server 101 judges the result retrieved by step S1201, if retrieve multiple data.
Herein as the situation retrieving multiple data, it is considered to the past is notified of different password scenarios etc. from identical transmission source to identical sending destination.
Under retrieving multiple data cases (step S1206: "Yes"), process is made to transfer to step S1207.
The situation not retrieving multiple data, the most only retrieve 1 situation (step S1206: "No") under, make process transfer to step S409.
In step S1207, the CPU201 of proxy server 101 shows selection picture as shown in Figure 19, accepts the selection using which password from inspection person.
Figure 19 is the picture of the selection accepting password.In the example of Figure 19, it is shown that retrieve " abcde " and " 31415 " these 2 passwords.Inspection person by selecting some candidate's button 1901 and pressing OK button 1902, the password gone out selected by application.
Then, process is made to transfer to step S409.
So, according to the 2nd embodiment, even if being " password is the most identical ", " identical with last time " such situation at such as Notification Method such as password, do not describe concrete password, and when the password of Reusability in the past notice, it is also possible to find efficiently.
That is, by pre-registering the password of exchange between party in password DB, and registered password is retrieved, it is not necessary to retrieve the mail data of huge amount and can determine password.
Even if it addition, never going through in the case of mail carries out password notice in the past, in the case of deciphering by password of input or registered by inspection person, it is also possible to determine password.
It addition, the proxy server 101 in the 1st, the 2nd embodiment is the device of function as the information processor in the present invention.
Figure 13 is the figure of the example processing the password DB made being shown through step S1103 and step S1205.
In the case of being registered by the process of step S1103, register together with the time with the password description transmission source of mail, sending destination, date of shipping.
In the case of being registered by the process of step S1205, the transmission source of Email of appended document of this password, sending destination, date of shipping is applied to register together with the time with addition of.
It addition, in the present embodiment, in step S1103 and step S1205, password DB registers password, but the timing of registration password is not limited to this.
The registration of password can also be accepted at any time via figure 20 illustrates the supervisory frame of an example.
By accepting transmission source 2001, sending destination 2002, the input of password 2003 from inspection person, and pressing register button 2004, this transmission source, sending destination, password being mapped respectively is registered in password DB.
<the 3rd embodiment>
In the 3rd embodiment, illustrate to implement the mode of the present invention in client terminal device.
The 1st, in the 2nd embodiment, illustrate the situation that the Email that proxy server 101 obtains is supervised by inspection person.
In the present embodiment, illustrate in the case of recipient reads the Email that client terminal device 103 receives, it is easy to confirm the structure of file additional in this Email.
It addition, the client terminal device 103 in the 3rd embodiment is the device of function as the information processor in the present invention.
Use the flow chart shown in Figure 14, the appended document decryption processing in the 3rd embodiment is described.
In step S1401, the CPU201 of client terminal device 103 makes the guide look of the Email received be shown in display part.Figure 15 illustrates an example of list screen.List screen as shown in figure 15, by representing part name, sender, sending destination (To, Cc, Bcc), date of shipping time, information structure (1501) with or without appended document etc..Alternatively, it is also possible to be configured to the text (step S14021502) coming together to show the Email selected.
Afterwards, accepting the acquirement instruction of file additional in the Email selected, from the Email received, retrieval describes the Email for the password being decrypted this document.Processing for these, the process with the step S404 ~ S409 in the 1st embodiment is identical, so explanation herein is omitted.
It addition, in step S408, it is judged that for the process in the case of the password entry that no user is carried out, in direct process ends figure.
It addition, in the 1st embodiment, the archived markings of storage in proxy server 101 is performed process, but in present embodiment, the Email receiving client terminal device 103 performs process.
In step S1403, the CPU201 of client terminal device 103 opens the file of deciphering in step S409 so that it is become the state that user is able to confirm that the content of this document.
In step S1404, the CPU201 of client terminal device 103 opens not by the file of password protection so that it is become the state that user is able to confirm that the content of this document.
By above process, even if when the appended document that user has read by password encryption, it is also possible to reduce the time finding password.
<the 4th embodiment>
It follows that use Figure 21, the 4th embodiment of the present invention is described.4th embodiment is in a same manner as in the third embodiment, in client terminal device 103, implements the mode of the situation of the present invention.In the 3rd embodiment, from receiving, mail is found password description mail, but in the 4th embodiment, as the 2nd embodiment, construct password DB, use the password registered in this DB to carry out the deciphering of file.
Figure 21 is the flow chart of the example illustrating the appended document decryption processing in present embodiment.
In step S2101, the CPU201 of client terminal device 103 makes the guide look of the Email received be shown in display part.Figure 15 illustrates an example of list screen.List screen as shown in figure 15, by representing part name, sender, sending destination (To, Cc, Bcc), date of shipping time, information structure (1501) with or without appended document etc..Alternatively, it is also possible to be configured to the text (step S21021502) coming together to show the Email selected.
Afterwards, accepting the acquirement instruction of file additional in the Email selected, from the Email received, retrieval describes the Email for the password being decrypted this document.Processing for these, the process with the step S404 ~ S409 in the 1st embodiment is identical, so explanation herein is omitted.
It addition, in step S1204, it is judged that for the process in the case of the password entry that no user is carried out, in direct process ends figure.
It addition, in the 2nd embodiment, the archived markings of storage in proxy server 101 is performed process, but in the present embodiment, the Email receiving client terminal device 103 performs process.
In step S2103, the CPU201 of client terminal device 103 opens the file of deciphering in step S409, and is set to the state that user is able to confirm that the content of this document.
In step S2104, the CPU201 of client terminal device 103 opens not by the file of password protection, and is set to the state that user is able to confirm that the content of this document.
It addition, in the 4th embodiment, also the process shown in flow chart of the Figure 11 in execution the 2nd embodiment, extracts password out from receiving mail, and this password is registered in password DB.Now, in the present embodiment with the Email that oneself receives as object, so for the relevant data of the project to " sending destination " in password DB, it is also possible to non-registration.
By above process, thus, even if at such as password description mail as " password is the password used " always, in the case of the password of the transmission of reusing over, it is also possible to determine password efficiently.
In the 1st embodiment, disclose the method deciphered from the E-mail Retrieval password received.In the 2nd embodiment, disclose from the database retrieval registering password the method deciphered.In order to realize the purpose of the present invention, additionally it is possible to combination the 1st embodiment and the 2nd embodiment.
Such as, consider the Email after the date of shipping time first against the Email supervising object, retrieve password by the method in the 1st embodiment and describe mail, the password DB retrieval such method of password etc. in the case of not retrieving, from the 2nd embodiment.
Similarly, additionally it is possible to combination the 3rd embodiment and the 4th embodiment.
Figure 22 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
The reading mail of Figure 22 selects receiving unit 2201 to have the function of the selection accepting the Email becoming reading object from user.Search part 2202 has retrieval and represents for the function to the Email having been accepted the password that file additional in the Email selected is decrypted by reading mail selection receiving unit 2201.Notification unit 2103 has the function to the Email that user's notice is retrieved by search part 2202.
Figure 23 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
The reading mail of Figure 23 selects receiving unit 2301 to have the function of the selection accepting the Email becoming reading object from user.
Search part 2302 has retrieval and represents for the function to the Email having been accepted the password that file additional in the Email selected is decrypted by reading mail selection receiving unit 2201.Additionally, in the retrieval utilizing search part 2302, it is characterized in that, retrieve at the Email being selected receiving unit 2301 to send after having accepted the date of shipping time of the Email selected by reading mail, in the case of the result of this retrieval is the Email being judged to not retrieve expression password by detection unit 2306, the Email that retrieval sent before accepting the date of shipping time of Email of selection.It addition, in the retrieval utilizing search part 2302, it is characterised in that retrieve the transmission source identical with the transmission source having been accepted the Email selected by reading mail selection receiving unit 2301 and sending destination and the Email of sending destination.
Notification unit 2303 has the function to the Email that user's notice is retrieved by search part 2302.
Password entry portion 2304 has and accepts the function for the input to the password that additional file reading object mail is decrypted from user.
Decryption part 2305 has the password that use is inputted from user, the function being decrypted appended document by password entry portion 2304.
Detection unit 2306 has the function determining whether to represent the Email for the password being decrypted appended document by utilizing the retrieval of search part 2302 to retrieve.
Figure 24 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
The reading mail of Figure 24 selects receiving unit 2401 to have the function of the selection accepting the Email becoming reading object from user.
Search part 2402 has retrieval and describes for reading the function of Email of password that the file added on object mail is decrypted to being selected receiving unit 2401 to accept selections by reading mail.
Decryption part 2403 has the password described in the Email by being retrieved by search part 2402, selects receiving unit 2401 to accept the function that file additional in the Email selected is decrypted to by described reading mail.
Figure 25 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
The reading mail of Figure 25 selects receiving unit 2501 to have the function of the selection accepting the Email becoming reading object from user.
Search part 2502 has retrieval and describes for reading the function of Email of password that the file added on object mail is decrypted to being selected receiving unit 2501 to accept selections by reading mail.Additionally, in the retrieval utilizing search part 2502, it is characterized in that, retrieve at the Email being selected receiving unit 2501 to send after having accepted the date of shipping time of the Email selected by reading mail, in the case of the result of this retrieval is the Email being judged to by detection unit 2505 not retrieve and describing password, the Email that retrieval sent before accepting the date of shipping time of Email of described selection.
It addition, in the retrieval utilizing search part 2502, it is characterised in that retrieve the transmission source identical with the transmission source having been accepted the Email selected by reading mail selection receiving unit 2501 and sending destination and the Email of sending destination.
Decryption part 2503 has the password described in the Email by being retrieved by search part 2502, selects receiving unit 2401 to accept the function that file additional in the Email selected is decrypted to by reading mail.
It addition, in the deciphering utilizing decryption part 2503, it is characterised in that use and selected receiving unit 2504 to accept the password described in the Email selected by password description mail, carry out the deciphering of appended document.
It addition, in the deciphering utilizing decryption part 2503, use the password having been accepted input by password entry receiving unit 2506, appended document be decrypted.
Password describes mail and selects receiving unit 2504 to have in the case of the result retrieved by search part 2502 is to retrieve multiple Email, accepts the function of the selection using the password described which Email from user.
Detection unit 2505 has the function determining whether to be retrieved the Email describing password by search part 2502.
Password entry receiving unit 2506 has in the case of not retrieved Email by search part 2502, accepts the function of the input of password from user.
Figure 26 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
The acceptance division 2601 of Figure 26 has the function receiving Email.
Password extraction unit 2602 has the function extracting the password described in the Email received by acceptance division 2601 out.
Storage part 2603 has the function of the password that storage is extracted out by password extraction unit 2602.
Decryption part 2604 has the password by being extracted out and be stored in storage part 2603 by password extraction unit 2602, the function being decrypted the appended document of the Email received by acceptance division 2601.
Figure 27 is the functional block diagram of an example of the function illustrating the information processor in the present invention.
The acceptance division 2701 of Figure 27 has the function receiving Email.
Reading mail selection receiving unit 2702 has the function of the selection of the Email accepting reading object from user.
Password extraction unit 2703 has the function extracting the password described in the Email received by acceptance division 2701 out.
Storage part 2704 has the function of the password that storage is extracted out by password extraction unit 2703.The storage it addition, the password of storage in storage part 2704 is mapped with the transmission source of the Email received by acceptance division 2701 and sending destination.It addition, storage has been accepted the password of registration by password registration receiving unit 2706, and then, be mapped storage password with the transmission source having been accepted registration by password registration receiving unit 2706 and sending destination.
Decryption part 2705 has by the password of storage in storage part 2704, selects receiving unit 2702 to accept the function that file additional in the Email selected is decrypted to by reading mail.
It addition, in the deciphering utilizing decryption part 2705, it is characterised in that retrieval with and the transmission source of Email that received by acceptance division 2701 and the identical transmission source of sending destination and sending destination be mapped the password stored.
It addition, in the deciphering utilizing decryption part 2705, it is characterised in that use and selected receiving unit 2707 to accept the password selected by password, appended document is decrypted.
Password registration receiving unit 2706 has the function of the registration accepting password from user.It addition, in the password registration utilizing password registration receiving unit 2706, it is characterised in that register by accepting the input of password from user.Additionally, it is characterised in that by accepting the input of password and transmission source and sending destination, accept registration.
It addition, in the case of appended document cannot be decrypted by the password that password registration receiving unit 2706 stores in by storage part 2704, accept the registration of password from user.
Password selects receiving unit 2707 to have in the case of being mapped with same transmission source and sending destination and storing multiple password in storage part 2704, accepts the function of the selection using which password and be decrypted appended document from user.
It addition, the structure of above-mentioned various data and content thereof are not limited to this, naturally it is also possible to according to purposes, purpose, constituted by various structures, content.
It addition, the program in the present invention is the program that can make processing method that computer performs Fig. 3 ~ Fig. 5, Figure 11, Figure 12, Figure 14, Figure 21.It addition, the program in the present invention can also be the program of each processing method of each device of Fig. 3 ~ Fig. 5, Figure 11, Figure 12, Figure 14, Figure 21.
Even if the record medium of the program by system or unit feeding being have recorded the function realizing above-mentioned embodiment as described above, and make the computer (or CPU, MPU) of this system or device read and perform to record the program stored in medium, certainly it also is able to reach the purpose of the present invention.
In this case, being realized the new function of the present invention by the program self read from record medium, the record medium describing this program constitutes the present invention.
As the record medium for supplying program, for instance, it is possible to use floppy disk, hard disk, CD, photomagneto disk, CD-ROM, CD-R, DVD-ROM, tape, non-volatile storage card, ROM, EEPROM, silicone disc etc..
Additionally, by performing the program that computer reads, not only realize the function of above-mentioned embodiment, and be certainly additionally included in the OS(operating system worked on computer) etc. instruction according to this program carry out part or all of process of reality, and realized the situation of the function of above-mentioned embodiment by this process.
And then, certainly after being additionally included in the function expansion component expansion board being written to be inserted in computer from the program of record medium reading being connected the memorizer possessed with computer, the instruction according to this program code such as the CPU possessed in this expansion board, function expansion component carries out part or all of the process of reality, and is realized the situation of the function of above-mentioned embodiment by this process.
It addition, the present invention both can apply to the system being made up of multiple machines, it is also possible to be applied to the device being made up of a machine.It addition, the present invention can also be applied to the situation by reaching system or unit feeding program certainly.In this case, storing the record medium of the program for reaching the present invention by making this system or device read, this system or device can enjoy the effect of the present invention.
And then, utilize signal procedure to download by the server on network, database and read the program for reaching the present invention, this system or device and can enjoy the effect of the present invention.It addition, the structure being combined with the respective embodiments described above and variation thereof is the most all contained in the present invention.

Claims (24)

1. an information processor, stores Email, possesses:
Reading mail selects to accept unit, accepts the choosing of the Email of reading object from user Select;
Retrieval unit, has accepted, being selected to accept unit by described reading mail, the electronics postal selected In the case of file additional in part is encrypted, retrieve from the described Email stored Represent the Email for the password that this document is decrypted;And
Notification unit, notifies the Email retrieved by described retrieval unit to described user,
Described retrieval unit obtains and is being selected to accept unit and accepted selection by described reading mail Email the date of shipping time after the Email group that have sent, take from being contained in this Email group Email according to the date of shipping time from arriving first rear ordered retrieval Representing the Email of above-mentioned password, the Email notationally stating password is not included in this electricity In the case of sub-mailing list, obtain the transmission at the Email having accepted above-mentioned selection further The Email group that sent before date-time, from the Email group being contained in this acquirement In Email, retrieval represents the Email of above-mentioned password.
Information processor the most according to claim 1, it is characterised in that be also equipped with:
Password entry unit, accepts for entering file additional described Email from user The input of the password of row deciphering;And
Decryption unit, uses by the password of described password entry unit input, enters described file Row deciphering.
Information processor the most according to claim 1, it is characterised in that: described retrieval Unit retrieval with by described reading mail select accept unit accepted select Email send out Send source and the identical transmission source of sending destination and the Email of sending destination.
4. an information processor, stores Email, possesses:
Reading mail selects to accept unit, accepts the choosing of the Email of reading object from user Select;
Retrieval unit, has accepted, being selected to accept unit by described reading mail, the electronics postal selected In the case of file additional in part is encrypted, retrieve from the described Email stored Describe the Email for the password that this document is decrypted;And
Decryption unit, by the mouth described in the Email that retrieved by described retrieval unit Order, is decrypted described appended document,
Described retrieval unit obtains and is being selected to accept unit and accepted selection by described reading mail Email the date of shipping time after send Email group, from being contained in this acquirement Email group Email according to the date of shipping time from arriving first rear ordered retrieval table Showing the Email of above-mentioned password, the Email notationally stating password is not included in this electronics In the case of mailing list, obtain the transmission day at the Email having accepted above-mentioned selection further The Email group that time phase was sent in the past, from the electricity of the Email group being contained in this acquirement In sub-mail, retrieval represents the Email of above-mentioned password.
Information processor the most according to claim 4, it is characterised in that be also equipped with:
Password describes mail and selects to accept unit, based on the retrieval carried out by described retrieval unit Result be retrieve multiple Email in the case of, from user accept use which electronics The selection of the password described in mail,
The use of described decryption unit is selected to accept unit by described password description mail and has accepted choosing The password described in the Email selected, is decrypted described appended document.
Information processor the most according to claim 4, it is characterised in that: described retrieval Unit retrieval with by described reading mail select accept unit accepted select Email send out Send source and the identical transmission source of sending destination and the Email of sending destination.
Information processor the most according to claim 4, it is characterised in that be also equipped with:
Password entry accepts unit, describes described mouth failing to be retrieved by described retrieval unit In the case of the Email of order, accept the input of password,
The use of described decryption unit is accepted unit by described password entry and has accepted the password of input, Described appended document is decrypted.
8. an information processor, possesses:
Receive unit, receive Email;
Unit extracted out in password, and describing in the Email received by described reception unit has mouth In the case of order, extract this password described out;
Memory element, by the transmission source of Email received by described reception unit and send out Send the combination of destination, and extracted out, by described password, the password pair that unit is extracted out from this Email Should get up to store;
Reading mail selects to accept unit, accepts the choosing of the Email of reading object from user Select, and
Decryption unit, has accepted, being selected to accept unit by described reading mail, the electronics postal selected In the case of file additional in part is encrypted, use with and this Email transmission source with And the combination combining identical transmission source and sending destination of sending destination is mapped and deposits The password of storage, is decrypted this document.
Information processor the most according to claim 8, it is characterised in that be also equipped with:
Password select accept unit, when in said memory cells with identical transmission source and send out The combination sending destination is mapped in the case of storage has multiple password, accepts use from user Which password and selection that appended document is decrypted,
The use of described decryption unit is selected to accept unit by described password and has accepted the password selected, Described appended document is decrypted.
Information processor the most according to claim 8, it is characterised in that be also equipped with:
Password registration accepts unit, accepts the registration of password,
The storage of described memory element is accepted unit by the registration of described password and has accepted the password of registration.
11. information processors according to claim 10, it is characterised in that:
The registration of described password accepts unit by accepting password, transmission source from user and sending mesh The input on ground and accept the registration of password,
Described memory element will be accepted, by the registration of described password, password and the transmission source that unit accepts And the combination of sending destination is mapped and stores.
12. information processors according to claim 11, it is characterised in that: described mouth Order registration accepts the password that unit stores in described decryption unit fails by described memory element In the case of carrying out the deciphering of appended document, accept the registration of password.
13. 1 kinds of information processing methods, are the letters in the information processor of storage Email Breath processing method, possesses:
Reading mail selects to accept operation, and the reading mail of described information processor selects to accept Unit accepts the selection of the Email of reading object from user;
Retrieval operation, has accepted, selecting to accept operation by described reading mail, the electronics selected In the case of file additional in mail is encrypted, the retrieval unit of described information processor From the above-mentioned Email stored, retrieval represents the password for being decrypted this document Email;And
Notice operation, described user is notified by institute by the notification unit of described information processor State the Email that retrieval operation retrieves,
Described retrieval operation obtains and is selecting to accept operation and accepted choosing by described reading mail The Email group sent after the date of shipping time of the Email selected, takes from being contained in this Email group Email according to the date of shipping time from arriving first rear ordered retrieval Representing the Email of above-mentioned password, the Email notationally stating password is not included in this electricity In the case of sub-mailing list, obtain the transmission at the Email having accepted above-mentioned selection further The Email group that sent before date-time, from the Email group being contained in this acquirement In Email, retrieval represents the Email of above-mentioned password.
14. information processing methods according to claim 13, it is characterised in that be also equipped with:
Password entry operation, the password entry unit of described information processor accepts use from user The input of the password that file additional in described Email is decrypted;And
Deciphering operation, the decryption unit of described information processor uses by described password entry The password of operation input, is decrypted described file.
15. information processing methods according to claim 13, it is characterised in that: described inspection Rope operation is retrieved and is selected to accept operation by described reading mail and accepted the Email selected Transmission source and the identical transmission source of sending destination and the Email of sending destination.
16. 1 kinds of information processing methods, are the letters in the information processor of storage Email Breath processing method, possesses:
Reading mail selects to accept operation, and the reading mail of described information processor selects to accept Unit accepts the selection of the Email of reading object from user;
Retrieval operation, has accepted, selecting to accept operation by described reading mail, the electronics selected In the case of file additional in mail is encrypted, the retrieval unit of described information processor From the above-mentioned Email stored, retrieval describes the password for being decrypted this document Email;And
Deciphering operation, the decryption unit of described information processor utilizes by described retrieval operation The password described in the Email retrieved, is decrypted described appended document,
Described retrieval operation obtains and is selecting to accept operation and accepted choosing by described reading mail The Email group sent after the date of shipping time of the Email selected, takes from being contained in this Email group Email according to the date of shipping time from arriving first rear ordered retrieval Representing the Email of above-mentioned password, the Email notationally stating password is not included in this electricity In the case of sub-mailing list, obtain the transmission at the Email having accepted above-mentioned selection further The Email group that sent before date-time, from the Email group being contained in this acquirement In Email, retrieval represents the Email of above-mentioned password.
17. information processing methods according to claim 16, it is characterised in that be also equipped with:
Password is described mail and selects to accept operation, in the retrieval carried out by described retrieval operation Result be retrieve multiple Email in the case of, the password of described information processor describes Mail selects to accept unit and accepts the choosing using the password described which Email from user Select,
The use of described deciphering operation selects to accept operation by described password description mail and accepts The password described in the Email selected, is decrypted described appended document.
18. information processing methods according to claim 16, it is characterised in that: described inspection Rope operation is retrieved and is selected to accept operation by described reading mail and accepted the Email selected Transmission source and the identical transmission source of sending destination and the Email of sending destination.
19. information processing methods according to claim 16, it is characterised in that be also equipped with:
Password entry accepts operation, fail to be retrieved by described retrieval operation describe above-mentioned In the case of the Email of password, the password entry of described information processor accepts unit and is subject to The input of reason password,
In described deciphering operation, use accepts operation by described password entry and has accepted input Password, described appended document is decrypted.
20. 1 kinds of information processing methods, are the information processing methods in information processor, tool Standby:
Receiving operation, the reception unit of described information processor receives Email;
Operation extracted out in password, describes and have in the Email received by described reception operation In the case of password, the password of described information processor is extracted unit out and is extracted the password of this description out;
Storage operation, the memory element of described information processor will be connect by described reception operation The transmission source of the Email received and the combination of sending destination and extracted out by described password Operation is mapped storage from the password that this Email is extracted out;
Reading mail selects to accept operation, and the reading mail of described information processor selects to accept Unit accepts the selection of the Email of reading object from user, and
Deciphering operation, has accepted, selecting to accept operation by described reading mail, the electronics selected In the case of file additional in mail is encrypted, the decryption unit of described information processor Use with and the identical transmission source of the combination of the transmission source of this Email and sending destination with And the combination of sending destination be mapped storage password, this document is decrypted.
21. information processing methods according to claim 20, it is characterised in that be also equipped with:
Password select accept operation, when in described memory element with identical transmission source and send out The combination sending destination is mapped in the case of storage has multiple password, described information processing apparatus The password put selects to accept unit and accepts which password of use from user and carry out appended document The selection of deciphering,
In described deciphering operation, use selects to accept operation by described password and has accepted selection Password, described appended document is decrypted.
22. information processing methods according to claim 20, it is characterised in that be also equipped with:
Password registration accepts operation, and the password registration of described information processor accepts unit and accepts The registration of password,
The storage of described storage operation accepts operation by the registration of described password and has accepted the mouth of registration Order.
23. information processing methods according to claim 22, it is characterised in that:
Described password registration accept in operation, by from user accept password, transmission source and The input of sending destination, accepts the registration of password,
Described storage operation will accept, by the registration of described password, password that unit accepted and sends out The combination sending source and sending destination is mapped and stores.
24. information processing methods according to claim 23, it is characterised in that: described mouth Order registration accepts operation and fails in described deciphering operation by storage in described storage operation In the case of password carries out the deciphering of appended document, accept the registration of password.
CN201210523657.7A 2011-12-08 2012-12-07 Information processor, information processing method Active CN103200074B (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JP2011-268933 2011-12-08
JP2011268933 2011-12-08
JP2012-088094 2012-04-09
JP2012088094 2012-04-09
JP2012-239910 2012-10-30
JP2012239910A JP5862890B2 (en) 2011-12-08 2012-10-31 Information processing apparatus, information processing method, and program

Publications (2)

Publication Number Publication Date
CN103200074A CN103200074A (en) 2013-07-10
CN103200074B true CN103200074B (en) 2016-12-21

Family

ID=48722438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210523657.7A Active CN103200074B (en) 2011-12-08 2012-12-07 Information processor, information processing method

Country Status (2)

Country Link
JP (1) JP5862890B2 (en)
CN (1) CN103200074B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6674296B2 (en) * 2016-03-17 2020-04-01 株式会社日本総合研究所 Encrypted mail processing device, encrypted mail processing method and program
JP7347518B2 (en) * 2019-09-18 2023-09-20 日本電気株式会社 E-mail decryption device, e-mail decryption method, and program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1457181A (en) * 2003-03-13 2003-11-19 北京无限立通通讯技术有限责任公司 Method for realizing mobile realtime e-mail delivery by mobile short-message and mobile IP network
JP2006309283A (en) * 2005-04-26 2006-11-09 Hitachi Ltd Electronic mail control system
JP2011071615A (en) * 2009-09-24 2011-04-07 Fujifilm Corp Device for determining password of encrypted file of electronic mail and electronic mail server, and operation control method for them

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002175251A (en) * 2000-12-07 2002-06-21 Olympus Optical Co Ltd Electronic mail processing device and recording medium having electronic mail processing program recorded therein
JP2007233982A (en) * 2006-02-27 2007-09-13 Fujio Morita Method of decrypting and storing encrypted e-mail from communication information record and system using the same
JP2009259090A (en) * 2008-04-18 2009-11-05 Internatl Business Mach Corp <Ibm> System, method, and program for inspecting e-mail

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1457181A (en) * 2003-03-13 2003-11-19 北京无限立通通讯技术有限责任公司 Method for realizing mobile realtime e-mail delivery by mobile short-message and mobile IP network
JP2006309283A (en) * 2005-04-26 2006-11-09 Hitachi Ltd Electronic mail control system
JP2011071615A (en) * 2009-09-24 2011-04-07 Fujifilm Corp Device for determining password of encrypted file of electronic mail and electronic mail server, and operation control method for them

Also Published As

Publication number Publication date
JP2013235555A (en) 2013-11-21
CN103200074A (en) 2013-07-10
JP5862890B2 (en) 2016-02-16

Similar Documents

Publication Publication Date Title
EP3149899B1 (en) Message attachment management
CN106104498B (en) Information processing system, data processing control method, program and recording medium
JP5369744B2 (en) Information collection system, terminal device, information collection program, terminal program
JP6406397B2 (en) Information processing apparatus, information processing method, and program
CN103609078A (en) Network equipment and E-mail request processing method
US9299063B2 (en) Receiver side indication of preview content for template emails
CN103200074B (en) Information processor, information processing method
JP2006180532A (en) E-mail system, managing device, program, and computer readable recording medium storing the program
US9244918B2 (en) Locating electronic documents
US8819147B2 (en) Electronic mail receiving apparatus
US9769101B2 (en) Centralized communications controller
JP2008186315A (en) Method for managing input and output of data
JP2010061476A (en) Electronic mail system, mail server, program for mail server, and information sharing method by use of e-mail
JP2018107486A (en) Information processing unit, control method, and program
JP5164083B2 (en) Relay processing device, control method therefor, and program
JP5170595B2 (en) Relay processing device, control method therefor, and program
JP2010244123A (en) Information bringing-out management system and method
JP5344654B2 (en) E-mail control device, control method thereof, and program
JP5796652B2 (en) E-mail audit apparatus, control method thereof, and program
JP5561832B2 (en) Information processing apparatus, information processing method, and program
JP5051788B2 (en) E-mail control device, control method thereof, and program
JP5971217B2 (en) Electronic data audit apparatus, control method and program for electronic data audit apparatus
JP2016071717A (en) Mail display program, mail display method, and mail display system
JP5565478B2 (en) Information processing apparatus, information processing method, and program
JP5334137B2 (en) Information processing apparatus, information processing method, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant