CN107147636A - E-mail transmission method and device - Google Patents

E-mail transmission method and device Download PDF

Info

Publication number
CN107147636A
CN107147636A CN201710305042.XA CN201710305042A CN107147636A CN 107147636 A CN107147636 A CN 107147636A CN 201710305042 A CN201710305042 A CN 201710305042A CN 107147636 A CN107147636 A CN 107147636A
Authority
CN
China
Prior art keywords
mail
module
private key
password
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710305042.XA
Other languages
Chinese (zh)
Inventor
杨春贺
欧金梁
刘道宽
徐肖肖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710305042.XA priority Critical patent/CN107147636A/en
Publication of CN107147636A publication Critical patent/CN107147636A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Abstract

The disclosure is directed to e-mail transmission method and device.This method includes:The public key of the recipient is obtained according to the addresses of items of mail of recipient and by mail server;Obtain the confidential information to be added in initial mail;The confidential information to be added is encrypted using the public key, targeted mails are obtained;The targeted mails are sent to the recipient according to the addresses of items of mail.The technical scheme improves the security of mail transmission, improves the convenience of user encryption mail.

Description

E-mail transmission method and device
Technical field
This disclosure relates to technical field of information processing, more particularly to e-mail transmission method and device.
Background technology
At present, mail is people's work and the sharp weapon exchanged in life, but sensitive information embodies in mail, Once mail is trapped or mailbox is broken, just it is easy to be utilized by criminal, pole is brought to our live and work Big puzzlement.
The content of the invention
The embodiment of the present disclosure provides e-mail transmission method and device.The technical scheme is as follows:
According to the first aspect of the embodiment of the present disclosure there is provided a kind of e-mail transmission method, methods described includes:
The public key of the recipient is obtained according to the addresses of items of mail of recipient and by mail server;
Obtain the confidential information to be added in initial mail;
The confidential information to be added is encrypted using the public key, targeted mails are obtained;
The targeted mails are sent to the recipient according to the addresses of items of mail.
At least one of optionally, the confidential information to be added obtained in initial mail, including following:
The information that the selection operation of input is indicated is defined as the confidential information to be added, and the selection operation is to be directed to institute State the selection operation for the information that initial mail includes;
The privacy information that the initial mail includes is defined as the confidential information to be added.
Optionally, methods described also includes:
Pass through at least one of following output prompting:
The targeted mails shown by targeted manner, the targeted manner includes:Font passes through target display parameters Encryption identification is shown in display, the targeted mails, the display parameters include at least one of following:Font parameter, font size ginseng Number, color parameter;
Play voice message;
Wherein, the prompting indicates that targeted mails include the information encrypted.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of e-mail transmission method, methods described includes:
The targeted mails that sender sends are received, the targeted mails include the confidential information to be added after encryption;
Obtain the private key of the recipient;
The confidential information to be added after the encryption is decrypted using the private key, initial mail is obtained.
Optionally, the confidential information to be added after the encryption is decrypted using the private key described, obtains initial postal Before part, methods described also includes:
Pass through at least one of following output prompting:
The targeted mails shown by targeted manner, the targeted manner includes:Font passes through target display parameters Encryption identification is shown in display, the targeted mails, the display parameters include at least one of following:Font parameter, font size ginseng Number, color parameter;
Play voice message;
Wherein, the prompting indicates that targeted mails include the information encrypted.
Optionally, it is described that the confidential information to be added after the encryption is decrypted using the private key, obtain initial postal Part, including:
Detect decryption oprerations;
In response to detecting decryption oprerations, display reminding inputs the dialog box of password;
The request of the private key of the password including input is sent to mail server, by the mail server according to The password is verified, after being verified, and the corresponding private key of the password is sent to the reception by the mail server Side;
Receive the private key.
Optionally, methods described also includes:
The initial mail is shown on current page;
When exiting current page, sent to the mail server and delete instruction so that the mail server is deleted The initial mail.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of e-mail transmission method, methods described includes:
Generate the corresponding public key of mailbox and private key;
Set up the corresponding relation of the public key and the addresses of items of mail of the mailbox;
According to the password of input, the corresponding relation of the private key and the password is set up;
When receiving the request of the public key acquisition including the addresses of items of mail, inquire about corresponding according to the addresses of items of mail Public key, the public key is sent to the first terminal for sending the public key request;
When receiving the request of the private key including the password, verified according to the password, will after being verified The corresponding private key of the password is sent to the second terminal for sending the private key request.
According to the fourth aspect of the embodiment of the present disclosure there is provided a kind of mail transmission device, including:
First acquisition module, the recipient is obtained for the addresses of items of mail according to recipient and by mail server Public key;
Second acquisition module, for obtaining the confidential information to be added in initial mail;
Encrypting module, what the public key for being obtained using first acquisition module was obtained to second acquisition module Confidential information to be added is encrypted, and obtains targeted mails;
Sending module, for sending what the encrypting module encryption was obtained to the recipient according to the addresses of items of mail Targeted mails.
At least one of optionally, the confidential information to be added obtained in initial mail, including following:
The information that the selection operation of input is indicated is defined as the confidential information to be added, and the selection operation is to be directed to institute State the selection operation for the information that initial mail includes;
The privacy information that the initial mail includes is defined as the confidential information to be added.
Optionally, described device also includes:Output module,
The output module, for being pointed out by least one of following output:
The targeted mails shown by targeted manner, the targeted manner includes:Font passes through target display parameters Encryption identification is shown in display, the targeted mails, the display parameters include at least one of following:Font parameter, font size ginseng Number, color parameter;
Play voice message;
Wherein, the prompting indicates that targeted mails include the information encrypted.
According to the 5th of the embodiment of the present disclosure the aspect there is provided a kind of mail transmission device, including:
Receiving module, the targeted mails for receiving sender's transmission, the targeted mails include to be encrypted after encryption Information;
Acquisition module, the private key for obtaining the recipient;
Deciphering module, the targeted mails that the private key for being obtained using the acquisition module is received to the receiving module In encryption after confidential information to be added be decrypted, obtain initial mail.
Optionally, described device also includes:Output module,
The output module, for the confidential information to be added after the encryption to be decrypted using the private key described, Obtain before initial mail, pointed out by least one of following output:
The targeted mails shown by targeted manner, the targeted manner includes:Font passes through target display parameters Encryption identification is shown in display, the targeted mails, the display parameters include at least one of following:Font parameter, font size ginseng Number, color parameter;
Play voice message;
Wherein, the prompting indicates that targeted mails include the information encrypted.
Optionally, the deciphering module includes:
Detection sub-module, for detecting decryption oprerations;
Display sub-module, for detecting decryption oprerations in response to the detection sub-module, display reminding input password Dialog box;
Sending submodule, for the private for the password that will be inputted including the dialog box shown from the display sub-module Key request is sent to mail server, is verified by the mail server according to the password, described after being verified The corresponding private key of the password is sent to the recipient by mail server;
Receiving submodule, for receiving the private key.
Optionally, described device also includes:
Display module, for showing the initial mail on current page;
Sending module, for when exiting current page, being sent to the mail server and deleting instruction so that be described Mail server deletes the initial mail.
According to the 6th of the embodiment of the present disclosure the aspect there is provided a kind of mail transmission device, methods described includes:
Generation module, for generating the corresponding public key of mailbox and private key;
First sets up module, pair of public key and the addresses of items of mail of the mailbox for setting up the generation module generation It should be related to;
Second sets up module, for the password according to input, sets up the private key and the password of the generation module generation Corresponding relation;
Enquiry module, for when receiving the request of the public key acquisition including the addresses of items of mail, according to the mail Corresponding public key is inquired about in location, and the public key is sent to the first terminal for sending the public key request;
Authentication module, for when receiving the request of the private key including the password, being verified according to the password;
Sending module, for after the authentication module is verified, the corresponding private key of the password to be sent into transmission The second terminal of the private key request.
According to the 7th of the embodiment of the present disclosure the aspect there is provided a kind of mail transmission device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The public key of the recipient is obtained according to the addresses of items of mail of recipient and by mail server;
Obtain the confidential information to be added in initial mail;
The confidential information to be added is encrypted using the public key, targeted mails are obtained;
The targeted mails are sent to the recipient according to the addresses of items of mail.
According to the eighth aspect of the embodiment of the present disclosure there is provided a kind of mail transmission device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The targeted mails that sender sends are received, the targeted mails include the confidential information to be added after encryption;
Obtain the private key of the recipient;
The confidential information to be added after the encryption is decrypted using the private key, initial mail is obtained.
According to the 9th of the embodiment of the present disclosure the aspect there is provided a kind of mail transmission device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Generate the corresponding public key of mailbox and private key;
Set up the corresponding relation of the public key and the addresses of items of mail of the mailbox;
According to the password of input, the corresponding relation of the private key and the password is set up;
When receiving the request of the public key acquisition including the addresses of items of mail, inquire about corresponding according to the addresses of items of mail Public key, the public key is sent to the first terminal for sending the public key request;
When receiving the request of the private key including the password, verified according to the password, will after being verified The corresponding private key of the password is sent to the second terminal for sending the private key request.
According to the tenth of the embodiment of the present disclosure the aspect there is provided a kind of computer-readable recording medium, calculating is stored thereon with Machine is instructed, above-mentioned e-mail transmission method for e-mail sending terminal is realized in instruction when being executed by processor the step of.
According to the tenth one side of the embodiment of the present disclosure there is provided a kind of computer-readable recording medium, meter is stored thereon with Calculation machine is instructed, above-mentioned e-mail transmission method for mail reception side's terminal is realized in instruction when being executed by processor the step of.
According to the 12nd of the embodiment of the present disclosure the aspect there is provided a kind of computer-readable recording medium, meter is stored thereon with Calculation machine is instructed, above-mentioned e-mail transmission method for mail server side is realized in instruction when being executed by processor the step of.
The technical scheme provided by this disclosed embodiment can include the following benefits:
In the present embodiment, the confidential information to be added in mail is encrypted by using recipient's mailbox corresponding public key, Even if mail is intercepted and captured by other people, other people also have no idea to decrypt the encrypted content in mail, improve the security of mail transmission. Further, since sender can directly obtain the public key of recipient's mailbox from mail server, mail transmission/reception both sides are without voluntarily Consult the key message such as mail key and maintenance key, user carries out email encryption and more facilitated, and the upgrading of follow-up mailbox It is also more convenient with safeguarding.
In another embodiment, when user think oneself input content be sensitive information, can be by this partial content It is selected to be encrypted as confidential information to be added using the corresponding public key of recipient's mailbox, or, can also be by presetting Rule automatically identify sensitive information in mail.So, only email section content is encrypted, rather than to whole envelope Mail is all encrypted, and not only protects the privacy information of user, and, it is to avoid due to whole envelope email encryption, recipient needs The content of the mail is just will appreciate that after whole envelope mail is decrypted, efficiency and operation that user obtains Mail Contents is improved Convenience.
In another embodiment, when sending targeted mails to recipient, output points out to remind recipient's target postal Part includes the information encrypted.It is easy to recipient to understand Mail Contents, recipient in time, rapidly can be known in mail Including encrypted content, improve user and obtain the efficiency of Mail Contents and the convenience of operation.
In another embodiment, recipient is encrypted by obtaining private key from mail server in decrypting targeted mails Information, even if mail is intercepted and captured by other people, other people also have no idea to decrypt the encrypted content in mail, improve the peace of mail transmission Quan Xing.Further, since sender can directly obtain the public key of recipient's mailbox from mail server, mail transmission/reception both sides without The key messages such as mail key and maintenance key need to voluntarily be consulted, user carries out email encryption and more facilitated, and follow-up mailbox Upgrading and safeguard it is also more convenient.
In another embodiment, when recipient receives targeted mails, output points out to remind in recipient's targeted mails Including the information encrypted.It is easy to recipient to understand Mail Contents, recipient in time, rapidly can know that mail includes Encrypted content, improves user and obtains the efficiency of Mail Contents and the convenience of operation.
In another embodiment, recipient user can by password from mail server acquisition to decrypt target The private key of encrypted content in mail.So, even if mail is intercepted and captured by other people, other people also have no idea to decrypt adding in mail Close content.Further, since sender can directly obtain the public key of recipient's mailbox from mail server, without both sides oneself The key messages such as maintenance key, are easy to the upgrading and maintenance of follow-up mailbox, strong operability.
In another embodiment, after recipient user's browsed privacy enhanced mail, send and delete to mail server It will not be stored when instruction so that mail server deletes initial mail, so, Mail Contents after decryption in mailing system , further increase the security of user sensitive information.
In another embodiment, mail server is automatically according to subscriber mailbox address and the password maintenance subscriber mailbox Corresponding public key and private key, when other people are to user hair mail, can obtain the public key for privacy enhanced mail from server, should When user decrypts mail, also the private key for decryption is obtained from mail server.Mail transmission/reception both sides are without voluntarily consulting mail The key message such as key and maintenance key, user carries out email encryption and more facilitated, and the upgrading and maintenance of follow-up mailbox It is more convenient.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the reality for meeting the disclosure Apply example, and be used for together with specification the principle of explaining the disclosure.
Fig. 1 is a kind of flow chart of e-mail transmission method according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment.
Fig. 3 is the schematic diagram of the targeted mails according to an exemplary embodiment.
Fig. 4 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment.
Fig. 5 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment.
Fig. 6 a are the mail display interface schematic diagrames according to another exemplary embodiment.
Fig. 6 b are the mail display interface schematic diagrames according to another exemplary embodiment.
Fig. 7 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment.
Fig. 8 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment.
Fig. 9 is a kind of block diagram of mail transmission device according to an exemplary embodiment.
Figure 10 is a kind of block diagram of mail transmission device according to an exemplary embodiment.
Figure 11 is the block diagram of the second acquisition module according to an exemplary embodiment.
Figure 12 is the block diagram of the output module according to an exemplary embodiment.
Figure 13 is a kind of block diagram of mail transmission device according to an exemplary embodiment.
Figure 14 is the block diagram of the output module according to an exemplary embodiment.
Figure 15 is the block diagram of the acquisition module according to an exemplary embodiment.
Figure 16 is a kind of block diagram of mail transmission device according to another exemplary embodiment.
Figure 17 is a kind of block diagram for mail transmission device according to an exemplary embodiment.
Figure 18 is a kind of block diagram of device for mail transmission according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary is implemented Embodiment described in example does not represent all embodiments consistent with the disclosure.On the contrary, they are only and such as institute The example of consistent apparatus and method in terms of some of be described in detail in the attached claims, disclosure.
The technical scheme that the embodiment of the present disclosure is provided, is related to tripartite:Mail server, sender and recipient, wherein, Sender obtains recipient's when sending mail to recipient according to the addresses of items of mail of recipient and by mail server Public key, is encrypted to confidential information to be added in mail using the public key, the mail after encryption is sent into recipient.To mail Middle sensitive information is encrypted, even if mail is intercepted and captured by third party, also has no idea to decrypt the encrypted content in mail, improves The security of sensitive information in mail.
Sender can be mobile phone, and computer, digital broadcast terminal, messaging devices, game console is put down Board device, Medical Devices, body-building equipment, any equipment with e-mail transmitting function such as personal digital assistant.Recipient can be with It is mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for Body equipment, any equipment with mail reception function such as personal digital assistant.
Fig. 1 is a kind of flow chart of e-mail transmission method according to an exemplary embodiment, as shown in figure 1, mail Transmission method is used in mail server, comprises the following steps S11-S15:
In step s 11, the corresponding public key of generation mailbox and private key;
In step s 12, the corresponding relation of the addresses of items of mail of public key and mailbox is set up;
In step s 13, according to the password of input, the corresponding relation of private key and password is set up;
In step S14, when receiving the request of the public key acquisition including addresses of items of mail, according to addresses of items of mail inquiry pair The public key answered, public key is sent to the first terminal for sending public key request;
In step S15, when receiving the request of the private key including password, verified, be verified according to password Afterwards, the corresponding private key of password is sent to the second terminal for sending private key request.
When user's A registration mailbox, mail server generates a pair of public keys and private key for user A mailbox.Wherein, postal Part server, which does public key and addresses of items of mail, to be mapped, and the first terminal that any user B is used sends out postal to user A addresses of items of mail During part, user A public key can be taken.Mail server, which makees the password of private key and mailbox, to be mapped, user A use Two terminals can take private key by the password of oneself.
In addition, mail server can also generate the corresponding security token of mailbox, i.e. user A when decrypting mail, pass through Password and safety verification code can just get the private key for decryption.Mail server is when the peace for receiving second terminal transmission When full identifying code obtains request, verified, after being verified, generated according to security token according to password and safety verification code Safety verification code, and it is sent to second terminal.
In addition, if user A wants the password of change mailbox, mail server meeting basis receives change password request, The corresponding public key of mailbox and private key are updated, or updates the corresponding security token of mailbox simultaneously.
As can be seen here, in the present embodiment, mail server is automatically according to subscriber mailbox address and password maintenance user's postal The corresponding public key of case and private key, when other people are to user hair mail, can obtain the public key for privacy enhanced mail from server, When the user decrypts mail, also the private key for decryption is obtained from mail server.Mail transmission/reception both sides are without voluntarily consulting postal The key message such as part key and maintenance key, user carries out email encryption and more facilitated, and the upgrading and maintenance of follow-up mailbox Also it is more convenient.
Fig. 2 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment, as shown in Fig. 1, postal Part transmission method is used in sending side terminal, comprises the following steps S21-S24:
In the step s 21, the public key of recipient is obtained according to the addresses of items of mail of recipient and by mail server;
In step S22, the confidential information to be added in initial mail is obtained;
In step S23, treat encryption information using public key and be encrypted, obtain targeted mails;
In step s 24, targeted mails are sent to recipient according to addresses of items of mail.
In the present embodiment, the confidential information to be added in mail is encrypted by using recipient's mailbox corresponding public key, Even if mail is intercepted and captured by other people, other people also have no idea to decrypt the encrypted content in mail, improve the security of mail transmission. Further, since sender can directly obtain the public key of recipient's mailbox from mail server, mail transmission/reception both sides are without voluntarily Consult the key message such as mail key and maintenance key, user carries out email encryption and more facilitated, and the upgrading of follow-up mailbox It is also more convenient with safeguarding.
Above-mentioned steps S21 can be realized by following steps:
In step S21a, public key acquisition request is sent to mail server, public key acquisition request includes addresses of items of mail, Public key acquisition request indicates that mail server inquires about public key according to addresses of items of mail and public key is sent into sender;
In step S21b, the public key that receipt mail server is sent.
Because mail server is stored with the corresponding public key of recipient's addresses of items of mail, sender can be from mail server The public key is got, and using the public key to the confidential information to be added in mail, such as sensitive information is encrypted, and by after encryption Targeted mails be sent to recipient.
At least one of in another embodiment, the confidential information to be added in step S22, the initial mail of acquisition, including following:
The information that the selection operation of input is indicated is defined as confidential information to be added, and selection operation is to be directed to initial mail bag The selection operation of the information included;
The privacy information that initial mail includes is defined as confidential information to be added.
In the present embodiment, when user think oneself input content be sensitive information, such as Bank Account Number, password, identity card Number etc., can be selected as confidential information to be added using this partial content, is added using the corresponding public key of recipient's mailbox It is close.Or, the sensitive information in mail, such as digit of automatic identification 11 can also be automatically identified by rule set in advance Word is cell-phone number, and the bit digital of automatic identification 12 is bank's card number, and the bit digital of automatic identification 18 is ID card No. etc., is pointed out User is encrypted.So, only email section content is encrypted, rather than whole envelope mail is all encrypted, not only protected The privacy information of user has been protected, and, it is to avoid due to whole envelope email encryption, recipient is needed after whole envelope mail is decrypted The content of the mail is just will appreciate that, user is improved and obtains the efficiency of Mail Contents and the convenience of operation.
In another embodiment, this method also includes:Pass through at least one of following output prompting:
The targeted mails shown by targeted manner, targeted manner includes:Font is shown by target display parameters, mesh Encryption identification is shown in mark mail, display parameters include at least one of following:Font parameter, character type, color parameter;
Play voice message;
Wherein, prompting indicates that targeted mails include the information encrypted.
Fig. 3 is the schematic diagram of the targeted mails according to an exemplary embodiment, as shown in figure 3, in targeted mails In, content to be encrypted can be replaced with encryption identification 31 " the contents of the section has been encrypted, and please be decrypted and be checked ".
Wherein, if output prompting can be selected to set by user.In addition, the mode of output prompting can be write from memory by system Recognize setting, the mode of prompting can also be set by user oneself.
In the present embodiment, when sending targeted mails to recipient, output prompting is wrapped with reminding in recipient's targeted mails Include the information encrypted.It is easy to recipient to understand Mail Contents, recipient can in time, rapidly know that mail includes adding Close content, improves user and obtains the efficiency of Mail Contents and the convenience of operation.
Fig. 4 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment, as shown in Fig. 4, postal Part transmission method is used in receiving side terminal, comprises the following steps:
In step S41, the targeted mails that sender sends are received, targeted mails include the confidential information to be added after encryption;
In step S42, the private key of recipient is obtained;
In step S43, it is decrypted using the confidential information to be added after private key pair encryption, obtains initial mail.
In the present embodiment, recipient from mail server by obtaining private key come encryption information in decrypting targeted mails, i.e., Mail is set to be intercepted and captured by other people, other people also have no idea to decrypt the encrypted content in mail, improve the security of mail transmission.Separately Outside, because sender can directly obtain the public key of recipient's mailbox from mail server, mail transmission/reception both sides are without voluntarily assisting The key message such as business's mail key and maintenance key, user carries out email encryption and more facilitated, and the upgrading of follow-up mailbox and It is also more convenient to safeguard.
In another embodiment, before step S43, this method also includes:
Pass through at least one of following output prompting:
The targeted mails shown by targeted manner, targeted manner includes:Font is shown by target display parameters, mesh Encryption identification is shown in mark mail, display parameters include at least one of following:Font parameter, character type, color parameter;
Play voice message;
Wherein, prompting indicates that targeted mails include the information encrypted.
In the present embodiment, when recipient receives targeted mails, output points out to remind recipient that targeted mails are included The information of encryption.It is easy to recipient to understand Mail Contents, recipient can in time, rapidly know that mail is included in encryption Hold, improve user and obtain the efficiency of Mail Contents and the convenience of operation.
Fig. 5 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment, as shown in Fig. 5, In another embodiment, obtaining the private key of recipient includes:
In step s 51, decryption oprerations are detected;
In step S52, in response to detecting decryption oprerations, display reminding inputs the dialog box of password;
In step S53, the private key request of the password including input is sent to mail server, by mail server Verified according to password, after being verified, the corresponding private key of password is sent to recipient by mail server;
In step S54, private key is received.
Fig. 6 a are the mail display interface schematic diagrames according to another exemplary embodiment, as shown in Figure 6 a, work as detection Decryption oprerations are performed to user, input password is pointed out user in pop-up dialogue box 61 on interface.
Fig. 6 b are the mail display interface schematic diagrames according to another exemplary embodiment, and as shown in Figure 6 b, user is defeated Enter after password, the encryption part in targeted mails is decrypted, initial mail is obtained.
In the present embodiment, recipient user can by password from mail server acquisition to decrypt targeted mails in Encrypted content private key.So, even if mail is intercepted and captured by other people, other people also have no idea to decrypt the encrypted content in mail. Further, since sender can directly obtain the public key of recipient's mailbox from mail server, without both sides oneself maintenance key Deng key message, it is easy to the upgrading and maintenance of follow-up mailbox, strong operability.
In another embodiment, mail server can also issue security token, recipient user for the mailbox of recipient When obtaining private key, except needing to input password, in addition it is also necessary to input safety verification code.Obtaining the private key of recipient includes:
In step S42a, when getting the selected operation to decryption option, display reminding input password and safety are tested Demonstrate,prove the dialog box of code;
In step S42b, the private key request of the password including input and safety verification code is sent to mail server, Verified that after being verified, mail server is by the corresponding private of password according to password and safety verification code by mail server Key is sent to recipient;
In step S42c, private key is received.
In the present embodiment, private key is obtained by password and safety verification code, even if the password leakage of recipient user, peace Full identifying code can be as last line of defense, to ensure the safety of user sensitive information.
Fig. 7 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment, as shown in fig. 7, In another embodiment, this method also includes:
In step S71, initial mail is shown on current page;
In step S72, when exiting current page, sent to mail server and delete instruction so that mail server Delete initial mail.
In the present embodiment, after recipient user's browsed privacy enhanced mail, sent to mail server and delete instruction, So that mail server deletes initial mail, so, it will not store in mailing system, enter during Mail Contents after decryption One step improves the security of user sensitive information.
The process of mail is sent to user A below in conjunction with user B, the embodiment of the present application is specifically described.User B Using terminal b, user's A using terminals a.
Fig. 8 is a kind of flow chart of e-mail transmission method according to another exemplary embodiment, as shown in figure 8, this Application e-mail transmission method comprises the following steps:
In step S801, terminal b sends public key acquisition request according to user A addresses of items of mail to mail server;
In step S802, the corresponding public key of user A addresses of items of mail is sent to terminal b by mail server;
In step S803, the confidential information to be added in initial mail is encrypted using the public key by terminal b, obtains mesh Mark mail;
In step S804, targeted mails are sent to user A mailbox by terminal b;
In step S805, terminal a is received after the targeted mails of terminal b transmissions, detects decryption oprerations;
In step S806, terminal a detects decryption oprerations, and display reminding inputs the dialog box of password;
In step S807, the private key request of the password including input is sent to mail server by terminal a;
In step S808, mail server is verified according to password, after being verified, by the corresponding private key of password It is sent to terminal a;
In step S809, terminal a is decrypted using the confidential information to be added after private key pair encryption, obtains initial mail.
In the present embodiment, mail server is corresponding automatically according to subscriber mailbox address and the password maintenance subscriber mailbox Public key and private key, when other people are to user hair mail, the public key for privacy enhanced mail can be obtained from server, passes through the public affairs Confidential information to be added in mail is encrypted key, even if mail is intercepted and captured by other people, and other people also have no idea in decryption mail Encrypted content.When the user decrypts mail, the private key for decryption also is obtained from mail server, the peace of mail transmission is improved Quan Xing.Mail transmission/reception both sides carry out email encryption more without voluntarily consulting the key message such as mail key and maintenance key, user Plus conveniently, and the upgrading and maintenance of follow-up mailbox are also more convenient.
Following is disclosure device embodiment, can be used for performing method of disclosure embodiment.
Fig. 9 is a kind of block diagram of mail transmission device according to an exemplary embodiment, and the device can be by soft Being implemented in combination with for part, hardware or both is some or all of as electronic equipment.As shown in figure 9, the mail transmission device For in mail server, including:
Generation module 91, is configurable to generate the corresponding public key of mailbox and private key;
First sets up module 92, is configured as setting up pair of the public key of the generation of generation module 91 and the addresses of items of mail of mailbox It should be related to;
Second sets up module 93, is configured as the password according to input, sets up the private key and password of the generation of generation module 91 Corresponding relation;
Enquiry module 94, when being configured as receiving the public key acquisition request including addresses of items of mail, according to addresses of items of mail Corresponding public key is inquired about, public key is sent to the first terminal for sending public key request;
Authentication module 95, when being configured as receiving the private key request including password, is verified according to password;
Sending module 96, is configured as after authentication module 95 is verified, and the corresponding private key of password is sent into transmission The second terminal of private key request.
When user's A registration mailbox, mail server generates a pair of public keys and private key for user A mailbox.Wherein, postal Part server, which does public key and addresses of items of mail, to be mapped, and the first terminal that any user B is used sends out postal to user A addresses of items of mail During part, user A public key can be taken.Mail server, which makees the password of private key and mailbox, to be mapped, user A use Two terminals can take private key by the password of oneself.
In addition, mail server can also generate the corresponding security token of mailbox, i.e. user A when decrypting mail, pass through Password and safety verification code can just get the private key for decryption.Mail server is when the peace for receiving second terminal transmission When full identifying code obtains request, verified, after being verified, generated according to security token according to password and safety verification code Safety verification code, and it is sent to second terminal.
In addition, if user A wants the password of change mailbox, mail server meeting basis receives change password request, The corresponding public key of mailbox and private key are updated, or updates the corresponding security token of mailbox simultaneously.
As can be seen here, in the present embodiment, mail server is automatically according to subscriber mailbox address and password maintenance user's postal The corresponding public key of case and private key, when other people are to user hair mail, can obtain the public key for privacy enhanced mail from server, When the user decrypts mail, also the private key for decryption is obtained from mail server.Mail transmission/reception both sides are without voluntarily consulting postal The key message such as part key and maintenance key, user carries out email encryption and more facilitated, and the upgrading and maintenance of follow-up mailbox Also it is more convenient.
Figure 10 is a kind of block diagram of mail transmission device according to an exemplary embodiment, and the device can pass through Being implemented in combination with for software, hardware or both is some or all of as electronic equipment.As shown in Figure 10, the mail transmission Device is used in sending side terminal, including:
First acquisition module 101, is configured as the addresses of items of mail according to recipient and obtains by mail server to receive The public key of side;
Second acquisition module 102, is configured as obtaining the confidential information to be added in initial mail;
Encrypting module 103, the public key for being configured to, with the acquisition of the first acquisition module 101 is obtained to the second acquisition module 102 The confidential information to be added taken is encrypted, and obtains targeted mails;
Sending module 104, is configured as sending the mesh that the encryption of encrypting module 103 is obtained to recipient according to addresses of items of mail Mark mail.
In the present embodiment, the confidential information to be added in mail is encrypted by using recipient's mailbox corresponding public key, Even if mail is intercepted and captured by other people, other people also have no idea to decrypt the encrypted content in mail, improve the security of mail transmission. Further, since sender can directly obtain the public key of recipient's mailbox from mail server, mail transmission/reception both sides are without voluntarily Consult the key message such as mail key and maintenance key, user carries out email encryption and more facilitated, and the upgrading of follow-up mailbox It is also more convenient with safeguarding.
Figure 11 is the block diagram of the second acquisition module according to an exemplary embodiment, as shown in figure 11, in another reality Apply in example, the second acquisition module 102 includes at least one following submodule.
First determination sub-module 111, is configured as the information of the selection operation instruction of input being defined as secret letter to be added Breath, selection operation is the selection operation of the information included for initial mail;
Second determination sub-module 112, is configured as the privacy information that initial mail includes being defined as secret letter to be added Breath.
In the present embodiment, when user think oneself input content be sensitive information, such as Bank Account Number, password, identity card Number etc., can be selected as confidential information to be added using this partial content, is added using the corresponding public key of recipient's mailbox It is close.Or, the sensitive information in mail, such as digit of automatic identification 11 can also be automatically identified by rule set in advance Word is cell-phone number, and the bit digital of automatic identification 12 is bank's card number, and the bit digital of automatic identification 18 is ID card No. etc., is pointed out User is encrypted.So, only email section content is encrypted, rather than whole envelope mail is all encrypted, not only protected The privacy information of user has been protected, and, it is to avoid due to whole envelope email encryption, recipient is needed after whole envelope mail is decrypted The content of the mail is just will appreciate that, user is improved and obtains the efficiency of Mail Contents and the convenience of operation.
Figure 12 is the block diagram of the output module according to an exemplary embodiment, as shown in figure 12, in another embodiment In, the device also includes:Output module 105,
Output module 105 includes at least one following submodule to export prompting, wherein, point out to indicate in targeted mails Including the information encrypted,
Display sub-module 121, is configured as the targeted mails shown by targeted manner, and targeted manner includes:Font is led to Cross that target display parameters show, encryption identification is shown in targeted mails, display parameters include at least one of following:Font parameter, Character type, color parameter;
Submodule 122 is played, is configured as playing voice message.
Fig. 3 is the schematic diagram of the targeted mails according to an exemplary embodiment, as shown in figure 3, in targeted mails In, content to be encrypted can be replaced with encryption identification 31 " the contents of the section has been encrypted, and please be decrypted and be checked ".
Wherein, if output prompting can be selected to set by user.In addition, the mode of output prompting can be write from memory by system Recognize setting, the mode of prompting can also be set by user oneself.
In the present embodiment, when sending targeted mails to recipient, output prompting is wrapped with reminding in recipient's targeted mails Include the information encrypted.It is easy to recipient to understand Mail Contents, recipient can in time, rapidly know that mail includes adding Close content, improves user and obtains the efficiency of Mail Contents and the convenience of operation.
Figure 13 is a kind of block diagram of mail transmission device according to an exemplary embodiment, and the device can pass through Being implemented in combination with for software, hardware or both is some or all of as electronic equipment.As shown in figure 13, the mail transmission Device is used in receiving side terminal, including:
Receiving module 131, is configured as receiving the targeted mails that sender sends, targeted mails include treating after encryption Encryption information;
Acquisition module 132, is configured as obtaining the private key of recipient;
Deciphering module 133, is configured to, with the target that the private key of the acquisition of acquisition module 132 is received to receiving module 131 Confidential information to be added after encryption in mail is decrypted, and obtains initial mail.
In the present embodiment, recipient from mail server by obtaining private key come encryption information in decrypting targeted mails, i.e., Mail is set to be intercepted and captured by other people, other people also have no idea to decrypt the encrypted content in mail, improve the security of mail transmission.Separately Outside, because sender can directly obtain the public key of recipient's mailbox from mail server, mail transmission/reception both sides are without voluntarily assisting The key message such as business's mail key and maintenance key, user carries out email encryption and more facilitated, and the upgrading of follow-up mailbox and It is also more convenient to safeguard.
Figure 14 is the block diagram of the output module according to an exemplary embodiment, as shown in figure 14, and the device is also wrapped Include:Output module 134, output module 134 includes at least one following submodule, is configured as after using private key pair encryption Confidential information to be added be decrypted, before obtaining initial mail, pass through at least one of following output prompting:
Display sub-module 141, is configured as the targeted mails shown by targeted manner, and targeted manner includes:Font is led to Cross that target display parameters show, encryption identification is shown in targeted mails, display parameters include at least one of following:Font parameter, Character type, color parameter;
Submodule 142 is played, is configured as playing voice message;
Wherein, prompting indicates that targeted mails include the information encrypted.
In the present embodiment, when recipient receives targeted mails, output points out to remind recipient that targeted mails are included The information of encryption.It is easy to recipient to understand Mail Contents, recipient can in time, rapidly know that mail is included in encryption Hold, improve user and obtain the efficiency of Mail Contents and the convenience of operation.
Figure 15 is the block diagram of the acquisition module according to an exemplary embodiment, as shown in figure 15, acquisition module 132 Including:
Detection sub-module 151, is configured as detecting decryption oprerations;
Display sub-module 152, is configured to respond to detection sub-module 151 and detects decryption oprerations, display reminding input The dialog box of password;
Sending submodule 153, is configured as including the password of dialog box input that shows from display sub-module 152 Private key request is sent to mail server, is verified by mail server according to password, after being verified, mail server The corresponding private key of password is sent to recipient;
Receiving submodule 154, is configured as receiving private key.
Fig. 6 a are the mail display interface schematic diagrames according to another exemplary embodiment, as shown in Figure 6 a, work as detection Decryption oprerations are performed to user, input password is pointed out user in pop-up dialogue box 61 on interface.
Fig. 6 b are the mail display interface schematic diagrames according to another exemplary embodiment, and as shown in Figure 6 b, user is defeated Enter after password, the encryption part in targeted mails is decrypted, initial mail is obtained.
In the present embodiment, recipient user can by password from mail server acquisition to decrypt targeted mails in Encrypted content private key.So, even if mail is intercepted and captured by other people, other people also have no idea to decrypt the encrypted content in mail. Further, since sender can directly obtain the public key of recipient's mailbox from mail server, without both sides oneself maintenance key Deng key message, it is easy to the upgrading and maintenance of follow-up mailbox, strong operability.
In another embodiment, mail server can also issue security token, recipient user for the mailbox of recipient When obtaining private key, except needing to input password, in addition it is also necessary to input safety verification code.
Display sub-module 152, when being configured as getting the selected operation to decryption option, display reminding input is close The dialog box of code and safety verification code;
Sending submodule 152, is configured as the private key request of the password including input and safety verification code being sent to postal Part server, is verified that after being verified, mail server will be close by mail server according to password and safety verification code The corresponding private key of code is sent to recipient.
In the present embodiment, private key is obtained by password and safety verification code, even if the password leakage of recipient user, peace Full identifying code can be as last line of defense, to ensure the safety of user sensitive information.
Figure 16 is a kind of block diagram of mail transmission device according to another exemplary embodiment, as shown in figure 16, should Device also includes:
Display module 135, is configured as showing initial mail on current page;
Sending module 136, when being configured as exiting current page, sends to mail server and deletes instruction so that postal Part server deletes initial mail.
In the present embodiment, after recipient user's browsed privacy enhanced mail, sent to mail server and delete instruction, So that mail server deletes initial mail, so, it will not store in mailing system, enter during Mail Contents after decryption One step improves the security of user sensitive information.
In the application, sending side terminal, receiving side terminal and mail server constitute mail transmission system.Pass through The mail transmission system, automatically according to subscriber mailbox address and the corresponding public key of the password maintenance subscriber mailbox and private key, other When people is to user hair mail, the public key for privacy enhanced mail can be obtained from server, by the public key to be added in mail Confidential information is encrypted, even if mail is intercepted and captured by other people, and other people also have no idea to decrypt the encrypted content in mail.The user When decrypting mail, the private key for decryption also is obtained from mail server, the security of mail transmission is improved.Mail transmission/reception is double Fang Wuxu voluntarily consults the key messages such as mail key and maintenance key, and user carries out email encryption and more facilitated, and after The upgrading and maintenance of continuous mailbox are also more convenient.
The disclosure also provides a kind of mail transmission device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, processor is configured as:
The public key of the recipient is obtained according to the addresses of items of mail of recipient and by mail server;
Obtain the confidential information to be added in initial mail;
The confidential information to be added is encrypted using the public key, targeted mails are obtained;
The targeted mails are sent to the recipient according to the addresses of items of mail.
The disclosure also provides a kind of mail transmission device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The targeted mails that sender sends are received, the targeted mails include the confidential information to be added after encryption;
Obtain the private key of the recipient;
The confidential information to be added after the encryption is decrypted using the private key, initial mail is obtained.
The disclosure also provides a kind of mail transmission device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Generate the corresponding public key of mailbox and private key;
Set up the corresponding relation of the public key and the addresses of items of mail of the mailbox;
According to the password of input, the corresponding relation of the private key and the password is set up;
When receiving the request of the public key acquisition including the addresses of items of mail, inquire about corresponding according to the addresses of items of mail Public key, the public key is sent to the first terminal for sending the public key request;
When receiving the request of the private key including the password, verified according to the password, will after being verified The corresponding private key of the password is sent to the second terminal for sending the private key request.
Figure 17 is a kind of block diagram for mail transmission device according to an exemplary embodiment, and the device is applicable In terminal device.For example, device 1700 can be video camera, and sound pick-up outfit, mobile phone, computer, digital broadcast terminal, Messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Device 1700 can include following one or more assemblies:Processing assembly 1702, memory 1704, power supply module 1706, multimedia groupware 1708, audio-frequency assembly 1710, the interface 1712 of input/output (I/O), sensor cluster 1714, with And communication component 1716.
The integrated operation of the usual control device 1700 of processing assembly 1702, such as with display, call, data communication, The camera operation operation associated with record operation.Processing assembly 1702 can include one or more processors 1720 to hold Row instruction, to complete all or part of step of above-mentioned method.In addition, processing assembly 1702 can include it is one or more Module, is easy to the interaction between processing assembly 1702 and other assemblies.For example, processing assembly 1702 can include multimedia mould Block, to facilitate the interaction between multimedia groupware 1708 and processing assembly 1702.
Memory 1704 is configured as storing various types of data supporting the operation in device 1700.These data Example include the instruction of any application program or method for being used to operate on device 1700, contact data, telephone directory number According to, message, picture, video etc..Memory 1704 can by any kind of volatibility or non-volatile memory device or it Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) can Erasable programmable read-only memory (EPROM) (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic storage Device, flash memory, disk or CD.
Power supply module 1706 provides electric power for the various assemblies of device 1700.Power supply module 1706 can include power supply pipe Reason system, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 1700.
Multimedia groupware 1708 is included in the screen of one output interface of offer between described device 1700 and user. In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface Plate, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch Sensor is touched with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or cunning The border of action, but also the detection duration related to the touch or slide and pressure.In some embodiments In, multimedia groupware 1708 includes a front camera and/or rear camera.When device 1700 be in operator scheme, During such as screening-mode or video mode, front camera and/or rear camera can receive the multi-medium data of outside.Often Individual front camera and rear camera can be a fixed optical lens systems or with focal length and optical zoom energy Power.
Audio-frequency assembly 1710 is configured as output and/or input audio signal.For example, audio-frequency assembly 1710 includes one Microphone (MIC), when device 1700 is in operator scheme, when such as call model, logging mode and speech recognition mode, Mike Wind is configured as receiving external audio signal.The audio signal received can be further stored in memory 1704 or warp Sent by communication component 1716.In certain embodiments, audio-frequency assembly 1710 also includes a loudspeaker, for exporting audio Signal.
I/O interfaces 1712 are that interface, above-mentioned peripheral interface module are provided between processing assembly 1702 and peripheral interface module Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and Locking press button.
Sensor cluster 1714 includes one or more sensors, the state for providing various aspects for device 1700 Assess.For example, sensor cluster 1714 can detect opening/closed mode of device 1700, the relative positioning of component, example Component is the display and keypad of device 1700 as described, and sensor cluster 1714 can be with detection means 1700 or device The position change of 1700 1 components, the existence or non-existence that user contacts with device 1700, the orientation of device 1700 or acceleration/ The temperature change slowed down with device 1700.Sensor cluster 1714 can include proximity transducer, be configured to do not appointing The presence of object nearby is detected during what physical contact.Sensor cluster 1714 can also include optical sensor, such as CMOS or Ccd image sensor, for being used in imaging applications.In certain embodiments, the sensor cluster 1714 can also include Acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1716 is configured to facilitate the communication of wired or wireless way between device 1700 and other equipment. Device 1700 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an example Property embodiment in, communication component 1716 receives broadcast singal from external broadcasting management system or broadcast via broadcast channel Relevant information.In one exemplary embodiment, the communication component 1716 also includes near-field communication (NFC) module, to promote Junction service.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra-wide can be based in NFC module Band (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1700 can be by one or more application specific integrated circuits (ASIC), numeral Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 1704 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 1720 of device 1700.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, Floppy disk and optical data storage devices etc..
Figure 18 is a kind of block diagram of device for mail transmission according to an exemplary embodiment.For example, device 1900 may be provided in a server.Device 1900 includes processing assembly 1922, and it further comprises one or more processing Device, and as the memory resource representated by memory 1932, for store can by the execution of processing assembly 1922 instruction, Such as application program.The application program stored in memory 1932 can include it is one or more each correspond to The module of one group of instruction.In addition, processing assembly 1922 is configured as execute instruction, to perform the above method.
Device 1900 can also include the power management that a power supply module 1926 is configured as performs device 1900, one Individual wired or wireless network interface 1950 is configured as device 1900 being connected to network, and input and output (I/O) interface 1958.Device 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by device 1700 When managing device execution so that the method that device 1700 is able to carry out above-mentioned mail transmission, methods described includes:
The public key of the recipient is obtained according to the addresses of items of mail of recipient and by mail server;
Obtain the confidential information to be added in initial mail;
The confidential information to be added is encrypted using the public key, targeted mails are obtained;
The targeted mails are sent to the recipient according to the addresses of items of mail.
At least one of optionally, the confidential information to be added obtained in initial mail, including following:
The information that the selection operation of input is indicated is defined as the confidential information to be added, and the selection operation is to be directed to institute State the selection operation for the information that initial mail includes;
The privacy information that the initial mail includes is defined as the confidential information to be added.
Optionally, methods described also includes:
Pass through at least one of following output prompting:
The targeted mails shown by targeted manner, the targeted manner includes:Font passes through target display parameters Encryption identification is shown in display, the targeted mails, the display parameters include at least one of following:Font parameter, font size ginseng Number, color parameter;
Play voice message;
Wherein, the prompting indicates that targeted mails include the information encrypted.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by device 1700 When managing device execution so that the method that device 1700 is able to carry out above-mentioned mail transmission, methods described includes:
The targeted mails that sender sends are received, the targeted mails include the confidential information to be added after encryption;
Obtain the private key of the recipient;
The confidential information to be added after the encryption is decrypted using the private key, initial mail is obtained.
Optionally, the confidential information to be added after the encryption is decrypted using the private key described, obtains initial postal Before part, methods described also includes:
Pass through at least one of following output prompting:
The targeted mails shown by targeted manner, the targeted manner includes:Font passes through target display parameters Encryption identification is shown in display, the targeted mails, the display parameters include at least one of following:Font parameter, font size ginseng Number, color parameter;
Play voice message;
Wherein, the prompting indicates that targeted mails include the information encrypted.
Optionally, it is described that the confidential information to be added after the encryption is decrypted using the private key, obtain initial postal Part, including:
Detect decryption oprerations;
In response to detecting decryption oprerations, display reminding inputs the dialog box of password;
The request of the private key of the password including input is sent to mail server, by the mail server according to The password is verified, after being verified, and the corresponding private key of the password is sent to the reception by the mail server Side;
Receive the private key.
Optionally, methods described also includes:
The initial mail is shown on current page;
When exiting current page, sent to the mail server and delete instruction so that the mail server is deleted The initial mail.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by device 1900 When managing device execution so that the method that device 1900 is able to carry out above-mentioned mail transmission, methods described includes:
Generate the corresponding public key of mailbox and private key;
Set up the corresponding relation of the public key and the addresses of items of mail of the mailbox;
According to the password of input, the corresponding relation of the private key and the password is set up;
When receiving the request of the public key acquisition including the addresses of items of mail, inquire about corresponding according to the addresses of items of mail Public key, the public key is sent to the first terminal for sending the public key request;
When receiving the request of the private key including the password, verified according to the password, will after being verified The corresponding private key of the password is sent to the second terminal for sending the private key request.
Those skilled in the art will readily occur to the disclosure after considering specification and putting into practice disclosure disclosed herein Other embodiments.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes Or adaptations follow the disclosure general principle and including the disclosure it is undocumented in the art it is known often Know or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim point out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (22)

1. a kind of e-mail transmission method, it is characterised in that methods described includes:
The public key of the recipient is obtained according to the addresses of items of mail of recipient and by mail server;
Obtain the confidential information to be added in initial mail;
The confidential information to be added is encrypted using the public key, targeted mails are obtained;
The targeted mails are sent to the recipient according to the addresses of items of mail.
2. according to the method described in claim 1, it is characterised in that the confidential information to be added obtained in initial mail, including At least one of below:
The information that the selection operation of input is indicated is defined as the confidential information to be added, and the selection operation is for described initial The selection operation for the information that mail includes;
The privacy information that the initial mail includes is defined as the confidential information to be added.
3. method according to claim 1 or 2, it is characterised in that methods described also includes:
Pass through at least one of following output prompting:
The targeted mails shown by targeted manner, the targeted manner includes:Font shown by target display parameters, Encryption identification is shown in the targeted mails, the display parameters include at least one of following:Font parameter, character type, face Color parameter;
Play voice message;
Wherein, the prompting indicates that targeted mails include the information encrypted.
4. a kind of e-mail transmission method, it is characterised in that methods described includes:
The targeted mails that sender sends are received, the targeted mails include the confidential information to be added after encryption;
Obtain the private key of the recipient;
The confidential information to be added after the encryption is decrypted using the private key, initial mail is obtained.
5. method according to claim 4, it is characterised in that utilize the private key to be added after the encryption described Confidential information is decrypted, and obtains before initial mail, methods described also includes:
Pass through at least one of following output prompting:
The targeted mails shown by targeted manner, the targeted manner includes:Font shown by target display parameters, Encryption identification is shown in the targeted mails, the display parameters include at least one of following:Font parameter, character type, face Color parameter;
Play voice message;
Wherein, the prompting indicates that targeted mails include the information encrypted.
6. method according to claim 5, it is characterised in that the private key of the acquisition recipient, including:
Detect decryption oprerations;
In response to detecting decryption oprerations, display reminding inputs the dialog box of password;
The private key request of the password including input is sent to mail server, by the mail server according to described close Code is verified that after being verified, the corresponding private key of the password is sent to the recipient by the mail server;
Receive the private key.
7. the method according to any one of claim 4 to 6, it is characterised in that methods described also includes:
The initial mail is shown on current page;
When exiting current page, sent to the mail server and delete instruction so that the mail server is deleted described Initial mail.
8. a kind of e-mail transmission method, it is characterised in that methods described includes:
Generate the corresponding public key of mailbox and private key;
Set up the corresponding relation of the public key and the addresses of items of mail of the mailbox;
According to the password of input, the corresponding relation of the private key and the password is set up;
When receiving the request of the public key acquisition including the addresses of items of mail, corresponding public key is inquired about according to the addresses of items of mail, The public key is sent to the first terminal for sending the public key request;
When receiving the request of the private key including the password, verified according to the password, will be described close after being verified The corresponding private key of code is sent to the second terminal for sending the private key request.
9. a kind of mail transmission device, it is characterised in that including:
First acquisition module, the public affairs of the recipient are obtained for the addresses of items of mail according to recipient and by mail server Key;
Second acquisition module, for obtaining the confidential information to be added in initial mail;
Encrypting module, it is to be encrypted that the public key for being obtained using first acquisition module is obtained to second acquisition module Information is encrypted, and obtains targeted mails;
Sending module, for sending the target postal that the encrypting module encryption is obtained to the recipient according to the addresses of items of mail Part.
10. device according to claim 9, it is characterised in that second acquisition module includes at least one following son Module,
First determination sub-module, for the information of the selection operation instruction of input to be defined as into the confidential information to be added, the choosing Select the selection operation that operation is the information included for the initial mail;
Second determination sub-module, for the privacy information that the initial mail includes to be defined as into the confidential information to be added.
11. device according to claim 9, it is characterised in that described device also includes:Output module,
The output module includes at least one following submodule to export prompting, wherein, the prompting is indicated in targeted mails Including the information encrypted,
Display sub-module, for the targeted mails shown by targeted manner, the targeted manner includes:Font passes through mesh Mark display parameters shows, encryption identification is shown in the targeted mails, the display parameters include it is following at least one:Font is joined Number, character type, color parameter;
Submodule is played, for playing voice message.
12. a kind of mail transmission device, it is characterised in that including:
Receiving module, the targeted mails for receiving sender's transmission, the targeted mails include the confidential information to be added after encryption;
Acquisition module, the private key for obtaining the recipient;
Adding in deciphering module, the targeted mails that the private key for being obtained using the acquisition module is received to the receiving module Confidential information to be added after close is decrypted, and obtains initial mail.
13. device according to claim 12, it is characterised in that described device also includes:Output module,
The output module includes at least one following submodule, for utilizing the private key to be encrypted after the encryption Information is decrypted, and obtains before initial mail, is pointed out by least one of following output:
Display sub-module, for the targeted mails shown by targeted manner, the targeted manner includes:Font passes through mesh Mark display parameters shows, encryption identification is shown in the targeted mails, the display parameters include it is following at least one:Font is joined Number, character type, color parameter;
Submodule is played, for playing voice message;
Wherein, the prompting indicates that targeted mails include the information encrypted.
14. device according to claim 13, it is characterised in that the acquisition module includes:
Detection sub-module, for detecting decryption oprerations;
Display sub-module, for detecting decryption oprerations in response to the detection sub-module, display reminding inputs the dialogue of password Frame;
Sending submodule, for the private key of the password inputted including the dialog box shown from the display sub-module to be asked Mail server is sent to, is verified by the mail server according to the password, after being verified, the mail service The corresponding private key of the password is sent to the recipient by device;
Receiving submodule, for receiving the private key.
15. device according to claim 13, it is characterised in that described device also includes:
Display module, for showing the initial mail on current page;
Sending module, for when exiting current page, being sent to the mail server and deleting instruction so that the mail clothes Business device deletes the initial mail.
16. a kind of mail transmission device, it is characterised in that methods described includes:
Generation module, for generating the corresponding public key of mailbox and private key;
First sets up module, and the public key for setting up the generation module generation is corresponding with the addresses of items of mail of the mailbox to close System;
Second sets up module, for the password according to input, sets up pair of the private key and the password of the generation module generation It should be related to;
Enquiry module, for when receiving the request of the public key acquisition including the addresses of items of mail, being looked into according to the addresses of items of mail Corresponding public key is ask, the public key is sent to the first terminal for sending the public key request;
Authentication module, for when receiving the request of the private key including the password, being verified according to the password;
Sending module, for after the authentication module is verified, the corresponding private key of the password being sent into transmission described The second terminal of private key request.
17. a kind of mail transmission device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The public key of the recipient is obtained according to the addresses of items of mail of recipient and by mail server;
Obtain the confidential information to be added in initial mail;
The confidential information to be added is encrypted using the public key, targeted mails are obtained;
The targeted mails are sent to the recipient according to the addresses of items of mail.
18. a kind of mail transmission device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The targeted mails that sender sends are received, the targeted mails include the confidential information to be added after encryption;
Obtain the private key of the recipient;
The confidential information to be added after the encryption is decrypted using the private key, initial mail is obtained.
19. a kind of mail transmission device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Generate the corresponding public key of mailbox and private key;
Set up the corresponding relation of the public key and the addresses of items of mail of the mailbox;
According to the password of input, the corresponding relation of the private key and the password is set up;
When receiving the request of the public key acquisition including the addresses of items of mail, corresponding public key is inquired about according to the addresses of items of mail, The public key is sent to the first terminal for sending the public key request;
When receiving the request of the private key including the password, verified according to the password, will be described close after being verified The corresponding private key of code is sent to the second terminal for sending the private key request.
20. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is by processor The step of claim 1-3 methods describeds are realized during execution.
21. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is by processor The step of claim 4-7 methods describeds are realized during execution.
22. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is by processor The step of claim 8 methods described is realized during execution.
CN201710305042.XA 2017-05-03 2017-05-03 E-mail transmission method and device Pending CN107147636A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710305042.XA CN107147636A (en) 2017-05-03 2017-05-03 E-mail transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710305042.XA CN107147636A (en) 2017-05-03 2017-05-03 E-mail transmission method and device

Publications (1)

Publication Number Publication Date
CN107147636A true CN107147636A (en) 2017-09-08

Family

ID=59775367

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710305042.XA Pending CN107147636A (en) 2017-05-03 2017-05-03 E-mail transmission method and device

Country Status (1)

Country Link
CN (1) CN107147636A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900468A (en) * 2018-05-31 2018-11-27 中融万博网络科技有限公司 A kind of method of secure storage and transmitting user service data
CN111107066A (en) * 2019-12-06 2020-05-05 中国联合网络通信集团有限公司 Sensitive data transmission method and system, electronic equipment and storage medium
CN115296881A (en) * 2022-07-29 2022-11-04 北京达佳互联信息技术有限公司 Information acquisition method and device, electronic equipment and computer readable medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805443A (en) * 2005-12-13 2006-07-19 江波 Simple, practical and reliable E-mail security solution project
US7167981B2 (en) * 2001-01-25 2007-01-23 Murata Kikai Kabushiki Kaisha Method of transmitting email, device for implementing same method, and storing medium storing program for transmitting email
CN1921536A (en) * 2005-08-24 2007-02-28 富士施乐株式会社 Device, program, and method for transmitting or receiving an image through electronic mail
CN101018174A (en) * 2007-03-15 2007-08-15 北京安拓思科技有限责任公司 Network system and method for obtaining the public key certificate for WAPI
CN101183932A (en) * 2007-12-03 2008-05-21 宇龙计算机通信科技(深圳)有限公司 Security identification system of wireless application service and login and entry method thereof
CN101247360A (en) * 2008-03-25 2008-08-20 宇龙计算机通信科技(深圳)有限公司 Information display method, main unit terminal and sub-unit terminal
CN101765108A (en) * 2009-07-01 2010-06-30 北京华胜天成科技股份有限公司 Safety certification service platform system, device and method based on mobile terminal
CN101924710A (en) * 2009-06-15 2010-12-22 北京华智大为科技有限公司 Management system and method for enterprise email box
CN102740246A (en) * 2011-04-15 2012-10-17 中兴通讯股份有限公司 Method, system, and device for processing media message
CN102801706A (en) * 2012-06-28 2012-11-28 宇龙计算机通信科技(深圳)有限公司 Terminal and security processing method for information contents
CN103297230A (en) * 2012-02-22 2013-09-11 中国移动通信集团公司 Information encryption and decryption method, device and system
CN103701592A (en) * 2013-12-18 2014-04-02 上海普华诚信软件技术有限公司 Method and system for intercepting, encrypting and decrypting data
CN103916233A (en) * 2014-03-28 2014-07-09 小米科技有限责任公司 Information encryption method and device
CN104468478A (en) * 2013-09-17 2015-03-25 上海俊悦光纤网络科技有限公司 Mail encryption method

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7167981B2 (en) * 2001-01-25 2007-01-23 Murata Kikai Kabushiki Kaisha Method of transmitting email, device for implementing same method, and storing medium storing program for transmitting email
CN1921536A (en) * 2005-08-24 2007-02-28 富士施乐株式会社 Device, program, and method for transmitting or receiving an image through electronic mail
US20070050616A1 (en) * 2005-08-24 2007-03-01 Takanori Masui Device, program, and method for transmitting or receiving an image through electronic mail
CN1805443A (en) * 2005-12-13 2006-07-19 江波 Simple, practical and reliable E-mail security solution project
CN101018174A (en) * 2007-03-15 2007-08-15 北京安拓思科技有限责任公司 Network system and method for obtaining the public key certificate for WAPI
CN101183932A (en) * 2007-12-03 2008-05-21 宇龙计算机通信科技(深圳)有限公司 Security identification system of wireless application service and login and entry method thereof
CN101247360A (en) * 2008-03-25 2008-08-20 宇龙计算机通信科技(深圳)有限公司 Information display method, main unit terminal and sub-unit terminal
CN101924710A (en) * 2009-06-15 2010-12-22 北京华智大为科技有限公司 Management system and method for enterprise email box
CN101765108A (en) * 2009-07-01 2010-06-30 北京华胜天成科技股份有限公司 Safety certification service platform system, device and method based on mobile terminal
CN102740246A (en) * 2011-04-15 2012-10-17 中兴通讯股份有限公司 Method, system, and device for processing media message
CN103297230A (en) * 2012-02-22 2013-09-11 中国移动通信集团公司 Information encryption and decryption method, device and system
CN102801706A (en) * 2012-06-28 2012-11-28 宇龙计算机通信科技(深圳)有限公司 Terminal and security processing method for information contents
CN104468478A (en) * 2013-09-17 2015-03-25 上海俊悦光纤网络科技有限公司 Mail encryption method
CN103701592A (en) * 2013-12-18 2014-04-02 上海普华诚信软件技术有限公司 Method and system for intercepting, encrypting and decrypting data
CN103916233A (en) * 2014-03-28 2014-07-09 小米科技有限责任公司 Information encryption method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900468A (en) * 2018-05-31 2018-11-27 中融万博网络科技有限公司 A kind of method of secure storage and transmitting user service data
CN111107066A (en) * 2019-12-06 2020-05-05 中国联合网络通信集团有限公司 Sensitive data transmission method and system, electronic equipment and storage medium
CN115296881A (en) * 2022-07-29 2022-11-04 北京达佳互联信息技术有限公司 Information acquisition method and device, electronic equipment and computer readable medium

Similar Documents

Publication Publication Date Title
CN104125055B (en) Encryption and decryption method and electronic equipment
CN103916233B (en) A kind of information ciphering method and device
KR101733072B1 (en) Method and apparatus for processing surveillance video, program and recording medium
CN106453052B (en) Message interaction method and device
CN105260673A (en) Short message reading method and apparatus
CN104283876A (en) Operation authorization method and device
CN110765434A (en) Identity authentication method and device, electronic equipment and storage medium
CN104955031A (en) Information transmission method and device
CN107395610B (en) Communication authentication method, first terminal and second terminal
CN103914541B (en) The method and device of information search
CN104715337A (en) Attendance method, and attendance management method and device
KR101639147B1 (en) Method, device, program and storage medium for sending information in voice service
WO2020233218A1 (en) Information encryption method, information decryption method, and terminal
CN104318177A (en) Protection method and protection device for data of terminal equipment
TWI761843B (en) Access control method and device, electronic device and storage medium
CN105471814A (en) Account number management method and account number management device
CN105893854B (en) Encryption and decryption method and device
CN107959757A (en) User information processing method, device, APP servers and terminal device
CN107147636A (en) E-mail transmission method and device
CN108111667A (en) A kind of communication information encryption method, device and electronic equipment
CN106060098A (en) Processing method, processing device and processing system for verification codes
CN105282162A (en) Processing method and device for account management business
CN103916471A (en) Information display method and device
CN106789070A (en) The decryption method of data, device and terminal
CN114221764A (en) Public key updating method, device and equipment based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170908