CN110912802B - E-mail data processing method and device - Google Patents

E-mail data processing method and device Download PDF

Info

Publication number
CN110912802B
CN110912802B CN201911082202.4A CN201911082202A CN110912802B CN 110912802 B CN110912802 B CN 110912802B CN 201911082202 A CN201911082202 A CN 201911082202A CN 110912802 B CN110912802 B CN 110912802B
Authority
CN
China
Prior art keywords
mail
information
notarization
character string
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911082202.4A
Other languages
Chinese (zh)
Other versions
CN110912802A (en
Inventor
张志鹏
赵红方
冯勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Bestone Information Technology Co ltd
Original Assignee
Shanghai Bestone Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Bestone Information Technology Co ltd filed Critical Shanghai Bestone Information Technology Co ltd
Priority to CN201911082202.4A priority Critical patent/CN110912802B/en
Publication of CN110912802A publication Critical patent/CN110912802A/en
Application granted granted Critical
Publication of CN110912802B publication Critical patent/CN110912802B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/234Monitoring or handling of messages for tracking messages

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides an email data processing method and device, wherein the method comprises the following steps: acquiring a certificate storing request sent by a user side, wherein the certificate storing request comprises an electronic mail ID needing to be stored; acquiring electronic mail information corresponding to the electronic mail ID according to the electronic mail ID; splicing and integrating the e-mail information according to a preset rule to generate a first data string; based on an agreed algorithm, adding a time stamp to the first data string to obtain a first character string; intercepting at least two sub-character strings from the first character string according to a preset first rule; rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings; and assembling the first character string and the rearranged sub-character string according to a preset format to generate a second data string and storing the second data string. The method and the system provide evidence preservation, notarization and one-stop-type evidence preservation service for the user, ensure that the e-mail data cannot be tampered, and solve the legal effectiveness problem of the e-evidence in a prepositive manner.

Description

E-mail data processing method and device
Technical Field
The invention relates to the field of electronic evidence, in particular to an electronic mail data processing method and device, which are mainly used for solidifying electronic evidence.
Background
In the internet era, electronic data is increasingly used as evidence for dispute cases. However, in most litigation cases, electronic evidence is stored and provided by the parties themselves, and since electronic data can be tracelessly tampered, falsified and forged, the authenticity of the electronic data is often questioned during court trial and certified, and thus cannot be trusted.
The e-mail is an important communication mode in electronic commerce and daily communication of people, is one kind of electronic evidence, and has the characteristics of easiness in fading, tampering and damage and the like. In legal practice, when a party submits an email as evidence to a court after a dispute occurs, it is difficult to identify and adopt the email because a judge cannot confirm whether the content of the email downloaded by the party is changed. Meanwhile, due to factors such as low counterfeiting technical threshold, network environment and the like, the notarization department can not ensure the objective authenticity of the certified email and can not accept the certification of the email in many times. Once disputes occur, such as loan, announcement, and confirmation of matters in the online transaction process, the email in the mailbox is simply used as evidence and is easily questioned, and the proof power of the email originally used as a convenient communication tool cannot be exerted. The eleventh article of the contract law in China determines that the e-mail carrying the character symbol content is in the form of a book certificate, but the e-mail is used as the book certificate and should be submitted as the original or lacks evidence effectiveness. The notarization mechanism is used as a third-party mechanism to conduct certain notarization behaviors on the electronic mails and fix the notarization behaviors as written notarization materials, and the problem that the electronic mails are used as carriers to be shown is solved. However, only relying on the operation of notary, on one hand, the efficiency is low and the labor cost is high; on the other hand, there are problems such as artificial errors and blind spots.
How to fix the evidence with safe and effective electronic evidence to realize effective notarization of the e-mail, so as to improve the credibility of the electronic evidence and effectively guarantee the legal rights of electronic business parties and other netizens is a problem to be solved urgently.
Disclosure of Invention
The application provides an electronic mail data processing method and device, and solves the problem of low reliability caused by the characteristics of easiness in vanishing, changing and changing of electronic mail data.
In order to solve the technical problem, the following technical scheme is adopted in the application:
a first aspect of the present application provides an email data processing method, including:
acquiring a certificate storing request sent by a user side, wherein the certificate storing request comprises an electronic mail ID needing to be stored;
acquiring electronic mail information corresponding to the electronic mail ID according to the electronic mail ID;
splicing and integrating the email messages according to a preset rule to generate a first data string;
adding a timestamp to the first data string based on an appointed algorithm to obtain a first character string carrying the timestamp, wherein the timestamp is the time for receiving the e-mail information, namely the evidence storage time; intercepting at least two sub-character strings from the first character string according to a preset first rule; rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings;
assembling the first character string and the rearranged sub-character string according to a preset data format to generate a second data string; and storing the second data string as mail certificate storage information.
Preferably, the email message includes one or more items of sender, receiver, carbon copy, close sender, subject, email content, email sending time and email receiving time.
Preferably, the email data processing method further comprises:
registering and managing company and mailbox domain information for sending certificate storing request;
and registering and managing mailbox user information for sending the certificate storing request.
Preferably, the email data processing method further comprises: the DNA information of each electronic mail sent and received by the user who made the certification request is stored.
Preferably, the email data processing method further comprises:
acquiring operation log information of an e-mail needing to be certified;
and saving the operation log information.
Preferably, after the mail certificate information is stored, the electronic mail data processing method further includes: acquiring a deposit certificate inquiry request which is sent by a user side and comprises target mail identification information, and inquiring mail deposit certificate information which is associated with the target mail identification information from the stored mail deposit certificate information, namely the target mail deposit certificate information;
and acquiring the inquired target mail evidence storage information.
Preferably, the email data processing method further comprises:
acquiring a notarization request which is sent by a user side and comprises target mail identification information, and reading mail evidence storing information which is associated with the target mail identification information and comprises a first character string and a rearranged sub-character string from the stored mail evidence storing information, namely the target mail evidence storing information;
sending the read target mail certificate storage information to a notarization institution;
and receiving a receipt containing the application number returned by the notarization institution.
More preferably, the email data processing method further comprises:
searching operation log information of the e-mail needing notarization;
and sending the operation log information to a notarization institution.
More preferably, the email data processing method further comprises:
and acquiring a notarization application state inquiry request including an application number sent by a user side, and acquiring a notarization certificate condition of target mail certificate storage information associated with the application number from a notarization institution.
More preferably, before notarization, the notarization institution further comprises:
the notarization institution acquires target mail evidence storage information which needs notarization and comprises a first character string and a rearranged sub-character string;
intercepting at least two sub-character strings from the first character string according to a preset first rule;
rearranging the intercepted sub character strings according to a preset second rule to obtain a second rearranged sub character string;
and comparing the second rearranged sub-character string with the rearranged sub-character string to judge whether the two rearranged sub-character strings are equal or not, if the two rearranged sub-character strings are different, determining that the two rearranged sub-character strings are tampered and not carrying out notary signature, and if the two rearranged sub-character strings are the same, carrying out notary signature.
A second aspect of the present application provides an electronic mail data processing apparatus comprising:
the certificate storing request receiving module is configured to receive a certificate storing request sent by a user side, wherein the certificate storing request includes an e-mail ID needing to store a certificate;
the certificate storing module is configured to obtain corresponding e-mail information from the e-mail server according to the e-mail ID included in the certificate storing request, and splice and integrate the e-mail information according to a preset rule to generate a first data string;
-an encryption module configured to encrypt the first data string, i.e. based on an agreed algorithm, add a timestamp to the first data string to obtain a first character string carrying a timestamp, where the timestamp is a time of receiving the email message, i.e. a time of storing the email message; intercepting at least two sub-character strings from the first character string according to a preset first rule; rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings; assembling the first character string and the rearranged sub-character string according to a preset data format to generate a second data string;
the storage module is configured to store the second data string obtained after the processing of the encryption module as the mail certificate information.
Preferably, the email message includes one or more items of sender, receiver, carbon copy, close sender, subject, email content, email sending time and email receiving time.
Preferably, the electronic mail data processing apparatus further includes:
the certificate storage mail domain maintenance module is used for registering and managing the information of the company and the mailbox domain which send the certificate storage request;
the certificate storing mail user maintenance module is used for registering and managing the mail box user information for sending the certificate storing request;
and the mail DNA information storage module is used for storing the DNA information of each electronic mail sent and received by the user who makes the evidence storage request.
Preferably, the electronic mail data processing apparatus further includes: and the distributed log collection system is used for processing the distributed log collection set.
Preferably, the electronic mail data processing apparatus further includes:
the system comprises a notarization request receiving module, a notarization request receiving module and a target mail identification information processing module, wherein the notarization request receiving module is configured to obtain a notarization request which is sent by a user side and comprises target mail identification information;
the notarization module is configured to read the mail certificate storing information associated with the target mail identification information from the stored mail certificate storing information, namely the target mail certificate storing information; and sending the read target mail certificate storage information to a notarization institution, and receiving a receipt containing the application number returned by the notarization institution.
More preferably, the electronic mail data processing apparatus further includes:
the decryption module is configured to acquire target mail certificate storage information which needs to be notarized and comprises a first character string and rearranged sub-character strings, and intercept at least two sub-character strings from the first character string according to a preset first rule; rearranging the intercepted sub character strings according to a preset second rule to obtain a second rearranged sub character string; and
and the checking module is configured to compare the second rearranged sub-character string with the rearranged sub-character string, judge whether the second rearranged sub-character string and the rearranged sub-character string are equal or not, if the second rearranged sub-character string and the rearranged sub-character string are different, the second rearranged sub-character string and the rearranged sub-character string are considered to be tampered and not to be subjected to notary signature, and if the second rearranged sub-character string and the rearranged sub-character string are the same, the second rearranged sub-character string and the rearranged sub-character string are subjected to notary signature.
Preferably, the electronic mail data processing apparatus further includes:
and the mail notarization application state query module is used for acquiring the notarization certificate condition from a notarization institution according to a notarization application state query request which is sent by the user side and comprises an application number.
Preferably, the electronic mail data processing apparatus further includes:
and the operation log information searching module is used for searching the operation log information of the e-mail needing notarization and sending the operation log information to a notarization institution.
In a preferred embodiment, the first string comprises at least two portions, each separated by an 8-bit hexadecimal number FF: the first part is a 17-bit timestamp, arranged in the order of yearly (YYYY) monthly (MM) daily (DD) hours (HH) in (MM) seconds (ss) milliseconds (SSS); the second portion is the length of the first data string.
In a preferred embodiment, after intercepting the sub-character string, the encryption module rearranges the characters in the sub-character string according to a preset third rule, and then rearranges each sub-character string rearranged according to the preset third rule according to a preset second rule, so as to obtain a rearranged sub-character string.
Preferably, the first rule comprises: and intercepting characters with preset length from the first character string according to a preset position as a sub-character string according to a preset direction.
More preferably, the preset direction includes: the first character string may be in a direction from a head end to a tail end of the first character string, in a direction from a tail end to a head end of the first character string, in a direction from both ends of the first character string to the middle of the first character string, or in a direction from a predetermined position of the first character string to both ends of the first character string.
More preferably, according to a preset direction, intercepting a character with a preset length from the first character string according to a preset position as a sub-character string, including: and calling a character string intercepting function by taking the preset position as a parameter according to the preset direction, and intercepting the first character string to obtain at least two sub-character strings.
More preferably, for example, if the preset position is m bits, the preset length is n bits, and the preset direction is from the head end to the tail end, then starting from the m-th character of the first character string, n characters are cut back, i.e. the m-th bit is cut to the (m + n-1) -th bit.
More preferably, for example, the preset position is m bits, the preset length is n bits, m ≧ n, and the preset direction is from the preset position to both ends, then starting from the m-th character of the first character string (without the m-th character), n characters are respectively truncated for the character string before the m-th character and the character string after the m-th character, i.e. the (m +1) -th bit is truncated to the (m + n) -th bit, and the (m-1) -th bit is truncated to the (m-n) -th bit, so as to obtain two character strings.
In the above aspect of the present invention, m and n are each independently a natural number.
Preferably, the substring may be at least 20 bytes, preferably at least 25 bytes.
Preferably, the substring is preferably no more than 100 bytes.
Preferably, the second rule comprises: and sequentially connecting the sub character strings from front to back to generate a rearranged sub character string.
For example, two extracted substrings, string1 and string2, are connected in the order from front to back to obtain string1string2, which is the rearranged substring.
Preferably, the second rule comprises: and sequentially connecting the sub character strings from back to front to generate a rearranged sub character string.
For example, two extracted substrings, string1 and string2, are connected in the order from back to front to obtain string2string1, which is the rearranged substring.
Preferably, the second rule comprises:
sequentially connecting the sub-character strings from front to back;
and arranging the character strings which are sequentially connected in an ascending order, and generating a rearranged sub character string by the letters with the numbers in front or the numbers with the letters in front.
For example, two intercepted substrings, namely string1 and string2, are connected in the order from front to back to obtain string1string 2; arranging string1string2 in ascending order, setting the number as the first letter and the letter as the last letter, and obtaining the string 12 ggiinnrssrsstt after arrangement, wherein the string is the rearranged sub-string.
Preferably, the second rule comprises:
sequentially connecting the sub-character strings from front to back;
and arranging the character strings which are sequentially connected in a descending order, and generating a rearranged sub character string by the letters with the numbers in front or the numbers with the letters in front.
For example, two intercepted substrings, namely string1 and string2, are connected in the order from front to back to obtain string1string 2; the character string1string2 is arranged according to descending order, and the number is set as the first letter, and the character string 12 ttssrnnniig is obtained after arrangement, and the character string is the rearranged sub-character string.
Preferably, the second rule comprises:
sequentially connecting the sub-character strings from back to front;
and arranging the character strings which are sequentially connected in an ascending order, and generating a rearranged sub character string by the letters with the numbers in front or the numbers with the letters in front.
Preferably, the second rule comprises:
sequentially connecting the sub-character strings from back to front;
and arranging the character strings which are sequentially connected in a descending order, and generating a rearranged sub character string by the letters with the numbers in front or the numbers with the letters in front.
In a preferred embodiment, the third rule comprises:
the characters of each substring are arranged independently in descending order with the first letter followed by the number or the first letter followed by the number.
In a preferred embodiment, the third rule comprises:
the characters of each substring are arranged independently in ascending order with the first letter followed by the number or the first letter followed by the number.
Compared with the prior art, the technical scheme of the invention has the following beneficial effects:
the application provides an electronic mail data processing method and device, all mails of a user are subjected to real-time evidence storage while being sent and received, the user can inquire and manage the evidence storage mails at any time, and can initiate notarization application on line, the evidence fixing requirement of the user on the electronic mail use scene is met, evidence storage, notarization and evidence output one-stop type preservation service is provided for the user, data safety is achieved, data cannot be tampered, the legal effectiveness problem of evidence is solved in a preposed mode, and time and economic cost of parties are saved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
FIG. 1 is a schematic flow chart diagram illustrating an email data processing method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of an email data processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another email data processing method according to an embodiment of the present application.
Detailed Description
The present invention provides a method and a device for processing email data, which will be described in further detail below with reference to the accompanying drawings and examples in order to make the objects, technical solutions and effects of the present invention clearer and clearer. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order, it being understood that the data so used may be interchanged under appropriate circumstances. Furthermore, the terms "comprises," "comprising," and any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The first embodiment is as follows:
fig. 1 is a schematic flow chart of an email data processing method according to an embodiment of the present application, where the present embodiment is applicable to a case where a user needs email for storage, and the method may be executed by an email data processing apparatus, and specifically includes the following steps:
step S101: acquiring a certificate storing request sent by a user side, wherein the certificate storing request comprises an electronic mail ID needing to be stored.
Step S102: and acquiring the email information corresponding to the email ID according to the email ID. The electronic mail information comprises one or more items of a sender, a receiver, a copying person, a secret sender, a subject, mail content, mail sending time and mail receiving time.
Step S103: and splicing and integrating the e-mail information according to a preset rule to generate a first data string.
Step S104: and encrypting the first data string based on an agreed algorithm to generate mail certificate storage information.
Specifically, based on an agreed algorithm, adding a timestamp to a first data string to obtain a first character string carrying the timestamp, where the timestamp is the time for receiving the email information, that is, the evidence storage time; intercepting at least two sub-character strings from the first character string according to a preset first rule; rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings; and assembling the first character string and the rearranged sub-character string according to a preset data format to generate a second data string, namely the mail certificate storage information.
Step S105: and assembling the first character string and the rearranged sub-character string according to a preset data format to generate a second data string.
Step S106: and storing the second data string as mail certificate storage information.
In the application, the second data string (i.e. the mail storage certificate information) is stored, so that when the certified mail is needed, the second data string is decrypted to determine whether the mail needing the notarization is consistent with the mail which passes through the mail server in real time when the mail is sent by a user, and further determine whether the mail needing the notarization is real.
In a preferred embodiment, the email data processing method further includes: registering and managing company and mailbox domain information for sending certificate storing request; and registering and managing mailbox user information for sending the certificate storing request.
In a preferred embodiment, the email data processing method further includes: the DNA information of each electronic mail sent and received by the user who made the certification request is stored.
In a preferred embodiment, the email data processing method further includes: acquiring operation log information of an e-mail needing to be certified; and saving the operation log information.
Example two:
fig. 2 is a schematic flowchart of another flow of the email data processing method in the embodiment of the present application, and in this embodiment, on the basis of the first embodiment, after the email deposit certificate information is stored, the method may further include a step of querying, which specifically includes the following steps:
step S201: acquiring a certificate storing request sent by a user side, wherein the certificate storing request comprises an electronic mail ID needing to be stored.
Step S202: and acquiring the email information corresponding to the email ID according to the email ID.
Step S203: and splicing and integrating the e-mail information according to a preset rule to generate a first data string.
Step S204: and encrypting the first data string based on an agreed algorithm to generate mail certificate storage information.
Step S205: and assembling the first character string and the rearranged sub-character string according to a preset data format to generate a second data string.
Step S206: and storing the second data string as mail certificate storage information.
Step S207: acquiring a certificate storing and inquiring request which is sent by a user side and comprises target mail identification information, and inquiring mail certificate storing information which is associated with the target mail identification information from the stored mail certificate storing information, namely the target mail certificate storing information.
Step S208: and acquiring the inquired target mail evidence storage information.
Example three:
fig. 3 is a schematic flow chart of a forensics method according to an embodiment of the present application, and in this embodiment, on the basis of the first embodiment, after the mail forensics information is stored, steps of notarization request and forensics query may be further included, which specifically includes the following steps:
step S301: acquiring a certificate storing request sent by a user side, wherein the certificate storing request comprises an electronic mail ID needing to be stored.
Step S302: and acquiring the email information corresponding to the email ID according to the email ID.
Step S303: and splicing and integrating the e-mail information according to a preset rule to generate a first data string.
Step S304: and encrypting the first data string based on an agreed algorithm to generate mail certificate storage information.
Step S305: and assembling the first character string and the rearranged sub-character string according to a preset data format to generate a second data string.
Step S306: and storing the second data string as mail certificate storage information.
Step S307: acquiring a notarization request which is sent by a user side and comprises target mail identification information, and reading mail evidence storing information which is associated with the target mail identification information from stored mail evidence storing information, namely the target mail evidence storing information;
step S308: sending the read target mail certificate storage information to a notarization institution;
step S309: and receiving a receipt containing the application number returned by the notarization institution.
Wherein, notarization institution still includes following step before carrying out notarization:
1) the notarization institution acquires target mail evidence storage information which needs notarization and comprises a first character string and a rearranged sub-character string;
2) intercepting at least two sub-character strings from the first character string according to a preset first rule;
3) rearranging the intercepted sub character strings according to a preset second rule to obtain a second rearranged sub character string;
4) and comparing the second rearranged sub-character string with the rearranged sub-character string to judge whether the two rearranged sub-character strings are equal or not, if the two rearranged sub-character strings are different, determining that the two rearranged sub-character strings are tampered and not carrying out notary signature, and if the two rearranged sub-character strings are the same, carrying out notary signature.
In a preferred embodiment, the email data processing method further includes: searching operation log information of the e-mail needing notarization; and sending the operation log information to a notarization institution.
In a preferred embodiment, the email data processing method further includes: and acquiring a notarization application state inquiry request including an application number sent by a user side, and acquiring a notarization certificate condition of target mail certificate storage information associated with the application number from a notarization institution.
Example four:
corresponding to the email data processing method in the embodiment of the present application, an embodiment of the present application further provides an email data processing apparatus, including:
the certificate storing request receiving module is configured to receive a certificate storing request sent by a user side, wherein the certificate storing request includes an e-mail ID needing to store a certificate;
the certificate storing module is configured to obtain corresponding e-mail information from the e-mail server according to the e-mail ID included in the certificate storing request, and splice and integrate the e-mail information according to a preset rule to generate a first data string;
the encryption module is configured to encrypt the first data string based on an agreed algorithm, that is, add a timestamp to the first data string based on the agreed algorithm to obtain a first character string carrying a timestamp, where the timestamp is a time when the email message is received, that is, a storage time; intercepting at least two sub-character strings from the first character string according to a preset first rule; rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings; assembling the first character string and the rearranged sub-character string according to a preset data format to generate a second data string;
the storage module is configured to store the second data string obtained after the processing of the encryption module as the mail certificate information.
In a preferred embodiment, the electronic mail data processing apparatus further comprises:
the certificate storage mail domain maintenance module is used for registering and managing the information of the company and the mailbox domain which send the certificate storage request;
the certificate storing mail user maintenance module is used for registering and managing the mail box user information for sending the certificate storing request;
and the mail DNA information storage module is used for storing the DNA information of each electronic mail sent and received by the user who makes the evidence storage request.
In a preferred embodiment, the electronic mail data processing apparatus further comprises: and the distributed log collection system is used for processing the distributed log collection set.
In a preferred embodiment, the electronic mail data processing apparatus further comprises:
the system comprises a notarization request receiving module, a notarization request receiving module and a target mail identification information processing module, wherein the notarization request receiving module is configured to obtain a notarization request which is sent by a user side and comprises target mail identification information;
the notarization module is configured to read the mail certificate storing information associated with the target mail identification information from the stored mail certificate storing information, namely the target mail certificate storing information; and sending the read target mail certificate storage information to a notarization institution, and receiving a receipt containing the application number returned by the notarization institution.
In a preferred embodiment, the electronic mail data processing apparatus further comprises:
the decryption module is configured to acquire target mail certificate storage information which needs to be notarized and comprises a first character string and rearranged sub-character strings, and intercept at least two sub-character strings from the first character string according to a preset first rule; rearranging the intercepted sub character strings according to a preset second rule to obtain a second rearranged sub character string; and
and the checking module is configured to compare the second rearranged sub-character string with the rearranged sub-character string, judge whether the second rearranged sub-character string and the rearranged sub-character string are equal or not, if the second rearranged sub-character string and the rearranged sub-character string are different, the second rearranged sub-character string and the rearranged sub-character string are considered to be tampered and not to be subjected to notary signature, and if the second rearranged sub-character string and the rearranged sub-character string are the same, the second rearranged sub-character string and the rearranged sub-character string are subjected to notary signature.
In a preferred embodiment, the electronic mail data processing apparatus further comprises:
and the mail notarization application state query module is used for acquiring the notarization certificate condition from a notarization institution according to a notarization application state query request which is sent by the user side and comprises an application number.
In a preferred embodiment, the electronic mail data processing apparatus further comprises:
and the operation log information searching module is used for searching the operation log information of the e-mail needing notarization and sending the operation log information to a notarization institution.
In the electronic mail data processing device, the encryption module and the decryption module are equivalent to a data provider and a data receiver, and the electronic mail data processing between the encryption module and the decryption module effectively ensures the transmission safety of data and reduces the risk of attacking and embezzling data contents by a third party. Several data processing methods are listed below.
Example one:
at the data provider:
a01: and the data provider adds a time stamp to the first data string based on an agreed algorithm to obtain a first character string carrying the time stamp.
Wherein the first string comprises at least two portions, each portion being separated by an 8-bit hexadecimal number FF: the first part is a 17-bit timestamp, arranged in the order of yearly (YYYY) monthly (MM) daily (DD) hours (HH) in (MM) seconds (ss) milliseconds (SSS); the second portion is the length of the first data string.
A02: intercepting two sub-character strings from the first character string according to a preset first rule; the method comprises the following specific steps: starting from the 50 th character of the first character string, 25 characters are cut back, namely the 50 th bit to the 74 th bit, to form a first substring string 1. Starting from the 100 th character of the first character string, 25 characters are intercepted backwards to obtain a second substring string 2;
a03: rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings; the method comprises the following specific steps: string1 and string2 are concatenated in front-to-back order to get the re-ordered substring string1string 2.
A04: and transmitting a second data string formed by assembling the first character string and the rearranged sub-character string according to a preset format to a data receiving party.
At the data receiving side:
a05: and receiving a second data string sent by the data provider.
A06: according to a preset first rule, two substrings string1 'and string 2' are intercepted from the first string.
A07: and rearranging the intercepted substrings according to a preset second rule to obtain a second rearranged substring string1 'string 2'.
A08: the second rearranged sub-string 1 'string 2' is compared with the rearranged sub-string 1string2 to judge whether the two are equal.
A09: if the comparison result is different, the card is considered to be tampered and a notary signature is not given; and if the comparison result is the same, carrying out notarization signature.
In this embodiment, the data provider encrypts the data by using the timestamp based on the agreed algorithm, extracts the sub-string, rearranges, encrypts, and processes the sub-string to obtain the second data string, thereby effectively ensuring the security of the user data.
Example two:
at the data provider:
b01: and the data provider adds a time stamp to the first data string based on an agreed algorithm to obtain a first character string carrying the time stamp.
Wherein the first string comprises at least two portions, each portion being separated by an 8-bit hexadecimal number FF: the first part is a 17-bit timestamp, which is the current time of transmission of the first data string, arranged in the order of yearly (YYYY) monthly (MM) days (DD) hours (HH) minutes (MM) seconds (ss) milliseconds (SSS); the second portion is the length of the first data string.
B02: according to a preset first rule, two substrings string1, string2 are intercepted from the first string.
B03: rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings; the method comprises the following specific steps: string1 and string2 are connected in the order from back to front to get string2string1 of the rearranged substring.
B04: and transmitting a second data string formed by assembling the first character string and the rearranged sub-character string according to a preset format to a data receiving party.
At the data receiving side:
b05: and the receiving data provider transmits the second data string.
B06: according to a preset first rule, two substrings string1 'and string 2' are intercepted from the first string.
B07: and rearranging the intercepted substrings according to a preset second rule to obtain a second rearranged substring string2 'string 1'.
B08: the second rearranged sub-string 2 'string 1' is compared with the rearranged sub-string 2string1 to judge whether the two are equal.
B09: if the comparison result is different, the card is considered to be tampered and a notary signature is not given; and if the comparison result is the same, carrying out notarization signature.
Example three:
at the data provider:
c01: and the data provider adds a time stamp to the first data string based on an agreed algorithm to obtain a first character string carrying the time stamp.
Wherein the first string comprises at least two portions, each portion being separated by an 8-bit hexadecimal number FF: the first part is a 17-bit timestamp, which is the current time of transmission of the first data string, arranged in the order of yearly (YYYY) monthly (MM) days (DD) hours (HH) minutes (MM) seconds (ss) milliseconds (SSS); the second portion is the length of the first data string.
C02: according to a preset first rule, two substrings string1, string2 are intercepted from the first string.
C03: rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings, which specifically comprises the following steps: string1 and string2 are connected in sequence from front to back to obtain string1string 2; arranging string1string2 in ascending order, setting the number as the first letter and the letter as the last letter, and obtaining the string 12 ggiinnrssrsstt after arrangement, wherein the string is the rearranged sub-string.
C04: and transmitting a second data string formed by assembling the first character string and the rearranged sub-character string according to a preset format to a data receiving party.
At the data receiving side:
c05: and the receiving data provider transmits the second data string.
C06: according to a preset first rule, two substrings string1 'and string 2' are intercepted from the first string.
C07: and rearranging the intercepted sub-character strings according to a preset second rule to obtain a second rearranged sub-character string 12 ggiinnrssrsst'.
C08: the second rearranged sub-string 12 ggiinnrrrsstt' is compared with the rearranged sub-string 12 ggiinnrrrsstt, and whether the two are equal is determined.
C09: if the comparison result is different, the card is considered to be tampered and a notary signature is not given; and if the comparison result is the same, carrying out notarization signature.
Example four:
at the data provider:
d01: and the data provider adds a time stamp to the first data string based on an agreed algorithm to obtain a first character string carrying the time stamp.
Wherein the first string comprises at least two portions, each portion being separated by an 8-bit hexadecimal number FF: the first part is a 17-bit timestamp, which is the current time of transmission of the first data string, arranged in the order of yearly (YYYY) monthly (MM) days (DD) hours (HH) minutes (MM) seconds (ss) milliseconds (SSS); the second portion is the length of the first data string.
D02: according to a preset first rule, two substrings string1, string2 are intercepted from the first string.
D021: according to a preset third rule, the substrings are respectively and independently rearranged into respective characters, specifically, the characters of the two substrings string1 and string2 are respectively and independently arranged in descending order, and the number is before the letter or the number is before the letter, so as to obtain string11、string21
D03: rearranging the character among the rearranged sub character strings according to a preset second rule to obtain a rearranged sub character string,the method specifically comprises the following steps: string11、string21Concatenated in front-to-back order to obtain a rearranged string11string21
D04: and transmitting a second data string formed by assembling the first character string and the rearranged sub-character string according to a preset format to a data receiving party.
At the data receiving side:
d05: and the receiving data provider transmits the second data string.
D06: according to a preset first rule, two substrings string1 'and string 2' are intercepted from the first string.
D061: according to a preset third rule, the substrings are respectively and independently rearranged into respective characters, specifically, the characters of two substrings string1 'and string 2' are respectively and independently arranged in descending order, and the number is before the letter or the letter is before the number, so as to obtain string11’、string21’。
D07: rearranging the character strings after the character rearrangement according to a preset second rule to obtain a second rearranged sub-character string, which specifically comprises the following steps: string11’、string21' concatenate in front-to-back order, resulting in a second reordered string11’string21’。
D08: stranding 1 a second re-arranged sub-string1’string21' AND reordering substring string11string21And comparing and judging whether the two are equal.
D09: if the comparison result is different, the card is considered to be tampered and a notary signature is not given; and if the comparison result is the same, carrying out notarization signature.
The embodiments of the present invention have been described in detail, but the embodiments are merely examples, and the present invention is not limited to the embodiments described above. Any equivalent modifications and substitutions to those skilled in the art are also within the scope of the present invention. Accordingly, equivalent changes and modifications made without departing from the spirit and scope of the present invention should be covered by the present invention.

Claims (10)

1. An electronic mail data processing method, comprising:
acquiring a certificate storing request sent by a user side, wherein the certificate storing request comprises an electronic mail ID needing to be stored;
acquiring electronic mail information corresponding to the electronic mail ID according to the electronic mail ID;
splicing and integrating the email messages according to a preset rule to generate a first data string;
adding a timestamp to the first data string based on an appointed algorithm to obtain a first character string carrying the timestamp, wherein the timestamp is the time for receiving the e-mail information, namely the evidence storage time; intercepting at least two sub-character strings from the first character string according to a preset first rule; rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings;
assembling the first character string and the rearranged sub-character string according to a preset data format to generate a second data string;
and storing the second data string as mail certificate storage information.
2. The electronic mail data processing method according to claim 1, characterized in that: the email information comprises one or more items of a sender, a receiver, a transcription person, a secret sender, a subject, email content, email sending time and email receiving time.
3. The electronic mail data processing method according to claim 1, characterized by further comprising:
registering and managing company and mailbox domain information for sending certificate storing request;
and registering and managing mailbox user information for sending the certificate storing request.
4. The electronic mail data processing method according to claim 1, wherein after the mail deposit information is stored, the electronic mail data processing method further comprises:
acquiring a deposit certificate inquiry request which is sent by a user side and comprises target mail identification information, and inquiring mail deposit certificate information which is associated with the target mail identification information from the stored mail deposit certificate information, namely the target mail deposit certificate information;
and acquiring the inquired target mail evidence storage information.
5. The electronic mail data processing method according to claim 1, characterized by further comprising:
acquiring a notarization request which is sent by a user side and comprises target mail identification information, and reading mail evidence storing information which is associated with the target mail identification information and comprises a first character string and a rearranged sub-character string from the stored mail evidence storing information, namely the target mail evidence storing information;
sending the read target mail certificate storage information to a notarization institution;
and receiving a receipt containing the application number returned by the notarization institution.
6. The electronic mail data processing method according to claim 5, characterized by further comprising:
and acquiring a notarization application state inquiry request including an application number sent by a user side, and acquiring a notarization certificate condition of target mail certificate storage information associated with the application number from a notarization institution.
7. The electronic mail data processing method according to claim 5, wherein the notarization institution further comprises, before notarization:
the notarization institution acquires target mail evidence storage information which needs notarization and comprises a first character string and a rearranged sub-character string;
intercepting at least two sub-character strings from the first character string according to a preset first rule;
rearranging the intercepted sub character strings according to a preset second rule to obtain a second rearranged sub character string;
and comparing the second rearranged sub-character string with the rearranged sub-character string to judge whether the two rearranged sub-character strings are equal or not, if the two rearranged sub-character strings are different, determining that the two rearranged sub-character strings are tampered and not carrying out notary signature, and if the two rearranged sub-character strings are the same, carrying out notary signature.
8. An electronic mail data processing apparatus, comprising:
the system comprises a certificate storing request receiving module, a certificate storing request receiving module and a certificate storing module, wherein the certificate storing request receiving module is configured to receive a certificate storing request sent by a user side, and the certificate storing request comprises an electronic mail ID (identity) needing to be stored;
the certificate storing module is configured to acquire corresponding electronic mail information from an electronic mail server according to an electronic mail ID contained in the certificate storing request, and splice and integrate the electronic mail information according to a preset rule to generate a first data string;
the encryption module is configured to encrypt the first data string, and specifically includes: adding a timestamp to the first data string based on an appointed algorithm to obtain a first character string carrying the timestamp, wherein the timestamp is the time for receiving the e-mail information, namely the evidence storage time; intercepting at least two sub-character strings from the first character string according to a preset first rule; rearranging the intercepted sub character strings according to a preset second rule to obtain rearranged sub character strings; assembling the first character string and the rearranged sub-character string according to a preset data format to generate a second data string;
and the storage module is configured to store the second data string obtained after the processing of the encryption module as the mail certificate storage information.
9. The electronic mail data processing apparatus according to claim 8, characterized by further comprising:
the system comprises a notarization request receiving module, a notarization request receiving module and a target mail identification information processing module, wherein the notarization request receiving module is configured to obtain a notarization request which is sent by a user side and comprises target mail identification information;
the notarization module is configured to read the mail certificate storing information associated with the target mail identification information from the stored mail certificate storing information, namely the target mail certificate storing information; and sending the read target mail certificate storage information to a notarization institution, and receiving a receipt containing the application number returned by the notarization institution.
10. The electronic mail data processing apparatus according to claim 9, characterized by further comprising:
and the mail notarization application state query module is used for acquiring the notarization certificate condition from a notarization institution according to a notarization application state query request which is sent by the user side and comprises an application number.
CN201911082202.4A 2019-11-07 2019-11-07 E-mail data processing method and device Active CN110912802B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911082202.4A CN110912802B (en) 2019-11-07 2019-11-07 E-mail data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911082202.4A CN110912802B (en) 2019-11-07 2019-11-07 E-mail data processing method and device

Publications (2)

Publication Number Publication Date
CN110912802A CN110912802A (en) 2020-03-24
CN110912802B true CN110912802B (en) 2021-08-10

Family

ID=69816329

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911082202.4A Active CN110912802B (en) 2019-11-07 2019-11-07 E-mail data processing method and device

Country Status (1)

Country Link
CN (1) CN110912802B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714957A (en) * 2009-10-30 2010-05-26 北京航空航天大学 System for managing nonrepudiative evidence of mass mails by third party
CN102609658A (en) * 2012-02-15 2012-07-25 何晓行 Electronic evidence consolidating device, electronic evidence consolidating method and electronic evidence consolidating system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6327656B2 (en) * 1996-07-03 2001-12-04 Timestamp.Com, Inc. Apparatus and method for electronic document certification and verification
US7904450B2 (en) * 2008-04-25 2011-03-08 Wilson Kelce S Public electronic document dating list
CN101833724A (en) * 2010-04-01 2010-09-15 复旦大学 System and method for saving e-commerce data telegraph text and forming judicial evidence by other party
WO2013107499A1 (en) * 2012-01-16 2013-07-25 Tico Farre Carlos A method, a system and a computer program product for certifying that a destination email server has received an email message sent from a sender to at least one destination address
CN102724044A (en) * 2012-07-04 2012-10-10 东方金盾科技有限公司 Electronic evidence verification and preservation method
CN103593618A (en) * 2013-10-28 2014-02-19 北京实数科技有限公司 Verification method and system for adoptability of electronic data evidence
CN105023137A (en) * 2015-04-29 2015-11-04 杭州猿人数据科技有限公司 E-mail evidence processing system and processing method
CN105335667B (en) * 2015-10-16 2017-03-15 北京源创云网络科技有限公司 Innovate creative data processing method, device, system and deposit card equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714957A (en) * 2009-10-30 2010-05-26 北京航空航天大学 System for managing nonrepudiative evidence of mass mails by third party
CN102609658A (en) * 2012-02-15 2012-07-25 何晓行 Electronic evidence consolidating device, electronic evidence consolidating method and electronic evidence consolidating system

Also Published As

Publication number Publication date
CN110912802A (en) 2020-03-24

Similar Documents

Publication Publication Date Title
EP0861541B1 (en) Root key compromise recovery
EP2166716A2 (en) System and method for cipher E-mail protection
US7313700B2 (en) Method and system for authenticating a message sender using domain keys
US6182219B1 (en) Apparatus and method for authenticating the dispatch and contents of documents
US7730139B2 (en) Asynchronous tamper-proof tag for routing e-mails and e-mail attachments
JP3946192B2 (en) Data originality verification method and system
CN1729460B (en) Communication method, communication system, relay system, mail distribution system and method
US7249258B2 (en) Method and system for assuring an original
US8397074B2 (en) Method and computer system for long-term archiving of qualified signed data
US7966492B1 (en) System and method for allowing an e-mail message recipient to authenticate the message
JP2005518763A (en) System and method for verifying delivery and integrity of electronic messages
US20020087861A1 (en) Methods and systems for authenticating communications
WO2023071133A1 (en) Tagged network information service generation and application method and apparatus, device and medium
CN101047762B (en) Communication device with revocation list acquiring function
CN110912802B (en) E-mail data processing method and device
CN111355579A (en) E-mail certificate storage method, system, transmission medium and terminal
WO2014203296A1 (en) Information processing device, e-mail viewing restriction method, computer program, and information processing system
US20090177880A1 (en) Transmission of secure electronic mail formats
CA2505273C (en) Transmission of secure electronic mail formats
US20060161627A1 (en) System and method for verifying and archiving electronic messages
CN1154291C (en) Apparatus and method for preventing disclosure through user-authentication at a printing node
KR100432611B1 (en) System for providing service to transmit and receive document based on e-mail system and method thereof
JP6129243B2 (en) Information processing apparatus, electronic file browsing restriction method, computer program, and information processing system
KR100638265B1 (en) method for secure for exchanging e-document in the internet
CN117336266A (en) Document sharing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant