CN113642022A - E-mail processing method, device, system and storage medium - Google Patents

E-mail processing method, device, system and storage medium Download PDF

Info

Publication number
CN113642022A
CN113642022A CN202110962540.8A CN202110962540A CN113642022A CN 113642022 A CN113642022 A CN 113642022A CN 202110962540 A CN202110962540 A CN 202110962540A CN 113642022 A CN113642022 A CN 113642022A
Authority
CN
China
Prior art keywords
text
key
ciphertext
mail
attachment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110962540.8A
Other languages
Chinese (zh)
Other versions
CN113642022B (en
Inventor
尹一桦
王中武
汪凌峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Westone Information Industry Inc
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN202110962540.8A priority Critical patent/CN113642022B/en
Publication of CN113642022A publication Critical patent/CN113642022A/en
Application granted granted Critical
Publication of CN113642022B publication Critical patent/CN113642022B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The disclosure discloses an email processing method, device, system and storage medium. The method has the advantages that the text ciphertext of the mail data packet is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the e-mail can be relatively ensured, the text plaintext and the attachment key are jointly encrypted into the text ciphertext, the attachment key for decrypting the attachment ciphertext can be obtained by decrypting the text ciphertext, the attachment ciphertext can be directly forwarded on the premise that an e-mail receiving end does not need to download the attachment ciphertext to the local for decryption and re-encryption, and the forwarding efficiency of the e-mail is further improved. In addition, the present disclosure also provides an email processing apparatus, a system and a storage medium, which have the same beneficial effects as described above.

Description

E-mail processing method, device, system and storage medium
Technical Field
The present disclosure relates to the field of computer communications, and in particular, to a method, an apparatus, a system, and a storage medium for processing an email.
Background
Electronic mail is an information transmission means based on a computer and a communication network, and provides various types of information such as electronic letters, digital faxes of documents, images, digitized voice and the like for users by using a mode of transmitting and storing information by using electric signals. The electronic mail has the biggest characteristic that people can receive and send the mail at any place and any time, so that the space-time limitation is solved, the working efficiency is greatly improved, and great convenience is provided for office automation and commercial activities.
At present, various electronic mail products widely used in the market rarely adopt the cryptographic technology to perform security protection on mail contents, namely mail texts and mail attachments, and the mail texts and the mail attachments which are generally transmitted on the network in a plaintext mode bring great potential safety hazards, which may cause the leakage of the electronic mail contents. However, in the case of encrypted transmission of the content of the e-mail, when the attachment is forwarded, the receiver needs to download the e-mail attachment to the local, and it is difficult to ensure the efficiency of forwarding the e-mail.
Therefore, it is a problem to be solved by those skilled in the art to provide an email processing method to improve the forwarding efficiency of email while ensuring the security of the email transmission process.
Disclosure of Invention
The purpose of the present disclosure is to provide an email processing method, apparatus, system and storage medium, so as to improve the forwarding efficiency of email while ensuring the security of the email transmission process.
In order to solve the above technical problem, the present disclosure provides an email processing method, applied to an email receiving end, including:
receiving an email data packet transmitted by an email sending end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, the text ciphertext is obtained by symmetrically encrypting a text plaintext and an attachment key through a text key, and the attachment ciphertext is obtained by symmetrically encrypting an attachment plaintext through an attachment key;
and executing decryption operation on the text key ciphertext to obtain a text key.
Preferably, after performing a decryption operation on the text key ciphertext to obtain a text key, the method further includes:
performing decryption operation on the text ciphertext by using the text key to obtain a text plaintext and an accessory key;
carrying out symmetric encryption operation on the text plaintext and the accessory secret key by using the new text secret key to obtain a new text ciphertext;
performing encryption operation on the new text key to obtain a new text key ciphertext;
and sending the forwarding mail data packet at least comprising the new text cipher text, the new text key cipher text and the attachment cipher text to a forwarding receiving terminal.
Preferably, performing an encryption operation on the new text key to obtain a new text key ciphertext includes:
and carrying out encryption operation on the new text key by using the public key of the forwarding receiving end to obtain a new text key ciphertext.
Preferably, the text key ciphertext is obtained by performing encryption operation on the text key based on a public key of the mail receiving end;
executing decryption operation on the text key ciphertext to obtain a text key, comprising:
and executing decryption operation on the text key ciphertext by using the local private key to obtain a text key.
Preferably, the mail data packet also contains a signature value; the signature value is obtained by executing signature operation on a text plaintext and an attachment key based on a private key of a mail sending end;
before performing a decryption operation on the text ciphertext using the text key, the method further comprises:
judging whether the signature value is a standard signature value or not based on a public key of the mail sending end;
and if the signature value is the standard signature value, executing the step of executing decryption operation on the text ciphertext by using the text key.
Preferably, before sending the forwarding email packet containing at least the new text cipher text, the new text key cipher text, and the attachment cipher text to the forwarding receiving end, the method further includes:
performing signature operation on the text plaintext and the accessory secret key by using a local private key to obtain a new signature value;
sending a forwarding mail data packet at least containing a new text cipher text, a new text key cipher text and an attachment cipher text to a forwarding receiving end, comprising:
and sending the forwarding mail data packet containing the new signature value, the new text cipher text, the new text key cipher text and the attachment cipher text to a forwarding receiving terminal.
In addition, the present disclosure also provides an email processing method, applied to an email sending end, including:
symmetrically encrypting a text plaintext and an attachment key by using a text key corresponding to a mail receiving end to obtain a text ciphertext;
symmetrically encrypting an accessory plaintext through an accessory secret key to obtain an accessory ciphertext;
encrypting the text key to generate a text key ciphertext;
and sending the mail data packet at least containing the text key ciphertext, the text ciphertext and the attachment ciphertext to a mail receiving end.
In addition, the present disclosure also provides an email processing apparatus, applied to an email receiving end, including:
the mail receiving module is used for receiving a mail data packet transmitted by a mail transmitting end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, the text ciphertext is obtained by symmetrically encrypting a text plaintext and an attachment key through a text key, and the attachment ciphertext is obtained by symmetrically encrypting an attachment plaintext through an attachment key;
and the ciphertext decryption module is used for executing decryption operation on the ciphertext of the text key to obtain the text key.
In addition, the present disclosure further provides an email processing apparatus, applied to an email sending end, including:
the text ciphertext generating module is used for symmetrically encrypting a text plaintext and an attachment key by using a text key corresponding to the mail receiving end to obtain a text ciphertext;
the accessory ciphertext generating module is used for symmetrically encrypting an accessory plaintext through an accessory secret key to obtain an accessory ciphertext;
the text key ciphertext generating module is used for encrypting the text key to generate a text key ciphertext;
and the mail data packet sending module is used for sending the mail data packet at least containing the text key ciphertext, the text ciphertext and the attachment ciphertext to a mail receiving end.
In addition, the present disclosure also provides an email processing system, including:
the mail sending end is used for symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain a text ciphertext; symmetrically encrypting an accessory plaintext through an accessory secret key to obtain an accessory ciphertext; encrypting the text key to generate a text key ciphertext; sending the mail data packet at least containing the text key ciphertext, the text ciphertext and the attachment ciphertext to a mail receiving end;
the mail receiving end is used for receiving a mail data packet transmitted by the mail transmitting end; and executing decryption operation on the text key ciphertext to obtain a text key.
Furthermore, the present disclosure also provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, implements the steps of the e-mail processing method applied to the mail receiving end as described above and/or implements the steps of the e-mail processing method applied to the mail sending end as described above.
The e-mail processing method provided by the disclosure includes the steps that a mail sending end carries out symmetric encryption on a text plaintext and an attachment secret key by utilizing the text secret key corresponding to a mail receiving end to obtain a text ciphertext, the attachment plaintext is symmetrically encrypted by the attachment secret key to obtain an attachment ciphertext, the text secret key is further encrypted to generate the text secret key ciphertext, a mail data packet at least comprising the text secret key ciphertext, the text ciphertext and the attachment ciphertext is sent to the mail receiving end, and on the basis, the mail receiving end receives the mail data packet transmitted by the mail sending end and carries out decryption operation on the text secret key ciphertext to obtain the text secret key. The method has the advantages that the text ciphertext of the mail data packet is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the e-mail can be relatively ensured, the text plaintext and the attachment key are jointly encrypted into the text ciphertext, the attachment key for decrypting the attachment ciphertext can be obtained by decrypting the text ciphertext, the attachment ciphertext can be directly forwarded on the premise that an e-mail receiving end does not need to download the attachment ciphertext to the local for decryption and re-encryption, and the forwarding efficiency of the e-mail is further improved. In addition, the present disclosure also provides an email processing apparatus, a system and a storage medium, which have the same beneficial effects as described above.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure, the drawings needed for the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and that other drawings can be obtained by those skilled in the art without inventive effort.
Fig. 1 is a flowchart of an e-mail processing method applied to a mail receiving end according to an embodiment of the present disclosure;
fig. 2 is a flowchart of an e-mail processing method applied to a mail receiving end according to an embodiment of the present disclosure;
fig. 3 is a flowchart of an e-mail processing method applied to a mail sending end according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of encryption and encapsulation of a mail sending end in an embodiment of the disclosure;
fig. 5 is a schematic structural diagram of an electronic mail processing apparatus applied to a mail receiving end according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an electronic mail processing apparatus applied to a mail sending end according to the embodiment of the present disclosure;
fig. 7 is a block diagram of an email processing device disclosed in an embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present disclosure without any creative effort belong to the protection scope of the present disclosure.
At present, various electronic mail products widely used in the market rarely adopt the cryptographic technology to perform security protection on mail contents, namely mail texts and mail attachments, and the mail texts and the mail attachments which are generally transmitted on the network in a plaintext mode bring great potential safety hazards, which may cause the leakage of the electronic mail contents. However, in the prior art, when the content of the e-mail is encrypted and transmitted, the e-mail receiver needs to further forward the attachment on the basis of downloading the attachment to the local receiver, which makes it difficult to ensure the forwarding efficiency of the e-mail.
Therefore, the core of the present disclosure is to provide an email processing method to improve the forwarding efficiency of email while ensuring the security of the email transmission process.
The present disclosure is described in further detail below with reference to the accompanying drawings and detailed description, in order to enable those skilled in the art to better understand the disclosure.
Referring to fig. 1, an embodiment of the present disclosure discloses an email processing method applied to an email receiving end, including:
step S10: and receiving an incoming mail data packet from a mail sending end.
The mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, the text ciphertext is obtained by symmetrically encrypting a text plaintext and an attachment key through a text key, and the attachment ciphertext is obtained by symmetrically encrypting an attachment plaintext through an attachment key.
It should be noted that the execution body of the present embodiment is a mail receiving end that receives a mail data packet of a mail sending end, and is essentially a network device terminal with an e-mail receiving function. The mail sending end and the mail receiving end are relatively device terminals, and when the mail receiving end sends a mail data packet to another terminal, the mail receiving end is the mail sending end relative to the other terminal, and the other terminal is the corresponding mail receiving end.
The mail receiving end firstly receives a mail data packet transmitted by the mail sending end, wherein the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext. The main point of this embodiment is that the text ciphertext is obtained by symmetrically encrypting the text plaintext and the accessory key through the text key, that is, the text ciphertext carries the text plaintext and the accessory key at the same time, and the accessory key can decrypt the accessory ciphertext to obtain the accessory plaintext, so that when the mail receiving end forwards the accessory ciphertext, the mail receiving end only needs to encrypt the text plaintext and the accessory key after decrypting the text ciphertext aiming at the forwarding receiving end, and then the forwarding receiving end can decrypt the accessory key and obtain the accessory ciphertext by using the accessory key to normally decrypt the accessory ciphertext, and the accessory ciphertext does not need to be downloaded locally to be decrypted and re-encrypted.
In addition, the text key in this embodiment is obtained by pre-negotiation between the mail receiving end and the mail sending end, that is, the mail receiving end has a key capable of decrypting the text ciphertext. Thereby relatively ensuring the security of the text plaintext.
Step S11: and executing decryption operation on the text key ciphertext to obtain a text key.
After receiving the mail data packet transmitted by the mail sending end, the mail receiving end further executes decryption operation on the text key ciphertext to obtain a text key, so that the text key can be used for further decrypting the text ciphertext based on the text key, and obtaining a text plaintext and an attachment key on the basis. On the basis of obtaining the text plaintext and the attachment key, the mail receiving end can forward the mail data packet or check the content of the attachment plaintext according to actual requirements. When the mail data packet is forwarded, the forwarding mail data packet is further formed based on the text key, the text ciphertext and the attachment ciphertext so as to perform forwarding operation; and when the plaintext of the accessory is viewed, the accessory cipher text is decrypted by using the accessory key.
The e-mail processing method provided by the disclosure includes the steps that a mail sending end carries out symmetric encryption on a text plaintext and an attachment secret key by utilizing the text secret key corresponding to a mail receiving end to obtain a text ciphertext, the attachment plaintext is symmetrically encrypted by the attachment secret key to obtain an attachment ciphertext, the text secret key is further encrypted to generate the text secret key ciphertext, a mail data packet at least comprising the text secret key ciphertext, the text ciphertext and the attachment ciphertext is sent to the mail receiving end, and on the basis, the mail receiving end receives the mail data packet transmitted by the mail sending end and carries out decryption operation on the text secret key ciphertext to obtain the text secret key. The method has the advantages that the text ciphertext of the mail data packet is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the e-mail can be relatively ensured, the text plaintext and the attachment key are jointly encrypted into the text ciphertext, the attachment key for decrypting the attachment ciphertext can be obtained by decrypting the text ciphertext, the attachment ciphertext can be directly forwarded on the premise that an e-mail receiving end does not need to download the attachment ciphertext to the local for decryption and re-encryption, and the forwarding efficiency of the e-mail is further improved.
On the basis of the above embodiment, as a preferred implementation manner, the text key ciphertext is obtained by performing an encryption operation on the text key based on the public key of the mail receiving end;
executing decryption operation on the text key ciphertext to obtain a text key, comprising:
and executing decryption operation on the text key ciphertext by using the local private key to obtain a text key.
It should be noted that the main point of the present embodiment is that the text key ciphertext is obtained by performing an encryption operation on the text key by using the public key of the mail receiving end in an asymmetric encryption manner, and then when performing a decryption operation on the text key ciphertext, the mail receiving end performs a decryption operation on the text key ciphertext by using the local private key. The embodiment can further improve the security of the text key ciphertext.
Referring to fig. 2, an embodiment of the present disclosure discloses an email processing method applied to an email receiving end, including:
step S20: and receiving an incoming mail data packet from a mail sending end.
The mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, the text ciphertext is obtained by symmetrically encrypting a text plaintext and an attachment key through a text key, and the attachment ciphertext is obtained by symmetrically encrypting an attachment plaintext through an attachment key.
Step S21: and executing decryption operation on the text key ciphertext to obtain a text key.
Step S22: and performing decryption operation on the text ciphertext by using the text key to obtain the text plaintext and the accessory key.
After the text key ciphertext is decrypted to obtain the text key, the text key is further used for decrypting the text ciphertext to obtain the text plaintext and the accessory key, so that the text plaintext and the accessory key are further packaged by using the new text key in the subsequent steps.
Step S23: and carrying out symmetric encryption operation on the text plaintext and the accessory secret key by using the new text secret key to obtain a new text ciphertext.
After the text key is used for executing decryption operation on the text ciphertext to obtain the text plaintext and the attachment key, the step further executes symmetric encryption operation on the text plaintext and the attachment key by using the new text key to obtain a new text ciphertext, and the new text ciphertext is used for being further sent to a forwarding receiving end as the content in a forwarding mail data packet in the future.
Step S24: and performing encryption operation on the new text key to obtain a new text key ciphertext.
And after the new text key is obtained, further performing encryption operation on the new text key to obtain a new text key ciphertext, and further sending the ciphertext serving as the content in a forwarding mail data packet to a forwarding receiving end.
Step S25: and sending the forwarding mail data packet at least comprising the new text cipher text, the new text key cipher text and the attachment cipher text to a forwarding receiving terminal.
After the new text ciphertext, the new text key ciphertext and the attachment ciphertext are obtained, the step further sends a forwarding mail data packet at least containing the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end, so as to convert the mail data packet transmitted by the mail sending end into the forwarding mail data packet and forward the forwarding mail data packet to the forwarding receiving end on the premise of not locally downloading and re-encrypting the attachment ciphertext. The embodiment further ensures the forwarding efficiency of the e-mail.
On the basis of the foregoing embodiment, as a preferred implementation manner, performing an encryption operation on a new text key to obtain a new text key ciphertext includes:
and carrying out encryption operation on the new text key by using the public key of the forwarding receiving end to obtain a new text key ciphertext.
It should be noted that the key point of this embodiment is that the mail receiving end performs an encryption operation on the new text key by using the forwarding receiving end public key in an asymmetric encryption manner to obtain a new text key ciphertext, and transmits the new text key ciphertext to the forwarding receiving end, so that after the forwarding receiving end receives the new text key ciphertext, the forwarding receiving end can further decrypt the new text key ciphertext based on its own local private key to obtain the new text key, and further realize retransmission of the forwarded mail data packet based on the new text key, or reduce the forwarded mail data packet into a text plaintext and an attachment plaintext based on the new text key.
On the basis of the above series of embodiments, as a preferred implementation, the mail data packet further includes a signature value; the signature value is obtained by executing signature operation on a text plaintext and an attachment key based on a private key of a mail sending end;
before performing a decryption operation on the text ciphertext using the text key, the method further comprises:
judging whether the signature value is a standard signature value or not based on a public key of the mail sending end;
and if the signature value is the standard signature value, executing the step of executing decryption operation on the text ciphertext by using the text key.
It should be noted that, in this embodiment, the mail data packet transmitted by the mail sending end and received by the mail receiving end further includes a signature value, the signature value is obtained by performing a signature operation on the text plaintext and the attachment key based on the private key of the mail sending end, and is intended to be used for verifying whether the text plaintext and the attachment key are tampered, and then before performing a decryption operation on the text ciphertext by using the text key, first, whether the signature value is a standard signature value is determined based on the public key of the mail sending end, that is, the signature value is verified by using the public key of the mail sending end, and when the signature value is the standard signature value, it is determined that the text ciphertext is not tampered, and then the step of performing the decryption operation on the text ciphertext by using the text key is further performed, so that the reliability of using the mail data packet is relatively improved.
Alternatively, the signature value may be obtained by performing a signature operation on the plaintext of the body and the hash value of the attachment key based on a private key of the sender of the mail. Since the hash value is equivalent to the result of extracting the characteristics of the text plaintext and the attachment key, the operation amount of signature operation on the text plaintext and the attachment key based on the private key of the mail sending end can be relatively reduced.
Further, as a preferred embodiment, before sending the forwarding mail packet containing at least the new text ciphertext, the new text key ciphertext, and the attachment ciphertext to the forwarding receiving end, the method further includes:
performing signature operation on the text plaintext and the accessory secret key by using a local private key to obtain a new signature value;
sending a forwarding mail data packet at least containing a new text cipher text, a new text key cipher text and an attachment cipher text to a forwarding receiving end, comprising:
and sending the forwarding mail data packet containing the new signature value, the new text cipher text, the new text key cipher text and the attachment cipher text to a forwarding receiving terminal.
The key point of the embodiment is that the mail receiving end performs signature operation on the text plaintext and the attachment secret key by using a local private key to obtain a new signature value, and then sends the forwarding mail data packet containing the new signature value, the new text ciphertext, the new text secret key ciphertext and the attachment ciphertext to the forwarding receiving end, so as to ensure that the forwarding receiving end can verify the new signature value based on the public key of the mail receiving end, thereby judging whether the new text ciphertext is falsified, and further improving the reliability of using the forwarding mail data packet.
Referring to fig. 3, an embodiment of the present disclosure discloses an email processing method, applied to an email sending end, including:
step S30: and symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain a text ciphertext.
Step S31: and symmetrically encrypting the accessory plaintext through the accessory key to obtain the accessory ciphertext.
Step S32: and encrypting the text key to generate a text key ciphertext.
Step S33: and sending the mail data packet at least containing the text key ciphertext, the text ciphertext and the attachment ciphertext to a mail receiving end.
The e-mail processing method provided by the disclosure includes the steps that a mail sending end carries out symmetric encryption on a text plaintext and an attachment secret key by utilizing the text secret key corresponding to a mail receiving end to obtain a text ciphertext, the attachment plaintext is symmetrically encrypted by the attachment secret key to obtain an attachment ciphertext, the text secret key is further encrypted to generate the text secret key ciphertext, a mail data packet at least comprising the text secret key ciphertext, the text ciphertext and the attachment ciphertext is sent to the mail receiving end, and on the basis, the mail receiving end receives the mail data packet transmitted by the mail sending end and carries out decryption operation on the text secret key ciphertext to obtain the text secret key. The method has the advantages that the text ciphertext of the mail data packet is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the e-mail can be relatively ensured, the text plaintext and the attachment key are jointly encrypted into the text ciphertext, the attachment key for decrypting the attachment ciphertext can be obtained by decrypting the text ciphertext, the attachment ciphertext can be directly forwarded on the premise that an e-mail receiving end does not need to download the attachment ciphertext to the local for decryption and re-encryption, and the forwarding efficiency of the e-mail is further improved.
In order to deepen understanding of the above embodiments of the present disclosure, the present disclosure further provides a scene embodiment in a specific application scenario for further explanation.
Fig. 4 is a schematic diagram of an encrypted package of a mail sending end in an embodiment of the disclosure. As shown in fig. 4, the mail sending end uses different encryption keys to encrypt and encapsulate the mail text and the mail attachment, so that the processed mail content forms two major parts, i.e., an attachment ciphertext and a text ciphertext. And meanwhile, expanding the text of the mail, taking the plaintext of the attachment key as an expanded part of the text, and performing encryption protection by using the text key, so that the ciphertext package of the mail text contains the text, the signature value of the attachment key, ciphertext data of the text and the attachment key, and ciphertext of the text key protected by a public key of a mail receiving end.
According to the mail after encrypted and packaged, because the attachment and the text adopt different encryption keys and the attachment key and the text are packaged together, the attachment and the text have greater independence. The user uses the private key to decrypt the text key ciphertext to obtain a text key SK, and then the expanded mail text ciphertext is combined to obtain the mail text plaintext and the mail attachment key SK', so as to obtain the plaintext of the mail attachment.
The flow of sending, receiving and forwarding the mail is described as follows:
1) a mail sending end:
a. the mail sending end generates a text key SK and an attachment key SK';
b. calculating a hash value of the mail text and the attachment key SK';
c. signing the hash value of the mail text plaintext and the attachment key SK' by using a sender private key to form a mail signature value;
d. encrypting the mail text plaintext and the attachment key SK' by using the text key SK to form an expanded mail text encryption ciphertext;
e. encrypting the mail attachment by using the attachment key SK' to form a mail attachment ciphertext;
f. encrypting the text key by using the public key of the receiver to form a text key ciphertext;
g. packaging the encrypted ciphertext of the mail text, the encrypted ciphertext of the mail attachment, the mail signature value and the ciphertext of the text key and then sending the packaged ciphertext to a mail receiver;
2) e, mail receiving end:
a. the mail receiver uses the sender certificate public key to verify the mail signature value and determines the authenticity of the mail source;
b. the mail receiver decrypts the ciphertext of the text key by using a private key of the mail receiver to obtain the text key;
c. decrypting the expanded mail text ciphertext by using the text key, acquiring and checking the mail text plaintext, and acquiring an attachment key at the same time, wherein the user does not select to download the mail attachment;
d. when the mail is forwarded, a forwarder signs the hash values of the text plaintext and the attachment key of the forwarded mail by using a private key of the forwarder to form a new mail signature value;
e. the forwarder uses the new text key to encrypt the mail text plaintext and the attachment key to form a mail text ciphertext;
f. the forwarder encrypts the text key by using the public key of the next receiver to form a text key ciphertext;
g. the forwarder sends the encrypted ciphertext of the mail text, the mail attachment (local download can be avoided) in the original received mail, the new mail signature value and the encrypted ciphertext of the text key to the next receiver;
h. after a new receiver receives the mail, the authenticity of the mail sender is determined through public key signature verification, the text key is obtained through decrypting the ciphertext of the text key by the private key, and then the plaintext of the mail and the mail attachment key are obtained through decryption. And further decrypting the attachment plaintext of the mail by the attachment key.
Referring to fig. 5, an electronic mail processing apparatus 100 provided in the embodiment of the present disclosure is applied to a mail receiving end, and includes:
a mail receiving module 110, configured to receive a mail data packet sent by a mail sending end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, the text ciphertext is obtained by symmetrically encrypting a text plaintext and an attachment key through a text key, and the attachment ciphertext is obtained by symmetrically encrypting an attachment plaintext through an attachment key;
and the ciphertext decryption module 120 is configured to perform decryption operation on the ciphertext of the text key to obtain the text key.
Further, as a preferred embodiment, the apparatus further comprises:
the text ciphertext decryption module is used for executing decryption operation on the text ciphertext by using the text key to obtain a text plaintext and an accessory key;
the new text ciphertext generating module is used for executing symmetric encryption operation on the text plaintext and the accessory secret key by using the new text secret key to obtain a new text ciphertext;
the new text key encryption module is used for performing encryption operation on the new text key to obtain a new text key ciphertext;
and the data packet forwarding module is used for sending the forwarding mail data packet at least containing the new text cipher text, the new text key cipher text and the attachment cipher text to the forwarding receiving terminal.
In addition, as a preferred embodiment, the new text key encryption module includes:
and the new text key public key encryption module is used for performing encryption operation on the new text key by using the public key of the forwarding receiving end to obtain a new text key ciphertext.
In addition, as a preferred embodiment, the text key ciphertext is obtained by performing an encryption operation on the text key based on a public key of the mail receiving end;
the ciphertext decryption module 120 includes:
and the ciphertext private key decryption module is used for executing decryption operation on the ciphertext of the text private key by using the local private key to obtain the text private key.
In addition, as a preferred embodiment, the mail data packet further includes a signature value; the signature value is obtained by executing signature operation on a text plaintext and an attachment key based on a private key of a mail sending end;
the device still includes:
and the judging module is used for judging whether the signature value is a standard signature value or not based on the public key of the mail sending end, and if so, calling the text ciphertext decryption module.
Further, as a preferred embodiment, the apparatus further comprises:
the new signature generation module is used for executing signature operation on the text plaintext and the accessory secret key by using a local private key to obtain a new signature value;
a packet forwarding module comprising:
and the data packet forwarding submodule is used for sending the forwarding mail data packet containing the new signature value, the new text cipher text, the new text key cipher text and the attachment cipher text to the forwarding receiving terminal.
The electronic mail processing device provided by the disclosure is applied to a mail receiving end, a mail sending end carries out symmetric encryption on a text plaintext and an attachment secret key by utilizing the text secret key corresponding to the mail receiving end to obtain a text ciphertext, and carries out symmetric encryption on the attachment plaintext by utilizing the attachment secret key to obtain an attachment ciphertext, further carries out encryption on the text secret key to generate a text secret key ciphertext, and sends a mail data packet at least comprising the text secret key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, on the basis, the mail receiving end receives the mail data packet transmitted by the mail sending end and carries out decryption operation on the text secret key ciphertext to obtain the text secret key. The device has the advantages that the text ciphertext of the mail data packet is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the e-mail can be relatively ensured, the text plaintext and the attachment key are jointly encrypted into the text ciphertext, the attachment key for decrypting the attachment ciphertext can be obtained by decrypting the text ciphertext, the e-mail ciphertext can be directly forwarded on the premise that an e-mail receiving end does not need to download the attachment ciphertext to the local for decryption and re-encryption, and the forwarding efficiency of the e-mail is further improved.
Referring to fig. 6, an embodiment of the present disclosure provides an electronic mail processing apparatus 200, applied to a mail sending end, including:
a text ciphertext generating module 210, configured to symmetrically encrypt a text plaintext and an attachment key by using a text key corresponding to a mail receiving end to obtain a text ciphertext;
an accessory ciphertext generating module 220, configured to symmetrically encrypt an accessory plaintext by using an accessory key to obtain an accessory ciphertext;
a text key ciphertext generating module 230, configured to encrypt the text key to generate a text key ciphertext;
the mail data packet sending module 240 is configured to send a mail data packet at least including a text key ciphertext, a text ciphertext, and an attachment ciphertext to a mail receiving end.
The electronic mail processing device provided by the disclosure is applied to a mail sending end, the mail sending end carries out symmetric encryption on a text plaintext and an attachment secret key by utilizing the text secret key corresponding to the mail receiving end to obtain a text ciphertext, and carries out symmetric encryption on the attachment plaintext by utilizing the attachment secret key to obtain an attachment ciphertext, further carries out encryption on the text secret key to generate a text secret key ciphertext, and sends a mail data packet at least comprising the text secret key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, on the basis, the mail receiving end receives the mail data packet transmitted by the mail sending end and carries out decryption operation on the text secret key ciphertext to obtain the text secret key. The device has the advantages that the text ciphertext of the mail data packet is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the e-mail can be relatively ensured, the text plaintext and the attachment key are jointly encrypted into the text ciphertext, the attachment key for decrypting the attachment ciphertext can be obtained by decrypting the text ciphertext, the e-mail ciphertext can be directly forwarded on the premise that an e-mail receiving end does not need to download the attachment ciphertext to the local for decryption and re-encryption, and the forwarding efficiency of the e-mail is further improved.
Fig. 7 is a block diagram illustrating an email processing device 300 according to an example embodiment. As shown in fig. 7, the email processing apparatus 300 may include: a processor 301 and a memory 302. The key consumer 300 may further comprise one or more of a multimedia component 303, an input/output (I/O) interface 304, and a communication component 305.
The processor 301 is configured to control the overall operation of the key client 300, so as to complete all or part of the steps in the above-mentioned email processing method applied to the email receiving end and/or the email sending end. The memory 302 is used to store various types of data to support the operation of the key consumer 300, such data may include, for example, instructions for any application or method operating on the key consumer 300, as well as application-related data, such as contact data, messaging, pictures, audio, video, and so forth. The Memory 302 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk. The multimedia components 303 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 302 or transmitted through the communication component 305. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 304 provides an interface between the processor 301 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 305 is used for wired or wireless communication between the key consumer 300 and other devices. Wireless Communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G or 4G, or a combination of one or more of them, so that the corresponding Communication component 305 may include: Wi-Fi module, bluetooth module, NFC module.
In an exemplary embodiment, the key client Device 300 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic components, and is configured to perform the above-described email Processing method applied to the email receiving end and/or the email sending end.
In another exemplary embodiment, a computer readable storage medium is also provided, which comprises program instructions, which when executed by a processor, implement the steps of the above-described e-mail processing method applied to a mail receiving end and/or a mail sending end. For example, the computer readable storage medium may be the above-mentioned memory 302 including program instructions executable by the processor 301 of the key client device 300 to perform the above-mentioned e-mail processing method applied to the mail receiving end and/or the mail sending end.
In addition, the present disclosure also discloses an email processing system, including:
the mail sending end is used for symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain a text ciphertext; symmetrically encrypting an accessory plaintext through an accessory secret key to obtain an accessory ciphertext; encrypting the text key to generate a text key ciphertext; sending the mail data packet at least containing the text key ciphertext, the text ciphertext and the attachment ciphertext to a mail receiving end;
the mail receiving end is used for receiving a mail data packet transmitted by the mail transmitting end; and executing decryption operation on the text key ciphertext to obtain a text key.
The e-mail processing system provided by the disclosure is characterized in that a mail sending end symmetrically encrypts a text plaintext and an attachment secret key by using the text secret key corresponding to the mail receiving end to obtain a text ciphertext, symmetrically encrypts the attachment plaintext by using the attachment secret key to obtain an attachment ciphertext, further encrypts the text secret key to generate the text secret key ciphertext, and sends a mail data packet at least comprising the text secret key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, on the basis, the mail receiving end receives the mail data packet transmitted by the mail sending end and decrypts the text secret key ciphertext to obtain the text secret key. Because the text ciphertext of the mail data packet in the system is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, the safety of the transmission process of the electronic mail can be relatively ensured, and because the text plaintext and the attachment key are jointly encrypted into the text ciphertext, the attachment key for decrypting the attachment ciphertext can be obtained by decrypting the text ciphertext, so that the attachment ciphertext can be directly forwarded on the premise that an mail receiving end does not need to download the attachment ciphertext to the local for decryption and re-encryption, and the forwarding efficiency of the electronic mail is further improved.
Furthermore, the present disclosure also provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, implements the steps of the e-mail processing method applied to the mail receiving end as described above and/or implements the steps of the e-mail processing method applied to the mail sending end as described above.
The computer readable storage medium provided by the disclosure is characterized in that a mail sending end symmetrically encrypts a text plaintext and an attachment key by using a text key corresponding to a mail receiving end to obtain a text ciphertext, symmetrically encrypts the attachment plaintext by using the attachment key to obtain an attachment ciphertext, further encrypts the text key to generate a text key ciphertext, and sends a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, on the basis, the mail receiving end receives the mail data packet transmitted by the mail sending end and performs decryption operation on the text key ciphertext to obtain the text key. The method comprises the steps of encrypting a text ciphertext of a mail data packet in a computer readable storage medium by a text plaintext and an attachment key together, encrypting the attachment plaintext by the attachment ciphertext based on the attachment key, and encrypting the text key to generate a text key ciphertext, so that the safety of the transmission process of the electronic mail can be relatively ensured.
The above description details an email processing method, apparatus, system and storage medium provided by the present disclosure. The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present disclosure without departing from the principle of the present disclosure, and such improvements and modifications also fall within the scope of the claims of the present disclosure.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (11)

1. An e-mail processing method, applied to a mail receiving end, includes:
receiving an email data packet transmitted by an email sending end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, the text ciphertext is obtained by symmetrically encrypting a text plaintext and an attachment key through a text key, and the attachment ciphertext is obtained by symmetrically encrypting an attachment plaintext through the attachment key;
and executing decryption operation on the text key ciphertext to obtain the text key.
2. The method of claim 1, wherein after the performing a decryption operation on the text key ciphertext to obtain the text key, the method further comprises:
performing decryption operation on the text ciphertext by using the text key to obtain the text plaintext and the accessory key;
carrying out symmetric encryption operation on the text plaintext and the accessory secret key by using a new text secret key to obtain a new text ciphertext;
performing encryption operation on the new text key to obtain a new text key ciphertext;
and sending the forwarding mail data packet at least comprising the new text cipher text, the new text key cipher text and the attachment cipher text to the forwarding receiving terminal.
3. The method of claim 2, wherein the performing an encryption operation on the new text key to obtain a new text key ciphertext comprises:
and carrying out encryption operation on the new text key by using the public key of the forwarding receiving end to obtain the new text key ciphertext.
4. The electronic mail processing method according to claim 1, wherein the text key ciphertext is obtained by performing an encryption operation on the text key based on a public key of the mail receiving end;
the decrypting operation performed on the text key ciphertext to obtain the text key comprises:
and executing decryption operation on the text key ciphertext by using a local private key to obtain the text key.
5. The electronic mail processing method according to any one of claims 2 to 4, wherein the mail data packet further contains a signature value; the signature value is obtained by executing signature operation on the text plaintext and the attachment key based on a private key of the mail sending end;
before the performing a decryption operation on the text ciphertext using the text key, the method further comprises:
judging whether the signature value is a standard signature value or not based on a public key of the mail sending end;
and if the signature value is a standard signature value, executing the step of executing decryption operation on the text ciphertext by using the text secret key.
6. The method of claim 5, wherein before sending the forwarding email packet containing at least the new text ciphertext, the new text key ciphertext, and the attachment ciphertext to the forwarding receiver, the method further comprises:
performing signature operation on the text plaintext and the accessory secret key by using a local private key to obtain a new signature value;
the sending the forwarding e-mail data packet at least including the new text cipher text, the new text key cipher text and the attachment cipher text to the forwarding receiving end includes:
and sending the forwarding mail data packet containing the new signature value, the new text cipher text, the new text key cipher text and the attachment cipher text to the forwarding receiving terminal.
7. An e-mail processing method is applied to a mail sending end, and comprises the following steps:
symmetrically encrypting a text plaintext and an attachment key by using a text key corresponding to a mail receiving end to obtain a text ciphertext;
symmetrically encrypting an accessory plaintext through the accessory secret key to obtain an accessory ciphertext;
encrypting the text key to generate a text key ciphertext;
and sending the mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end.
8. An electronic mail processing apparatus, applied to a mail receiving end, comprising:
the mail receiving module is used for receiving a mail data packet transmitted by a mail transmitting end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, the text ciphertext is obtained by symmetrically encrypting a text plaintext and an attachment key through a text key, and the attachment ciphertext is obtained by symmetrically encrypting an attachment plaintext through the attachment key;
and the ciphertext decryption module is used for executing decryption operation on the text key ciphertext to obtain the text key.
9. An electronic mail processing device, applied to a mail sending end, includes:
the text ciphertext generating module is used for symmetrically encrypting a text plaintext and an attachment key by using a text key corresponding to the mail receiving end to obtain a text ciphertext;
the accessory ciphertext generating module is used for symmetrically encrypting an accessory plaintext through the accessory secret key to obtain an accessory ciphertext;
the text key ciphertext generating module is used for encrypting the text key to generate a text key ciphertext;
and the mail data packet sending module is used for sending the mail data packet at least containing the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end.
10. An electronic mail processing system, comprising:
the mail sending end is used for symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain a text ciphertext; symmetrically encrypting an accessory plaintext through the accessory secret key to obtain an accessory ciphertext; encrypting the text key to generate a text key ciphertext; sending an email data packet at least containing the text key ciphertext, the text ciphertext and the attachment ciphertext to the email receiving end;
the mail receiving end is used for receiving the mail data packet transmitted by the mail transmitting end; and executing decryption operation on the text key ciphertext to obtain the text key.
11. A computer-readable storage medium, characterized in that a computer program is stored thereon, which, when being executed by a processor, implements the steps of the method for email processing applied to a mail receiving end according to any one of claims 1 to 6 and/or implements the steps of the method for email processing applied to a mail sending end according to claim 7.
CN202110962540.8A 2021-08-20 2021-08-20 E-mail processing method, device, system and storage medium Active CN113642022B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110962540.8A CN113642022B (en) 2021-08-20 2021-08-20 E-mail processing method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110962540.8A CN113642022B (en) 2021-08-20 2021-08-20 E-mail processing method, device, system and storage medium

Publications (2)

Publication Number Publication Date
CN113642022A true CN113642022A (en) 2021-11-12
CN113642022B CN113642022B (en) 2023-07-25

Family

ID=78423208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110962540.8A Active CN113642022B (en) 2021-08-20 2021-08-20 E-mail processing method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN113642022B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172694A (en) * 2021-11-19 2022-03-11 卓望数码技术(深圳)有限公司 E-mail encryption and decryption method, system and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007053569A (en) * 2005-08-18 2007-03-01 Matsushita Electric Works Ltd Electronic mail security device and system therefor
CN101466079A (en) * 2009-01-12 2009-06-24 中兴通讯股份有限公司 Method, system and WAPI terminal for transmitting e-mail
US20090217027A1 (en) * 2008-02-21 2009-08-27 Zenlok Corporation Safe e-mail for everybody
US20090248808A1 (en) * 2008-03-28 2009-10-01 Kouichi Izumi Methods and Apparatus for Transmitting Attachments Using a Mail Send/Receive Program
CN101677300A (en) * 2008-09-18 2010-03-24 国际商业机器公司 Method for delivering E-mail messages and E-mail system
CN102170419A (en) * 2010-02-25 2011-08-31 北京邮电大学 A secure mail client system and a method thereof
CN105227570A (en) * 2015-10-19 2016-01-06 成都卫士通信息产业股份有限公司 A kind of safe e-mail system of integrated campaign
US20160380762A1 (en) * 2015-06-26 2016-12-29 Renesas Electronics Corporation Device, system, and method for providing data security, and program for allowing computer to execute the method
US9811525B1 (en) * 2013-03-14 2017-11-07 Facebook, Inc. Message and attachment deletion
CN108055271A (en) * 2017-12-21 2018-05-18 北京亿赛通科技发展有限责任公司 Encryption and decryption approaches, storage medium and the electronic equipment of Email
CN110169033A (en) * 2017-01-09 2019-08-23 微软技术许可有限责任公司 Enhanced E-mail service
CN111464494A (en) * 2020-02-26 2020-07-28 北京十安赛恩科技有限公司 E-mail encryption method, first client and block chain system
CN114650181A (en) * 2022-03-31 2022-06-21 西安电子科技大学 E-mail encryption and decryption method, system, equipment and computer readable storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007053569A (en) * 2005-08-18 2007-03-01 Matsushita Electric Works Ltd Electronic mail security device and system therefor
US20090217027A1 (en) * 2008-02-21 2009-08-27 Zenlok Corporation Safe e-mail for everybody
US20090248808A1 (en) * 2008-03-28 2009-10-01 Kouichi Izumi Methods and Apparatus for Transmitting Attachments Using a Mail Send/Receive Program
CN101677300A (en) * 2008-09-18 2010-03-24 国际商业机器公司 Method for delivering E-mail messages and E-mail system
CN101466079A (en) * 2009-01-12 2009-06-24 中兴通讯股份有限公司 Method, system and WAPI terminal for transmitting e-mail
CN102170419A (en) * 2010-02-25 2011-08-31 北京邮电大学 A secure mail client system and a method thereof
US9811525B1 (en) * 2013-03-14 2017-11-07 Facebook, Inc. Message and attachment deletion
US20160380762A1 (en) * 2015-06-26 2016-12-29 Renesas Electronics Corporation Device, system, and method for providing data security, and program for allowing computer to execute the method
CN105227570A (en) * 2015-10-19 2016-01-06 成都卫士通信息产业股份有限公司 A kind of safe e-mail system of integrated campaign
CN110169033A (en) * 2017-01-09 2019-08-23 微软技术许可有限责任公司 Enhanced E-mail service
CN108055271A (en) * 2017-12-21 2018-05-18 北京亿赛通科技发展有限责任公司 Encryption and decryption approaches, storage medium and the electronic equipment of Email
CN111464494A (en) * 2020-02-26 2020-07-28 北京十安赛恩科技有限公司 E-mail encryption method, first client and block chain system
CN114650181A (en) * 2022-03-31 2022-06-21 西安电子科技大学 E-mail encryption and decryption method, system, equipment and computer readable storage medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
张健;: "电子邮件的安全盾牌PGP" *
张健;: "电子邮件的安全盾牌PGP", 计算机与信息技术 *
汪凌锋等: "基于商用密码技术的电子邮件系统研究" *
龙毅宏;黄强;王维;: "电子邮件IBE加密研究" *
龙毅宏;黄强;王维;: "电子邮件IBE加密研究", 软件 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172694A (en) * 2021-11-19 2022-03-11 卓望数码技术(深圳)有限公司 E-mail encryption and decryption method, system and storage medium

Also Published As

Publication number Publication date
CN113642022B (en) 2023-07-25

Similar Documents

Publication Publication Date Title
CN101203025B (en) Method for transmitting and receiving safe mobile message
CN105376261B (en) Encryption method and system for instant messaging message
WO2008085579A2 (en) Method and system for deploying advanced cryptographic algorithms
US10135618B2 (en) Method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications
CN109951378B (en) File encryption transmission and sharing method in instant messaging
CN113642022B (en) E-mail processing method, device, system and storage medium
CN112637230B (en) Instant messaging method and system
CN104486756A (en) Encryption and decryption method and system for secret letter short message
CN111541603B (en) Independent intelligent safety mail terminal and encryption method
CN102740246A (en) Method, system, and device for processing media message
KR101695361B1 (en) Terminology encryption method using paring calculation and secret key
CN105743884A (en) Mail hiding method and mail hiding system
US9479928B2 (en) Cross-component message encryption
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content
US8983070B2 (en) Cross-component cryptographic message syntax message construction
CN109361506A (en) Information processing method
CN114650181A (en) E-mail encryption and decryption method, system, equipment and computer readable storage medium
CN104955037A (en) Communication encryption method and device for GSM (global system for mobile communications) mobile phones
Demirol et al. An android application to secure text messages
Abdelgader et al. Design of a secure file transfer system using hybrid encryption techniques
CN108900535A (en) Mail encryption method, device and computer readable storage medium
KR20000050057A (en) Secure shot message service method
CN113765933B (en) Traffic encryption and decryption method and computer readable storage medium
CN110890968B (en) Instant messaging method, device, equipment and computer readable storage medium
CN113676849B (en) Bluetooth short message confusion encryption method and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant