CN113642022B - E-mail processing method, device, system and storage medium - Google Patents

E-mail processing method, device, system and storage medium Download PDF

Info

Publication number
CN113642022B
CN113642022B CN202110962540.8A CN202110962540A CN113642022B CN 113642022 B CN113642022 B CN 113642022B CN 202110962540 A CN202110962540 A CN 202110962540A CN 113642022 B CN113642022 B CN 113642022B
Authority
CN
China
Prior art keywords
text
ciphertext
key
mail
attachment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110962540.8A
Other languages
Chinese (zh)
Other versions
CN113642022A (en
Inventor
尹一桦
王中武
汪凌峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Westone Information Industry Inc
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN202110962540.8A priority Critical patent/CN113642022B/en
Publication of CN113642022A publication Critical patent/CN113642022A/en
Application granted granted Critical
Publication of CN113642022B publication Critical patent/CN113642022B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present disclosure discloses an email processing method, device, system and storage medium. The text ciphertext of the mail data packet is obtained by encrypting the text plaintext and the attachment key together, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the electronic mail can be relatively ensured. In addition, the present disclosure also provides an email processing device, a system and a storage medium, and the beneficial effects are the same as described above.

Description

E-mail processing method, device, system and storage medium
Technical Field
The present disclosure relates to the field of computer communications, and in particular, to a method, apparatus, system, and storage medium for email processing.
Background
The E-mail is an information transmission means based on computer and communication network, and is used to transmit various information such as E-letter, digital fax, image and digital voice. The E-mail has the greatest characteristic that people can send and receive parts anywhere and at any time, so that the space-time limit is solved, the working efficiency is greatly improved, and great convenience is provided for office automation and business activities.
At present, various email products widely used in the market rarely adopt a password technology to carry out safety protection on email contents, namely email text and email attachments, but email text and email attachments which are generally transmitted on a network in a plaintext manner bring great potential safety hazards, and may cause leakage of email contents. In the case of encrypting and transmitting the content of the e-mail, when forwarding the attachment, the receiver needs to download the attachment to the local, which makes it difficult to ensure the forwarding efficiency of the e-mail.
Therefore, it is a problem that needs to be solved by those skilled in the art to provide an email processing method for improving the forwarding efficiency of email while ensuring the security of the email transmission process.
Disclosure of Invention
The invention aims to provide an email processing method, device, system and storage medium, so as to improve the forwarding efficiency of email while ensuring the security of the email transmission process.
In order to solve the above technical problems, the present disclosure provides an email processing method, applied to an email receiving end, including:
receiving a mail data packet transmitted by a mail transmitting end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, wherein the text ciphertext is obtained by symmetrically encrypting the text plaintext and the attachment key through the text key, and the attachment ciphertext is obtained by symmetrically encrypting the attachment plaintext through the attachment key;
and executing decryption operation on the text key ciphertext to obtain the text key.
Preferably, after performing a decryption operation on the text key ciphertext to obtain the text key, the method further comprises:
performing decryption operation on the text ciphertext by using the text key to obtain a text plaintext and an accessory key;
performing symmetric encryption operation on the text plaintext and the accessory key by using the new text key to obtain a new text ciphertext;
performing encryption operation on the new text key to obtain a new text key ciphertext;
And sending the forwarding mail data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end.
Preferably, performing an encryption operation on the new text key to obtain a new text key ciphertext includes:
and performing encryption operation on the new text key by using the public key of the forwarding receiving end to obtain a new text key ciphertext.
Preferably, the text key ciphertext is obtained by performing encryption operation on the text key based on a public key of the mail receiving end;
performing decryption operation on the text key ciphertext to obtain a text key, including:
and executing decryption operation on the text key ciphertext by using the local private key to obtain the text key.
Preferably, the mail data packet further contains a signature value; the signature value is obtained by performing signature operation on the text plaintext and the attachment key based on a private key of a mail sending end;
before performing the decryption operation on the body ciphertext using the body key, the method further comprises:
judging whether the signature value is a standard signature value or not based on the public key of the mail sending end;
and if the signature value is the standard signature value, executing the step of executing decryption operation on the text ciphertext by using the text key.
Preferably, before sending the forwarding email data packet at least including the new text ciphertext, the new text key ciphertext, and the attachment ciphertext to the forwarding receiving end, the method further includes:
Performing signature operation on the text plaintext and the accessory key by using the local private key to obtain a new signature value;
transmitting a forwarding mail data packet at least comprising a new text ciphertext, a new text key ciphertext and an attachment ciphertext to a forwarding receiving end, wherein the forwarding mail data packet comprises:
and sending the forwarding mail data packet containing the new signature value, the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end.
In addition, the present disclosure further provides an email processing method, applied to an email sending end, including:
symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain a text ciphertext;
symmetrically encrypting the attachment plaintext through the attachment key to obtain an attachment ciphertext;
encrypting the text key to generate a text key ciphertext;
and sending the mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to a mail receiving end.
In addition, the present disclosure also provides an email processing device, applied to an email receiving end, including:
the mail receiving module is used for receiving the mail data packet transmitted by the mail transmitting end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, wherein the text ciphertext is obtained by symmetrically encrypting the text plaintext and the attachment key through the text key, and the attachment ciphertext is obtained by symmetrically encrypting the attachment plaintext through the attachment key;
And the ciphertext decryption module is used for performing decryption operation on the text key ciphertext to obtain the text key.
In addition, the present disclosure also provides an email processing device, applied to an email sending end, including:
the text ciphertext generating module is used for symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain the text ciphertext;
the accessory ciphertext generating module is used for symmetrically encrypting the accessory plaintext through the accessory key to obtain accessory ciphertext;
the text key ciphertext generating module is used for encrypting the text key to generate a text key ciphertext;
and the mail data packet sending module is used for sending the mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to a mail receiving end.
In addition, the present disclosure also provides an email processing system, including:
the mail sending end is used for symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain the text ciphertext; symmetrically encrypting the attachment plaintext through the attachment key to obtain an attachment ciphertext; encrypting the text key to generate a text key ciphertext; sending a mail data packet at least comprising a text key ciphertext, a text ciphertext and an attachment ciphertext to a mail receiving end;
The mail receiving end is used for receiving the mail data packet transmitted by the mail transmitting end; and executing decryption operation on the text key ciphertext to obtain the text key.
In addition, the present disclosure further provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the e-mail processing method applied to the mail receiving end and/or implements the steps of the e-mail processing method applied to the mail sending end.
According to the E-mail processing method, a mail sending end symmetrically encrypts a text plaintext and an attachment key by using a text key corresponding to a mail receiving end to obtain a text ciphertext, and symmetrically encrypts the attachment plaintext by using the attachment key to obtain an attachment ciphertext, further encrypts the text key to generate the text key ciphertext, and sends a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, on the basis, the mail receiving end receives a mail data packet transmitted by the mail sending end, and performs decryption operation on the text key ciphertext to obtain the text key. The text ciphertext of the mail data packet is obtained by encrypting the text plaintext and the attachment key together, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the electronic mail can be relatively ensured. In addition, the present disclosure also provides an email processing device, a system and a storage medium, and the beneficial effects are the same as described above.
Drawings
For a clearer description of the disclosed embodiments, the drawings that are needed in the embodiments will be briefly described, it will be apparent that the drawings in the following description are only some embodiments of the present disclosure, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
Fig. 1 is a flowchart of an email processing method applied to an email receiving end according to an embodiment of the disclosure;
fig. 2 is a flowchart of an email processing method applied to an email receiving end according to an embodiment of the disclosure;
fig. 3 is a flowchart of an email processing method applied to an email sender according to an embodiment of the disclosure;
fig. 4 is a schematic diagram of encryption encapsulation of a mail sending end in an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an email processing device applied to an email receiving end according to an embodiment of the disclosure;
fig. 6 is a schematic structural diagram of an email processing device applied to a mail sending end according to an embodiment of the disclosure;
fig. 7 is a block diagram of an email processing device disclosed in an embodiment of the present disclosure.
Detailed Description
The following description of the technical solutions in the embodiments of the present disclosure will be made clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, but not all embodiments. Based on the embodiments in this disclosure, all other embodiments that a person of ordinary skill in the art would obtain without making any inventive effort are within the scope of this disclosure.
At present, various email products widely used in the market rarely adopt a password technology to carry out safety protection on email contents, namely email text and email attachments, but email text and email attachments which are generally transmitted on a network in a plaintext manner bring great potential safety hazards, and may cause leakage of email contents. In the case of encrypting and transmitting the content of the e-mail in the prior art, the mail receiver needs to further forward the attachment on the basis of downloading the mail attachment to the local of the receiver, so that the forwarding efficiency of the e-mail is difficult to ensure.
Therefore, it is a core of the present disclosure to provide an email processing method to improve the forwarding efficiency of email while ensuring the security of the email transmission process.
In order that those skilled in the art will better understand the present disclosure, the disclosure will be described in further detail with reference to the drawings and detailed description.
Referring to fig. 1, an embodiment of the disclosure discloses an email processing method, which is applied to an email receiving end and includes:
step S10: and receiving the mail data packet transmitted by the mail transmitting end.
The mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, wherein the text ciphertext is obtained by symmetrically encrypting the text plaintext and the attachment key through the text key, and the attachment ciphertext is obtained by symmetrically encrypting the attachment plaintext through the attachment key.
It should be noted that, the execution body of the embodiment is a mail receiving end for receiving a mail packet of a mail sending end, and is essentially a network device terminal with an email receiving function. The mail sending end and the mail receiving end are relatively equipment terminals, and when the mail receiving end sends a mail data packet to other terminals, the mail receiving end is the mail sending end relative to the other terminals, and the other terminals are corresponding mail receiving ends.
The mail receiving terminal firstly receives a mail data packet transmitted by the mail transmitting terminal, wherein the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext. The key point of the embodiment is that the text ciphertext is obtained by symmetrically encrypting the text plaintext and the attachment key through the text key, that is, the text plaintext and the attachment key are carried in the text ciphertext, and the attachment key can decrypt the attachment ciphertext to obtain the attachment plaintext, so that when the mail receiving end forwards the attachment ciphertext, only the text plaintext and the attachment key after decrypting the text ciphertext need to be encrypted for the forwarding receiving end, the forwarding receiving end can decrypt and obtain the attachment key, and the attachment ciphertext is normally decrypted by using the attachment key to obtain the attachment plaintext, and the attachment ciphertext does not need to be downloaded to the local for decryption and re-encryption.
In addition, the text key in this embodiment is obtained by negotiating between the mail receiving end and the mail sending end in advance, that is, the mail receiving end has a key capable of decrypting the text ciphertext. Therefore, the security of text plaintext only can be relatively ensured.
Step S11: and executing decryption operation on the text key ciphertext to obtain the text key.
After receiving the mail data packet transmitted by the mail transmitting end, the mail receiving end further executes decryption operation on the text key ciphertext to obtain the text key, so that the text ciphertext can be further decrypted based on the text key, and the text plaintext and the attachment key can be obtained on the basis. On the basis of obtaining the text plaintext and the attachment key, the mail receiving end can forward the mail data packet or check the content of the attachment plaintext according to actual requirements. When the mail data packet is forwarded, the forwarding mail data packet is further formed based on the text key, the text ciphertext and the attachment ciphertext so as to perform forwarding operation; and when the plaintext of the accessory is checked, the ciphertext of the accessory is decrypted by utilizing the accessory key.
According to the E-mail processing method, a mail sending end symmetrically encrypts a text plaintext and an attachment key by using a text key corresponding to a mail receiving end to obtain a text ciphertext, and symmetrically encrypts the attachment plaintext by using the attachment key to obtain an attachment ciphertext, further encrypts the text key to generate the text key ciphertext, and sends a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, on the basis, the mail receiving end receives a mail data packet transmitted by the mail sending end, and performs decryption operation on the text key ciphertext to obtain the text key. The text ciphertext of the mail data packet is obtained by encrypting the text plaintext and the attachment key together, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the electronic mail can be relatively ensured.
On the basis of the above embodiment, as a preferred implementation manner, the text key ciphertext is obtained by performing encryption operation on the text key based on the public key of the mail receiving end;
performing decryption operation on the text key ciphertext to obtain a text key, including:
and executing decryption operation on the text key ciphertext by using the local private key to obtain the text key.
It should be noted that, in this embodiment, the text key ciphertext is obtained by performing an encryption operation on the text key by using the public key of the mail receiving end in an asymmetric encryption manner, and then the mail receiving end performs a decryption operation on the text key ciphertext by using the local private key when performing a decryption operation on the text key ciphertext. The embodiment can further improve the security of the text key ciphertext.
Referring to fig. 2, an embodiment of the disclosure discloses an email processing method, which is applied to an email receiving end and includes:
step S20: and receiving the mail data packet transmitted by the mail transmitting end.
The mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, wherein the text ciphertext is obtained by symmetrically encrypting the text plaintext and the attachment key through the text key, and the attachment ciphertext is obtained by symmetrically encrypting the attachment plaintext through the attachment key.
Step S21: and executing decryption operation on the text key ciphertext to obtain the text key.
Step S22: and executing decryption operation on the text ciphertext by using the text key to obtain the text plaintext and the accessory key.
After the decryption operation is performed on the text key ciphertext to obtain the text key, the decryption operation is further performed on the text ciphertext by using the text key to obtain the text plaintext and the accessory key, so that the text plaintext and the accessory key are further packaged by using the new text key in the subsequent steps.
Step S23: and performing symmetric encryption operation on the text plaintext and the accessory key by using the new text key to obtain a new text ciphertext.
After the text cipher text is decrypted by the text key to obtain the text plaintext and the attachment key, the step further uses the new text key to perform symmetric encryption operation on the text plaintext and the attachment key to obtain the new text cipher text, and the new text cipher text is used for being further sent to a forwarding receiving end as the content in the forwarding mail data packet.
Step S24: and performing encryption operation on the new text key to obtain a new text key ciphertext.
After the new text key is obtained, further performing encryption operation on the new text key to obtain a new text key ciphertext, so that the new text key ciphertext is used for further sending the content in the subsequent forwarding mail data packet to a forwarding receiving end.
Step S25: and sending the forwarding mail data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end.
After the new text ciphertext, the new text key ciphertext and the attachment ciphertext are obtained, the step further sends a forwarding mail data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end, so that the mail data packet transmitted by the mail sending end is converted into a forwarding mail data packet and forwarded to the forwarding receiving end on the premise that the attachment ciphertext is not downloaded locally and re-encrypted. The embodiment further ensures the forwarding efficiency of the e-mail.
On the basis of the foregoing embodiment, as a preferred implementation manner, performing an encryption operation on the new text key to obtain a new text key ciphertext, including:
and performing encryption operation on the new text key by using the public key of the forwarding receiving end to obtain a new text key ciphertext.
It should be noted that, in this embodiment, the key point of this embodiment is that the mail receiving end performs encryption operation on the new text key by using the public key of the forwarding receiving end in an asymmetric encryption manner to obtain a new text key ciphertext, and transmits the new text key ciphertext to the forwarding receiving end, so that after the forwarding receiving end receives the new text key ciphertext, the forwarding receiving end can decrypt the new text key ciphertext further based on its own local private key, thereby obtaining a new text key, and further implementing forwarding of the forwarding mail packet based on the new text key, or restore the forwarding mail packet to a text plaintext and an attachment plaintext based on the new text key.
Based on the above series of examples, as a preferred implementation manner, the mail data packet further includes a signature value; the signature value is obtained by performing signature operation on the text plaintext and the attachment key based on a private key of a mail sending end;
before performing the decryption operation on the body ciphertext using the body key, the method further comprises:
judging whether the signature value is a standard signature value or not based on the public key of the mail sending end;
and if the signature value is the standard signature value, executing the step of executing decryption operation on the text ciphertext by using the text key.
It should be noted that, in this embodiment, the mail data packet received by the mail receiving end and transmitted by the mail sending end further includes a signature value, where the signature value is obtained by performing a signature operation on the text plaintext and the attachment key based on the private key of the mail sending end, and is used for verifying whether the text plaintext and the attachment key are tampered, and before performing a decryption operation on the text ciphertext by using the text key, whether the signature value is a standard signature value is first determined based on the public key of the mail sending end, that is, the signature value is checked by using the public key of the mail sending end, and when the signature value is the standard signature value, it is explained that the text ciphertext is not tampered, and further performing a step of performing a decryption operation on the text by using the text key, thereby relatively improving the reliability of using the mail data packet.
Alternatively, the signature value may be obtained by performing a signature operation on the hash value of the text plaintext and the attachment key based on the private key of the mail sender. Since the hash value is equivalent to the result of extracting the characteristics of the text plaintext and the attachment key, the operation amount of signing the text plaintext and the attachment key based on the private key of the mail sending end can be relatively reduced.
Further, as a preferred embodiment, before sending the forwarding email data packet at least including the new text ciphertext, the new text key ciphertext, and the attachment ciphertext to the forwarding receiving end, the method further includes:
performing signature operation on the text plaintext and the accessory key by using the local private key to obtain a new signature value;
transmitting a forwarding mail data packet at least comprising a new text ciphertext, a new text key ciphertext and an attachment ciphertext to a forwarding receiving end, wherein the forwarding mail data packet comprises:
and sending the forwarding mail data packet containing the new signature value, the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end.
The key point of the embodiment is that the mail receiving end uses the local private key to execute signature operation on the text plaintext and the attachment key to obtain a new signature value, and then sends a forwarding mail data packet containing the new signature value, the new text ciphertext, the new text key ciphertext and the attachment ciphertext to the forwarding receiving end, so as to ensure that the forwarding receiving end can check the new signature value based on the public key of the mail receiving end, thereby judging whether the new text ciphertext is tampered or not, and further improving the reliability of using the forwarding mail data packet.
Referring to fig. 3, an embodiment of the disclosure discloses an email processing method, which is applied to an email sending end and includes:
step S30: and symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain the text ciphertext.
Step S31: and symmetrically encrypting the attachment plaintext through the attachment key to obtain the attachment ciphertext.
Step S32: and encrypting the text key to generate a text key ciphertext.
Step S33: and sending the mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to a mail receiving end.
According to the E-mail processing method, a mail sending end symmetrically encrypts a text plaintext and an attachment key by using a text key corresponding to a mail receiving end to obtain a text ciphertext, and symmetrically encrypts the attachment plaintext by using the attachment key to obtain an attachment ciphertext, further encrypts the text key to generate the text key ciphertext, and sends a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, on the basis, the mail receiving end receives a mail data packet transmitted by the mail sending end, and performs decryption operation on the text key ciphertext to obtain the text key. The text ciphertext of the mail data packet is obtained by encrypting the text plaintext and the attachment key together, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the electronic mail can be relatively ensured.
In order to enhance understanding of the above embodiments of the present disclosure, the present disclosure further provides a scene embodiment in a specific application scenario.
Fig. 4 is a schematic diagram of encryption encapsulation of a mail sending end in an embodiment of the present disclosure. As shown in fig. 4, the mail sending end adopts different encryption keys to encrypt and encapsulate the mail text and the mail attachment respectively, so that the processed mail content forms two parts of attachment ciphertext and text ciphertext. Meanwhile, the text of the mail is expanded, the plaintext of the attachment key is used as an expansion part of the text, and the text key is used for encryption protection, so that the ciphertext package of the mail text comprises the text, the signature value of the attachment key, ciphertext data of the text and the attachment key, and ciphertext of the text key protected by a public key of a mail receiving end.
By the mail after encryption and encapsulation, the attachment and the text adopt different encryption keys, and the attachment key and the text are encapsulated together, so that the attachment and the text have greater independence. The user uses the private key to decrypt the text key ciphertext to obtain the text key SK, and then combines the expanded mail text ciphertext to obtain the mail text plaintext and the mail attachment key SK', so as to obtain the plaintext of the mail attachment.
The sending, receiving and forwarding flow of the mail is described as follows:
1) Mail sending end:
a. the mail sending end generates a text key SK and an accessory key SK';
b. calculating a hash value for the mail body and the attachment key SK';
c. signing the hash value of the text plaintext and the attachment key SK' of the mail by using a private key of a sender to form a mail signature value;
d. encrypting the mail text plaintext and the attachment key SK' by using the text key SK to form an expanded mail text encryption ciphertext;
e. encrypting the mail attachment by using the attachment key SK' to form a mail attachment ciphertext;
f. encrypting the text key by using the public key of the receiver to form a text key ciphertext;
g. the mail text encryption ciphertext, the mail attachment encryption ciphertext, the mail signature value and the text key ciphertext are packaged and then sent to a mail receiver;
2) Mail receiving end:
a. the mail receiver uses the public key of the sender certificate to verify the mail signature value and determine the authenticity of the mail source;
b. the mail receiver decrypts the ciphertext of the text key by using the private key of the mail receiver to obtain the text key;
c. decrypting the expanded mail text ciphertext by using the text key, acquiring and viewing the mail text plaintext, and acquiring an attachment key, wherein the user can not select to download the mail attachment;
d. When the mail is forwarded, a forwarder signs the text plaintext of the forwarded mail and the hash value of the attachment key by using the private key of the forwarder to form a new mail signature value;
e. the forwarder encrypts the mail text plaintext and the attachment key by using the new text key to form a mail text ciphertext;
f. the forwarder encrypts the text key by using the public key of the next receiver to form a text key ciphertext;
g. the forwarder sends the mail text ciphertext, the mail attachment (without downloading the local) in the original received mail, the new mail signature value and the encrypted ciphertext of the text key to the next receiver;
h. after receiving the mail, the new receiver determines the authenticity of the sender of the mail through public key verification, decrypts the ciphertext of the text key through the private key to obtain the text key, and further decrypts to obtain the text plaintext of the mail and the mail attachment key. And decrypting the attachment plaintext of the mail through the attachment key.
Referring to fig. 5, an embodiment of the present disclosure provides an email processing apparatus 100, applied to a mail receiving end, including:
a mail receiving module 110, configured to receive a mail packet sent by a mail sending end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, wherein the text ciphertext is obtained by symmetrically encrypting the text plaintext and the attachment key through the text key, and the attachment ciphertext is obtained by symmetrically encrypting the attachment plaintext through the attachment key;
The ciphertext decrypting module 120 is configured to perform a decrypting operation on the text key ciphertext to obtain the text key.
Furthermore, as a preferred embodiment, the apparatus further comprises:
the text ciphertext decrypting module is used for decrypting the text ciphertext by using the text key to obtain a text plaintext and an accessory key;
the new text ciphertext generating module is used for performing symmetric encryption operation on the text plaintext and the accessory key by utilizing the new text key to obtain a new text ciphertext;
the new text key encryption module is used for performing encryption operation on the new text key to obtain a new text key ciphertext;
and the data packet forwarding module is used for sending the forwarding mail data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to the forwarding receiving end.
Furthermore, as a preferred embodiment, the new text key encryption module includes:
and the new text key public key encryption module is used for performing encryption operation on the new text key by using the public key of the forwarding receiving end to obtain a new text key ciphertext.
In addition, as a preferred implementation manner, the text key ciphertext is obtained by performing encryption operation on the text key based on the public key of the mail receiving end;
Ciphertext decryption module 120 may comprise:
and the ciphertext private key decryption module is used for performing decryption operation on the text key ciphertext by using the local private key to obtain the text key.
In addition, as a preferred embodiment, the mail data packet further includes a signature value; the signature value is obtained by performing signature operation on the text plaintext and the attachment key based on a private key of a mail sending end;
the apparatus further comprises:
and the judging module is used for judging whether the signature value is a standard signature value based on the public key of the mail sending end, and if yes, the text ciphertext decrypting module is called.
Furthermore, as a preferred embodiment, the apparatus further comprises:
the new signature generation module is used for executing signature operation on the text plaintext and the accessory key by utilizing the local private key to obtain a new signature value;
a packet forwarding module comprising:
and the data packet forwarding sub-module is used for sending the forwarding mail data packet containing the new signature value, the new text ciphertext, the new text key ciphertext and the attachment ciphertext to the forwarding receiving end.
The electronic mail processing device is applied to a mail receiving end, a mail sending end symmetrically encrypts a text plaintext and an attachment key by utilizing a text key corresponding to the mail receiving end to obtain a text ciphertext, the attachment plaintext is symmetrically encrypted by the attachment key to obtain an attachment ciphertext, the text key is further encrypted to generate the text key ciphertext, a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext is sent to the mail receiving end, and on the basis, the mail receiving end receives a mail data packet transmitted by the mail sending end and carries out decryption operation on the text key ciphertext to obtain the text key. The text ciphertext of the mail data packet is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the electronic mail can be relatively ensured.
Referring to fig. 6, an embodiment of the present disclosure provides an email processing device 200, applied to a mail sending end, including:
the text ciphertext generating module 210 is configured to symmetrically encrypt the text plaintext and the attachment key by using a text key corresponding to the mail receiving end to obtain a text ciphertext;
the accessory ciphertext generating module 220 is configured to symmetrically encrypt the accessory plaintext by using the accessory key to obtain an accessory ciphertext;
the text key ciphertext generating module 230 is configured to encrypt the text key to generate a text key ciphertext;
the mail data packet sending module 240 is configured to send a mail data packet at least including a text key ciphertext, a text ciphertext, and an attachment ciphertext to a mail receiving end.
The electronic mail processing device is applied to a mail sending end, the mail sending end symmetrically encrypts a text plaintext and an attachment key by utilizing a text key corresponding to a mail receiving end to obtain a text ciphertext, the attachment plaintext is symmetrically encrypted by the attachment key to obtain an attachment ciphertext, the text key is further encrypted to generate the text key ciphertext, a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext is sent to the mail receiving end, and on the basis, the mail receiving end receives a mail data packet transmitted by the mail sending end and carries out decryption operation on the text key ciphertext to obtain the text key. The text ciphertext of the mail data packet is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the electronic mail can be relatively ensured.
Fig. 7 is a block diagram of an email processing device 300 according to an example embodiment. As shown in fig. 7, the electronic mail processing apparatus 300 may include: a processor 301, a memory 302. The email processing device 300 may also include one or more of a multimedia component 303, an input/output (I/O) interface 304, and a communication component 305.
The processor 301 is configured to control the overall operation of the electronic mail processing device 300 to perform all or part of the steps of the electronic mail processing method applied to the mail receiving end and/or the mail sending end. The memory 302 is used to store various types of data to support operation at the email processing device 300, which may include, for example, instructions for any application or method operating on the email processing device 300, as well as application related data such as contact data, messaging, pictures, audio, video, and the like. The Memory 302 may be implemented by any type or combination of volatile or non-volatile Memory devices, such as static random access Memory (Static Random Access Memory, SRAM for short), electrically erasable programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM for short), erasable programmable Read-Only Memory (Erasable Programmable Read-Only Memory, EPROM for short), programmable Read-Only Memory (Programmable Read-Only Memory, PROM for short), read-Only Memory (ROM for short), magnetic Memory, flash Memory, magnetic disk, or optical disk. The multimedia component 303 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen, the audio component being for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signals may be further stored in the memory 302 or transmitted through the communication component 305. The audio assembly further comprises at least one speaker for outputting audio signals. The I/O interface 304 provides an interface between the processor 301 and other interface modules, which may be a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 305 is used for wired or wireless communication between the email processing device 300 and other devices. Wireless communication, such as Wi-Fi, bluetooth, near field communication (Near Field Communication, NFC for short), 2G, 3G or 4G, or a combination of one or more thereof, the corresponding communication component 305 may thus comprise: wi-Fi module, bluetooth module, NFC module.
In an exemplary embodiment, the email processing device 300 may be implemented by one or more application specific integrated circuits (Application Specific Integrated Circuit, abbreviated ASIC), digital signal processor (Digital Signal Processor, abbreviated DSP), digital signal processing device (Digital Signal Processing Device, abbreviated DSPD), programmable logic device (Programmable Logic Device, abbreviated PLD), field programmable gate array (Field Programmable Gate Array, abbreviated FPGA), controller, microcontroller, microprocessor, or other electronic component for performing the email processing method described above as being applied to the email receiving side and/or the email sending side.
In another exemplary embodiment, there is also provided a computer readable storage medium including program instructions which, when executed by a processor, implement the steps of the above-described email processing method applied to a mail receiving side and/or a mail sending side. For example, the computer readable storage medium may be the memory 302 including program instructions described above, which are executable by the processor 301 of the electronic mail processing device 300 to perform the electronic mail processing method applied to the mail receiving end and/or the mail sending end described above.
In addition, the present disclosure also discloses an email processing system, including:
the mail sending end is used for symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain the text ciphertext; symmetrically encrypting the attachment plaintext through the attachment key to obtain an attachment ciphertext; encrypting the text key to generate a text key ciphertext; sending a mail data packet at least comprising a text key ciphertext, a text ciphertext and an attachment ciphertext to a mail receiving end;
the mail receiving end is used for receiving the mail data packet transmitted by the mail transmitting end; and executing decryption operation on the text key ciphertext to obtain the text key.
According to the email processing system provided by the disclosure, a mail sending end symmetrically encrypts a text plaintext and an attachment key by using a text key corresponding to a mail receiving end to obtain a text ciphertext, and symmetrically encrypts the attachment plaintext by using the attachment key to obtain an attachment ciphertext, further encrypts the text key to generate the text key ciphertext, and sends an email data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, on the basis, the mail receiving end receives an email data packet transmitted by the mail sending end, and performs decryption operation on the text key ciphertext to obtain the text key. The text ciphertext of the mail data packet is obtained by encrypting the text plaintext and the attachment key together, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the transmission process of the electronic mail can be relatively ensured.
In addition, the present disclosure further provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the e-mail processing method applied to the mail receiving end and/or implements the steps of the e-mail processing method applied to the mail sending end.
The computer readable storage medium provided by the disclosure is characterized in that a mail sending end symmetrically encrypts a text plaintext and an attachment key by using a text key corresponding to a mail receiving end to obtain a text ciphertext, and symmetrically encrypts the attachment plaintext by using the attachment key to obtain an attachment ciphertext, further encrypts the text key to generate the text key ciphertext, and sends a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, and on the basis, the mail receiving end receives a mail data packet transmitted by the mail sending end and performs decryption operation on the text key ciphertext to obtain the text key. The text ciphertext of the mail data packet in the computer readable storage medium is obtained by jointly encrypting the text plaintext and the attachment key, the attachment ciphertext is obtained by encrypting the attachment plaintext based on the attachment key, and the text key is encrypted to generate the text key ciphertext, so that the safety of the E-mail transmission process can be relatively ensured.
The method, the device, the system and the storage medium for processing the e-mail provided by the present disclosure are described in detail above. In the description, each embodiment is described in a progressive manner, and each embodiment is mainly described by the differences from other embodiments, so that the same similar parts among the embodiments are mutually referred. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section. It should be noted that it would be apparent to those skilled in the art that various improvements and modifications could be made to the present disclosure without departing from the principles of the present disclosure, and such improvements and modifications would be within the scope of the claims of the present disclosure.
It should also be noted that in this specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. An email processing method, which is applied to an email receiving end, comprises:
receiving a mail data packet transmitted by a mail transmitting end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, wherein the text ciphertext is obtained by symmetrically encrypting a text plaintext and an attachment key through the text key, and the attachment ciphertext is obtained by symmetrically encrypting an attachment plaintext through the attachment key;
performing decryption operation on the text key ciphertext to obtain the text key;
performing decryption operation on the text ciphertext by using the text key to obtain the text plaintext and the accessory key; performing symmetric encryption operation on the text plaintext by using a new text key and the accessory key to obtain a new text ciphertext; performing encryption operation on the new text key to obtain a new text key ciphertext; and sending a forwarding mail data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end.
2. The method for processing an e-mail according to claim 1, wherein said performing an encryption operation on said new text key to obtain a new text key ciphertext comprises:
And executing encryption operation on the new text key by using the public key of the forwarding receiving end to obtain the new text key ciphertext.
3. The method according to claim 1, wherein the text key ciphertext is obtained by performing an encryption operation on the text key based on a public key of the mail receiving end;
and executing decryption operation on the text key ciphertext to obtain the text key, wherein the method comprises the following steps:
and executing decryption operation on the text key ciphertext by using a local private key to obtain the text key.
4. A method of email processing according to any one of claims 1 to 3, wherein the email data packet further comprises a signature value; the signature value is obtained by executing signature operation on the text plaintext and the accessory key based on a private key of the mail sending end;
before said performing a decryption operation on said body cipher text using said body key, said method further comprises:
judging whether the signature value is a standard signature value or not based on the public key of the mail sending end;
and if the signature value is a standard signature value, executing the step of executing decryption operation on the text ciphertext by using the text key.
5. The method according to claim 4, wherein before said forwarding email data packet including at least said new body cipher text, said new body key cipher text, and said attachment cipher text is transmitted to said forwarding receiver, said method further comprises:
performing signature operation on the text plaintext and the accessory key by using a local private key to obtain a new signature value;
the step of sending the forwarding email data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to the forwarding receiving end comprises the following steps:
and sending the forwarding mail data packet containing the new signature value, the new text ciphertext, the new text key ciphertext and the attachment ciphertext to the forwarding receiving end.
6. An email processing method, which is applied to an email sending end, comprises the following steps:
symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain a text ciphertext;
symmetrically encrypting the accessory plaintext through the accessory key to obtain an accessory ciphertext;
encrypting the text key to generate a text key ciphertext;
Sending a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, wherein the mail receiving end executes decryption operation on the text key ciphertext to obtain a text key; performing decryption operation on the text ciphertext by using the text key to obtain a text plaintext and an accessory key; performing symmetric encryption operation on the text plaintext and the accessory key by using the new text key to obtain a new text ciphertext; performing encryption operation on the new text key to obtain a new text key ciphertext; and sending the forwarding mail data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end.
7. An electronic mail processing apparatus, applied to a mail receiving end, comprising:
the mail receiving module is used for receiving the mail data packet transmitted by the mail transmitting end; the mail data packet at least comprises a text key ciphertext, a text ciphertext and an attachment ciphertext, wherein the text ciphertext is obtained by symmetrically encrypting a text plaintext and an attachment key through the text key, and the attachment ciphertext is obtained by symmetrically encrypting an attachment plaintext through the attachment key;
The ciphertext decryption module is used for performing decryption operation on the text key ciphertext to obtain the text key;
performing decryption operation on the text ciphertext by using the text key to obtain the text plaintext and the accessory key; performing symmetric encryption operation on the text plaintext by using a new text key and the accessory key to obtain a new text ciphertext; performing encryption operation on the new text key to obtain a new text key ciphertext; and sending a forwarding mail data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end.
8. An electronic mail processing apparatus, applied to a mail sending end, comprising:
the text ciphertext generating module is used for symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain the text ciphertext;
the accessory ciphertext generating module is used for symmetrically encrypting the accessory plaintext through the accessory key to obtain the accessory ciphertext;
the text key ciphertext generating module is used for encrypting the text key to generate a text key ciphertext;
the mail data packet sending module is used for sending a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end, and the mail receiving end executes decryption operation on the text key ciphertext to obtain a text key; performing decryption operation on the text ciphertext by using the text key to obtain a text plaintext and an accessory key; performing symmetric encryption operation on the text plaintext and the accessory key by using the new text key to obtain a new text ciphertext; performing encryption operation on the new text key to obtain a new text key ciphertext; and sending the forwarding mail data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end.
9. An email processing system, comprising:
the mail sending end is used for symmetrically encrypting the text plaintext and the attachment key by using the text key corresponding to the mail receiving end to obtain the text ciphertext; symmetrically encrypting the accessory plaintext through the accessory key to obtain an accessory ciphertext; encrypting the text key to generate a text key ciphertext; sending a mail data packet at least comprising the text key ciphertext, the text ciphertext and the attachment ciphertext to the mail receiving end;
the mail receiving end is used for receiving the mail data packet transmitted by the mail transmitting end; performing decryption operation on the text key ciphertext to obtain the text key; performing decryption operation on the text ciphertext by using the text key to obtain a text plaintext and an accessory key; performing symmetric encryption operation on the text plaintext and the accessory key by using the new text key to obtain a new text ciphertext; performing encryption operation on the new text key to obtain a new text key ciphertext; and sending the forwarding mail data packet at least comprising the new text ciphertext, the new text key ciphertext and the attachment ciphertext to a forwarding receiving end.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the e-mail processing method according to any one of claims 1 to 5 applied to a mail receiving end and/or implements the steps of the e-mail processing method according to claim 6 applied to a mail transmitting end.
CN202110962540.8A 2021-08-20 2021-08-20 E-mail processing method, device, system and storage medium Active CN113642022B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110962540.8A CN113642022B (en) 2021-08-20 2021-08-20 E-mail processing method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110962540.8A CN113642022B (en) 2021-08-20 2021-08-20 E-mail processing method, device, system and storage medium

Publications (2)

Publication Number Publication Date
CN113642022A CN113642022A (en) 2021-11-12
CN113642022B true CN113642022B (en) 2023-07-25

Family

ID=78423208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110962540.8A Active CN113642022B (en) 2021-08-20 2021-08-20 E-mail processing method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN113642022B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172694A (en) * 2021-11-19 2022-03-11 卓望数码技术(深圳)有限公司 E-mail encryption and decryption method, system and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466079A (en) * 2009-01-12 2009-06-24 中兴通讯股份有限公司 Method, system and WAPI terminal for transmitting e-mail
CN102170419A (en) * 2010-02-25 2011-08-31 北京邮电大学 A secure mail client system and a method thereof
CN111464494A (en) * 2020-02-26 2020-07-28 北京十安赛恩科技有限公司 E-mail encryption method, first client and block chain system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007053569A (en) * 2005-08-18 2007-03-01 Matsushita Electric Works Ltd Electronic mail security device and system therefor
US20090217027A1 (en) * 2008-02-21 2009-08-27 Zenlok Corporation Safe e-mail for everybody
US20090248808A1 (en) * 2008-03-28 2009-10-01 Kouichi Izumi Methods and Apparatus for Transmitting Attachments Using a Mail Send/Receive Program
CN101677300A (en) * 2008-09-18 2010-03-24 国际商业机器公司 Method for delivering E-mail messages and E-mail system
US9811525B1 (en) * 2013-03-14 2017-11-07 Facebook, Inc. Message and attachment deletion
JP6503242B2 (en) * 2015-06-26 2019-04-17 ルネサスエレクトロニクス株式会社 Apparatus, system and method for providing data security and program for causing a computer to execute the method
CN105227570B (en) * 2015-10-19 2019-02-15 成都卫士通信息产业股份有限公司 A kind of safe e-mail system of integrated campaign
US10419448B2 (en) * 2017-01-09 2019-09-17 Microsoft Technology Licensing, Llc Enhanced email service
CN108055271B (en) * 2017-12-21 2021-06-29 北京亿赛通科技发展有限责任公司 Encryption and decryption method for electronic mail, storage medium and electronic equipment
CN114650181B (en) * 2022-03-31 2023-06-09 西安电子科技大学 E-mail encryption and decryption method, system, equipment and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466079A (en) * 2009-01-12 2009-06-24 中兴通讯股份有限公司 Method, system and WAPI terminal for transmitting e-mail
CN102170419A (en) * 2010-02-25 2011-08-31 北京邮电大学 A secure mail client system and a method thereof
CN111464494A (en) * 2020-02-26 2020-07-28 北京十安赛恩科技有限公司 E-mail encryption method, first client and block chain system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
电子邮件IBE加密研究;龙毅宏;黄强;王维;;软件(第02期) *
电子邮件的安全盾牌PGP;张健;;计算机与信息技术(第08期) *

Also Published As

Publication number Publication date
CN113642022A (en) 2021-11-12

Similar Documents

Publication Publication Date Title
US10009321B2 (en) Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication
KR101725847B1 (en) Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks
US20080130895A1 (en) Method and System for Deploying Advanced Cryptographic Algorithms
CN105376261B (en) Encryption method and system for instant messaging message
EP3476078A1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN112637230B (en) Instant messaging method and system
CN111181944B (en) Communication system, information distribution method, device, medium, and apparatus
CN109951378B (en) File encryption transmission and sharing method in instant messaging
CN113642022B (en) E-mail processing method, device, system and storage medium
CN109005151A (en) A kind of encryption of information, decryption processing method and processing terminal
CN113965382A (en) Tamper-proof method for bidding supervision list data encryption algorithm
KR101695361B1 (en) Terminology encryption method using paring calculation and secret key
CN107343001B (en) Data processing method and device
US8983070B2 (en) Cross-component cryptographic message syntax message construction
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content
EP2453616B1 (en) Cross-component message encryption
CN115086048A (en) Data processing method and device, electronic equipment and readable storage medium
CN104955037A (en) Communication encryption method and device for GSM (global system for mobile communications) mobile phones
Demirol et al. An android application to secure text messages
CN113765933B (en) Traffic encryption and decryption method and computer readable storage medium
CN113852469B (en) Method, device, equipment and readable storage medium for transmitting data between block chain nodes
CN110601841B (en) SM2 collaborative signature and decryption method and device
CN110890968B (en) Instant messaging method, device, equipment and computer readable storage medium
CN114978699B (en) Data encryption and data decryption methods, devices, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant