CN114513482B - Email management method and system based on block chain - Google Patents

Email management method and system based on block chain Download PDF

Info

Publication number
CN114513482B
CN114513482B CN202210023959.1A CN202210023959A CN114513482B CN 114513482 B CN114513482 B CN 114513482B CN 202210023959 A CN202210023959 A CN 202210023959A CN 114513482 B CN114513482 B CN 114513482B
Authority
CN
China
Prior art keywords
mail
email
trusted
mobile terminal
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210023959.1A
Other languages
Chinese (zh)
Other versions
CN114513482A (en
Inventor
蒋旺奇
刘奎阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Li Zuer
Original Assignee
Deming Shangpin Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deming Shangpin Technology Group Co ltd filed Critical Deming Shangpin Technology Group Co ltd
Priority to CN202210023959.1A priority Critical patent/CN114513482B/en
Publication of CN114513482A publication Critical patent/CN114513482A/en
Application granted granted Critical
Publication of CN114513482B publication Critical patent/CN114513482B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Abstract

The invention provides a block chain-based email management method and system, which are used for screening emails by analyzing received emails to obtain source information of the emails and marking the emails; the marked E-mail is encrypted and then stored into a blockchain of a value server, so that the E-mail is stored in a high-safety way, and the E-mail is effectively prevented from being lost or stolen; the method and the system have the advantages that the catalog information corresponding to the electronic mails is sent to the mobile terminal, so that a user can conveniently select the electronic mails needing to be checked on the mobile terminal, and the corresponding electronic mails are called from the blockchain and fed back to the mobile terminal, so that the situation that a large number of electronic mails are simultaneously sent to the mobile terminal to cause incapability of being checked normally is avoided, meanwhile, the electronic mails can be checked rapidly on the premise that the storage space is not required to be provided for the mobile terminal, and accordingly the safety and the reliability of receiving and sending the electronic mails are greatly improved.

Description

Email management method and system based on block chain
Technical Field
The invention relates to the technical field of email data management, in particular to an email management method and system based on a block chain.
Background
Electronic mailboxes have become a major way of transferring documents due to the real-time nature of their email delivery. The user can package and send the corresponding text data or the attachments in other file forms to the electronic mailbox of other users by utilizing the electronic mailbox. However, the existing email boxes all require users to directly log in the corresponding clients of the email boxes to send and receive the email, and the email in the email boxes is generally sent and received directly without corresponding email filtering processing and email encryption processing, which easily causes the situation that the clients are poisoned or email leaks, thereby greatly reducing the sending and receiving security of the email.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention provides a block chain-based email management method and a block chain-based email management system, which are used for analyzing received emails to obtain source information of the emails and marking the emails so as to screen the emails; the marked E-mail is encrypted and then stored into a blockchain of a value server, so that the E-mail is stored in a high-safety way, and the E-mail is effectively prevented from being lost or stolen; the method and the system have the advantages that the catalog information corresponding to the electronic mails is sent to the mobile terminal, so that a user can conveniently select the electronic mails needing to be checked on the mobile terminal, and the corresponding electronic mails are called from the blockchain and fed back to the mobile terminal, so that the situation that a large number of electronic mails are simultaneously sent to the mobile terminal to cause incapability of being checked normally is avoided, meanwhile, the electronic mails can be checked rapidly on the premise that the storage space is not required to be provided for the mobile terminal, and accordingly the safety and the reliability of receiving and sending the electronic mails are greatly improved.
The invention provides an email management method based on a block chain, which is characterized by comprising the following steps:
step S1, monitoring an email box to acquire email received by the email box; analyzing the received E-mail to determine the source information of the received E-mail; determining whether to mark the received E-mail according to the source information;
step S2, after the marked E-mails are encrypted, the encrypted E-mails are sequentially stored in a blockchain of a server according to the receiving time sequence of the E-mails; then, the catalog information of all emails stored in the block chain is sent to the mobile terminal;
step S3, generating a corresponding E-mail calling instruction according to a selection result of the user on the mobile terminal for the directory information; feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal;
further, in the step S1, the email box is monitored, so as to obtain the email received by the email box; analyzing the received E-mail to determine the source information of the received E-mail; and determining whether to tag the received email according to the source information specifically includes:
Step S101, monitoring an E-mail receiving port of an E-mail, and when the E-mail confirms to receive the E-mail, carrying out virus checking treatment on the E-mail; if the email is confirmed to have viruses, the email is directly deleted; if the email box is confirmed to have no virus, the email is reserved;
step S102, extracting the IP address of a server for sending the E-mail or the name of the sender of the E-mail from the reserved E-mail, and taking the IP address or the name of the sender of the E-mail as source information of the E-mail;
step S103, comparing the source information with a preset source information white list; if the IP address or the sender name is contained in a preset source information white list, marking the E-mail as a trusted E-mail; otherwise, marking the e-mail as an untrusted e-mail;
further, in the step S2, after the marked e-mail is encrypted, the encrypted e-mails are sequentially stored in the blockchain of the server according to the receiving time sequence of the e-mails; the step of sending the catalog information of all the emails stored in the blockchain to the mobile terminal specifically comprises the following steps:
Step S201, the marked trusted email is encrypted, so that the text content and/or the email attachment contained in the trusted email are converted into an encrypted email body and/or an encrypted email attachment;
step S202, storing the encrypted trusted emails in the blockchain of the server in sequence according to the order of the receiving time of the trusted emails from early to late;
step S203, extracting the sender name of the E-mail and the sending time of the E-mail from all the E-mails stored in the blockchain, thereby forming directory information of the E-mail; then the catalogue information is sent to the mobile terminal;
further, in the step S201, encryption processing is performed on the marked trusted email, so as to convert the text content and/or the attachment of the email contained in the trusted email into an encrypted email text and/or an encrypted attachment of the email, which specifically includes:
the text content of the mail text and the mail attachment contained in the trusted electronic mail are encrypted independently and specially, and the specific process is as follows:
step S2011, using the following formula (1), encrypting the mail text content according to the length of the binary form of the mail text content contained in the trusted electronic mail
In the above-mentioned formula (1),a binary form representing mail body text content contained in the encrypted trusted email; (D) 2 A binary form representing the text content of the mail body contained in the trusted electronic mail before encryption; />Representing a circular right shift operation; len [ (D) 2 ]Representation calculation (D) 2 Binary digits of (a); (D) 2 (i) A binary number representing an i-th bit in a binary form of mail body text content contained in the trusted email prior to encryption; [] 10 Representing the conversion of the values in brackets into decimal numbers;
step S2012, using the following formula (2), performing encryption processing on the bytes of the mail attachment included in the trusted email once in an ASCII code increment manner,
in the above-mentioned formula (2),an ASCII value representing bytes of an ith row and a jth column in a byte matrix of a mail attachment contained in the encrypted trusted electronic mail; ASCII [ S (i, j)]An ASCII value representing a byte of a j-th row of an i-th column in a byte matrix of a mail attachment included in the trusted electronic mail before encryption; s (i, j) represents the byte of the ith row and jth column in the byte matrix of the mail attachment contained in the trusted electronic mail;
step S2013, after completing the one-time encryption of the bytes of the mail attachment included in the trusted electronic mail, the following formula (3) is utilized to perform the secondary encryption processing in a byte exchange mode according to the byte form of the mail attachment included in the trusted electronic mail,
In the above-mentioned formula (3),representing bytes of an ith row and a jth column in an encryption byte matrix after the byte matrix of the mail attachment after primary encryption is subjected to byte-to-byte exchange and secondary encryption; m represents the number of each column of bytes in the byte matrix of the mail attachment after primary encryption; n represents the number of bytes of each row in the byte matrix of the mail attachment after primary encryption; i (S) mn ) T An ith (S) representing a new byte matrix after transposition of the byte matrix of the once encrypted mail attachment mn ) T A row; j (S) mn ) T Represents the j-th (S) of the new byte matrix after transposed of the byte matrix of the mail attachment after primary encryption mn ) T A column;representing a downward rounding operation; % is expressed asTaking the remainder;
further, in the step S3, a corresponding e-mail retrieving instruction is generated according to a selection result of the user on the mobile terminal for the directory information; and feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal, wherein the E-mail calling instruction specifically comprises:
step S301, determining an email which the user needs to review according to a selection result of the user on the mobile terminal for the directory information; generating a corresponding E-mail calling instruction according to the name and the sending time of the sender of the E-mail which is required to be inquired by the user;
Step S302, after the E-mail calling instruction is fed back to the server, calling the E-mail which is consistent with the name of the sender and the sending time of the E-mail contained in the E-mail calling instruction from the blockchain of the server; feeding the fetched E-mail back to the mobile terminal;
step S303, when the E-mail fed back to the mobile terminal is opened and read and the preset time length passes, the corresponding E-mail is directly deleted.
The invention also provides an email management system based on the blockchain, which is characterized by comprising an email receiving and analyzing module, an email marking module, an email encrypting module, an email storage module, an email directory information generating module and an email retrieving and feedback module; wherein,
the E-mail receiving and analyzing module is used for monitoring the E-mail box so as to acquire the E-mail received by the E-mail box; analyzing the received E-mail to determine the source information of the received E-mail;
the email marking module is used for determining whether to mark the received email according to the source information;
The E-mail encryption module is used for encrypting the marked E-mails;
the E-mail storage module is used for sequentially storing the encrypted E-mails in a block chain of the server according to the receiving time sequence of the E-mails;
the electronic mail catalog information generation module is used for sending catalog information of all electronic mails stored in the blockchain to the mobile terminal;
the E-mail retrieving and feedback module is used for generating a corresponding E-mail retrieving instruction according to the selection result of the user on the mobile terminal for the directory information; feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal;
further, the email receiving and analyzing module is used for monitoring the email box so as to acquire the email received by the email box; analyzing the received e-mail to determine the source information of the received e-mail specifically includes:
monitoring an email receiving port of an email box, and performing virus checking treatment on the email when the email box confirms that the email is received; if the email is confirmed to have viruses, the email is directly deleted; if the email box is confirmed to have no virus, the email is reserved;
Extracting the IP address of a server for sending the E-mail or the name of a sender of the E-mail from the reserved E-mail, and taking the IP address or the name of the sender of the E-mail as source information of the E-mail;
the method comprises the steps of,
the email marking module is configured to determine whether to mark the received email according to the source information, and specifically includes:
comparing the source information with a preset source information white list; if the IP address or the sender name is contained in a preset source information white list, marking the E-mail as a trusted E-mail; otherwise, marking the e-mail as an untrusted e-mail;
further, the email encryption module is configured to encrypt the marked email, and specifically includes:
encrypting the marked trusted email, so as to convert the text content and/or the email attachment contained in the trusted email into an encrypted email text and/or an encrypted email attachment;
the method comprises the steps of,
the email storage module is used for sequentially storing the encrypted emails in a blockchain of a server according to the receiving time sequence of the emails, and specifically comprises the following steps:
Sequentially storing the encrypted trusted emails in a blockchain of a server according to the sequence from the early to the late of the receiving time of the trusted emails;
the method comprises the steps of,
the email directory information generation module is configured to send directory information of all emails stored in the blockchain to the mobile terminal, and specifically includes:
extracting the names of senders of the electronic mails and the sending time of the electronic mails from all the electronic mails stored in the blockchain, thereby forming directory information of the electronic mails; then the catalogue information is sent to the mobile terminal;
further, the email retrieval and feedback module is used for generating a corresponding email retrieval instruction according to a selection result of the user on the mobile terminal for the directory information; and feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal, wherein the E-mail calling instruction specifically comprises:
determining an email which the user needs to review according to a selection result of the user on the mobile terminal for the directory information; generating a corresponding E-mail calling instruction according to the name and the sending time of the sender of the E-mail which is required to be inquired by the user;
When the E-mail calling instruction is fed back to the server, calling the E-mail which is consistent with the name of the sender and the sending time of the E-mail contained in the E-mail calling instruction from a blockchain of the server; feeding the fetched E-mail back to the mobile terminal;
and after the E-mail fed back to the mobile terminal is opened and read and the preset time length passes, the corresponding E-mail is directly deleted.
Compared with the prior art, the email management method and system based on the blockchain analyzes the received email to obtain the source information of the email and mark the email, thereby screening the email; the marked E-mail is encrypted and then stored into a blockchain of a value server, so that the E-mail is stored in a high-safety way, and the E-mail is effectively prevented from being lost or stolen; the method and the system have the advantages that the catalog information corresponding to the electronic mails is sent to the mobile terminal, so that a user can conveniently select the electronic mails needing to be checked on the mobile terminal, and the corresponding electronic mails are called from the blockchain and fed back to the mobile terminal, so that the situation that a large number of electronic mails are simultaneously sent to the mobile terminal to cause incapability of being checked normally is avoided, meanwhile, the electronic mails can be checked rapidly on the premise that the storage space is not required to be provided for the mobile terminal, and accordingly the safety and the reliability of receiving and sending the electronic mails are greatly improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a block chain-based email management method according to the present invention.
Fig. 2 is a schematic diagram of a block chain-based email management system according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flowchart of a block chain-based email management method according to an embodiment of the present invention is shown. The email management method based on the block chain comprises the following steps:
step S1, monitoring an email box to acquire email received by the email box; analyzing the received E-mail to determine the source information of the received E-mail; determining whether to mark the received E-mail according to the source information;
step S2, after the marked E-mails are encrypted, the encrypted E-mails are sequentially stored in a blockchain of a server according to the receiving time sequence of the E-mails; then, the catalog information of all emails stored in the block chain is sent to the mobile terminal;
step S3, generating a corresponding E-mail calling instruction according to a selection result of the user on the mobile terminal for the directory information; and feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal.
The beneficial effects of the technical scheme are as follows: the email management method based on the blockchain analyzes the received email to obtain the source information of the email and marks the email, thereby screening the email; the marked E-mail is encrypted and then stored into a blockchain of a value server, so that the E-mail is stored in a high-safety way, and the E-mail is effectively prevented from being lost or stolen; the method and the system have the advantages that the catalog information corresponding to the electronic mails is sent to the mobile terminal, so that a user can conveniently select the electronic mails needing to be checked on the mobile terminal, and the corresponding electronic mails are called from the blockchain and fed back to the mobile terminal, so that the situation that a large number of electronic mails are simultaneously sent to the mobile terminal to cause incapability of being checked normally is avoided, meanwhile, the electronic mails can be checked rapidly on the premise that the storage space is not required to be provided for the mobile terminal, and accordingly the safety and the reliability of receiving and sending the electronic mails are greatly improved.
Preferably, in the step S1, an email box is monitored, so as to obtain an email received by the email box; analyzing the received E-mail to determine the source information of the received E-mail; and determining whether to tag the received email according to the source information specifically includes:
step S101, monitoring an E-mail receiving port of an E-mail, and when the E-mail confirms to receive the E-mail, carrying out virus checking treatment on the E-mail; if the email is confirmed to have virus, the email is deleted directly; if the email box is confirmed to have no virus, the email is reserved;
step S102, extracting the IP address of the server for sending the E-mail or the name of the sender of the E-mail from the reserved E-mail, and taking the IP address or the name of the sender of the E-mail as the source information of the E-mail;
step S103, comparing the source information with a preset source information white list; if the IP address or the sender name is contained in a preset source information white list, marking the E-mail as a trusted E-mail; otherwise, the email is marked as an untrusted email.
The beneficial effects of the technical scheme are as follows: corresponding monitoring software is arranged in an email receiving port of the email box. When the monitoring software of the E-mail receiving port confirms that the E-mail is received, firstly, the received E-mail is intercepted, then virus checking treatment is carried out on the intercepted E-mail through antivirus software, so that whether Trojan viruses and the like exist in the E-mail is determined, the E-mail with the viruses is determined to be directly deleted, the E-mail with the viruses is determined to be absent is reserved, and therefore the E-mail can be screened, and the E-mail containing the viruses is filtered and deleted, so that data loss and theft caused by the viruses in the E-mail are avoided.
In addition, the e-mail is sent out through the corresponding server terminal, which makes it necessary that the e-mail contain an IP address corresponding to the server terminal or a user name (i.e., sender name) corresponding to the server terminal, and both the IP address and the sender name have uniqueness, which can accurately characterize the source of the e-mail. Comparing the source information with a preset source information white list to determine whether the E-mail comes from a trusted server terminal and a user thereof, so that the E-mail can be screened for the second time, and the credibility and the data security of the E-mail are greatly improved; wherein the preset source information white list may include, but is not limited to, IP addresses of a number of predetermined server terminals and/or user names of a number of server terminals.
Preferably, in the step S2, after the marked e-mail is encrypted, the encrypted e-mails are sequentially stored in the blockchain of the server according to the receiving time sequence of the e-mails; the step of sending the catalog information of all the emails stored in the blockchain to the mobile terminal specifically comprises the following steps:
step S201, the marked trusted email is encrypted, so that the text content and/or the email attachment contained in the trusted email are converted into an encrypted email body and/or an encrypted email attachment;
step S202, storing the encrypted trusted emails in the blockchain of the server in sequence according to the order of the receiving time of the trusted emails from early to late;
step S203, extracting the sender name of the E-mail and the sending time of the E-mail from all the E-mails stored in the blockchain, thereby forming directory information of the E-mail; and then the catalog information is sent to the mobile terminal.
The beneficial effects of the technical scheme are as follows: the e-mail may contain text content and/or mail attachment (such as word or excel format file) of the text portion of the e-mail, so that in order to ensure the overall security of the e-mail, encryption processing needs to be performed on the text content and mail attachment of the text portion of the e-mail, so that the e-mail can be effectively prevented from being stolen. In addition, the encrypted trusted emails are sequentially stored in the blockchain of the server according to the order of the receiving time of the trusted emails from early to late, so that the subsequent fast and accurate reading of the trusted emails from the blockchain can be facilitated, and the fact that the emails are read by mistake is avoided. Because the name of the sender of the electronic mail and the sending time of the electronic mail have uniqueness, the name of the sender and the sending time are shared to form the directory information corresponding to the electronic mail, and the directory information can be conveniently used as index information for referring to the electronic mail, thereby greatly improving the inquiring accuracy and speed of the electronic mail.
Preferably, in the step S201, the marked trusted email is encrypted, so that the text content and/or the email attachment included in the trusted email are converted into an encrypted email body and/or an encrypted email attachment, which specifically includes:
the method comprises the following specific processes of independently and specially encrypting the text content of the mail text and the mail attachment contained in the trusted electronic mail:
step S2011, encrypting the mail text content according to the length of the binary form of the mail text content contained in the trusted email by using the following formula (1)
In the above-mentioned formula (1),a binary form representing the text content of the mail body contained in the encrypted trusted email; (D) 2 A binary form representing the text content of the body of the mail contained in the trusted email prior to encryption;representing a circular right shift operation; len [ (D) 2 ]Representation calculation (D) 2 Binary digits of (a); (D) 2 (i) A binary number representing an ith bit in a binary form of mail body text content contained in the trusted email prior to encryption; [] 10 Representing the conversion of the values in brackets into decimal numbers;
step S2012, using the following formula (2), performing encryption processing on the bytes of the mail attachment included in the trusted email in an ASCII code increment manner,
In the above-mentioned formula (2),an ASCII value representing bytes of an ith row and a jth column in a byte matrix of a mail attachment included in the encrypted trusted email; ASCII [ S (i, j)]An ASCII value representing a byte of a j-th row in a byte matrix of a mail attachment included in the trusted email prior to encryption; s (i, j) represents the byte of the ith row and jth column in the byte matrix of the mail attachment contained in the trusted electronic mail;
step S2013, after completing the primary encryption of the bytes of the mail attachment included in the trusted electronic mail, the following formula (3) is utilized to perform the secondary encryption processing in a byte-exchange form according to the byte form of the mail attachment included in the trusted electronic mail,
in the above-mentioned formula (3),representing bytes of an ith row and a jth column in an encryption byte matrix after the byte matrix of the mail attachment after primary encryption is subjected to byte-to-byte exchange and secondary encryption; m represents the number of each column of bytes in the byte matrix of the mail attachment after primary encryption; n represents the number of bytes of each row in the byte matrix of the mail attachment after primary encryption; i (S) mn ) T An ith (S) representing a new byte matrix after transposition of the byte matrix of the once encrypted mail attachment mn ) T A row; j (S) mn ) T Represents the j-th (S) of the new byte matrix after transposed of the byte matrix of the mail attachment after primary encryption mn ) T A column;representing a downward rounding operation; % represents the remainder operation.
The beneficial effects of the technical scheme are as follows: the encryption processing of the text content of the mail body is carried out according to the length of the binary form of the text content of the mail body contained in the trusted electronic mail by utilizing the formula (1), so that the accuracy of encryption and subsequent decryption can be ensured by utilizing the specific condition of the binary as an encryption operator, and the safety and reliability of encryption can be ensured by combining the two encryption operators; then, the bytes of the mail attachments contained in the trusted electronic mail are encrypted once by utilizing the ASCII code value-added mode by utilizing the formula (2), so that the bytes are encrypted, and the safety of the contents in the attachments is ensured; and finally, carrying out secondary encryption processing in a byte exchange mode according to the byte form of the mail attachment contained in the trusted electronic mail by utilizing the formula (3), further encrypting the byte position in the attachment, ensuring the reliable encryption of the electronic mail, reducing the encryption time in a simple and reliable encryption mode, and improving the system efficiency.
Preferably, in the step S3, a corresponding e-mail retrieving instruction is generated according to a selection result of the directory information by the user on the mobile terminal; and feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal, wherein the E-mail calling instruction specifically comprises:
step S301, determining an email which the user needs to review according to a selection result of the user on the mobile terminal for the directory information; generating a corresponding E-mail calling instruction according to the name and the sending time of the sender of the E-mail which is required to be inquired by the user;
step S302, when the E-mail calling instruction is fed back to the server, calling the E-mail which is consistent with the name of the sender and the sending time of the E-mail contained in the E-mail calling instruction from the blockchain of the server; feeding the retrieved E-mail back to the mobile terminal;
step S303, when the E-mail fed back to the mobile terminal is opened and read and the preset time length passes, the corresponding E-mail is directly deleted.
The beneficial effects of the technical scheme are as follows: when the catalog information is sent to the mobile terminal, the user receives the corresponding selection of the catalog information, for example, selects a mail sent by a sender at a specific time, so as to generate a corresponding mail calling instruction, and thus, the mails required to be referred by the user can be called from the blockchain and fed back to the mobile terminal, so that the user can refer to the mobile terminal one by one. In addition, when the E-mail fed back to the mobile terminal is opened and read and the preset time length is passed, the corresponding E-mail is directly deleted, namely, the E-mail is set to be in time-limited reference by adopting a burn-after-read mode, so that the E-mail is prevented from being copied maliciously or forwarded maliciously.
Referring to fig. 2, a schematic diagram of a block chain-based email management system according to an embodiment of the present invention is shown. The email management system based on the blockchain comprises an email receiving and analyzing module, an email marking module, an email encrypting module, an email storage module, an email directory information generating module and an email retrieving and feeding back module; wherein,
the E-mail receiving and analyzing module is used for monitoring the E-mail so as to acquire the E-mail received by the E-mail; analyzing the received E-mail to determine the source information of the received E-mail;
the email marking module is used for determining whether to mark the received email according to the source information;
the E-mail encryption module is used for encrypting the marked E-mails;
the E-mail storage module is used for sequentially storing the encrypted E-mails in a block chain of the server according to the receiving time sequence of the E-mails;
the electronic mail directory information generation module is used for sending directory information of all electronic mails stored in the blockchain to the mobile terminal;
The E-mail retrieving and feeding back module is used for generating a corresponding E-mail retrieving instruction according to the selection result of the user on the mobile terminal for the directory information; and feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal.
The beneficial effects of the technical scheme are as follows: the email management system based on the blockchain analyzes the received email to obtain the source information of the email and marks the email so as to screen the email; the marked E-mail is encrypted and then stored into a blockchain of a value server, so that the E-mail is stored in a high-safety way, and the E-mail is effectively prevented from being lost or stolen; the method and the system have the advantages that the catalog information corresponding to the electronic mails is sent to the mobile terminal, so that a user can conveniently select the electronic mails needing to be checked on the mobile terminal, and the corresponding electronic mails are called from the blockchain and fed back to the mobile terminal, so that the situation that a large number of electronic mails are simultaneously sent to the mobile terminal to cause incapability of being checked normally is avoided, meanwhile, the electronic mails can be checked rapidly on the premise that the storage space is not required to be provided for the mobile terminal, and accordingly the safety and the reliability of receiving and sending the electronic mails are greatly improved.
Preferably, the email receiving and analyzing module is used for monitoring email boxes so as to acquire email received by the email boxes; analyzing the received e-mail to determine the source information of the received e-mail specifically includes:
monitoring an email receiving port of an email box, and performing virus checking treatment on the email when the email box confirms that the email is received; if the email is confirmed to have virus, the email is deleted directly; if the email box is confirmed to have no virus, the email is reserved;
extracting the IP address of a server for sending the E-mail or the name of a sender of the E-mail from the reserved E-mail, and taking the IP address or the name of the sender of the E-mail as source information of the E-mail;
the method comprises the steps of,
the email marking module is used for determining whether to mark the received email according to the source information, and specifically comprises the following steps:
comparing the source information with a preset source information white list; if the IP address or the sender name is contained in a preset source information white list, marking the E-mail as a trusted E-mail; otherwise, the email is marked as an untrusted email.
The beneficial effects of the technical scheme are as follows: corresponding monitoring software is arranged in an email receiving port of the email box. When the monitoring software of the E-mail receiving port confirms that the E-mail is received, firstly, the received E-mail is intercepted, then virus checking treatment is carried out on the intercepted E-mail through antivirus software, so that whether Trojan viruses and the like exist in the E-mail is determined, the E-mail with the viruses is determined to be directly deleted, the E-mail with the viruses is determined to be absent is reserved, and therefore the E-mail can be screened, and the E-mail containing the viruses is filtered and deleted, so that data loss and theft caused by the viruses in the E-mail are avoided.
In addition, the e-mail is sent out through the corresponding server terminal, which makes it necessary that the e-mail contain an IP address corresponding to the server terminal or a user name (i.e., sender name) corresponding to the server terminal, and both the IP address and the sender name have uniqueness, which can accurately characterize the source of the e-mail. Comparing the source information with a preset source information white list to determine whether the E-mail comes from a trusted server terminal and a user thereof, so that the E-mail can be screened for the second time, and the credibility and the data security of the E-mail are greatly improved; wherein the preset source information white list may include, but is not limited to, IP addresses of a number of predetermined server terminals and/or user names of a number of server terminals.
Preferably, the email encryption module is configured to encrypt the marked email, and specifically includes:
encrypting the marked trusted email, thereby converting the text content and/or the email attachment contained in the trusted email into an encrypted email body and/or an encrypted email attachment;
the method comprises the steps of,
the email storage module is used for sequentially storing the encrypted emails in a blockchain of a server according to the receiving time sequence of the emails, and specifically comprises the following steps:
sequentially storing the encrypted trusted emails in a blockchain of a server according to the sequence from the early to the late of the receiving time of the trusted emails;
the method comprises the steps of,
the email directory information generation module is configured to send directory information of all emails stored in the blockchain to the mobile terminal, and specifically includes:
extracting the names of senders of the electronic mails and the sending time of the electronic mails from all the electronic mails stored in the blockchain, thereby forming directory information of the electronic mails; and then the catalog information is sent to the mobile terminal.
The beneficial effects of the technical scheme are as follows: the e-mail may contain text content and/or mail attachment (such as word or excel format file) of the text portion of the e-mail, so that in order to ensure the overall security of the e-mail, encryption processing needs to be performed on the text content and mail attachment of the text portion of the e-mail, so that the e-mail can be effectively prevented from being stolen. In addition, the encrypted trusted emails are sequentially stored in the blockchain of the server according to the order of the receiving time of the trusted emails from early to late, so that the subsequent fast and accurate reading of the trusted emails from the blockchain can be facilitated, and the fact that the emails are read by mistake is avoided. Because the name of the sender of the electronic mail and the sending time of the electronic mail have uniqueness, the name of the sender and the sending time are shared to form the directory information corresponding to the electronic mail, and the directory information can be conveniently used as index information for referring to the electronic mail, thereby greatly improving the inquiring accuracy and speed of the electronic mail.
Preferably, the email retrieval and feedback module is used for generating a corresponding email retrieval instruction according to a selection result of the directory information on the mobile terminal by a user; and feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal, wherein the E-mail calling instruction specifically comprises:
determining an email which the user needs to review according to a selection result of the user on the mobile terminal for the directory information; generating a corresponding E-mail calling instruction according to the name and the sending time of the sender of the E-mail which is required to be inquired by the user;
when the E-mail calling instruction is fed back to the server, calling the E-mail which is consistent with the name of the sender and the sending time of the E-mail contained in the E-mail calling instruction from the blockchain of the server; feeding the retrieved E-mail back to the mobile terminal;
and after the E-mail fed back to the mobile terminal is opened and read and the preset time length passes, the corresponding E-mail is directly deleted.
The beneficial effects of the technical scheme are as follows: when the catalog information is sent to the mobile terminal, the user receives the corresponding selection of the catalog information, for example, selects a mail sent by a sender at a specific time, so as to generate a corresponding mail calling instruction, and thus, the mails required to be referred by the user can be called from the blockchain and fed back to the mobile terminal, so that the user can refer to the mobile terminal one by one. In addition, when the E-mail fed back to the mobile terminal is opened and read and the preset time length is passed, the corresponding E-mail is directly deleted, namely, the E-mail is set to be in time-limited reference by adopting a burn-after-read mode, so that the E-mail is prevented from being copied maliciously or forwarded maliciously.
As can be seen from the above embodiments, the email management method and system based on blockchain analyzes the received email to obtain the source information of the email and mark the email, thereby screening the email; the marked E-mail is encrypted and then stored into a blockchain of a value server, so that the E-mail is stored in a high-safety way, and the E-mail is effectively prevented from being lost or stolen; the method and the system have the advantages that the catalog information corresponding to the electronic mails is sent to the mobile terminal, so that a user can conveniently select the electronic mails needing to be checked on the mobile terminal, and the corresponding electronic mails are called from the blockchain and fed back to the mobile terminal, so that the situation that a large number of electronic mails are simultaneously sent to the mobile terminal to cause incapability of being checked normally is avoided, meanwhile, the electronic mails can be checked rapidly on the premise that the storage space is not required to be provided for the mobile terminal, and accordingly the safety and the reliability of receiving and sending the electronic mails are greatly improved.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (4)

1. The electronic mailbox management method based on the block chain is characterized by comprising the following steps of:
step S1, monitoring an email box to acquire email received by the email box;
analyzing the received E-mail to determine the source information of the received E-mail;
determining whether to mark the received E-mail according to the source information;
step S2, after the marked E-mails are encrypted, the encrypted E-mails are sequentially stored in a blockchain of a server according to the receiving time sequence of the E-mails; then, the catalog information of all emails stored in the block chain is sent to the mobile terminal;
step S3, generating a corresponding E-mail calling instruction according to a selection result of the user on the mobile terminal for the directory information; feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal;
in the step S1, an email box is monitored, so as to obtain an email received by the email box; analyzing the received E-mail to determine the source information of the received E-mail; and determining whether to tag the received email according to the source information specifically includes:
Step S101, monitoring an E-mail receiving port of an E-mail, and when the E-mail confirms to receive the E-mail, carrying out virus checking treatment on the E-mail; if the email is confirmed to have viruses, the email is directly deleted; if the email box is confirmed to have no virus, the email is reserved;
step S102, extracting the IP address of a server for sending the E-mail or the name of the sender of the E-mail from the reserved E-mail, and taking the IP address or the name of the sender of the E-mail as source information of the E-mail;
step S103, comparing the source information with a preset source information white list; if the IP address or the sender name is contained in a preset source information white list, marking the E-mail as a trusted E-mail; otherwise, marking the e-mail as an untrusted e-mail;
in the step S2, after the marked e-mail is encrypted, the encrypted e-mails are sequentially stored in a blockchain of the server according to the receiving time sequence of the e-mails; the step of sending the catalog information of all the emails stored in the blockchain to the mobile terminal specifically comprises the following steps:
Step S201, the marked trusted email is encrypted, so that the text content and/or the email attachment contained in the trusted email are converted into an encrypted email body and/or an encrypted email attachment;
step S202, storing the encrypted trusted emails in the blockchain of the server in sequence according to the order of the receiving time of the trusted emails from early to late;
step S203, extracting the sender name of the E-mail and the sending time of the E-mail from all the E-mails stored in the blockchain, thereby forming directory information of the E-mail; then the catalogue information is sent to the mobile terminal;
in the step S201, encryption processing is performed on the marked trusted email, so that the mail text content and/or the mail attachment included in the trusted email are converted into an encrypted mail text and/or an encrypted mail attachment, which specifically includes:
the text content of the mail text and the mail attachment contained in the trusted electronic mail are encrypted independently and specially, and the specific process is as follows:
step S2011, using the following formula (1), encrypting the mail text content according to the length of the binary form of the mail text content contained in the trusted electronic mail
In the above-mentioned formula (1),a binary form representing mail body text content contained in the encrypted trusted email; (D) 2 A binary form representing the text content of the mail body contained in the trusted electronic mail before encryption;representing a circular right shift operation; len [ (D) 2 ]Representation calculation (D) 2 Binary digits of (a); (D) 2 (i) A binary number representing an i-th bit in a binary form of mail body text content contained in the trusted email prior to encryption; [] 10 Representing the conversion of the values in brackets into decimal numbers;
step S2012, using the following formula (2), performing encryption processing on the bytes of the mail attachment included in the trusted email once in an ASCII code increment manner,
in the above-mentioned formula (2),an ASCII value representing bytes of an ith row and a jth column in a byte matrix of a mail attachment contained in the encrypted trusted electronic mail; ASCII [ S (i, j)]An ASCII value representing a byte of a j-th row of an i-th column in a byte matrix of a mail attachment included in the trusted electronic mail before encryption; s (i, j) represents the byte of the ith row and jth column in the byte matrix of the mail attachment contained in the trusted electronic mail;
step S2013, after completing the one-time encryption of the bytes of the mail attachment included in the trusted electronic mail, the following formula (3) is utilized to perform the secondary encryption processing in a byte exchange mode according to the byte form of the mail attachment included in the trusted electronic mail,
In the above-mentioned formula (3),representing bytes of an ith row and a jth column in an encryption byte matrix after the byte matrix of the mail attachment after primary encryption is subjected to byte-to-byte exchange and secondary encryption; m represents the number of each column of bytes in the byte matrix of the mail attachment after primary encryption; n represents the number of bytes of each row in the byte matrix of the mail attachment after primary encryption; i (S) mn ) T An ith (S) representing a new byte matrix after transposition of the byte matrix of the once encrypted mail attachment mn ) T A row; j (S) mn ) T Represents the j-th (S) of the new byte matrix after transposed of the byte matrix of the mail attachment after primary encryption mn ) T A column;representing a downward rounding operation; % represents the remainder operation.
2. The blockchain-based email management method of claim 1, wherein: in the step S3, a corresponding email retrieval instruction is generated according to a selection result of the user on the mobile terminal for the directory information; and feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal, wherein the E-mail calling instruction specifically comprises:
step S301, determining an email which the user needs to review according to a selection result of the user on the mobile terminal for the directory information; generating a corresponding E-mail calling instruction according to the name and the sending time of the sender of the E-mail which is required to be inquired by the user;
Step S302, after the E-mail calling instruction is fed back to the server, calling the E-mail which is consistent with the name of the sender and the sending time of the E-mail contained in the E-mail calling instruction from the blockchain of the server; feeding the fetched E-mail back to the mobile terminal;
step S303, when the E-mail fed back to the mobile terminal is opened and read and the preset time length passes, the corresponding E-mail is directly deleted.
3. The electronic mailbox management system based on the block chain is characterized by comprising an electronic mail receiving and analyzing module, an electronic mail marking module, an electronic mail encrypting module, an electronic mail storage module, an electronic mail catalog information generating module and an electronic mail retrieving and feeding back module; the E-mail receiving and analyzing module is used for monitoring the E-mail box so as to acquire the E-mail received by the E-mail box; analyzing the received E-mail to determine the source information of the received E-mail;
the email marking module is used for determining whether to mark the received email according to the source information;
The E-mail encryption module is used for encrypting the marked E-mails;
the E-mail storage module is used for sequentially storing the encrypted E-mails in a block chain of the server according to the receiving time sequence of the E-mails;
the electronic mail catalog information generation module is used for sending catalog information of all electronic mails stored in the blockchain to the mobile terminal;
the E-mail retrieving and feedback module is used for generating a corresponding E-mail retrieving instruction according to the selection result of the user on the mobile terminal for the directory information; feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal;
the E-mail receiving and analyzing module is used for monitoring the E-mail box so as to acquire the E-mail received by the E-mail box; analyzing the received e-mail to determine the source information of the received e-mail specifically includes:
monitoring an email receiving port of an email box, and performing virus checking treatment on the email when the email box confirms that the email is received; if the email is confirmed to have viruses, the email is directly deleted; if the email box is confirmed to have no virus, the email is reserved;
Extracting the IP address of a server for sending the E-mail or the name of a sender of the E-mail from the reserved E-mail, and taking the IP address or the name of the sender of the E-mail as source information of the E-mail; the method comprises the steps of,
the email marking module is configured to determine whether to mark the received email according to the source information, and specifically includes:
comparing the source information with a preset source information white list; if the IP address or the sender name is contained in a preset source information white list, marking the E-mail as a trusted E-mail; otherwise, marking the e-mail as an untrusted e-mail;
the E-mail encryption module is used for encrypting the marked E-mails, and specifically comprises the following steps:
encrypting the marked trusted email, so as to convert the text content and/or the email attachment contained in the trusted email into an encrypted email text and/or an encrypted email attachment;
the method comprises the steps of,
the email storage module is used for sequentially storing the encrypted emails in a blockchain of a server according to the receiving time sequence of the emails, and specifically comprises the following steps:
Sequentially storing the encrypted trusted emails in a blockchain of a server according to the sequence from the early to the late of the receiving time of the trusted emails;
the method comprises the steps of,
the email directory information generation module is configured to send directory information of all emails stored in the blockchain to the mobile terminal, and specifically includes:
extracting the names of senders of the electronic mails and the sending time of the electronic mails from all the electronic mails stored in the blockchain, thereby forming directory information of the electronic mails; then the catalogue information is sent to the mobile terminal;
the encrypting processing for the marked trusted email, so as to convert the text content and/or the email attachment contained in the trusted email into an encrypted email text and/or an encrypted email attachment specifically comprises:
the text content of the mail text and the mail attachment contained in the trusted electronic mail are encrypted independently and specially, and the specific process is as follows:
step S2011, using the following formula (1), encrypting the mail text content according to the length of the binary form of the mail text content contained in the trusted electronic mail
In the above-mentioned formula (1),a binary form representing mail body text content contained in the encrypted trusted email; (D) 2 A binary form representing the text content of the mail body contained in the trusted electronic mail before encryption;representing a circular right shift operation; len [ (D) 2 ]Representation calculation (D) 2 Binary digits of (a); (D) 2 (i) A binary number representing an i-th bit in a binary form of mail body text content contained in the trusted email prior to encryption; [] 10 Representing the conversion of the values in brackets into decimal numbers;
step S2012, using the following formula (2), performing encryption processing on the bytes of the mail attachment included in the trusted email once in an ASCII code increment manner,
in the above-mentioned formula (2),an ASCII value representing bytes of an ith row and a jth column in a byte matrix of a mail attachment contained in the encrypted trusted electronic mail; ASCII [ S (i, j)]An ASCII value representing a byte of a j-th row of an i-th column in a byte matrix of a mail attachment included in the trusted electronic mail before encryption; s (i, j) represents the byte of the ith row and jth column in the byte matrix of the mail attachment contained in the trusted electronic mail;
step S2013, after completing the one-time encryption of the bytes of the mail attachment included in the trusted electronic mail, the following formula (3) is utilized to perform the secondary encryption processing in a byte exchange mode according to the byte form of the mail attachment included in the trusted electronic mail,
In the above-mentioned formula (3),representing bytes of an ith row and a jth column in an encryption byte matrix after the byte matrix of the mail attachment after primary encryption is subjected to byte-to-byte exchange and secondary encryption; m represents byte matrix of mail attachment after primary encryptionThe number of bytes in each column; n represents the number of bytes of each row in the byte matrix of the mail attachment after primary encryption; i (S) mn ) T An ith (S) representing a new byte matrix after transposition of the byte matrix of the once encrypted mail attachment mn ) T A row; j (S) mn ) T Represents the j-th (S) of the new byte matrix after transposed of the byte matrix of the mail attachment after primary encryption mn ) T A column; />Representing a downward rounding operation; % represents the remainder operation.
4. The blockchain-based email management system of claim 3, wherein: the E-mail retrieving and feedback module is used for generating a corresponding E-mail retrieving instruction according to the selection result of the user on the mobile terminal for the directory information; and feeding back the E-mail calling instruction to the server, so that the E-mail corresponding to the selection result is sent to the mobile terminal, wherein the E-mail calling instruction specifically comprises:
determining an email which the user needs to review according to a selection result of the user on the mobile terminal for the directory information; generating a corresponding E-mail calling instruction according to the name and the sending time of the sender of the E-mail which is required to be inquired by the user;
When the E-mail calling instruction is fed back to the server, calling the name and sending of the sender of the E-mail contained in the E-mail calling instruction from the blockchain of the server
E-mails with consistent time; feeding the fetched E-mail back to the mobile terminal;
when the e-mail fed back to the mobile terminal is opened to be read and a preset time length elapses,
and deleting the corresponding E-mail directly.
CN202210023959.1A 2022-01-11 2022-01-11 Email management method and system based on block chain Active CN114513482B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210023959.1A CN114513482B (en) 2022-01-11 2022-01-11 Email management method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210023959.1A CN114513482B (en) 2022-01-11 2022-01-11 Email management method and system based on block chain

Publications (2)

Publication Number Publication Date
CN114513482A CN114513482A (en) 2022-05-17
CN114513482B true CN114513482B (en) 2024-03-22

Family

ID=81550231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210023959.1A Active CN114513482B (en) 2022-01-11 2022-01-11 Email management method and system based on block chain

Country Status (1)

Country Link
CN (1) CN114513482B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011004132A (en) * 2009-06-18 2011-01-06 Nippon Telegr & Teleph Corp <Ntt> Mail server, method for processing electronic mail and program therefor
WO2019094303A1 (en) * 2017-11-07 2019-05-16 Sherjil Ahmed Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
US10305833B1 (en) * 2017-07-23 2019-05-28 Turing Technology, Inc. Blockchain based email procedures
CN110351258A (en) * 2019-06-28 2019-10-18 太原理工大学 A kind of distributed electronic mailbox system based on no coin block chain technology
CN111193750A (en) * 2020-01-06 2020-05-22 李蕴光 Mailbox encryption method, mailbox decryption method and mailbox processing method based on block chain
US10846762B1 (en) * 2018-07-09 2020-11-24 Turing Technology, Inc. Blockchain based cold email campaign
CN112272156A (en) * 2020-09-15 2021-01-26 山东鲁能软件技术有限公司 E-mail receiving and sending system based on block chain
CN113508563A (en) * 2019-03-01 2021-10-15 泽乌科技公司 Block chain based secure email system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011004132A (en) * 2009-06-18 2011-01-06 Nippon Telegr & Teleph Corp <Ntt> Mail server, method for processing electronic mail and program therefor
US10305833B1 (en) * 2017-07-23 2019-05-28 Turing Technology, Inc. Blockchain based email procedures
WO2019094303A1 (en) * 2017-11-07 2019-05-16 Sherjil Ahmed Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
US10846762B1 (en) * 2018-07-09 2020-11-24 Turing Technology, Inc. Blockchain based cold email campaign
CN113508563A (en) * 2019-03-01 2021-10-15 泽乌科技公司 Block chain based secure email system
CN110351258A (en) * 2019-06-28 2019-10-18 太原理工大学 A kind of distributed electronic mailbox system based on no coin block chain technology
CN111193750A (en) * 2020-01-06 2020-05-22 李蕴光 Mailbox encryption method, mailbox decryption method and mailbox processing method based on block chain
CN112272156A (en) * 2020-09-15 2021-01-26 山东鲁能软件技术有限公司 E-mail receiving and sending system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链技术的加密算法应用研究;李为为;刘志云;;绥化学院学报(第11期);全文 *

Also Published As

Publication number Publication date
CN114513482A (en) 2022-05-17

Similar Documents

Publication Publication Date Title
US6023510A (en) Method of secure anonymous query by electronic messages transported via a public network and method of response
US8549642B2 (en) Method and system for using spam e-mail honeypots to identify potential malware containing e-mails
US8015250B2 (en) Method and system for filtering electronic messages
US7835294B2 (en) Message filtering method
US9560059B1 (en) System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
US7979082B2 (en) Method and apparatus for message identification
US9094338B2 (en) Attributes of captured objects in a capture system
CA3069088C (en) Method and apparatus for a non-revealing do-not-contact list system
US8782402B2 (en) System and method for secure communications
US11677783B2 (en) Analysis of potentially malicious emails
US7412487B2 (en) Method and system for tracking receipt of electronic message
US11539726B2 (en) System and method for generating heuristic rules for identifying spam emails based on fields in headers of emails
US20040139339A1 (en) Data encryption and decryption method and apparatus
AU2020219929A1 (en) Method and system for processing data packages
CN111193750A (en) Mailbox encryption method, mailbox decryption method and mailbox processing method based on block chain
CN111970236A (en) Cross-network data transmission method and device
US20070203988A1 (en) File protection methods and systems
CN114513482B (en) Email management method and system based on block chain
US9043408B2 (en) Apparatuses and methods for identifying email and email servers
JP2006350560A (en) E-mail system
US9497023B1 (en) Multiply-encrypted message for filtering
US20060123233A1 (en) Methods, systems and computer program products for providing customized levels of security
RU2679205C1 (en) Method for saving information to confirm the e-mail message sent
CN115460001A (en) Computer-based cluster mailbox file virus checking and killing method
CN116095035A (en) Method and device for acquiring context information of mailbox

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240419

Address after: Room 2-4, Building 4, No. 599 Huahua Road, Zhongshan Road Office, Yongchuan District, Chongqing, 402160

Patentee after: Li Zuer

Country or region after: China

Address before: 102400 No. 1, zone 1, Guba Road, Chengguan Street, Fangshan District, Beijing - s679

Patentee before: Deming Shangpin Technology Group Co.,Ltd.

Country or region before: China