Disclosure of Invention
The invention provides a mail forwarding method and device based on data processing, which can realize the receiving, sending and forwarding of mails in order through a mail receiving and sending server and a mail forwarding server and ensure the mail forwarding efficiency.
In a first aspect of the present invention, a data processing-based email forwarding method is provided, including:
if the mail receiving and sending server judges that the first mobile terminal uploads a first mail with a first attachment, a first display piece is generated according to attribute information of the first attachment, the first mail and the first display piece are sent to the second mobile terminal, and the first display piece corresponds to a first receiving and sending downloading link in the mail receiving and sending server;
if the second mobile terminal is judged to send a forwarding request to the mail forwarding server, the mail forwarding server acquires a first attachment corresponding to a first mail to be forwarded in the mail receiving and sending server;
the mail forwarding server receives a second attachment sent by a second mobile terminal and forwarding information of a first mail, generates a second display piece based on attribute information of the second attachment, generates a second mail based on the forwarding information of the first mail and the first mail, corresponds to a first forwarding downloading link on the mail forwarding server by the second display piece, and sends the first display piece, the second display piece and the second mail to a third mobile terminal;
the mail forwarding server sends a mail tag of a first mail to be forwarded to the mail sending and receiving server, so that the mail sending and receiving server sends a first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, the mail forwarding server stores the first attachment, and the mail sending and receiving server deletes the first attachment of the first mail to be forwarded.
Optionally, in a possible implementation manner of the first aspect, if the mail receiving and sending server determines that the first mobile terminal uploads the first mail with the first attachment, the first mobile terminal generates a first display part according to attribute information of the first attachment, and sends the first mail and the first display part to the second mobile terminal, where the first display part corresponds to the first receiving and sending download link in the mail receiving and sending server, the method includes:
creating a first storage unit in a mail receiving and sending server, storing the first attachment in the first storage unit, and generating a corresponding first receiving and sending download link according to the unit information of the first storage unit;
acquiring attribute information of each first accessory, wherein the attribute information comprises a data quantity value of the first accessory and an accessory type of the first accessory;
selecting a corresponding first display image according to the accessory type of the first accessory, attaching a transparent layer with the same size as the first display image to the surface of the first display image, and filling the data quantity value to the transparent layer to generate first display information;
receiving first authentication information generated by a first user based on the first mobile terminal;
responding to the first authentication information, receiving an operation trace of the first user on the transparent layer within a preset time period in real time, and generating first signature information according to the operation trace;
obtaining the first display piece based on the first display image, the first display information and the signature information;
and fusing the first display piece and the first mail and then sending the fused first display piece and the first mail to a second mobile terminal.
Optionally, in a possible implementation manner of the first aspect, the sending the merged first display piece and the first email to the second mobile terminal includes:
acquiring a first number of the first display pieces, and establishing a first display slot position corresponding to the first number in the first mail;
and filling each first display piece to the corresponding first display slot position respectively, and sending the first mail filled with the first display pieces to the second mobile terminal.
Optionally, in a possible implementation manner of the first aspect, the receiving, by the mail forwarding server, a second attachment and forwarding information of a first mail sent by a second mobile terminal, generating a second display based on attribute information of the second attachment, and generating a second mail based on the first mail and the forwarding information of the first mail, where the second display corresponds to a first forwarding download link at the mail forwarding server, includes:
creating a second storage unit in the mail forwarding server, storing the second attachment in the second storage unit, and generating a corresponding first forwarding download link according to the unit information of the second storage unit;
acquiring attribute information of each second accessory, wherein the attribute information comprises a data quantity value of the second accessory and an accessory type of the second accessory;
selecting a corresponding second display image according to the accessory type of the second accessory, attaching a transparent layer with the same size as the second display image on the surface of the second display image, and filling the data quantity value to the transparent layer to generate second display information;
receiving second authentication information generated by a second user based on the second mobile terminal;
responding to the second authentication information, receiving an operation trace of the second user on the transparent layer within a preset time period in real time, and generating second signature information according to the operation trace;
and obtaining the second display piece based on the second display image, the second display information and the signature information.
Optionally, in a possible implementation manner of the first aspect, the sending, by the mail forwarding server, the first display, the second display, and the second mail to a third mobile terminal includes:
establishing a first display slot position corresponding to the second mail in the second mail, and filling a first display piece in the corresponding first display slot position in each second mail;
acquiring a second quantity of the second display pieces, and establishing a second display slot position corresponding to the second quantity in the second mail;
and filling each second display piece to the corresponding second display slot position respectively, and sending a second mail filling the first display piece and the second display piece to the third mobile terminal.
Optionally, in a possible implementation manner of the first aspect, the sending, by the mail forwarding server, a mail tag of the first mail to be forwarded to the mail sending and receiving server, so that the mail sending and receiving server sends, to the mail forwarding server, the first attachment of the first mail to be forwarded based on the mail tag, where the mail forwarding server stores the first attachment, and the mail sending and receiving server performs processing to delete the first attachment of the first mail to be forwarded, including:
creating a third storage unit in the mail forwarding server, storing the first attachment in the third storage unit, and generating a corresponding second forwarding downloading link according to the unit information of the third storage unit;
and deleting the first receiving and sending download link corresponding to the first accessory, and correspondingly storing the second forwarding download link and the first accessory.
Optionally, in a possible implementation manner of the first aspect, the method further includes:
acquiring role information of each terminal to generate a corresponding mail role structure tree, wherein each node in the mail role structure tree has the role information of the corresponding terminal;
acquiring first role information of a first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption strategy;
if any second mobile terminal or third mobile terminal triggers a first receiving and sending download link or a second forwarding download link corresponding to the first accessory, acquiring current identity information of the second mobile terminal or third mobile terminal;
if the current identity information meets the first encryption strategy, the first attachment is sent to a corresponding second mobile terminal or a corresponding third mobile terminal;
and if the current identity information does not meet the first encryption strategy, sending download inquiry information to the first mobile terminal, and if the first mobile terminal feeds back corresponding download agreement information, sending the first attachment to a corresponding second mobile terminal or a corresponding third mobile terminal.
Optionally, in a possible implementation manner of the first aspect, the obtaining first role information of the first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption policy includes:
acquiring a first node in a mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and counting all the second role information to generate a second role set;
and identity encryption is carried out on the first attachment based on the second role set, so that all second role information in all second role sets can download the first attachment.
Optionally, in a possible implementation manner of the first aspect, the obtaining a first node in a mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and performing statistics on all the second role information to generate a second role set includes:
receiving role configuration information uploaded by a first mobile terminal, and selecting third role information corresponding to a mail role structure tree based on the role configuration information;
and updating the second role set according to the third role information so that the second role set comprises the third role information.
In a second aspect of the present invention, a data processing-based mail forwarding apparatus is provided, including:
the sending module is used for enabling the mail receiving and sending server to generate a first display piece according to the attribute information of the first attachment if the first mobile terminal uploads a first mail with a first attachment, and sending the first mail and the first display piece to a second mobile terminal, wherein the first display piece corresponds to a first receiving and sending downloading link in the mail receiving and sending server;
the acquisition module is used for acquiring a first attachment corresponding to a first mail to be forwarded in the mail receiving and sending server by the mail forwarding server if the second mobile terminal is judged to send a forwarding request to the mail forwarding server;
the generating module is used for enabling the mail forwarding server to receive a second attachment and forwarding information of a first mail sent by a second mobile terminal, generating a second display piece based on attribute information of the second attachment, generating a second mail based on the first mail and the forwarding information of the first mail, wherein the second display piece corresponds to a first forwarding downloading link in the mail forwarding server, and the mail forwarding server sends the first display piece, the second display piece and the second mail to a third mobile terminal;
the storage module is used for enabling the mail forwarding server to send the mail tag of the first mail to be forwarded to the mail transmitting and receiving server, so that the mail transmitting and receiving server sends the first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, the mail forwarding server stores the first attachment, and the mail transmitting and receiving server deletes the first attachment of the first mail to be forwarded.
Has the advantages that:
1. the mail receiving and sending server and the mail forwarding server can orderly receive, send and forward mails, ensure the mail forwarding efficiency and forward local attachments and undelivered attachments at the same time; in addition, the scheme can generate a first display piece and a second display piece to briefly display the attachment content when the mail is forwarded; in addition, after the forwarding operation, the method can also directly delete the first attachment in the mail receiving and sending server, so that the data processing amount of the mail receiving and sending server is reduced;
2. the first display piece and the second display piece arranged in the scheme can display and display the file type, the file size and the first authentication information and the second authentication information of the user, and by setting the first authentication information and the second authentication information, on one hand, the responsibility system of the accessory information can be realized, on the other hand, other addressees can be assured to check the content of the second accessory and perform assured operation according to the content of the second accessory; in addition, the scheme can also compare the first authentication information with the second authentication information to ensure the authenticity of the first authentication information and the second authentication information; in addition, the method can also return the mail when the first authentication information and the second authentication information are not added to the first attachment and the second attachment, so as to ensure that the first authentication information and the second authentication information are added;
3. the mail role structure tree set by the scheme can correspond to roles in mail nodes, a first encryption strategy is generated, the attachments are encrypted, the contents of the attachments can be checked only by the corresponding nodes, and the privacy and the safety among the attachments can be improved; in addition, the scheme can also attempt to access the accessory by downloading inquiry information; in addition, the scheme can update the second role set according to the needs of the user, and the flexibility of the scheme is improved.
Detailed Description
In order to make the objects, technical solutions and advantages of the present embodiments more clear, the technical solutions in the present embodiments will be clearly and completely described below with reference to the drawings in the present embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein.
It should be understood that, in various embodiments of the present invention, the size of the sequence number of each process does not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of this embodiment.
It should be understood that in the present application, "comprising" and "having" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, in the present invention, "a plurality" means two or more. "and/or" is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "comprises A, B and C" and "comprises A, B, C" means that A, B, C all comprise, "comprises A, B or C" means comprise one of A, B, C, "comprises A, B and/or C" means comprise any 1 or any 2 or 3 of A, B, C.
It should be understood that in the present invention, "B corresponding to a", "a corresponds to B", or "B corresponds to a" means that B is associated with a, and B can be determined from a. Determining B from a does not mean determining B from a alone, but may be determined from a and/or other information. And the matching of A and B means that the similarity of A and B is greater than or equal to a preset threshold value.
As used herein, "if" may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Referring to fig. 1, a schematic view of a scenario provided in this embodiment includes a mail sending and receiving server and a mail forwarding server, where the mail sending and receiving server is used to receive an initial mail initially sent by a user, and the mail forwarding server is used to forward the initial mail.
Fig. 2 is a schematic flowchart of the data processing-based mail forwarding method provided in this embodiment. The execution subject of the present application may include, but is not limited to, at least one of: user equipment, network equipment, etc. The user equipment may include, but is not limited to, a computer, a smart phone, a Personal Digital Assistant (PDA), the above mentioned electronic equipment, and the like. The network device may include, but is not limited to, a single network server, a server group of multiple network servers, or a cloud of numerous computers or network servers based on cloud computing, wherein cloud computing is one type of distributed computing, a super virtual computer consisting of a cluster of loosely coupled computers. The present embodiment does not limit this. The method comprises steps S1 to S4, and specifically comprises the following steps:
s1, if the mail receiving and sending server judges that the first mobile terminal uploads the first mail with the first attachment, a first display piece is generated according to the attribute information of the first attachment, the first mail and the first display piece are sent to the second mobile terminal, and the first display piece corresponds to a first receiving and sending download link in the mail receiving and sending server.
When receiving a first mail with a first attachment uploaded by a first mobile terminal, a mail receiving and sending server in the scheme can generate a first display piece according to attribute information of the first attachment. The first mobile terminal can be a first mobile phone terminal, the first accessory can be an accessory such as an attendance list, a payroll list, a sales list and the like, and the first display part is used for displaying brief contents of the first accessory.
It can be understood that, when a user using the first mobile terminal wants to forward the email to a user corresponding to the second mobile terminal, the email sending and receiving server according to the present solution may send the first email and the first display component to the second mobile terminal, where the first display component corresponds to a first sending and receiving download link in the email sending and receiving server, and the user may download the first attachment corresponding to the first display component through the first sending and receiving download link.
In some embodiments, if the mail receiving and sending server determines that the first mobile terminal uploads the first mail with the first attachment, the first mobile terminal generates a first display part according to the attribute information of the first attachment, and sends the first mail and the first display part to the second mobile terminal, where the first display part corresponds to a first receiving and sending download link in the mail receiving and sending server, including:
creating a first storage unit in a mail receiving and sending server, storing the first attachment in the first storage unit, and generating a corresponding first receiving and sending download link according to the unit information of the first storage unit. The mail receiving and sending server is provided with a plurality of first storage units for storing first attachments, and then generates corresponding first receiving and sending download links by using the unit information of the first storage units, for example, a calling path of the first attachments in the first storage units can be established, the first receiving and sending download links are generated by using the calling path, and when a user clicks the first receiving and sending download links, the user can call the corresponding first attachments in the corresponding first storage units based on the calling path.
And acquiring attribute information of each first accessory, wherein the attribute information comprises a data quantity value of the first accessory and an accessory type of the first accessory. The present solution further obtains a data size value of the first attachment and an attachment type of the first attachment, where the data size value may be, for example, an attachment size of the first attachment, for example, 30kb, and the attachment type may be, for example, "word type", "PDF type", and the like.
Selecting a corresponding first display image according to the accessory type of the first accessory, attaching a transparent layer with the same size as the first display image to the surface of the first display image, and filling the data quantity value to the transparent layer to generate first display information. The scheme is provided with the transparent layer, and the obtained data quantity value can be filled into the transparent layer so as to display the data quantity of the accessory to a user.
And receiving first authentication information generated by the first user based on the first mobile terminal. The first authentication information may be generated by clicking a trigger button on the first mobile terminal after the first user uploads the first accessory, for example, the trigger button may be disposed at an edge of the transparent layer, and the user may generate the first authentication information by clicking the trigger button.
And responding to the first authentication information to receive an operation trace of the first user on the transparent layer within a preset time period in real time, and generating first signature information according to the operation trace. After receiving the first authentication information, the user may perform an operation within the range of the transparent layer to generate an operation trace, where the operation trace may be, for example, a user signature, a user fingerprint, a user signature, and the like, and may represent information actually operated by the user.
And obtaining the first display piece based on the first display image, the first display information and the signature information. The first display part of the scheme displays the file type, the file size and the authentication information of the user.
And fusing the first display piece and the first mail and then sending the fused first display piece and the first mail to a second mobile terminal.
It should be noted that, in the present scheme, by setting the first authentication information, on one hand, the responsibility system of the accessory information can be realized, and on the other hand, other recipient users can be allowed to securely check the content of the first accessory and perform a secure operation according to the content of the first accessory.
For example, the employee a needs to be responsible for the accuracy and authenticity of the content in the first accessory, so that the scheme introduces first authentication information (such as a signature of the employee a and a fingerprint of the employee a) to establish association between the first accessory and the corresponding employee a, and can prevent the first accessory from being maliciously tampered and uploaded by other employees; for another example, after receiving the email of employee a, employee B finds that the first attachment has the first authentication information of employee a, and then employee B may know that the first attachment has authenticity and may perform the next operation with confidence.
In practical application, the scheme may further include an authentication information comparison end, for example, when the employee B needs to verify whether the first authentication information on the first accessory is true, an authentication request may be generated, the first authentication information (for example, a signature or a fingerprint) on the transparent layer is extracted, and then the first authentication information is sent to the authentication information comparison end for comparison, and the authentication information comparison end may feed back an authentication result to the employee B, so as to prevent the user from impersonating the first authentication information of the employee a, and further improve the authenticity of the first accessory.
In some other embodiments, in order to ensure that the first attachment of the email has the first authentication information, when the first user wants to forward the first attachment to the second user, the email sending and receiving server will confirm whether the first attachment has the first authentication information, and if the first attachment does not have the first authentication information, the forwarded email may be returned to the first mobile terminal, and the first mobile terminal is prompted to add the first authentication information. And fusing the first display piece and the first mail and then sending the fused first display piece and the first mail to a second mobile terminal. According to the scheme, after the first display piece is obtained, the first display piece and the first mail can be fused and sent to the second mobile terminal, the second mobile terminal can check approximate data of the first attachment through the first display piece, and a first receiving and sending download link of the first attachment is downloaded through the first display piece.
In some embodiments, the merging the first display piece and the first email and sending the merged email to the second mobile terminal includes:
and acquiring a first number of the first display pieces, and establishing a first display slot position corresponding to the first number in the first mail. And filling each first display piece to the corresponding first display slot position respectively, and sending the first mail filled with the first display pieces to the second mobile terminal.
It is understood that if there are two accessories, then the present solution would provide two first display slots, and the first accessories may correspond to the first display slots one-to-one.
And S2, if the second mobile terminal is judged to send the forwarding request to the mail forwarding server, the mail forwarding server acquires a first attachment corresponding to the first mail to be forwarded in the mail receiving and sending server.
It can be understood that, when the second mobile terminal is to forward the mail to the third mobile terminal, it is necessary to send a forwarding request to the mail forwarding server, and the mail forwarding server may obtain the first attachment corresponding to the first mail to be forwarded.
And S3, the mail forwarding server receives a second attachment sent by a second mobile terminal and forwarding information of the first mail, generates a second display piece based on attribute information of the second attachment, generates a second mail based on the forwarding information of the first mail and the first mail, corresponds to a first forwarding downloading link on the mail forwarding server by the second display piece, and sends the first display piece, the second display piece and the second mail to a third mobile terminal.
In the scheme, when the second mobile terminal forwards the first mail, the second attachment needs to be inserted and the forwarding information of the first mail needs to be edited, and the first mail forwarding server also receives the second attachment and the forwarding information of the first mail.
The first attachment may be, for example, an "attendance table" sent by employee a holding the first mobile terminal, the second attachment may be, for example, a "payroll" sent by employee B holding the second mobile terminal, and the forwarding information of the first mail may be, for example, an "payroll generated from the attendance table" edited by employee B holding the second mobile terminal.
In the scheme, the mail forwarding server generates a second display piece by using the attribute information of the second attachment, then generates a second mail based on the first mail and the forwarding information of the first mail, and then sends the first display piece, the second display piece and the second mail to the third mobile terminal.
In some embodiments, the receiving, by the mail forwarding server, a second attachment sent by a second mobile terminal and forwarding information of a first mail, generating a second display based on attribute information of the second attachment, and generating a second mail based on the first mail and the forwarding information of the first mail, where the second display corresponds to a first forwarding download link at the mail forwarding server, includes:
and creating a second storage unit in the mail forwarding server, storing the second attachment in the second storage unit, and generating a corresponding first forwarding download link according to the unit information of the second storage unit. The mail receiving and sending server is provided with a plurality of second storage units for storing second attachments, and then generates corresponding first forwarding download links by using the unit information of the second storage units, for example, a calling path of the second attachments in the second storage units can be established, the first forwarding download links are generated by using the calling path, and when a user clicks the first forwarding download links, the corresponding second attachments can be called in the corresponding second storage units based on the calling path.
And acquiring attribute information of each second accessory, wherein the attribute information comprises the data magnitude of the second accessory and the accessory type of the second accessory. The present solution further obtains a data size value of the second attachment and an attachment type of the second attachment, where the data size value may be, for example, an attachment size of the second attachment, for example, 50kb, and the attachment type may be, for example, "word type", "PDF type", and the like.
Selecting a corresponding second display image according to the accessory type of the second accessory, attaching a transparent layer with the same size as the second display image on the surface of the second display image, and filling the data quantity value to the transparent layer to generate second display information. The scheme is provided with the transparent layer, and the obtained data quantity value can be filled into the transparent layer so as to show the data quantity of the accessory to a user.
And receiving second authentication information generated by the second user based on the second mobile terminal. The second authentication information may be generated by clicking a trigger button on the second mobile terminal after the second user uploads the second accessory, for example, the trigger button may be disposed at an edge of the transparent layer, and the user may generate the second authentication information by clicking the trigger button.
And responding to the second authentication information to receive the operation trace of the second user on the transparent layer within a preset time period in real time, and generating second signature information according to the operation trace. After receiving the second authentication information, the user may perform an operation within the range of the transparent layer to generate an operation trace, where the operation trace may be, for example, a user signature, a user fingerprint, a user signature, and the like, and may represent information actually operated by the user.
And obtaining the second display piece based on the second display image, the second display information and the signature information. The second display part of the scheme displays the file type, the file size and the authentication information of the user.
It should be noted that, in the present scheme, by setting the second authentication information, on one hand, the responsibility system of the accessory information can be realized, and on the other hand, other recipient users can be allowed to securely check the content of the second accessory and perform a secure operation according to the content of the second accessory.
For example, the employee B needs to be responsible for the accuracy and authenticity of the content in the second accessory, so that the scheme introduces second authentication information (e.g., a signature of the employee B, a fingerprint of the employee B, etc.) to establish association between the second accessory and the corresponding employee B, and can prevent the second accessory from being maliciously tampered and uploaded by other employees; for another example, after receiving the email of employee B, employee C finds that the second attachment has the second authentication information of employee B, and then employee C may know that the second attachment has authenticity and may perform the next operation with confidence.
In practical application, the scheme may further include an authentication information comparison end, for example, when the employee C needs to verify whether the second authentication information on the second accessory is true, an authentication request may be generated, the second authentication information (for example, a signature or a fingerprint) on the transparent layer is extracted, and then the second authentication information is sent to the authentication information comparison end for comparison, and the authentication information comparison end may feed back an authentication result to the employee C, so that the employee B is prevented from being counterfeited by the user with the second authentication information, and the authenticity of the second accessory is further improved.
In some other embodiments, in order to ensure that the second attachment of the email has the second authentication information, when the first user wants to forward the second attachment to the second user, the email forwarding server may confirm whether the second attachment has the second authentication information, and if the second attachment does not have the second authentication information, the forwarded email may be returned to the second mobile terminal, and the second mobile terminal may be prompted to add the second authentication information. In some embodiments, the sending, by the mail forwarding server, the first display part, the second display part, and the second mail to a third mobile terminal includes:
and establishing a first display slot position corresponding to the second mail in the second mail, and filling the first display piece in the corresponding first display slot position in each second mail.
And acquiring a second number of the second display pieces, and establishing a second display slot position corresponding to the second number in the second mail.
And filling each second display piece to the corresponding second display slot position respectively, and sending a second mail filling the first display piece and the second display piece to the third mobile terminal.
It can be understood that if there are two accessories, then the present solution will provide two second display slots, and the second accessories may correspond to the second display slots one to one.
And S4, the mail forwarding server sends the mail label of the first mail to be forwarded to the mail sending and receiving server, so that the mail sending and receiving server sends the first attachment of the first mail to be forwarded to the mail forwarding server based on the mail label, the mail forwarding server stores the first attachment, and the mail sending and receiving server deletes the first attachment of the first mail to be forwarded.
When the method and the system execute forwarding operation, the mail forwarding server can want the mail receiving and sending server to send the mail tags to be forwarded, then the mail receiving and sending server can send the first attachments corresponding to the mail tags to the mail forwarding server, the mail forwarding server stores the first attachments, and meanwhile, the mail receiving and sending server deletes the first attachments.
It can be understood that, when the transmission operation is carried out, the first attachment in the mail receiving and sending server can be directly deleted, the data processing amount of the mail receiving and sending server is reduced, and if the first attachment is to be downloaded, the first attachment can be downloaded from the mail transmission server.
In some embodiments, the sending, by the mail forwarding server, a mail tag of a first mail to be forwarded to the mail sending and receiving server, so that the mail sending and receiving server sends a first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, where the mail forwarding server stores the first attachment, and the mail sending and receiving server performs first attachment deletion processing on the first mail to be forwarded, including:
and creating a third storage unit in the mail forwarding server, storing the first attachment in the third storage unit, and generating a corresponding second forwarding downloading link according to the unit information of the third storage unit. According to the scheme, a plurality of third storage units are created in the mail forwarding server, the second attachments are stored, and then corresponding second forwarding downloading links are generated by using unit information of the third storage units, for example, a calling path of the second attachments in the third storage units can be established, the second forwarding downloading links are generated by using the calling path, and when a user clicks the second forwarding downloading links, the corresponding second attachments can be called in the corresponding third storage units based on the calling path.
And deleting the first receiving and sending download link corresponding to the first accessory, and correspondingly storing the second forwarding download link and the first accessory.
In practical application, the scheme considers that the mail has privacy and needs privacy protection, for example, one supervisor needs to receive performance information of 3 salesmen, 3 salesmen need to be sent to the supervisor in a form of mail forwarding, performance information among 3 sales cannot be seen mutually, and each employee can only upload the information of the employee, on the basis of the above embodiment, the scheme provides steps S5 to S9, which are specifically as follows:
s5, obtaining the role information of each terminal and generating the corresponding mail role structure tree, wherein each node in the mail role structure tree has the role information of the corresponding terminal.
In this scheme, the mail role structure tree may include a parent node and a child node, where the role information corresponding to the parent node may be, for example, a supervisor (for example, supervisor a), and the role information corresponding to the child node may be 3 salesmen (for example, employee a, employee B, and employee C) in their department.
S6, obtaining first role information of the first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption strategy.
After the first role information in the mail role structure tree is obtained, the first attachment can be encrypted by using the first role information to obtain a first encryption strategy. It is understood that the first encryption policy may be that the upper dimension node of the node can see the content corresponding to the attachment, and the lower dimension node is invisible, for example, supervisor a can see the attachment content of employee a, employee B, and employee C, but employee a and employee B cannot see each other, so as to ensure the confidentiality of the attachment content among employee a, employee B, and employee C.
In some embodiments, the obtaining first role information of the first mobile terminal in the email role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption policy includes:
and acquiring a first node in the mail role structure tree corresponding to the first role information, selecting all upper-dimensional nodes of the first node as corresponding second role information, and counting all the second role information to generate a second role set. In the scheme, one or more second role information can be contained in the second role set, and the scheme does not limit that all the upper-dimension nodes are the upper-dimension nodes in the second role set, but all the upper-dimension nodes. For example, if the last level upper dimension node of employee a, employee B, and employee C is supervisor a, the last level upper dimension node of supervisor a is leader B, and the second role set is (supervisor a; leader B).
And identity encryption is carried out on the first attachment based on the second role set, so that all second role information in all second role sets can download the first attachment. According to the scheme, the first attachment is encrypted by using the identity of the second role set, so that all second role information in the second role set can download the first attachment.
In some embodiments, the obtaining a first node in the mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and performing statistics on all the second role information to generate a second role set includes:
receiving role configuration information uploaded by a first mobile terminal, and selecting third role information corresponding to a mail role structure tree based on the role configuration information; and updating the second role set according to the third role information so that the second role set comprises the third role information.
In the scheme, the fact that the attachments sent by the employee A may be the attachments which the employee B wants to view together is considered, at this time, the employee A can upload role configuration information by using the first mobile terminal, the role configuration information can be, for example, "the employee A needs the employee B to view the attachments", at this time, corresponding third role information can be extracted as the employee B, and then a second role set corresponding to the employee A is updated (supervisor A; leader B; employee B), that is, the supervisor A, the leader B and the employee B can view the first attachments of the employee A.
And S7, if it is determined that any one of the second mobile terminal or the third mobile terminal triggers the first transceiving download link or the second forwarding download link corresponding to the first attachment, acquiring the current identity information of the second mobile terminal or the third mobile terminal. According to the scheme, the downloading request of the first accessory is monitored, and when any one of the second mobile terminal or the third mobile terminal triggers the first receiving and sending downloading link or the second forwarding downloading link corresponding to the first accessory, the current identity information of the second mobile terminal or the third mobile terminal corresponding to the first accessory to be downloaded is inquired.
S8, if the current identity information satisfies the first encryption policy, sending the first attachment to the corresponding second mobile terminal or third mobile terminal. After inquiring the current identity information of the second mobile terminal or the third mobile terminal corresponding to the first attachment to be downloaded, the scheme can judge whether the current identity information meets the first encryption strategy, namely judge whether the current identity information is in the second role set, and if so, the scheme can send the first attachment to the corresponding second mobile terminal or the third mobile terminal.
S9, if the current identity information does not satisfy the first encryption policy, sending a download inquiry message to the first mobile station, and if the first mobile station feeds back corresponding download agreement information, sending the first attachment to the corresponding second mobile station or third mobile station. After inquiring the current identity information of the second mobile terminal or the third mobile terminal corresponding to the first accessory, the method and the system can judge whether the current identity information meets the first encryption strategy, namely judge whether the current identity information is in the second role set, if not, the method and the system can send download inquiry information to the first mobile terminal, wherein the download inquiry information can be 'the download request of the second mobile terminal or the third mobile terminal is agreed', if the first mobile terminal feeds back the corresponding download agreement information, the download agreement information can be 'the download request of the second mobile terminal or the third mobile terminal is agreed', and the first accessory is sent to the corresponding second mobile terminal or the third mobile terminal.
And acquiring the type information of all second mails corresponding to each enterprise in a historical preset time period, wherein the type information is compensation information statistics, sales information statistics and the like. And classifying all the first mails and/or the second mails according to the type information to obtain a mail history type set.
Counting third role information corresponding to each first mobile terminal in a mail history type set, wherein each first mobile terminal may have a plurality of different third role information, counting the total number of mails with any one third role added in each mail history type set to obtain a first mail number, counting the number of mails with the same third role information added in each mail history type set to obtain a second mail number, counting the total number of the third role information added in each mail history type set, calculating the fit coefficient of each third role information compared with the mail history type set by the following formula,
wherein,
the pth third color information is the fit coefficient of the email history type set,
is a weight value of the time, and is,
a time period is preset for the history,
is a standard time period of the time frame,
is a value of a time constant, and,
the weight value of the mail quantity corresponding to the role,
the second mail number corresponding to the nth third color information,
is as follows
The second mail quantity corresponding to the third color information, n is the upper limit value of the third color information in the mail history type set,
for the first number of mail pieces,
for a set of mail history typesAccording to the weight value of the corresponding mail quantity,
a third mail quantity for all mail in the history type set,
is a numerical constant value.
By passing
The difference between the historical preset time period and the standard time period can be obtained if
The larger the proof is, the longer the history preset time period is, at this time
The smaller and thus the smaller the fit coefficient, i.e. the lower the fit between a character in the set of history types of mail and a mail of the corresponding type, the smaller the fit coefficient is, the smaller the fit between the character in the set of history types of mail and the mail of the corresponding type is, the smaller the fit coefficient is, and the smaller the fit coefficient is, the smaller the fit coefficient is, the fit between the character in the set of history types of mail and the mail of the corresponding type is, and the fit coefficient is, the smaller the fit coefficient is, and the fit coefficient is, and the smaller the fit coefficient is
The ratio of the mail quantity of each third color information to the mail quantity of all third color information can be obtained if
The larger the corresponding role is, the closer the corresponding role is to the set of mail history types, and the invention can be based on
Obtaining the proportion of the number of the mails with the added roles in the history type set of the mails to the number of all the mails, if
The larger the mail is, the more the corresponding third color information is added to the mail of the type. The invention provides the technologyAccording to the technical scheme, calculation can be carried out by combining multiple dimensions to obtain the attaching coefficient of each third triangle and the corresponding mail history type set, and the higher the attaching coefficient is, the corresponding third triangle information can be added when the corresponding first mobile terminal sends the mail. By the method, the corresponding third color information can be automatically added according to different mail types sent by different first mobile terminals in each company, so that the mail sending efficiency of workers is improved, and the operation flow of the workers is reduced.
And if the fit coefficient of certain third color information in the mail history type set is larger than the preset coefficient, automatically adding the corresponding third color information when the first mobile terminal sends the first mail of the corresponding type.
In the actual operation process, the invention acquires the operation behavior of the first mobile terminal when the first mobile terminal sends the mail and automatically adds the third triangle color information, and deletes the automatically added third triangle color information if the first mobile terminal judges that the added third triangle color information is wrong. And counting the deleted quantity and the undeleted quantity after the third triangle information is automatically added to obtain a first deleting frequency, and if the first deleting frequency is greater than a preset frequency, stopping adding the corresponding third triangle information.
The first deletion frequency is calculated by the following formula,
wherein,
in order to be the first frequency of deletion,
for the amount deleted after the third color information is automatically added,
for automatically adding third color informationNumber not deleted.
According to the technical scheme, the third color information can be dynamically adjusted, whether the automatically added third color information is automatically added or not is processed according to the deleting and non-deleting behaviors of the automatically added third color information by the user, so that the automatically added third color information can be automatically deleted according to the behaviors of the user after the automatically added third color information is automatically added, the automatic continuous updating of the third color information is carried out, and the first mobile terminal is assisted to rapidly send the mails.
Referring to fig. 3, it is a schematic structural diagram of a data processing-based mail forwarding apparatus provided in this embodiment, where the data processing-based mail forwarding apparatus includes:
the sending module is used for enabling the mail receiving and sending server to generate a first display piece according to the attribute information of the first attachment if the first mobile terminal uploads a first mail with a first attachment, and sending the first mail and the first display piece to a second mobile terminal, wherein the first display piece corresponds to a first receiving and sending downloading link in the mail receiving and sending server;
the acquisition module is used for acquiring a first attachment corresponding to a first mail to be forwarded in the mail receiving and sending server by the mail forwarding server if the second mobile terminal is judged to send a forwarding request to the mail forwarding server;
the generating module is used for enabling the mail forwarding server to receive a second attachment and forwarding information of a first mail sent by a second mobile terminal, generating a second display piece based on attribute information of the second attachment, generating a second mail based on the first mail and the forwarding information of the first mail, wherein the second display piece corresponds to a first forwarding downloading link in the mail forwarding server, and the mail forwarding server sends the first display piece, the second display piece and the second mail to a third mobile terminal;
the storage module is used for enabling the mail forwarding server to send the mail tag of the first mail to be forwarded to the mail transmitting and receiving server, so that the mail transmitting and receiving server sends the first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, the mail forwarding server stores the first attachment, and the mail transmitting and receiving server deletes the first attachment of the first mail to be forwarded.
The apparatus in the embodiment shown in fig. 3 can be correspondingly used to perform the steps in the method embodiment shown in fig. 1, and the implementation principle and technical effect are similar, which are not described herein again.
Referring to fig. 4, it is a schematic diagram of a hardware structure of an electronic device provided in this embodiment, where the electronic device 40 includes: a processor 41, memory 42 and computer programs; wherein
A memory 42 for storing the computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that implements the above-described method.
A processor 41 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made in particular to the description relating to the preceding method embodiment.
Alternatively, the memory 42 may be separate or integrated with the processor 41.
When the memory 42 is a device independent of the processor 41, the apparatus may further include:
a bus 43 for connecting the memory 42 and the processor 41.
The present invention also provides a readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media can be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.