CN117527747A - Mail sending method and device and electronic equipment - Google Patents
Mail sending method and device and electronic equipment Download PDFInfo
- Publication number
- CN117527747A CN117527747A CN202311610753.XA CN202311610753A CN117527747A CN 117527747 A CN117527747 A CN 117527747A CN 202311610753 A CN202311610753 A CN 202311610753A CN 117527747 A CN117527747 A CN 117527747A
- Authority
- CN
- China
- Prior art keywords
- password
- mailbox
- started
- encryption function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 230000006870 function Effects 0.000 claims description 52
- 230000005540 biological transmission Effects 0.000 claims description 5
- 230000002159 abnormal effect Effects 0.000 claims description 4
- 241001481833 Coryphaena hippurus Species 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 241001125840 Coryphaenidae Species 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application provides a mail sending method, a mail sending device and electronic equipment, wherein the method is applied to a distributed task scheduling platform; the method comprises the following steps: receiving a mail sending request; the request carries a mailbox user name and a mailbox password; judging whether the mail password encryption function is started or not; the mail password encryption function is started to characterize the mailbox password as a ciphertext password; the mail password encryption function is not started to characterize that the mailbox password is a plaintext password; if yes, decrypting the cipher text password of the mailbox password to obtain a plaintext password; user authentication and mail sending are performed based on the plaintext password. When a mail sending request is received, whether a mail password encryption function is started or not is firstly judged, mail password decryption is carried out under the condition of function starting, and then a subsequent mail sending authentication process is carried out.
Description
Technical Field
The present invention relates to the field of software technologies, and in particular, to a method and an apparatus for sending mail, and an electronic device.
Background
With the rapid development of network technology, the network security problem is increasingly highlighted, and becomes a key problem of social concern. Such as the transmission of passwords, computer passwords are extremely important, many security systems are password-based, and disclosure of a password means, in a sense, a comprehensive collapse of the security system. In order to prevent useful or privateized information from being intercepted and stolen on the network, the storage and transmission of the password must be encrypted. At present, mailbox configuration information in the Dolphinscheduler1.3.9 platform is stored in a configuration file in a plaintext form, so that the security risk of the system is increased.
Disclosure of Invention
The invention aims to provide a mail sending method, a mail sending device and electronic equipment, when a mail sending request is received, whether a mail password encryption function is started or not is firstly judged, mail password decryption is carried out under the condition of function starting, and then a subsequent mail sending authentication process is carried out.
In a first aspect, an embodiment of the present application provides a mail sending method, where the method is applied to a distributed task scheduling platform; the method comprises the following steps: receiving a mail sending request; the request carries a mailbox user name and a mailbox password; judging whether the mail password encryption function is started or not; the mail password encryption function is started to characterize the mailbox password as a ciphertext password; the mail password encryption function is not started to characterize that the mailbox password is a plaintext password; if yes, decrypting the cipher text password of the mailbox password to obtain a plaintext password; user authentication and mail sending are performed based on the plaintext password.
In a preferred embodiment of the present application, the step of determining whether the mail encryption function is started includes: judging whether the mail cipher encryption switch is in an on state; if so, it is determined that the mail cipher encryption function has been started.
In a preferred embodiment of the present application, the step of determining whether the mail cipher encryption opening is in an open state includes: acquiring an identifier for representing a mail password encryption function; if the identifier is the first identifier, determining that the mail cipher encryption opening is in an open state; if the identifier is the second identifier, determining that the mail cipher encryption opening is in a closed state; the first identifier is different from the second identifier.
In a preferred embodiment of the present application, the step of decrypting the ciphertext password of the mailbox password to obtain the plaintext password includes: acquiring a data password encryption keyword; and decrypting the cipher text password of the mailbox password based on the data password encryption keyword to obtain a plaintext password.
In a preferred embodiment of the present application, before the step of receiving the mail sending request, the method further includes: responding to the setting operation aiming at the mail configuration information, and completing the configuration of the mail configuration information; wherein the setting operation at least comprises: and adding a ciphertext password corresponding to the mailbox password, and opening an email password encryption switch.
In a preferred embodiment of the present application, the method further includes: if the mail cipher encryption function is detected to be abnormal, the mail cipher encryption switch is closed, and a rollback operation is performed.
In a preferred embodiment of the present application, the distributed task scheduling platform includes a dolphin schedule 1.3.9 platform.
In a second aspect, an embodiment of the present application further provides a mail sending device, where the device is applied to a distributed task scheduling platform; the device comprises: the request receiving module is used for receiving a mail sending request; the request carries a mailbox user name and a mailbox password; the judging module is used for judging whether the mail password encryption function is started or not; the mail password encryption function is started to characterize the mailbox password as a ciphertext password; the mail password encryption function is not started to characterize that the mailbox password is a plaintext password; the decryption module is used for decrypting the cipher text password of the mailbox password to obtain a plaintext password when the judgment result of the judgment module is yes; and the authentication sending module is used for carrying out user authentication and mail sending based on the plaintext password.
In a third aspect, embodiments of the present application further provide an electronic device, including a processor and a memory, where the memory stores computer executable instructions executable by the processor, where the processor executes the computer executable instructions to implement the method according to the first aspect.
In a fourth aspect, embodiments of the present application also provide a computer-readable storage medium storing computer-executable instructions that, when invoked and executed by a processor, cause the processor to implement the method of the first aspect.
The mail sending method, the mail sending device and the electronic equipment provided by the embodiment of the application are applied to a distributed task scheduling platform; firstly, receiving a mail sending request; the request carries a mailbox user name and a mailbox password; judging whether the mail password encryption function is started or not; the mail password encryption function is started to characterize the mailbox password as a ciphertext password; the mail password encryption function is not started to characterize that the mailbox password is a plaintext password; if yes, decrypting the cipher text password of the mailbox password to obtain a plaintext password; user authentication and mail sending are performed based on the plaintext password. In the embodiment of the application, when a mail sending request is received, whether the mail password encryption function is started or not is firstly judged, mail password decryption is carried out under the condition of function starting, and then a subsequent mail sending authentication process is carried out.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a prior art mail sending process;
fig. 2 is a flowchart of a mail sending method provided in an embodiment of the present application;
fig. 3 is a schematic diagram of a mail sending process according to an embodiment of the present application;
fig. 4 is a block diagram of a mail sending device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
At present, for the Dolphinscheduler1.3.9 task scheduling platform, if the mail sending function of an application system is used, corresponding information needs to be configured in the conf/alert-pre files in advance. The flow of sending the mail by the application system is shown in fig. 1, after the session is acquired, the mail configuration attribute and the mail user attribute are loaded, wherein the mail user attribute comprises a user name and a password, the password is a plaintext password, decryption is not needed, authentication is directly carried out, recipient information and copy person information are assembled, and subsequent mail sending is carried out. In the process, the mail password is a plaintext password, so that the security risk of the system is increased.
Based on this, when receiving a mail sending request, the embodiments of the present application provide a mail sending method, an apparatus, and an electronic device, which first determine whether a mail password encryption function is started, decrypt a mail password when the function is started, and then perform a subsequent authentication mail sending process. For the convenience of understanding the present embodiment, a detailed description will be first given of a mail sending method disclosed in the embodiment of the present application.
Fig. 2 is a flowchart of a mail sending method according to an embodiment of the present application, where the method is applied to a distributed task scheduling platform; the distributed task scheduling platform may be a dolphins duler1.3.9 platform.
The method specifically comprises the following steps:
step S202, receiving a mail sending request; the request carries a mailbox user name and a mailbox password;
step S204, judging whether the mail password encryption function is started; the mail password encryption function is started to characterize the mailbox password as a ciphertext password; the mail cipher encryption function is not enabled to characterize the mailbox cipher as a plaintext cipher.
In the embodiment of the application, a mail cipher encryption function is added, and under the condition that the function is started, a mailbox cipher is configured in a configuration file in the form of a ciphertext cipher, so that after a mail sending request is received, whether the mail cipher encryption function is in a starting state or not needs to be judged first, if so, step S206 is performed, and the ciphertext cipher is decrypted on the mailbox cipher to obtain a plaintext cipher; then, step S208 is executed to perform user authentication and mail transmission based on the plaintext password. If not, step S208 is directly performed.
In the mail sending method provided by the embodiment of the application, when a mail sending request is received, whether the mail password encryption function is started or not is firstly judged, mail password decryption is carried out under the condition that the function is started, and then a subsequent mail sending authentication process is carried out.
The embodiment of the application also provides another mail sending method, which is realized on the basis of the embodiment; the present embodiment focuses on the judging process and the configuring process of whether the function is turned on or not.
In a preferred embodiment of the present application, the step of determining whether the mail encryption function is started includes:
(1) Judging whether the mail cipher encryption switch is in an on state; in specific implementation, an identifier for representing the encryption function of the mail password is obtained; if the identifier is the first identifier, determining that the mail cipher encryption opening is in an open state; if the identifier is the second identifier, determining that the mail cipher encryption opening is in a closed state; wherein the first identifier is different from the second identifier.
(2) If so, it is determined that the mail cipher encryption function has been started. In this case, it is explained that the mail cipher is configured in a ciphertext form.
(3) If not, determining that the mail cipher encryption function is not started. In this case, it is explained that the mail cipher is configured in a plaintext form.
Referring to the schematic illustration of the mail sending process provided by the embodiment of the present application shown in fig. 3, only the necessary improvement from the acquisition session to the assembly of recipient information is shown, and the other parts are the same as those shown in fig. 1. In this embodiment, an encryption switch is added to the configuration file to control whether the program uses the ciphertext encryption mode to read the password. And adding a data password encryption keyword key in the configuration file for encryption and decryption. And adding a switch judgment in the code, and decrypting the password in the configuration file if the switch is opened. That is, based on the original mail sending flow, a process of loading the related attribute of the mail cipher encryption, a judging process of whether the mail cipher encryption switch is opened or not, and a process of decrypting the ciphertext under the condition that the switch is opened are added.
In a preferred embodiment of the present application, the step of decrypting the ciphertext password of the mailbox password to obtain the plaintext password includes: acquiring a data password encryption keyword; as shown in the key of fig. 3, the mailbox password is encrypted based on the data password encryption keyword to obtain a plaintext password.
In a preferred embodiment of the present application, before the step of receiving the mail sending request, the method further includes: responding to the setting operation aiming at the mail configuration information, and completing the configuration of the mail configuration information; wherein the setting operation at least comprises: and adding a ciphertext password corresponding to the mailbox password, and opening an email password encryption switch. Here, the ciphertext password is obtained by encrypting the plaintext password by the key, and therefore, the key is also required for decryption.
In a preferred embodiment of the present application, the method further includes: if the mail cipher encryption function is detected to be abnormal, the mail cipher encryption switch is closed, and a rollback operation is performed. Under the condition that the mail cipher encryption switch is closed, the recovery speed of the function can be increased.
In the mail sending method provided by the embodiment of the application, the plaintext information of the mailbox configuration is encrypted, so that the security risk of an application system is reduced.
Based on the method embodiment, the embodiment of the application also provides a mail sending device which is applied to the distributed task scheduling platform; referring to fig. 4, the apparatus includes: a request receiving module 42 for receiving a mail transmission request; the request carries a mailbox user name and a mailbox password; a judging module 44, configured to judge whether the mail cipher encryption function is started; the mail password encryption function is started to characterize the mailbox password as a ciphertext password; the mail password encryption function is not started to characterize that the mailbox password is a plaintext password; the decryption module 46 is configured to decrypt the ciphertext password from the mailbox password to obtain a plaintext password when the determination result of the determination module is yes; the authentication sending module 48 is used for user authentication and mail sending based on the plaintext password.
In the preferred embodiment of the present application, the above-mentioned judging module 44 is configured to judge whether the mail encryption switch is in an on state; if so, it is determined that the mail cipher encryption function has been started.
In the preferred embodiment of the present application, the determining module 44 is configured to obtain an identifier for characterizing the cryptographic function of the mail; if the identifier is the first identifier, determining that the mail cipher encryption opening is in an open state; if the identifier is the second identifier, determining that the mail cipher encryption opening is in a closed state; the first identifier is different from the second identifier.
In the preferred embodiment of the present application, the decryption module 46 is configured to obtain a data password encryption keyword; and decrypting the cipher text password of the mailbox password based on the data password encryption keyword to obtain a plaintext password.
In a preferred embodiment of the present application, the apparatus further includes a configuration module, configured to respond to a setting operation for the mail configuration information before the step of receiving the mail sending request, and complete configuration of the mail configuration information; wherein the setting operation at least comprises: and adding a ciphertext password corresponding to the mailbox password, and opening an email password encryption switch.
In a preferred embodiment of the present application, the apparatus further includes: and the exception handling module is used for closing the mail password encryption switch and executing rollback operation if the mail password encryption function is detected to be abnormal.
In a preferred embodiment of the present application, the distributed task scheduling platform includes a dolphin schedule 1.3.9 platform.
The device provided in the embodiments of the present application has the same implementation principle and technical effects as those of the foregoing method embodiments, and for a brief description, reference may be made to corresponding matters in the foregoing method embodiments where no reference is made to the description of the embodiments of the device.
The embodiment of the present application further provides an electronic device, as shown in fig. 5, which is a schematic structural diagram of the electronic device, where the electronic device includes a processor 51 and a memory 50, where the memory 50 stores computer executable instructions that can be executed by the processor 51, and the processor 51 executes the computer executable instructions to implement the above method.
In the embodiment shown in fig. 5, the electronic device further comprises a bus 52 and a communication interface 53, wherein the processor 51, the communication interface 53 and the memory 50 are connected by the bus 52.
The memory 50 may include a high-speed random access memory (RAM, random Access Memory), and may further include a non-volatile memory (non-volatile memory), such as at least one magnetic disk memory. The communication connection between the system network element and at least one other network element is achieved via at least one communication interface 53 (which may be wired or wireless), and the internet, wide area network, local network, metropolitan area network, etc. may be used. Bus 52 may be an ISA (Industry Standard Architecture ) bus, a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus, or EISA (Extended Industry Standard Architecture ) bus, among others. The bus 52 may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, only one bi-directional arrow is shown in FIG. 5, but not only one bus or type of bus.
The processor 51 may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in the processor 51 or by instructions in the form of software. The processor 51 may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but also digital signal processors (Digital Signal Processor, DSP for short), application specific integrated circuits (Application Specific Integrated Circuit, ASIC for short), field-programmable gate arrays (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in hardware, in a decoded processor, or in a combination of hardware and software modules in a decoded processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory and the processor 51 reads information in the memory and in combination with its hardware performs the steps of the method of the previous embodiment.
The embodiment of the present application further provides a computer readable storage medium, where a computer executable instruction is stored, where the computer executable instruction, when being called and executed by a processor, causes the processor to implement the foregoing method, and the specific implementation may refer to the foregoing method embodiment and is not described herein.
The method, the apparatus and the computer program product of the electronic device provided in the embodiments of the present application include a computer readable storage medium storing program codes, where the instructions included in the program codes may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment and will not be described herein.
The relative steps, numerical expressions and numerical values of the components and steps set forth in these embodiments do not limit the scope of the present application unless specifically stated otherwise.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In the description of the present application, it should be noted that the directions or positional relationships indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. are based on the directions or positional relationships shown in the drawings, are merely for convenience of description of the present application and to simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present application. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the foregoing examples are merely specific embodiments of the present application, and are not intended to limit the scope of the present application, but the present application is not limited thereto, and those skilled in the art will appreciate that while the foregoing examples are described in detail, the present application is not limited thereto. Any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or make equivalent substitutions for some of the technical features within the technical scope of the disclosure of the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. A mail sending method is characterized in that the method is applied to a distributed task scheduling platform; the method comprises the following steps:
receiving a mail sending request; the request carries a mailbox user name and a mailbox password;
judging whether the mail password encryption function is started or not; the mail password encryption function is started to characterize the mailbox password as a ciphertext password; the mail password encryption function is not started to characterize the mailbox password as a plaintext password;
if yes, decrypting the cipher text password of the mailbox password to obtain a plaintext password;
user authentication and mail sending are performed based on the plaintext password.
2. The method of claim 1, wherein the step of determining whether the mail cipher encryption function has been activated comprises:
judging whether the mail cipher encryption switch is in an on state;
if so, it is determined that the mail cipher encryption function has been started.
3. The method of claim 1, wherein the step of determining whether the mail cipher encryption opening is in an open state comprises:
acquiring an identifier for representing a mail password encryption function;
if the identifier is a first identifier, determining that the mail password encryption opening is in an open state;
if the identifier is a second identifier, determining that the mail cipher encryption opening is in a closed state; the first identifier is different from the second identifier.
4. The method of claim 2, wherein decrypting the mailbox password to obtain a plaintext password comprises:
acquiring a data password encryption keyword;
and decrypting the cipher text password of the mailbox password based on the data password encryption keyword to obtain a plaintext password.
5. The method of claim 4, further comprising, prior to the step of receiving the mail transmission request:
responding to the setting operation aiming at the mail configuration information, and completing the configuration of the mail configuration information; wherein the setting operation at least comprises: and adding a ciphertext password corresponding to the mailbox password, and opening the mail password encryption switch.
6. The method according to claim 1, wherein the method further comprises:
and if the mail cipher encryption function is detected to be abnormal, closing the mail cipher encryption switch and executing rollback operation.
7. The method of claim 1, wherein the distributed task scheduling platform comprises a dolphin schedule 1.3.9 platform.
8. A mail sending device, wherein the device is applied to a distributed task scheduling platform; the device comprises:
the request receiving module is used for receiving a mail sending request; the request carries a mailbox user name and a mailbox password;
the judging module is used for judging whether the mail password encryption function is started or not; the mail password encryption function is started to characterize the mailbox password as a ciphertext password; the mail password encryption function is not started to characterize the mailbox password as a plaintext password;
the decryption module is used for decrypting the cipher text password of the mailbox password to obtain a plaintext password when the judgment result of the judgment module is yes;
and the authentication sending module is used for carrying out user authentication and mail sending based on the plaintext password.
9. An electronic device comprising a processor and a memory, the memory storing computer-executable instructions executable by the processor, the processor executing the computer-executable instructions to implement the method of any one of claims 1 to 7.
10. A computer readable storage medium storing computer executable instructions which, when invoked and executed by a processor, cause the processor to implement the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311610753.XA CN117527747A (en) | 2023-11-28 | 2023-11-28 | Mail sending method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311610753.XA CN117527747A (en) | 2023-11-28 | 2023-11-28 | Mail sending method and device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117527747A true CN117527747A (en) | 2024-02-06 |
Family
ID=89760680
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311610753.XA Pending CN117527747A (en) | 2023-11-28 | 2023-11-28 | Mail sending method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117527747A (en) |
-
2023
- 2023-11-28 CN CN202311610753.XA patent/CN117527747A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323260B2 (en) | Method and device for identity verification | |
KR102307665B1 (en) | identity authentication | |
CN111680305B (en) | Data processing method, device and equipment based on block chain | |
CN106997439B (en) | TrustZone-based data encryption and decryption method and device and terminal equipment | |
CN112513857A (en) | Personalized cryptographic security access control in a trusted execution environment | |
US20090298468A1 (en) | System and method for deleting data in a communication device | |
CN106980793B (en) | TrustZone-based universal password storage and reading method, device and terminal equipment | |
CN106992851B (en) | TrustZone-based database file password encryption and decryption method and device and terminal equipment | |
CN105975867B (en) | A kind of data processing method | |
CN106465076B (en) | Method and terminal for controlling short message reading | |
CN113704826A (en) | Privacy protection-based business risk detection method, device and equipment | |
CN111190974B (en) | Method, device and equipment for forwarding and acquiring verifiable statement | |
CN112287372A (en) | Method and apparatus for protecting clipboard privacy | |
US11989273B2 (en) | Biometric locking methods and systems for internet of things and the connected person | |
CN112733180A (en) | Data query method and device and electronic equipment | |
CN115982761A (en) | Sensitive information processing method and device, electronic equipment and storage medium | |
CN112866987B (en) | Networking verification method, networking verification device and computer readable storage medium | |
CN113807856A (en) | Resource transfer method, device and equipment | |
CN112039662B (en) | Symmetric encryption transmission method for sensitive data in secret related unit Web application webpage | |
CN117610083A (en) | File verification method and device, electronic equipment and computer storage medium | |
CN110602051B (en) | Information processing method based on consensus protocol and related device | |
CN112182509A (en) | Method, device and equipment for detecting abnormity of compliance data | |
CN106778227A (en) | Applied program processing method, application program launching method and device | |
CN117527747A (en) | Mail sending method and device and electronic equipment | |
CN116070293A (en) | Processing method and device for firmware protection through chip encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |