WO2022142112A1 - 基于区块链的邮件处理方法、邮件发送端、接收端及设备 - Google Patents

基于区块链的邮件处理方法、邮件发送端、接收端及设备 Download PDF

Info

Publication number
WO2022142112A1
WO2022142112A1 PCT/CN2021/096703 CN2021096703W WO2022142112A1 WO 2022142112 A1 WO2022142112 A1 WO 2022142112A1 CN 2021096703 W CN2021096703 W CN 2021096703W WO 2022142112 A1 WO2022142112 A1 WO 2022142112A1
Authority
WO
WIPO (PCT)
Prior art keywords
email
target
mail
exclusive
sender
Prior art date
Application number
PCT/CN2021/096703
Other languages
English (en)
French (fr)
Inventor
王健宗
瞿晓阳
李佳琳
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2022142112A1 publication Critical patent/WO2022142112A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Definitions

  • the present application relates to the field of blockchain technology, and in particular, to a blockchain email processing method, an email sender, a receiver, and equipment.
  • the traditional email system is composed of User Agent (MUA), Mail Transfer Agent (MTA), and Mail Delivery Agent (MDA).
  • MUA User Agent
  • MTA Mail Transfer Agent
  • MDA Mail Delivery Agent
  • the vulnerability obtains sensitive information in the mailbox, so it may be intercepted during transmission, so that the email can be read arbitrarily, leading to the theft of important information in the email, and the email security is low.
  • the embodiments of the present application provide a blockchain-based mail processing method, a mail sending end, a receiving end, and a device, so as to solve the problem of low mail security.
  • a blockchain-based mail processing method applied to a mail sender comprising:
  • Encrypt the email content of the email with the exclusive key obtain the email encrypted file, and store the email encrypted file in the first cloud server;
  • a blockchain-based mail processing method applied to a mail receiving end, comprising:
  • the target encrypted message is obtained by the email sender encrypting the cloud storage index address and the exclusive key according to the public key of the email recipient,
  • the cloud storage index address is the corresponding storage index when the email sender encrypts the email content to be sent by the email sender with the exclusive key, and stores the encrypted email file in the first cloud server.
  • the exclusive key is the email sending The terminal is generated according to the exclusive information of the email sender;
  • An email sender including:
  • the first acquisition module is used to acquire the content of the email and the exclusive information of the email sender when the email sender finishes editing the email;
  • the generation module is used to generate an exclusive key according to the exclusive information of the email sender
  • the first encryption module is used for encrypting the mail content of the mail by using the exclusive key to obtain the mail encrypted file
  • a storage module for storing the encrypted email file to the first cloud server
  • the second obtaining module is configured to obtain the cloud storage index address corresponding to the encrypted email file fed back by the first cloud server, and obtain the public key of the email recipient;
  • the second encryption module is used for encrypting the cloud storage index address and the exclusive key according to the public key of the email recipient to obtain the target encrypted message;
  • a determination module for determining the target blockchain network for storing the target encrypted message
  • the sending module is used to store the target encrypted message in the target blockchain network, and send the storage location information of the target encrypted message in the target blockchain network to the mail receiving end, so that the mail receiving end can store the encrypted message according to the target. Location information to get mail content.
  • a mail receiver comprising:
  • the receiving module is used to receive the storage location information of the target encrypted message sent by the mail sender in the target blockchain network, wherein the target encrypted message is the cloud storage index address and exclusive password of the mail sender according to the public key of the mail receiver.
  • the cloud storage index address is the corresponding storage index when the email sender encrypts the email content with the exclusive key and stores the encrypted email file in the first cloud server, and the exclusive key is the email sender sends the email according to the email. generated by the user’s proprietary information;
  • a first reading module configured to read the target encrypted message from the target blockchain network according to the storage location information of the target encrypted message
  • the first decryption module is used to decrypt the target encrypted message through the private key of the email recipient to obtain the cloud storage index address and the exclusive key;
  • the second reading module is used to read the encrypted mail file from the first cloud server through the cloud storage index address;
  • the second decryption module is used for decrypting the email encrypted file by using the exclusive key to obtain the email content.
  • a computer device comprising a memory, a processor, and computer-readable instructions stored in the memory and executable on the processor, wherein the processor implements the following steps when executing the computer-readable instructions: when an email sender finishes editing an email , obtain the email content and the email sender's exclusive information, and generate an exclusive key based on the email sender's exclusive information; encrypt the email content with the exclusive key, get the email encrypted file, and store the email encrypted file in the The first cloud server; obtain the cloud storage index address corresponding to the encrypted email file fed back by the first cloud server, and obtain the public key of the email recipient; according to the public key of the email recipient, the cloud storage index address and the exclusive key Perform encryption to obtain the target encrypted message; determine the target blockchain network for storing the target encrypted message; store the target encrypted message in the target blockchain network, and send the target encrypted message in the storage location information of the target blockchain network To the mail receiving end, so that the mail receiving end obtains the content of the mail according to the storage location information of the target encrypted message.
  • a computer device comprising a memory, a processor, and a computer-readable instruction stored in the memory and running on the processor, wherein the processor implements the following steps when executing the computer-readable instruction: receiving a target encryption sent by an email sending end Information about the storage location of the message in the target blockchain network, where the target encrypted message is obtained by the email sender encrypting the cloud storage index and exclusive key according to the public key of the email recipient, and the cloud storage index address is the email sender's address.
  • the exclusive key encrypts the email content of the email to be sent by the email sender and stores the encrypted email file in the first cloud server.
  • the corresponding storage index, the exclusive key is generated by the email sender based on the email sender's exclusive information ; According to the storage location information of the target encrypted message, read the target encrypted message from the target blockchain network; decrypt the target encrypted message through the private key of the mail recipient to obtain the cloud storage index address and exclusive key; The index address is stored, and the email encrypted file is read from the first cloud server; the email encrypted file is decrypted by using the exclusive key to obtain the email content.
  • One or more readable storage media storing computer-readable instructions, the computer-readable instructions when executed by one or more processors cause the one or more processors to perform the following steps: when the email sender finishes editing the email, Obtain the email content and the email sender's exclusive information, and generate an exclusive key based on the email sender's exclusive information; encrypt the email content with the exclusive key, obtain an email encrypted file, and store the email encrypted file in the first page.
  • a cloud server obtain the cloud storage index address corresponding to the email encrypted file fed back by the first cloud server, and obtain the public key of the email recipient; perform the cloud storage index address and exclusive key according to the public key of the email recipient.
  • Encrypt to obtain the target encrypted message determine the target blockchain network for storing the target encrypted message; store the target encrypted message in the target blockchain network, and send the storage location information of the target encrypted message in the target blockchain network to The mail receiving end, so that the mail receiving end obtains the content of the mail according to the storage location information of the target encrypted message.
  • One or more readable storage media storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, the one or more processors perform the following steps: receiving the target encrypted message sent by the mail sender The storage location information in the target blockchain network, where the target encrypted message is obtained by the email sender encrypting the cloud storage index and the exclusive key according to the public key of the email recipient, and the cloud storage index address is the email sender through the exclusive key.
  • the key encrypts the email content of the email to be sent by the email sender and stores the encrypted email file in the first cloud server.
  • the corresponding storage index, the exclusive key is generated by the email sender according to the email sender's exclusive information; According to the storage location information of the target encrypted message, read the target encrypted message from the target blockchain network; decrypt the target encrypted message through the private key of the email recipient to obtain the cloud storage index address and exclusive key; Index address, read the email encrypted file from the first cloud server; decrypt the email encrypted file with the exclusive key to obtain the email content.
  • the target encrypted message is decrypted by the private key of the email recipient to obtain the exclusive key and the storage address index of the cloud storage, so that even if the target encrypted message is intercepted, the email content cannot be obtained because there is no private key of the email recipient.
  • the index goes to the cloud storage to obtain the mail and decrypts the encrypted file of the mail with the exclusive key, so as to obtain the content of the mail sent by the mail sender.
  • the content of the email is encrypted with the sender's private key, and stored in the public cloud storage, and then encrypted by the recipient's public key and stored in the blockchain, so as to ensure that the recipient of the email receives it accurately.
  • Emails all the information involved in the process are encrypted, which fundamentally guarantees the security of emails compared with the traditional unencrypted email transmission methods that are forwarded by multiple parties.
  • FIG. 1 is an interactive schematic diagram of a blockchain-based mail processing method in an embodiment of the present application
  • Fig. 2 is another interactive schematic diagram of the block chain-based mail processing method in the embodiment of the present application.
  • FIG. 3 is a schematic flowchart of obtaining a dedicated key in an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a mail sending end in an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a mail receiving end in an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a computer device in an embodiment of the present application.
  • the email processing system provided by this solution includes an email sending end, an email receiving end, a cloud server (this solution mainly involves a first cloud server and a second cloud server) and a blockchain network, and the above email processing method is based on the above email
  • the realization of the processing system leads to four concepts, namely mail sender, mail sender, mail receiver, and mail receiver, among which, the mail sender and the mail receiver refer to the client with the function of sending and receiving mail.
  • the client is installed on terminal devices such as mobile phones and tablet computers.
  • the sender of the mail refers to the user who edits and sends the mail through the sender of the mail
  • the receiver of the mail refers to the user who receives the mail through the receiver of the mail.
  • Terminal devices include, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices.
  • a cloud server can be implemented as an independent server or a server cluster composed of multiple servers.
  • the email processing method mainly includes the following steps:
  • the email sender may refer to a client installed on a mobile phone, computer, etc. with an email sending function.
  • the email sender will edit the desired email on the email sender.
  • the email content corresponding to the email includes body information, email attachments, and recipient email addresses, and the like.
  • the email sender when the email sender finishes editing the email, the email sender will obtain the email content.
  • the email sender may first cache the corresponding email content locally, that is, the email sender locally, to facilitate subsequent encryption processing.
  • the exclusive information of the email sender refers to the information related to the email sender.
  • the exclusive information may refer to the email sender's fingerprint information, facial information, ID card information and other email senders.
  • the unique and exclusive biological information of the email may refer to the exclusive account information of the email sender, which is not limited in this solution.
  • the email sender can pre-instruct the email sender to enter the above-mentioned exclusive information and store it locally, and associate it with the email login account of the email sender. After the email sender successfully logs in to the email and edits the email, It is convenient for the email sender to obtain the sender's exclusive information according to the login account.
  • the email sender After the email sender obtains the exclusive information, it uses the exclusive information to generate an exclusive key.
  • S20 The email sender encrypts the email content of the email through the exclusive key to obtain an email encrypted file.
  • the email sending end stores the email encrypted file in the first cloud server.
  • the email sender After generating the exclusive key based on the exclusive information, the email sender locally extracts the email content from the email sender, and encrypts the email content with the exclusive key to obtain an email encrypted file, and then sends the email encrypted file to the first cloud server A storage request, the email encrypted file storage request carries the email encrypted file, the first cloud server receives the email encrypted file storage request, and stores the email encrypted file carried in the email encrypted file storage request, thereby completing the email encryption file storage request. The process of uploading the encrypted email file to the first cloud server.
  • the storage index address of the encrypted file of the email will be recorded by mail.
  • the cloud storage index address is the storage address corresponding to when the encrypted email file is stored on the first cloud server. Through the cloud storage index address, the encrypted email file corresponding to the storage index address can be found on the first cloud server.
  • the email sending end obtains the cloud storage index address corresponding to the email encrypted file fed back by the first cloud server.
  • the first cloud server After the email sending end stores the email encrypted file in the first cloud server, the first cloud server will feed back the cloud storage index address corresponding to the email encrypted file back to the email sending end, and the email sending end needs to further obtain the email reception the public key of the person.
  • the email recipient has its own public key and private key, uploads the public key to the second cloud server, and enables the second cloud server to send the email recipient to the email address according to the email address of the email recipient
  • the public key of the email is stored in association with the second cloud server to publish the public key of the recipient of the email.
  • the public key of the email recipient of the email recipient can be obtained from the shared cloud server through the email address of the email recipient, wherein, in one embodiment, the second cloud server and the The first cloud server is a different cloud server.
  • the first cloud server and the second cloud server may refer to the same shared cloud server.
  • the uploaded email encrypted file and the email recipient of the email recipient can be obtained.
  • the process of sending the storage request and obtaining the public key request for multiple times is reduced.
  • S60 The email sending end encrypts the cloud storage index address and the exclusive key according to the public key of the email recipient to obtain the target encrypted message.
  • the email sender After obtaining the public key of the email recipient of the email recipient, the email sender encrypts the cloud storage index address and the exclusive key according to the email recipient's public key to obtain the target encrypted message.
  • the email sender when it encrypts, it can use RSA, Elgamal, backpack algorithm, Rabin, Diffie-Hellman, ECC (elliptic curve encryption algorithm), etc., and use the public key of the email recipient to encrypt the cloud storage index and exclusive key. , to obtain the target encrypted message, which is not limited in this scheme.
  • S70 The email sender determines a target blockchain network for storing the target encrypted message.
  • S80 The email sender stores the target encrypted message in the target blockchain network.
  • the email sender After determining the target blockchain network for storing the target encrypted message, the email sender stores the target encrypted message in the target blockchain network. It should be emphasized that, in order to further ensure the privacy and security of the above target encrypted message, the above target encrypted message can also be stored in a node of a blockchain network.
  • Blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information to verify its Validity of information (anti-counterfeiting) and generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
  • the underlying platform of the blockchain can include processing modules such as user management, basic services, smart contracts, and operation monitoring.
  • the user management module is responsible for the identity information management of all blockchain participants, including maintenance of public and private key generation (account management), key management, and maintenance of the corresponding relationship between the user's real identity and blockchain address (authority management), etc.
  • account management maintenance of public and private key generation
  • key management key management
  • authorization management maintenance of the corresponding relationship between the user's real identity and blockchain address
  • the basic service module is deployed on all blockchain node devices to verify the validity of business requests, After completing the consensus on valid requests, record them in the storage.
  • the basic service For a new business request, the basic service first adapts the interface for analysis and authentication processing (interface adaptation), and then encrypts the business information through the consensus algorithm (consensus management), After encryption, it is completely and consistently transmitted to the shared ledger (network communication), and records are stored; the smart contract module is responsible for the registration and issuance of contracts, as well as contract triggering and contract execution.
  • contract logic through a programming language and publish to On the blockchain (contract registration), according to the logic of the contract terms, call the key or other events to trigger execution, complete the contract logic, and also provide the function of contract upgrade and cancellation;
  • the operation monitoring module is mainly responsible for the deployment in the product release process , configuration modification, contract settings, cloud adaptation, and visual output of real-time status in product operation, such as: alarms, monitoring network conditions, monitoring node equipment health status, etc.
  • the email sending end sends the storage location information of the target encrypted message in the target blockchain network to the email receiving end.
  • the target encrypted message After the email sender stores the target encrypted message in the target blockchain network, the target encrypted message will have a corresponding storage location information on the blockchain network, and the email sender sends the storage location information to the email recipient. end.
  • the email receiving end reads the target encrypted message from the target blockchain network according to the storage location information of the target encrypted message.
  • S110 The email recipient decrypts the target encrypted message by using the private key of the email recipient to obtain a cloud storage index address and an exclusive key.
  • S120 The email receiving end reads the email encrypted file from the first cloud server through the cloud storage index address.
  • S130 The email recipient decrypts the email encrypted file by using the exclusive key to obtain the email content.
  • the mail receiver reads the target encrypted message from the target blockchain network according to the storage location information of the target encrypted message, and uses the private key corresponding to the mail receiver's public key to the target encrypted message. After decrypting the encrypted message, the above-mentioned cloud storage index address and exclusive key can be obtained. At this time, after the email receiving end obtains the cloud storage index, it obtains the email encrypted file corresponding to the cloud storage index address from the first cloud server, and then uses the obtained exclusive key to decrypt the email encrypted file to obtain the email content. So far, the email content edited by the email sender through the email sender has been received by the email receiver.
  • this solution provides an email processing method.
  • the email sender uses an exclusive key to encrypt the email content, and stores the encrypted email content in the first cloud server;
  • the cloud storage index address and exclusive key of the email encrypted file are encrypted again to obtain the target encrypted message and store it in the blockchain network.
  • the storage location information of the target encrypted message is sent to the email recipient. It can be seen from this process that when the storage location information is sent, the possibility of information leakage is extremely low. Even if the storage location information is intercepted, the thief can only obtain the storage location information.
  • the target encrypted message that is still encrypted is read in the blockchain network, and the thief cannot decipher the encrypted information.
  • the target encrypted message is stored in the blockchain network, the information in it can be read or All changes can be recorded, which is beneficial to the traceability of those who want to steal, and greatly improves the security and traceability of email content transmission.
  • S11 Perform hash calculation on the email sender's exclusive information to obtain the email sender's exclusive hash value, and randomly generate two first random numbers according to the email sender's exclusive hash value, wherein the two first random numbers are The numbers are not the same.
  • Hash calculation is the process of converting an input of any length into a hash value of a fixed-length output through a hashing algorithm.
  • MD4, MD5, SHA-1 and other hash algorithms can be used to perform hash calculation on the exclusive information to obtain an exclusive hash value, which is called an exclusive hash value in this scheme.
  • a random number algorithm is used to generate a random number for the exclusive hash value, and two random numbers are randomly generated. In this scheme, this random number is called the first random number. Wherein, the two first random numbers generated by the random number algorithm are different, which is helpful for the subsequent generation of the required exclusive key.
  • Symmetric encryption algorithm refers to an encryption algorithm that uses the same key for encryption and decryption, that is, the encryption key can be deduced from the decryption key, and the decryption key can also be deduced from the encryption key.
  • most of the symmetric encryption algorithms mean that the encryption key and the decryption key are the same algorithm.
  • the exclusive information is used as the key of the target symmetric encryption algorithm, and the two first random numbers are encrypted, so as to obtain two corresponding First help data.
  • the Advanced Encryption Standard (AES) algorithm can be used as the target symmetric encryption algorithm, and the exclusive information is used as the key to encrypt the two first random numbers to obtain the corresponding two first random numbers.
  • other symmetric encryption algorithms can also be used as the target symmetric encryption algorithm in this scheme, and this scheme does not impose specific restrictions.
  • ⁇ (n1) is the Euler function
  • gcd( ⁇ (n1), e1) represents the greatest common factor of the non-negative integers ⁇ (n1) and e1.
  • S17 Encapsulate the product of the first target integer and the first target into the private key of the mail sender, and encapsulate the product of the second target integer and the first target into the public key of the mail sender.
  • the product of the first target integer and the first target can be encapsulated into the public key of the email sender, and the product of the second target integer and the first target can be encapsulated into an email for sending the private key of the user. That is, ⁇ e1,n1 ⁇ is the public key of the email recipient, and ⁇ d1,n1 ⁇ is the private key of the email recipient.
  • ⁇ e1,n1 ⁇ or ⁇ d1,n1 ⁇ the email content of the email can be encrypted, and the email encrypted file can be obtained.
  • this solution also provides a method of generating the public key and private key of the email recipient, which can be applied to the email recipient. Specifically, as shown in Figure 4, including:
  • S100 Perform hash calculation on the exclusive information of the email recipient to obtain the exclusive hash value of the email recipient, and randomly generate two second random numbers according to the exclusive hash value of the email recipient, wherein the two second random numbers are The numbers are not the same.
  • S101 Use the exclusive information of the email recipient as a key of a target symmetric encryption algorithm, and encrypt the two second random numbers to obtain two second help data correspondingly.
  • S102 Perform XOR processing on the two second help data with corresponding second random numbers respectively to obtain two second target numbers.
  • ⁇ (n2) is the Euler function
  • gcd( ⁇ (n2), e2) represents the greatest common factor of the non-negative integers ⁇ (n2) and e2.
  • S106 Encapsulate the product of the third target integer and the second target into the private key of the mail recipient, and encapsulate the product of the fourth target integer and the second target into the public key of the mail recipient.
  • S107 Save the private key of the email recipient locally, and store the public key of the email recipient in association with the email address to the second cloud server.
  • the product of the third target integer and the second target can be encapsulated into the public key of the mail receiver, and the product of the fourth target integer and the second target can be encapsulated into the mail receiver the private key of the user. That is, ⁇ e2,n2 ⁇ is the public key of the email recipient, and ⁇ d2,n2 ⁇ is the private key of the email recipient.
  • the private key of the email recipient is stored locally, and the public key of the email recipient is associated with the email address and stored in the second cloud server.
  • the email sender determines the target blockchain network for storing the target encrypted message, including:
  • S51 The email sender determines whether it is in the same blockchain network as the email receiver.
  • S52 The email sender determines whether it is in the same blockchain network as the email receiver.
  • the email sender and the email receiver can be deployed in the same blockchain network, but in practical applications, in order to reduce deployment costs, and due to the large number of users, in order to improve the scalability of the system, most emails
  • the sender and the mail receiver are different in the blockchain network. Therefore, depending on the different blockchain networks where the email sender and the email receiver are located, there will be different processing logics accordingly.
  • the email sender sends an email, it will first determine whether the email sender and the email receiver are in the same blockchain network.
  • the blockchain network where the email receiver is located will be determined as the target blockchain network, that is, the email sender will send the target encrypted message to The blockchain network where the email receiver is located is stored, and the storage location information of the target encrypted message in the blockchain network where the email receiver is located is sent to the email receiver, so that the email receiver can download the message from the blockchain network where it is located. Read the target encrypted message.
  • the blockchain network where the email sender is located is directly determined as the target blockchain network, that is, the email sender will The encrypted message is sent to the blockchain network storage where the email sender is located, and the storage location information of the target encrypted message in the blockchain network where the email sender is located is sent to the email receiver, so that the email receiver can store the message from the email sender.
  • the target encrypted message is read in the blockchain network where the blockchain network is located.
  • the process of sending the target encrypted message to the target blockchain network storage at the email sending end is as follows: first, a storage request carrying the target encrypted message is sent to the blockchain processing end, and the target encrypted message storage request Carrying the target encrypted message, after the blockchain processing end receives the target encrypted message storage request, the blockchain processing end will use the target encrypted message to generate a block and store it in the blockchain where the mail receiver is located to complete the chaining process. .
  • the storage location information of the target encrypted message in the target blockchain network is also sent to the email recipient, including:
  • the email sending end generates an email body according to the storage location information, where the email body contains the storage location information;
  • the email sending end sends the email body containing the storage location information to the email receiving end in the form of an email, so that the email receiving end can obtain the storage location information of the target encrypted message through the email body.
  • this process can send the storage location information in the form of ordinary mail, but the possibility of information leakage is extremely low. Even if the ordinary mail is intercepted, the thief can only obtain the storage location information. The thief reads the target encrypted message from the blockchain network according to the storage location information. Since the target encrypted message is encrypted, the thief cannot decipher the encrypted information.
  • a mail sending end is provided, and the mail sending end is in one-to-one correspondence with the mail sending end of the mail processing method in the above embodiment.
  • the email sender includes a first acquisition module 101, a generation module 102, a first encryption module 103, a storage module 104, a second acquisition module 105, a second encryption module 106, a determination module 107 and a transmission module 108.
  • the detailed description of each functional module is as follows:
  • the first acquisition module 101 is used to acquire the content of the email and the exclusive information of the email sender when the email sender finishes editing the email;
  • a generating module 102 configured to generate an exclusive key according to the exclusive information of the email sender
  • the first encryption module 103 is used for encrypting the mail content of the mail by using the exclusive key to obtain the encrypted mail file;
  • a storage module 104 configured to store the encrypted email file to the first cloud server
  • the second obtaining module 105 is configured to obtain the cloud storage index address corresponding to the encrypted email file fed back by the first cloud server, and obtain the public key of the email recipient;
  • the second encryption module 106 is configured to encrypt the cloud storage index address and the exclusive key according to the public key of the email recipient to obtain the target encrypted message;
  • a determination module 107 configured to determine a target blockchain network for storing the target encrypted message
  • the sending module 108 is configured to store the target encrypted message in the target blockchain network, and send the storage location information of the target encrypted message in the target blockchain network to the mail receiving end, so that the mail receiving end can base on the target encrypted message’s storage location information. Store location information to get mail content.
  • the generating module 102 is specifically used for:
  • Hash calculation is performed on the email sender's exclusive information to obtain the email sender's exclusive hash value, and two first random numbers are randomly generated according to the email sender's exclusive hash value, wherein the two first random numbers are different ;
  • the exclusive information of the email sender is used as the key of the target symmetric encryption algorithm, and the two first random numbers are encrypted to obtain the two first help data correspondingly;
  • the two first target numbers are generated respectively to obtain the two first large prime numbers p1 and q1;
  • the private key or public key of the email sender is randomly selected as the private key.
  • the determining module 107 is specifically configured to:
  • the blockchain network where the email receiver is located is determined as the target blockchain network
  • the blockchain network where the email sender is located is determined as the target blockchain network.
  • the sending module 108 is specifically configured to:
  • the email body containing the storage location information is sent to the email recipient in the form of an email, so that the email recipient can obtain the storage location information through the email body.
  • the second obtaining module 105 is specifically configured to:
  • the public key of the email recipient is obtained from the second cloud server, and the first cloud server and the first cloud server are different cloud servers.
  • a mail receiving end is provided, and the mail receiving end is in one-to-one correspondence with the mail receiving end of the mail processing method in the above embodiment.
  • the mail receiving end includes a receiving module 201 , a first reading module 202 , a first decrypting module 203 , a second reading module 204 and a second decrypting module 205 .
  • the detailed description of each functional module is as follows:
  • the receiving module 201 is configured to receive the storage location information of the target encrypted message sent by the email sender in the target blockchain network, wherein the target encrypted message is the cloud storage index address and exclusive data stored by the email sender according to the public key of the email recipient.
  • the cloud storage index address is obtained by encrypting the key.
  • the cloud storage index address is the corresponding storage index when the email sender encrypts the email content with the exclusive key and stores the encrypted email file in the first cloud server.
  • the exclusive key is the email sender based on the email. Generated by the sender's proprietary information;
  • the first reading module 202 is configured to read the target encrypted message from the target blockchain network according to the storage location information of the target encrypted message;
  • the first decryption module 203 is used for decrypting the target encrypted message through the private key of the email recipient to obtain the cloud storage index address and the exclusive key;
  • the second reading module 204 is configured to read the encrypted email file from the first cloud server through the cloud storage index address;
  • the second decryption module 205 is configured to decrypt the email encrypted file by using the exclusive key to obtain the email content.
  • Each module in the above-mentioned mail sending end or mail receiving end can be implemented in whole or in part by software, hardware and combinations thereof.
  • the above modules can be embedded in or independent of the processor in the computer device in the form of hardware, or stored in the memory in the computer device in the form of software, so that the processor can call and execute the operations corresponding to the above modules.
  • a computer device is provided, and the computer device may be a mail sending end or a mail receiving end, and its internal structure diagram may be as shown in FIG. 7 .
  • the computer equipment includes a processor, memory, a network interface, a display screen, and an input device connected by a system bus. Among them, the processor of the computer device is used to provide computing and control capabilities.
  • the memory of the computer device includes a storage medium and an internal memory.
  • the storage medium stores an operating system and computer-readable instructions.
  • the storage medium includes a non-volatile storage medium and a volatile storage medium, and the internal memory provides an environment for the execution of an operating system and computer-readable instructions in the non-volatile storage medium.
  • the network interface of the computer device is used to communicate with an external server (eg, the first cloud server or the second cloud server and the target blockchain network) through a network connection.
  • an external server eg, the first cloud server or the second cloud server and the target blockchain network
  • the steps or functions of the mail sending end or the mail receiving end in a blockchain-based mail processing method are realized.
  • a computer device comprising a memory, a processor, and computer-readable instructions stored in the memory and executable on the processor, wherein the processor, when executing the computer-readable instructions, implements the following steps: when When the email sender finishes editing the email, it obtains the email content and the email sender's exclusive information, and generates an exclusive key based on the email sender's exclusive information; encrypts the email content through the exclusive key to obtain an email encrypted file, and store the encrypted email file to the first cloud server; obtain the cloud storage index address corresponding to the encrypted email file fed back by the first cloud server, and obtain the public key of the email recipient; Store the index address and exclusive key for encryption to obtain the target encrypted message; determine the target blockchain network for storing the target encrypted message; store the target encrypted message in the target blockchain network, and store the target encrypted message in the target block
  • the storage location information of the chain network is sent to the mail receiving end, so that the mail receiving end obtains the content of the mail according to the storage location information of the target encrypted message.
  • the processor when the processor executes the computer-readable instructions, the following steps are implemented: perform a hash calculation on the email sender's exclusive information to obtain the email sender's exclusive hash value, and randomize the email sender's exclusive hash value according to the email sender's exclusive hash value.
  • the processor implements the following steps when executing the computer-readable instructions: judging whether the mail sending end and the mail receiving end are in the same blockchain network; when the mail sending end and the mail receiving end are not in the same block In the chain network, the blockchain network where the email receiver is located is determined as the target blockchain network; when the email sender and the email receiver are in the same blockchain network, the blockchain network where the email sender is located is determined. as the target blockchain network.
  • the processor executes the computer-readable instructions, the following steps are implemented: generating an email body according to the storage location information, and the email body contains the storage location information; Send it to the email receiver, so that the email receiver can obtain the storage location information through the email body.
  • the processor implements the following steps when executing the computer-readable instructions: acquiring the email address of the email recipient; acquiring the public key of the email recipient from the second cloud server, and the second cloud server communicates with the email recipient.
  • the first cloud server is a different cloud server.
  • one or more readable storage media storing computer-readable instructions are provided, and the computer-readable instructions, when executed by one or more processors, cause the one or more processors to perform the following steps: when When the email sender finishes editing the email, it obtains the email content and the email sender's exclusive information, and generates an exclusive key based on the email sender's exclusive information; encrypts the email content through the exclusive key to obtain an email encrypted file, and store the encrypted email file to the first cloud server; obtain the cloud storage index address corresponding to the encrypted email file fed back by the first cloud server, and obtain the public key of the email recipient; Store the index address and exclusive key for encryption to obtain the target encrypted message; determine the target blockchain network for storing the target encrypted message; store the target encrypted message in the target blockchain network, and store the target encrypted message in the target block
  • the storage location information of the chain network is sent to the mail receiving end, so that the mail receiving end obtains the content of the mail according to the storage location information of the target encrypted message.
  • the computer-readable instructions when executed by one or more processors, cause the one or more processors to perform the following steps: perform a hash calculation on the specific information of the email sender to obtain the email sender exclusive hash value, and randomly generate two first random numbers according to the exclusive hash value of the email sender, wherein the two first random numbers are different; take the email sender's exclusive information as the key of the target symmetric encryption algorithm, Encrypting the two first random numbers to obtain two first help data correspondingly; XOR processing the two first help data with the corresponding first random numbers to obtain two first target numbers;
  • the one or more processors when the computer-readable instructions are executed by one or more processors, the one or more processors are caused to perform the following steps: determine whether the mail sender and the mail receiver are in the same blockchain network; When the email sender and the email receiver are not in the same blockchain network, the blockchain network where the email receiver is located is determined as the target blockchain network; when the email sender and the email receiver are in the same blockchain network , the blockchain network where the email sender is located is determined as the target blockchain network.
  • the computer-readable instructions when executed by one or more processors, cause the one or more processors to perform the steps of: generating an email body based on the storage location information, the email body containing the storage location information;
  • the email body of the storage location information is sent to the email recipient in the form of an email, so that the email recipient can obtain the storage location information through the email body.
  • another computer device comprising a memory, a processor, and computer-readable instructions stored in the memory and executable on the processor, wherein the processor implements the following steps when executing the computer-readable instructions : Receives the storage location information of the target encrypted message sent by the email sender in the target blockchain network, where the target encrypted message is obtained by the email sender encrypting the cloud storage index and the exclusive key according to the public key of the email recipient,
  • the cloud storage index address is the corresponding storage index when the email sender encrypts the email content of the email to be sent by the email sender with the exclusive key and stores the encrypted email file in the first cloud server, and the exclusive key is the email sender It is generated according to the exclusive information of the email sender; according to the storage location information of the target encrypted message, the target encrypted message is read from the target blockchain network; the target encrypted message is decrypted by the private key of the email recipient to obtain cloud storage Index address and exclusive key; read the email encrypted file from the first cloud server through the cloud storage index address; use the
  • one or more readable storage media storing computer-readable instructions
  • the computer-readable instructions when executed by one or more processors, cause the one or more processors to perform the following steps: receive mail; The storage location information of the target encrypted message sent by the sender in the target blockchain network, where the target encrypted message is obtained by encrypting the cloud storage index and the exclusive key by the mail sender according to the public key of the mail recipient.
  • the cloud storage index The address is the corresponding storage index when the email sender encrypts the email content of the email to be sent by the email sender with the exclusive key and stores the encrypted email file in the first cloud server.
  • the exclusive key is the email sender sends the email according to the email It is generated by the user's exclusive information; according to the storage location information of the target encrypted message, the target encrypted message is read from the target blockchain network;
  • Nonvolatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in various forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Road (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请应用于区块链技术、云存储领域,公开了一种基于区块链的邮件处理方法、邮件发送端、邮件接收端和计算机设备。方法部分包括:获取邮件内容和该邮件发送者的专属信息,并生成专属密钥;通过专属密钥对邮件的邮件内容进行加密得到邮件加密文件,将邮件加密文件存储到第一云服务端;获取邮件加密文件对应的存储索引地址并获取邮件接收者的公钥;根据邮件接收者的公钥,对云存储索引和专属密钥进行加密,得到目标加密消息;确定用于存储目标加密消息的目标区块链网络;将目标加密消息存储在目标区块链网络,并将目标加密消息在目标区块链网络的存储位置信息发送给邮件接收端,以使邮件接收端依据该目标加密消息的存储位置信息获取邮件内容。

Description

基于区块链的邮件处理方法、邮件发送端、接收端及设备
本申请要求于 202012月31日提交中国专利局、申请号为 202011640195.8,发明名称为“基于区块链的邮件处理方法、邮件发送端、接收端及设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及区块链技术领域,尤其涉及一种区块链的邮件处理方法、邮件发送端、接收端及设备。
背景技术
传统的电子邮件系统是由用户代理(MUA)、邮件传输代理(MTA)、邮件投递代理(MDA)组成。当邮件从MUA中发送一份邮件时,该邮件会发送到MTA,然后在一系列的MTA中转发,直到它到达最终发送目标为止。
技术问题
发明人发现,传统的电子邮件系统在发送邮件时,仅是简单根据用户名和密码进行身份验证,而邮件从发送端到接受端传送需要经过多个MTA,因此恶意行为者可以利用邮件服务中的漏洞获取邮箱中的敏感信息,因此可能导致在传输过程中被拦截,从而使邮件被任意的阅读,导致邮件中的重要信息被窃取,邮件安全性较低。
技术解决方案
本申请实施例提供一种基于区块链的邮件处理方法、邮件发送端、接收端及设备,以解决邮件安全性较低的问题。
一种基于区块链的邮件处理方法,应用于邮件发送端,方法包括:
当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息,并依据邮件发送者的专属信息生成专属密钥;
通过专属密钥对邮件的邮件内容进行加密,得到邮件加密文件,并将邮件加密文件存储到第一云服务端;
获取第一云服务端反馈的邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;
根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;
确定用于存储目标加密消息的目标区块链网络;
将目标加密消息存储在目标区块链网络,并将目标加密消息在目标区块链网络的存储位置信息发送给邮件接收端,以使邮件接收端依据该目标加密消息的存储位置信息获取邮件内容。
一种基于区块链的邮件处理方法,应用于邮件接收端,方法包括:
接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,目标加密消息为邮件发送端根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密得到,云存储索引地址为邮件发送端通过专属密钥对邮件发送者需发送的邮件的邮件内容进行加密并,将邮件加密文件存储到第一云服务端时对应的存储索引,专属密钥为邮件发送端依据邮件发送者的专属信息所生成;
依据目标加密消息的存储位置信息,从目标区块链网络中读取目标加密消息;
通过邮件接收者的私钥对目标加密消息进行解密,以得到云存储索引地址和专属密钥;
通过云存储索引地址,从第一云服务端读取邮件加密文件;
利用专属密钥对邮件加密文件进行解密,以得到邮件内容。
一种邮件发送端,包括:
第一获取模块,用于当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息;
生成模块,用于依据邮件发送者的专属信息生成专属密钥;
第一加密模块,用于通过专属密钥对邮件的邮件内容进行加密,得到邮件加密文件;
存储模块,用于将邮件加密文件存储到第一云服务端;
第二获取模块,用于获取第一云服务端反馈的邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;
第二加密模块,用于根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;
确定模块,用于确定用于存储目标加密消息的目标区块链网络;
发送模块,用于将目标加密消息存储在目标区块链网络,并将目标加密消息在目标区块链网络的存储位置信息发送给邮件接收端,以使邮件接收端依据该目标加密消息的存储位置信息获取邮件内容。
一种邮件接收端,包括:
接收模块,用于接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,目标加密消息为邮件发送端根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密得到,云存储索引地址为邮件发送端通过专属密钥对邮件内容进行加密并将邮件加密文件存储到第一云服务端时对应的存储索引,专属密钥为邮件发送端依据邮件发送者的专属信息所生成;
第一读取模块,用于依据目标加密消息的存储位置信息,从目标区块链网络中读取目标加密消息;
第一解密模块,用于通过邮件接收者的私钥对目标加密消息进行解密,以得到云存储索引地址和专属密钥;
第二读取模块,用于通过云存储索引地址,从第一云服务端读取邮件加密文件;
第二解密模块,用于利用专属密钥对邮件加密文件进行解密,以得到邮件内容。
一种计算机设备,包括存储器、处理器以及存储在存储器中并可在处理器上运行的计算机可读指令,其中,处理器执行计算机可读指令时实现如下步骤:当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息,并依据邮件发送者的专属信息生成专属密钥;通过专属密钥对邮件的邮件内容进行加密,得到邮件加密文件,并将邮件加密文件存储到第一云服务端;获取第一云服务端反馈的邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;确定用于存储目标加密消息的目标区块链网络;将目标加密消息存储在目标区块链网络,并将目标加密消息在目标区块链网络的存储位置信息发送给邮件接收端,以使邮件接收端依据该目标加密消息的存储位置信息获取邮件内容。
一种计算机设备,包括存储器、处理器以及存储在存储器中并可在处理器上运行的计算机可读指令,其中,处理器执行计算机可读指令时实现如下步骤:接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,目标加密消息为邮件发送端根据邮件接收者的公钥,对云存储索引和专属密钥进行加密得到,云存储索引地址为邮件发送端通过专属密钥对邮件发送者需发送的邮件的邮件内容进行加密并将邮件加密文件存储到第一云服务端时对应的存储索引,专属密钥为邮件发送端依据邮件发送者的专属信息所生成;依据目标加密消息的存储位置信息,从目标区块链网络中读取目标加密消息;通过邮件接收者的私钥对目标加密消息进行解密,以得到云存储索引地址和专属密钥;通过云存储索引地址,从第一云服务端读取邮件加密文件;利用专属密钥对邮件加密文件进行解密,以得到邮件内容。
一个或多个存储有计算机可读指令的可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如下步骤:当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息,并依据邮件发送者的专属信息生成专属密钥;通过专属密钥对邮件的邮件内容进行加密,得到邮件加密文件,并将邮件加密文件存储到第一云服务端;获取第一云服务端反馈的邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;确定用于存储目标加密消息的目标区块链网络;将目标加密消息存储在目标区块链网络,并将目标加密消息在目标区块链网络的存储位置信息发送给邮件接收端,以使邮件接收端依据该目标加密消息的存储位置信息获取邮件内容。
一个或多个存储有计算机可读指令的可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如下步骤:接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,目标加密消息为邮件发送端根据邮件接收者的公钥,对云存储索引和专属密钥进行加密得到,云存储索引地址为邮件发送端通过专属密钥对邮件发送者需发送的邮件的邮件内容进行加密并将邮件加密文件存储到第一云服务端时对应的存储索引,专属密钥为邮件发送端依据邮件发送者的专属信息所生成;依据目标加密消息的存储位置信息,从目标区块链网络中读取目标加密消息;通过邮件接收者的私钥对目标加密消息进行解密,以得到云存储索引地址和专属密钥;通过云存储索引地址,从第一云服务端读取邮件加密文件;利用专属密钥对邮件加密文件进行解密,以得到邮件内容。
上述方案中,通过邮件接收者的私钥解密目标加密消息获得专属密钥和云存储器的存储地址索引,这样即使目标加密消息被截取也由于没有邮件接收者私钥而无法获取邮件内容,再通过索引去云存储器中获取邮件并通过专属密钥对邮件加密文件进行解密,从而得到邮件发送端发送的邮件内容。整体方案过程中的加密算法和电子邮件技术的组合,可以有效地解决传统电子邮件中存在的安全隐患问题,由于邮件中会指明发送者和接收者,其身份验证与个人生物特征绑定,无法伪造,邮件内容均使用发送者的专属密钥进行加密,并将存储在公共云存储中,又由邮件接收者的公钥进行加密存储于区块链中,从而保证邮件接收者准确的接收到邮件,过程中涉及到的所有信息都进行了加密处理,与传统的未经加密并经由多方转发的电子邮件传输方式相比,从根本上保证了电子邮件的安全性。
本申请的一个或多个实施例的细节在下面的附图和描述中提出,本申请的其他特征和优点将从说明书、附图以及权利要求变得明显。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,还可以根据这些附图获得其他的附图。
图1是本申请实施例中基于区块链的邮件处理方法的一交互示意图;
图2是本申请实施例中基于区块链的邮件处理方法的另一交互示意图;
图3是本申请实施例中获得专属密钥的一流程示意图;
图4是本申请实施例中获得邮件接收者的公钥和私钥的一流程示意图;
图5是本申请实施例中邮件发送端的一结构示意图;
图6是本申请实施例中邮件接收端的一结构示意图;
图7是本申请实施例中计算机设备的一示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施 例,都属于本申请保护的范围。
本方案所提供的邮件处理系统,包括邮件发送端、邮件接收端、云服务器(本方案主要涉及第一云服务端和第二云服务端)和区块链网络,上述邮件处理方法基于上述邮件处理系统所实现,为便于理解,引出四个概念,分别是邮件发送者、邮件发送端、邮件接收者、邮件接收端,其中,邮件发送端和邮件接收端是指具有邮件收发功能的客户端,该客户端安装于手机、平板电脑等终端设备中,邮件发送者是指通过邮件发送端进行邮件编辑和发送邮件的用户,邮件接收者是指通过邮件接收端接收邮件的用户。终端设备以但不限于各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备。云服务器可以用独立的服务器或者是多个服务器组成的服务器集群来实现。
本方案提供的邮件处理方法,请一并参阅图1-图2所示,为便于理解,以多端的角度进行描述,该邮件处理方法,主要包括如下步骤:
S10:当邮件发送者编辑完邮件时,邮件发送端获取邮件内容和该邮件发送者的专属信息,并依据专属信息生成专属密钥。
可以理解,邮件发送端可以是指安装于手机、电脑等具有邮件发送功能的客户端,在邮件发送者需要向邮件接收者发送邮件时,邮件发送者会在邮件发送端编辑所需的邮件。该邮件对应的邮件内容包括正文信息、邮件附件和收件邮件地址等。
在一些实施例中,当邮件发送者编辑完邮件时,邮件发送端会获取邮件内容。作为一个示例,邮件发送端可以先将该对应的邮件内容缓存在本地,也即邮件发送端本地,便于后续加密处理。
需要说明的是,该邮件发送者的专属信息是指与该邮件发送者相关的信息,示例性的,该专属信息可以是指邮件发送者的指纹信息或面部信息、身份证信息等邮件发送者的唯一专属生物信息;作为另一示例,该专属信息可以是指邮件发送者的专属账号信息,具体本方案不做限定。其中,在一些应用场景中,邮件发送端可以预先指示邮件发送者录入上述专属信息存储在本地,并与邮件发送者的邮件登录账号做关联,在邮件发送者成功登录邮件并编辑完邮件后,便于邮件发送端依据登录账号获取该发送者的专属信息。
邮件发送端获取到专属信息之后,利用专属信息生成专属密钥。
S20:邮件发送端通过专属密钥对该邮件的邮件内容进行加密,得到邮件加密文件。
S30:邮件发送端将该邮件加密文件存储到第一云服务端。
在依据专属信息生成专属密钥之后,邮件发送端从邮件发送端本地提取出邮件内容,并通过专属密钥对邮件内容进行加密,得到邮件加密文件,随后向第一云服务端发送邮件加密文件存储请求,该邮件加密文件存储请求中携带有该邮件加密文件,第一云服务端接收到该邮件加密文件存储请求,将该邮件加密文件存储请求携带的邮件加密文件进行存储,从而完成将该邮件加密文件上传到第一云服务端的过程。
需要说明的是,第一云服务端存储时,会邮记录该邮件加密文件的存储索引地址。该云存储索引地址,是将邮件加密文件存储在第一云服务端时所对应的存储地址,通过该云存储索引地址,可以在第一云服务端的找到存储索引地址对应的邮件加密文件。
S40:邮件发送端获取第一云服务端反馈的邮件加密文件对应的云存储索引地址。
S50:并获取邮件接收者的公钥。
邮件发送端将该邮件加密文件存储到第一云服务端之后,第一云服务端会将该邮件加密文件对应的云存储索引地址反馈回邮件发送端,并且,邮件发送端需进一步获取邮件接收者的公钥。
作为一个示例,该邮件接收者具有自己专属的公钥和私钥,并将其中的公钥上传至第二云服务端,且使第二云服务端依据邮件接收者的邮件地址将邮件接收者的公钥关联存储至第二云服务端,以将邮件接收者的公钥公布。对于邮件发送端而言,可以通过该邮件接收者的邮件地址,从共享云服务端上获取到邮件接收者的邮件接收者的公钥,其中,在一 实施例中,第二云服务端和第一云服务端为不同的云服务端。
需要说明的是,在一些应用场景中,该第一云服务端和第二云服务端可以是指同个共享云服务端,这样,可以将上传邮件加密文件和获取邮件接收者的邮件接收者的公钥的过程一同进行,减少多次发送存储请求和获取公钥请求的过程。
S60:邮件发送端根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息。
邮件发送端获取到邮件接收者的邮件接收者的公钥之后,根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息。
其中,邮件发送端在加密时,可以采用RSA、Elgamal、背包算法、Rabin、Diffie-Hellman、ECC(椭圆曲线加密算法)等,利用邮件接收者的公钥对云存储索引和专属密钥进行加密,得到目标加密消息,在此本方案不做限定。
S70:邮件发送端确定用于存储所述目标加密消息的目标区块链网络。
S80:邮件发送端将该目标加密消息存储在所述目标区块链网络。
邮件发送端在确定用于存储目标加密消息的目标区块链网络之后,将该目标加密消息存储在所述目标区块链网络。需要强调的是,为进一步保证上述目标加密消息的私密和安全性,上述目标加密消息还可以存储于一区块链网络的节点中。
需要说明的是,区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层。
区块链底层平台可以包括用户管理、基础服务、智能合约以及运营监控等处理模块。其中,用户管理模块负责所有区块链参与者的身份信息管理,包括维护公私钥生成(账户管理)、密钥管理以及用户真实身份和区块链地址对应关系维护(权限管理)等,并且在授权的情况下,监管和审计某些真实身份的交易情况,提供风险控制的规则配置(风控审计);基础服务模块部署在所有区块链节点设备上,用来验证业务请求的有效性,并对有效请求完成共识后记录到存储上,对于一个新的业务请求,基础服务先对接口适配解析和鉴权处理(接口适配),然后通过共识算法将业务信息加密(共识管理),在加密之后完整一致的传输至共享账本上(网络通信),并进行记录存储;智能合约模块负责合约的注册发行以及合约触发和合约执行,开发人员可以通过某种编程语言定义合约逻辑,发布到区块链上(合约注册),根据合约条款的逻辑,调用密钥或者其它的事件触发执行,完成合约逻辑,同时还提供对合约升级注销的功能;运营监控模块主要负责产品发布过程中的部署、配置的修改、合约设置、云适配以及产品运行中的实时状态的可视化输出,例如:告警、监控网络情况、监控节点设备健康状态等。
S90:邮件发送端将目标加密消息在所述目标区块链网络的存储位置信息发送给邮件接收端。
邮件发送端在将该目标加密消息存储在所述目标区块链网络之后,该目标加密消息在区块链网络上会有一对应的存储位置信息,邮件发送端将该存储位置信息发送给邮件接收端。
S100:邮件接收端依据该目标加密消息的存储位置信息,从目标区块链网络中读取该目标加密消息。
S110:邮件接收端通过邮件接收者的私钥对目标加密消息进行解密,以得到云存储索引地址和专属密钥。
S120:邮件接收端通过云存储索引地址,从第一云服务端读取邮件加密文件。
S130:邮件接收端利用专属密钥对邮件加密文件进行解密,以得到邮件内容。
对于步骤S90-S120,邮件接收端依据该目标加密消息的存储位置信息之后,从目标区块链网络中读取该目标加密消息,并利用与邮件接收者的公钥相对应的私钥对目标加密消息进行解密,便可得到上述云存储索引地址和专属密钥。此时,邮件接收端得到云存储索引之后,再从第一云服务端获取该云存储索引地址对应的邮件加密文件,继而利用得到的专属密钥对邮件加密文件进行解密,以得到邮件内容,至此,邮件发送者通过邮件发送端所编辑的邮件内容就已经别邮件接收端所接收到。
可见,本方案提供了一种邮件处理方法,邮件发送端在发送邮件时,利用专属密钥对邮件内容进行加密,并将加密后的邮件内容存储到第一云服务端;随后利用邮件接收者的公钥对邮件加密文件的云存储索引地址和专属密钥再次进行加密,以得到目标加密消息并存储在区块链网络中,最后将目标加密消息的存储位置信息并发送给邮件接收端,从该过程可以看出,存储位置信息发送出去时,信息泄露风险的可能性极低,即使存储位置信息被截取,盗取者仅能获取到存储位置信息,即便盗取者依据存储位置信息从区块链网络中读取到依然是被加密的目标加密消息,盗取者也无法破解得到被加密的信息,另外由于目标加密消息是存储在区块链网络中的,其中的信息读取或改变均能被记录到,有利于追溯欲盗取者,极大的提高了邮件内容传输的安全性和可追溯性。
作为一个示例,S10中,也即依据专属信息生成专属密钥,如图3所示,具体包括如下步骤:
S11:对邮件发送者的专属信息进行哈希计算,以获取邮件发送者专属哈希值,并依据该邮件发送者专属哈希值随机生成两个第一随机数,其中,两个第一随机数不相同。
哈希计算,就是把任意长度的输入,通过散列算法,变换成固定长度的输出的散列值的过程。该步骤中,可以采用MD4、MD5、SHA-1及其他等哈希算法对专属信息进行哈希计算,以获取专属的散列值,本方案中称为专属哈希值。在得到该专属哈希值之后,再利用随机数算法对该专属哈希值进行随机数生成处理,随机生成两个随机数,本方案将这随机数称为第一随机数。其中,利用随机数算法所生成的两个第一随机数不同,有助于后续生成所需的专属密钥。
S12:将邮件发送者的专属信息作为目标对称加密算法的密钥,对所述两个第一随机数进行加密,以对应获取两个第一帮助数据。
S13:将两个第一帮助数据分别与对应的第一随机数进行异或处理,以获取两个第一目标数。
对称加密算法,指的是加密和解密使用相同密钥的加密算法,也就是说,加密密钥能够从解密密钥中推算出来,同时解密密钥也可以从加密密钥中推算出来,简单而言,对称加密算法大多数是指加密密钥和解密密钥是相同的算法。在该实施例中,可以采用,在得到两个第一随机数之后,将所述专属信息作为目标对称加密算法的密钥,对所述两个第一随机数进行加密,以对应获取两个第一帮助数据。
具体地,在该方案中,可采用高级加密标准(Advanced Encryption Standard,AES)算法作为目标对称加密算法,以专属信息作为密钥,对两个第一随机数进行加密处理,以得到对应的两个第一帮助数据。例如,设AES加密函数为E,则C=E(K,P),其中P为明文,也即随机数;K为密钥,也即专属信息;C为密文,也即第一帮助数据。也就是说,把明文P和密钥K作为加密函数的参数输入,则加密函数E会输出密文C。当然,也可以采用其他的对称加密算法作为本方案中的目标对称加密算法,本方案不做具体限制。
在得到两个第一帮助数据之后,在将这两个第一帮助数据分别与对应的第一随机数进行异或处理,以获取两个第一目标数。
S14:通过大素数生成算法,分别对两个第一目标数进行生成处理,以获取两个第一大素数p1和q1。
S15:计算第一目标乘积n1=p1q1,以及φ(n1)=(p1-1)(q1-1),并选取满足1<e1<φ(n1) 且gcd(φ(n1),e1)=1的第一目标整数e1。
其中,φ(n1)是欧拉函数,gcd(φ(n1),e1)表示非负整数φ(n1)和e1的最大公因数。
S16:计算满足e1d1=1modφ(n1)的第二目标整数d1。
e1d1=1modφ(n1),用于计算e1对于φ(n1)的模反元素d1,本方案称为第二目标整数。
S17:将第一目标整数和第一目标乘积封装成邮件发送者的私钥,并将第二目标整数和第一目标乘积封装成邮件发送者的公钥。
S18:随机选取邮件接收者的私钥或公钥作为专属密钥。
在分别得到第一目标整数和第二目标整数之后,便可将第一目标整数和第一目标乘积封装成邮件发送者的公钥,并将第二目标整数和第一目标乘积封装成邮件发送者的私钥。也即:{e1,n1}为邮件接收者的公钥,{d1,n1}为邮件接收者的私钥。随机利用{e1,n1}或{d1,n1},便可对该邮件的邮件内容进行加密,得到邮件加密文件。
需要说明的是,作为一个示例,邮件发送端获取邮件接收者的公钥之前,邮件接收者可以通过邮件接收端将邮件接收者的公钥公布和利用邮件接收者的私钥解密目标加密消息之前需要生成邮件接收者的公钥和私钥,具体地,本方案也提供了生成邮件接收者的公钥和私钥的方式,可应用于邮件接收端,具体地,如图4所示,包括如下步骤:
S100:对邮件接收者的专属信息进行哈希计算,以获取邮件接收者专属哈希值,并依据该邮件接收者专属哈希值随机生成两个第二随机数,其中,两个第二随机数不相同。
S101:将所述邮件接收者的专属信息作为目标对称加密算法的密钥,对所述两个第二随机数进行加密,以对应获取两个第二帮助数据。
S102:将两个第二帮助数据分别与对应的第二随机数进行异或处理,以获取两个第二目标数。
S103:通过大素数生成算法,分别对两个第二目标数进行生成处理,以获取两个第二大素数p2和q2。
S104:计算第二目标乘积n2=p2q2,以及φ(n2)=(p2-1)(q2-1),并选取满足1<e2<φ(n2)且gcd(φ(n1),e2)=1的第三目标整数e2。
其中,φ(n2)是欧拉函数,gcd(φ(n2),e2)表示非负整数φ(n2)和e2的最大公因数。
S105:计算满足e2d2=1modφ(n2)的第四目标整数d2。
e2d2=1modφ(n2),用于计算e2对于φ(n2)的模反元素d2,本方案称为第四目标整数。
S106:将第三目标整数和第二目标乘积封装成邮件接收者的私钥,并将第四目标整数和第二目标乘积封装成邮件接收者的公钥。
S107:将所述邮件接收者的私钥保存于本地,并将所述邮件接收者的公钥与邮件地址关联存储至第二云服务端。
在分别得到第三目标整数和第四目标整数之后,便可将第三目标整数和第二目标乘积封装成邮件接收者的公钥,并将第四目标整数和第二目标乘积封装成邮件接收者的私钥。也即:{e2,n2}为邮件接收者的公钥,{d2,n2}为邮件接收者的私钥。并将所述邮件接收者的私钥保存于本地,并将所述邮件接收者的公钥与邮件地址关联存储至第二云服务端。
需要说明的是,邮件接收者的公钥和私钥的获取过程,可以对应参阅前述获取邮件发送者的专属密钥的过程,在此不重复一一解释各个步骤。
作为一个示例,S50中,也即邮件发送端确定用于存储所述目标加密消息的目标区块链网络,包括:
S51:邮件发送端判断与邮件接收端是否在同一区块链网络中。
S52:邮件发送端判断与邮件接收端是否在同一区块链网络中。
S53:当邮件发送端与邮件接收端为不在同一区块链网络中,则确定邮件接收端所在的区块链网络作为目标区块链网络。
S54:当邮件发送端与邮件接收端为在同一区块链网络中,则确定邮件发送端所在的 区块链网络作为目标区块链网络。
需要说明的是,邮件发送端和邮件接收端可以部署在同一区块链网络中,但实际应用中,为了减低部署成本,且由于用户数量级别大,为了提高系统的可扩展性,大多数邮件发送端和邮件接收端不同在区块链网络中。因此,依据邮件发送端与邮件接收端所处的区块链网络的不同,会相应有不同的处理逻辑。本方案中,邮件发送端在发送邮件时,会先判断邮件发送端判断与邮件接收端是否在同一区块链网络中。当邮件发送端与邮件接收端为不在同一区块链网络中,则将确定邮件接收端所在的区块链网络作为目标区块链网络,也就是说,邮件发送端会将目标加密消息发送至邮件接收端所在的区块链网络存储,并且,将目标加密消息在邮件接收端所在的区块链网络的存储位置信息发送给邮件接收端,以便邮件接收端从其所在的区块链网络中读取目标加密消息。
另一方面,当邮件发送端与邮件接收端为在同一区块链网络中,则直接确定邮件发送端所在的区块链网络作为目标区块链网络,也就是说,邮件发送端会将目标加密消息发送至邮件发送端所在的区块链网络存储,并且,将目标加密消息在邮件发送端所在的区块链网络的存储位置信息发送给邮件接收端,以便邮件接收端从邮件发送端所在的区块链网络所在的区块链网络中读取目标加密消息。
其中,在一个示例中,在邮件发送端将目标加密消息发送至目标区块链网络存储的过程如下所示:首先将携带目标加密消息存储请求给区块链处理端,该目标加密消息存储请求携带有目标加密消息,区块链处理端接收到目标加密消息存储请求之后,区块链处理端将利用目标加密消息生成区块并存储至邮件接收端所在的区块链中,完成上链过程。
其中,作为一个示例,S60中,也即将目标加密消息在所述目标区块链网络的存储位置信息发送给邮件接收端,包括:
S61:邮件发送端根据存储位置信息生成邮件正文,该邮件正文包含有存储位置信息;
S62:邮件发送端将该包含有存储位置信息的邮件正文通过邮件的形式发送给邮件接收端,以使邮件接收端可以通过该邮件正文获取到目标加密消息的存储位置信息。
值得强调的是,此过程可以通过普通邮件的形式将存储位置信息发送出去,但信息泄露风险的可能性极低,即使该普通邮件被截取,盗取者仅能获取到存储位置信息,即便盗取者依据存储位置信息从区块链网络中读取到目标加密消息,由于目标加密消息是经过加密的,盗取者也无法破解得到被加密的信息。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
在一实施例中,提供一种邮件发送端,该邮件发送端与上述实施例中邮件处理方法的邮件发送端一一对应。如图5所示,该邮件发送端包括第一获取模块101、生成模块102、第一加密模块103、存储模块104、第二获取模块105、、第二加密模块106、确定模块107和发送模块108。各功能模块详细说明如下:
第一获取模块101,用于当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息;
生成模块102,用于依据邮件发送者的专属信息生成专属密钥;
第一加密模块103,用于通过专属密钥对邮件的邮件内容进行加密,得到邮件加密文件;
存储模块104,用于将邮件加密文件存储到第一云服务端;
第二获取模块105,用于获取第一云服务端反馈的邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;
第二加密模块106,用于根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;
确定模块107,用于确定用于存储目标加密消息的目标区块链网络;
发送模块108,用于将目标加密消息存储在目标区块链网络,并将目标加密消息在目标区块链网络的存储位置信息发送给邮件接收端,以使邮件接收端依据该目标加密消息的存储位置信息获取邮件内容。
在一实施例中,生成模块102具体用于:
对邮件发送者的专属信息进行哈希计算,以获取邮件发送者专属哈希值,并依据邮件发送者专属哈希值随机生成两个第一随机数,其中,两个第一随机数不相同;
将邮件发送者的专属信息作为目标对称加密算法的密钥,对两个第一随机数进行加密,以对应获取两个第一帮助数据;
将两个第一帮助数据分别与对应的第一随机数进行异或处理,以获取两个第一目标数;
通过大素数生成算法,分别对两个第一目标数进行生成处理,以获取两个第一大素数p1和q1;
计算第一目标乘积n1=p1q1,以及φ(n1)=(p1-1)(q1-1),并选取满足1<e1<φ(n1)且gcd(φ(n1),e1)=1的第一目标整数e1;
计算满足e1d1=1modφ(n1)的第二目标整数d1;
将第一目标整数和第一目标乘积封装成邮件发送者的私钥,并将第二目标整数和第一目标乘积封装成邮件发送者的公钥;
随机选取邮件发送者的私钥或公钥作为专属密钥。
在一实施例中,确定模块107具体用于:
判断邮件发送端与邮件接收端是否在同一区块链网络中;
当邮件发送端与邮件接收端为不在同一区块链网络中,则确定邮件接收端所在的区块链网络作为目标区块链网络;
当邮件发送端与邮件接收端为在同一区块链网络中,则确定邮件发送端所在的区块链网络作为目标区块链网络。
在一实施例中,发送模块108具体用于:
根据存储位置信息生成邮件正文,邮件正文包含有存储位置信息;
将包含有存储位置信息的邮件正文,通过邮件的形式发送给邮件接收端,以使邮件接收端可以通过邮件正文获取到存储位置信息。
在一实施例中,第二获取模块105,具体用于:
获取邮件接收者的邮件地址;
从第二云服务端上获取到邮件接收者的公钥,第一云服务端与第一云服务端为不同的云服务端。
在一实施例中,提供一种邮件接收端,该邮件接收端与上述实施例中邮件处理方法的邮件接收端一一对应。如图6所示,该邮件接收端包括接收模块201、第一读取模块202、第一解密模块203、第二读取模块204和第二解密模块205。各功能模块详细说明如下:
接收模块201,用于接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,目标加密消息为邮件发送端根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密得到,云存储索引地址为邮件发送端通过专属密钥对邮件内容进行加密并将邮件加密文件存储到第一云服务端时对应的存储索引,专属密钥为邮件发送端依据邮件发送者的专属信息所生成;
第一读取模块202,用于依据目标加密消息的存储位置信息,从目标区块链网络中读取目标加密消息;
第一解密模块203,用于通过邮件接收者的私钥对目标加密消息进行解密,以得到云存储索引地址和专属密钥;
第二读取模块204,用于通过云存储索引地址,从第一云服务端读取邮件加密文件;
第二解密模块205,用于利用专属密钥对邮件加密文件进行解密,以得到邮件内容。
关于邮件发送端或邮件接收端的具体限定可以参见上文中对于邮件处理方法中邮件发送端或邮件接收端的限定,在此不再赘述。上述邮件发送端或邮件接收端中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在一个实施例中,提供了一种计算机设备,该计算机设备可以是邮件发送端或邮件接收端,其内部结构图可以如图7所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口、显示屏和输入装置。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括存储介质、内存储器。该存储介质存储有操作系统和计算机可读指令。该存储介质包括非易失性存储介质和易失性存储介质,该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的网络接口用于与外部服务器(如第一云服务端或第二云服务端以及目标区块链网络)通过网络连接通信。该计算机可读指令被处理器执行时以实现一种基于区块链的邮件处理方法中邮件发送端或邮件接收端的步骤或功能。
在一个实施例中,提供一种计算机设备,包括存储器、处理器以及存储在存储器中并可在处理器上运行的计算机可读指令,其中,处理器执行计算机可读指令时实现如下步骤:当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息,并依据邮件发送者的专属信息生成专属密钥;通过专属密钥对邮件的邮件内容进行加密,得到邮件加密文件,并将邮件加密文件存储到第一云服务端;获取第一云服务端反馈的邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;确定用于存储目标加密消息的目标区块链网络;将目标加密消息存储在目标区块链网络,并将目标加密消息在目标区块链网络的存储位置信息发送给邮件接收端,以使邮件接收端依据该目标加密消息的存储位置信息获取邮件内容。
在一实施例中,处理器执行计算机可读指令时实现如下步骤:对邮件发送者的专属信息进行哈希计算,以获取邮件发送者专属哈希值,并依据邮件发送者专属哈希值随机生成两个第一随机数,其中,两个第一随机数不相同;将邮件发送者的专属信息作为目标对称加密算法的密钥,对两个第一随机数进行加密,以对应获取两个第一帮助数据;将两个第一帮助数据分别与对应的第一随机数进行异或处理,以获取两个第一目标数;通过大素数生成算法,分别对两个第一目标数进行生成处理,以获取两个第一大素数p1和q1;计算第一目标乘积n1=p1q1,以及φ(n1)=(p1-1)(q1-1),并选取满足1<e1<φ(n1)且gcd(φ(n1),e1)=1的第一目标整数e1;计算满足e1d1=1modφ(n1)的第二目标整数d1;将第一目标整数和第一目标乘积封装成邮件发送者的私钥,并将第二目标整数和第一目标乘积封装成邮件发送者的公钥;随机选取邮件发送者的私钥或公钥作为专属密钥。
在一实施例中,其中,处理器执行计算机可读指令时实现如下步骤:判断邮件发送端与邮件接收端是否在同一区块链网络中;当邮件发送端与邮件接收端为不在同一区块链网络中,则确定邮件接收端所在的区块链网络作为目标区块链网络;当邮件发送端与邮件接收端为在同一区块链网络中,则确定邮件发送端所在的区块链网络作为目标区块链网络。
在一实施例中,其中,处理器执行计算机可读指令时实现如下步骤:根据存储位置信息生成邮件正文,邮件正文包含有存储位置信息;将包含有存储位置信息的邮件正文,通过邮件的形式发送给邮件接收端,以使邮件接收端可以通过邮件正文获取到存储位置信息。
在一实施例中,其中,处理器执行计算机可读指令时实现如下步骤:获取邮件接收者的邮件地址;从第二云服务端上获取到邮件接收者的公钥,第二云服务端与第一云服务端 为不同的云服务端。
在一实施例中,提供了一个或多个存储有计算机可读指令的可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如下步骤:当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息,并依据邮件发送者的专属信息生成专属密钥;通过专属密钥对邮件的邮件内容进行加密,得到邮件加密文件,并将邮件加密文件存储到第一云服务端;获取第一云服务端反馈的邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;确定用于存储目标加密消息的目标区块链网络;将目标加密消息存储在目标区块链网络,并将目标加密消息在目标区块链网络的存储位置信息发送给邮件接收端,以使邮件接收端依据该目标加密消息的存储位置信息获取邮件内容。
在一实施例中,其中,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如下步骤:对邮件发送者的专属信息进行哈希计算,以获取邮件发送者专属哈希值,并依据邮件发送者专属哈希值随机生成两个第一随机数,其中,两个第一随机数不相同;将邮件发送者的专属信息作为目标对称加密算法的密钥,对两个第一随机数进行加密,以对应获取两个第一帮助数据;将两个第一帮助数据分别与对应的第一随机数进行异或处理,以获取两个第一目标数;通过大素数生成算法,分别对两个第一目标数进行生成处理,以获取两个第一大素数p1和q1;计算第一目标乘积n1=p1q1,以及φ(n1)=(p1-1)(q1-1),并选取满足1<e1<φ(n1)且gcd(φ(n1),e1)=1的第一目标整数e1;计算满足e1d1=1modφ(n1)的第二目标整数d1;将第一目标整数和第一目标乘积封装成邮件发送者的私钥,并将第二目标整数和第一目标乘积封装成邮件发送者的公钥;随机选取邮件发送者的私钥或公钥作为专属密钥。
在一实施例中,其中,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如下步骤:判断邮件发送端与邮件接收端是否在同一区块链网络中;当邮件发送端与邮件接收端为不在同一区块链网络中,则确定邮件接收端所在的区块链网络作为目标区块链网络;当邮件发送端与邮件接收端为在同一区块链网络中,则确定邮件发送端所在的区块链网络作为目标区块链网络。
在一实施例中,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如下步骤:根据存储位置信息生成邮件正文,邮件正文包含有存储位置信息;将包含有存储位置信息的邮件正文,通过邮件的形式发送给邮件接收端,以使邮件接收端可以通过邮件正文获取到存储位置信息。
在一实施例中,提供另一种计算机设备,包括存储器、处理器以及存储在存储器中并可在处理器上运行的计算机可读指令,其中,该处理器执行计算机可读指令时实现如下步骤:接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,目标加密消息为邮件发送端根据邮件接收者的公钥,对云存储索引和专属密钥进行加密得到,云存储索引地址为邮件发送端通过专属密钥对邮件发送者需发送的邮件的邮件内容进行加密并将邮件加密文件存储到第一云服务端时对应的存储索引,专属密钥为邮件发送端依据邮件发送者的专属信息所生成;依据目标加密消息的存储位置信息,从目标区块链网络中读取目标加密消息;通过邮件接收者的私钥对目标加密消息进行解密,以得到云存储索引地址和专属密钥;通过云存储索引地址,从第一云服务端读取邮件加密文件;利用专属密钥对邮件加密文件进行解密,以得到邮件内容。
在一实施例中,提供一个或多个存储有计算机可读指令的可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如下步骤:接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,目标加密消息为邮件发送端根据邮件接收者的公钥,对云存储索引和专属密钥进行加密得到,云存储索引地址为邮件发送端通过专属密钥对邮件发送者需发送的邮件的邮件内容进行加密并将邮件加密文 件存储到第一云服务端时对应的存储索引,专属密钥为邮件发送端依据邮件发送者的专属信息所生成;依据目标加密消息的存储位置信息,从目标区块链网络中读取目标加密消息;
通过邮件接收者的私钥对目标加密消息进行解密,以得到云存储索引地址和专属密钥;通过云存储索引地址,从第一云服务端读取邮件加密文件;利用专属密钥对邮件加密文件进行解密,以得到邮件内容。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,所述计算机可读存储介质可以是非易失性,也可以是易失性,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。

Claims (20)

  1. 一种基于区块链的邮件处理方法,其中,应用于邮件发送端,所述方法包括:
    当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息,并依据所述邮件发送者的专属信息生成专属密钥;
    通过所述专属密钥对所述邮件的邮件内容进行加密,得到邮件加密文件,并将所述邮件加密文件存储到第一云服务端;
    获取所述第一云服务端反馈的所述邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;
    根据所述邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;
    确定用于存储所述目标加密消息的目标区块链网络;
    将所述目标加密消息存储在所述目标区块链网络,并将所述目标加密消息在所述目标区块链网络的存储位置信息发送给邮件接收端,以使所述邮件接收端依据该目标加密消息的存储位置信息获取所述邮件内容。
  2. 如权利要求1所述的基于区块链的邮件处理方法,其中,所述依据所述邮件发送者的专属信息生成专属密钥,包括:
    对所述邮件发送者的专属信息进行哈希计算,以获取邮件发送者专属哈希值,并依据所述邮件发送者专属哈希值随机生成两个第一随机数,其中,两个所述第一随机数不相同;
    将所述邮件发送者的专属信息作为目标对称加密算法的密钥,对所述两个第一随机数进行加密,以对应获取两个第一帮助数据;
    将两个所述第一帮助数据分别与对应的所述第一随机数进行异或处理,以获取两个第一目标数;
    通过大素数生成算法,分别对两个所述第一目标数进行生成处理,以获取两个第一大素数p1和q1;
    计算第一目标乘积n1=p1q1,以及φ(n1)=(p1-1)(q1-1),并选取满足1<e1<φ(n1)且gcd(φ(n1),e1)=1的第一目标整数e1;
    计算满足e1d1=1modφ(n1)的第二目标整数d1;
    将所述第一目标整数和所述第一目标乘积封装成所述邮件发送者的私钥,并将所述第二目标整数和所述第一目标乘积封装成邮件发送者的公钥;
    随机选取所述邮件发送者的私钥或公钥作为所述专属密钥。
  3. 如权利要求1所述的基于区块链的邮件处理方法,其中,所述确定用于存储所述目标加密消息的目标区块链网络,包括:
    判断所述邮件发送端与所述邮件接收端是否在同一区块链网络中;
    当所述邮件发送端与邮件接收端为不在同一区块链网络中,则确定所述邮件接收端所在的区块链网络作为所述目标区块链网络;
    当所述邮件发送端与所述邮件接收端为在同一区块链网络中,则确定所述邮件发送端所在的区块链网络作为所述目标区块链网络。
  4. 如权利要求1所述的基于区块链的邮件处理方法,其中,所述将所述目标加密消息在所述目标区块链网络的存储位置信息发送给邮件接收端,包括:
    根据所述存储位置信息生成邮件正文,所述邮件正文包含有所述存储位置信息;
    将所述包含有存储位置信息的所述邮件正文,通过邮件的形式发送给所述邮件接收端,以使所述邮件接收端可以通过所述邮件正文获取到所述存储位置信息。
  5. 如权利要求1-4任一项所述的基于区块链的邮件处理方法,其中,所述获取邮件接收者的公钥,包括:
    获取所述邮件接收者的邮件地址;
    从第二云服务端上获取到所述邮件接收者的公钥,所述第二云服务端与所述第一云服务端为不同的云服务端。
  6. 一种基于区块链的邮件处理方法,其中,应用于邮件接收端,所述方法包括:
    接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,所述目标加密消息为所述邮件发送端根据邮件接收者的公钥,对云存储索引和专属密钥进行加密得到,所述云存储索引地址为所述邮件发送端通过所述专属密钥对邮件发送者需发送的邮件的邮件内容进行加密并将邮件加密文件存储到第一云服务端时对应的存储索引,所述专属密钥为所述邮件发送端依据所述邮件发送者的专属信息所生成;
    依据所述目标加密消息的存储位置信息,从所述目标区块链网络中读取所述目标加密消息;
    通过所述邮件接收者的私钥对所述目标加密消息进行解密,以得到所述云存储索引地址和专属密钥;
    通过所述云存储索引地址,从第一云服务端读取所述邮件加密文件;
    利用所述专属密钥对所述邮件加密文件进行解密,以得到所述邮件内容。
  7. 如权利要求1所述的基于区块链的邮件处理方法,其中,所述邮件接收者的公钥和私钥通过如下方式获取:
    对所述邮件接收者的专属信息进行哈希计算,以获取邮件接收者专属哈希值,并依据所述邮件接收者专属哈希值随机生成两个第二随机数,其中,两个所述第二随机数不相同;
    将所述邮件接收者的专属信息作为目标对称加密算法的密钥,对所述两个第二随机数进行加密,以对应获取两个第二帮助数据;
    将两个所述第二帮助数据分别与对应的所述第二随机数进行异或处理,以获取两个第二目标数;
    通过大素数生成算法,分别对两个所述第二目标数进行生成处理,以获取两个第二大素数p2和q2;
    计算第二目标乘积n2=p2q2,以及
    Figure PCTCN2021096703-appb-100001
    并选取满足
    Figure PCTCN2021096703-appb-100002
    Figure PCTCN2021096703-appb-100003
    的第三目标整数e2;
    计算满足
    Figure PCTCN2021096703-appb-100004
    的第四目标整数d2;
    将所述第三目标整数和所述第二目标乘积封装成所述邮件接收者的私钥,并将所述第四目标整数和所述第二目标乘积封装成所述邮件接收者的公钥;
    将所述邮件接收者的私钥保存于本地,并将所述邮件接收者的公钥与邮件地址关联存储至第二云服务端。
  8. 一种邮件发送端,其中,包括:
    第一获取模块,用于当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息;
    生成模块,用于依据所述邮件发送者的专属信息生成专属密钥;
    第一加密模块,用于通过所述专属密钥对所述邮件的邮件内容进行加密,得到邮件加密文件;
    存储模块,用于将所述邮件加密文件存储到第一云服务端;
    第二获取模块,用于获取所述第一云服务端反馈的所述邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;
    第二加密模块,用于根据所述邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;
    确定模块,用于确定用于存储所述目标加密消息的目标区块链网络;
    发送模块,用于将所述目标加密消息存储在所述目标区块链网络,并将所述目标加密 消息在所述目标区块链网络的存储位置信息发送给邮件接收端,以使所述邮件接收端依据该目标加密消息的存储位置信息获取所述邮件内容。
  9. 一种邮件接收端,其中,包括:
    接收模块,用于接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,所述目标加密消息为所述邮件发送端根据邮件接收者的公钥,对云存储索引地址和专属密钥进行加密得到,所述云存储索引地址为所述邮件发送端通过所述专属密钥对邮件内容进行加密并将邮件加密文件存储到第一云服务端时对应的存储索引,所述专属密钥为所述邮件发送端依据所述邮件发送者的专属信息所生成;
    第一读取模块,用于依据所述目标加密消息的存储位置信息,从所述目标区块链网络中读取所述目标加密消息;
    第一解密模块,用于通过所述邮件接收者的私钥对所述目标加密消息进行解密,以得到所述云存储索引地址和专属密钥;
    第二读取模块,用于通过所述云存储索引地址,从第一云服务端读取所述邮件加密文件;
    第二解密模块,用于利用所述专属密钥对所述邮件加密文件进行解密,以得到所述邮件内容。
  10. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其中,所述处理器执行所述计算机可读指令时实现如下步骤:
    当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息,并依据所述邮件发送者的专属信息生成专属密钥;
    通过所述专属密钥对所述邮件的邮件内容进行加密,得到邮件加密文件,并将所述邮件加密文件存储到第一云服务端;
    获取所述第一云服务端反馈的所述邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;
    根据所述邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;
    确定用于存储所述目标加密消息的目标区块链网络;
    将所述目标加密消息存储在所述目标区块链网络,并将所述目标加密消息在所述目标区块链网络的存储位置信息发送给邮件接收端,以使所述邮件接收端依据该目标加密消息的存储位置信息获取所述邮件内容。
  11. 如权利要求10所述的计算机设备,其中,所述处理器执行所述计算机可读指令时实现如下步骤:
    对所述邮件发送者的专属信息进行哈希计算,以获取邮件发送者专属哈希值,并依据所述邮件发送者专属哈希值随机生成两个第一随机数,其中,两个所述第一随机数不相同;
    将所述邮件发送者的专属信息作为目标对称加密算法的密钥,对所述两个第一随机数进行加密,以对应获取两个第一帮助数据;
    将两个所述第一帮助数据分别与对应的所述第一随机数进行异或处理,以获取两个第一目标数;
    通过大素数生成算法,分别对两个所述第一目标数进行生成处理,以获取两个第一大素数p1和q1;
    计算第一目标乘积n1=p1q1,以及φ(n1)=(p1-1)(q1-1),并选取满足1<e1<φ(n1)且gcd(φ(n1),e1)=1的第一目标整数e1;
    计算满足e1d1=1modφ(n1)的第二目标整数d1;
    将所述第一目标整数和所述第一目标乘积封装成所述邮件发送者的私钥,并将所述第二目标整数和所述第一目标乘积封装成邮件发送者的公钥;
    随机选取所述邮件发送者的私钥或公钥作为所述专属密钥。
  12. 如权利要求10所述的计算机设备,其中,所述处理器执行所述计算机可读指令时实现如下步骤:
    判断所述邮件发送端与所述邮件接收端是否在同一区块链网络中;
    当所述邮件发送端与邮件接收端为不在同一区块链网络中,则确定所述邮件接收端所在的区块链网络作为所述目标区块链网络;
    当所述邮件发送端与所述邮件接收端为在同一区块链网络中,则确定所述邮件发送端所在的区块链网络作为所述目标区块链网络。
  13. 如权利要求10所述的计算机设备,其中,所述处理器执行所述计算机可读指令时实现如下步骤:
    根据所述存储位置信息生成邮件正文,所述邮件正文包含有所述存储位置信息;
    将所述包含有存储位置信息的所述邮件正文,通过邮件的形式发送给所述邮件接收端,以使所述邮件接收端可以通过所述邮件正文获取到所述存储位置信息。
  14. 如权利要求10-13任一项所述的计算机设备,其中,所述处理器执行所述计算机可读指令时实现如下步骤:
    获取所述邮件接收者的邮件地址;
    从第二云服务端上获取到所述邮件接收者的公钥,所述第二云服务端与所述第一云服务端为不同的云服务端。
  15. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其中,所述处理器执行所述计算机可读指令时实现如下步骤:
    接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,所述目标加密消息为所述邮件发送端根据邮件接收者的公钥,对云存储索引和专属密钥进行加密得到,所述云存储索引地址为所述邮件发送端通过所述专属密钥对邮件发送者需发送的邮件的邮件内容进行加密并将邮件加密文件存储到第一云服务端时对应的存储索引,所述专属密钥为所述邮件发送端依据所述邮件发送者的专属信息所生成;
    依据所述目标加密消息的存储位置信息,从所述目标区块链网络中读取所述目标加密消息;
    通过所述邮件接收者的私钥对所述目标加密消息进行解密,以得到所述云存储索引地址和专属密钥;
    通过所述云存储索引地址,从第一云服务端读取所述邮件加密文件;
    利用所述专属密钥对所述邮件加密文件进行解密,以得到所述邮件内容。
  16. 一个或多个存储有计算机可读指令的可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:
    当邮件发送者编辑完邮件时,获取邮件内容和该邮件发送者的专属信息,并依据所述邮件发送者的专属信息生成专属密钥;
    通过所述专属密钥对所述邮件的邮件内容进行加密,得到邮件加密文件,并将所述邮件加密文件存储到第一云服务端;
    获取所述第一云服务端反馈的所述邮件加密文件对应的云存储索引地址,并获取邮件接收者的公钥;
    根据所述邮件接收者的公钥,对云存储索引地址和专属密钥进行加密,得到目标加密消息;
    确定用于存储所述目标加密消息的目标区块链网络;
    将所述目标加密消息存储在所述目标区块链网络,并将所述目标加密消息在所述目标区块链网络的存储位置信息发送给邮件接收端,以使所述邮件接收端依据该目标加密消息的存储位置信息获取所述邮件内容。
  17. 如权利要求16所述的可读存储介质,其中,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:
    对所述邮件发送者的专属信息进行哈希计算,以获取邮件发送者专属哈希值,并依据所述邮件发送者专属哈希值随机生成两个第一随机数,其中,两个所述第一随机数不相同;
    将所述邮件发送者的专属信息作为目标对称加密算法的密钥,对所述两个第一随机数进行加密,以对应获取两个第一帮助数据;
    将两个所述第一帮助数据分别与对应的所述第一随机数进行异或处理,以获取两个第一目标数;
    通过大素数生成算法,分别对两个所述第一目标数进行生成处理,以获取两个第一大素数p1和q1;
    计算第一目标乘积n1=p1q1,以及φ(n1)=(p1-1)(q1-1),并选取满足1<e1<φ(n1)且gcd(φ(n1),e1)=1的第一目标整数e1;
    计算满足e1d1=1modφ(n1)的第二目标整数d1;
    将所述第一目标整数和所述第一目标乘积封装成所述邮件发送者的私钥,并将所述第二目标整数和所述第一目标乘积封装成邮件发送者的公钥;
    随机选取所述邮件发送者的私钥或公钥作为所述专属密钥。
  18. 如权利要求16所述的可读存储介质,其中,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:
    判断所述邮件发送端与所述邮件接收端是否在同一区块链网络中;
    当所述邮件发送端与邮件接收端为不在同一区块链网络中,则确定所述邮件接收端所在的区块链网络作为所述目标区块链网络;
    当所述邮件发送端与所述邮件接收端为在同一区块链网络中,则确定所述邮件发送端所在的区块链网络作为所述目标区块链网络。
  19. 如权利要求16所述的可读存储介质,其中,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:
    根据所述存储位置信息生成邮件正文,所述邮件正文包含有所述存储位置信息;
    将所述包含有存储位置信息的所述邮件正文,通过邮件的形式发送给所述邮件接收端,以使所述邮件接收端可以通过所述邮件正文获取到所述存储位置信息。
  20. 一个或多个存储有计算机可读指令的可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:
    接收邮件发送端发送的目标加密消息在目标区块链网络的存储位置信息,其中,所述目标加密消息为所述邮件发送端根据邮件接收者的公钥,对云存储索引和专属密钥进行加密得到,所述云存储索引地址为所述邮件发送端通过所述专属密钥对邮件发送者需发送的邮件的邮件内容进行加密并将邮件加密文件存储到第一云服务端时对应的存储索引,所述专属密钥为所述邮件发送端依据所述邮件发送者的专属信息所生成;
    依据所述目标加密消息的存储位置信息,从所述目标区块链网络中读取所述目标加密消息;
    通过所述邮件接收者的私钥对所述目标加密消息进行解密,以得到所述云存储索引地址和专属密钥;
    通过所述云存储索引地址,从第一云服务端读取所述邮件加密文件;
    利用所述专属密钥对所述邮件加密文件进行解密,以得到所述邮件内容。
PCT/CN2021/096703 2020-12-31 2021-05-28 基于区块链的邮件处理方法、邮件发送端、接收端及设备 WO2022142112A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011640195.8 2020-12-31
CN202011640195.8A CN112822255B (zh) 2020-12-31 2020-12-31 基于区块链的邮件处理方法、邮件发送端、接收端及设备

Publications (1)

Publication Number Publication Date
WO2022142112A1 true WO2022142112A1 (zh) 2022-07-07

Family

ID=75858095

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/096703 WO2022142112A1 (zh) 2020-12-31 2021-05-28 基于区块链的邮件处理方法、邮件发送端、接收端及设备

Country Status (2)

Country Link
CN (1) CN112822255B (zh)
WO (1) WO2022142112A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132166A (zh) * 2023-02-03 2023-05-16 网易(杭州)网络有限公司 基于区块链的通信方法、装置、设备及存储介质
CN116484413A (zh) * 2023-06-25 2023-07-25 上海联鼎软件股份有限公司 面向非结构化数据的高效跨云智能安全布局构建方法
CN118133327A (zh) * 2024-05-08 2024-06-04 三未信安科技股份有限公司 一种支持搜索模式隐私的可搜索加密方法及系统

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112822255B (zh) * 2020-12-31 2023-02-28 平安科技(深圳)有限公司 基于区块链的邮件处理方法、邮件发送端、接收端及设备
CN115426331B (zh) * 2022-08-30 2024-03-22 中国工商银行股份有限公司 邮件传输方法、装置、计算机设备和存储介质
CN116805078A (zh) * 2023-06-14 2023-09-26 深圳市易联锋达科技有限公司 一种基于大数据的物流信息平台数据智能管理系统及方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248488A (zh) * 2013-05-14 2013-08-14 顾纯祥 一种基于身份的密钥生成方法和认证方法
CN108259169A (zh) * 2018-01-09 2018-07-06 北京大学深圳研究生院 一种基于区块链云存储的文件安全分享方法及系统
US10305833B1 (en) * 2017-07-23 2019-05-28 Turing Technology, Inc. Blockchain based email procedures
CN111464494A (zh) * 2020-02-26 2020-07-28 北京十安赛恩科技有限公司 一种电子邮件加密方法、第一客户端以及区块链系统
CN112822255A (zh) * 2020-12-31 2021-05-18 平安科技(深圳)有限公司 基于区块链的邮件处理方法、邮件发送端、接收端及设备

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6931532B1 (en) * 1999-10-21 2005-08-16 International Business Machines Corporation Selective data encryption using style sheet processing
CN102340455A (zh) * 2010-07-16 2012-02-01 汉达精密电子(昆山)有限公司 以指纹资料加密的电子邮件传送方法与接收方法
CN103188271A (zh) * 2013-04-19 2013-07-03 国家电网公司 一种安全的邮件客户端本地数据存储、识别方法和装置
CN103281312B (zh) * 2013-05-10 2016-02-17 金硕澳门离岸商业服务有限公司 信息过滤方法
CN103457932B (zh) * 2013-08-15 2016-08-10 中电长城网际系统应用有限公司 一种云计算环境数据安全存储方法和系统
KR101628009B1 (ko) * 2015-04-20 2016-06-13 주식회사 코인플러그 당사자간 블록체인을 갖는 디지털 가상화폐의 거래시스템
CN106453612B (zh) * 2016-11-10 2019-03-05 华中科技大学 一种数据存储与共享系统
CN107508806A (zh) * 2017-08-11 2017-12-22 北京理工大学 基于区块链的互联网金融电子数据保全系统及方法
CN108038128B (zh) * 2017-11-08 2020-02-14 平安科技(深圳)有限公司 一种加密文件的检索方法、系统、终端设备及存储介质
CN110719167B (zh) * 2019-10-16 2022-09-27 郑州师范学院 一种基于区块链的带时效性的签密方法
CN111541678A (zh) * 2020-04-17 2020-08-14 上海朝夕网络技术有限公司 一种基于区块链的代理重加密方法、系统及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248488A (zh) * 2013-05-14 2013-08-14 顾纯祥 一种基于身份的密钥生成方法和认证方法
US10305833B1 (en) * 2017-07-23 2019-05-28 Turing Technology, Inc. Blockchain based email procedures
CN108259169A (zh) * 2018-01-09 2018-07-06 北京大学深圳研究生院 一种基于区块链云存储的文件安全分享方法及系统
CN111464494A (zh) * 2020-02-26 2020-07-28 北京十安赛恩科技有限公司 一种电子邮件加密方法、第一客户端以及区块链系统
CN112822255A (zh) * 2020-12-31 2021-05-18 平安科技(深圳)有限公司 基于区块链的邮件处理方法、邮件发送端、接收端及设备

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132166A (zh) * 2023-02-03 2023-05-16 网易(杭州)网络有限公司 基于区块链的通信方法、装置、设备及存储介质
CN116484413A (zh) * 2023-06-25 2023-07-25 上海联鼎软件股份有限公司 面向非结构化数据的高效跨云智能安全布局构建方法
CN116484413B (zh) * 2023-06-25 2023-09-29 上海联鼎软件股份有限公司 面向非结构化数据的高效跨云智能安全布局构建方法
CN118133327A (zh) * 2024-05-08 2024-06-04 三未信安科技股份有限公司 一种支持搜索模式隐私的可搜索加密方法及系统

Also Published As

Publication number Publication date
CN112822255A (zh) 2021-05-18
CN112822255B (zh) 2023-02-28

Similar Documents

Publication Publication Date Title
WO2022142112A1 (zh) 基于区块链的邮件处理方法、邮件发送端、接收端及设备
US10673626B2 (en) Threshold secret share authentication proof and secure blockchain voting with hardware security modules
US11159307B2 (en) Ad-hoc trusted groups on a blockchain
Barsoum et al. Enabling dynamic data and indirect mutual trust for cloud computing storage systems
KR101658501B1 (ko) 해시함수 기반의 전자서명 서비스 시스템 및 그 방법
US11943350B2 (en) Systems and methods for re-using cold storage keys
CN111797415A (zh) 基于区块链的数据共享方法、电子设备和存储介质
US11972637B2 (en) Systems and methods for liveness-verified, biometric-based encryption
US20180063105A1 (en) Management of enciphered data sharing
CN111294203B (zh) 信息传输方法
WO2016122646A1 (en) Systems and methods for providing data security services
US10063655B2 (en) Information processing method, trusted server, and cloud server
US20140237239A1 (en) Techniques for validating cryptographic applications
CN113726772B (zh) 实现在线问诊会话的方法、装置、设备及存储介质
JP4718552B2 (ja) ブロードキャストマテリアルの使用に対する認証および支払いを管理する方法およびシステム
CA3184487A1 (en) Distributed anonymized compliant encryption management system
JP2022545809A (ja) 暗号鍵生成のためのセキュアな環境
CN112187767A (zh) 基于区块链的多方合同共识系统、方法及介质
KR20210044581A (ko) 블록체인 기반 암호화폐 상속 방법 및 장치
CN115426331B (zh) 邮件传输方法、装置、计算机设备和存储介质
US11736462B1 (en) Hybrid content protection architecture for email
US12047496B1 (en) Noncustodial techniques for granular encryption and decryption
US20240048361A1 (en) Key Management for Cryptography-as-a-service and Data Governance Systems
US20240048532A1 (en) Data exchange protection and governance system
US20240107318A1 (en) A method and a system for securely sharing datasets via glyphs

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21912873

Country of ref document: EP

Kind code of ref document: A1