CN106656739A - E-mail transmission method, E-mail transmission device and E-mail transmission system - Google Patents
E-mail transmission method, E-mail transmission device and E-mail transmission system Download PDFInfo
- Publication number
- CN106656739A CN106656739A CN201610843015.3A CN201610843015A CN106656739A CN 106656739 A CN106656739 A CN 106656739A CN 201610843015 A CN201610843015 A CN 201610843015A CN 106656739 A CN106656739 A CN 106656739A
- Authority
- CN
- China
- Prior art keywords
- key
- mail server
- privacy enhanced
- contents
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 69
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000012545 processing Methods 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 6
- 230000005611 electricity Effects 0.000 claims description 3
- 238000012546 transfer Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000003860 storage Methods 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an E-mail transmission method, an E-mail transmission device and an E-mail transmission system, wherein the E-mail transmission method comprises the steps of acquiring a first secret key from an encryption mail server by a transmitting end; performing encryption on a first E-mail content by the transmitting end by means of the first secret key, and obtaining a second E-mail content; transmitting the second E-mail content to the encryption mail server by the transmitting end, and transmitting the E-mail server to an E-mail server, wherein the E-mail comprises link information of the second E-mail content. The E-mail transmission method, the E-mail transmission device and the E-mail transmission system settle technical problems of requirement for receiving a certificate of a receiving party and low convenience in E-mail transmission in prior art.
Description
Technical field
The present invention relates to information security field, in particular to a kind of transmission method of Email, device and it is
System.
Background technology
What the current method that safe transmission is carried out to mail was realized typically all by way of PKI digital envelopes.Tool
Body technique scheme is:Sending direction recipient is sent before mail, it is necessary first to is obtained the digital certificate A of recipient, is then utilized
Digital certificate A encapsulates digital envelope to Mail Contents, then packaged digital envelope is sent into mail as Mail Contents
Server, after recipient gets the mail from mail server, using the corresponding private keys of digital certificate A digital envelope is unsealed, so as to
Mail Contents are obtained, because only that recipient has the corresponding private keys of digital certificate A, so only recipient could be decrypted in mail
Hold.The shortcoming of prior art is that each mail client needs to provide certificate first, and is sent before mail first to other side
Need the certificate for obtaining other side.
Need to obtain the certificate of recipient for the transmission method of Email of the prior art, mail transfer is not
Convenient problem, not yet proposes at present effective solution.
The content of the invention
A kind of transmission method of Email, device and system are embodiments provided, at least to solve existing skill
The transmission method of the Email in art needs the certificate for obtaining recipient, the inconvenient technical problem of mail transfer.
A kind of one side according to embodiments of the present invention, there is provided transmission method of Email, including:Transmitting terminal from
Privacy enhanced mail server obtains first key;Transmitting terminal is encrypted using first key to the first Mail Contents, obtains second
Mail Contents;Second Mail Contents are sent to privacy enhanced mail server by transmitting terminal, concurrently send Email to mail server,
Wherein, Email includes:The link information of the second Mail Contents.
Further, privacy enhanced mail server is encrypted to first key, obtains the second key, and it is close to preserve second
Key.
Further, Email is sent to mail server, the method also includes in transmitting terminal:Receiving terminal is from postal
Part server obtains Email;Receiving terminal obtains the according to the link information of the second Mail Contents from privacy enhanced mail server
Two Mail Contents and the 3rd key, wherein, the 3rd key is that the second key carries out turning the key after encryption;Receiving terminal is close to the 3rd
Key is decrypted, and obtains first key;Receiving terminal is decrypted using first key to the second Mail Contents, obtains the first mail
Content.
Further, first key is obtained from privacy enhanced mail server in transmitting terminal, or receiving terminal is according in the second mail
The link information of appearance, obtains before the second Mail Contents and the 3rd key from privacy enhanced mail server, and the method also includes:Send
End uses first user name and the first password logon privacy enhanced mail server;Or receiving terminal uses second user name and the second password
Log in privacy enhanced mail server.
Further, in the case where transmitting terminal or receiving terminal first log into privacy enhanced mail server, the method also includes:
The first registration request that privacy enhanced mail server receiving end/sending end sends, or the second registration request that receiving terminal sends, wherein,
First registration request includes:First user name and the 3rd password, registration request includes:Second user name and the 4th password;Encryption
Mail server is set up with mail server and is connected, and the first registration request or the second registration request are verified;If the
One registration request or the second registration request are proved to be successful, then privacy enhanced mail server sends information to transmitting terminal or reception
End, wherein, information is used to point out the password of user input first or the second password;Privacy enhanced mail server receiving end/sending end is sent out
The second password that the first password for sending or receiving terminal send.
Further, after receiving terminal is using second user name and the second password logon privacy enhanced mail server, the party
Method also includes:Privacy enhanced mail server obtains the label information of key corresponding with second user name, wherein, label information is at least
Including:Turn to encrypt or do not turn encryption;Privacy enhanced mail server obtains label information from key corresponding with second user name
For the second key for not turning to encrypt;Privacy enhanced mail server is decrypted to the second key, obtains first key;Privacy enhanced mail takes
Business device is encrypted using the second password to first key, obtains the 3rd key;Privacy enhanced mail server replaces the second key
For the 3rd key.
Another aspect according to embodiments of the present invention, additionally provides a kind of transmission method of Email, including:Receiving terminal
Email is obtained from mail server, wherein, Email includes:The link information of the second Mail Contents, in the second mail
Appearance is stored in privacy enhanced mail server;Receiving terminal is obtained according to the link information of the second Mail Contents from privacy enhanced mail server
Take the second Mail Contents and the 3rd key;Receiving terminal is decrypted to the 3rd key, obtains first key;Receiving terminal utilizes first
Key is decrypted to the second Mail Contents, obtains the first Mail Contents.
Further, before receiving terminal obtains Email from mail server, the method also includes:Transmitting terminal from plus
Close mail server obtains first key;Transmitting terminal is encrypted using first key to the first Mail Contents, obtains the second postal
Part content;Second Mail Contents are sent to privacy enhanced mail server by transmitting terminal, concurrently send Email to mail server.
Further, privacy enhanced mail server is encrypted to first key, obtains the second key, and it is close to preserve second
Key, wherein, the 3rd key is that the second key carries out turning the key after encryption.
Another aspect according to embodiments of the present invention, additionally provides a kind of transmitting device of Email, including:Obtain mould
Block, for obtaining first key from privacy enhanced mail server;Processing module, for being entered to the first Mail Contents using first key
Row encryption, obtains the second Mail Contents;Communication module, for the second Mail Contents to be sent into privacy enhanced mail server, concurrently
Email is sent to mail server, wherein, Email includes:The link information of the second Mail Contents.
Another aspect according to embodiments of the present invention, additionally provides a kind of transmitting device of Email, including:First obtains
Delivery block, for obtaining Email from mail server, wherein, Email includes:The link information of the second Mail Contents,
Second Mail Contents are stored in privacy enhanced mail server;Second acquisition module, for being believed according to the link of the second Mail Contents
Breath, from privacy enhanced mail server the second Mail Contents and the 3rd key are obtained;First processing module, for carrying out to the 3rd key
Decryption, obtains first key;Second processing module, for being decrypted to the second Mail Contents using first key, obtains
One Mail Contents.
Another aspect according to embodiments of the present invention, additionally provides a kind of Transmission system of Email, including:Encryption postal
Part server, for storing first key;Transmitting terminal, is connected with privacy enhanced mail server, for using first key to first
Mail Contents are encrypted, and obtain the second Mail Contents;Privacy enhanced mail server is additionally operable to the second postal of receiving end/sending end transmission
Part content;Mail server, is connected with transmitting terminal, for the Email that receiving end/sending end sends, wherein, e-mail packet
Include:The link information of the second Mail Contents.
Further, the system also includes:Receiving terminal, is connected with mail server and privacy enhanced mail server, for obtaining
Email is taken, according to the link information of the second Mail Contents, the second Mail Contents and the 3rd key is obtained, the 3rd key is entered
Row decryption, obtains first key, and the second Mail Contents are decrypted using first key, obtains the first Mail Contents, its
In, the 3rd key is that the second key carries out turning the key after encryption.
In embodiments of the present invention, transmitting terminal can obtain first key from privacy enhanced mail server, using first key
First Mail Contents are encrypted, the second Mail Contents are obtained, the second Mail Contents are sent into privacy enhanced mail server, and
Email is sent to mail server, so as to realize the safe transmission of Email.It is easily noted that, due to transmitting terminal
Key is obtained from privacy enhanced mail server to be encrypted Mail Contents, it is not necessary to the digital certificate of receiving terminal is obtained, so as to reality
Now only need to know the mailbox of receiving terminal, it is possible to the transmission Email of safety, and receiving terminal is from privacy enhanced mail server
Mail Contents are obtained, so as to the transmission method for solving Email of the prior art needs to obtain the certificate of recipient, electricity
The inconvenient technical problem of sub- mail transmission.
Description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, this
Bright schematic description and description does not constitute inappropriate limitation of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of the transmission method of Email according to embodiments of the present invention;
Fig. 2 is a kind of interaction figure of the transmission method of Email according to embodiments of the present invention;
Fig. 3 is the flow chart of the transmission method of another kind of Email according to embodiments of the present invention;
Fig. 4 is a kind of schematic diagram of the transmitting device of Email according to embodiments of the present invention;
Fig. 5 is a kind of schematic diagram of the transmitting device of Email according to embodiments of the present invention;
Fig. 6 is a kind of schematic diagram of the Transmission system of Email according to embodiments of the present invention;And
Fig. 7 is a kind of schematic diagram of the Transmission system of Email according to embodiments of the present invention.
Specific embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only
The embodiment of a part of the invention, rather than the embodiment of whole.Based on the embodiment in the present invention, ordinary skill people
The every other embodiment that member is obtained under the premise of creative work is not made, should all belong to the model of present invention protection
Enclose.
It should be noted that description and claims of this specification and the term " first " in above-mentioned accompanying drawing, "
Two " it is etc. the object for distinguishing similar, without for describing specific order or precedence.It should be appreciated that so using
Data can exchange in the appropriate case, so as to embodiments of the invention described herein can with except illustrating here or
Order beyond those of description is implemented.Additionally, term " comprising " and " having " and their any deformation, it is intended that cover
Lid is non-exclusive to be included, and for example, process, method, system, product or the equipment for containing series of steps or unit is not necessarily limited to
Those steps clearly listed or unit, but may include clearly not list or for these processes, method, product
Or intrinsic other steps of equipment or unit.
Embodiment 1
According to embodiments of the present invention, there is provided a kind of embodiment of the method for the transmission method of Email, explanation is needed
It is can to perform in the such as computer system of one group of computer executable instructions the step of the flow process of accompanying drawing is illustrated,
And, although logical order is shown in flow charts, but in some cases, can be performed with the order being different from herein
Shown or described step.
Fig. 1 is a kind of flow chart of the transmission method of Email according to embodiments of the present invention, as shown in figure 1, the party
Method comprises the steps:
Step S102, transmitting terminal obtains first key from privacy enhanced mail server.
Specifically, above-mentioned first key can be privacy enhanced mail server receive transmitting terminal transmission request it
Afterwards, the key for automatically generating, privacy enhanced mail server can generate identical key for each transmitting terminal, or sends out every time
Sending end sends request and generates a key, and the present invention is not especially limited to this.
Step S104, transmitting terminal is encrypted using first key to the first Mail Contents, obtains the second Mail Contents.
Specifically, the first above-mentioned Mail Contents can be the Mail Contents that transmitting terminal sends to receiving terminal.
Second Mail Contents are sent to privacy enhanced mail server by step S106, transmitting terminal, concurrently send Email to postal
Part server, wherein, Email includes:The link information of the second Mail Contents.
Specifically, above-mentioned link information can be that the first Mail Contents and first key are deposited in privacy enhanced mail server
Address.
In a kind of optional scheme, before transmitting terminal A sends Email to receiving terminal B, transmitting terminal A can be first
Key request is sent to privacy enhanced mail server ES, privacy enhanced mail server ES is receiving the key request of transmitting terminal A transmissions
Afterwards, generate corresponding first key K and return to transmitting terminal A.Transmitting terminal A is to get first from privacy enhanced mail server ES close
After key K, it is possible to use first key K is encrypted to Mail Contents C, the Mail Contents after being encrypted, i.e. the second mail
Content C1.Transmitting terminal A is by the second Mail Contents C1Privacy enhanced mail server ES is sent to, while will be comprising the second Mail Contents C1
The Email C of link2It is sent to mail server S.
By the above embodiment of the present invention, transmitting terminal can obtain first key from privacy enhanced mail server, utilize first
Key is encrypted to the first Mail Contents, obtains the second Mail Contents, and the second Mail Contents are sent into privacy enhanced mail service
Device, concurrently send Email to mail server, so as to realize the safe transmission of Email.It is easily noted that, due to
Transmitting terminal obtains key and Mail Contents is encrypted from privacy enhanced mail server, it is not necessary to obtain the digital certificate of receiving terminal,
So as to realize only needing to the mailbox for knowing receiving terminal, it is possible to the transmission Email of safety, and receiving terminal is from privacy enhanced mail
Server obtains Mail Contents, so as to the transmission method for solving Email of the prior art needs to obtain the card of recipient
Book, the inconvenient technical problem of mail transfer.
Alternatively, in the above embodiment of the present invention, privacy enhanced mail server can be encrypted to first key, obtain
Second key, and preserve the second key.
In a kind of optional scheme, privacy enhanced mail server ES can use the key ESK of privacy enhanced mail server ES
First key K to being sent to transmitting terminal A is encrypted, the key after being encrypted, i.e. the second key K1, and by the second key
K1In being stored in privacy enhanced mail server ES, so as in transmitting terminal by the second Mail Contents C1It is sent to privacy enhanced mail server ES
Afterwards, privacy enhanced mail server ES can simultaneously preserve the second key K1With the second Mail Contents C1。
Alternatively, in the above embodiment of the present invention, step S106, transmitting terminal send Email to mail server it
Afterwards, said method also includes:
Step S112, receiving terminal obtains Email from mail server.
Step S114, receiving terminal obtains the second postal according to the link information of the second Mail Contents from privacy enhanced mail server
Part content and the 3rd key, wherein, the 3rd key is that the second key carries out turning the key after encryption.
Specifically, the 3rd above-mentioned key can be that the second key carries out turning the key after encryption, and first key is turned to add
It is close for only related to receiving terminal key.
Step S116, receiving terminal is decrypted to the 3rd key, obtains first key.
Step S118, receiving terminal is decrypted using first key to the second Mail Contents, obtains the first Mail Contents.
In a kind of optional scheme, receiving terminal B receives Email C from mail server S2Afterwards, if it find that electric
Sub- mail C2Privacy enhanced mail, then can be according to Email C2In link, from privacy enhanced mail server ES obtain the second mail
Content C1With the 3rd key K2, receiving terminal B receiving the 3rd key K2Afterwards, can be to the 3rd key K2It is decrypted, obtains
First key K, receiving terminal B can decrypt the second Mail Contents C using first key K1, obtain the originally transmitted postals of transmitting terminal A
Part content C.
By such scheme, receiving terminal can obtain Email from mail server, according to the chain of the second Mail Contents
Information is connect, from privacy enhanced mail server the second Mail Contents and the 3rd key are obtained, the 3rd key is decrypted, obtain first
Second Mail Contents are decrypted by key using first key, obtain the first Mail Contents, so as to realize the peace of Email
Full transmission.It is easily noted that, because the 3rd key is that the second key turns the key after encryption, so as to realize in Email
The safety of appearance is rested in reception end subscriber oneself hand, and all other men cannot be decrypted in mail including privacy enhanced mail server
Hold.
Alternatively, in the above embodiment of the present invention, in step S102, transmitting terminal obtains first from privacy enhanced mail server
Key, or step S114, receiving terminal obtains the second mail according to the link information of the second Mail Contents from privacy enhanced mail server
Before content and the 3rd key, said method also includes:
Step S100, transmitting terminal uses first user name and the first password logon privacy enhanced mail server;Or
Step S110, receiving terminal uses second user name and the second password logon privacy enhanced mail server.
Specifically, above-mentioned first user name can be the box name of transmitting terminal, and the first above-mentioned password can be sent out
The independent password of sending end input, above-mentioned second user name can be the box name of receiving terminal, and the first above-mentioned password can
Be receiving terminal input independent password.
In a kind of optional scheme, before transmitting terminal A obtains first key K from privacy enhanced mail server ES, send
End A needs to log in privacy enhanced mail server ES, and transmitting terminal A can send first user name and the first password PA2To privacy enhanced mail
Server ES is logged in.
In another kind of optional scheme, the second Mail Contents C is obtained from privacy enhanced mail server ES in receiving terminal B1With
3rd key K2Before, receiving terminal B needs to log in privacy enhanced mail server ES, and receiving terminal B can send second user name and the
Two password PB2Logged in privacy enhanced mail server ES.
Alternatively, in the above embodiment of the present invention, in transmitting terminal or receiving terminal privacy enhanced mail server is first logged into
In the case of, said method also includes:
What step S122, the first registration request that privacy enhanced mail server receiving end/sending end sends, or receiving terminal sent
Second registration request, wherein, the first registration request includes:First user name and the 3rd password, the second registration request includes:Second
User name and the 4th password.
Specifically, the 3rd above-mentioned password can be send end subscriber mailbox entry password, the 4th above-mentioned password
It can be the entry password of the mailbox for receiving end subscriber.
Step S124, privacy enhanced mail server is set up with mail server and is connected, and to the first registration request or the second note
Volume request is verified.
Step S126, if the first registration request or the second registration request are proved to be successful, privacy enhanced mail server sends
Information to transmitting terminal or receiving terminal, wherein, information be used for point out the password of user input first or the second password.
Step S128, privacy enhanced mail server receiving end/sending end send the first password or receiving terminal send second mouthful
Order.
In a kind of optional scheme, if needed without registering on privacy enhanced mail server ES before transmitting terminal A
To be registered on privacy enhanced mail server ES, registered user name can be the first user name of transmitting terminal A, and log-in password can
Being the 3rd password PA of transmitting terminal A1, privacy enhanced mail server ES can connect the mail server S at mailbox place to be carried out
Checking, is verified, and proves that transmitting terminal A is the validated user of the mailbox, while privacy enhanced mail server ES can require that A is defeated
Enter the first password PA independent on a privacy enhanced mail server ES2, first password PA2Can be used for privacy enhanced mail server
Belong to the key of all privacy enhanced mails of transmitting terminal A on ES.
In another kind of optional scheme, if no on privacy enhanced mail server ES before receiving terminal B registered,
Needs are registered on privacy enhanced mail server ES, and registered user name can be the second user name of receiving terminal B, log-in password
Can be the 4th password PB of receiving terminal B1, privacy enhanced mail server ES can connect the mail server S that the mailbox is located and enter
Row checking, is verified, and proves that receiving terminal B is the validated user of the mailbox, while privacy enhanced mail server ES can require B
The second independent password PB on one privacy enhanced mail server ES of input2, second password PB2Can be used for privacy enhanced mail service
Belong to the key of all privacy enhanced mails of receiving terminal B on device ES.
Alternatively, in the above embodiment of the present invention, in step S110, receiving terminal uses second user name and the second password
After logging in privacy enhanced mail server, said method also includes:
Step S130, privacy enhanced mail server obtains the label information of key corresponding with second user name, wherein, label
Information at least includes:Turn to encrypt or do not turn encryption.
Specifically, each key for storing in privacy enhanced mail server ES has label, the key is recorded in label whether
Turned encryption.
Step S132, from key corresponding with the second user name, obtain label information is privacy enhanced mail server
The second key encrypted is not turned.
Step S134, privacy enhanced mail server is decrypted to the second key, obtains first key.
Step S136, privacy enhanced mail server is encrypted using the second password to first key, obtains the 3rd key.
Second key is replaced with the 3rd key by step S138, privacy enhanced mail server.
In a kind of optional scheme, receiving terminal B receive transmitting terminal A transmission Email C0 after, if with
It is front to register in privacy enhanced mail server ES, then can be input into second user name and the second password PB2Log in privacy enhanced mail service
Device ES, privacy enhanced mail server ES can search the key of all privacy enhanced mails of receiving terminal B, then read the mark of each key
Sign, it is the key for not turning to encrypt to obtain all labels, i.e., be not decrypted first by the key ESK of privacy enhanced mail server ES
Reuse the second password PB2The key being encrypted, namely the second key K1, it is possible to use the key of privacy enhanced mail server ES
ESK decrypts the second key K1After obtain first key K, reuse the second password PB2It is encrypted and obtains turning the key after encryption,
That is the 3rd key K2, while privacy enhanced mail server ES can use the 3rd key K2The second key K that covering finds1。
A kind of preferred embodiment of the invention is described in detail with reference to Fig. 2, as shown in Figure 2, there is provided a kind of
The transmission method of preferred Email, the method may include steps of:
Step S201, transmitting terminal sends the first registration request to privacy enhanced mail server.
Alternatively, the first registration request includes the first user name and the 3rd password of transmitting terminal.
Step S202, privacy enhanced mail server sends the first registration request and is verified to mail server.
Step S203, the first the result that privacy enhanced mail server receipt mail server is returned.
Step S204, in the case where being verified, the first password that privacy enhanced mail server receiving end/sending end sends.
Alternatively, if needed in privacy enhanced mail without registering on privacy enhanced mail server ES before transmitting terminal A
Registered on server ES, registered user name can be the first user name of transmitting terminal A, log-in password can be transmitting terminal A
The 3rd password PA1, privacy enhanced mail server ES can connect the mail server S that the mailbox is located and be verified that checking is logical
Cross, prove that transmitting terminal A is the validated user of the mailbox, while privacy enhanced mail server ES can require that A is input into an encryption postal
The first independent password PA on part server ES2, first password PA2Can be used on privacy enhanced mail server ES belonging to this
The key of all privacy enhanced mails of sending end A.
Step S205, transmitting terminal sends first user name and the first password to privacy enhanced mail server.
Alternatively, if registered on privacy enhanced mail server ES before transmitting terminal A, first user name can be input into
With the first password PA2Log in privacy enhanced mail server ES.
Step S206, transmitting terminal receives the first key that privacy enhanced mail server sends.
Alternatively, transmitting terminal A obtains first key K from privacy enhanced mail server ES first, and first key K is by privacy enhanced mail
Server ES received and generated after the request of transmitting terminal A, and privacy enhanced mail server ES can use that privacy enhanced mail server ES's is close
Key ESK is encrypted to first key K, obtains the second key K1In being stored in privacy enhanced mail server ES.
Step S207, transmitting terminal is encrypted using first key to the first Mail Contents, obtain the second Mail Contents and
Email.
Alternatively, Email is linked comprising the second Mail Contents.
Step S208, transmitting terminal sends the second Mail Contents to privacy enhanced mail server.
Step S209, transmitting terminal sends Email to mail server.
Alternatively, transmitting terminal A can be encrypted using first key K to Mail Contents C, obtain the second Mail Contents
C1, transmitting terminal A is by the second Mail Contents C1Privacy enhanced mail server ES is sent to, while will be comprising the second Mail Contents C1Link
Email C2It is sent to mail server S.
Step S210, receiving terminal receives Email from mail server.
Step S211, receiving terminal sends the second registration request to privacy enhanced mail server.
Alternatively, the second registration request includes the second user name and the 4th password of receiving terminal.
Step S212, privacy enhanced mail server sends the second registration request and is verified to mail server.
Step S213, the second the result that privacy enhanced mail server receipt mail server is returned.
Step S214, in the case where being verified, privacy enhanced mail server receives the second password that receiving terminal sends.
Alternatively, if needed in privacy enhanced mail without registering on privacy enhanced mail server ES before receiving terminal B
Registered on server ES, registered user name can be the second user name of receiving terminal B, log-in password can be receiving terminal B
The 4th password PB1, privacy enhanced mail server ES can connect the mail server S that the mailbox is located and be verified that checking is logical
Cross, prove that receiving terminal B is the validated user of the mailbox, while privacy enhanced mail server ES can require that B is input into an encryption postal
The second independent password PB on part server ES2, second password PB2Can be used for belonging to this on privacy enhanced mail server ES and connect
The key of all privacy enhanced mails of receiving end B.
Step S215, receiving terminal sends second user name and the second password to privacy enhanced mail server.
Alternatively, if registered on privacy enhanced mail server ES before receiving terminal B, second user name can be input into
With the second password PB2Log in privacy enhanced mail server ES.
Step S216, privacy enhanced mail server sends the 3rd key and the second Mail Contents to receiving terminal.
Alternatively, receiving terminal B receives Email C from mail server S2Afterwards, if it find that Email C2It is encryption
Mail, then can be according to Email C2In link, from privacy enhanced mail server ES obtain the second Mail Contents C1It is close with the 3rd
Key K2If, the 3rd key K2Do not turned encryption, i.e. privacy enhanced mail server ES storages for the second key K1, then using encryption
The key ESK of mail server ES decrypts the second key K1After obtain key K, reuse the second password PB2It is close that encryption obtains the 3rd
Key K2, while using the 3rd key K2Cover the second key K1。
Step S217, receiving terminal is decrypted to the 3rd key, obtains first key, and using first key to the second postal
Part content is decrypted, and obtains the first Mail Contents.
Alternatively, receiving terminal B is receiving the 3rd key K2Afterwards, can be to the 3rd key K2It is decrypted, obtains first
Key K, receiving terminal B can decrypt the second Mail Contents C using first key K1, obtain in the originally transmitted mails of transmitting terminal A
Hold C.
By above-mentioned steps S201 to step S217, there is provided a kind of not only easy realization but also the mail transfer side of safety
Method, it is only necessary to know the mailbox of other side, it is possible to send secure e-mail to other side, and want the security of certified mail to rest in
In mail user oneself hand, all other men cannot decrypt Mail Contents including privacy enhanced mail server, existing so as to solve
The transmission method for having the Email in technology needs the certificate for obtaining recipient, the inconvenient technology of mail transfer to ask
Topic.
Embodiment 2
According to embodiments of the present invention, there is provided a kind of embodiment of the method for the transmission method of Email, explanation is needed
It is can to perform in the such as computer system of one group of computer executable instructions the step of the flow process of accompanying drawing is illustrated,
And, although logical order is shown in flow charts, but in some cases, can be performed with the order being different from herein
Shown or described step.
Fig. 3 is the flow chart of the transmission method of another kind of Email according to embodiments of the present invention, as shown in figure 3, should
Method comprises the steps:
Step S302, receiving terminal obtains Email from mail server, wherein, Email includes:In second mail
The link information of appearance, the second Mail Contents are stored in privacy enhanced mail server.
Step S304, receiving terminal obtains the second postal according to the link information of the second Mail Contents from privacy enhanced mail server
Part content and the 3rd key.
Specifically, the 3rd above-mentioned key can turn first key to be encrypted as only related to receiving terminal key.
Step S306, receiving terminal is decrypted to the 3rd key, obtains first key.
Specifically, above-mentioned first key can be privacy enhanced mail server receive transmitting terminal transmission request it
Afterwards, the key for automatically generating, privacy enhanced mail server can generate identical key for each transmitting terminal, or sends out every time
Sending end sends request and generates a key, and the present invention is not especially limited to this.
Step S308, receiving terminal is decrypted using first key to the second Mail Contents, obtains the first Mail Contents.
Specifically, the first above-mentioned Mail Contents can be the Mail Contents that transmitting terminal sends to receiving terminal.
In a kind of optional scheme, receiving terminal B receives Email C from mail server S2Afterwards, if it find that electric
Sub- mail C2Privacy enhanced mail, then can be according to Email C2In link, from privacy enhanced mail server ES obtain the second mail
Content C1With the 3rd key K2, receiving terminal B receiving the 3rd key K2Afterwards, can be to the 3rd key K2It is decrypted, obtains
First key K, receiving terminal B can decrypt the second Mail Contents C using first key K1, obtain the originally transmitted postals of transmitting terminal A
Part content C.
By the above embodiment of the present invention, receiving terminal can obtain Email from mail server, according to the second mail
The link information of content, from privacy enhanced mail server the second Mail Contents and the 3rd key are obtained, and the 3rd key is decrypted,
First key is obtained, and the second Mail Contents are decrypted using first key, obtain the first Mail Contents, so as to realize electricity
The safe transmission of sub- mail.It is easily noted that, because transmitting terminal obtains key to Mail Contents from privacy enhanced mail server
It is encrypted, it is not necessary to obtain the digital certificate of receiving terminal, so as to realize only needing to the mailbox for knowing receiving terminal, it is possible to safety
Transmission Email, and receiving terminal from privacy enhanced mail server obtain Mail Contents, it is of the prior art so as to solve
The transmission method of Email needs the certificate for obtaining recipient, the inconvenient technical problem of mail transfer.
Alternatively, in the above embodiment of the present invention, in step S302, receiving terminal obtains Email from mail server
Before, said method also includes:
Step S312, transmitting terminal obtains first key from privacy enhanced mail server.
Step S314, transmitting terminal is encrypted using first key to the first Mail Contents, obtains the second Mail Contents.
Second Mail Contents are sent to privacy enhanced mail server by step S316, transmitting terminal, concurrently send Email to postal
Part server.
In a kind of optional scheme, before transmitting terminal A sends Email to receiving terminal B, transmitting terminal A can be first
Key request is sent to privacy enhanced mail server ES, privacy enhanced mail server ES is receiving the key request of transmitting terminal A transmissions
Afterwards, generate corresponding first key K and return to transmitting terminal A.Transmitting terminal A is to get first from privacy enhanced mail server ES close
After key K, it is possible to use first key K is encrypted to Mail Contents C, the Mail Contents after being encrypted, i.e. the second mail
Content C1.Transmitting terminal A is by the second Mail Contents C1Privacy enhanced mail server ES is sent to, while will be comprising the second Mail Contents C1
The Email C of link2It is sent to mail server S.
Alternatively, in the above embodiment of the present invention, privacy enhanced mail server can be encrypted to first key, obtain
Second key, and the second key is preserved, wherein, the 3rd key is that the second key carries out turning the key after encryption.
In a kind of optional scheme, privacy enhanced mail server ES can use the key ESK of privacy enhanced mail server ES
First key K to being sent to transmitting terminal A is encrypted, the key after being encrypted, i.e. the second key K1, and by the second key
K1In being stored in privacy enhanced mail server ES, so as in transmitting terminal by the second Mail Contents C1It is sent to privacy enhanced mail server ES
Afterwards, privacy enhanced mail server ES can simultaneously preserve the second key K1With the second Mail Contents C1。
By such scheme, because the 3rd key is that the second key turns the key after encryption, so as to realize in Email
The safety of appearance is rested in reception end subscriber oneself hand, and all other men cannot be decrypted in mail including privacy enhanced mail server
Hold.
Embodiment 3
According to embodiments of the present invention, there is provided a kind of device embodiment of the transmitting device of Email.
Fig. 4 is a kind of schematic diagram of the transmitting device of Email according to embodiments of the present invention, as shown in figure 4, the dress
Put including:
Acquisition module 41, for obtaining first key from privacy enhanced mail server.
Specifically, above-mentioned first key can be privacy enhanced mail server receive transmitting terminal transmission request it
Afterwards, the key for automatically generating, privacy enhanced mail server can generate identical key for each transmitting terminal, or sends out every time
Sending end sends request and generates a key, and the present invention is not especially limited to this.
Processing module 43, for being encrypted to the first Mail Contents using first key, obtains the second Mail Contents.
Specifically, the first above-mentioned Mail Contents can be the Mail Contents that transmitting terminal sends to receiving terminal.
Communication module 45, for the second Mail Contents to be sent into privacy enhanced mail server, concurrently send Email to postal
Part server, wherein, Email includes:The link information of the second Mail Contents.
Specifically, above-mentioned link information can be that the first Mail Contents and first key are deposited in privacy enhanced mail server
Address.
In a kind of optional scheme, before transmitting terminal A sends Email to receiving terminal B, transmitting terminal A can be first
Key request is sent to privacy enhanced mail server ES, privacy enhanced mail server ES is receiving the key request of transmitting terminal A transmissions
Afterwards, generate corresponding first key K and return to transmitting terminal A.Transmitting terminal A is to get first from privacy enhanced mail server ES close
After key K, it is possible to use first key K is encrypted to Mail Contents C, the Mail Contents after being encrypted, i.e. the second mail
Content C1.Transmitting terminal A is by the second Mail Contents C1Privacy enhanced mail server ES is sent to, while will be comprising the second Mail Contents C1
The Email C of link2It is sent to mail server S.
By the above embodiment of the present invention, acquisition module can obtain first key from privacy enhanced mail server, process mould
Block can be encrypted using first key to the first Mail Contents, obtain the second Mail Contents, and communication module can be by second
Mail Contents are sent to privacy enhanced mail server, Email are concurrently sent to mail server, so as to realize the peace of Email
Full transmission.It is easily noted that, Mail Contents is encrypted because transmitting terminal obtains key from privacy enhanced mail server, no
The digital certificate for obtaining receiving terminal is needed, so as to realize only needing to the mailbox for knowing receiving terminal, it is possible to the transmission electronics of safety
Mail, and receiving terminal obtains Mail Contents from privacy enhanced mail server, so as to solve Email of the prior art
Transmission method needs the certificate for obtaining recipient, the inconvenient technical problem of mail transfer.
Embodiment 4
According to embodiments of the present invention, there is provided a kind of device embodiment of the transmitting device of Email.
Fig. 5 is a kind of schematic diagram of the transmitting device of Email according to embodiments of the present invention, as shown in figure 5, the dress
Put including:
First acquisition module 51, for obtaining Email from mail server, wherein, Email includes:Second postal
The link information of part content, the second Mail Contents are stored in privacy enhanced mail server.
Second acquisition module 53, for according to the link information of the second Mail Contents, from privacy enhanced mail server the is obtained
Two Mail Contents and the 3rd key.
Specifically, the 3rd above-mentioned key can turn first key to be encrypted as only related to receiving terminal key.
First processing module 55, for being decrypted to the 3rd key, obtains first key.
Specifically, above-mentioned first key can be privacy enhanced mail server receive transmitting terminal transmission request it
Afterwards, the key for automatically generating, privacy enhanced mail server can generate identical key for each transmitting terminal, or sends out every time
Sending end sends request and generates a key, and the present invention is not especially limited to this.
Second processing module 57, for being decrypted to the second Mail Contents using first key, is obtained in the first mail
Hold.
Specifically, the first above-mentioned Mail Contents can be the Mail Contents that transmitting terminal sends to receiving terminal.
In a kind of optional scheme, receiving terminal B receives Email C from mail server S2Afterwards, if it find that electric
Sub- mail C2Privacy enhanced mail, then can be according to Email C2In link, from privacy enhanced mail server ES obtain the second mail
Content C1With the 3rd key K2, receiving terminal B receiving the 3rd key K2Afterwards, can be to the 3rd key K2It is decrypted, obtains
First key K, receiving terminal B can decrypt the second Mail Contents C using first key K1, obtain the originally transmitted postals of transmitting terminal A
Part content C.
By the above embodiment of the present invention, the first acquisition module can obtain Email from mail server, and second obtains
Delivery block can be close from privacy enhanced mail server the second Mail Contents of acquisition and the 3rd according to the link information of the second Mail Contents
Key, first processing module can be decrypted to the 3rd key, obtain first key, and Second processing module can be close using first
Key is decrypted to the second Mail Contents, obtains the first Mail Contents, so as to realize the safe transmission of Email.Easily note
To because transmitting terminal is encrypted from privacy enhanced mail server acquisition key to Mail Contents, it is not necessary to obtain receiving terminal
Digital certificate, so as to realize only needing to the mailbox for knowing receiving terminal, it is possible to the transmission Email of safety, and receiving terminal
Mail Contents are obtained from privacy enhanced mail server, so as to the transmission method for solving Email of the prior art needs to obtain
The certificate of recipient, the inconvenient technical problem of mail transfer.
Embodiment 5
According to embodiments of the present invention, there is provided a kind of system embodiment of the Transmission system of Email.
Fig. 6 is a kind of schematic diagram of the Transmission system of Email according to embodiments of the present invention, as shown in fig. 6, this is
System includes:
Privacy enhanced mail server 61, for sending first key.
Specifically, above-mentioned first key can be privacy enhanced mail server receive transmitting terminal transmission request it
Afterwards, the key for automatically generating, privacy enhanced mail server can generate identical key for each transmitting terminal, or sends out every time
Sending end sends request and generates a key, and the present invention is not especially limited to this.
Transmitting terminal 63, is connected with privacy enhanced mail server, for being encrypted to the first Mail Contents using first key,
Obtain the second Mail Contents.
Specifically, the first above-mentioned Mail Contents can be the Mail Contents that transmitting terminal sends to receiving terminal.
Privacy enhanced mail server 61 is additionally operable to the second Mail Contents of receiving end/sending end transmission.
Mail server 65, is connected with transmitting terminal, for the Email that receiving end/sending end sends, wherein, Email
Including:The link information of the second Mail Contents.
Specifically, above-mentioned link information can be that the first Mail Contents and first key are deposited in privacy enhanced mail server
Address.
In a kind of optional scheme, before transmitting terminal A sends Email to receiving terminal B, transmitting terminal A can be first
Key request is sent to privacy enhanced mail server ES, privacy enhanced mail server ES is receiving the key request of transmitting terminal A transmissions
Afterwards, generate corresponding first key K and return to transmitting terminal A.Transmitting terminal A is to get first from privacy enhanced mail server ES close
After key K, it is possible to use first key K is encrypted to Mail Contents C, the Mail Contents after being encrypted, i.e. the second mail
Content C1.Transmitting terminal A is by the second Mail Contents C1Privacy enhanced mail server ES is sent to, while will be comprising the second Mail Contents C1
The Email C of link2It is sent to mail server S.
By the above embodiment of the present invention, transmitting terminal can obtain first key from privacy enhanced mail server, utilize first
Key is encrypted to the first Mail Contents, obtains the second Mail Contents, and the second Mail Contents are sent into privacy enhanced mail service
Device, concurrently send Email to mail server, so as to realize the safe transmission of Email.It is easily noted that, due to
Transmitting terminal obtains key and Mail Contents is encrypted from privacy enhanced mail server, it is not necessary to obtain the digital certificate of receiving terminal,
So as to realize only needing to the mailbox for knowing receiving terminal, it is possible to the transmission Email of safety, and receiving terminal is from privacy enhanced mail
Server obtains Mail Contents, so as to the transmission method for solving Email of the prior art needs to obtain the card of recipient
Book, the inconvenient technical problem of mail transfer.
Alternatively, in the above embodiment of the present invention, privacy enhanced mail server is additionally operable to be encrypted first key, obtains
To the second key, and preserve the second key.
In a kind of optional scheme, privacy enhanced mail server ES can use the key ESK of privacy enhanced mail server ES
First key K to being sent to transmitting terminal A is encrypted, the key after being encrypted, i.e. the second key K1, and by the second key
K1In being stored in privacy enhanced mail server ES, so as in transmitting terminal by the second Mail Contents C1It is sent to privacy enhanced mail server ES
Afterwards, privacy enhanced mail server ES can simultaneously preserve the second key K1With the second Mail Contents C1。
Alternatively, in the above embodiment of the present invention, as shown in fig. 7, said system also includes:
Receiving terminal 71, is connected with mail server and privacy enhanced mail server, for obtaining Email, according to the second postal
The link information of part content, obtains the second Mail Contents and the 3rd key, and the 3rd key is decrypted, and obtains first key,
And the second Mail Contents are decrypted using first key, the first Mail Contents are obtained, wherein, the 3rd key is the second key
Carry out turning the key after encryption.
Specifically, the 3rd above-mentioned key can be that the second key carries out turning the key after encryption, and first key is turned to add
It is close for only related to receiving terminal key.
In a kind of optional scheme, receiving terminal B receives Email C from mail server S2Afterwards, if it find that electric
Sub- mail C2Privacy enhanced mail, then can be according to Email C2In link, from privacy enhanced mail server ES obtain the second mail
Content C1With the 3rd key K2, receiving terminal B receiving the 3rd key K2Afterwards, can be to the 3rd key K2It is decrypted, obtains
First key K, receiving terminal B can decrypt the second Mail Contents C using first key K1, obtain the originally transmitted postals of transmitting terminal A
Part content C.
By such scheme, receiving terminal can obtain Email from mail server, according to the chain of the second Mail Contents
Information is connect, from privacy enhanced mail server the second Mail Contents and the 3rd key are obtained, the 3rd key is decrypted, obtain first
Second Mail Contents are decrypted by key using first key, obtain the first Mail Contents, so as to realize the peace of Email
Full transmission.It is easily noted that, because the 3rd key is that the second key turns the key after encryption, so as to realize in Email
The safety of appearance is rested in reception end subscriber oneself hand, and all other men cannot be decrypted in mail including privacy enhanced mail server
Hold.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
In the above embodiment of the present invention, the description to each embodiment all emphasizes particularly on different fields, and does not have in certain embodiment
The part of detailed description, may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents, can pass through other
Mode is realized.Wherein, device embodiment described above is only schematic, such as the division of described unit, Ke Yiwei
A kind of division of logic function, can there is an other dividing mode when actually realizing, such as multiple units or component can with reference to or
Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module
Connect, can be electrical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On unit.Some or all of unit therein can according to the actual needs be selected to realize the purpose of this embodiment scheme.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list
Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used
When, during a computer read/write memory medium can be stored in.Based on such understanding, technical scheme is substantially
The part for contributing to prior art in other words or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or network equipment etc.) perform the whole of each embodiment methods described of the invention or
Part steps.And aforesaid storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. are various can be with store program codes
Medium.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (14)
1. a kind of transmission method of Email, it is characterised in that include:
Transmitting terminal obtains first key from privacy enhanced mail server;
The transmitting terminal is encrypted using the first key to the first Mail Contents, obtains the second Mail Contents;
Second Mail Contents are sent to the privacy enhanced mail server by the transmitting terminal, concurrently send Email to mail
Server, wherein, the Email includes:The link information of second Mail Contents.
2. method according to claim 1, it is characterised in that the privacy enhanced mail server is carried out to the first key
Encryption, obtains the second key, and preserves second key.
3. method according to claim 2, it is characterised in that send Email to mail server in the transmitting terminal
Afterwards, methods described also includes:
Receiving terminal obtains the Email from the mail server;
The receiving terminal obtains described second according to the link information of second Mail Contents from the privacy enhanced mail server
Mail Contents and the 3rd key, wherein, the 3rd key is that second key carries out turning the key after encryption;
The receiving terminal is decrypted to the 3rd key, obtains the first key;
The receiving terminal is decrypted using the first key to second Mail Contents, is obtained in first mail
Hold.
4. method according to claim 3, it is characterised in that obtain first from privacy enhanced mail server in transmitting terminal close
Key, or the receiving terminal is according to the link information of second Mail Contents, from the privacy enhanced mail server described the is obtained
Before two Mail Contents and the 3rd key, methods described also includes:
The transmitting terminal uses first user name and privacy enhanced mail server described in the first password logon;Or
The receiving terminal uses second user name and privacy enhanced mail server described in the second password logon.
5. method according to claim 4, it is characterised in that first log into the transmitting terminal or the receiving terminal described
In the case of privacy enhanced mail server, methods described also includes:
The privacy enhanced mail server receives the first registration request that the transmitting terminal sends, or the receiving terminal send the
Two registration requests, wherein, first registration request includes:The first user name and the 3rd password, second registration please
Ask including:The second user name and the 4th password;
The privacy enhanced mail server is set up with the mail server and is connected, and to first registration request or described second
Registration request is verified;
If first registration request or second registration request are proved to be successful, the privacy enhanced mail server sends and carries
Show information to the transmitting terminal or the receiving terminal, wherein, the information is used to point out the first password described in user input
Or second password;
It is described that the privacy enhanced mail server receives first password that the transmitting terminal sends or the receiving terminal sends
Second password.
6. method according to claim 4, it is characterised in that use second user name and the second password in the receiving terminal
After logging in the privacy enhanced mail server, methods described also includes:
The privacy enhanced mail server obtains the label information of key corresponding with the second user name, wherein, the label
Information at least includes:Turn to encrypt or do not turn encryption;
The privacy enhanced mail server obtains label information and does not turn to add for described from key corresponding with the second user name
The second close key;
The privacy enhanced mail server is decrypted to second key, obtains the first key;
The privacy enhanced mail server is encrypted using second password to the first key, obtains the described 3rd close
Key;
Second key described in the privacy enhanced mail server replaces with the 3rd key.
7. a kind of transmission method of Email, it is characterised in that include:
Receiving terminal obtains Email from mail server, wherein, the Email includes:The link letter of the second Mail Contents
Breath, second Mail Contents are stored in privacy enhanced mail server;
The receiving terminal obtains described second according to the link information of second Mail Contents from the privacy enhanced mail server
Mail Contents and the 3rd key;
The receiving terminal is decrypted to the 3rd key, obtains first key;
The receiving terminal is decrypted using the first key to second Mail Contents, obtains the first Mail Contents.
8. method according to claim 7, it is characterised in that receiving terminal from mail server obtain Email it
Before, methods described also includes:
Transmitting terminal obtains the first key from the privacy enhanced mail server;
The transmitting terminal is encrypted using the first key to first Mail Contents, is obtained in second mail
Hold;
Second Mail Contents are sent to the privacy enhanced mail server by the transmitting terminal, and send the Email extremely
The mail server.
9. method according to claim 8, it is characterised in that the privacy enhanced mail server is carried out to the first key
Encryption, obtains the second key, and preserves second key, wherein, the 3rd key carries out turning to add for second key
Key after close.
10. a kind of transmitting device of Email, it is characterised in that include:
Acquisition module, for obtaining first key from privacy enhanced mail server;
Processing module, for being encrypted to the first Mail Contents using the first key, obtains the second Mail Contents;
Communication module, for second Mail Contents to be sent into the privacy enhanced mail server, concurrently send Email extremely
Mail server, wherein, the Email includes:The link information of second Mail Contents.
11. a kind of transmitting devices of Email, it is characterised in that include:
First acquisition module, for obtaining Email from mail server, wherein, the Email includes:
The link information of the second Mail Contents, second Mail Contents are stored in privacy enhanced mail server;
Second acquisition module, for according to the link information of second Mail Contents, obtaining from the privacy enhanced mail server
Second Mail Contents and the 3rd key;
First processing module, for being decrypted to the 3rd key, obtains first key;
Second processing module, for being decrypted to second Mail Contents using the first key, obtains the first mail
Content.
12. a kind of Transmission systems of Email, it is characterised in that include:
Privacy enhanced mail server, for sending first key;
Transmitting terminal, is connected with the privacy enhanced mail server, for carrying out adding to the first Mail Contents using the first key
It is close, obtain the second Mail Contents;
The privacy enhanced mail server is additionally operable to receive second Mail Contents that the transmitting terminal sends;
Mail server, is connected with the transmitting terminal, for receiving the Email that the transmitting terminal sends, wherein, the electricity
Sub- mail includes:The link information of second Mail Contents.
13. systems according to claim 12, it is characterised in that the privacy enhanced mail server is also with close to described first
Key is encrypted, and obtains the second key, and preserves second key.
14. systems according to claim 13, it is characterised in that the system also includes:
Receiving terminal, is connected with the mail server and the privacy enhanced mail server, for obtaining the Email, according to
The link information of second Mail Contents, obtains second Mail Contents and the 3rd key, and the 3rd key is carried out
Decryption, obtains the first key, and second Mail Contents are decrypted using the first key, obtains described the
One Mail Contents, wherein, the 3rd key is that second key carries out turning the key after encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610843015.3A CN106656739A (en) | 2016-09-22 | 2016-09-22 | E-mail transmission method, E-mail transmission device and E-mail transmission system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610843015.3A CN106656739A (en) | 2016-09-22 | 2016-09-22 | E-mail transmission method, E-mail transmission device and E-mail transmission system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106656739A true CN106656739A (en) | 2017-05-10 |
Family
ID=58852164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610843015.3A Pending CN106656739A (en) | 2016-09-22 | 2016-09-22 | E-mail transmission method, E-mail transmission device and E-mail transmission system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106656739A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10659436B2 (en) | 2017-06-22 | 2020-05-19 | Huizhou University | Method and system for data processing |
CN113923053A (en) * | 2021-12-09 | 2022-01-11 | 华中科技大学 | Cross-equipment safety synchronization method and system for encrypted mail |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070005713A1 (en) * | 2005-07-01 | 2007-01-04 | Levasseur Thierry | Secure electronic mail system |
CN101040265A (en) * | 2004-10-19 | 2007-09-19 | 晶像股份有限公司 | Method and apparatus for content protection in a personal digital network environment |
CN101478555A (en) * | 2009-02-11 | 2009-07-08 | 腾讯科技(深圳)有限公司 | Method, system and equipment for enhancing security of e-mail |
CN102821085A (en) * | 2011-11-23 | 2012-12-12 | 腾讯科技(深圳)有限公司 | Third party authorization login method, open platform and system |
CN103973713A (en) * | 2014-05-29 | 2014-08-06 | 华翔腾数码科技有限公司 | Transfer method, extraction method and processing system for electronic mail information |
CN104954378A (en) * | 2015-06-19 | 2015-09-30 | 收付宝科技有限公司 | Asymmetric message encryption method and system |
-
2016
- 2016-09-22 CN CN201610843015.3A patent/CN106656739A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101040265A (en) * | 2004-10-19 | 2007-09-19 | 晶像股份有限公司 | Method and apparatus for content protection in a personal digital network environment |
US20070005713A1 (en) * | 2005-07-01 | 2007-01-04 | Levasseur Thierry | Secure electronic mail system |
CN101478555A (en) * | 2009-02-11 | 2009-07-08 | 腾讯科技(深圳)有限公司 | Method, system and equipment for enhancing security of e-mail |
CN102821085A (en) * | 2011-11-23 | 2012-12-12 | 腾讯科技(深圳)有限公司 | Third party authorization login method, open platform and system |
CN103973713A (en) * | 2014-05-29 | 2014-08-06 | 华翔腾数码科技有限公司 | Transfer method, extraction method and processing system for electronic mail information |
CN104954378A (en) * | 2015-06-19 | 2015-09-30 | 收付宝科技有限公司 | Asymmetric message encryption method and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10659436B2 (en) | 2017-06-22 | 2020-05-19 | Huizhou University | Method and system for data processing |
CN113923053A (en) * | 2021-12-09 | 2022-01-11 | 华中科技大学 | Cross-equipment safety synchronization method and system for encrypted mail |
CN113923053B (en) * | 2021-12-09 | 2022-02-08 | 华中科技大学 | A cross-device secure synchronization method and system for encrypted mail |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9721119B2 (en) | System and method for secure use of messaging systems | |
US8266421B2 (en) | Private electronic information exchange | |
CN113508563A (en) | Block chain based secure email system | |
CN106453268B (en) | A method of realizing express delivery secret protection in logistics progress | |
US8645478B2 (en) | System and method for monitoring social engineering in a computer network environment | |
US20020138759A1 (en) | System and method for secure delivery of a parcel or document | |
US20020016910A1 (en) | Method for secure distribution of documents over electronic networks | |
US20050039017A1 (en) | Method and system for authenticating a message sender using domain keys | |
CN103929411B (en) | Information displaying method, terminal, safety server and system | |
CN206212040U (en) | A kind of real-name authentication system for express delivery industry | |
US20080086532A1 (en) | Method for the Verification of Electronic Message Delivery and for the Collection of Data Related to Electronic Messages Sent with False Origination Addresses | |
CN101715638A (en) | Secure electronic messaging system requiring key retrieval for deriving decryption key | |
CN106022673A (en) | Logistics information security encryption method based on identity authentication and system based on identity authentication | |
WO2009087128A1 (en) | Signature method and device | |
CN106127441A (en) | A kind of network system preventing personal information from leaking and implementation method | |
CN107122681A (en) | A kind of method of file encryption-decryption, relevant apparatus and system | |
CN105227570A (en) | A kind of safe e-mail system of integrated campaign | |
CN108199838A (en) | A kind of data guard method and device | |
CN114172694A (en) | Email encryption and decryption method, system and storage medium | |
CN110032875A (en) | A kind of method and apparatus for protecting user privacy information | |
CN109711196A (en) | Improve the information processing method of user's pickup safety | |
CN106656739A (en) | E-mail transmission method, E-mail transmission device and E-mail transmission system | |
CN108599952A (en) | A kind of communication means based on block chain | |
CN103188271A (en) | Secure mail client local data storage and identification methods and devices | |
CN110493212A (en) | A kind of general purpose mail End to End Encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |