CN105743884A - Mail hiding method and mail hiding system - Google Patents

Mail hiding method and mail hiding system Download PDF

Info

Publication number
CN105743884A
CN105743884A CN201610044252.3A CN201610044252A CN105743884A CN 105743884 A CN105743884 A CN 105743884A CN 201610044252 A CN201610044252 A CN 201610044252A CN 105743884 A CN105743884 A CN 105743884A
Authority
CN
China
Prior art keywords
mail
ciphertext
adnexa
labelling
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610044252.3A
Other languages
Chinese (zh)
Inventor
王胜男
张永强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG CERTIFICATE AUTHORITY CENTER CO Ltd
Guangdong Authentication Technology Co Ltd
Original Assignee
GUANGDONG CERTIFICATE AUTHORITY CENTER CO Ltd
Guangdong Authentication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG CERTIFICATE AUTHORITY CENTER CO Ltd, Guangdong Authentication Technology Co Ltd filed Critical GUANGDONG CERTIFICATE AUTHORITY CENTER CO Ltd
Priority to CN201610044252.3A priority Critical patent/CN105743884A/en
Publication of CN105743884A publication Critical patent/CN105743884A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/08Annexed information, e.g. attachments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a mail hiding method and a mail hiding system. The method comprises the steps of encrypting an original mail at a mail sending client to generate a mail ciphertext, hiding the mail ciphertext in the default attachment of a new mail, setting the mail body content of the new mail and the content of the default attachment according to a default sent mail template, and sending the new mail. According to the invention, an encrypted mail is hidden in the attachment of a new mail and sent as the attachment of an ordinary mail, so the encrypted mail is not treated by a mail server or a client as a junk mail; and when the encrypted mail cannot be decrypted, users can see the mail content set according to the default sent mail template. The user experience is enhanced. The mail hiding method and the mail hiding system are suitable for application.

Description

Mail hidden method and system
Technical field
The present invention relates to Computer Data Communication technical field, particularly relate to a kind of mail hidden method and system.
Background technology
Along with popularizing of the Internet, Email has become as one of means of communication the most frequently used in modern's live and work.According to incompletely statistics, the Email that on the Internet, every day transmits reaches billions of part.Crime case for Email gets more and more, and user, when enjoying Email and fast servicing easily, still suffers from mail and divulges a secret the consequence brought, and some mail consequence of divulging a secret is very serious, is catastrophic.In order to improve the safety of e-mail messages, effective method is by email encryption at present, can only appointed people browse by adding secret emissary's mail, it is ensured that the safety of mail.
Existing as utilized symmetric encipherment algorithm privacy enhanced mail, utilize conventional, asymmetrical key code system (PKI/CA) privacy enhanced mail, utilize chain type encryption system privacy enhanced mail, utilize the email encryption modes such as ID-ased cryptography technology secrecy mail, it is all in the way of ciphertext, transmit mail, readability is not possessed, it is possible to spam can be used as by mail server or client and process due to privacy enhanced mail;If user have received privacy enhanced mail, but does not obtain decruption key temporarily, can only see mess code, it is impossible to judge Mail Contents.
Summary of the invention
Based on above-mentioned situation, it is necessary to being used as spam for existing privacy enhanced mail by mail server or client and process, user reads the problem that cannot judge Mail Contents when not deciphering mail, it is provided that a kind of mail hidden method and system.
To achieve these goals, the embodiment of technical solution of the present invention is:
A kind of mail hidden method, comprises the following steps:
Encrypt former mail sending Mail Clients, generate mail ciphertext;
By described mail ciphertext hiding in the default adnexa of new mail;
The message body content of described new mail and described default attachment content are set according to default transmission email template;
Send described new mail.
A kind of mail hidden method, comprises the following steps:
Receive and open and send the mail that Mail Clients sends;
Reading the mail ciphertext being hidden in described Email attachment, described mail ciphertext is the mail ciphertext generated after described transmission Mail Clients encrypts former mail;
Whether inquiry has the decruption key corresponding with described mail ciphertext;
When Query Result is for being, mail ciphertext according to described decryption key decryption;
When Query Result is no, display is according to presetting the message body content and described Email attachment content that send the described mail that email template is arranged.
A kind of mail hides system, including:
Encrypting module, for sending the Mail Clients former mail of encryption, generating mail ciphertext;
Hide module, be used for described mail ciphertext hiding in the default adnexa of new mail;
Module is set, for arranging the message body content of described new mail and described default attachment content according to the default email template that sends;
Sending module, is used for sending described new mail.
A kind of mail hides system, including:
Receiver module, sends, for receiving and opening, the mail that Mail Clients sends;
Read module, for reading the mail ciphertext being hidden in described Email attachment, described mail ciphertext is the mail ciphertext generated after described transmission Mail Clients encrypts former mail;
Enquiry module, for inquiring about whether there be the decruption key corresponding with described mail ciphertext;
Deciphering module, is used for when Query Result is for being, mail ciphertext according to described decryption key decryption;
Display module, for when Query Result is no, display is according to presetting the message body content and described Email attachment content that send the described mail that email template is arranged.
Compared with prior art, the invention have the benefit that mail hidden method of the present invention and system, being hidden into by privacy enhanced mail in new mail adnexa, the adnexa as surface mail sends, it is to avoid privacy enhanced mail is used as spam by mail server or client and is processed;When the decruption key that inquiry is not corresponding with mail ciphertext, user, it can be seen that the Mail Contents that arranges according to default transmission email template, promotes Consumer's Experience, is suitable for application.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of mail hidden method the first embodiment of the present invention;
Fig. 2 is the schematic flow sheet of mail hidden method the second embodiment of the present invention;
Fig. 3 is for based on mail hidden method flow chart in Fig. 1, one concrete example of method shown in 2;
Fig. 4 is the PDF document structural representation of an embodiment Plays;
Fig. 5 is the PDF document structural representation after hiding mail ciphertext in an embodiment and adding signature;
Fig. 6 is the structural representation that mail of the present invention hides system the first embodiment;
Fig. 7 is the structural representation that mail of the present invention hides system the second embodiment.
Detailed description of the invention
For making the purpose of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is described in further detail.Should be appreciated that detailed description of the invention described herein is only in order to explain the present invention, does not limit protection scope of the present invention.
Mail hidden method in one embodiment, as it is shown in figure 1, comprise the following steps:
Step S101: encrypt former mail sending Mail Clients, generate mail ciphertext;
Step S102: by described mail ciphertext hiding in the default adnexa of new mail;
Step S103: the message body content of described new mail and described default attachment content are set according to default transmission email template;Being " this is an envelope privacy enhanced mail " as arranged the message body content of new mail, default attachment content can be consistent with message body content;
Step S104: send described new mail.
It is evidenced from the above discussion that, mail hidden method of the present invention, privacy enhanced mail is hidden in new mail adnexa, the adnexa as surface mail sends, it is to avoid privacy enhanced mail is used as spam by mail server or client and is processed.
Additionally, in a concrete example, after described basis is preset and sent message body content and the described default attachment content that email template arranges described new mail, before sending described new mail, further comprise the steps of:
Described default adnexa is signed.As the name label of sender in Email attachment, make addressee pass through this signature verification mail, in case mail is tampered in transmission process.
Additionally, in a concrete example, before described generation mail ciphertext, further comprise the steps of:
Add text labelling to the message body of described former mail, and/or add adnexa labelling to the adnexa of described former mail.
When former mail only has message body, before the mail ciphertext generated, add text labelling at former mail;When former mail only has adnexa, before the mail ciphertext generated, add adnexa labelling at former mail;When having message body and adnexa when former mail, add text labelling at message body, add adnexa labelling at adnexa, then carry out email encryption;Facilitate subsequent treatment, meet multiple application needs.
Mail hidden method in one embodiment, as in figure 2 it is shown, comprise the following steps:
Step S201: receive and open the mail sending Mail Clients transmission;
Step S202: read the mail ciphertext being hidden in described Email attachment, described mail ciphertext is the mail ciphertext generated after described transmission Mail Clients encrypts former mail;
Step S203: whether inquiry has the decruption key corresponding with described mail ciphertext;
Step S204: when Query Result is for being, mail ciphertext according to described decryption key decryption;
Step S205: when Query Result is no, display is according to presetting the message body content and described Email attachment content that send the described mail that email template is arranged.As shown according to presetting the message body content " this is an envelope privacy enhanced mail " sending the new mail that email template is arranged, attachment content " this is an envelope privacy enhanced mail ", it thus is avoided that user reads and Mail Contents when not deciphering mail, cannot be judged, promote Consumer's Experience.
It is evidenced from the above discussion that, mail hidden method of the present invention, when the decruption key that inquiry is not corresponding with mail ciphertext, user, it can be seen that the Mail Contents that arranges according to default transmission email template, promotes Consumer's Experience.
Additionally, in a concrete example, after described reception opening the mail sending Mail Clients transmission, described reading further comprises the steps of: before being hidden in the mail ciphertext in described Email attachment
Inquire about whether described Email attachment has signature;
When Query Result is for being, verify described signature.
Subsequent treatment is just carried out after checking attachment signatures is correct, if incorrect, stop processing, it is to avoid the mail that deciphering is tampered, in mail sends, increase one layer of safety assurance.
Additionally, in a concrete example, after mail ciphertext according to described decryption key decryption, further comprise the steps of:
Whether have text labelling and/or adnexa labelling, described text labelling to be added on the message body of described former mail in the mail after inquiry deciphering, described adnexa labelling is added on the adnexa of described former mail;
When Query Result is for being, according to described text labelling and/or adnexa labelling, the mail after deciphering is reverted to described former mail.
When the mail after deciphering only has text labelling, illustrate that former mail only has message body, in conjunction with described text labelling, the mail after deciphering is reverted to described former mail, obtain the message body of former mail;When the mail after deciphering only has adnexa labelling, illustrate that former mail only has adnexa, in conjunction with described adnexa labelling, the mail after deciphering is reverted to described former mail, obtain the adnexa of former mail;When the mail after deciphering has text labelling and adnexa labelling, illustrate that former mail has message body and adnexa, in conjunction with described text labelling and adnexa labelling, the mail after deciphering is reverted to described former mail, obtain message body and the adnexa of former mail, facilitate user's reading mail, be suitable for application.
In order to be more fully understood that said method, the application example of a mail hidden method of the present invention detailed below.
As it is shown on figure 3, this application example may comprise steps of:
Step S301: adding text labelling sending Mail Clients to the message body of former mail, add adnexa labelling to the adnexa of former mail, former mail includes message body and adnexa;
Step S302: the former mail of text labelling and adnexa labelling is added in encryption, generates mail ciphertext;
Step S303: by mail ciphertext hiding in the PDF adnexa of new mail;
Step S304: above-mentioned PDF adnexa is signed;PDF adnexa can be carried out standard PDF signature;
The PDF document structure of standard is as shown in Figure 4, PDF document structure after hiding mail ciphertext and adding signature is as shown in Figure 5, at PDF document catalogue encrypted E-mail node added below, it is used for storing privacy enhanced mail content, and adds signatures to below the PDF page;
Step S305: the message body content of new mail and above-mentioned PDF attachment content are set according to default transmission email template;Being " this is an envelope privacy enhanced mail " as arranged the message body content of new mail, PDF attachment content is consistent with message body content;
Step S306: send above-mentioned new mail by mail server;
Step S307: receive and open above-mentioned new mail receiving Mail Clients;
Step S308: verify the signature of above-mentioned PDF adnexa;If standard PDF signs, directly can be verified by the instrument of adobereader etc, convenient, accurate;
Step S309: after checking signature is correct, read above-mentioned mail ciphertext from above-mentioned PDF adnexa;
Step S310: whether inquiry has the decruption key corresponding with above-mentioned mail ciphertext;
Whether step S311: when Query Result is for being, according to the above-mentioned mail ciphertext of above-mentioned decryption key decryption, have above-mentioned text labelling and adnexa labelling in the mail after inquiry deciphering;When Query Result is for being, according to above-mentioned text labelling and adnexa labelling, the mail after deciphering is reverted to above-mentioned former mail, obtains message body and the adnexa of former mail;
Step S312: when Query Result is no, shows that above-mentioned basis presets the message body content and above-mentioned PDF attachment content sending the new mail that email template is arranged.As according to presetting the message body content " this is an envelope privacy enhanced mail " sending the new mail that email template is arranged, PDF attachment content is consistent with message body content.
This application example is by mail ciphertext hiding to PDF document, and PDF document sends as the adnexa of surface mail, it is to avoid privacy enhanced mail is used as spam by mail server or client and is processed;The content of new mail is set, it is to avoid user reads and cannot judge when not deciphering mail to promote Consumer's Experience by Mail Contents;PDF document is signed, and recipient by verifying that signature effectiveness judges whether mail is tampered, can increase one layer of safety assurance in mail sends.
In one embodiment, mail hides system, as shown in Figure 6, and including:
Encrypting module 601, for sending the Mail Clients former mail of encryption, generating mail ciphertext;
Hide module 602, be used for described mail ciphertext hiding in the default adnexa of new mail;
Module 603 is set, for arranging the message body content of described new mail and described default attachment content according to the default email template that sends;Being " this is an envelope privacy enhanced mail " as arranged the message body content of new mail, default attachment content can be consistent with message body content;
Sending module 604, is used for sending described new mail.
As shown in Figure 6, in a concrete example, described system also includes signature blocks 605, for described message body content and the described default attachment content that module 603 arranges described new mail according to default transmission email template is set after, described default adnexa is signed;As the name label of sender in Email attachment, make addressee pass through this signature verification mail, in case mail is tampered in transmission process;
Described sending module 604 sends the new mail after signing.
As shown in Figure 6, in a concrete example, described system also includes adding module 606, for before described encrypting module 601 generates mail ciphertext, add text labelling to the message body of described former mail, and/or add adnexa labelling to the adnexa of described former mail.
When former mail only has message body, before the mail ciphertext generated, add text labelling at former mail;When former mail only has adnexa, before the mail ciphertext generated, add adnexa labelling at former mail;When having message body and adnexa when former mail, add text labelling at message body, add adnexa labelling at adnexa, then carry out email encryption;Facilitate subsequent treatment, meet multiple application needs.
Based on the system of the present embodiment shown in Fig. 6, a concrete work process can be discussed further below:
First send Mail Clients interpolation module 606 to the message body interpolation text labelling of described former mail, and/or add adnexa labelling to the adnexa of described former mail;The former mail of text labelling and/or adnexa labelling is added in encrypting module 601 encryption, generates mail ciphertext;Hide module 602 by above-mentioned mail ciphertext hiding in the default adnexa of new mail;Module 603 is set the message body content of described new mail and described default attachment content are set according to default transmission email template;Described default adnexa is signed by signature blocks 605;Sending module 604 sends the new mail after signing.
It is evidenced from the above discussion that, mail of the present invention hides system, is hidden into by privacy enhanced mail in new mail adnexa, and the adnexa as surface mail sends, it is to avoid privacy enhanced mail is used as spam by mail server or client and is processed;New mail adnexa is signed, and recipient by verifying that signature effectiveness judges whether mail is tampered, can increase one layer of safety assurance in mail sends.
In one embodiment, mail hides system, as it is shown in fig. 7, comprises:
Receiver module 701, sends, for receiving and opening, the mail that Mail Clients sends;
Read module 702, for reading the mail ciphertext being hidden in described Email attachment, described mail ciphertext is the mail ciphertext generated after described transmission Mail Clients encrypts former mail;
Enquiry module 703, for inquiring about whether there be the decruption key corresponding with described mail ciphertext;
Deciphering module 704, is used for when Query Result is for being, mail ciphertext according to described decryption key decryption;
Display module 705, for when Query Result is no, display is according to presetting the message body content and described Email attachment content that send the described mail that email template is arranged.Show according to preset send email template as described in the message body content " this is an envelope privacy enhanced mail " of new mail that arranges of transmission Mail Clients, PDF attachment content " this is an envelope privacy enhanced mail ", it thus is avoided that user reads and Mail Contents when not deciphering mail, cannot be judged, promote Consumer's Experience.
As it is shown in fig. 7, in a concrete example, described system also includes inquiring and authenticating module 706, after receiving and open and send, at described receiver module 701, the mail that Mail Clients sends, inquire about whether described Email attachment has signature;When Query Result is for being, verify described signature;
Described read module 702, after verifying that described signature is correct, reads the mail ciphertext being hidden in described Email attachment.
Subsequent treatment is just carried out after checking attachment signatures is correct, if incorrect, stop processing, it is to avoid the mail that deciphering is tampered, in mail sends, increase one layer of safety assurance.
As shown in Figure 7, in a concrete example, described system also includes inquiry and recovers module 707, for after described deciphering module 704 mail ciphertext according to described decryption key decryption, whether the mail after inquiry deciphering there are text labelling and/or adnexa labelling, described text labelling is added on the message body of described former mail, and described adnexa labelling is added on the adnexa of described former mail;When Query Result is for being, according to described text labelling and/or adnexa labelling, the mail after deciphering is reverted to described former mail.
When the mail after deciphering only has text labelling, illustrate that former mail only has message body, in conjunction with described text labelling, the mail after deciphering is reverted to described former mail, obtain the message body of former mail;When the mail after deciphering only has adnexa labelling, illustrate that former mail only has adnexa, in conjunction with described adnexa labelling, the mail after deciphering is reverted to described former mail, obtain the adnexa of former mail;When the mail after deciphering has text labelling and adnexa labelling, illustrate that former mail has message body and adnexa, in conjunction with described text labelling and adnexa labelling, the mail after deciphering is reverted to described former mail, obtain message body and the adnexa of former mail, facilitate user's reading mail, be suitable for application.
Based on the system of the present embodiment shown in Fig. 7, a concrete work process can be discussed further below:
Receiver module 701 receives and opens and sends the mail that Mail Clients sends;Inquiring and authenticating module 706 inquires about whether described Email attachment has signature;When Query Result is for being, verify described signature;Read module 702, after verifying that described signature is correct, reads the mail ciphertext being hidden in described Email attachment;Whether enquiry module 703 is inquired about the decruption key corresponding with described mail ciphertext;When Query Result is for being, deciphering module 704 is mail ciphertext according to described decryption key decryption;When Query Result is no, display module 705 display is according to presetting the message body content and described Email attachment content that send the described mail that email template is arranged;Inquiry recovers module 707 after described deciphering module 704 mail ciphertext according to described decryption key decryption, whether the mail after inquiry deciphering there are text labelling and/or adnexa labelling, described text labelling is added on the message body of described former mail, and described adnexa labelling is added on the adnexa of described former mail;When Query Result is for being, according to described text labelling and/or adnexa labelling, the mail after deciphering is reverted to described former mail.
It is evidenced from the above discussion that, email encryption system of the present invention, when the decruption key that inquiry is not corresponding with mail ciphertext, user, it can be seen that the Mail Contents that arranges according to default transmission email template, promotes Consumer's Experience;Recipient, by verifying that Email attachment signature effectiveness judges whether mail is tampered, increases one layer of safety assurance in mail sends.
Each technical characteristic of embodiment described above can combine arbitrarily, for making description succinct, the all possible combination of each technical characteristic in above-described embodiment is not all described, but, as long as the combination of these technical characteristics is absent from contradiction, all it is considered to be the scope that this specification is recorded.
Embodiment described above only have expressed the several embodiments of the present invention, and it describes comparatively concrete and detailed, but can not therefore be construed as limiting the scope of the patent.It should be pointed out that, for the person of ordinary skill of the art, without departing from the inventive concept of the premise, it is also possible to making some deformation and improvement, these broadly fall into protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (12)

1. a mail hidden method, it is characterised in that comprise the following steps:
Encrypt former mail sending Mail Clients, generate mail ciphertext;
By described mail ciphertext hiding in the default adnexa of new mail;
The message body content of described new mail and described default attachment content are set according to default transmission email template;
Send described new mail.
2. mail hidden method according to claim 1, it is characterised in that after described basis is preset and sent message body content and the described default attachment content that email template arranges described new mail, before sending described new mail, further comprise the steps of:
Described default adnexa is signed.
3. mail hidden method according to claim 1 and 2, it is characterised in that before described generation mail ciphertext, further comprise the steps of:
Add text labelling to the message body of described former mail, and/or add adnexa labelling to the adnexa of described former mail.
4. a mail hidden method, it is characterised in that comprise the following steps:
Receive and open and send the mail that Mail Clients sends;
Reading the mail ciphertext being hidden in described Email attachment, described mail ciphertext is the mail ciphertext generated after described transmission Mail Clients encrypts former mail;
Whether inquiry has the decruption key corresponding with described mail ciphertext;
When Query Result is for being, mail ciphertext according to described decryption key decryption;
When Query Result is no, display is according to presetting the message body content and described Email attachment content that send the described mail that email template is arranged.
5. mail hidden method according to claim 4, it is characterised in that after described reception opening the mail sending Mail Clients transmission, described reading further comprises the steps of: before being hidden in the mail ciphertext in described Email attachment
Inquire about whether described Email attachment has signature;
When Query Result is for being, verify described signature.
6. the mail hidden method according to claim 4 or 5, it is characterised in that after mail ciphertext according to described decryption key decryption, further comprise the steps of:
Whether have text labelling and/or adnexa labelling, described text labelling to be added on the message body of described former mail in the mail after inquiry deciphering, described adnexa labelling is added on the adnexa of described former mail;
When Query Result is for being, according to described text labelling and/or adnexa labelling, the mail after deciphering is reverted to described former mail.
7. a mail hides system, it is characterised in that including:
Encrypting module, for sending the Mail Clients former mail of encryption, generating mail ciphertext;
Hide module, be used for described mail ciphertext hiding in the default adnexa of new mail;
Module is set, for arranging the message body content of described new mail and described default attachment content according to the default email template that sends;
Sending module, is used for sending described new mail.
8. mail according to claim 7 hides system, it is characterized in that, also include signature blocks, in the described module that arranges according to after presetting message body content and the described default attachment content that transmission email template arranges described new mail, described default adnexa is signed;
Described sending module sends the new mail after signing.
9. the mail according to claim 7 or 8 hides system, it is characterized in that, also include adding module, before generating mail ciphertext at described encrypting module, add text labelling to the message body of described former mail, and/or add adnexa labelling to the adnexa of described former mail.
10. a mail hides system, it is characterised in that including:
Receiver module, sends, for receiving and opening, the mail that Mail Clients sends;
Read module, for reading the mail ciphertext being hidden in described Email attachment, described mail ciphertext is the mail ciphertext generated after described transmission Mail Clients encrypts former mail;
Enquiry module, for inquiring about whether there be the decruption key corresponding with described mail ciphertext;
Deciphering module, is used for when Query Result is for being, mail ciphertext according to described decryption key decryption;
Display module, for when Query Result is no, display is according to presetting the message body content and described Email attachment content that send the described mail that email template is arranged.
11. mail according to claim 10 hides system, it is characterised in that also include inquiring and authenticating module, after receiving and open and send, at described receiver module, the mail that Mail Clients sends, inquire about whether described Email attachment has signature;When Query Result is for being, verify described signature;
Described read module, after verifying that described signature is correct, reads the mail ciphertext being hidden in described Email attachment.
12. the mail according to claim 10 or 11 hides system, it is characterized in that, also include inquiry and recover module, for after described deciphering module mail ciphertext according to described decryption key decryption, whether the mail after inquiry deciphering there are text labelling and/or adnexa labelling, described text labelling is added on the message body of described former mail, and described adnexa labelling is added on the adnexa of described former mail;When Query Result is for being, according to described text labelling and/or adnexa labelling, the mail after deciphering is reverted to described former mail.
CN201610044252.3A 2016-01-22 2016-01-22 Mail hiding method and mail hiding system Pending CN105743884A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610044252.3A CN105743884A (en) 2016-01-22 2016-01-22 Mail hiding method and mail hiding system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610044252.3A CN105743884A (en) 2016-01-22 2016-01-22 Mail hiding method and mail hiding system

Publications (1)

Publication Number Publication Date
CN105743884A true CN105743884A (en) 2016-07-06

Family

ID=56246406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610044252.3A Pending CN105743884A (en) 2016-01-22 2016-01-22 Mail hiding method and mail hiding system

Country Status (1)

Country Link
CN (1) CN105743884A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426086A (en) * 2017-06-22 2017-12-01 惠州学院 The method and its system of a kind of data processing
CN108352983A (en) * 2015-12-14 2018-07-31 株式会社全盛智能 Information communication system, information communication program and information communicating method
CN112260939A (en) * 2020-10-27 2021-01-22 冠群信息技术(南京)有限公司 E-mail-based transparent data transmission system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101383696A (en) * 2007-09-06 2009-03-11 深圳市奥联科技有限公司 Digital envelope ciphering mail generating and reading method
CN103248553A (en) * 2012-02-07 2013-08-14 腾讯科技(深圳)有限公司 Mail encryption method, mail decryption method and clients
US8806190B1 (en) * 2010-04-19 2014-08-12 Amaani Munshi Method of transmission of encrypted documents from an email application
CN104065558A (en) * 2013-03-20 2014-09-24 东方斯泰克信息技术研究院(北京)有限公司 Sending and accepting methods and sending and accepting devices for email

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101383696A (en) * 2007-09-06 2009-03-11 深圳市奥联科技有限公司 Digital envelope ciphering mail generating and reading method
US8806190B1 (en) * 2010-04-19 2014-08-12 Amaani Munshi Method of transmission of encrypted documents from an email application
CN103248553A (en) * 2012-02-07 2013-08-14 腾讯科技(深圳)有限公司 Mail encryption method, mail decryption method and clients
CN104065558A (en) * 2013-03-20 2014-09-24 东方斯泰克信息技术研究院(北京)有限公司 Sending and accepting methods and sending and accepting devices for email

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108352983A (en) * 2015-12-14 2018-07-31 株式会社全盛智能 Information communication system, information communication program and information communicating method
CN108352983B (en) * 2015-12-14 2021-06-29 株式会社全盛智能 Information communication system, recording medium, and information communication method
CN107426086A (en) * 2017-06-22 2017-12-01 惠州学院 The method and its system of a kind of data processing
US10659436B2 (en) 2017-06-22 2020-05-19 Huizhou University Method and system for data processing
CN112260939A (en) * 2020-10-27 2021-01-22 冠群信息技术(南京)有限公司 E-mail-based transparent data transmission system and method
CN112260939B (en) * 2020-10-27 2023-10-20 冠群信息技术(南京)有限公司 Transparent data transmission system and method based on E-mail

Similar Documents

Publication Publication Date Title
CN105025019B (en) A kind of data safety sharing method
US20100217984A1 (en) Methods and apparatus for encrypting and decrypting email messages
CN102118381A (en) Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method
US20080187140A1 (en) Method and System of Securely Transmitting Electronic Mail
US10135618B2 (en) Method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications
CN101715638A (en) Secure electronic messaging system requiring key retrieval for deriving decryption key
TW200733686A (en) Asynchronous encryption for secured electronic communications
CN102724207A (en) Method and device for transmitting/processing service request, client end and service end
CN112564906B (en) Block chain-based data security interaction method and system
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN101924635B (en) Method and device for user identity authentication
JP4367546B2 (en) Mail relay device
CN105743884A (en) Mail hiding method and mail hiding system
JP2008282190A (en) Gateway device
JP3711931B2 (en) E-mail system, processing method thereof, and program thereof
CN101369887B (en) E-mail enciphered transmission method
CN114172694A (en) E-mail encryption and decryption method, system and storage medium
CN100521600C (en) Method of ensuring safety of electronic mail
CN103685239A (en) Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
CN113381852A (en) E-mail safety transmission method and system
KR100577875B1 (en) Encryption/decryption method of transmission data
JP4760839B2 (en) E-mail relay device and e-mail relay method
CN113642022A (en) E-mail processing method, device, system and storage medium
CN108900535A (en) Mail encryption method, device and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 510000 Guangdong city of Guangzhou province Yuexiu District ho Yin Road No. 101 building 3A room 18

Applicant after: GUANGDONG AUTHENTICATION TECHNOLOGY CO., LTD.

Applicant after: Age of security Polytron Technologies Inc

Address before: 510000 Guangdong city of Guangzhou province Yuexiu District ho Yin Road No. 101 building 3A room 18

Applicant before: GUANGDONG AUTHENTICATION TECHNOLOGY CO., LTD.

Applicant before: Guangdong Certificate Authority Center Co., Ltd.

COR Change of bibliographic data