Method for encrypting webmail information

An information encryption and mail technology, applied in the field of web mail information encryption, can solve the problems of low security, low public key security, low generality, etc. simple effect

Active Publication Date: 2013-02-13
HUAWEI TEHCHNOLOGIES CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, key exchange and management are required, which has the disadvantage of inconvenient operation and use
Third, its key exchange adopts a PKI / CA-based authentication system, which must rely on a third-party organization, so it has the disadvantage of low versatility
Fourth, since the email encryption operation of the existing email encryption system is performed at the sending end, the email received by the receiving end cannot be encrypted and protected by the existing email encryption system
Fifth, the encryption system is mainly supported in the mail client (Outlook S / MIME, PGP for Outlook, Gnupg with ThunderBird), the existing web mail system itself does not have encryption support in this regard, that is, no web mail system itself provides The encryption service in this aspect is just that some third-party developers provide some encryption plug-ins (such as Gmail S / MIME; FireGPG) for specific webmail systems or browsers, which have the disadvantage of low system security, because this will affect webmail The security of the system itself
Sixth, in the existing web mail, it is also impossible to encrypt and protect the mail information displayed on the user's own web page
However, the above methods have different disadvantages: method (1) requires the public key of S / MIME to be stored in the digital certificate, and a third-party recognized organization CA center is responsible for generating and issuing it, and the authentication mechanism depends on the hierarchical certificate certification authority. The certificates of all lower-level organizations and individuals are certified by the upper-level organization, and the highest-level organizations (root certificates) are mutually authenticated. The entire trust relationship is basically a tree, which is the so-called Tree of Trust. , as a key certification authority, the CA center not only requires users to submit personal identification certificates such as ID cards and phone numbers, but also charges digital certificate usage fees according to a time limit, which is undoubtedly a huge obstacle for ordinary users. Every time you use a certificate, you must go to the CA center for verification, which also adversely affects the user experience. In addition, the management of a large number of certificates (public keys) has also become a headache for the CA center. At the same time, the mail system based on S / MIME only It can protect the sent e-mail information, but cannot encrypt and protect the received e-mail; the method (2) is different from the public key management mechanism of S / MIME, and PGP has developed a model of mutual trust between people The means of transferring public keys, this kind of private key referral, can better reflect people's natural social interactions, and people can freely choose trusted people to introduce, but because the object of trust is an individual person, It is not a public authority, so the security of its public key is lower than that of S / MIME. In addition, PGP also has complex operational problems such as key exchange and management. At the same time, like S / MIME, PGP only supports mail protection at the sending end of the mail system. , does not support the mail at the receiving end; method (3) using a third-party plug-in on the web mail has security problems in the web mail system itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting webmail information
  • Method for encrypting webmail information
  • Method for encrypting webmail information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0027] Embodiment: the present invention provides a kind of specific embodiment that the mail content of web mail (Webmail) is encrypted and protected, and it is used to solve the information confidentiality problem that the mail content of web mail is shown with clear text and occurs, and its method is specifically as follows:

[0028] 1. Encryption steps

[0029] from image 3 We can see that the encryption process of webmail and its display execution steps are as follows:

[0030] S1 After the user passes the user login authentication in the web mail system, first the web mail system (MUA) reads the mail information, that is, from the mail server through the mail communication protocol, such as POP3, IMAP and other communication protocols, but not limited to this, to obtain the mail All mails of users in the server, where the mail server is any third-party independent mail server.

[0031] S2 reads the local encrypted mail record, that is, reads the characteristic value (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for encrypting webmail information. An adopted encryption and decryption protecting module based on passwords is embedded in a webmail system, and is seamlessly integrated with the webmail system, so that the method does not depend on a complicated password system and a third-party certification authority, is not subject to a password algorithm patent, and has no need of complicated encryption exchange and complicated encryption management. The method has the advantages of simplification of operation and convenience for use.

Description

technical field [0001] The invention relates to a method for encrypting webpage mail information. Background technique [0002] Email (Email) is currently the most widely used application on the Internet. People not only use it for communication, but also often store some important personal information or materials in their personal mailboxes. At present, the webpage-based email (Webmail, referred to as webmail) implements its access control service through account / password authentication on the client side. Once the user account / password information is leaked, all email information in the user mailbox will be completely exposed to illegal users, including some important personal information. [0003] Such as figure 1 , the existing mail encryption system mainly considers the information confidentiality in the mail transmission process, that is, the sender encrypts the mail information when sending the mail in the mail communication, and the receiver decrypts the mail afte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L9/32H04L29/06
Inventor 乐德广
Owner HUAWEI TEHCHNOLOGIES CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products