E-mail encryption method, mail server and system

A mail server and e-mail technology, applied in the field of communication security, can solve problems such as too simple passwords, stolen mailbox passwords, and users lack of awareness of security protection, and achieve the effect of ensuring security and improving security.

Active Publication Date: 2013-07-03
广东盈世计算机科技有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the disadvantage of the mail server is that the protection method for mail security is relatively single, and the security of all mails is mainly managed through the login password of the mailbox, and the content of the mail is basically stored in plain text or simply encoded with Base64, etc., and depends on the user A password or other single authentication method is used to determine whether the user has the right to view the content of the email. If there is a problem with the authentication or the mail server is modified, the data of all the user's emails will be completely exposed, which seriously threatens the security of the user's email
At the same time, once the address of the mail server is disclosed, it is easy to become the target of hackers, which increases the probability of server data being stolen
For example, when the user selects the remember password function of the browser, as long as the user's computer password is stolen, the user can freely log in to the user's mailbox, and the security of the email in the user's mailbox cannot be guaranteed.
[0005] According to conventional thinking, the mail server often adopts the method of accessing all the data of the user in the system once the authentication is passed, but many users lack sufficient awareness of security protection, the password set is too simple, and often the mailbox password is stolen situation, resulting in email data can also be easily stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • E-mail encryption method, mail server and system
  • E-mail encryption method, mail server and system
  • E-mail encryption method, mail server and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0025] figure 1 It is a flow chart of the first embodiment of an email encryption method of the present invention, including:

[0026] S100, acquiring mail information of the mail sent by the terminal.

[0027] The email information includes recipients, subject, body and attachments. The user sends an email to the mail server through the terminal, and the email information includes the recipient, title and body. At the same time, the user can add attachments to the email, and the number of attachments can be one or more.

[0028] S101. Determine whether the email information contains an encrypted password.

[0029] It should be noted that not all emails need to be encrypted. The user only encrypts the emails that need to be encrypted and submits the encrypted password. After the user submits the encrypted password, the encrypted password will be stored in the email message. After obtaining the mail information of the mail sent by the terminal, the mail server needs to deter...

no. 2 example

[0038] figure 2 It is a flow chart of the second embodiment of an email encryption method of the present invention, including:

[0039]S200. Obtain email information of the email sent by the terminal.

[0040] The email information includes recipients, subject, body and attachments.

[0041] S201. Determine whether the email information contains an encrypted password.

[0042] It should be noted that not all emails need to be encrypted. The user only encrypts the emails that need to be encrypted and submits the encrypted password. After the user submits the encrypted password, the encrypted password will be stored in the email message. After obtaining the mail information of the mail sent by the terminal, the mail server needs to determine whether the encrypted password is included in the mail information.

[0043] When the mail server judges that the mail information does not contain an encryption password, it means that the mail does not need to be encrypted and can be s...

no. 3 example

[0055] image 3 It is a flow chart of the third embodiment of an email encryption method of the present invention, including:

[0056] S300. Obtain email information of the email sent by the terminal.

[0057] The email information includes recipients, subject, body and attachments.

[0058] S301. Determine whether the email information contains an encrypted password.

[0059] It should be noted that not all emails need to be encrypted. The user only encrypts the emails that need to be encrypted and submits the encrypted password. After the user submits the encrypted password, the encrypted password will be stored in the email message. After obtaining the mail information of the mail sent by the terminal, the mail server needs to determine whether the encrypted password is included in the mail information. When the mail server judges that the mail information does not contain an encryption password, it means that the mail does not need to be encrypted and can be sent direct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an E-mail encryption method which comprises the steps that mail information sent by a terminal is acquired, and the mail information comprises a receiver, an object, a text and an attachment; whether an encryption password is comprised in the mail information is judged, when the judgment is confirmed, an E-mail is encrypted according to the mail information, the encrypted E-mail comprises a mail head, a template text, an encrypted text and an encrypted attachment, and the mail head further comprises encryption identification corresponding to the E-mail. The invention further discloses a mail server and an E-mail encryption system. By adoption of the E-mail encryption method, the mail server and the E-mail encryption system, a standard format of an E-mail is expanded, each E-mail can have an independent encryption password, and safety of E-mail data is greatly improved. Simultaneously, because the whole encryption data are placed in an original text of an E-mail, the E-mail can be independently downloaded and decrypted. In addition, the E-mail is encrypted by utilizing an Rijndael encryption method, and entity data of each E-mail are effectively ensured.

Description

technical field [0001] The invention relates to the field of communication security, in particular to an email encryption method, server and system. Background technique [0002] Nowadays, with the development and popularization of the network, e-mail has become an important communication tool, and its security has been paid more and more attention. [0003] Emails must contain additional service information in addition to information passed from one user to another. The mail server uses this information to deliver the mail, and the client's mail receiving software uses this information to classify the mail. [0004] At present, the disadvantage of the mail server is that the protection method for mail security is relatively single, and the security of all mails is mainly managed through the login password of the mailbox, and the content of the mail is basically stored in plain text or simply encoded with Base64, etc., and depends on the user A password or other single aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/58H04L9/32
CPCH04L9/0631H04L63/0428
Inventor 陈颖棠黄重阳
Owner 广东盈世计算机科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products