An email encryption method, mail server and system

A mail server and e-mail technology, applied in the field of communication security, can solve the problems of too simple passwords, mailbox password theft, mail data theft, etc., and achieve the effect of ensuring security and improving security.

Active Publication Date: 2016-12-14
广东盈世计算机科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the disadvantage of the mail server is that the protection method for mail security is relatively single, and the security of all mails is mainly managed through the login password of the mailbox, and the content of the mail is basically stored in plain text or simply encoded with Base64, etc., and depends on the user A password or other single authentication method is used to determine whether the user has the right to view the content of the email. If there is a problem with the authentication or the mail server is modified, the data of all the user's emails will be completely exposed, which seriously threatens the security of the user's email
At the same time, once the address of the mail server is disclosed, it is easy to become the target of hackers, which increases the probability of server data being stolen
For example, when the user selects the remember password function of the browser, as long as the user's computer password is stolen, the user can freely log in to the user's mailbox, and the security of the email in the user's mailbox cannot be guaranteed.
[0005] According to conventional thinking, the mail server often adopts the method of accessing all the data of the user in the system once the authentication is passed, but many users lack sufficient awareness of security protection, the password set is too simple, and often the mailbox password is stolen situation, resulting in email data can also be easily stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An email encryption method, mail server and system
  • An email encryption method, mail server and system
  • An email encryption method, mail server and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0025] figure 1 It is a flow chart of the first embodiment of an email encryption method of the present invention, including:

[0026] S100, acquiring mail information of the mail sent by the terminal.

[0027] The email information includes recipients, subject, body and attachments. The user sends an email to the mail server through the terminal, and the email information includes the recipient, title and body. At the same time, the user can add attachments to the email, and the number of attachments can be one or more.

[0028] S101. Determine whether the email information contains an encrypted password.

[0029] It should be noted that not all emails need to be encrypted. The user only encrypts the emails that need to be encrypted and submits the encrypted password. After the user submits the encrypted password, the encrypted password will be stored in the email message. After obtaining the mail information of the mail sent by the terminal, the mail server needs to deter...

no. 2 example

[0038] figure 2 It is a flow chart of the second embodiment of an email encryption method of the present invention, including:

[0039]S200. Obtain email information of the email sent by the terminal.

[0040] The email information includes recipients, subject, body and attachments.

[0041] S201. Determine whether the email information contains an encrypted password.

[0042] It should be noted that not all emails need to be encrypted. The user only encrypts the emails that need to be encrypted and submits the encrypted password. After the user submits the encrypted password, the encrypted password will be stored in the email message. After obtaining the mail information of the mail sent by the terminal, the mail server needs to determine whether the encrypted password is included in the mail information.

[0043] When the mail server judges that the mail information does not contain an encryption password, it means that the mail does not need to be encrypted and can be s...

no. 3 example

[0055] image 3 It is a flow chart of the third embodiment of an email encryption method of the present invention, including:

[0056] S300. Obtain email information of the email sent by the terminal.

[0057] The email information includes recipients, subject, body and attachments.

[0058] S301. Determine whether the email information contains an encrypted password.

[0059] It should be noted that not all emails need to be encrypted. The user only encrypts the emails that need to be encrypted and submits the encrypted password. After the user submits the encrypted password, the encrypted password will be stored in the email message. After obtaining the mail information of the mail sent by the terminal, the mail server needs to determine whether the encrypted password is included in the mail information. When the mail server judges that the mail information does not contain an encryption password, it means that the mail does not need to be encrypted and can be sent direct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an email encryption method, which includes: acquiring the email information of the email sent by the terminal, the email information including the addressee, title, text and attachment; judging whether the email information contains an encrypted password, judging as If so, encrypt the email according to the email information, the encrypted email includes a header, a template text, an encrypted text, and an encrypted attachment, and the header also includes an encryption identifier corresponding to the email. The invention also discloses a mail server and an electronic mail encryption system. By adopting the invention, the standard format of e-mail is expanded, each e-mail can have an independent encryption password, and the security of e-mail data is greatly improved. Also, since the entire encrypted data is placed in the original text of the e-mail, the e-mail can be downloaded and decrypted individually. In addition, the Rijndael encryption method is used to encrypt emails, effectively ensuring the security of each email entity data.

Description

technical field [0001] The invention relates to the field of communication security, in particular to an email encryption method, server and system. Background technique [0002] Nowadays, with the development and popularization of the network, e-mail has become an important communication tool, and its security has been paid more and more attention. [0003] Emails must contain additional service information in addition to information passed from one user to another. The mail server uses this information to deliver the mail, and the client's mail receiving software uses this information to classify the mail. [0004] At present, the disadvantage of the mail server is that the protection method for mail security is relatively single, and the security of all mails is mainly managed through the login password of the mailbox, and the content of the mail is basically stored in plain text or simply encoded with Base64, etc., and depends on the user A password or other single aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L9/32
Inventor 陈颖棠黄重阳
Owner 广东盈世计算机科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products