Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of encryption method of Email, is intended to solve the problem that the Email that exists in the prior art can't obtain safety assurance.
The embodiment of the invention is achieved in that a kind of encryption method of Email, and described method comprises the steps:
Folder information in the Crypted password information of reception input and the selected mailbox;
Adopt cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
Another purpose of the embodiment of the invention is to provide a kind of decryption method of Email, and described method comprises the steps:
Receive the clear crytpographic key information of input and selected encryption folder;
Adopt the decipherment algorithm corresponding that described encryption folder is decrypted according to described clear crytpographic key information with cryptographic algorithm.
Another purpose of the embodiment of the invention is to provide a kind of encryption system of Email, and described system comprises:
The enciphered message receiving element is used for receiving the Crypted password information of input and the folder information of selected mailbox;
Cryptographic processing unit is used for adopting cryptographic algorithm to generate cryptographic keys according to described Crypted password information, and the file in the described selected mailbox is encrypted.
Another purpose of the embodiment of the invention is to provide a kind of decryption system of Email, and described system comprises:
The decryption information receiving element is used to receive the clear crytpographic key information of input and selected encryption folder information; And
The decryption processing unit is used for adopting the decipherment algorithm corresponding with cryptographic algorithm that described encryption folder is decrypted according to described clear crytpographic key information.
In embodiments of the present invention; Crypted password information according to input adopts cryptographic algorithm to generate cryptographic keys; file in the mailbox that the user is selected is encrypted; for the Email in this encryption folder provides secondary cryptoguard; thereby guaranteed the fail safe of Email in the mailbox, especially the important private data to the user provides sufficient safety guarantee.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
In embodiments of the present invention, by receiving the Crypted password information of user's input, encrypt according to the file that this Crypted password information produces in the mailbox that cryptographic keys selectes the user, thereby realized the superencipher of the Email in this encryption folder in the mailbox, guaranteed the fail safe of user email.
Fig. 1 shows the realization flow of the encryption method of the Email that the embodiment of the invention provides, and details are as follows:
In step S101, the folder information in the mailbox that the Crypted password information of reception user input and user select.Wherein the Email Information that the user needs encipherment protection can be comprised in the file in the mailbox selected of user, also the file of sky can be.
In step S102, adopt corresponding cryptographic algorithm to produce cryptographic keys according to the Crypted password information of user input, the file in the mailbox that the user is selected is encrypted.In embodiments of the present invention, the corresponding cryptographic algorithm that is adopted can be open key-encryption algorithm (as RSA cryptographic algorithms), data encryption standard (Digital Encryption Standard, DES) algorithm, Digital Signature Algorithm (as ElGamal cryptographic algorithm, DSA cryptographic algorithm), md5 encryption algorithm or FLOWFISH cryptographic algorithm etc.After this document folder was encrypted, any Email in visit this document folder all needed to import the Crypted password of this document folder, thereby made the Email in the subscriber mailbox obtain the superencipher protection, had guaranteed the fail safe of the Email in this encryption folder.
In order to reach better cryptoguard effect; the embodiment of the invention is in step S101; when receiving the folder information in the Crypted password information of user's input and the mailbox that the user selectes; receive the fetching cipher information of user's input; as fetching cipher problem, secret email address etc. and store this fetching cipher information, after step S102, also comprise the steps: simultaneously
In step S103, when the user loses the Crypted password of above-mentioned encryption folder, according to the Crypted password of above-mentioned this encryption folder of fetching cipher information retrieval.
When the Email that needs encipherment protection was not included in this encryption folder, in order to realize that this Email that needs protection is carried out encipherment protection, this E-mail enciphered method also comprised the steps:
In step S104, receive the Email transfer instruction that needs encipherment protection beyond this encryption folder, and the Email of this needs encipherment protection is transferred to described encryption folder according to this transfer instruction.
For fear of logining mailbox because of the user and away from keyboard or log off because of the user in browsing the process of encryption folder, and cause the e-mail data in the encryption folder to be stolen by the disabled user, in embodiments of the present invention, after step S104, also comprise the steps:
In step S105, after the user stops to browse this encryption folder a period of time (as 2 minutes), after perhaps the user withdraws from the login of mailbox, according to the Crypted password information that receives among the step S101 this encryption folder is encrypted again automatically.When the user logins mailbox again or browses and operate in the mailbox Email in this encryption folder again, need re-enter the Crypted password of this encryption folder.
Be appreciated that, the user can adopt above-mentioned E-mail enciphered method selectively file in the mailbox or Email to be encrypted, simultaneously different passwords can be set for different encryption folders, thereby provide sufficient safety guarantee for user's important private data.
After adopting said method that the file in the selected mailbox is encrypted, the user is not when knowing the Crypted password of this document folder, can't carry out any Email in this encryption folder as any operation such as browsing, when the user opens and browse in this email process by Crypted password, if the user is away from keyboard, by this encryption folder is encrypted again, thereby guaranteed the fail safe of Email.
In actual application, the user can need select the file of encryption by the folder management page of mailbox, can encrypt the file of selected mailbox behind (as twice input password) input Crypted password on request.
The encryption folder that Fig. 2 shows the embodiment of the invention to be provided uses handling process.
After the user logins mailbox by password, the Email that selection need be browsed; Judge whether the file at selected Email place is encrypted, if the file unencryption at this Email place, then the user can normal browsing or is operated this Email, if the file at this Email place is encrypted, then points out the user to import Crypted password; Whether the Crypted password of checking user input correct, if the password mistake then changes error processing procedure over to, as prompting user cipher mistake etc., and if correctly the user can normal browsing or operates this Email; When the user forgets Crypted password, then according to the fetching cipher information of user input, as the Crypted password of these encryption folders of information retrieval such as fetching cipher problem and secret email address; When the user stops to browse or this Email of shut-down operation after a period of time, perhaps after the user withdrawed from the mailbox login, the file at this Email place was encrypted again.
Fig. 3 shows the realization flow of the decryption method of the Email that the embodiment of the invention provides, and details are as follows:
In step S301, the encryption folder information in the mailbox that the clear crytpographic key information of reception user input and user select.In actual application, the user passes through the folder management page in the mailbox, the file that selection has been encrypted, and input clear crytpographic key information, and when this clear crytpographic key information is encrypted for this document is pressed from both sides, the Crypted password information that the user imports.
In step S302, adopt the decipherment algorithm corresponding according to this Crypted password information with above-mentioned cryptographic algorithm, selected encryption folder is decrypted.After this encryption folder is decrypted, the state of this encryption folder with encrypt before consistent, the mailbox login user can be random browses or operates any Email in the file after decrypted in this mailbox.
Fig. 4 shows the structure of the encryption system of the Email that the embodiment of the invention provides, and for better explanation, only shows the part relevant with the embodiment of the invention.
Folder information in the mailbox that the Crypted password information of encipheredmessage receiving element 41 reception user inputs and user select.Adopt corresponding cryptographic algorithm to produce cryptographic keys bycryptographic processing unit 42 according to the Crypted password information of user input, the file in the mailbox that the user is selected is encrypted, and wherein the corresponding cryptographic algorithm of Cai Yonging does not repeat them here as mentioned above.The Email that the user needs encipherment protection can be comprised in the file in the mailbox that the user selectes, also empty folder can be.
When the Email that needs encipherment protection is not included in this encryption folder; receive the Email transfer instruction that needs encipherment protection beyond these encryption folders by theEmail buanch unit 43 of the encryption system of this Email, and the Email of this needs encipherment protection is transferred to this encryption folder according to this transfer instruction.
When the user forgets above-mentioned Crypted password, receive the fetching cipher information of user's input by fetching cipherinformation receiving unit 44, as information such as fetching cipher problem, secret mailboxes, by the Crypted password of fetchingcipher unit 45 according to this this encryption folder of fetching cipher information retrieval.
After the user stops to browse this encryption folder a period of time (as 2 minutes), after perhaps the user withdraws from the login of mailbox, for fear of logining mailbox because of the user and away from keyboard or log off because of the user in browsing the process of encryption folder, and cause the e-mail data in the encryption folder to be stolen by the disabled user,re-encryption unit 46 is after the user stops to browse this encryption folder a period of time (as 2 minutes), after perhaps the user withdrawed from the login of mailbox, the Crypted password information that receives according to encipheredmessage receiving element 41 was encrypted again to this encryption folder automatically.
After the file in the mailbox was encrypted, the mailbox login user need be by the Email in this encryption folder of cryptographic acess, when the user logins mailbox again or browses and operate Email in the mailbox again, need re-enter Crypted password.
Fig. 5 is the structure of the decryption system of the Email that provides of the embodiment of the invention, for better explanation, only shows the part relevant with the embodiment of the invention.
Encryption folder information in the mailbox that the clear crytpographic key information of decryptioninformation receiving element 51 reception user inputs and user select.This clear crytpographic key information when this document folder or Email are encrypted, the Crypted password information of user's input.Decryption processing unit 52 adopts the decipherment algorithm corresponding with cryptographic algorithm according to this decryption information, and the encryption folder in the mailbox that the user is selected is decrypted.When the Email in the file after the user capture deciphering, do not need to input password.
In sum; in embodiments of the present invention; Crypted password information according to user's input generates cryptographic keys; file in the mailbox that the user is selected is encrypted; thereby make Email in this encryption folder by superencipher; simultaneously the Email that needs encipherment protection can be transferred to this encryption folder; the fail safe of the Email in the subscriber mailbox is protected; stop to browse or operate this encryption folder after a period of time as the user simultaneously; when perhaps the user withdraws from the mailbox login; automatically again this encryption folder is encrypted according to the Crypted password information of user's input; when the user browses again or logins mailbox again, need re-enter password, make the user after being gone for a season; Email can not be stolen yet, and has further guaranteed the fail safe of user email.In addition, when the user forgot the password of encryption folder, the user can be by this Crypted password of fetching cipher information retrieval of input.When the user does not need when E-mail enciphered, the Email decryption method that provides by the embodiment of the invention can be removed the password of this Email, and it is convenient, freely to use.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.