Movatterモバイル変換


[0]ホーム

URL:


CN111541603B - Independent intelligent safety mail terminal and encryption method - Google Patents

Independent intelligent safety mail terminal and encryption method
Download PDF

Info

Publication number
CN111541603B
CN111541603BCN202010312733.4ACN202010312733ACN111541603BCN 111541603 BCN111541603 BCN 111541603BCN 202010312733 ACN202010312733 ACN 202010312733ACN 111541603 BCN111541603 BCN 111541603B
Authority
CN
China
Prior art keywords
mail
key
encryptor
encrypted
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010312733.4A
Other languages
Chinese (zh)
Other versions
CN111541603A (en
Inventor
顾峻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Dazhou Jiye Intelligent Technology Co ltd
Original Assignee
Jiangsu Dazhou Jiye Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Dazhou Jiye Intelligent Technology Co ltdfiledCriticalJiangsu Dazhou Jiye Intelligent Technology Co ltd
Priority to CN202010312733.4ApriorityCriticalpatent/CN111541603B/en
Publication of CN111541603ApublicationCriticalpatent/CN111541603A/en
Application grantedgrantedCritical
Publication of CN111541603BpublicationCriticalpatent/CN111541603B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention relates to an independent intelligent safe mail terminal and an encryption method, wherein the terminal comprises an address book management module for classified management of users, including a trusted user with an encryptor and a common user without the encryptor; the encryptor management module is used for managing the encryptors hosted by the users; the mail receiving and sending module is used for sending and receiving mails; the mail receiving and sending module executes mail receiving and sending, and if the encrypted mail is sent, different processing modes are adopted based on whether the mail receiving and sending party holds the encryptor. The terminal and the method of the invention provide mail communication modes with different encryption security levels, can realize the transmission of confidential mails without independently erecting a mail service system and supporting an application service system such as a key management center, realize decentralization, have simple and convenient application, and realize the confidential transmission of mail data on the premise of not changing the format of the existing MIME mail protocol.

Description

Independent intelligent safety mail terminal and encryption method
Technical Field
The invention belongs to the technical field of information security, and particularly relates to an independent intelligent security mail terminal and an encryption method.
Background
With the development of internet technology and network office, e-mail has become one of the main communication modes of people, and with the continuous increase of mail service providers on the market, the advantages of mail clients are more and more obvious, so that a plurality of mail accounts of people can be effectively managed, and the people can use the e-mail and communicate information with each other greatly and conveniently.
The application of the mail client enables a user to manage the sending and receiving storage of a plurality of mail account of the user only through one software, and mails are respectively stored in a mail service provider and a computer of the user, but the mail information content of the user is easy to be intercepted by an unauthorized user. In addition, the existing mail client mode is a system architecture which can not provide services without leaving the central system software in the using process.
Disclosure of Invention
The invention aims to provide an independent intelligent safe mail terminal and an encryption method, which can realize independent, centerless, encrypted mail proxy services with different security levels.
In order to achieve the technical purpose, the invention adopts the following scheme:
a standalone intelligent secure mail terminal, comprising:
the address book management module is used for carrying out classified management on users, and comprises a trusted user with an encryptor and a common user without the encryptor;
the encryptor management module is used for managing the encryptors hosted by the users;
the mail receiving and sending module is used for sending and receiving mails; the mail receiving and sending module executes mail receiving and sending, if the encrypted mail is sent, based on whether the mail receiving and sending party holds the encryptor, different processing modes are adopted, including:
a. the sender is a common user, encrypts the mail in a symmetric encryption mode and sends the mail, and sends the encryption key of the mail to the receiver through other communication channels.
b. The sender is a trusted user, the receiver is a common user, the mail is encrypted in a symmetric encryption mode, the local public key is obtained and added to the mail data to send the mail, and the secret key is sent to the receiver through other communication channels;
c. the mail receiving and sending parties are all trusted users, and send out the mails after encrypting the mails in an asymmetric encryption mode and a symmetric encryption mode.
Further, in the step a, a random number generator is adopted to generate a random number, the random number is judged to be a prime number, and the mail is sent out after the mail is encrypted by using a key with the prime number being symmetric encryption.
And b, starting a true random number generator of the encryptor to generate a prime number as a symmetric encrypted key encryption mail, adding a sender public key to a mail protocol, and sending out the mail.
In the step c, starting a true random number generator of the encryptor to generate a prime number which is used as a symmetric encryption key encryption mail; and encrypting the secret key by using the public key of the receiver, signing the ciphertext by using the private key of the sender, and then sending the mail.
And if the receiver is a user which does not exist in the address list management module, sending the mail in a mode b, acquiring the public key of the receiver in an automatic reply mode, and storing the public key to a trusted user column of the address list management module.
The mail sender adds the received public key and the mail address, uses Hash calculation, encrypts the Hash value by the private key of the mail sender, and stores the encrypted value to the credible user column of the address list management module.
As a further improvement of the present invention, in the step c, after the receiving party receives and decrypts the email, the terminal encrypts the received email and the symmetric key by using its private key and stores them locally, thereby implementing encryption protection of the email data in the local email client and the public key in the address book.
As a further improvement of the invention, the text and the attachment of the mail are encrypted, and the sender and the transcriber are not processed.
As a further improvement of the invention, the mail cipher text and the key are transmitted over different communication channels.
As a further improvement of the invention, the mail encrypted by the encryptor is decrypted by a private key which is separately generated by the encryptor before shipment and stored in a storage area capable of protecting the private key.
The mail transmission of the invention follows MIME protocol or proprietary protocol, and can transmit encrypted and non-encrypted mails under the condition of not changing the existing structure of MIME protocol or proprietary protocol, thereby improving the universality.
The invention also provides an independent intelligent safe mail encryption method, which comprises the following steps:
s100, judging whether the sender holds an encryptor, if not, sending the encrypted mail in a symmetric encryption mode, and sending the encryption key of the mail to the receiver through other communication channels; otherwise go to S200;
s200, judging whether the public key of the receiver is held or not, if so, encrypting the mail in an asymmetric encryption and symmetric encryption mode and then sending the mail; otherwise go to S300;
s300, the mail is encrypted in a symmetric encryption mode, the local public key is obtained and added to the mail data, then the mail is sent out, and the encryption key of the mail is sent to the receiver through other communication channels.
In the method of the present invention, in S100, a pseudo random number generator is used to generate a random number, the random number is determined to be a prime number, and the mail is sent out after the mail is encrypted by using a key in which the prime number is symmetric encryption.
In the step S200, the true random number generator of the encryptor is started to generate a prime number as a symmetric encrypted key encryption mail, and the public key of the sender is added to the mail protocol to send out the mail.
In S300, starting a true random number generator of the encryptor to generate a prime number as a symmetric encrypted key encrypted mail; and encrypting the secret key by using the public key of the receiver, signing the ciphertext by using the private key of the sender, and then sending the mail.
In the step S300, if the receiver holds the encryptor, the public key is sent to the sender by the way of automatic reply of the mail, so as to complete the public key exchange. The sender stores the public key in the address list.
Furthermore, the mail transceiver adds the received public key and the mail address of the sender, uses hash calculation, encrypts a hash value by using a private key of the mail transceiver, and stores the encrypted value to a trusted user column of the address list management module.
After the receiver receives and decrypts the mail, the private key of the receiver is used for encrypting the received mail and the symmetric key, and the mail and the symmetric key are stored locally.
Further, in the method, the text and the attachment of the mail are encrypted, and the sender and the transcriber are not processed.
Further, the mail encrypted by the encryptor is decrypted by a private key which is independently generated by the encryptor before delivery and stored in a storage area capable of protecting the private key.
The independent intelligent safe mail terminal and the encryption method have the following beneficial effects:
(1) decentralization, wherein different key generating, transmitting and receiving methods are designed according to different security levels, so that the independent intelligent security mail terminal adopts a technical architecture and a mode of decentralization secret mail communication in the use process, namely the terminal does not depend on any application auxiliary or supporting system before, during and after use (communication or verification is not required by any auxiliary system such as a password management center), the user can master the core secret in the internet communication process, and the privacy and the convenience are improved.
(2) The method reduces professional work such as certificate application, issuing and maintenance and the like of a user caused by a digital certificate mode according to a digital certificate process, does not change the original use habit of the user on the premise of strictly complying with the use standard of the national password, and improves the use convenience of the user.
(3) The application is simple and convenient, the independent establishment of the mail service system is not needed, and the user still continues to use the mail service system (such as the existing commercial mail system) and the private mail service system (such as the own mail system established by the enterprise) provided by each mail service provider in daily use.
(4) And designing an autonomous public key exchange mode, and naturally finishing the exchange of the public keys by a sender and a receiver user in the communication process of the common mails. The public key can be automatically extracted by client software when a receiver user receives the mail sent by the user with the encryptor without the encryptor. When the receiver returns the mail to the sender, the user of the receiver selects whether to use the public key of the other party to protect the encryption key, namely, a digital envelope is used, and the automatic extraction and protection of the public key are realized on the premise of following the mail protocol.
(5) The mail data is transmitted in a secret way on the premise of not changing the format of the existing MIME mail protocol.
Drawings
FIG. 1 is a client application framework.
Fig. 2 is a client functional architecture diagram.
Fig. 3 is a client-side mailing execution flow.
Fig. 4 is a high security level mail packet format.
Fig. 5 is a low security level mail packet format.
Fig. 6 is a flow chart of high and low security level encryption and decryption.
Fig. 7 is a schematic flow chart of the encryption and decryption application of the whole mail.
FIG. 8 is a schematic view of an integrated process.
Detailed Description
The terminal application framework of the invention is shown in fig. 1, and the high security level described in the invention is defined as that the user has a private encryptor thereof and can realize mutually trusted transmission of encrypted mails; the low security level is defined as the user has no private encryptor, and the encrypted mail can be temporarily transmitted by using the encryption mode provided by the invention. In addition, the users with high security level and low security level can realize the transmission, the reception and the reading of the conventional plaintext mail under any state. Through the application of the terminal, the encrypted mail can also be transmitted to a common user without an encryptor, or the mail can be transmitted in a conventional plaintext mode. Therefore, the mode of the digital certificate is avoided, the user can learn the related knowledge and the corresponding technology of the digital certificate and the like, and the state of' being ready to use when being taken is finally realized.
The encrypted mail is realized by using a cryptographic algorithm, but the core of the design is independent and intelligent, and an identification cryptographic technology is adopted. I.e., communication between users (terminals), without a center (key management center), without digital certificate services participating in the process, and without a mail service system of a specific requirement. So that the encrypted mail is independent operation and data exchange between the user (end) and the user (end). The basic condition of the encrypted mail terminal is that the mail service agent software is installed, both the mail sending and receiving party can hold an encryptor, one user can hold the encryptor, or both users do not have the encryptor, so that data encryption transmission and plaintext transmission are realized.
On the security level, the invention provides a pure software mode and two security level modes calculated by a hardware encryptor with a cryptographic algorithm, the security level of the mail sent or received by a user with the encryptor is high, the security level of the mail sent or received by a user without the encryptor is low, and the security level of the mail sent or received by the user without the encryptor is still higher than that of the normal clear text sent mail.
In the aspect of convenient application, the independent intelligent safe mail terminal is combined and automatically identified according to application scenes of users with encryptors and users without encryptors, so that intelligent application is realized. The mutual communication can be realized by selecting mail communication in three modes of high, low and no security level, so that the use is convenient, the operation is simple, the learning cost of the user is low, the security level is selected by the user and the centralized independent intelligent security mail terminal is removed, and finally the encryption and decryption intercommunication of the mail sent and received among the users is realized.
As shown in fig. 2, the independent intelligent security mail terminal has multi-account mailbox management, address book management, and mail content management in addition to the conventional mail proxy server. Secondly, the security management function of the user on the own encryptor is added, so that the user can completely control the own password equipment. And the mail with high security level is still in an encrypted state in the storage state of mail servers and local computers of users, and the mail can be decrypted only after the encryptor is opened every time, so that the real security of the mail content is ensured.
When a user selects a mail transmission or receiving mode with low security level, the terminal calls a pseudo-random number generator to generate an encryption key when encryption is needed, encrypts the mail by adopting a symmetric algorithm, and sends the key to a receiver through an arbitrary channel selected by the user. The receiver decrypts the received mail using the key. And the terminal stores the decrypted plaintext in the terminal.
As shown in fig. 3, when the user chooses to transmit or receive the mail with high security level, the encryption and decryption method is adopted, the key is stored in the encryptor for protection, the asymmetric method is used for key negotiation and key transmission, and the symmetric key is used for encryption and decryption. Thereby achieving the maximum protection of information at a high security level.
In the case of a high security level, each user has an encrypter. In the first communication and subsequent communication processes, public key interaction with other users is obtained through mails, and a friend public key list of the users is not stored by a server, so that the mode of public key exchange through a central system is removed, direct end-to-end contact and identification are realized, and the public key interaction is added into a trusted list after verification. The data packet format of the high security level is schematically shown in fig. 4.
The format of the mail data packet with low security level is schematically shown in fig. 5.
By the encryption and decryption method of high and low security levels, end-to-end encryption communication between users and among all mailbox accounts is realized, data is encrypted before a mail is sent out and decrypted after the mail is received, and the security protection in the whole communication process is ensured.
The flow chart of the high and low security level encryption and decryption is shown in fig. 6.
In the program control application process of the encryptor, the asymmetric encrypted private key is hidden in the storage area of the encryptor, and all operations are in the encryptor, so that the private key is ensured not to be leaked. Without an encryptor, each file encryption uses a pseudorandom number generator algorithm to generate a temporary encrypted symmetric key.
In order to store the encrypted mail which is high in safety and encrypted by the encryptor for a long time, the terminal adopts a private key which is independently generated by the encryptor before leaving a factory and stored in a storage area capable of protecting the private key, and a method for decrypting the received encrypted mail by using the private key is adopted to realize the long-term storage of the encrypted mail and decrypt the encrypted mail into a plaintext at any time when needed.
The communication process of the mail completely follows the network mail protocol, namely MIME protocol.
The encryption and decryption application flow diagram of the whole mail is shown in FIG. 7.
The specific method comprises the following steps:
setting a user to have an encryptor; other users may or may not have encryptors (as in the application framework diagram above). There are two communication implementations in this case.
1. User a has an encryptor and user C (or multiple users) does not.
The symmetric encryption method is adopted, and the key is transmitted in a two-way mode, so that the security of the key is ensured. The method comprises the following specific steps:
1.1 selecting and judging the sending object
The user A inquires whether the mail list of the user A has a public key of a certain user C or not, if the public key is not detected, the true random number generator of the encryptor A is started to generate a prime number, and the prime number is used as a symmetric encryption key. The key is used for calculating through a symmetric algorithm, the text, the attachments and the like of the mail are encrypted, and the sender and the transcriber are not processed. After encryption is finished, network transmission is carried out according to MIME protocol (or private protocol), so that the transmitted addresses except the addressee/copyholder are plaintext, and the rest are ciphertext.
1.2 transfer Key
After the step 1.1, the symmetric key of the one-time pad and the public key of the user a (the initiator) are sent to the user C (the receiver).
Because the transmission of cipher text and key on the network is almost equivalent to plaintext transmission, two-way transmission is adopted. Namely: the mail is sent through the mail agent client software of the terminal. The key can be transmitted by adopting other communication channels to form a dual-parallel communication line which is not crossed with each other so as to increase the communication security.
1.3 processing after accepting the Key
When the user C (or the user in the email address list) receives the email, the email agent client software judges that the email belongs to the ciphertext email according to the data packet identification, and the email content displayed in the window is the ciphertext content (ASCII code) of the email. And at the moment, the user is reminded of the ciphertext mail by the bullet frame, and after the user inputs the ciphertext, the program calls a symmetric encryption algorithm to decrypt the ciphertext. And the decrypted file is recovered according to the requirement of the mail protocol and the corresponding content is displayed at the corresponding position of the mail, so that the decryption work of the one-time pad is completed.
After the decryption is completed, the public key + the mail address of the user A is stored in the recipient list for standby.
2. User a has an encryptor and user B (or multiple users) also has an encryptor.
2.1 when a user B with an encryptor B communicates with a user A for the first time, after the first mail communication is completed by adopting the method 1, further performing public key exchange, namely:
2.1.1 adopting the function of automatically replying the mail to automatically send the public key of the user B to the mailbox of the user A, namely obtaining the public key of the user B.
2.1.2 user A receives the public key notification email, adds the public key and the email address, uses hash calculation, encrypts the hash value with its own private key, and stores the value in the list of the email address book recipients.
2.2 when the mail is sent again, searching the receiver, selecting the public key of the user B (and other users), unlocking the hash value by using the private key after the public key is searched, calculating the sum of the public key and the address by using a hash algorithm, and if the hash values are consistent, indicating that the data and the address of the public key are credible, and then carrying out safe communication.
2.3 generating a prime number with the true random number generator of the encryptor, the prime number serving as a key for symmetric encryption.
And 2.4, encrypting the text/the attachment of the mail by using the key by adopting a symmetric encryption algorithm, and performing hash calculation.
2.5 encrypt the key with user B's public key and then sign the ciphertext with its own private key. After the encryption is completed, the cryptographs are transmitted in a network according to MIME protocol (or proprietary protocol).
2.6 after receiving the ciphertext, user B decrypts the key with its private key first to obtain a symmetrically encrypted key. And then, the cipher text is decrypted by calling an asymmetric encryption algorithm by using the key to obtain plaintext data.
2.7 the user B calculates and compares the plaintext data and the hash value, if the plaintext data and the hash value are not changed, the data are not falsified and forged, the plaintext data is sorted, and the plaintext data is presented at a corresponding position of the mail agent client software, so that all decryption work is completed.
2.8 after the user B receives and decrypts the mail, before closing the mail client, the terminal automatically uses the private key to encrypt the received mail and the symmetric key, and stores the encrypted mail and the symmetric key in the local of the user.
3. Both parties do not have encryptors.
The steps are as follows under the condition that both sides do not have encryption equipment:
3.1 the initiator generates a random number by using a pseudo random number generator;
3.2 judging the random number as prime number, using the prime number as symmetric encryption key;
3.3 encrypting and sending the mail;
3.4 sending the encryption key to a receiver through other channels;
3.5 the receiving party inputs the encryption key to decrypt the ciphertext;
3.6 storing the decrypted plaintext in an inbox of a mail agent according to the mail format plaintext.
4. Method description for encryption and decryption in MIME protocol
Firstly, carrying out data packaging on mail text/attachments and the like in a corresponding window of mail client software to obtain a data package Soc _ S.
And encrypting the data packet Soc _ S by using a method of a security system standard for exchanging digital certificates in a Pkcs #7 public key encryption system according to the syntax of the digital certificates to obtain Soc _ SP.
And packaging Soc _ SP as mail text again. And after the packaging is finished, the encrypted mail is sent to a mail server, and the mail sending process is finished.
The unpacking process is the reverse step of the expression, and the mail unpacking process conforming to the MIME protocol can be completed.

Claims (10)

CN202010312733.4A2020-04-202020-04-20Independent intelligent safety mail terminal and encryption methodActiveCN111541603B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010312733.4ACN111541603B (en)2020-04-202020-04-20Independent intelligent safety mail terminal and encryption method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010312733.4ACN111541603B (en)2020-04-202020-04-20Independent intelligent safety mail terminal and encryption method

Publications (2)

Publication NumberPublication Date
CN111541603A CN111541603A (en)2020-08-14
CN111541603Btrue CN111541603B (en)2022-04-12

Family

ID=71970771

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010312733.4AActiveCN111541603B (en)2020-04-202020-04-20Independent intelligent safety mail terminal and encryption method

Country Status (1)

CountryLink
CN (1)CN111541603B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN115080987B (en)*2021-03-112025-03-04中国移动通信集团山东有限公司 Password management method, device, system, storage medium and computer equipment
CN116032509B (en)*2021-10-272024-08-27中移系统集成有限公司Mail encryption and decryption method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH08251156A (en)*1995-03-131996-09-27Hitachi Ltd E-mail encryption method and encryption system
CN101170401A (en)*2006-10-272008-04-30鸿富锦精密工业(深圳)有限公司 Mail encryption/decryption system and method
CN105323070A (en)*2015-02-092016-02-10北京中油瑞飞信息技术有限责任公司Method for realizing security electronic mail based on digital envelope
US10075469B1 (en)*2015-08-312018-09-11Amazon Technologies, Inc.Assured encrypted delivery

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7305545B2 (en)*2001-02-142007-12-04Globalcerts, LcAutomated electronic messaging encryption system
US20050210246A1 (en)*2004-03-162005-09-22Eastman Kodak CompanySecure email service
JP4235824B2 (en)*2004-09-092009-03-11村田機械株式会社 Encryption device
CN101043512A (en)*2006-03-212007-09-26环达电脑(上海)有限公司Electronic mail system
JP2010522488A (en)*2007-03-202010-07-01デムヴィッチ ソフトウェア,リミテッド ライアビリティー カンパニー Secure electronic messaging system requiring key retrieval to distribute decryption key
US20090217027A1 (en)*2008-02-212009-08-27Zenlok CorporationSafe e-mail for everybody
CN102143486A (en)*2010-01-282011-08-03骆建军Method for realizing cellphone encrypted communication by using memory card
CN102300176B (en)*2011-10-242014-06-11郑州信大捷安信息技术股份有限公司Method and system for enhancing security of email of mobile terminal system based on secure TransFlash (TF) card
CN102438216B (en)*2011-12-262013-11-20郑州信大捷安信息技术股份有限公司Method for enhancing safety of short message, e-mail and voice communication of intelligent mobile phone
CN105516157B (en)*2015-12-162019-05-17上海交通大学Network information security input system and method based on independent encryption
CN106789046B (en)*2017-02-242020-03-17江苏信源久安信息科技有限公司Method for realizing self-generating key pair
CN107888560B (en)*2017-10-122020-12-22深圳市中易通安全芯科技有限公司Mail safe transmission system and method for mobile intelligent terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH08251156A (en)*1995-03-131996-09-27Hitachi Ltd E-mail encryption method and encryption system
CN101170401A (en)*2006-10-272008-04-30鸿富锦精密工业(深圳)有限公司 Mail encryption/decryption system and method
CN105323070A (en)*2015-02-092016-02-10北京中油瑞飞信息技术有限责任公司Method for realizing security electronic mail based on digital envelope
US10075469B1 (en)*2015-08-312018-09-11Amazon Technologies, Inc.Assured encrypted delivery

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种改进的PGP安全电子邮件系统;陈静等;《计算机工程》;20080605(第11期);全文*

Also Published As

Publication numberPublication date
CN111541603A (en)2020-08-14

Similar Documents

PublicationPublication DateTitle
US6904521B1 (en)Non-repudiation of e-mail messages
CN113508563A (en)Block chain based secure email system
KentInternet privacy enhanced mail
JP4659749B2 (en) Identity-based cryptographic messaging system
US8499156B2 (en)Method for implementing encryption and transmission of information and system thereof
US7580980B2 (en)Email system restoring recipient identifier based on identifier-for-disclosure for establishing communication between sender and recipient
JP2010522488A (en) Secure electronic messaging system requiring key retrieval to distribute decryption key
US9712519B2 (en)Efficient encryption, escrow and digital signatures
CA2518025A1 (en)Secure e-mail messaging system
CN101720071A (en)Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN106549858B (en)Instant messaging encryption method based on identification password
CN114006736B (en)Instant communication message protection system and method based on hardware password equipment
CN108011885B (en) An email encryption method and system based on group cryptography
CN101924710A (en)Management system and method for enterprise email box
CN111541603B (en)Independent intelligent safety mail terminal and encryption method
CN114172694A (en) Email encryption and decryption method, system and storage medium
CN108390755A (en)The safe input method of SIM pasting cards based on built-in security chip
CN101369887B (en)E-mail enciphered transmission method
US12432047B2 (en)Method to request sensitive data from a recipient and to establish a secure communication with the recipient
JPH08223152A (en)Ciphering method and cipher information converter
WO2005053254A1 (en)Secure message model
CN115348233A (en)Standard mail system transparent encryption method, medium and computer equipment
CN113923053A (en)Cross-equipment safety synchronization method and system for encrypted mail
CN120238533A (en) A method for sending and receiving attachment files, and a device
CN119135382A (en) End-to-end data encryption and decryption method, device, storage medium and equipment

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp