Movatterモバイル変換


[0]ホーム

URL:


CN114650269B - Mail forwarding method and device based on data processing - Google Patents

Mail forwarding method and device based on data processing
Download PDF

Info

Publication number
CN114650269B
CN114650269BCN202210559578.5ACN202210559578ACN114650269BCN 114650269 BCN114650269 BCN 114650269BCN 202210559578 ACN202210559578 ACN 202210559578ACN 114650269 BCN114650269 BCN 114650269B
Authority
CN
China
Prior art keywords
mail
information
mobile terminal
role
attachment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210559578.5A
Other languages
Chinese (zh)
Other versions
CN114650269A (en
Inventor
何宇
丁立波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Minyu Information Technology Co ltd
Original Assignee
Nanjing Minyu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Minyu Information Technology Co ltdfiledCriticalNanjing Minyu Information Technology Co ltd
Priority to CN202210559578.5ApriorityCriticalpatent/CN114650269B/en
Publication of CN114650269ApublicationCriticalpatent/CN114650269A/en
Application grantedgrantedCritical
Publication of CN114650269BpublicationCriticalpatent/CN114650269B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention provides a mail forwarding method and a device based on data processing.A mail receiving and sending server generates a first display piece according to attribute information of a first attachment and sends the first mail and the first display piece to a second mobile terminal; the mail forwarding server generates a second display piece based on the attribute information of the second attachment, generates a second mail based on the first mail and the forwarding information of the first mail, and the second display piece corresponds to the first forwarding downloading link in the mail forwarding server; the mail forwarding server sends the mail label of the first mail to be forwarded to the mail sending and receiving server, so that the mail sending and receiving server sends the first attachment of the first mail to be forwarded to the mail forwarding server based on the mail label. The mail receiving and sending server and the mail forwarding server can orderly receive, send and forward mails, and ensure the mail forwarding efficiency.

Description

Mail forwarding method and device based on data processing
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data processing-based mail forwarding method and apparatus.
Background
When a mobile terminal such as a mobile phone handles an e-mail, a function frequently used in addition to functions such as receiving, reading, and replying is the transfer of the e-mail. The traditional mail forwarding method generally comprises the following steps: the whole mail to be transmitted is downloaded to local, the information to be expressed by the sender is written, then the information is combined together and transmitted out through the mailbox.
However, due to the limited resources of the mobile terminal, the transmission rate of the wireless network is also low (typically only up to tens of kilobits per second), and for some mails that only need to know the general content and do not need to read the attachment but need to be forwarded, the processing causes time waste and cost increase.
The patent with publication number CN1722711A discloses a method for implementing mail forwarding by a mail proxy server, in which a user writes forwarding mail contents including a mail header, mail contents, and an original mail identifier in a mobile terminal, and requests the mail proxy server to forward a mail. The mail proxy server directly reads the attachment of the original mail to be forwarded from the mail server according to the mail identifier, the attachment does not need to be downloaded to the user terminal for forwarding, the mail attachment can be prevented from being downloaded to the local of the mobile terminal by the method, the data storage capacity of the local of the user terminal is effectively reduced, but the server is disordered in the actual using process of the method, and the mail forwarding efficiency is low. And the local attachment and the undelivered attachment cannot be forwarded when the local attachment and the undelivered attachment are required to be forwarded simultaneously, so that the use scenes are few.
Disclosure of Invention
The invention provides a mail forwarding method and device based on data processing, which can realize the receiving, sending and forwarding of mails in order through a mail receiving and sending server and a mail forwarding server and ensure the mail forwarding efficiency.
In a first aspect of the present invention, a data processing-based email forwarding method is provided, including:
if the mail receiving and sending server judges that the first mobile terminal uploads a first mail with a first attachment, a first display piece is generated according to attribute information of the first attachment, the first mail and the first display piece are sent to the second mobile terminal, and the first display piece corresponds to a first receiving and sending downloading link in the mail receiving and sending server;
if the second mobile terminal is judged to send a forwarding request to the mail forwarding server, the mail forwarding server acquires a first attachment corresponding to a first mail to be forwarded in the mail receiving and sending server;
the mail forwarding server receives a second attachment sent by a second mobile terminal and forwarding information of a first mail, generates a second display piece based on attribute information of the second attachment, generates a second mail based on the first mail and the forwarding information of the first mail, and sends the first display piece, the second display piece and the second mail to a third mobile terminal;
the mail forwarding server sends a mail tag of a first mail to be forwarded to the mail receiving and sending server, so that the mail receiving and sending server sends a first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, the mail forwarding server stores the first attachment, and the mail receiving and sending server deletes the first attachment of the first mail to be forwarded.
Optionally, in a possible implementation manner of the first aspect, if the mail receiving and sending server determines that the first mobile terminal uploads the first mail with the first attachment, the first mobile terminal generates a first display part according to attribute information of the first attachment, and sends the first mail and the first display part to the second mobile terminal, where the first display part corresponds to the first receiving and sending download link in the mail receiving and sending server, the method includes:
creating a first storage unit in a mail receiving and sending server, storing the first attachment in the first storage unit, and generating a corresponding first receiving and sending download link according to the unit information of the first storage unit;
acquiring attribute information of each first accessory, wherein the attribute information comprises a data quantity value of the first accessory and an accessory type of the first accessory;
selecting a corresponding first display image according to the accessory type of the first accessory, attaching a transparent layer with the same size as the first display image to the surface of the first display image, and filling the data quantity value to the transparent layer to generate first display information;
receiving first authentication information generated by a first user based on the first mobile terminal;
responding to the first authentication information, receiving an operation trace of the first user on the transparent layer within a preset time period in real time, and generating first signature information according to the operation trace;
obtaining the first display piece based on the first display image, the first display information and the signature information;
and fusing the first display piece and the first mail and then sending the fused first display piece and the first mail to a second mobile terminal.
Optionally, in a possible implementation manner of the first aspect, the sending the merged first display piece and the first email to the second mobile terminal includes:
acquiring a first number of the first display pieces, and establishing a first display slot position corresponding to the first number in the first mail;
and filling each first display piece to the corresponding first display slot position respectively, and sending the first mail filled with the first display pieces to the second mobile terminal.
Optionally, in a possible implementation manner of the first aspect, the receiving, by the mail forwarding server, a second attachment and forwarding information of a first mail sent by a second mobile terminal, generating a second display based on attribute information of the second attachment, and generating a second mail based on the first mail and the forwarding information of the first mail, where the second display corresponds to a first forwarding download link at the mail forwarding server, includes:
creating a second storage unit in the mail forwarding server, storing the second attachment in the second storage unit, and generating a corresponding first forwarding download link according to the unit information of the second storage unit;
acquiring attribute information of each second accessory, wherein the attribute information comprises a data quantity value of the second accessory and an accessory type of the second accessory;
selecting a corresponding second display image according to the accessory type of the second accessory, attaching a transparent layer with the same size as the second display image on the surface of the second display image, and filling the data quantity value to the transparent layer to generate second display information;
receiving second authentication information generated by a second user based on the second mobile terminal;
responding to the second authentication information, receiving an operation trace of the second user on the transparent layer within a preset time period in real time, and generating second signature information according to the operation trace;
and obtaining the second display piece based on the second display image, the second display information and the signature information.
Optionally, in a possible implementation manner of the first aspect, the sending, by the mail forwarding server, the first display, the second display, and the second mail to a third mobile terminal includes:
establishing a first display slot position corresponding to the second mail in the second mail, and filling a first display piece in the corresponding first display slot position in each second mail;
acquiring a second quantity of the second display pieces, and establishing a second display slot position corresponding to the second quantity in the second mail;
and filling each second display piece to the corresponding second display slot position respectively, and sending a second mail filling the first display piece and the second display piece to the third mobile terminal.
Optionally, in a possible implementation manner of the first aspect, the sending, by the mail forwarding server, a mail tag of the first mail to be forwarded to the mail sending and receiving server, so that the mail sending and receiving server sends, to the mail forwarding server, the first attachment of the first mail to be forwarded based on the mail tag, where the mail forwarding server stores the first attachment, and the mail sending and receiving server performs processing to delete the first attachment of the first mail to be forwarded, including:
creating a third storage unit in the mail forwarding server, storing the first attachment in the third storage unit, and generating a corresponding second forwarding downloading link according to the unit information of the third storage unit;
and deleting the first receiving and sending download link corresponding to the first accessory, and correspondingly storing the second forwarding download link and the first accessory.
Optionally, in a possible implementation manner of the first aspect, the method further includes:
acquiring role information of each terminal to generate a corresponding mail role structure tree, wherein each node in the mail role structure tree has the role information of the corresponding terminal;
acquiring first role information of a first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption strategy;
if any second mobile terminal or third mobile terminal triggers a first receiving and sending download link or a second forwarding download link corresponding to the first accessory, acquiring current identity information of the second mobile terminal or third mobile terminal;
if the current identity information meets the first encryption strategy, the first attachment is sent to a corresponding second mobile terminal or a corresponding third mobile terminal;
and if the current identity information does not meet the first encryption strategy, sending download inquiry information to the first mobile terminal, and if the first mobile terminal feeds back corresponding download agreement information, sending the first attachment to a corresponding second mobile terminal or a corresponding third mobile terminal.
Optionally, in a possible implementation manner of the first aspect, the obtaining first role information of the first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption policy includes:
acquiring a first node in a mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and counting all the second role information to generate a second role set;
and identity encryption is carried out on the first attachment based on the second role set, so that all second role information in all second role sets can download the first attachment.
Optionally, in a possible implementation manner of the first aspect, the obtaining a first node in a mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and performing statistics on all the second role information to generate a second role set includes:
receiving role configuration information uploaded by a first mobile terminal, and selecting third role information corresponding to a mail role structure tree based on the role configuration information;
and updating the second role set according to the third role information so that the second role set comprises the third role information.
In a second aspect of the present invention, a data processing-based mail forwarding apparatus is provided, including:
the sending module is used for enabling the mail receiving and sending server to generate a first display piece according to the attribute information of the first attachment if the first mobile terminal uploads a first mail with a first attachment, and sending the first mail and the first display piece to a second mobile terminal, wherein the first display piece corresponds to a first receiving and sending downloading link in the mail receiving and sending server;
the acquisition module is used for acquiring a first attachment corresponding to a first mail to be forwarded in the mail receiving and sending server by the mail forwarding server if the second mobile terminal is judged to send a forwarding request to the mail forwarding server;
the generating module is used for enabling the mail forwarding server to receive a second attachment and forwarding information of a first mail sent by a second mobile terminal, generating a second display piece based on attribute information of the second attachment, generating a second mail based on the first mail and the forwarding information of the first mail, wherein the second display piece corresponds to a first forwarding downloading link in the mail forwarding server, and the mail forwarding server sends the first display piece, the second display piece and the second mail to a third mobile terminal;
the storage module is used for enabling the mail forwarding server to send the mail tag of the first mail to be forwarded to the mail transmitting and receiving server, so that the mail transmitting and receiving server sends the first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, the mail forwarding server stores the first attachment, and the mail transmitting and receiving server deletes the first attachment of the first mail to be forwarded.
Has the advantages that:
1. the mail receiving and sending server and the mail forwarding server can orderly receive, send and forward mails, ensure the mail forwarding efficiency and forward local attachments and undelivered attachments at the same time; in addition, the scheme can generate a first display piece and a second display piece to briefly display the attachment content when the mail is forwarded; in addition, after the forwarding operation, the method can also directly delete the first attachment in the mail receiving and sending server, so that the data processing amount of the mail receiving and sending server is reduced;
2. the first display piece and the second display piece arranged in the scheme can display and display the file type, the file size and the first authentication information and the second authentication information of the user, and by setting the first authentication information and the second authentication information, on one hand, the responsibility system of the accessory information can be realized, on the other hand, other addressees can be assured to check the content of the second accessory and perform assured operation according to the content of the second accessory; in addition, the scheme can also compare the first authentication information with the second authentication information to ensure the authenticity of the first authentication information and the second authentication information; in addition, the method can also return the mail when the first authentication information and the second authentication information are not added to the first attachment and the second attachment, so as to ensure that the first authentication information and the second authentication information are added;
3. the mail role structure tree set by the scheme can correspond to roles in mail nodes, a first encryption strategy is generated, the attachments are encrypted, the contents of the attachments can be checked only by the corresponding nodes, and the privacy and the safety among the attachments can be improved; in addition, the scheme can also attempt to access the accessory by downloading inquiry information; in addition, the scheme can update the second role set according to the needs of the user, and the flexibility of the scheme is improved.
Drawings
Fig. 1 is a schematic view of a scene provided in this embodiment;
fig. 2 is a schematic flowchart of a data processing-based mail forwarding method according to this embodiment;
fig. 3 is a schematic structural diagram of a data processing-based mail forwarding apparatus provided in this embodiment;
fig. 4 is a schematic diagram of a hardware structure of an electronic device provided in this embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present embodiments more clear, the technical solutions in the present embodiments will be described clearly and completely with reference to the drawings in the present embodiments, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein.
It should be understood that, in various embodiments of the present invention, the size of the sequence number of each process does not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of this embodiment.
It should be understood that in the present application, "comprising" and "having" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, in the present invention, "a plurality" means two or more. "and/or" is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "comprises A, B and C" and "comprises A, B, C" means that A, B, C all comprise, "comprises A, B or C" means comprise one of A, B, C, "comprises A, B and/or C" means comprise any 1 or any 2 or 3 of A, B, C.
It should be understood that in the present invention, "B corresponding to a", "a corresponds to B", or "B corresponds to a" means that B is associated with a, and B can be determined from a. Determining B from a does not mean determining B from a alone, but may be determined from a and/or other information. And the matching of A and B means that the similarity of A and B is greater than or equal to a preset threshold value.
As used herein, "if" may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Referring to fig. 1, a schematic view of a scenario provided in this embodiment includes a mail sending and receiving server and a mail forwarding server, where the mail sending and receiving server is used to receive an initial mail initially sent by a user, and the mail forwarding server is used to forward the initial mail.
Fig. 2 is a schematic flow chart of the data processing-based mail forwarding method according to this embodiment. The execution subject of the present application may include, but is not limited to, at least one of: user equipment, network equipment, etc. The user equipment may include, but is not limited to, a computer, a smart phone, a Personal Digital Assistant (PDA), the above mentioned electronic equipment, and the like. The network device may include, but is not limited to, a single network server, a server group of multiple network servers, or a cloud of numerous computers or network servers based on cloud computing, wherein cloud computing is one type of distributed computing, a super virtual computer consisting of a cluster of loosely coupled computers. The present embodiment does not limit this. The method comprises steps S1 to S4, and specifically comprises the following steps:
s1, if the mail receiving and sending server judges that the first mobile terminal uploads the first mail with the first attachment, a first display piece is generated according to the attribute information of the first attachment, the first mail and the first display piece are sent to the second mobile terminal, and the first display piece corresponds to a first receiving and sending download link in the mail receiving and sending server.
When receiving a first mail with a first attachment uploaded by a first mobile terminal, a mail receiving and sending server in the scheme can generate a first display piece according to attribute information of the first attachment. The first mobile terminal can be a first mobile phone terminal, the first accessory can be an accessory such as a "attendance list", a "payroll" or a "sales list", and the first display part is used for displaying brief contents of the first accessory.
It can be understood that, when a user using the first mobile terminal wants to forward the email to a user corresponding to the second mobile terminal, the email sending and receiving server according to the present solution may send the first email and the first display component to the second mobile terminal, where the first display component corresponds to a first sending and receiving download link in the email sending and receiving server, and the user may download the first attachment corresponding to the first display component through the first sending and receiving download link.
In some embodiments, if the mail receiving and sending server determines that the first mobile terminal uploads the first mail with the first attachment, the first mobile terminal generates a first display part according to the attribute information of the first attachment, and sends the first mail and the first display part to the second mobile terminal, where the first display part corresponds to a first receiving and sending download link in the mail receiving and sending server, including:
creating a first storage unit in a mail receiving and sending server, storing the first attachment in the first storage unit, and generating a corresponding first receiving and sending download link according to the unit information of the first storage unit. The mail receiving and sending server is provided with a plurality of first storage units for storing first attachments, and then generates corresponding first receiving and sending download links by using the unit information of the first storage units, for example, a calling path of the first attachments in the first storage units can be established, the first receiving and sending download links are generated by using the calling path, and when a user clicks the first receiving and sending download links, the user can call the corresponding first attachments in the corresponding first storage units based on the calling path.
And acquiring attribute information of each first accessory, wherein the attribute information comprises a data quantity value of the first accessory and an accessory type of the first accessory. The present solution further obtains a data size value of the first attachment and an attachment type of the first attachment, where the data size value may be, for example, an attachment size of the first attachment, for example, 30kb, and the attachment type may be, for example, "word type", "PDF type", and the like.
Selecting a corresponding first display image according to the accessory type of the first accessory, attaching a transparent layer with the same size as the first display image to the surface of the first display image, and filling the data quantity value to the transparent layer to generate first display information. The scheme is provided with the transparent layer, and the obtained data quantity value can be filled into the transparent layer so as to display the data quantity of the accessory to a user.
And receiving first authentication information generated by the first user based on the first mobile terminal. The first authentication information may be generated by clicking a trigger button on the first mobile terminal after the first user uploads the first accessory, for example, the trigger button may be disposed at an edge of the transparent layer, and the user may generate the first authentication information by clicking the trigger button.
And responding to the first authentication information to receive an operation trace of the first user on the transparent layer within a preset time period in real time, and generating first signature information according to the operation trace. After receiving the first authentication information, the user may perform an operation within the range of the transparent layer to generate an operation trace, where the operation trace may be, for example, a user signature, a user fingerprint, a user signature, and the like, and may represent information actually operated by the user.
And obtaining the first display piece based on the first display image, the first display information and the signature information. The first display part of the scheme displays the file type, the file size and the authentication information of the user.
And fusing the first display piece and the first mail and then sending the fused first display piece and the first mail to a second mobile terminal.
It should be noted that, in the present scheme, by setting the first authentication information, on one hand, the responsibility system of the accessory information can be realized, and on the other hand, other recipient users can be allowed to securely check the content of the first accessory and perform a secure operation according to the content of the first accessory.
For example, the employee a needs to be responsible for the accuracy and authenticity of the content in the first accessory, so that the scheme introduces first authentication information (such as a signature of the employee a and a fingerprint of the employee a) to establish association between the first accessory and the corresponding employee a, and can prevent the first accessory from being maliciously tampered and uploaded by other employees; for another example, after receiving the email of employee a, employee B finds that the first attachment has the first authentication information of employee a, and then employee B may know that the first attachment has authenticity and may perform the next operation with confidence.
In practical application, the scheme may further include an authentication information comparison end, for example, when the employee B needs to verify whether the first authentication information on the first accessory is true, an authentication request may be generated, the first authentication information (for example, a signature or a fingerprint) on the transparent layer is extracted, and then the first authentication information is sent to the authentication information comparison end for comparison, and the authentication information comparison end may feed back an authentication result to the employee B, so as to prevent the user from impersonating the first authentication information of the employee a, and further improve the authenticity of the first accessory.
In some other embodiments, in order to ensure that the first attachment of the email has the first authentication information, when the first user wants to forward the first attachment to the second user, the email sending and receiving server will confirm whether the first attachment has the first authentication information, and if the first attachment does not have the first authentication information, the forwarded email may be returned to the first mobile terminal, and the first mobile terminal is prompted to add the first authentication information. And fusing the first display piece and the first mail and then sending the fused first display piece and the first mail to a second mobile terminal. According to the scheme, after the first display piece is obtained, the first display piece and the first mail can be fused and sent to the second mobile terminal, the second mobile terminal can view approximate data of the first attachment through the first display piece, and a first receiving and sending download link for downloading the first attachment through the first display piece.
In some embodiments, the merging the first display piece and the first email and sending the merged email to the second mobile terminal includes:
and acquiring a first number of the first display pieces, and establishing a first display slot position corresponding to the first number in the first mail. And filling each first display piece to the corresponding first display slot position respectively, and sending the first mail filled with the first display pieces to the second mobile terminal.
It is understood that if there are two accessories, then the present solution would provide two first display slots, and the first accessories may correspond to the first display slots one-to-one.
And S2, if the second mobile terminal is judged to send the forwarding request to the mail forwarding server, the mail forwarding server acquires a first attachment corresponding to the first mail to be forwarded in the mail receiving and sending server.
It can be understood that, when the second mobile terminal is to forward the mail to the third mobile terminal, it is necessary to send a forwarding request to the mail forwarding server, and the mail forwarding server may obtain the first attachment corresponding to the first mail to be forwarded.
And S3, the mail forwarding server receives a second attachment sent by a second mobile terminal and forwarding information of the first mail, generates a second display piece based on attribute information of the second attachment, generates a second mail based on the forwarding information of the first mail and the first mail, corresponds to a first forwarding downloading link on the mail forwarding server by the second display piece, and sends the first display piece, the second display piece and the second mail to a third mobile terminal.
In the scheme, when the second mobile terminal forwards the first mail, the second attachment needs to be inserted and the forwarding information of the first mail needs to be edited, and the first mail forwarding server also receives the second attachment and the forwarding information of the first mail.
The first attachment may be, for example, an "attendance table" sent by employee a holding the first mobile terminal, the second attachment may be, for example, a "payroll" sent by employee B holding the second mobile terminal, and the forwarding information of the first mail may be, for example, an "payroll generated from the attendance table" edited by employee B holding the second mobile terminal.
In the scheme, the mail forwarding server generates a second display piece by using the attribute information of the second attachment, then generates a second mail based on the first mail and the forwarding information of the first mail, and then sends the first display piece, the second display piece and the second mail to the third mobile terminal.
In some embodiments, the receiving, by the mail forwarding server, a second attachment sent by a second mobile terminal and forwarding information of a first mail, generating a second display based on attribute information of the second attachment, and generating a second mail based on the first mail and the forwarding information of the first mail, where the second display corresponds to a first forwarding download link at the mail forwarding server, includes:
and creating a second storage unit in the mail forwarding server, storing the second attachment in the second storage unit, and generating a corresponding first forwarding download link according to the unit information of the second storage unit. The mail receiving and sending server is provided with a plurality of second storage units for storing second attachments, and then generates corresponding first forwarding download links by using the unit information of the second storage units, for example, a calling path of the second attachments in the second storage units can be established, the first forwarding download links are generated by using the calling path, and when a user clicks the first forwarding download links, the corresponding second attachments can be called in the corresponding second storage units based on the calling path.
And acquiring attribute information of each second accessory, wherein the attribute information comprises the data magnitude of the second accessory and the accessory type of the second accessory. The present solution further obtains a data size value of the second attachment and an attachment type of the second attachment, where the data size value may be, for example, an attachment size of the second attachment, for example, 50kb, and the attachment type may be, for example, "word type", "PDF type", and the like.
Selecting a corresponding second display image according to the accessory type of the second accessory, attaching a transparent layer with the same size as the second display image on the surface of the second display image, and filling the data quantity value to the transparent layer to generate second display information. The scheme is provided with the transparent layer, and the obtained data quantity value can be filled into the transparent layer so as to display the data quantity of the accessory to a user.
And receiving second authentication information generated by the second user based on the second mobile terminal. The second authentication information may be generated by clicking a trigger button on the second mobile terminal after the second user uploads the second accessory, for example, the trigger button may be disposed at an edge of the transparent layer, and the user may generate the second authentication information by clicking the trigger button.
And responding to the second authentication information to receive the operation trace of the second user on the transparent layer within a preset time period in real time, and generating second signature information according to the operation trace. After receiving the second authentication information, the user may perform an operation within the range of the transparent layer to generate an operation trace, where the operation trace may be, for example, a user signature, a user fingerprint, a user signature, and the like, and may represent information actually operated by the user.
And obtaining the second display piece based on the second display image, the second display information and the signature information. The second display part of the scheme displays the file type, the file size and the authentication information of the user.
It should be noted that, in the present scheme, by setting the second authentication information, on one hand, the responsibility system of the accessory information can be realized, and on the other hand, other recipient users can be allowed to securely check the content of the second accessory and perform a secure operation according to the content of the second accessory.
For example, the employee B needs to be responsible for the accuracy and authenticity of the content in the second accessory, so that the scheme introduces second authentication information (e.g., a signature of the employee B, a fingerprint of the employee B, etc.) to establish association between the second accessory and the corresponding employee B, and can prevent the second accessory from being maliciously tampered and uploaded by other employees; for another example, after receiving the email of employee B, employee C finds that the second attachment has the second authentication information of employee B, and then employee C may know that the second attachment has authenticity and may perform the next operation with confidence.
In practical application, the scheme may further include an authentication information comparison end, for example, when the employee C needs to verify whether the second authentication information on the second accessory is true, an authentication request may be generated, the second authentication information (for example, a signature or a fingerprint) on the transparent layer is extracted, and then the second authentication information is sent to the authentication information comparison end for comparison, and the authentication information comparison end may feed back an authentication result to the employee C, so as to prevent the user from impersonating the second authentication information of the employee B, and further improve the authenticity of the second accessory.
In some other embodiments, in order to ensure that the second attachment of the email has the second authentication information, when the first user wants to forward the second attachment to the second user, the email forwarding server may confirm whether the second attachment has the second authentication information, and if the second attachment does not have the second authentication information, the forwarded email may be returned to the second mobile terminal, and the second mobile terminal may be prompted to add the second authentication information. In some embodiments, the sending, by the mail forwarding server, the first display part, the second display part, and the second mail to a third mobile terminal includes:
and establishing a first display slot position corresponding to the second mail in the second mail, and filling the first display piece in the corresponding first display slot position in each second mail.
And acquiring a second quantity of the second display pieces, and establishing a second display slot position corresponding to the second quantity in the second mail.
And filling each second display piece to the corresponding second display slot position respectively, and sending a second mail filling the first display piece and the second display piece to the third mobile terminal.
It is understood that if there are two attachments, the present solution would provide two second display slots, and the second attachments may correspond to the second display slots one to one.
And S4, the mail forwarding server sends the mail label of the first mail to be forwarded to the mail sending and receiving server, so that the mail sending and receiving server sends the first attachment of the first mail to be forwarded to the mail forwarding server based on the mail label, the mail forwarding server stores the first attachment, and the mail sending and receiving server deletes the first attachment of the first mail to be forwarded.
When the method and the system execute forwarding operation, the mail forwarding server can want the mail receiving and sending server to send the mail tags to be forwarded, then the mail receiving and sending server can send the first attachments corresponding to the mail tags to the mail forwarding server, the mail forwarding server stores the first attachments, and meanwhile, the mail receiving and sending server deletes the first attachments.
It can be understood that, when the transmission operation is carried out, the first attachment in the mail receiving and sending server can be directly deleted, the data processing amount of the mail receiving and sending server is reduced, and if the first attachment is to be downloaded, the first attachment can be downloaded from the mail transmission server.
In some embodiments, the sending, by the mail forwarding server, a mail tag of a first mail to be forwarded to the mail sending and receiving server, so that the mail sending and receiving server sends a first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, where the mail forwarding server stores the first attachment, and the mail sending and receiving server performs first attachment deletion processing on the first mail to be forwarded, including:
and creating a third storage unit in the mail forwarding server, storing the first attachment in the third storage unit, and generating a corresponding second forwarding downloading link according to the unit information of the third storage unit. According to the scheme, a plurality of third storage units are created in the mail forwarding server, the second attachments are stored, and then corresponding second forwarding downloading links are generated by using unit information of the third storage units, for example, a calling path of the second attachments in the third storage units can be established, the second forwarding downloading links are generated by using the calling path, and when a user clicks the second forwarding downloading links, the corresponding second attachments can be called in the corresponding third storage units based on the calling path.
And deleting the first receiving and sending download link corresponding to the first accessory, and correspondingly storing the second forwarding download link and the first accessory.
In practical application, the scheme considers that the mail has privacy and needs privacy protection, for example, one supervisor needs to receive performance information of 3 salesmen, 3 salesmen need to be sent to the supervisor in a form of mail forwarding, performance information among 3 sales cannot be seen mutually, and each employee can only upload the information of the employee, on the basis of the above embodiment, the scheme provides steps S5 to S9, which are specifically as follows:
s5, obtaining the role information of each terminal and generating the corresponding mail role structure tree, wherein each node in the mail role structure tree has the role information of the corresponding terminal.
In this scheme, the mail role structure tree may include a parent node and a child node, where the role information corresponding to the parent node may be, for example, a supervisor (for example, supervisor a), and the role information corresponding to the child node may be 3 salesmen (for example, employee a, employee B, and employee C) in their department.
S6, obtaining first role information of the first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption strategy.
After the first role information in the mail role structure tree is obtained, the first attachment can be encrypted by using the first role information to obtain a first encryption strategy. It is understood that the first encryption policy may be that the upper dimension node of the node can see the content corresponding to the attachment, and the lower dimension node is invisible, for example, supervisor a can see the attachment content of employee a, employee B, and employee C, but employee a and employee B cannot see each other, so as to ensure the confidentiality of the attachment content among employee a, employee B, and employee C.
In some embodiments, the obtaining first role information of the first mobile terminal in the email role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption policy includes:
and acquiring a first node in the mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and counting all the second role information to generate a second role set. In the scheme, one or more second role information can be contained in the second role set, and the scheme does not limit that all the upper-dimensional nodes in the second role set are the upper-dimensional nodes, but all the upper-dimensional nodes. For example, if the last level upper dimension node of employee a, employee B, and employee C is supervisor a, the last level upper dimension node of supervisor a is leader B, and the second role set is (supervisor a; leader B).
And identity encryption is carried out on the first attachment based on the second role set, so that all second role information in all second role sets can download the first attachment. According to the scheme, the first attachment is encrypted by using the identity of the second role set, so that all second role information in the second role set can download the first attachment.
In some embodiments, the obtaining a first node in the mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and performing statistics on all the second role information to generate a second role set includes:
receiving role configuration information uploaded by a first mobile terminal, and selecting third role information corresponding to a mail role structure tree based on the role configuration information; and updating the second role set according to the third role information so that the second role set comprises the third role information.
In the scheme, the fact that the attachments sent by the employee A may be the attachments which the employee B wants to view together is considered, at this time, the employee A can upload role configuration information by using the first mobile terminal, the role configuration information can be, for example, "the employee A needs the employee B to view the attachments", at this time, corresponding third role information can be extracted as the employee B, and then a second role set corresponding to the employee A is updated (supervisor A; leader B; employee B), that is, the supervisor A, the leader B and the employee B can view the first attachments of the employee A.
And S7, if it is determined that any one of the second mobile terminal or the third mobile terminal triggers the first transceiving download link or the second forwarding download link corresponding to the first accessory, acquiring current identity information of the second mobile terminal or the third mobile terminal. According to the scheme, the downloading request of the first accessory is monitored, and when any one of the second mobile terminal or the third mobile terminal triggers the first receiving and sending downloading link or the second forwarding downloading link corresponding to the first accessory, the current identity information of the second mobile terminal or the third mobile terminal corresponding to the first accessory to be downloaded is inquired.
S8, if the current identity information satisfies the first encryption policy, sending the first attachment to the corresponding second mobile terminal or third mobile terminal. After inquiring the current identity information of the second mobile terminal or the third mobile terminal corresponding to the first attachment to be downloaded, the scheme can judge whether the current identity information meets the first encryption strategy, namely judge whether the current identity information is in the second role set, and if so, the scheme can send the first attachment to the corresponding second mobile terminal or the third mobile terminal.
S9, if the current identity information does not satisfy the first encryption policy, sending a download inquiry message to the first mobile station, and if the first mobile station feeds back corresponding download agreement information, sending the first attachment to the corresponding second mobile station or third mobile station. After inquiring the current identity information of the second mobile terminal or the third mobile terminal corresponding to the first accessory, the method and the system can judge whether the current identity information meets the first encryption strategy, namely judge whether the current identity information is in the second role set, if not, the method and the system can send download inquiry information to the first mobile terminal, wherein the download inquiry information can be 'the download request of the second mobile terminal or the third mobile terminal is agreed', if the first mobile terminal feeds back the corresponding download agreement information, the download agreement information can be 'the download request of the second mobile terminal or the third mobile terminal is agreed', and the first accessory is sent to the corresponding second mobile terminal or the third mobile terminal.
And acquiring the type information of all second mails corresponding to each enterprise in a historical preset time period, wherein the type information is compensation information statistics, sales information statistics and the like. And classifying all the first mails and/or the second mails according to the type information to obtain a mail history type set.
Counting third role information corresponding to each first mobile terminal in a mail history type set, wherein each first mobile terminal may have a plurality of different third role information, counting the total number of mails with any one third role added in each mail history type set to obtain a first mail number, counting the number of mails with the same third role information added in each mail history type set to obtain a second mail number, counting the total number of the third role information added in each mail history type set, calculating the fit coefficient of each third role information compared with the mail history type set by the following formula,
Figure 717519DEST_PATH_IMAGE001
wherein,
Figure 444166DEST_PATH_IMAGE002
the pth third color information is the fit coefficient of the email history type set,
Figure 77273DEST_PATH_IMAGE003
is a weight value of the time, and is,
Figure 771428DEST_PATH_IMAGE004
a time period is preset for the history,
Figure 515393DEST_PATH_IMAGE005
is a standard time period of the time frame,
Figure 362127DEST_PATH_IMAGE006
is a value of a time constant, and,
Figure 432980DEST_PATH_IMAGE007
the weight value of the mail quantity corresponding to the role,
Figure 630743DEST_PATH_IMAGE008
the second mail number corresponding to the nth third color information,
Figure 178399DEST_PATH_IMAGE009
is as follows
Figure 128907DEST_PATH_IMAGE010
The second mail quantity corresponding to the third color information, n is the upper limit value of the third color information in the mail history type set,
Figure 103816DEST_PATH_IMAGE011
in order to be the first number of mail pieces,
Figure 788875DEST_PATH_IMAGE012
a weight value of the mail quantity corresponding to the mail history type set,
Figure 140222DEST_PATH_IMAGE013
a third mail quantity for all mail in the history type set,
Figure 210815DEST_PATH_IMAGE014
is a numerical constant value.
By passing
Figure 356626DEST_PATH_IMAGE015
The difference between the historical preset time period and the standard time period can be obtained if
Figure 856877DEST_PATH_IMAGE015
The larger the proof history is, the longer the preset time period is, at this time
Figure 385816DEST_PATH_IMAGE016
The smaller and thus the smaller the fit factor, i.e. the lower the fit between a character in the set of mail history types and a mail of the corresponding type, by
Figure 327228DEST_PATH_IMAGE017
The ratio of the mail quantity of each third color information to the mail quantity of all third color information can be obtained if
Figure 378360DEST_PATH_IMAGE017
The larger the corresponding role is, the closer the corresponding role is to the set of mail history types, and the invention can be based on
Figure 756121DEST_PATH_IMAGE017
Obtaining the proportion of the number of the mails with the added roles in the history type set of the mails to the number of all the mails, if
Figure 449270DEST_PATH_IMAGE017
The larger the mail is, the more the corresponding third color information is added to the mail of the type. According to the technical scheme provided by the invention, calculation can be carried out by combining multiple dimensions to obtain the fit coefficient of each third triangle and the corresponding mail history type set, and the higher the fit coefficient is, the corresponding third triangle information can be added when the corresponding first mobile terminal sends the mail. By the method, the corresponding third color information can be automatically added according to different mail types sent by different first mobile terminals in each company, and mails of workers are improvedThe transmission efficiency is reduced, and the operation flow is reduced.
And if the fit coefficient of certain third color information in the mail history type set is larger than the preset coefficient, automatically adding the corresponding third color information when the first mobile terminal sends the first mail of the corresponding type.
In the actual operation process, the invention acquires the operation behavior of the first mobile terminal when the first mobile terminal sends the mail and automatically adds the third triangle color information, and deletes the automatically added third triangle color information if the first mobile terminal judges that the added third triangle color information is wrong. And counting the deleted quantity and the undeleted quantity after the third triangle information is automatically added to obtain a first deleting frequency, and if the first deleting frequency is greater than a preset frequency, stopping adding the corresponding third triangle information.
The first deletion frequency is calculated by the following formula,
Figure 714029DEST_PATH_IMAGE018
wherein,
Figure 716489DEST_PATH_IMAGE019
in order to be the first frequency of deletion,
Figure 332279DEST_PATH_IMAGE020
for the amount deleted after the third color information is automatically added,
Figure 297961DEST_PATH_IMAGE021
the number of times the third chroma information is not deleted is automatically added.
According to the technical scheme, the third color information can be dynamically adjusted, whether the automatically added third color information is automatically added or not is processed according to the deleting and non-deleting behaviors of the automatically added third color information by the user, so that the automatically added third color information can be automatically deleted according to the behaviors of the user after the automatically added third color information is automatically added, the automatic continuous updating of the third color information is carried out, and the first mobile terminal is assisted to rapidly send the mails.
Referring to fig. 3, it is a schematic structural diagram of a data processing-based mail forwarding apparatus provided in this embodiment, where the data processing-based mail forwarding apparatus includes:
the sending module is used for enabling the mail receiving and sending server to generate a first display piece according to the attribute information of the first attachment if the first mobile terminal uploads a first mail with a first attachment, and sending the first mail and the first display piece to a second mobile terminal, wherein the first display piece corresponds to a first receiving and sending downloading link in the mail receiving and sending server;
the acquisition module is used for acquiring a first attachment corresponding to a first mail to be forwarded in the mail receiving and sending server by the mail forwarding server if the second mobile terminal is judged to send a forwarding request to the mail forwarding server;
the generating module is used for enabling the mail forwarding server to receive a second attachment and forwarding information of a first mail sent by a second mobile terminal, generating a second display piece based on attribute information of the second attachment, generating a second mail based on the first mail and the forwarding information of the first mail, wherein the second display piece corresponds to a first forwarding downloading link in the mail forwarding server, and the mail forwarding server sends the first display piece, the second display piece and the second mail to a third mobile terminal;
the storage module is used for enabling the mail forwarding server to send the mail tag of the first mail to be forwarded to the mail transmitting and receiving server, so that the mail transmitting and receiving server sends the first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, the mail forwarding server stores the first attachment, and the mail transmitting and receiving server deletes the first attachment of the first mail to be forwarded.
The apparatus in the embodiment shown in fig. 3 can be correspondingly used to perform the steps in the method embodiment shown in fig. 1, and the implementation principle and technical effect are similar, which are not described herein again.
Referring to fig. 4, it is a schematic diagram of a hardware structure of an electronic device provided in this embodiment, where theelectronic device 40 includes: aprocessor 41,memory 42 and computer programs; wherein
Amemory 42 for storing the computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that implements the above method.
Aprocessor 41 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made in particular to the description relating to the preceding method embodiment.
Alternatively, thememory 42 may be separate or integrated with theprocessor 41.
When thememory 42 is a device independent of theprocessor 41, the apparatus may further include:
abus 43 for connecting thememory 42 and theprocessor 41.
The present invention also provides a readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (7)

1. A mail forwarding method based on data processing is characterized by comprising the following steps:
if the mail receiving and sending server judges that the first mobile terminal uploads a first mail with a first attachment, a first display piece is generated according to attribute information of the first attachment, the first mail and the first display piece are sent to the second mobile terminal, and the first display piece corresponds to a first receiving and sending downloading link in the mail receiving and sending server;
if the second mobile terminal is judged to send a forwarding request to the mail forwarding server, the mail forwarding server acquires a first attachment corresponding to a first mail to be forwarded in the mail receiving and sending server;
the mail forwarding server receives a second attachment sent by a second mobile terminal and forwarding information of a first mail, generates a second display piece based on attribute information of the second attachment, generates a second mail based on the forwarding information of the first mail and the first mail, corresponds to a first forwarding downloading link on the mail forwarding server by the second display piece, and sends the first display piece, the second display piece and the second mail to a third mobile terminal;
the mail forwarding server sends a mail tag of a first mail to be forwarded to the mail receiving and sending server, so that the mail receiving and sending server sends a first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, the mail forwarding server stores the first attachment, and the mail receiving and sending server deletes the first attachment of the first mail to be forwarded;
further comprising:
acquiring role information of each terminal to generate a corresponding mail role structure tree, wherein each node in the mail role structure tree has the role information of the corresponding terminal;
acquiring first role information of a first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption strategy;
if any second mobile terminal or third mobile terminal triggers a first receiving and sending download link or a second forwarding download link corresponding to the first accessory, acquiring current identity information of the second mobile terminal or third mobile terminal;
if the current identity information meets the first encryption strategy, the first attachment is sent to a corresponding second mobile terminal or a corresponding third mobile terminal;
if the current identity information does not meet the first encryption strategy, downloading inquiry information is sent to the first mobile terminal, and if the first mobile terminal feeds back corresponding downloading agreement information, the first attachment is sent to a corresponding second mobile terminal or a corresponding third mobile terminal;
the acquiring first role information of the first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption strategy includes:
acquiring a first node in a mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and counting all the second role information to generate a second role set;
identity encrypting the first attachment based on the second role set so that all second role information in all second role sets can download the first attachment;
the obtaining of the first node in the mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and counting all the second role information to generate a second role set includes:
receiving role configuration information uploaded by a first mobile terminal, and selecting third role information corresponding to a mail role structure tree based on the role configuration information;
updating the second role set according to the third role information so that the second role set comprises the third role information;
further comprising:
acquiring type information of all second mails corresponding to each enterprise in a historical preset time period, wherein the type information is a salary information statistic class and a sales information statistic class, and classifying all first mails and/or all second mails according to the type information to obtain a mail historical type set;
counting third role information corresponding to each first mobile terminal in a mail history type set, wherein each first mobile terminal has a plurality of different third role information, counting the total number of mails with any third role added in each mail history type set to obtain a first mail number, counting the number of mails with the same third role information added in each mail history type set to obtain a second mail number, counting the total number of the third role information added in each mail history type set, calculating the fit coefficient of each third role information compared with the mail history type set by the following formula,
Figure FDA0003726671950000031
wherein, yp The p-th third color information is compared with the fit coefficient of the mail history type set, k1 Is a time weight value, t1 Presetting a time period, t, for history2 Is a standard time period, c1 Is a value of a time constant, k2 Weight value of mail quantity, s, corresponding to the rolep The second mail number, s, corresponding to the pth third color informationn The second mail quantity corresponding to the nth third color information, n is the upper limit value of the third color information in the mail history type set,
Figure FDA0003726671950000032
is the first mail quantity, k3 Weight value, x, of mail quantity corresponding to mail history type set1 Third mail quantity for all mails in the history type set, c2 Is a constant value of quantity;
if the fit coefficient of certain third color information in the mail history type set is larger than a preset coefficient, automatically adding the corresponding third color information when the first mobile terminal sends the first mail of the corresponding type;
the method comprises the steps that when a first mobile terminal sends a mail and automatically adds third triangular color information, the operation behavior of the first mobile terminal is obtained, if the first mobile terminal judges that the added third triangular color information is wrong, the automatically added third triangular color information is deleted at the moment, the deleted number and the undeleted number after the third triangular color information is automatically added are counted to obtain a first deleting frequency, and if the first deleting frequency is larger than a preset frequency, the addition of the corresponding third triangular color information is stopped;
the first deletion frequency is calculated by the following formula,
Figure FDA0003726671950000033
wherein p is1 Is the first deletion frequency, z1 For the number of deletions after automatic addition of third chrominance information, z2 The number of times the third chroma information is not deleted is automatically added.
2. The data-processing-based mail forwarding method of claim 1,
the mail receiving and dispatching server is if judge that first mobile terminal uploads the first mail that has first annex, according to the attribute information generation first display piece of first annex, will first mail, first display piece send to the second mobile terminal, first display piece corresponds at mail receiving and dispatching server has first receiving and dispatching download link, includes:
creating a first storage unit in a mail receiving and sending server, storing the first attachment in the first storage unit, and generating a corresponding first receiving and sending download link according to the unit information of the first storage unit;
acquiring attribute information of each first accessory, wherein the attribute information comprises a data quantity value of the first accessory and an accessory type of the first accessory;
selecting a corresponding first display image according to the accessory type of the first accessory, attaching a transparent layer with the same size as the first display image to the surface of the first display image, and filling the data quantity value to the transparent layer to generate first display information;
receiving first authentication information generated by a first user based on the first mobile terminal;
responding to the first authentication information, receiving an operation trace of the first user on the transparent layer within a preset time period in real time, and generating first signature information according to the operation trace;
obtaining the first display piece based on the first display image, the first display information and the signature information;
and fusing the first display piece and the first mail and then sending the fused first display piece and the first mail to a second mobile terminal.
3. The data-processing-based mail forwarding method of claim 2,
the step of fusing the first display piece and the first mail and then sending the fused first display piece and the first mail to a second mobile terminal comprises the following steps:
acquiring a first number of the first display pieces, and establishing a first display slot position corresponding to the first number in the first mail;
and filling each first display piece to the corresponding first display slot position respectively, and sending the first mail filled with the first display pieces to the second mobile terminal.
4. The data-processing-based mail forwarding method of claim 3,
the mail forwarding server receives a second attachment sent by a second mobile terminal and forwarding information of a first mail, generates a second display piece based on attribute information of the second attachment, generates a second mail based on the forwarding information of the first mail and the first mail, and corresponds to a first forwarding download link in the mail forwarding server, including:
creating a second storage unit in the mail forwarding server, storing the second attachment in the second storage unit, and generating a corresponding first forwarding download link according to the unit information of the second storage unit;
acquiring attribute information of each second accessory, wherein the attribute information comprises a data quantity value of the second accessory and an accessory type of the second accessory;
selecting a corresponding second display image according to the accessory type of the second accessory, attaching a transparent layer with the same size as the second display image on the surface of the second display image, and filling the data quantity value to the transparent layer to generate second display information;
receiving second authentication information generated by a second user based on the second mobile terminal;
responding to the second authentication information, receiving an operation trace of the second user on the transparent layer within a preset time period in real time, and generating second signature information according to the operation trace;
and obtaining the second display piece based on the second display image, the second display information and the signature information.
5. The data-processing-based mail forwarding method of claim 4,
the mail forwarding server sends the first display piece, the second display piece and the second mail to a third mobile terminal, and the method comprises the following steps:
establishing a first display slot position corresponding to the second mail in the second mail, and filling a first display piece in the corresponding first display slot position in each second mail;
acquiring a second quantity of the second display pieces, and establishing a second display slot position corresponding to the second quantity in the second mail;
and filling each second display piece to the corresponding second display slot position respectively, and sending a second mail filling the first display piece and the second display piece to the third mobile terminal.
6. The data-processing-based mail forwarding method of claim 4,
the method for deleting the first attachment of the first mail to be forwarded by the mail forwarding server includes the steps that the mail forwarding server sends a mail tag of the first mail to be forwarded to the mail forwarding server, so that the mail forwarding server sends the first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, the mail forwarding server stores the first attachment, and the mail forwarding server deletes the first attachment of the first mail to be forwarded, and the method includes the steps that:
creating a third storage unit in the mail forwarding server, storing the first attachment in the third storage unit, and generating a corresponding second forwarding downloading link according to the unit information of the third storage unit;
and deleting the first receiving and sending download link corresponding to the first accessory, and correspondingly storing the second forwarding download link and the first accessory.
7. A data processing-based mail forwarding apparatus, comprising:
the sending module is used for enabling the mail receiving and sending server to generate a first display piece according to the attribute information of the first attachment if the first mobile terminal uploads a first mail with a first attachment, and sending the first mail and the first display piece to a second mobile terminal, wherein the first display piece corresponds to a first receiving and sending downloading link in the mail receiving and sending server;
the acquisition module is used for acquiring a first attachment corresponding to a first mail to be forwarded in the mail receiving and sending server by the mail forwarding server if the second mobile terminal is judged to send a forwarding request to the mail forwarding server;
the generating module is used for enabling the mail forwarding server to receive a second attachment and forwarding information of a first mail sent by a second mobile terminal, generating a second display piece based on attribute information of the second attachment, generating a second mail based on the first mail and the forwarding information of the first mail, wherein the second display piece corresponds to a first forwarding downloading link in the mail forwarding server, and the mail forwarding server sends the first display piece, the second display piece and the second mail to a third mobile terminal;
the storage module is used for enabling the mail forwarding server to send a mail tag of a first mail to be forwarded to the mail transmitting and receiving server so that the mail transmitting and receiving server can send a first attachment of the first mail to be forwarded to the mail forwarding server based on the mail tag, the mail forwarding server stores the first attachment, and the mail transmitting and receiving server deletes the first attachment of the first mail to be forwarded;
further comprising:
acquiring role information of each terminal to generate a corresponding mail role structure tree, wherein each node in the mail role structure tree has the role information of the corresponding terminal;
acquiring first role information of a first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption strategy;
if any second mobile terminal or third mobile terminal triggers a first receiving and sending download link or a second forwarding download link corresponding to the first accessory, acquiring current identity information of the second mobile terminal or third mobile terminal;
if the current identity information meets the first encryption strategy, the first attachment is sent to a corresponding second mobile terminal or a corresponding third mobile terminal;
if the current identity information does not meet the first encryption strategy, downloading inquiry information is sent to the first mobile terminal, and if the first mobile terminal feeds back corresponding downloading agreement information, the first attachment is sent to a corresponding second mobile terminal or a corresponding third mobile terminal;
the acquiring first role information of the first mobile terminal in the mail role structure tree, and after the first mobile terminal uploads the first attachment, encrypting the first attachment based on the first role information to obtain a first encryption strategy includes:
acquiring a first node in a mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and counting all the second role information to generate a second role set;
identity encrypting the first attachment based on the second role set so that all second role information in all second role sets can download the first attachment;
the obtaining of the first node in the mail role structure tree corresponding to the first role information, selecting all upper dimension nodes of the first node as corresponding second role information, and counting all the second role information to generate a second role set includes:
receiving role configuration information uploaded by a first mobile terminal, and selecting third role information corresponding to a mail role structure tree based on the role configuration information;
updating the second role set according to the third role information so that the second role set comprises the third role information;
further comprising:
the method comprises the steps of obtaining type information of all second mails corresponding to each enterprise in a historical preset time period, wherein the type information is a salary information statistic class and a sales information statistic class, and classifying all first mails and/or all second mails according to the type information to obtain a mail historical type set;
counting third role information corresponding to each first mobile terminal in a mail history type set, wherein each first mobile terminal has a plurality of different third role information, counting the total number of mails with any third role added in each mail history type set to obtain a first mail number, counting the number of mails with the same third role information added in each mail history type set to obtain a second mail number, counting the total number of the third role information added in each mail history type set, calculating the fit coefficient of each third role information compared with the mail history type set by the following formula,
Figure FDA0003726671950000081
wherein, yp The p-th third color information is compared with the fit coefficient of the mail history type set, k1 Is a time weight value, t1 Presetting a time period, t, for history2 Is a standard time period, c1 Is a value of a time constant, k2 Weight value of mail quantity, s, corresponding to the rolep The second mail number, s, corresponding to the pth third color informationn The second mail quantity corresponding to the nth third color information, n is the upper limit value of the third color information in the mail history type set,
Figure FDA0003726671950000082
is the first mail quantity, k3 Weight value of mail quantity, x, corresponding to history type set of mail1 Third mail quantity for all mails in the history type set, c2 Is a constant value of quantity;
if the fit coefficient of certain third color information in the mail history type set is larger than a preset coefficient, automatically adding the corresponding third color information when the first mobile terminal sends the first mail of the corresponding type;
the method comprises the steps that when a first mobile terminal sends a mail and automatically adds third triangular color information, the operation behavior of the first mobile terminal is obtained, if the first mobile terminal judges that the added third triangular color information is wrong, the automatically added third triangular color information is deleted at the moment, the deleted number and the undeleted number after the third triangular color information is automatically added are counted to obtain a first deleting frequency, and if the first deleting frequency is larger than a preset frequency, the addition of the corresponding third triangular color information is stopped;
the first deletion frequency is calculated by the following formula,
Figure FDA0003726671950000091
wherein p is1 Is the first deletion frequency, z1 For the number deleted after automatic addition of the third chrominance information, z2 The number of times the third chroma information is not deleted is automatically added.
CN202210559578.5A2022-05-232022-05-23Mail forwarding method and device based on data processingActiveCN114650269B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202210559578.5ACN114650269B (en)2022-05-232022-05-23Mail forwarding method and device based on data processing

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202210559578.5ACN114650269B (en)2022-05-232022-05-23Mail forwarding method and device based on data processing

Publications (2)

Publication NumberPublication Date
CN114650269A CN114650269A (en)2022-06-21
CN114650269Btrue CN114650269B (en)2022-08-09

Family

ID=81997011

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202210559578.5AActiveCN114650269B (en)2022-05-232022-05-23Mail forwarding method and device based on data processing

Country Status (1)

CountryLink
CN (1)CN114650269B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN115474241B (en)*2022-08-222025-02-25北京邮电大学 A method for automatic machine caching

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102025647A (en)*2009-09-172011-04-20中国长城工业总公司System and method for mail sending and receiving
CN102067103A (en)*2008-04-142011-05-18隐私数据系统公司Improved certified email messages and attachments
CN113194104A (en)*2021-06-302021-07-30南京敏宇数行信息技术有限公司Secure remote access system, method, computer equipment and storage medium

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6915333B2 (en)*2001-12-142005-07-05International Business Machines CorporationMethod of managing attached document
CN1722711A (en)*2005-07-272006-01-18北京立通无限科技有限公司Method for implementing mail forwarding by mail proxy server
CN100512234C (en)*2005-11-222009-07-08腾讯科技(深圳)有限公司A transmission method and system for attachment of multimedia mail
CN101098313B (en)*2006-06-302011-08-10华为技术有限公司Mail transmitting method and system
US8793483B2 (en)*2010-06-012014-07-29Morgan StanleyComputer-based, automated workflow system for sending secure reports
EP2448202B1 (en)*2010-10-292014-07-16BlackBerry LimitedForwarding E-Mail From A Wireless Device
CN103441919A (en)*2013-07-242013-12-11佳都新太科技股份有限公司Mode that Android client directly plays accessory of mail based on IMAP4 mail protocol
CN103716228A (en)*2013-12-162014-04-09苏州工业园区服务外包职业学院Mail transmission method, mail gateway and mail transmission system
GB2530685A (en)*2014-04-232016-03-30Intralinks IncSystems and methods of secure data exchange
US10164920B2 (en)*2014-05-302018-12-25Apple Inc.Message attachment management
CN104378241A (en)*2014-11-272015-02-25四川中时代科技有限公司Multi-protocol information decoding system on basis of IP (internet protocol) data packets
CN106209606B (en)*2016-08-312019-11-12北京深思数盾科技股份有限公司A kind of method, terminal and system for using WEB mail safely
CN112291279B (en)*2020-12-312021-04-06南京敏宇数行信息技术有限公司Router intranet access method, system and equipment and readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102067103A (en)*2008-04-142011-05-18隐私数据系统公司Improved certified email messages and attachments
CN102025647A (en)*2009-09-172011-04-20中国长城工业总公司System and method for mail sending and receiving
CN113194104A (en)*2021-06-302021-07-30南京敏宇数行信息技术有限公司Secure remote access system, method, computer equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Android平台上邮件客户端的设计与实现;许金喜;《CNKI中国知网》;20140915;全文*
The E-mail System Security Based on Data Analysis;Li Bo;《百度学术》;20151231;全文*
基于SVM的电子邮件分类系统研究;张洪军;《百度学术》;20070814;全文*

Also Published As

Publication numberPublication date
CN114650269A (en)2022-06-21

Similar Documents

PublicationPublication DateTitle
US20240073172A1 (en)Encoding data in email headers
US11196784B2 (en)Method, apparatus and system for creating discussion group based on instant messaging
US8943144B2 (en)Consolidating duplicate messages for a single destination on a computer network
US9712475B2 (en)Data governance for email systems
US10187331B1 (en)Determining user information from automated replies
US9232016B2 (en)Undoing sent communications
CN114124861A (en)Message group sending method and device, computer equipment and storage medium
CN100361476C (en)Method for writing, browsing, answering and transmitting E-mail and E-mail customer machine
CN102594716B (en)A kind of transmission method, system and equipment of instant communication message
CN110519154A (en)Data transmission method for uplink, device, equipment and computer readable storage medium
CN114650269B (en)Mail forwarding method and device based on data processing
CN113256240B (en)Message processing method and device and server
CN111641548B (en)Method, device and system for processing enterprise collaborative office mails
CN111010336A (en)Massive mail analysis method and device
CN111641547B (en)Mail processing method, client, server and system
US8713122B2 (en)Message value indicator
JP2005284454A (en)Junk e-mail distribution preventive system, and information terminal and e-mail server in the system
CN117459489A (en)Mail processing method, mail processing device, computer equipment and storage medium
KR20200030743A (en)Method and apparatus for cooperating with e-mail to implement a collaborative system
CN114430395A (en)Flow control method, device and equipment and intelligent traffic management equipment
JP2004054664A (en) E-mail management method, system, program, and recording medium
TW201644234A (en)Email handling method, device and system
CN112570287A (en)Garbage classification method and device
CN119690367B (en)Object sharing method, object display method, device, electronic equipment and medium
CN110110240A (en)Establish the method and apparatus of social networks

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
TR01Transfer of patent right

Effective date of registration:20231205

Address after:Room 1601-1604-013, building 3, yunmi City, 19 ningshuang Road, Yuhuatai District, Nanjing City, Jiangsu Province, 210000

Patentee after:Nanjing Minyu Information Technology Co.,Ltd.

Patentee after:YOZOSOFT CO.,LTD.

Address before:Room 1601-1604-013, building 3, yunmi City, 19 ningshuang Road, Yuhuatai District, Nanjing City, Jiangsu Province, 210000

Patentee before:Nanjing Minyu Information Technology Co.,Ltd.

TR01Transfer of patent right
TR01Transfer of patent right

Effective date of registration:20240130

Address after:Room 1601-1604-013, building 3, yunmi City, 19 ningshuang Road, Yuhuatai District, Nanjing City, Jiangsu Province, 210000

Patentee after:Nanjing Minyu Information Technology Co.,Ltd.

Country or region after:China

Address before:Room 1601-1604-013, building 3, yunmi City, 19 ningshuang Road, Yuhuatai District, Nanjing City, Jiangsu Province, 210000

Patentee before:Nanjing Minyu Information Technology Co.,Ltd.

Country or region before:China

Patentee before:YOZOSOFT CO.,LTD.

TR01Transfer of patent right

[8]ページ先頭

©2009-2025 Movatter.jp