[go: up one dir, main page]

CN102413064A - Browser control-based webmail signing encrypting method - Google Patents

Browser control-based webmail signing encrypting method Download PDF

Info

Publication number
CN102413064A
CN102413064A CN2010102901517A CN201010290151A CN102413064A CN 102413064 A CN102413064 A CN 102413064A CN 2010102901517 A CN2010102901517 A CN 2010102901517A CN 201010290151 A CN201010290151 A CN 201010290151A CN 102413064 A CN102413064 A CN 102413064A
Authority
CN
China
Prior art keywords
mail
webmail
browser
certificate
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102901517A
Other languages
Chinese (zh)
Inventor
兰雨晴
王林
张永军
张文通
王国珑
董军平
魏达
夏颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Standard Software Co Ltd
Original Assignee
SHANGHAI ZHONGBIAO SOFTWARE CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI ZHONGBIAO SOFTWARE CO Ltd filed Critical SHANGHAI ZHONGBIAO SOFTWARE CO Ltd
Priority to CN2010102901517A priority Critical patent/CN102413064A/en
Publication of CN102413064A publication Critical patent/CN102413064A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a browser control-based webmail signing encrypting method, which comprises the following steps that: on the premise that the application habit of a user is not changed, when a mail is transmitted, mail content is firstly written by the user in a web page of a browser, then the mail is signed and/or encrypted by a browser control to obtain a mail of an SMIME format, and finally the mail is transmitted to the webmail by the control; and when a mail is received, the mail is firstly downloaded by the control, then the mail of the SMIME format is verified and/or decrypted, and finally the mail content is displayed in the web page of the browser. A certificate and a private key for the signing and encryption process can be stored in a local file and also can be stored in a special device (such as a USB key), a public key system can be additionally deployed by a certificate authority (CA) server and also can be centralized to deploy on a webmail. By utilizing the control, the signature and the encryption functions of the mail are incorporated in the webmail, so a safe mail system can be used by the user through the webmail.

Description

A kind of webmail mail signature encryption method based on browser control part
Technical field
The present invention relates to the safety of electronic mail field, especially a kind of with browser control part realization webmail mail signature method of encrypting.
Background technology
The safety of Email is the field that people pay close attention to always, comprises anti-stealing, and is anti-tamper, aspects such as anti-repudiation.Existing public-key cryptography scheme and SMIME agreement can certified mail confidentiality; Integrality and non-repudiation; Client software realizes but all be based on; That is to say if hope Email is carried out the cooperation that digital signature, encryption or deciphering must have e-mail program (such as Outlook Express),, have ease of use issues for client software; In order to solve the problem of ease for use; Generally all adopt web mail; The main advantage of web mail is exactly to go into the Computer Processing mail of the Internet through using any All-China Federation of Taiwan Compatriots; If yet using web mode receiving and dispatching mail, digital authenticating is just probably treated as a such annex of smime.p7s, thereby has the potential safety hazard of mail in transmission course.How to make mailing system more easy-to-use, the safety of accomplishing mail simultaneously is the emphasis that the present invention will solve.
Summary of the invention
For addressing the above problem, the object of the present invention is to provide a kind of method, make that Email can just be signed on user's the browser in the client of webmail, cryptographic operation, be sent on the web server host through webmail then; Receiving course is to download mail from the web server too, through checking, the decryption oprerations of browser control part, gives the user by browser display, if fail correct deciphering or checking, explains that there is safety problem in this mail.
Another important content provided by the invention is that needed certificate of encrypted signature and private key can be stored in (like USBKEY) in the special hardware device; Can more comprehensively guarantee fail safe and ease for use like this; The user only needs USBKEY is inserted any PC, just can receive and dispatch secure e-mail easily through its browser.
For reaching above-mentioned requirements; A kind of webmail mail signature encryption method based on browser control part of the present invention is that the user is when sending mail; Pass through control; Send the signature of SMIME form and/or the mail of encryption to webmail, when receiving mail, receive mail, and the mail of SMIME form is verified and/or deciphered from webmail through control; And when sending and receive mail, the user writes mail through browser page, and this control shows mail through browser page.
Wherein, the user is preferably through control certificate of utility and private key login when login webmail system.
The logical interface of can crossing of this control uses hardware encipher equipment or uses mobile certificate equipment.
The encapsulation and the parsing of the MIME form of mail also can be provided for this control of compatible surface mail.
And this control to be preferably in whole use be user transparent.
This hardware encipher equipment or mobile certificate equipment are smart card or USBKEY.
Webmail provides downloading and installing of this control, and whether webmail can control control and open.
This encrypted signature algorithm can use any existing public key algorithm.
Need the encrypted certificate of request to obtain, or dispose by webmail is concentrated by the signature mail that the other side sends; CA certificate that checking needs and CRL obtain by request CA server or dispose by webmail is concentrated.
Useful technique effect of the present invention is:
1, by carrying out alternately through control and webmail server; Mail carries out the encrypted signature operation in the browser control part of client; Carry out data interaction through HTTP request with webmail, safety that both can certified mail does not change user's use habit again.
2, be highly susceptible to disposing and using, control can be downloaded and upgrade at any time, and USBKEY once upgrades, and repeatedly uses, and the certificate part both can realize through disposing the CA server, also can concentrate to dispose through webmail and realize.
3, can freely customize high-intensity AES, the user can control the unlatching of encrypted signature voluntarily.
4, for rough draft, to reply, the mail under the situation such as forwarding can carry out the encrypted signature operation equally.
Utilize the present invention, can under the prerequisite that does not change user's use habit, easily carry out the encrypted signature operation of mail.
Description of drawings
Fig. 1 realizes the general flow chart that mail signature is encrypted for the present invention;
Fig. 2 is a system assumption diagram of the present invention;
Fig. 3 is more new password stream cipher journey figure of the present invention;
Fig. 4 is certificate private key login process figure of the present invention;
Fig. 5 is mail transmission flow figure of the present invention;
Fig. 6 is a mail reception flow chart of the present invention.
Embodiment
For the object of the invention, technical scheme and advantage are understood better, now with specific embodiment also in conjunction with the accompanying drawings, specify as follows:
Design of the present invention is to provide a kind of method; Make and write mail through browser page; And Email can just be signed on user's the browser in the client of webmail, cryptographic operation, is sent on the web server host through webmail then; Receiving course is to download mail from the web server too, through checking, decryption oprerations, gives the user by browser display, if fail correct deciphering or checking, explains that there is safety problem in this mail.In order to realize this functional sequence; Used the browser control part technology; This technology can be the functional module of browser extension through authentication through the navigator product interface, and the present invention is encapsulated into product safety transmission and encryption and decryption flow process in the browser control part by this technology; Make complicated originally and bulky Mail Clients product can be achieved in webmail with the size of thousands of bytes, and whole signature encryption flow processing procedure is fully to user transparent.
And during login webmail system, the user can use traditional account number and password mode login, in order to ensure safety, is preferably the user and can passes through control, and certificate of utility and private key are logined.System can carry out encrypted signature operation and carry out data interaction through the HTTP request with webmail having in the browser control part of mail at client functionality like this, has both guaranteed the safety of mail, does not change user's use habit again.Whether wherein control is preferably to be provided by webmail and downloads and installs, and can control this system control and open.
Wherein control can use hardware encipher equipment such as smart card through interface, also can use mobile certificate equipment such as USBKEY.
At first the present invention implements to download and install a control earlier, below with the user through control certificate of utility and private key log on as the example explanation.
Fig. 1 realizes the general flow chart that mail signature is encrypted for the present invention; When sending mail; The user writes earlier Mail Contents s101 in the page of browser; Forward then that browser control part is signed to mail to and/or cryptographic operation obtains the mail s102 of SMIME form, by control mail is sent to webmail s103 at last; When receiving mail, download mail s104 by control earlier equally, again the mail of SMIME form is verified and/or decryption oprerations s105, at last Mail Contents is presented at s106 in the page of browser.
Fig. 2 is a system assumption diagram of the present invention, and the present invention has provided a kind of better mail signature encipherment scheme on architecture, in the face of user's just browser 101; Control 102 is hidden in the browser back; The user can pass through browser and web server 105 interaction datas, mainly is other data except that mail, like script file; Interface patterns etc. also comprise non-secure e-mail.For secure e-mail, carry out mutual through control 102 and web server.Control also just carries out the request 104 of http data with the web server, and then through the smtp agreement mail is sent to smpt server 106 by webmail, and webmail is simultaneously through the mail on the imap consultative management imap server 107.
In needs sender certificate and private key, control is searched (103) in USBKEY, and in order to guarantee the safety of private key, private key is unreadable in usbkey, can only use (signature or deciphering) through the interface that usbkey provides.Use addressee's certificate at needs, CA certificate, in the time of CRL, control obtains through webmail inquiry certificate repository 108.
Below in conjunction with the concrete steps (generation of certificate private key that is elaborated; And to usbkey perfusion certificate private key; With insert in certificate repository that more new authentication is not in the discussion scope of this paper, the present invention supposes user's certificate, private key; All available with the server certificate repository), mainly be divided into following four processes:
One, when the user lands for the first time, or behind the change account number password, needs to upgrade user's password ciphertext field.
Referring to Fig. 3, enumerate the certificate (among the USBKEY a plurality of certificates can be arranged) among the USBKEY earlier, the mailbox tabulation that certificate is bound shows user s203, by the user select the certificate that will use.At step s204; The user imports traditional account number password, and input guarantees that the password of twice input is consistent once more, uses this password of the public key encryption s205 in the user-selected certificate then; The algorithm that algorithm is supported for this PKI; Password ciphertext after will encrypting at last sends to webmail, and webmail is saved in its attribute as this user in the subscriber's meter.
This method is supported traditional account number password login and certificate private key login simultaneously, and the login of account number password needs subscriber mailbox name and entry password, the certificate private key login certificate of necessity and private key password (PIN code).The user is behind change account number password, and webmail can empty this user's password ciphertext field, and doing like this is in order to guarantee the user when certificate of necessity private key is logined, can trigger process one, see process two for details.
Two, the user is with certificate private key login webmail process.
Referring to Fig. 4, in the first two steps of login process, be equally enumerate earlier certificate s302 and user among the USBKEY select the certificate s303 that will use.At step s304, the name that need bind with this certificate is as logon account, the password ciphertext of in database, inquire about this user through webmail, if ciphertext does not exist, the s204 step that then goes to procedure in continues execution; If ciphertext exists, then take out this ciphertext, by the pairing private key decrypting ciphertext of certificate user-selected among the USBKEY, the result of deciphering is account's a entry password.In step 307, send account number and entry password and login with checking to webmail.
This process can guarantee that the people who only has correct private key can login, and personal certificate is being represented individual's identity, and the pairing private key of certificate can not be forged, so this process has guaranteed the safety of login.Carry in order to adapt to various situation, this control also can supply the encapsulation and the parsing of the MIME form of mail, and can support browser as much as possible.For example, also can use traditional password mode to login, be preferably the mail that it can not send encrypted signature is set, have only the user who logins through the mode of certificate private key could send the mail of encrypted signature as USBKEY not at one's side the time.
Three, the user sends the encrypted signature mail to the webmail process.
Referring to Fig. 5, the user writes mail s402 on the page of browser, and the mail that this envelope is being write can be the rough draft mail, the mail of answer, and the mail of forwarding is finished writing the MIME form is carried out in the back by control encapsulation s403.If this envelope mail needs to encrypt, and need be parameter with the address of the addressee of this mail, in certificate repository, ask list of cert by webmail, encrypt this mail together with certificate and sender's certificate of asking then, with the encapsulation of SMIME form; If this envelope mail needs signature, need change mail with sender's private key and certificate signature, with the encapsulation of SMIME form.Signature and encryption can be carried out (being generally signs earlier afterwards encrypts) simultaneously, also can not sign and not encrypt.Last http request mode is sent this mail s407 to webmail, and webmail can select mail is sent with the mode of SMTP, or deposits rough draft or with the transmission file with the mode of IMAP.
For editor is rough draft, the mail of replying or transmitting shows that this mail once was opened, then in the process of opening with mail decryption verification (if mail is by encrypted signature), see process four for details.
Four, the user opens the mail of encrypted signature, needs deciphering and checking.
Referring to Fig. 6, when the user need open an envelope mail, control at first will be downloaded this mail to local; If this mail is through signature, control need be downloaded CA certificate and CRL (certificate cancels and tabulates) to the webmail request, in order to verify the signature of this mail; If through checking; Show this mail really from the sender, and do not distorted, otherwise explain that there is safety problem in this mail; If this mail is through encrypting, control need be used the private key deciphering mail among the USBKEY, if the deciphering failure shows that this mail does not use this user's certificate to encrypt, perhaps Mail Contents changes; Behind successful decryption, also will continue the inspection mail head, whether also need decipher or verify in order to check this mail.If mail decryption verification success, the content of mail is presented on the browser, otherwise, the reason of failure is fed back to the user.
To guarantee when control is opened mail that webmail does not open mail because if webmail opens mail earlier, control again open mail, inefficiency not only, and make Mail Contents be shown twice, influence is used.So shield webmail opens mail at server end function.
In addition; Of the present inventionly a kind ofly can use any known public key algorithm based on the encrypted signature algorithm in the webmail mail signature encryption method of browser control part; And need the encrypted certificate of request both can to obtain in this method by the signature mail that the other side sends, also can concentrate and dispose by webmail; CA certificate that checking needs and CRL both can obtain by request CA server, also can concentrate by webmail and dispose; Used certificate of encrypted signature process and private key can be stored in the local file, also can be stored in the specialized apparatus (for example usbkey), and public key cryptosyst can use the CA server additionally to dispose, and also can on webmail, concentrate deployment.
In sum, the present invention is through the use of control, and the encrypted signature function of mail is merged in webmail, makes the user can pass through webmail mailing system safe in utilization; Utilize the present invention, can on the basis of original webmail, carry out the encrypted signature method to mail, thereby reach the confidentiality of mail, integrality, the effect of non-repudiation through browser control part.

Claims (10)

1. the webmail mail signature encryption method based on browser control part is characterized in that,
The user is when sending mail; Through a browser control part; Send the signature of SMIME form and/or the mail of encryption to webmail, when receiving mail, receive mail, and the mail of SMIME form is verified and/or deciphered from webmail through this browser control part;
And when sending and receive mail, the user writes mail through browser page, and this browser control part shows mail through browser page.
2. the method for claim 1 is characterized in that, the user is through this browser control part certificate of utility and private key login when login webmail system.
3. according to claim 1 or claim 2 method is characterized in that, this browser control part uses hardware encipher equipment or uses mobile certificate equipment through interface.
4. the method for claim 1 is characterized in that, this browser control part also provides the encapsulation and the parsing of the MIME form of mail.
5. the method for claim 1 is characterized in that, this browser control part is a user transparent in whole use.
6. the method for claim 1 is characterized in that, this hardware encipher equipment or mobile certificate equipment are smart card or USBKEY.
7. the method for claim 1 is characterized in that, downloading and installing by webmail of this browser control part provides, and whether webmail can control browser control part and open.
8. the method for claim 1 is characterized in that, the used AES of signing is a public key algorithm.
9. the method for claim 1 is characterized in that, needs the encrypted certificate of request to dispose by the signature mail acquisition of the other side's transmission or by webmail is concentrated.
10. the method for claim 1 is characterized in that, CA certificate that checking needs and CRL concentrate through request CA server acquisition or through webmail and dispose.
CN2010102901517A 2010-09-25 2010-09-25 Browser control-based webmail signing encrypting method Pending CN102413064A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102901517A CN102413064A (en) 2010-09-25 2010-09-25 Browser control-based webmail signing encrypting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102901517A CN102413064A (en) 2010-09-25 2010-09-25 Browser control-based webmail signing encrypting method

Publications (1)

Publication Number Publication Date
CN102413064A true CN102413064A (en) 2012-04-11

Family

ID=45914923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102901517A Pending CN102413064A (en) 2010-09-25 2010-09-25 Browser control-based webmail signing encrypting method

Country Status (1)

Country Link
CN (1) CN102413064A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664821A (en) * 2012-04-12 2012-09-12 北京华兴宏视技术发展有限公司 Multimedia mail client, multimedia mail server and multimedia mail system
CN102946314A (en) * 2012-11-08 2013-02-27 成都卫士通信息产业股份有限公司 Client-side user identity authentication method based on browser plug-in
CN104023028A (en) * 2014-06-19 2014-09-03 江苏威盾网络科技有限公司 Anti-eavesdrop method based on WEB E-mails
CN105933314A (en) * 2016-04-21 2016-09-07 诚迈科技(南京)股份有限公司 Android system email S/MIME function support method and system
CN106209606A (en) * 2016-08-31 2016-12-07 北京深思数盾科技股份有限公司 A kind of use the method for WEB mail, terminal and system safely
CN106302482A (en) * 2016-08-22 2017-01-04 浙江省数字安全证书管理有限公司 A kind of browser-cross uses hardware encryption medium data safe transmission system and method
CN108989055A (en) * 2018-08-31 2018-12-11 密信技术(深圳)有限公司 The signature and encryption method, device and storage medium of compatible files in different types
CN109729088A (en) * 2018-12-29 2019-05-07 广东盈世计算机科技有限公司 A method of mail processing
WO2020015090A1 (en) * 2018-07-20 2020-01-23 密信技术(深圳)有限公司 Method and device for generating mail recording position information of sender, and storage medium
CN112165385A (en) * 2020-08-20 2021-01-01 中船重工(武汉)凌久高科有限公司 Universal digital signature method for Web application system

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1267029A (en) * 2000-04-29 2000-09-20 北京思倍驰科技有限公司 Public computer system in urban area
CN1300016A (en) * 1999-12-11 2001-06-20 韩国电子通信研究院 Hybrid mail delivering system and method using internetwork
CN1477810A (en) * 2003-06-12 2004-02-25 上海格尔软件股份有限公司 Dynamic password authentication method based on digital certificate implement
CN1535424A (en) * 2001-06-19 2004-10-06 Web-based communications addressing system and method
CN1536807A (en) * 2003-04-07 2004-10-13 西科姆株式会社 File security transmission system and method thereof
CN1556449A (en) * 2004-01-08 2004-12-22 中国工商银行 Device and method for proceeding encryption and identification of network bank data
CN1595873A (en) * 2004-06-23 2005-03-16 北京邮电大学 Network examination system based on mixed architecture and multiple safety mechanism, and implementing method thereof
CN1645789A (en) * 2005-02-04 2005-07-27 张亚武 Electronic e-mail system with intelligent card
CN101022428A (en) * 2007-01-12 2007-08-22 深圳市国领电讯有限公司 E-mail custom end intelligent receive-transmit system and method
CN101083556A (en) * 2007-07-02 2007-12-05 蔡水平 Region based layered wireless information publishing, searching and communicating application system
CN101123032A (en) * 2007-07-26 2008-02-13 南京大学 Computer room temperature monitoring system and monitoring method based on Web Service
CN101304576A (en) * 2007-05-11 2008-11-12 国际商业机器公司 Method and apparatus for processing contact information
CN101374050A (en) * 2008-10-23 2009-02-25 普天信息技术研究院有限公司 A device, system and method for realizing identity authentication
CN101552743A (en) * 2008-04-04 2009-10-07 村田机械株式会社 Electronic mail gateway apparatus
CN101821710A (en) * 2007-09-11 2010-09-01 西安姆贝拉有限公司 System, method and graphical user interface for workflow generation, deployment and/or execution

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1300016A (en) * 1999-12-11 2001-06-20 韩国电子通信研究院 Hybrid mail delivering system and method using internetwork
CN1267029A (en) * 2000-04-29 2000-09-20 北京思倍驰科技有限公司 Public computer system in urban area
CN1535424A (en) * 2001-06-19 2004-10-06 Web-based communications addressing system and method
CN1536807A (en) * 2003-04-07 2004-10-13 西科姆株式会社 File security transmission system and method thereof
CN1477810A (en) * 2003-06-12 2004-02-25 上海格尔软件股份有限公司 Dynamic password authentication method based on digital certificate implement
CN1556449A (en) * 2004-01-08 2004-12-22 中国工商银行 Device and method for proceeding encryption and identification of network bank data
CN1595873A (en) * 2004-06-23 2005-03-16 北京邮电大学 Network examination system based on mixed architecture and multiple safety mechanism, and implementing method thereof
CN1645789A (en) * 2005-02-04 2005-07-27 张亚武 Electronic e-mail system with intelligent card
CN101022428A (en) * 2007-01-12 2007-08-22 深圳市国领电讯有限公司 E-mail custom end intelligent receive-transmit system and method
CN101304576A (en) * 2007-05-11 2008-11-12 国际商业机器公司 Method and apparatus for processing contact information
CN101083556A (en) * 2007-07-02 2007-12-05 蔡水平 Region based layered wireless information publishing, searching and communicating application system
CN101123032A (en) * 2007-07-26 2008-02-13 南京大学 Computer room temperature monitoring system and monitoring method based on Web Service
CN101821710A (en) * 2007-09-11 2010-09-01 西安姆贝拉有限公司 System, method and graphical user interface for workflow generation, deployment and/or execution
CN101552743A (en) * 2008-04-04 2009-10-07 村田机械株式会社 Electronic mail gateway apparatus
CN101374050A (en) * 2008-10-23 2009-02-25 普天信息技术研究院有限公司 A device, system and method for realizing identity authentication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
侯轶男,高鑫: "《创建安全的企业电子邮箱》", 《世界电信》, no. 10, 31 October 2008 (2008-10-31) *
黄凯: "《电子政务证书应用解决方案》", 《信息安全与通信保密》, no. 2, 28 February 2006 (2006-02-28) *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664821A (en) * 2012-04-12 2012-09-12 北京华兴宏视技术发展有限公司 Multimedia mail client, multimedia mail server and multimedia mail system
CN102946314A (en) * 2012-11-08 2013-02-27 成都卫士通信息产业股份有限公司 Client-side user identity authentication method based on browser plug-in
CN102946314B (en) * 2012-11-08 2016-04-20 成都卫士通信息产业股份有限公司 A kind of client-side user identity authentication method based on browser plug-in
CN104023028A (en) * 2014-06-19 2014-09-03 江苏威盾网络科技有限公司 Anti-eavesdrop method based on WEB E-mails
CN105933314A (en) * 2016-04-21 2016-09-07 诚迈科技(南京)股份有限公司 Android system email S/MIME function support method and system
CN106302482A (en) * 2016-08-22 2017-01-04 浙江省数字安全证书管理有限公司 A kind of browser-cross uses hardware encryption medium data safe transmission system and method
CN106209606A (en) * 2016-08-31 2016-12-07 北京深思数盾科技股份有限公司 A kind of use the method for WEB mail, terminal and system safely
CN106209606B (en) * 2016-08-31 2019-11-12 北京深思数盾科技股份有限公司 A kind of method, terminal and system for using WEB mail safely
WO2020015090A1 (en) * 2018-07-20 2020-01-23 密信技术(深圳)有限公司 Method and device for generating mail recording position information of sender, and storage medium
CN108989055A (en) * 2018-08-31 2018-12-11 密信技术(深圳)有限公司 The signature and encryption method, device and storage medium of compatible files in different types
WO2020042216A1 (en) * 2018-08-31 2020-03-05 密信技术(深圳)有限公司 Signature and encryption method and device compatible with different types of files, and storage medium
CN109729088A (en) * 2018-12-29 2019-05-07 广东盈世计算机科技有限公司 A method of mail processing
CN109729088B (en) * 2018-12-29 2022-01-25 广东盈世计算机科技有限公司 Mail processing method
CN112165385A (en) * 2020-08-20 2021-01-01 中船重工(武汉)凌久高科有限公司 Universal digital signature method for Web application system
CN112165385B (en) * 2020-08-20 2022-09-09 中船重工(武汉)凌久高科有限公司 Universal digital signature method for Web application system

Similar Documents

Publication Publication Date Title
CN102413064A (en) Browser control-based webmail signing encrypting method
US10380361B2 (en) Secure transaction method from a non-secure terminal
CN101416458B (en) Electronic data communication system
CN102202307B (en) Mobile terminal identity authentication system and method based on digital certificate
CN113285803B (en) Mail transmission system and transmission method based on quantum security key
CN105553654B (en) Key information processing method and device, key information management system
CN102118381A (en) Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method
CN113346995B (en) Method and system for preventing falsification in mail transmission process based on quantum security key
CN103503366A (en) Managing data for authentication devices
CN106603577A (en) E-mail encryption method and system
CN103747012A (en) Security verification method, device and system of network transaction
CN105516157A (en) Independent encryption based network information safe input system and method
CN102801730A (en) Information protection method and device for communication and portable devices
CN101335627B (en) A kind of network facsimile system and using method thereof
CN110045970A (en) A kind of Distributed die on-line rewriting method and system
CN103996117A (en) Safety mobile phone
CN103326862A (en) Electronically signing method and system
CN110149354A (en) A kind of encryption and authentication method and device based on https agreement
CN102271333A (en) A method for secure sending and receiving of 3G messages based on trusted chain transfer
CN108155987A (en) Group message sending method, method of reseptance and its system and communicating terminal
CN102055685A (en) Method for encrypting webmail information
CN113452687B (en) Method and system for encrypting sent mail based on quantum security key
CN101924635A (en) Method and device for user identity authentication
CN101841785A (en) Method for sending encrypted message by cellphone and system thereof
CN110457170A (en) For testing the method, apparatus, system and medium of U-shield

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
ASS Succession or assignment of patent right

Owner name: CHINA STANDARD SOFTWARE CO., LTD.

Free format text: FORMER OWNER: SHANGHAI ZHONGBIAO SOFTWARE CO. LTD.

Effective date: 20120305

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20120305

Address after: 200030 room 1006-1010, Panyu Road, Shanghai, 1028

Applicant after: China Standard Software Co., Ltd.

Address before: 200030 Panyu Road, Shanghai, No. 10, building 1028, building

Applicant before: Shanghai Zhongbiao Software Co., Ltd.

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120411