[go: up one dir, main page]

CN112994899A - Safe mail receiving and sending method for mobile terminal - Google Patents

Safe mail receiving and sending method for mobile terminal Download PDF

Info

Publication number
CN112994899A
CN112994899A CN202110387563.0A CN202110387563A CN112994899A CN 112994899 A CN112994899 A CN 112994899A CN 202110387563 A CN202110387563 A CN 202110387563A CN 112994899 A CN112994899 A CN 112994899A
Authority
CN
China
Prior art keywords
signature
verification
certificate
server
digital envelope
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110387563.0A
Other languages
Chinese (zh)
Inventor
门嘉平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guolian Yian Information Technology Co ltd
Original Assignee
Beijing Guolian Yian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guolian Yian Information Technology Co ltd filed Critical Beijing Guolian Yian Information Technology Co ltd
Priority to CN202110387563.0A priority Critical patent/CN112994899A/en
Publication of CN112994899A publication Critical patent/CN112994899A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to a mobile terminal safety mail receiving and sending method, which comprises the following steps: when a sender sends a mail, an ActiveX control of a browser calls an interface for making a digital envelope with a signature, and submits an information original text, an encryption algorithm, an encryption certificate DN and a signature certificate DN to a signature server, the server makes an Attached signature on the original text first, then makes a digital envelope on a signature result, forms the digital envelope with the signature and returns the digital envelope to the control, and the sender sends a receiver through a sending system; when a receiver opens the mail, the browser calls a decryption digital envelope interface with the signature, the digital envelope with the signature is sent to the signature server, the server decrypts the envelope data to obtain an Attached signature packet, then the Attached signature packet is verified, and a verification result and an original text in the Attached signature packet are returned to the receiver. The invention effectively ensures the confidentiality, the integrity and the non-repudiation of the information of the mail.

Description

Safe mail receiving and sending method for mobile terminal
Technical Field
The invention belongs to the technical field of digital content security, and particularly relates to a mobile terminal security mail receiving and sending method.
Background
In the current internet environment in china, along with the increasing development of social networks and social software, the importance of electronic mailboxes to ordinary individual users has been greatly reduced. However, for enterprise users, email boxes are still the most important "office supplies" for network offices. For some enterprises with higher IT degree, the electronic mailbox of the enterprise user often undertakes the following important office functions:
identity identification in enterprise intranet authority management.
The communication channel of important office information in the enterprise is provided with certain confidentiality.
The formal platform for communication between the enterprise and the outside has certain legal effectiveness for information interaction.
Therefore, once the mailbox of the enterprise user is attacked, the content of the mail is stolen, the account is counterfeited, and the computer is infected with viruses, so that the threat is not only a certain employee individual or individual terminal device of the enterprise, but also the whole intranet system of the enterprise and various external business cooperation of the enterprise can be endangered.
Currently, most mailbox systems are developed and applied based on Linux, Unix and Windows platforms, and in consideration of the security problem of Windows operating systems, most mailbox systems in practical application are installed in Linux and Unix operating systems, but the attack of hackers on the mailbox systems cannot be avoided. The enterprise mailbox is the first way for hackers to launch network attacks on enterprises, and the business cooperation and property security of the enterprises are endangered. An attacker only needs to try 10 times, and about 1097.6 ten thousand enterprise mailboxes can be successfully cracked nationwide. The enterprise mailbox contains a large amount of business secrets and important data information, and once the business secrets are broken and lost, immeasurable influence and loss are brought to the development of the enterprise, so the enterprise mailbox system is also often called a 'life-death line' of the enterprise.
Disclosure of Invention
The invention provides a method for sending and receiving a mobile terminal safe mail for solving the technical problem.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
the first technical scheme is as follows:
a mobile terminal safe mail receiving and sending method comprises a digital signature and a digital signature verification;
the digital signature specifically comprises: when a sender sends a mail, an ActiveX control system of a browser calls a signature interface of a signature server, information including a data original text and a signature certificate theme is sent to the signature server, the signature server searches a corresponding private key certificate or a certificate chain in a signature certificate configured by the signature service according to the signature certificate theme information after receiving a signature request, and after finding the signature certificate, the ActiveX control system performs summary operation on the data original text according to a specified summary algorithm, uses a signature private key to sign a summary value according to the specified signature algorithm, and finally returns a signature result to the ActiveX control system, and the sender sends a receiver through a mail sending system;
the types of the digital signature comprise common signature verification and post signature verification;
the common verification tag specifically comprises the following steps: when a receiver opens or downloads a mail, an ActiveX control system of the browser calls a verification signature interface of a signature server and sends signature information to be verified to the signature server, and the signature server firstly verifies the validity of a signature certificate and comprises the following steps: (1) searching a corresponding trust domain in a trust domain configured by a signature verification service according to the information of an issuer of a signature certificate; (2) verifying the validity period of the signature certificate; (3) verifying whether the signature of the signature certificate is legal or not by using the found trust domain; (4) and verifying whether the state of the signature certificate is normal through the downloaded CRL file or the OCSP server. On the premise that the signature certificate passes verification, the signature server verifies the signature result, firstly, a public key of the signature certificate is utilized to solve the abstract of the original text from the signature result, meanwhile, the ActiveX control system regenerates the abstract of the original text according to a specified abstract algorithm, the two abstract values are compared, and if the results are consistent, the original text is not tampered, and the verification is passed; if any verification link fails in the verification process, the verification fails, and the verification result is returned to the receiver;
the post-affair signature specifically comprises the following steps: and verifying the signature certificate through the trust chain, and considering that the transaction certificate is legal and valid as long as the signature result is verified to be legal.
Further, the specified summarization algorithm comprises any one of SHA1, SHA224, SHA256, SHA384, SHA512 and SM 3;
the designated signature algorithm adopts RSA asymmetric key algorithm or SM2 signature algorithm; if the RSA asymmetric key algorithm is adopted, PKCS1Padding is needed during signing.
Furthermore, the types of the digital signature also comprise bar code verification, PDF signature verification and XML verification.
Further, the bar code verification specifically comprises: the browser control system of the receiver needs to take out the original signature result from the database, call the signature server to check the signature after affairs, calculate the abstract value in the signature result after verification is passed, and compare the abstract value with the bar code data to verify whether the bar code data on the medium is correct.
The PDF verification tag specifically comprises the following steps: PDF signature verification is carried out by adopting an Adobe Reader tool.
The XML verification specifically comprises the following steps: and the ActiveX control system of the browser can automatically judge the signature type of the browser according to the received signature information, perform corresponding verification operation according to the requested verification mode and return a verification result.
Further, the digital envelope and the decrypted digital envelope are also included;
the digital envelope specifically comprises: when a sender sends a mail, an ActiveX control system of a browser calls a digital envelope interface of a signature server, information such as an information original text, an encryption certificate theme, a symmetric encryption algorithm and the like is sent to the signature server, the signature server randomly generates a symmetric key, the key is used for encrypting the original text according to a specified encryption algorithm, the specified encryption certificate is used for encrypting the symmetric key, the digital envelope is finally formed and returned to an ActiveX control system of the browser, and the sender sends a receiver through a mail sending system; when the DN of the encryption certificate is not specified in the interface calling, the first encryption certificate configured in the digital envelope service is used by default;
the decrypted digital envelope specifically comprises: when a receiver opens or downloads the mail, the ActiveX control system of the browser calls a decryption digital envelope interface of the signature server to send the content of the digital envelope to the signature server, the signature server searches a corresponding private key in the digital envelope service according to the certificate identification in the digital envelope, if the private key is found, the private key is used for decryption to obtain a symmetric key, then the symmetric key is used for decrypting the original text according to a specified encryption algorithm, and the original text is returned to the receiver.
Furthermore, the digital signature and the digital envelope are carried out in a mode of including a digital envelope with a signature, and the digital signature verification and the decryption of the digital envelope are carried out in a mode of decrypting the digital envelope with the signature;
the digital envelope with the signature specifically comprises: when a sender sends a mail, the ActiveX control system of the browser calls a digital envelope interface with a signature of a signature server, information text, an encryption algorithm, an encryption certificate DN and a signature certificate DN are submitted to the signature server, the server firstly signs the text in an Attached manner, then the server makes a digital envelope for a signature result, the digital envelope with the signature is formed and returned to the ActiveX control system of the browser, and the sender sends a receiver through the mail sending system.
The digital envelope with the signature is decrypted specifically as follows: when a receiver opens or downloads the mail, the ActiveX control system of the browser calls a digital envelope interface with a signature for decryption of the signature server, the digital envelope with the signature is sent to the signature server, the server decrypts the envelope data to obtain an Attached signature packet therein, then the signature packet is verified, and the verification result and the original text in the Attached signature packet are returned to the receiver.
The second technical scheme is as follows:
a mobile terminal safe mail receiving and sending system comprises a signature server and a client based on a browser ActiveX control.
When a sender sends a mail, a client of an ActiveX control based on a browser calls a signature interface of a signature server, information including a data original text and a signature certificate theme is sent to the signature server, the signature server searches a corresponding private key certificate or a certificate chain in a signature certificate configured by the signature service according to the signature certificate theme information after receiving a signature request, and after finding the signature certificate, an ActiveX control system performs summary operation on the data original text according to a specified summary algorithm, signs a summary value by using a signature private key according to the specified signature algorithm, and finally returns a signature result to the client, and the sender sends a receiver through a mail sending system.
Further, the running platform of the signature server is a national embedded platform of million-core + Chinese Koidede, dragon-core + Nakaokylin, Feiteng + Galaxy kylin.
Compared with the prior art, the invention has the following beneficial effects:
the invention adopts a system architecture based on PKI and an electronic signature solution which supports the complete and independent operation of different applications, thereby ensuring the information confidentiality, the information integrity, the non-repudiation and the post traceability in the mail receiving and sending application.
Drawings
FIG. 1 is a flowchart illustrating a secure mailing method for a mobile station according to an embodiment of the present invention;
Detailed Description
The present invention will be described in further detail with reference to examples.
The invention discloses an embodiment of a mobile terminal safety mail receiving and sending method, which comprises a digital signature and a digital signature verification;
the digital signature specifically comprises: when a sender sends a mail, an ActiveX control system of a browser calls a signature interface of a signature server, information including a data original text and a signature certificate theme is sent to the signature server, the signature server searches a corresponding private key certificate or a certificate chain in a signature certificate configured by the signature service according to the signature certificate theme information after receiving a signature request, and after finding the signature certificate, the ActiveX control system performs summary operation on the data original text according to a specified summary algorithm, uses a signature private key to sign a summary value according to the specified signature algorithm, and finally returns a signature result to the ActiveX control system, and the sender sends a receiver through a mail sending system;
the signature server provides various types of signature interfaces,
the types of the digital signature comprise common signature verification and post signature verification;
the signature server provides common signature checking interfaces for the Attached signature, the Detached signature, the RAW signature and the XML signature.
The common verification tag specifically comprises the following steps: when a receiver opens or downloads a mail, an ActiveX control system of the browser calls a verification signature interface of a signature server and sends signature information to be verified to the signature server, and the signature server firstly verifies the validity of a signature certificate and comprises the following steps: (1) searching a corresponding trust domain in a trust domain configured by a signature verification service according to the information of an issuer of a signature certificate; (2) verifying the validity period of the signature certificate; (3) verifying whether the signature of the signature certificate is legal or not by using the found trust domain; (4) and verifying whether the state of the signature certificate is normal through the downloaded CRL file or the OCSP server. On the premise that the signature certificate passes verification, the signature server verifies the signature result, firstly, a public key of the signature certificate is utilized to solve the abstract of the original text from the signature result, meanwhile, the ActiveX control system regenerates the abstract of the original text according to a specified abstract algorithm, the two abstract values are compared, and if the results are consistent, the original text is not tampered, and the verification is passed; if any verification link fails in the verification process, the verification fails, and the verification result is returned to the receiver;
the post-affair signature specifically comprises the following steps: verifying the signature certificate through a trust chain, and considering that the transaction certificate is legal and valid as long as the signature result is verified to be legal;
as the name implies, post-transaction signature verification is a way to verify the transaction credential post-transaction, with a lag in time. Therefore, the mode is different from the common label checking mode in that: it does not verify the validity period and validity status of the certificate. Therefore, as long as the signature certificate passes the trust chain verification and the signature result is verified to be legal, the transaction certificate can be considered to be legal and valid.
Further, the specified summarization algorithm comprises any one of SHA1, SHA224, SHA256, SHA384, SHA512 and SM 3;
further, the specified signature algorithm adopts RSA asymmetric key algorithm or SM2 signature algorithm; if the RSA asymmetric key algorithm is adopted, PKCS1Padding is needed during signing.
Furthermore, the types of the digital signature also comprise bar code verification, PDF signature verification and XML verification.
The bar code verification specifically comprises the following steps: the signature server does not support direct verification of the bar code symbol, and a receiver needs to read the bar code data on the medium by using a code scanning device and select a proper mode to verify the bar code data. The browser control system of the receiver needs to take out the original signature result from the database, call the signature server to check the signature after affairs, calculate the abstract value in the signature result after verification is passed, and compare the abstract value with the bar code data to verify whether the bar code data on the medium is correct.
The PDF verification tag specifically comprises the following steps: PDF signature verification is carried out by adopting an Adobe Reader tool.
The Adobe Reader tool supports PDF signature verification. When a user opens a signed PDF file using Adobe Reader, all signatures in the document are automatically verified by default.
The XML verification specifically comprises the following steps: and the ActiveX control system of the browser can automatically judge the signature type of the browser according to the received signature information, perform corresponding verification operation according to the requested verification mode and return a verification result.
The signature server provides a uniform signature verification interface (divided into a common signature verification interface and a post signature verification interface) for the XML signature. The system can automatically judge the signature type according to the received signature information, carry out corresponding verification operation according to the requested verification mode and return a verification result.
The system supports the normalized XML verification, namely, the signature result is normalized before verification, and under the normal condition, if the XML original text is selected to be normalized during signature, the normalized XML verification is also selected during signature verification.
The digital signature realizes the identity authentication of the user, and ensures the integrity of data in the transmission process and the non-repudiation of transaction; however, any person who possesses the sender's public key can verify the correctness of the digital signature, and thus the confidentiality of the data cannot be guaranteed.
In order to ensure the confidentiality of data, the invention discloses another embodiment of a mobile terminal safety mail receiving and sending method, which comprises a digital envelope and a decrypted digital envelope;
the digital envelope specifically comprises: the signature server provides a uniform digital envelope interface, when a sender sends a mail, an ActiveX control system of the browser calls the digital envelope interface of the signature server to send information such as an information original text, an encryption certificate theme and a symmetric encryption algorithm to the signature server, the signature server randomly generates a symmetric key, encrypts the original text by the key according to a specified encryption algorithm, encrypts the symmetric key by using a specified encryption certificate, finally forms a digital envelope and returns the digital envelope to the ActiveX control system of the browser, and the sender sends a receiver through the mail sending system; when the DN of the encryption certificate is not specified in the interface calling, the first encryption certificate configured in the digital envelope service is used by default;
the decrypted digital envelope specifically comprises: the signature server provides a uniform decryption digital envelope interface, when a receiver opens or downloads a mail, an ActiveX control system of the browser calls the decryption digital envelope interface of the signature server to send the content of the digital envelope to the signature server, the signature server searches a corresponding private key in the digital envelope service according to a certificate mark in the digital envelope, if the private key is found, the private key is used for decryption to obtain a symmetric key, then the symmetric key is used for decrypting an original text according to a specified encryption algorithm, and the original text is returned to the receiver.
The digital envelope is a typical application of PKI, the inner layer of the digital envelope applies a symmetric encryption technology, the outer layer of the digital envelope applies a public key encryption technology, and the efficiency of encryption and decryption operation is improved to the maximum while the flexibility of the public key encryption technology is enjoyed; it still does not address "who is you? "i.e. the sender cannot be authenticated, and the integrity of the data and the non-repudiation of the transaction cannot be guaranteed.
Therefore, in order to solve the problems of confidentiality of information and identity authentication of a sender, the integrity of data and non-repudiation of transaction cannot be guaranteed, as shown in fig. 1, the invention discloses a preferred embodiment of a mobile terminal secure mail receiving and sending method, which comprises a digital envelope with a signature and a digital envelope with a signature;
the digital envelope with the signature specifically comprises: the signature server provides a uniform digital envelope interface for making a signature, when a sender sends a mail, an ActiveX control system of the browser calls the digital envelope interface with the signature of the signature server, an information original text, an encryption algorithm, an encryption certificate DN and a signature certificate DN are submitted to the signature server, the server makes an ordered signature on the original text first, then makes a digital envelope on a signature result, forms the digital envelope with the signature and returns the digital envelope to the ActiveX control system of the browser, and the sender sends a receiver through the mail sending system;
the digital envelope with the signature is decrypted specifically as follows: the signature server provides a uniform interface for decrypting the digital envelope with the signature, when a receiver opens or downloads a mail, the ActiveX control system of the browser calls the digital envelope interface with the signature for decrypting the signature of the signature server and sends the digital envelope with the signature to the signature server, the server decrypts the envelope data to obtain an Attached signature packet therein, then verifies the signature packet, and returns the verification result and the original text in the Attached signature packet to the receiver.
In order to realize the method, the invention also discloses a mobile terminal safe mail receiving and sending system which comprises a signature server and a client terminal based on the browser ActiveX control. When a sender sends a mail, a client of an ActiveX control based on a browser calls a signature interface of a signature server, information including a data original text and a signature certificate theme is sent to the signature server, the signature server searches a corresponding private key certificate or a certificate chain in a signature certificate configured by the signature service according to the signature certificate theme information after receiving a signature request, and after finding the signature certificate, an ActiveX control system performs summary operation on the data original text according to a specified summary algorithm, signs a summary value by using a signature private key according to the specified signature algorithm, and finally returns a signature result to the client, and the sender sends a receiver through a mail sending system.
Further, the running platform of the signature server is a national embedded platform of million-core + Chinese Koidede, dragon-core + Nakaokylin, Feiteng + Galaxy kylin;
furthermore, the client provides development interfaces of JAVA and NET languages, and supports a universal Web application server. The ActiveX control system realizes the functions of signing/signature verification of original text data (files and form data), digital envelopes and the like by calling the function interfaces; the user can also sign the original text data (character string or separate data file) submitted in the transaction process by using the own certificate (private key) and can verify the signature from the server side.
The embodiments described above are only preferred embodiments of the invention and are not exhaustive of the possible implementations of the invention. Any obvious modifications to the above would be obvious to those of ordinary skill in the art, but would not bring the invention so modified beyond the spirit and scope of the present invention.

Claims (6)

1. A mobile terminal safe mail receiving and sending method is characterized by comprising a digital signature and a digital signature verification;
the digital signature specifically comprises: when a sender sends a mail, an ActiveX control system of a browser calls a signature interface of a signature server, information including a data original text and a signature certificate theme is sent to the signature server, the signature server searches a corresponding private key certificate or a certificate chain in a signature certificate configured by the signature service according to the signature certificate theme information after receiving a signature request, and after finding the signature certificate, the ActiveX control system performs summary operation on the data original text according to a specified summary algorithm, uses a signature private key to sign a summary value according to the specified signature algorithm, and finally returns a signature result to the ActiveX control system, and the sender sends a receiver through a mail sending system;
the types of the digital signature comprise common signature verification and post signature verification;
the common verification tag specifically comprises the following steps: when a receiver opens or downloads a mail, an ActiveX control system of the browser calls a verification signature interface of a signature server and sends signature information to be verified to the signature server, and the signature server firstly verifies the validity of a signature certificate and comprises the following steps: (1) searching a corresponding trust domain in a trust domain configured by a signature verification service according to the information of an issuer of a signature certificate; (2) verifying the validity period of the signature certificate; (3) verifying whether the signature of the signature certificate is legal or not by using the found trust domain; (4) and verifying whether the state of the signature certificate is normal through the downloaded CRL file or the OCSP server. On the premise that the signature certificate passes verification, the signature server verifies the signature result, firstly, a public key of the signature certificate is utilized to solve the abstract of the original text from the signature result, meanwhile, the ActiveX control system regenerates the abstract of the original text according to a specified abstract algorithm, the two abstract values are compared, and if the results are consistent, the original text is not tampered, and the verification is passed; if any verification link fails in the verification process, the verification fails, and the verification result is returned to the receiver;
the post-affair signature specifically comprises the following steps: and verifying the signature certificate through the trust chain, and considering that the transaction certificate is legal and valid as long as the signature result is verified to be legal.
2. The method as claimed in claim 1, wherein the specified digest algorithm includes any one of SHA1, SHA224, SHA256, SHA384, SHA512 and SM 3;
the designated signature algorithm adopts RSA asymmetric key algorithm or SM2 signature algorithm; if the RSA asymmetric key algorithm is adopted, PKCS1Padding is needed during signing.
3. The method as claimed in claim 1, wherein the type of the digital signature further includes barcode verification, PDF signature verification, and XML verification.
4. The method as claimed in claim 3, wherein the mobile terminal sends the mail to the mobile terminal,
the bar code verification specifically comprises the following steps: the browser control system of the receiver needs to take out an original signature result from a database, call a signature server to check a signature after affairs, calculate a digest value in the signature result after verification is passed, and compare the digest value with the barcode data to verify whether the barcode data on the medium is correct or not;
the PDF verification tag specifically comprises the following steps: PDF signature verification is carried out by adopting an Adobe Reader tool;
the XML verification specifically comprises the following steps: and the ActiveX control system of the browser can automatically judge the signature type of the browser according to the received signature information, perform corresponding verification operation according to the requested verification mode and return a verification result.
5. The mobile-side secure mailing method of claim 1, further comprising a digital envelope and a decrypted digital envelope;
the digital envelope specifically comprises: when a sender sends a mail, an ActiveX control system of a browser calls a digital envelope interface of a signature server, information such as an information original text, an encryption certificate theme, a symmetric encryption algorithm and the like is sent to the signature server, the signature server randomly generates a symmetric key, the key is used for encrypting the original text according to a specified encryption algorithm, the specified encryption certificate is used for encrypting the symmetric key, the digital envelope is finally formed and returned to an ActiveX control system of the browser, and the sender sends a receiver through a mail sending system;
the decrypted digital envelope specifically comprises: when a receiver opens or downloads the mail, the ActiveX control system of the browser calls a decryption digital envelope interface of the signature server to send the content of the digital envelope to the signature server, the signature server searches a corresponding private key in the digital envelope service according to the certificate identification in the digital envelope, if the private key is found, the private key is used for decryption to obtain a symmetric key, then the symmetric key is used for decrypting the original text according to a specified encryption algorithm, and the original text is returned to the receiver.
6. The mobile-end secure mailing method according to claim 5, wherein the digital signature and the digital envelope are performed in a manner of including a digital envelope with a signature, and the digital signature verification and decryption of the digital envelope are performed in a manner of decrypting the digital envelope with the signature;
the digital envelope with the signature specifically comprises: when a sender sends a mail, an ActiveX control system of a browser calls a digital envelope interface with a signature of a signature server, an information original text, an encryption algorithm, an encryption certificate DN and a signature certificate DN are submitted to the signature server, the server firstly makes an Attached signature on the original text, then makes a digital envelope on a signature result, forms the digital envelope with the signature and returns the digital envelope to the ActiveX control system of the browser, and the sender sends a receiver through a mail sending system;
the digital envelope with the signature is decrypted specifically as follows: when a receiver opens or downloads the mail, the ActiveX control system of the browser calls a digital envelope interface with a signature for decryption of the signature server, the digital envelope with the signature is sent to the signature server, the server decrypts the envelope data to obtain an Attached signature packet therein, then the signature packet is verified, and the verification result and the original text in the Attached signature packet are returned to the receiver.
CN202110387563.0A 2021-04-10 2021-04-10 Safe mail receiving and sending method for mobile terminal Pending CN112994899A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110387563.0A CN112994899A (en) 2021-04-10 2021-04-10 Safe mail receiving and sending method for mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110387563.0A CN112994899A (en) 2021-04-10 2021-04-10 Safe mail receiving and sending method for mobile terminal

Publications (1)

Publication Number Publication Date
CN112994899A true CN112994899A (en) 2021-06-18

Family

ID=76337921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110387563.0A Pending CN112994899A (en) 2021-04-10 2021-04-10 Safe mail receiving and sending method for mobile terminal

Country Status (1)

Country Link
CN (1) CN112994899A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000042748A1 (en) * 1999-01-14 2000-07-20 Tumbleweed Communications Corp. Web-based delivery of secure e-mail messages
US20020169954A1 (en) * 1998-11-03 2002-11-14 Bandini Jean-Christophe Denis Method and system for e-mail message transmission
US20050033958A1 (en) * 2003-08-07 2005-02-10 Connell John M. Method and system for secure transfer of electronic information
CN1665188A (en) * 2005-03-03 2005-09-07 武汉大学 Implementation method of secure e-mail system with two-way non-repudiation mechanism for sending and receiving
US20110040978A1 (en) * 2009-08-14 2011-02-17 Canon Kabushiki Kaisha Sending signed e-mail messages from a device
CN102170419A (en) * 2010-02-25 2011-08-31 北京邮电大学 A secure mail client system and a method thereof
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment
CN103188246A (en) * 2011-12-31 2013-07-03 上海格尔软件股份有限公司 Safe E-mail system
CN105323070A (en) * 2015-02-09 2016-02-10 北京中油瑞飞信息技术有限责任公司 Method for realizing security electronic mail based on digital envelope

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020169954A1 (en) * 1998-11-03 2002-11-14 Bandini Jean-Christophe Denis Method and system for e-mail message transmission
WO2000042748A1 (en) * 1999-01-14 2000-07-20 Tumbleweed Communications Corp. Web-based delivery of secure e-mail messages
US20050033958A1 (en) * 2003-08-07 2005-02-10 Connell John M. Method and system for secure transfer of electronic information
CN1665188A (en) * 2005-03-03 2005-09-07 武汉大学 Implementation method of secure e-mail system with two-way non-repudiation mechanism for sending and receiving
US20110040978A1 (en) * 2009-08-14 2011-02-17 Canon Kabushiki Kaisha Sending signed e-mail messages from a device
CN102170419A (en) * 2010-02-25 2011-08-31 北京邮电大学 A secure mail client system and a method thereof
CN103188246A (en) * 2011-12-31 2013-07-03 上海格尔软件股份有限公司 Safe E-mail system
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment
CN105323070A (en) * 2015-02-09 2016-02-10 北京中油瑞飞信息技术有限责任公司 Method for realizing security electronic mail based on digital envelope

Similar Documents

Publication Publication Date Title
US7644280B2 (en) Method and system for linking certificates to signed files
US7206936B2 (en) Revocation and updating of tokens in a public key infrastructure system
US7475250B2 (en) Assignment of user certificates/private keys in token enabled public key infrastructure system
EP1622301B1 (en) Methods and system for providing a public key fingerprint list in a PK system
US6189096B1 (en) User authentification using a virtual private key
US7913296B2 (en) Encrypted communication method and system
US20090240936A1 (en) System and method for storing client-side certificate credentials
CN109756343A (en) Authentication method, device, computer equipment and the storage medium of digital signature
US20030115455A1 (en) Method and apparatus for centralized processing of hardware tokens for PKI solutions
US20080046743A1 (en) System and method for automatically signing electronic documents
US20020124172A1 (en) Method and apparatus for signing and validating web pages
CN106888089A (en) The method and system of Electronic Signature and the mobile communication terminal for Electronic Signature
CN109618341A (en) A kind of digital signature authentication method, system, device and storage medium
CN111651745B (en) Application authorization signature method based on password equipment
CN109981287A (en) A kind of code signature method and its storage medium
CN111539032B (en) Electronic signature application system resistant to quantum computing disruption and implementation method thereof
CN108322311B (en) Method and device for generating digital certificate
WO2008039227A1 (en) System and method for facilitating secure online transactions
CN118606918A (en) Authentication method, device, electronic device, storage medium and program product
EP2051469A1 (en) Delegation of authentication
CN112994899A (en) Safe mail receiving and sending method for mobile terminal
CN107947938A (en) SM3 algorithms and the verification method and system of SM2 algorithm digital signature are used for PDF
KR100750214B1 (en) How to log in using a public certificate
CN118054901B (en) Network communication method and storage device based on key identification quick transfer
CN119210741A (en) Verification method and system for autonomous data master right container

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210618

RJ01 Rejection of invention patent application after publication