TW201349801A - E-mail searching method with privacy protection - Google Patents
E-mail searching method with privacy protection Download PDFInfo
- Publication number
- TW201349801A TW201349801A TW101119565A TW101119565A TW201349801A TW 201349801 A TW201349801 A TW 201349801A TW 101119565 A TW101119565 A TW 101119565A TW 101119565 A TW101119565 A TW 101119565A TW 201349801 A TW201349801 A TW 201349801A
- Authority
- TW
- Taiwan
- Prior art keywords
- search
- searching
- cloud
- mail server
- Prior art date
Links
Landscapes
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
本發明是有關於一種電子郵件的搜尋方法,且特別是有關於一種具隱私保護之電子郵件的搜尋方法。 The present invention relates to a method for searching for an email, and more particularly to a method for searching for a privacy-protected email.
隨著資訊科技的發達,網路通訊已經成為人與人之間重要的溝通工具之一。其中,電子郵件即為現代網路通訊的基本服務。承上述,雖然電子郵件已成為現代網路通訊的基本服務,仍然有些運用於其中的資訊保密或資訊傳送的技術需要被改善甚至是被取代。 With the development of information technology, Internet communication has become one of the important communication tools between people. Among them, e-mail is the basic service of modern network communication. In view of the above, although e-mail has become the basic service of modern network communication, there are still some technologies for information confidentiality or information transmission that need to be improved or even replaced.
例如,於傳統的郵件系統中,若要對加密的資訊進行搜尋,必需要將所有資訊從系統資料庫中下載下來,解密後才能進行搜尋之動作,以避免攻擊者竊取資訊。然而,現實環境(例如:雲端運算環境)資料量非常龐大,此作法要將所有資料下載下來是較不切實際且不容易達成。 For example, in a traditional mail system, if you want to search for encrypted information, you must download all the information from the system database, and decrypt it before you can perform the search to prevent the attacker from stealing information. However, the actual environment (for example, the cloud computing environment) has a very large amount of data. It is unrealistic and not easy to download all the data.
因此,在電子郵件牽涉到個人隱私或其他重要資訊的情況下,如何讓電子郵件的使用更加安全且更具保障,便成為一項重要的議題。 Therefore, how to make the use of e-mail safer and more secure has become an important issue when e-mail involves personal privacy or other important information.
本發明提供一種具隱私保護之電子郵件的搜尋方法。 The invention provides a method for searching for emails with privacy protection.
具隱私保護之電子郵件的搜尋方法適用於雲端運算環境,雲端運算環境包含收方裝置、送方裝置以及雲端郵件伺服器,搜尋方法包含:利用送方裝置接收收方裝置的公 鑰;送方裝置依據公鑰與第一搜尋條件對電子郵件進行加密作業,並將加密作業後的此電子郵件傳送至雲端郵件伺服器;收方裝置依據私鑰與第二搜尋條件產生搜尋權仗(token),並將搜尋權仗傳送至雲端郵件伺服器;雲端郵件伺服器依據此搜尋權仗以搜尋加密作業後的此電子郵件。 The search method for privacy-protected e-mail is applicable to a cloud computing environment, and the cloud computing environment includes a receiving device, a sending device, and a cloud mail server. The searching method includes: receiving the receiving device by using the sending device Key; the sending device encrypts the email according to the public key and the first search condition, and transmits the email after the encrypted job to the cloud mail server; the receiving device generates the search right according to the private key and the second search condition To (token), and the search right is transmitted to the cloud mail server; the cloud mail server uses this search right to search for this email after the encrypted job.
依照本發明的實施例所述搜尋方法,其中搜尋方法更包含此步驟:於搜尋出加密作業後的電子郵件後,雲端郵件伺服器將加密作業後的此電子郵件傳送至收方裝置及/或雲端運算環境中的委派(Delegated)裝置,其中委派裝置包含手機或電腦。 According to the search method of the embodiment of the present invention, the search method further includes the step of: after searching for the email after the encrypted job, the cloud mail server transmits the email after the encrypted job to the receiving device and/or A Delegated device in a cloud computing environment, where the delegate device includes a cell phone or a computer.
依照本發明的實施例所述搜尋方法,其中雲端運算環境更包含時間觸發器以產生時間字串與時間觸發權仗,搜尋方法包含:送方裝置更依據此時間字串(欲觸發的時間)對電子郵件進行加密作業,並將加密作業後的此電子郵件傳送至雲端郵件伺服器;收方裝置更依據此時間觸發權仗產生搜尋權仗並將搜尋權仗傳送至雲端郵件伺服器;雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的此電子郵件。 The search method according to the embodiment of the present invention, wherein the cloud computing environment further includes a time trigger to generate a time string and a time triggering right, and the searching method includes: the sending device is further based on the time string (time to be triggered) Encrypt the email and send the email after the encrypted job to the cloud mail server; the receiving device generates the search right according to the time triggering authority and transmits the search right to the cloud mail server; the cloud The mail server searches for this email after the encrypted job based on the search rights.
依照本發明的實施例所述搜尋方法,其中雲端運算環境更包含事件觸發器以產生事件字串與事件觸發權仗,搜尋方法包含:送方裝置更依據此事件字串(欲觸發的事件)對電子郵件進行加密作業,並將加密作業後的此電子郵件傳送至雲端郵件伺服器;收方裝置更依據此事件觸發權仗 產生搜尋權仗並將搜尋權仗傳送至雲端郵件伺服器;雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的此電子郵件。 According to the search method of the embodiment of the present invention, the cloud computing environment further includes an event trigger to generate an event string and an event triggering right, and the searching method includes: the sending device is further based on the event string (the event to be triggered) Encrypt the email and send the email after the encrypted job to the cloud mail server; the receiving device triggers the event based on this event. Generate search rights and transfer search rights to the cloud mail server; the cloud mail server searches for this email after the encrypted job based on the search rights.
依照本發明的實施例所述搜尋方法,其中第一搜尋條件包含字串。 The search method according to an embodiment of the present invention, wherein the first search condition includes a string.
依照本發明的實施例所述搜尋方法,其中第二搜尋條件包含字串。 The search method according to an embodiment of the present invention, wherein the second search condition includes a string.
依照本發明的實施例所述搜尋方法,其中收方裝置包含手機或電腦。 A search method according to an embodiment of the present invention, wherein the receiving device comprises a mobile phone or a computer.
依照本發明的實施例所述搜尋方法,其中送方裝置包含手機或電腦。 A search method according to an embodiment of the present invention, wherein the sending device comprises a mobile phone or a computer.
運用本發明實施例的特點之一在於:除了收方裝置之外,其他任何裝置(包含雲端郵件伺服器)無法得知被加密且存放在雲端郵件伺服器之電子郵件的內容,且收方裝置可依據私鑰與第二搜尋條件產生搜尋權仗,並由雲端郵件伺服器依據此搜尋權仗來搜尋加密作業後的此電子郵件。如此,使電子郵件被加密後,收方裝置仍可從雲端郵件伺服器尋找出加密作業後的此電子郵件。 One of the features of the embodiment of the present invention is that, except for the receiving device, any other device (including the cloud mail server) cannot know the content of the email encrypted and stored in the cloud mail server, and the receiving device The search right may be generated according to the private key and the second search condition, and the cloud mail server searches for the email after the encrypted job according to the search right. In this way, after the email is encrypted, the receiving device can still find the email after the encrypted job from the cloud mail server.
為讓本發明之上述目的、特徵和特點能更明顯易懂,茲配合圖式將本發明相關實施例詳細說明如下。 The above described objects, features, and characteristics of the present invention will become more apparent from the aspects of the invention.
請同時參閱圖1與圖2,圖1為本發明一實施例具隱私保護之電子郵件的搜尋方法其所運用之雲端運算環境的示意 圖;圖2為本發明一實施例具隱私保護之電子郵件的搜尋方法的流程圖。 Please refer to FIG. 1 and FIG. 2 simultaneously. FIG. 1 is a schematic diagram of a cloud computing environment used by a method for searching for a privacy-protected email according to an embodiment of the present invention. FIG. 2 is a flowchart of a method for searching for an email with privacy protection according to an embodiment of the present invention.
具隱私保護之電子郵件的搜尋方法(以下簡稱搜尋方法)適用於雲端運算環境1,雲端運算環境1包含收方裝置10、送方裝置11以及雲端郵件伺服器12。 The search method for the privacy-protected e-mail (hereinafter referred to as the search method) is applied to the cloud computing environment 1, and the cloud computing environment 1 includes the receiving device 10, the sending device 11, and the cloud mail server 12.
搜尋方法包含下列步驟:利用送方裝置接收收方裝置的公鑰(步驟S100);送方裝置依據公鑰與第一搜尋條件對電子郵件進行加密作業,並將加密作業後的電子郵件傳送至雲端郵件伺服器(步驟S110);收方裝置依據私鑰與第二搜尋條件產生搜尋權仗,並將搜尋權仗傳送至雲端郵件伺服器(步驟S120);雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的電子郵件(步驟S130)。 The searching method includes the following steps: receiving, by the sending device, a public key of the receiving device (step S100); the sending device encrypts the email according to the public key and the first search condition, and transmits the encrypted email to the email a cloud mail server (step S110); the receiving device generates a search right according to the private key and the second search condition, and transmits the search right to the cloud mail server (step S120); the cloud mail server according to the search right The email after the encryption job is searched (step S130).
詳言之,當送方裝置11欲傳送被加密的電子郵件M至收方裝置10,且收方裝置10欲從雲端郵件伺服器12搜尋此被加密的此電子郵件M時,可進行下列步驟:於步驟S100中:可利用送方裝置11預先接收由收方裝置10所傳送的公鑰(Public Key)100。其中,利用此公鑰100,送方裝置11可對電子郵件進行加密作業;另一方面,收方裝置10則具有能夠對此公鑰100進行解密作業的私鑰(Private Key)。 In detail, when the sending device 11 wants to transmit the encrypted email M to the receiving device 10, and the receiving device 10 wants to search the encrypted email M from the cloud mail server 12, the following steps can be performed. In step S100, the public key (Public Key) 100 transmitted by the receiving device 10 can be received in advance by the sending device 11. Here, with the public key 100, the sending device 11 can perform an encryption operation on the electronic mail; on the other hand, the receiving device 10 has a private key (Private Key) capable of decrypting the public key 100.
接著,於步驟S110中:送方裝置11可依據公鑰100與第一搜尋條件對一電子 郵件進行加密作業,並將加密作業後的此電子郵件M傳送至雲端郵件伺服器12,使加密作業後的此電子郵件M存放在雲端郵件伺服器12。其中,第一搜尋條件包含字串。此字串可為與送方裝置11相關的人、事、時、地、物等關鍵字。 Next, in step S110: the sending device 11 can pair an electronic with the first search condition according to the public key 100. The mail is encrypted, and the email M after the encrypted job is transmitted to the cloud mail server 12, so that the email M after the encryption job is stored in the cloud mail server 12. The first search condition includes a string. This string may be a keyword such as a person, a thing, a time, a place, or an object related to the delivery device 11.
於步驟S120中:收方裝置10依據私鑰與第二搜尋條件產生搜尋權仗(search token)101,並將搜尋權仗101傳送至雲端郵件伺服器12。其中,搜尋權仗101由收方裝置10的一權仗產生器所產生;第二搜尋條件包含字串。此字串可為人、事、時、地、物等關鍵字。例如:第二搜尋條件可為與送方裝置11對應的相關關鍵字;或者,第二搜尋條件可為收方裝置10針對加密作業後的此電子郵件M所欲搜尋的相關關鍵字。 In step S120, the receiving device 10 generates a search token 101 according to the private key and the second search condition, and transmits the search right 101 to the cloud mail server 12. The search right 101 is generated by a weight generator of the receiving device 10; the second search condition includes a string. This string can be a keyword for people, things, time, place, and things. For example, the second search condition may be a related keyword corresponding to the sending device 11; or the second search condition may be a related keyword to be searched by the receiving device 10 for the email M after the encrypted job.
於步驟S130中:雲端郵件伺服器12依據收方裝置10所傳送的搜尋權仗101以搜尋加密作業後的電子郵件M。 In step S130, the cloud mail server 12 searches for the email M after the encryption operation based on the search right 101 transmitted by the receiving device 10.
詳言之,搜尋方法更包含此步驟:於搜尋出加密作業後的電子郵件後,雲端郵件伺服器將加密作業後的電子郵件傳送至收方裝置(步驟S140)。 In detail, the search method further includes the step of: after searching for the email after the encrypted job, the cloud mail server transmits the encrypted email to the receiving device (step S140).
步驟S140中,當雲端郵件伺服器12依據搜尋權仗101並搜尋出加密作業後的此電子郵件M後,雲端郵件伺服器12便將加密作業後的此電子郵件M回傳至收方裝置10。 In step S140, after the cloud mail server 12 searches for the email M after the encryption operation according to the search right 101, the cloud mail server 12 transmits the email M after the encryption operation to the receiving device 10. .
由此可知,在電子郵件被加密而成為密文狀態後,收方裝置10仍可利用雲端郵件伺服器12尋找出加密作業後的此電子郵件M。 It can be seen that after the email is encrypted and becomes the ciphertext state, the receiving device 10 can still use the cloud mail server 12 to find the email M after the encryption operation.
請參閱圖3,圖3為本發明另一實施例具隱私保護之電子郵件的搜尋方法其所運用之雲端運算環境的示意圖;圖4A為本發明另一實施例具隱私保護之電子郵件的搜尋方法的流程圖。 Please refer to FIG. 3. FIG. 3 is a schematic diagram of a cloud computing environment used by a privacy-protected email search method according to another embodiment of the present invention; FIG. 4A is a diagram of a privacy-protected email search according to another embodiment of the present invention; Flow chart of the method.
如圖3所示,此實施例與上述實施例之差異在於:雲端運算環境1更包含委派裝置13與觸發器14。 As shown in FIG. 3, the difference between this embodiment and the above embodiment is that the cloud computing environment 1 further includes the delegation device 13 and the trigger 14.
其中,委派裝置13與收方裝置10為相互通訊連結,委派裝置13可作為收方裝置10的助理角色;觸發器14用以產生一字串140與一觸發權杖(其中,字串140與觸發權杖可為加密與解密的對應關係)。於此實施例中,觸發器14以時間觸發器為例,時間觸發器用以產生時間字串與時間觸發權仗。 The delegating device 13 and the receiving device 10 are in communication with each other, and the delegating device 13 can serve as an assistant role of the receiving device 10; the trigger 14 is configured to generate a string 140 and a triggering token (wherein the string 140 The trigger token can be the correspondence between encryption and decryption). In this embodiment, the trigger 14 is exemplified by a time trigger for generating a time string and a time triggering weight.
如圖4A所示,搜尋方法包含:送方裝置更依據時間字串對電子郵件進行加密作業,並將加密作業後的電子郵件傳送至雲端郵件伺服器(步驟S210);收方裝置更依據時間觸發權仗產生搜尋權仗並將搜尋權仗傳送至雲端郵件伺服器(步驟S220);雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的電子郵件(步驟S230)。 As shown in FIG. 4A, the searching method includes: the sending device further encrypts the email according to the time string, and transmits the email after the encrypted job to the cloud mail server (step S210); the receiving device is more time-dependent. The triggering authority generates a search right and transmits the search right to the cloud mail server (step S220); the cloud mail server searches for the email after the encrypted job according to the search right (step S230).
於步驟S210中:送方裝置11依據公鑰100、時間字串(欲觸發的時間)與第一搜尋條件對電子郵件進行加密作 業,並將加密作業後的電子郵件M傳送至雲端郵件伺服器12。 In step S210, the sending device 11 encrypts the email according to the public key 100, the time string (the time to be triggered) and the first search condition. And the email M after the encrypted job is transmitted to the cloud mail server 12.
由此可知,步驟S210與步驟S110的差異在於:送方裝置11更依據時間字串對電子郵件進行加密作業,並將加密作業後的電子郵件M傳送至雲端郵件伺服器12。 It can be seen that the difference between step S210 and step S110 is that the sending device 11 further encrypts the email according to the time string, and transmits the encrypted email M to the cloud mail server 12.
具體而言,送方裝置11依據時間字串可進一步指定於一特定時間(例如,年、月、日、時、分等)來臨時,收方裝置10才能夠對加密作業後的此電子郵件M進行搜尋或解密。 Specifically, the sending device 11 can further specify a specific time (for example, year, month, day, hour, minute, etc.) according to the time string, and the receiving device 10 can perform the email after the encrypted job. M searches or decrypts.
於步驟S220中:收方裝置10依據私鑰、時間觸發權仗與第二搜尋條件產生搜尋權仗101並將搜尋權仗101傳送至雲端郵件伺服器12。 In step S220, the receiving device 10 generates the search right 101 according to the private key, the time triggering right and the second search condition, and transmits the search right 101 to the cloud mail server 12.
承上述,收方裝置10於此特定時間來臨時才能依據私鑰與第二搜尋條件產生搜尋權仗101並將搜尋權仗101傳送至雲端郵件伺服器12。 In the above, the receiving device 10 can temporarily generate the search right 101 according to the private key and the second search condition and transmit the search right 101 to the cloud mail server 12 at this specific time.
於步驟S230中:雲端郵件伺服器12依據搜尋權仗101以搜尋加密作業後的此電子郵件M。 In step S230, the cloud mail server 12 searches for the email M after the encryption job according to the search right 101.
詳言之,搜尋方法更可包含此步驟:於搜尋出加密作業後的電子郵件M後,雲端郵件伺服器12將加密作業後的電子郵件M傳送至收方裝置10或委派裝置13。其中,若收方裝置10未能接收由雲端郵件伺 服器12所傳送的電子郵件,仍可透過委派裝置13協助收方裝置10接收此加密作業後的電子郵件M,以防止收方裝置10遺漏此電子郵件。 In detail, the search method may further include the step of: after searching for the email M after the encrypted job, the cloud mail server 12 transmits the encrypted email M to the receiving device 10 or the delegation device 13. Among them, if the receiving device 10 fails to receive the mail from the cloud The email transmitted by the server 12 can still be used by the dispatching device 13 to assist the receiving device 10 to receive the email M after the encrypted job to prevent the receiving device 10 from missing the email.
請同時參閱圖3與圖4B,圖4B為本發明另一實施例具隱私保護之電子郵件的搜尋方法的流程圖。 Please refer to FIG. 3 and FIG. 4B simultaneously. FIG. 4B is a flowchart of a method for searching for an email with privacy protection according to another embodiment of the present invention.
如圖3所示,觸發器14用以產生一字串140與一觸發權杖。於此實施例中,觸發器14以事件觸發器為例,事件觸發器用以產生事件字串與事件觸發權仗。 As shown in FIG. 3, the flip-flop 14 is used to generate a string 140 and a trigger token. In this embodiment, the trigger 14 takes an event trigger as an example, and the event trigger is used to generate an event string and an event triggering weight.
如圖4B所示,搜尋方法包含:送方裝置更依據事件字串對電子郵件進行加密作業,並將加密作業後的電子郵件傳送至雲端郵件伺服器(步驟S310);收方裝置更依據事件觸發權仗產生搜尋權仗並將搜尋權仗傳送至雲端郵件伺服器(步驟S320);雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的電子郵件(步驟S330)。 As shown in FIG. 4B, the searching method includes: the sending device further encrypts the email according to the event string, and transmits the encrypted email to the cloud mail server (step S310); the receiving device is further based on the event. The triggering authority generates a search right and transmits the search right to the cloud mail server (step S320); the cloud mail server searches for the email after the encrypted job according to the search right (step S330).
於步驟S310中:送方裝置11依據公鑰100、事件字串(欲觸發的事件)與第一搜尋條件對電子郵件進行加密作業,並將加密作業後的電子郵件M傳送至雲端郵件伺服器。 In step S310, the sending device 11 encrypts the email according to the public key 100, the event string (the event to be triggered) and the first search condition, and transmits the encrypted email M to the cloud mail server. .
由此可知,步驟S310與步驟S110的差異在於:送方裝置11更依據事件字串對電子郵件進行加密作業,並將加密作業後的電子郵件M傳送至雲端郵件伺服器12。 It can be seen that the difference between step S310 and step S110 is that the sending device 11 further encrypts the email according to the event string, and transmits the encrypted email M to the cloud mail server 12.
具體而言,送方裝置11依據事件字串可進一步指定於一特定事件發生後,收方裝置10才能夠對加密作業後的此電子郵件M進行搜尋或解密。 Specifically, the sending device 11 can further specify that after the occurrence of a specific event, the receiving device 10 can search or decrypt the email M after the encrypted job.
於步驟S320中:收方裝置10依據私鑰、事件觸發權仗與第二搜尋條件產生搜尋權仗101並將搜尋權仗101傳送至雲端郵件伺服器12。 In step S320, the receiving device 10 generates the search right 101 according to the private key, the event triggering right and the second search condition, and transmits the search right 101 to the cloud mail server 12.
承上述,收方裝置10於此特定事件發生後才能依據私鑰與第二搜尋條件產生搜尋權仗101並將搜尋權仗101傳送至雲端郵件伺服器12。 In the above, the receiving device 10 can generate the search right 101 according to the private key and the second search condition after the specific event occurs, and transmit the search right 101 to the cloud mail server 12.
於步驟S330中:雲端郵件伺服器12依據搜尋權仗101以搜尋加密作業後的此電子郵件M。 In step S330, the cloud mail server 12 searches for the email M after the encryption job according to the search right 101.
詳言之,搜尋方法更可包含此步驟:於搜尋出加密作業後的電子郵件M後,雲端郵件伺服器12將加密作業後的電子郵件M傳送至收方裝置10或委派裝置13。其中,若收方裝置10未能接收由雲端郵件伺服器12所傳送的電子郵件,仍可透過委派裝置13協助收方裝置10接收此加密作業後的電子郵件M,以防止收方裝置10遺漏此電子郵件M。 In detail, the search method may further include the step of: after searching for the email M after the encrypted job, the cloud mail server 12 transmits the encrypted email M to the receiving device 10 or the delegation device 13. If the receiving device 10 fails to receive the email transmitted by the cloud mail server 12, the dispatching device 13 can still assist the receiving device 10 to receive the email M after the encrypted operation to prevent the receiving device 10 from being missed. This email M.
另外,上述雲端運算環境中的收方裝置10、送方裝置11或委派裝置13可為手機或電腦等行動裝置,但不限定於此。 Further, the receiving device 10, the sending device 11, or the delegation device 13 in the cloud computing environment may be a mobile device or a mobile device such as a computer, but is not limited thereto.
本發明實施例所述具隱私保護之電子郵件的搜尋方法具有下列之特點: The search method for the privacy protected email according to the embodiment of the present invention has the following characteristics:
1.除了收方裝置(或委派裝置)之外,其他任何裝置(包含雲端 郵件伺服器)無法得知被加密且存放在雲端郵件伺服器之電子郵件的內容,且收方裝置可依據私鑰與第二搜尋條件產生搜尋權仗,並由雲端郵件伺服器依據此搜尋權仗來搜尋加密作業後的此電子郵件。如此,使電子郵件被加密後,收方裝置仍可從雲端郵件伺服器尋找出加密作業後的此電子郵件。 1. Any device other than the receiving device (or delegate device) (including the cloud) The mail server cannot know the content of the email encrypted and stored in the cloud mail server, and the receiving device can generate the search right according to the private key and the second search condition, and the search service is based on the cloud mail server.仗Search for this email after the encrypted job. In this way, after the email is encrypted, the receiving device can still find the email after the encrypted job from the cloud mail server.
2.當收方裝置依據第二搜尋條件搜尋加密後的電子郵件時,雲端郵件伺服器在不知搜尋條件或關鍵字的狀況下,也可正確地找出符合條件的加密信件。 2. When the receiving device searches for the encrypted email according to the second search condition, the cloud mail server can correctly find the encrypted mail that meets the condition without knowing the search condition or the keyword.
3.利用時間觸發權仗,收方裝置於一特定時間來臨時才能夠對加密作業後的電子郵件進行搜尋或解密。 3. Using the time triggering right, the receiving device can search or decrypt the encrypted email after a certain time.
4.利用事件觸發權仗,收方裝置於一特定事件發生後才能夠對加密作業後的電子郵件進行搜尋或解密。 4. Using the event triggering authority, the receiving device can search or decrypt the encrypted email after a specific event occurs.
綜上所述,乃僅記載本發明為呈現解決問題所採用的技術手段之較佳實施方式或實施例而已,並非用來限定本發明專利實施之範圍。即凡與本發明專利申請範圍文義相符,或依本發明專利範圍所做的均等變化與修飾,皆為本發明專利範圍所涵蓋。 In summary, the present invention is only described as a preferred embodiment or embodiment of the technical means for solving the problem, and is not intended to limit the scope of the invention. That is, the equivalent changes and modifications made in accordance with the scope of the patent application of the present invention or the scope of the invention are covered by the scope of the invention.
1‧‧‧雲端運算環境 1‧‧‧Cloud computing environment
10‧‧‧收方裝置 10‧‧‧ Receiving device
100‧‧‧公鑰 100‧‧‧ public key
101‧‧‧搜尋權仗 101‧‧ Search rights
11‧‧‧送方裝置 11‧‧‧Send device
12‧‧‧雲端郵件伺服器 12‧‧‧Cloud Mail Server
13‧‧‧委派裝置 13‧‧‧Delegation device
14‧‧‧觸發器 14‧‧‧ Trigger
140‧‧‧字串 140‧‧‧ string
M‧‧‧電子郵件 M‧‧‧Email
S100~S140;S210~S230;S310~S330‧‧‧步驟 S100~S140; S210~S230; S310~S330‧‧‧ steps
圖1為本發明一實施例具隱私保護之電子郵件的搜尋方法其所運用之雲端運算環境的示意圖;圖2為本發明一實施例具隱私保護之電子郵件的搜尋方法的流程圖;圖3為本發明另一實施例具隱私保護之電子郵件的搜尋方法其所運用之雲端運算環境的示意圖;圖4A為本發明另一實施例具隱私保護之電子郵件的搜尋方法的流程圖;以及圖4B為本發明另一實施例具隱私保護之電子郵件的搜尋方法的流程圖。 1 is a schematic diagram of a cloud computing environment used by a privacy-protected email search method according to an embodiment of the present invention; FIG. 2 is a flowchart of a privacy-protected email search method according to an embodiment of the present invention; FIG. 4A is a schematic diagram of a cloud computing environment for a privacy-protected email search method according to another embodiment of the present invention; FIG. 4A is a flowchart of a privacy-protected email search method according to another embodiment of the present invention; 4B is a flowchart of a method for searching for a privacy-protected email according to another embodiment of the present invention.
S100~S140‧‧‧步驟 S100~S140‧‧‧Steps
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW101119565A TWI456947B (en) | 2012-05-31 | 2012-05-31 | Privacy-protected email search method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW101119565A TWI456947B (en) | 2012-05-31 | 2012-05-31 | Privacy-protected email search method |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201349801A true TW201349801A (en) | 2013-12-01 |
TWI456947B TWI456947B (en) | 2014-10-11 |
Family
ID=50157626
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW101119565A TWI456947B (en) | 2012-05-31 | 2012-05-31 | Privacy-protected email search method |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI456947B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI505112B (en) * | 2014-01-06 | 2015-10-21 | Openfind Information Technology Inc | E-mail server-side profile filtering method |
-
2012
- 2012-05-31 TW TW101119565A patent/TWI456947B/en not_active IP Right Cessation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI505112B (en) * | 2014-01-06 | 2015-10-21 | Openfind Information Technology Inc | E-mail server-side profile filtering method |
Also Published As
Publication number | Publication date |
---|---|
TWI456947B (en) | 2014-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12001579B1 (en) | Cloud messaging system | |
US9686243B1 (en) | Encrypted universal resource identifier (URI) based messaging | |
US10937339B2 (en) | Digital cryptosystem with re-derivable hybrid keys | |
CN102546607A (en) | Providing security services on the cloud | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
US10063655B2 (en) | Information processing method, trusted server, and cloud server | |
CN108199838B (en) | Data protection method and device | |
US20160359822A1 (en) | Sovereign share encryption protocol | |
CN101924710A (en) | Management system and method for enterprise email box | |
JP5939953B2 (en) | Electronic file transmission system, program, and electronic file transmission method | |
CN105721393A (en) | Data security encryption method and data security encryption device | |
CN112889240A (en) | Server device, communication terminal, communication system, and program | |
Barukab et al. | Secure communication using symmetric and asymmetric cryptographic techniques | |
KR102703672B1 (en) | Systems and methods for security identification search | |
CN111988325A (en) | Transaction information processing system, method, apparatus, computer device and storage medium | |
WO2015156145A1 (en) | Re-encryption method, re-encryption system, and re-encryption device | |
JP2007142504A (en) | Information processing system | |
TW201349801A (en) | E-mail searching method with privacy protection | |
US20220109657A1 (en) | Email encryption system | |
Belose et al. | Data security using Armstrong numbers | |
JP2022522555A (en) | Secure message delivery using semi-trusted relayers | |
US20150089217A1 (en) | Method and System for Data Protection | |
KR20180068537A (en) | Encryption and decryption system using unique serial number and symmetric cryptography | |
CN101322348A (en) | Encapsulating address components | |
JP6167598B2 (en) | Information processing apparatus, information processing method, and computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |