[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

TW201349801A - E-mail searching method with privacy protection - Google Patents

E-mail searching method with privacy protection Download PDF

Info

Publication number
TW201349801A
TW201349801A TW101119565A TW101119565A TW201349801A TW 201349801 A TW201349801 A TW 201349801A TW 101119565 A TW101119565 A TW 101119565A TW 101119565 A TW101119565 A TW 101119565A TW 201349801 A TW201349801 A TW 201349801A
Authority
TW
Taiwan
Prior art keywords
email
search
searching
cloud
mail server
Prior art date
Application number
TW101119565A
Other languages
Chinese (zh)
Other versions
TWI456947B (en
Inventor
Chun-I Fan
shi-yuan Huang
Feng Chiao
Siek Siang Chiang
Chang-Wei Liu
Shiang-Guo Huang
Original Assignee
Univ Nat Sun Yat Sen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Nat Sun Yat Sen filed Critical Univ Nat Sun Yat Sen
Priority to TW101119565A priority Critical patent/TWI456947B/en
Publication of TW201349801A publication Critical patent/TW201349801A/en
Application granted granted Critical
Publication of TWI456947B publication Critical patent/TWI456947B/en

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

An e-mail searching method with privacy protection is suitable for a cloud computing environment which comprises a receiver device, a sender device and a cloud e-mail server. The searching method comprises: utilizing the sender device to receive the public key of the receiver device; the sender device processing the encryption operation to the e-mail based on the public key and a first searching condition and transmitting the encrypted e-mail to the cloud e-mail server; the receiver device generating a searching token based on the private key and a second searching condition and transmitting the searching token to the cloud e-mail server; and the cloud e-mail server searching the encrypted e-mail based on the searching token.

Description

具隱私保護之電子郵件的搜尋方法 Privacy-protected email search method

本發明是有關於一種電子郵件的搜尋方法,且特別是有關於一種具隱私保護之電子郵件的搜尋方法。 The present invention relates to a method for searching for an email, and more particularly to a method for searching for a privacy-protected email.

隨著資訊科技的發達,網路通訊已經成為人與人之間重要的溝通工具之一。其中,電子郵件即為現代網路通訊的基本服務。承上述,雖然電子郵件已成為現代網路通訊的基本服務,仍然有些運用於其中的資訊保密或資訊傳送的技術需要被改善甚至是被取代。 With the development of information technology, Internet communication has become one of the important communication tools between people. Among them, e-mail is the basic service of modern network communication. In view of the above, although e-mail has become the basic service of modern network communication, there are still some technologies for information confidentiality or information transmission that need to be improved or even replaced.

例如,於傳統的郵件系統中,若要對加密的資訊進行搜尋,必需要將所有資訊從系統資料庫中下載下來,解密後才能進行搜尋之動作,以避免攻擊者竊取資訊。然而,現實環境(例如:雲端運算環境)資料量非常龐大,此作法要將所有資料下載下來是較不切實際且不容易達成。 For example, in a traditional mail system, if you want to search for encrypted information, you must download all the information from the system database, and decrypt it before you can perform the search to prevent the attacker from stealing information. However, the actual environment (for example, the cloud computing environment) has a very large amount of data. It is unrealistic and not easy to download all the data.

因此,在電子郵件牽涉到個人隱私或其他重要資訊的情況下,如何讓電子郵件的使用更加安全且更具保障,便成為一項重要的議題。 Therefore, how to make the use of e-mail safer and more secure has become an important issue when e-mail involves personal privacy or other important information.

本發明提供一種具隱私保護之電子郵件的搜尋方法。 The invention provides a method for searching for emails with privacy protection.

具隱私保護之電子郵件的搜尋方法適用於雲端運算環境,雲端運算環境包含收方裝置、送方裝置以及雲端郵件伺服器,搜尋方法包含:利用送方裝置接收收方裝置的公 鑰;送方裝置依據公鑰與第一搜尋條件對電子郵件進行加密作業,並將加密作業後的此電子郵件傳送至雲端郵件伺服器;收方裝置依據私鑰與第二搜尋條件產生搜尋權仗(token),並將搜尋權仗傳送至雲端郵件伺服器;雲端郵件伺服器依據此搜尋權仗以搜尋加密作業後的此電子郵件。 The search method for privacy-protected e-mail is applicable to a cloud computing environment, and the cloud computing environment includes a receiving device, a sending device, and a cloud mail server. The searching method includes: receiving the receiving device by using the sending device Key; the sending device encrypts the email according to the public key and the first search condition, and transmits the email after the encrypted job to the cloud mail server; the receiving device generates the search right according to the private key and the second search condition To (token), and the search right is transmitted to the cloud mail server; the cloud mail server uses this search right to search for this email after the encrypted job.

依照本發明的實施例所述搜尋方法,其中搜尋方法更包含此步驟:於搜尋出加密作業後的電子郵件後,雲端郵件伺服器將加密作業後的此電子郵件傳送至收方裝置及/或雲端運算環境中的委派(Delegated)裝置,其中委派裝置包含手機或電腦。 According to the search method of the embodiment of the present invention, the search method further includes the step of: after searching for the email after the encrypted job, the cloud mail server transmits the email after the encrypted job to the receiving device and/or A Delegated device in a cloud computing environment, where the delegate device includes a cell phone or a computer.

依照本發明的實施例所述搜尋方法,其中雲端運算環境更包含時間觸發器以產生時間字串與時間觸發權仗,搜尋方法包含:送方裝置更依據此時間字串(欲觸發的時間)對電子郵件進行加密作業,並將加密作業後的此電子郵件傳送至雲端郵件伺服器;收方裝置更依據此時間觸發權仗產生搜尋權仗並將搜尋權仗傳送至雲端郵件伺服器;雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的此電子郵件。 The search method according to the embodiment of the present invention, wherein the cloud computing environment further includes a time trigger to generate a time string and a time triggering right, and the searching method includes: the sending device is further based on the time string (time to be triggered) Encrypt the email and send the email after the encrypted job to the cloud mail server; the receiving device generates the search right according to the time triggering authority and transmits the search right to the cloud mail server; the cloud The mail server searches for this email after the encrypted job based on the search rights.

依照本發明的實施例所述搜尋方法,其中雲端運算環境更包含事件觸發器以產生事件字串與事件觸發權仗,搜尋方法包含:送方裝置更依據此事件字串(欲觸發的事件)對電子郵件進行加密作業,並將加密作業後的此電子郵件傳送至雲端郵件伺服器;收方裝置更依據此事件觸發權仗 產生搜尋權仗並將搜尋權仗傳送至雲端郵件伺服器;雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的此電子郵件。 According to the search method of the embodiment of the present invention, the cloud computing environment further includes an event trigger to generate an event string and an event triggering right, and the searching method includes: the sending device is further based on the event string (the event to be triggered) Encrypt the email and send the email after the encrypted job to the cloud mail server; the receiving device triggers the event based on this event. Generate search rights and transfer search rights to the cloud mail server; the cloud mail server searches for this email after the encrypted job based on the search rights.

依照本發明的實施例所述搜尋方法,其中第一搜尋條件包含字串。 The search method according to an embodiment of the present invention, wherein the first search condition includes a string.

依照本發明的實施例所述搜尋方法,其中第二搜尋條件包含字串。 The search method according to an embodiment of the present invention, wherein the second search condition includes a string.

依照本發明的實施例所述搜尋方法,其中收方裝置包含手機或電腦。 A search method according to an embodiment of the present invention, wherein the receiving device comprises a mobile phone or a computer.

依照本發明的實施例所述搜尋方法,其中送方裝置包含手機或電腦。 A search method according to an embodiment of the present invention, wherein the sending device comprises a mobile phone or a computer.

運用本發明實施例的特點之一在於:除了收方裝置之外,其他任何裝置(包含雲端郵件伺服器)無法得知被加密且存放在雲端郵件伺服器之電子郵件的內容,且收方裝置可依據私鑰與第二搜尋條件產生搜尋權仗,並由雲端郵件伺服器依據此搜尋權仗來搜尋加密作業後的此電子郵件。如此,使電子郵件被加密後,收方裝置仍可從雲端郵件伺服器尋找出加密作業後的此電子郵件。 One of the features of the embodiment of the present invention is that, except for the receiving device, any other device (including the cloud mail server) cannot know the content of the email encrypted and stored in the cloud mail server, and the receiving device The search right may be generated according to the private key and the second search condition, and the cloud mail server searches for the email after the encrypted job according to the search right. In this way, after the email is encrypted, the receiving device can still find the email after the encrypted job from the cloud mail server.

為讓本發明之上述目的、特徵和特點能更明顯易懂,茲配合圖式將本發明相關實施例詳細說明如下。 The above described objects, features, and characteristics of the present invention will become more apparent from the aspects of the invention.

請同時參閱圖1與圖2,圖1為本發明一實施例具隱私保護之電子郵件的搜尋方法其所運用之雲端運算環境的示意 圖;圖2為本發明一實施例具隱私保護之電子郵件的搜尋方法的流程圖。 Please refer to FIG. 1 and FIG. 2 simultaneously. FIG. 1 is a schematic diagram of a cloud computing environment used by a method for searching for a privacy-protected email according to an embodiment of the present invention. FIG. 2 is a flowchart of a method for searching for an email with privacy protection according to an embodiment of the present invention.

具隱私保護之電子郵件的搜尋方法(以下簡稱搜尋方法)適用於雲端運算環境1,雲端運算環境1包含收方裝置10、送方裝置11以及雲端郵件伺服器12。 The search method for the privacy-protected e-mail (hereinafter referred to as the search method) is applied to the cloud computing environment 1, and the cloud computing environment 1 includes the receiving device 10, the sending device 11, and the cloud mail server 12.

搜尋方法包含下列步驟:利用送方裝置接收收方裝置的公鑰(步驟S100);送方裝置依據公鑰與第一搜尋條件對電子郵件進行加密作業,並將加密作業後的電子郵件傳送至雲端郵件伺服器(步驟S110);收方裝置依據私鑰與第二搜尋條件產生搜尋權仗,並將搜尋權仗傳送至雲端郵件伺服器(步驟S120);雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的電子郵件(步驟S130)。 The searching method includes the following steps: receiving, by the sending device, a public key of the receiving device (step S100); the sending device encrypts the email according to the public key and the first search condition, and transmits the encrypted email to the email a cloud mail server (step S110); the receiving device generates a search right according to the private key and the second search condition, and transmits the search right to the cloud mail server (step S120); the cloud mail server according to the search right The email after the encryption job is searched (step S130).

詳言之,當送方裝置11欲傳送被加密的電子郵件M至收方裝置10,且收方裝置10欲從雲端郵件伺服器12搜尋此被加密的此電子郵件M時,可進行下列步驟:於步驟S100中:可利用送方裝置11預先接收由收方裝置10所傳送的公鑰(Public Key)100。其中,利用此公鑰100,送方裝置11可對電子郵件進行加密作業;另一方面,收方裝置10則具有能夠對此公鑰100進行解密作業的私鑰(Private Key)。 In detail, when the sending device 11 wants to transmit the encrypted email M to the receiving device 10, and the receiving device 10 wants to search the encrypted email M from the cloud mail server 12, the following steps can be performed. In step S100, the public key (Public Key) 100 transmitted by the receiving device 10 can be received in advance by the sending device 11. Here, with the public key 100, the sending device 11 can perform an encryption operation on the electronic mail; on the other hand, the receiving device 10 has a private key (Private Key) capable of decrypting the public key 100.

接著,於步驟S110中:送方裝置11可依據公鑰100與第一搜尋條件對一電子 郵件進行加密作業,並將加密作業後的此電子郵件M傳送至雲端郵件伺服器12,使加密作業後的此電子郵件M存放在雲端郵件伺服器12。其中,第一搜尋條件包含字串。此字串可為與送方裝置11相關的人、事、時、地、物等關鍵字。 Next, in step S110: the sending device 11 can pair an electronic with the first search condition according to the public key 100. The mail is encrypted, and the email M after the encrypted job is transmitted to the cloud mail server 12, so that the email M after the encryption job is stored in the cloud mail server 12. The first search condition includes a string. This string may be a keyword such as a person, a thing, a time, a place, or an object related to the delivery device 11.

於步驟S120中:收方裝置10依據私鑰與第二搜尋條件產生搜尋權仗(search token)101,並將搜尋權仗101傳送至雲端郵件伺服器12。其中,搜尋權仗101由收方裝置10的一權仗產生器所產生;第二搜尋條件包含字串。此字串可為人、事、時、地、物等關鍵字。例如:第二搜尋條件可為與送方裝置11對應的相關關鍵字;或者,第二搜尋條件可為收方裝置10針對加密作業後的此電子郵件M所欲搜尋的相關關鍵字。 In step S120, the receiving device 10 generates a search token 101 according to the private key and the second search condition, and transmits the search right 101 to the cloud mail server 12. The search right 101 is generated by a weight generator of the receiving device 10; the second search condition includes a string. This string can be a keyword for people, things, time, place, and things. For example, the second search condition may be a related keyword corresponding to the sending device 11; or the second search condition may be a related keyword to be searched by the receiving device 10 for the email M after the encrypted job.

於步驟S130中:雲端郵件伺服器12依據收方裝置10所傳送的搜尋權仗101以搜尋加密作業後的電子郵件M。 In step S130, the cloud mail server 12 searches for the email M after the encryption operation based on the search right 101 transmitted by the receiving device 10.

詳言之,搜尋方法更包含此步驟:於搜尋出加密作業後的電子郵件後,雲端郵件伺服器將加密作業後的電子郵件傳送至收方裝置(步驟S140)。 In detail, the search method further includes the step of: after searching for the email after the encrypted job, the cloud mail server transmits the encrypted email to the receiving device (step S140).

步驟S140中,當雲端郵件伺服器12依據搜尋權仗101並搜尋出加密作業後的此電子郵件M後,雲端郵件伺服器12便將加密作業後的此電子郵件M回傳至收方裝置10。 In step S140, after the cloud mail server 12 searches for the email M after the encryption operation according to the search right 101, the cloud mail server 12 transmits the email M after the encryption operation to the receiving device 10. .

由此可知,在電子郵件被加密而成為密文狀態後,收方裝置10仍可利用雲端郵件伺服器12尋找出加密作業後的此電子郵件M。 It can be seen that after the email is encrypted and becomes the ciphertext state, the receiving device 10 can still use the cloud mail server 12 to find the email M after the encryption operation.

請參閱圖3,圖3為本發明另一實施例具隱私保護之電子郵件的搜尋方法其所運用之雲端運算環境的示意圖;圖4A為本發明另一實施例具隱私保護之電子郵件的搜尋方法的流程圖。 Please refer to FIG. 3. FIG. 3 is a schematic diagram of a cloud computing environment used by a privacy-protected email search method according to another embodiment of the present invention; FIG. 4A is a diagram of a privacy-protected email search according to another embodiment of the present invention; Flow chart of the method.

如圖3所示,此實施例與上述實施例之差異在於:雲端運算環境1更包含委派裝置13與觸發器14。 As shown in FIG. 3, the difference between this embodiment and the above embodiment is that the cloud computing environment 1 further includes the delegation device 13 and the trigger 14.

其中,委派裝置13與收方裝置10為相互通訊連結,委派裝置13可作為收方裝置10的助理角色;觸發器14用以產生一字串140與一觸發權杖(其中,字串140與觸發權杖可為加密與解密的對應關係)。於此實施例中,觸發器14以時間觸發器為例,時間觸發器用以產生時間字串與時間觸發權仗。 The delegating device 13 and the receiving device 10 are in communication with each other, and the delegating device 13 can serve as an assistant role of the receiving device 10; the trigger 14 is configured to generate a string 140 and a triggering token (wherein the string 140 The trigger token can be the correspondence between encryption and decryption). In this embodiment, the trigger 14 is exemplified by a time trigger for generating a time string and a time triggering weight.

如圖4A所示,搜尋方法包含:送方裝置更依據時間字串對電子郵件進行加密作業,並將加密作業後的電子郵件傳送至雲端郵件伺服器(步驟S210);收方裝置更依據時間觸發權仗產生搜尋權仗並將搜尋權仗傳送至雲端郵件伺服器(步驟S220);雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的電子郵件(步驟S230)。 As shown in FIG. 4A, the searching method includes: the sending device further encrypts the email according to the time string, and transmits the email after the encrypted job to the cloud mail server (step S210); the receiving device is more time-dependent. The triggering authority generates a search right and transmits the search right to the cloud mail server (step S220); the cloud mail server searches for the email after the encrypted job according to the search right (step S230).

於步驟S210中:送方裝置11依據公鑰100、時間字串(欲觸發的時間)與第一搜尋條件對電子郵件進行加密作 業,並將加密作業後的電子郵件M傳送至雲端郵件伺服器12。 In step S210, the sending device 11 encrypts the email according to the public key 100, the time string (the time to be triggered) and the first search condition. And the email M after the encrypted job is transmitted to the cloud mail server 12.

由此可知,步驟S210與步驟S110的差異在於:送方裝置11更依據時間字串對電子郵件進行加密作業,並將加密作業後的電子郵件M傳送至雲端郵件伺服器12。 It can be seen that the difference between step S210 and step S110 is that the sending device 11 further encrypts the email according to the time string, and transmits the encrypted email M to the cloud mail server 12.

具體而言,送方裝置11依據時間字串可進一步指定於一特定時間(例如,年、月、日、時、分等)來臨時,收方裝置10才能夠對加密作業後的此電子郵件M進行搜尋或解密。 Specifically, the sending device 11 can further specify a specific time (for example, year, month, day, hour, minute, etc.) according to the time string, and the receiving device 10 can perform the email after the encrypted job. M searches or decrypts.

於步驟S220中:收方裝置10依據私鑰、時間觸發權仗與第二搜尋條件產生搜尋權仗101並將搜尋權仗101傳送至雲端郵件伺服器12。 In step S220, the receiving device 10 generates the search right 101 according to the private key, the time triggering right and the second search condition, and transmits the search right 101 to the cloud mail server 12.

承上述,收方裝置10於此特定時間來臨時才能依據私鑰與第二搜尋條件產生搜尋權仗101並將搜尋權仗101傳送至雲端郵件伺服器12。 In the above, the receiving device 10 can temporarily generate the search right 101 according to the private key and the second search condition and transmit the search right 101 to the cloud mail server 12 at this specific time.

於步驟S230中:雲端郵件伺服器12依據搜尋權仗101以搜尋加密作業後的此電子郵件M。 In step S230, the cloud mail server 12 searches for the email M after the encryption job according to the search right 101.

詳言之,搜尋方法更可包含此步驟:於搜尋出加密作業後的電子郵件M後,雲端郵件伺服器12將加密作業後的電子郵件M傳送至收方裝置10或委派裝置13。其中,若收方裝置10未能接收由雲端郵件伺 服器12所傳送的電子郵件,仍可透過委派裝置13協助收方裝置10接收此加密作業後的電子郵件M,以防止收方裝置10遺漏此電子郵件。 In detail, the search method may further include the step of: after searching for the email M after the encrypted job, the cloud mail server 12 transmits the encrypted email M to the receiving device 10 or the delegation device 13. Among them, if the receiving device 10 fails to receive the mail from the cloud The email transmitted by the server 12 can still be used by the dispatching device 13 to assist the receiving device 10 to receive the email M after the encrypted job to prevent the receiving device 10 from missing the email.

請同時參閱圖3與圖4B,圖4B為本發明另一實施例具隱私保護之電子郵件的搜尋方法的流程圖。 Please refer to FIG. 3 and FIG. 4B simultaneously. FIG. 4B is a flowchart of a method for searching for an email with privacy protection according to another embodiment of the present invention.

如圖3所示,觸發器14用以產生一字串140與一觸發權杖。於此實施例中,觸發器14以事件觸發器為例,事件觸發器用以產生事件字串與事件觸發權仗。 As shown in FIG. 3, the flip-flop 14 is used to generate a string 140 and a trigger token. In this embodiment, the trigger 14 takes an event trigger as an example, and the event trigger is used to generate an event string and an event triggering weight.

如圖4B所示,搜尋方法包含:送方裝置更依據事件字串對電子郵件進行加密作業,並將加密作業後的電子郵件傳送至雲端郵件伺服器(步驟S310);收方裝置更依據事件觸發權仗產生搜尋權仗並將搜尋權仗傳送至雲端郵件伺服器(步驟S320);雲端郵件伺服器依據搜尋權仗以搜尋加密作業後的電子郵件(步驟S330)。 As shown in FIG. 4B, the searching method includes: the sending device further encrypts the email according to the event string, and transmits the encrypted email to the cloud mail server (step S310); the receiving device is further based on the event. The triggering authority generates a search right and transmits the search right to the cloud mail server (step S320); the cloud mail server searches for the email after the encrypted job according to the search right (step S330).

於步驟S310中:送方裝置11依據公鑰100、事件字串(欲觸發的事件)與第一搜尋條件對電子郵件進行加密作業,並將加密作業後的電子郵件M傳送至雲端郵件伺服器。 In step S310, the sending device 11 encrypts the email according to the public key 100, the event string (the event to be triggered) and the first search condition, and transmits the encrypted email M to the cloud mail server. .

由此可知,步驟S310與步驟S110的差異在於:送方裝置11更依據事件字串對電子郵件進行加密作業,並將加密作業後的電子郵件M傳送至雲端郵件伺服器12。 It can be seen that the difference between step S310 and step S110 is that the sending device 11 further encrypts the email according to the event string, and transmits the encrypted email M to the cloud mail server 12.

具體而言,送方裝置11依據事件字串可進一步指定於一特定事件發生後,收方裝置10才能夠對加密作業後的此電子郵件M進行搜尋或解密。 Specifically, the sending device 11 can further specify that after the occurrence of a specific event, the receiving device 10 can search or decrypt the email M after the encrypted job.

於步驟S320中:收方裝置10依據私鑰、事件觸發權仗與第二搜尋條件產生搜尋權仗101並將搜尋權仗101傳送至雲端郵件伺服器12。 In step S320, the receiving device 10 generates the search right 101 according to the private key, the event triggering right and the second search condition, and transmits the search right 101 to the cloud mail server 12.

承上述,收方裝置10於此特定事件發生後才能依據私鑰與第二搜尋條件產生搜尋權仗101並將搜尋權仗101傳送至雲端郵件伺服器12。 In the above, the receiving device 10 can generate the search right 101 according to the private key and the second search condition after the specific event occurs, and transmit the search right 101 to the cloud mail server 12.

於步驟S330中:雲端郵件伺服器12依據搜尋權仗101以搜尋加密作業後的此電子郵件M。 In step S330, the cloud mail server 12 searches for the email M after the encryption job according to the search right 101.

詳言之,搜尋方法更可包含此步驟:於搜尋出加密作業後的電子郵件M後,雲端郵件伺服器12將加密作業後的電子郵件M傳送至收方裝置10或委派裝置13。其中,若收方裝置10未能接收由雲端郵件伺服器12所傳送的電子郵件,仍可透過委派裝置13協助收方裝置10接收此加密作業後的電子郵件M,以防止收方裝置10遺漏此電子郵件M。 In detail, the search method may further include the step of: after searching for the email M after the encrypted job, the cloud mail server 12 transmits the encrypted email M to the receiving device 10 or the delegation device 13. If the receiving device 10 fails to receive the email transmitted by the cloud mail server 12, the dispatching device 13 can still assist the receiving device 10 to receive the email M after the encrypted operation to prevent the receiving device 10 from being missed. This email M.

另外,上述雲端運算環境中的收方裝置10、送方裝置11或委派裝置13可為手機或電腦等行動裝置,但不限定於此。 Further, the receiving device 10, the sending device 11, or the delegation device 13 in the cloud computing environment may be a mobile device or a mobile device such as a computer, but is not limited thereto.

本發明實施例所述具隱私保護之電子郵件的搜尋方法具有下列之特點: The search method for the privacy protected email according to the embodiment of the present invention has the following characteristics:

1.除了收方裝置(或委派裝置)之外,其他任何裝置(包含雲端 郵件伺服器)無法得知被加密且存放在雲端郵件伺服器之電子郵件的內容,且收方裝置可依據私鑰與第二搜尋條件產生搜尋權仗,並由雲端郵件伺服器依據此搜尋權仗來搜尋加密作業後的此電子郵件。如此,使電子郵件被加密後,收方裝置仍可從雲端郵件伺服器尋找出加密作業後的此電子郵件。 1. Any device other than the receiving device (or delegate device) (including the cloud) The mail server cannot know the content of the email encrypted and stored in the cloud mail server, and the receiving device can generate the search right according to the private key and the second search condition, and the search service is based on the cloud mail server.仗Search for this email after the encrypted job. In this way, after the email is encrypted, the receiving device can still find the email after the encrypted job from the cloud mail server.

2.當收方裝置依據第二搜尋條件搜尋加密後的電子郵件時,雲端郵件伺服器在不知搜尋條件或關鍵字的狀況下,也可正確地找出符合條件的加密信件。 2. When the receiving device searches for the encrypted email according to the second search condition, the cloud mail server can correctly find the encrypted mail that meets the condition without knowing the search condition or the keyword.

3.利用時間觸發權仗,收方裝置於一特定時間來臨時才能夠對加密作業後的電子郵件進行搜尋或解密。 3. Using the time triggering right, the receiving device can search or decrypt the encrypted email after a certain time.

4.利用事件觸發權仗,收方裝置於一特定事件發生後才能夠對加密作業後的電子郵件進行搜尋或解密。 4. Using the event triggering authority, the receiving device can search or decrypt the encrypted email after a specific event occurs.

綜上所述,乃僅記載本發明為呈現解決問題所採用的技術手段之較佳實施方式或實施例而已,並非用來限定本發明專利實施之範圍。即凡與本發明專利申請範圍文義相符,或依本發明專利範圍所做的均等變化與修飾,皆為本發明專利範圍所涵蓋。 In summary, the present invention is only described as a preferred embodiment or embodiment of the technical means for solving the problem, and is not intended to limit the scope of the invention. That is, the equivalent changes and modifications made in accordance with the scope of the patent application of the present invention or the scope of the invention are covered by the scope of the invention.

1‧‧‧雲端運算環境 1‧‧‧Cloud computing environment

10‧‧‧收方裝置 10‧‧‧ Receiving device

100‧‧‧公鑰 100‧‧‧ public key

101‧‧‧搜尋權仗 101‧‧ Search rights

11‧‧‧送方裝置 11‧‧‧Send device

12‧‧‧雲端郵件伺服器 12‧‧‧Cloud Mail Server

13‧‧‧委派裝置 13‧‧‧Delegation device

14‧‧‧觸發器 14‧‧‧ Trigger

140‧‧‧字串 140‧‧‧ string

M‧‧‧電子郵件 M‧‧‧Email

S100~S140;S210~S230;S310~S330‧‧‧步驟 S100~S140; S210~S230; S310~S330‧‧‧ steps

圖1為本發明一實施例具隱私保護之電子郵件的搜尋方法其所運用之雲端運算環境的示意圖;圖2為本發明一實施例具隱私保護之電子郵件的搜尋方法的流程圖;圖3為本發明另一實施例具隱私保護之電子郵件的搜尋方法其所運用之雲端運算環境的示意圖;圖4A為本發明另一實施例具隱私保護之電子郵件的搜尋方法的流程圖;以及圖4B為本發明另一實施例具隱私保護之電子郵件的搜尋方法的流程圖。 1 is a schematic diagram of a cloud computing environment used by a privacy-protected email search method according to an embodiment of the present invention; FIG. 2 is a flowchart of a privacy-protected email search method according to an embodiment of the present invention; FIG. 4A is a schematic diagram of a cloud computing environment for a privacy-protected email search method according to another embodiment of the present invention; FIG. 4A is a flowchart of a privacy-protected email search method according to another embodiment of the present invention; 4B is a flowchart of a method for searching for a privacy-protected email according to another embodiment of the present invention.

S100~S140‧‧‧步驟 S100~S140‧‧‧Steps

Claims (10)

一種具隱私保護之電子郵件的搜尋方法,適用於一雲端運算環境,該雲端運算環境包含一收方裝置、一送方裝置以及一雲端郵件伺服器,該搜尋方法包含:利用該送方裝置接收該收方裝置的一公鑰;該送方裝置依據該公鑰與一第一搜尋條件對一電子郵件進行一加密作業,並將該加密作業後的該電子郵件傳送至一雲端郵件伺服器;該收方裝置依據一私鑰與一第二搜尋條件產生一搜尋權仗,並將該搜尋權仗傳送至該雲端郵件伺服器;以及該雲端郵件伺服器依據該搜尋權仗以搜尋該加密作業後的該電子郵件。 A search method for privacy-protected e-mail is applicable to a cloud computing environment, where the cloud computing environment includes a receiving device, a sending device, and a cloud mail server, and the searching method includes: receiving, by using the sending device a public key of the receiving device; the sending device performs an encryption operation on an email according to the public key and a first search condition, and transmits the email after the encrypted job to a cloud mail server; The receiving device generates a search right according to a private key and a second search condition, and transmits the search right to the cloud mail server; and the cloud mail server searches for the encrypted job according to the search right After the email. 如申請專利範圍第1項所述具隱私保護之電子郵件的搜尋方法,其中該搜尋方法更包含此步驟:於搜尋出該加密作業後的該電子郵件後,該雲端郵件伺服器將該加密作業後的該電子郵件傳送至該收方裝置。 The method for searching for a privacy-protected email according to claim 1, wherein the searching method further comprises the step of: after searching for the email after the encrypted job, the cloud mail server encrypts the email The subsequent email is sent to the receiving device. 如申請專利範圍第2項所述具隱私保護之電子郵件的搜尋方法,其中該雲端運算環境更包含一委派裝置,該雲端郵件伺服器更將該加密作業後的該電子郵件傳送至該委派裝置。 The method for searching for a privacy-protected email according to claim 2, wherein the cloud computing environment further includes a delegation device, and the cloud mail server further transmits the email after the encrypted job to the delegation device. . 如申請專利範圍第1項所述具隱私保護之電子郵件的搜 尋方法,其中該雲端運算環境更包含一時間觸發器以產生一時間字串與一時間觸發權仗,該搜尋方法包含:該送方裝置更依據該時間字串對該電子郵件進行該加密作業,並將該加密作業後的該電子郵件傳送至該雲端郵件伺服器;該收方裝置更依據該時間觸發權仗產生該搜尋權仗並將該搜尋權仗傳送至該雲端郵件伺服器;以及該雲端郵件伺服器依據該搜尋權仗以搜尋該加密作業後的該電子郵件。 Search for a privacy-protected email as described in item 1 of the patent application The searching method, wherein the cloud computing environment further includes a time trigger to generate a time string and a time triggering function, the searching method includes: the sending device further performing the encrypting operation on the email according to the time string Transmitting the email after the encrypted job to the cloud mail server; the receiving device further generates the search right according to the time triggering right, and transmits the search right to the cloud mail server; The cloud mail server searches for the email after the encrypted job according to the search right. 如申請專利範圍第1項所述具隱私保護之電子郵件的搜尋方法,其中該雲端運算環境更包含一事件觸發器以產生一事件字串與一事件觸發權仗,該搜尋方法包含:該送方裝置更依據該事件字串對該電子郵件進行該加密作業,並將該加密作業後的該電子郵件傳送至該雲端郵件伺服器;該收方裝置更依據該事件觸發權仗產生該搜尋權仗並將該搜尋權仗傳送至該雲端郵件伺服器;以及該雲端郵件伺服器依據該搜尋權仗以搜尋該加密作業後的該電子郵件。 The method for searching for a privacy-protected email according to the first aspect of the patent application, wherein the cloud computing environment further includes an event trigger to generate an event string and an event triggering right, the searching method includes: sending The party device further performs the encryption operation on the email according to the event string, and transmits the email after the encrypted job to the cloud mail server; the receiving device further generates the search right according to the event triggering authority. And transmitting the search right to the cloud mail server; and the cloud mail server searches for the email after the encrypted job according to the search right. 如申請專利範圍第1項所述具隱私保護之電子郵件的搜尋方法,其中該第一搜尋條件包含一字串。 The method for searching for a privacy-protected email as described in claim 1, wherein the first search condition includes a string. 如申請專利範圍第1項所述具隱私保護之電子郵件的搜尋方法,其中該第二搜尋條件包含一字串。 The method for searching for a privacy-protected email as described in claim 1, wherein the second search condition includes a string. 如申請專利範圍第1項所述具隱私保護之電子郵件的搜尋方法,其中該收方裝置包含一手機或一電腦。 The method for searching for a privacy-protected e-mail as described in claim 1, wherein the receiving device comprises a mobile phone or a computer. 如申請專利範圍第1項所述具隱私保護之電子郵件的搜尋方法,其中該送方裝置包含一手機或一電腦。 The method for searching for a privacy-protected e-mail as described in claim 1, wherein the delivery device comprises a mobile phone or a computer. 如申請專利範圍第3項所述具隱私保護之電子郵件的搜尋方法,其中該委派裝置包含一手機或一電腦。 The method for searching for a privacy-protected e-mail as described in claim 3, wherein the delegating device comprises a mobile phone or a computer.
TW101119565A 2012-05-31 2012-05-31 Privacy-protected email search method TWI456947B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW101119565A TWI456947B (en) 2012-05-31 2012-05-31 Privacy-protected email search method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW101119565A TWI456947B (en) 2012-05-31 2012-05-31 Privacy-protected email search method

Publications (2)

Publication Number Publication Date
TW201349801A true TW201349801A (en) 2013-12-01
TWI456947B TWI456947B (en) 2014-10-11

Family

ID=50157626

Family Applications (1)

Application Number Title Priority Date Filing Date
TW101119565A TWI456947B (en) 2012-05-31 2012-05-31 Privacy-protected email search method

Country Status (1)

Country Link
TW (1) TWI456947B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI505112B (en) * 2014-01-06 2015-10-21 Openfind Information Technology Inc E-mail server-side profile filtering method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI505112B (en) * 2014-01-06 2015-10-21 Openfind Information Technology Inc E-mail server-side profile filtering method

Also Published As

Publication number Publication date
TWI456947B (en) 2014-10-11

Similar Documents

Publication Publication Date Title
US12001579B1 (en) Cloud messaging system
US9686243B1 (en) Encrypted universal resource identifier (URI) based messaging
US10937339B2 (en) Digital cryptosystem with re-derivable hybrid keys
CN102546607A (en) Providing security services on the cloud
CN104243149A (en) Encrypting and decrypting method, device and server
US10063655B2 (en) Information processing method, trusted server, and cloud server
CN108199838B (en) Data protection method and device
US20160359822A1 (en) Sovereign share encryption protocol
CN101924710A (en) Management system and method for enterprise email box
JP5939953B2 (en) Electronic file transmission system, program, and electronic file transmission method
CN105721393A (en) Data security encryption method and data security encryption device
CN112889240A (en) Server device, communication terminal, communication system, and program
Barukab et al. Secure communication using symmetric and asymmetric cryptographic techniques
KR102703672B1 (en) Systems and methods for security identification search
CN111988325A (en) Transaction information processing system, method, apparatus, computer device and storage medium
WO2015156145A1 (en) Re-encryption method, re-encryption system, and re-encryption device
JP2007142504A (en) Information processing system
TW201349801A (en) E-mail searching method with privacy protection
US20220109657A1 (en) Email encryption system
Belose et al. Data security using Armstrong numbers
JP2022522555A (en) Secure message delivery using semi-trusted relayers
US20150089217A1 (en) Method and System for Data Protection
KR20180068537A (en) Encryption and decryption system using unique serial number and symmetric cryptography
CN101322348A (en) Encapsulating address components
JP6167598B2 (en) Information processing apparatus, information processing method, and computer program

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees