[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2018113707A1 - 一种邮件发送方法、邮件控制方法、发送端及接收端 - Google Patents

一种邮件发送方法、邮件控制方法、发送端及接收端 Download PDF

Info

Publication number
WO2018113707A1
WO2018113707A1 PCT/CN2017/117562 CN2017117562W WO2018113707A1 WO 2018113707 A1 WO2018113707 A1 WO 2018113707A1 CN 2017117562 W CN2017117562 W CN 2017117562W WO 2018113707 A1 WO2018113707 A1 WO 2018113707A1
Authority
WO
WIPO (PCT)
Prior art keywords
mail
receiving end
original
information
original mail
Prior art date
Application number
PCT/CN2017/117562
Other languages
English (en)
French (fr)
Inventor
曾溪泉
Original Assignee
北京奇虎科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京奇虎科技有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2018113707A1 publication Critical patent/WO2018113707A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/08Annexed information, e.g. attachments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a mail sending method, a mail control method, a transmitting end, and a receiving end.
  • E-mail is a common office communication tool for people's daily work.
  • technicians frequently use electronic products such as office computers, personal computers, and mobile phones to send and receive e-mails. Therefore, the information security of e-mail becomes especially important. Since many email contents involve important secrets, undisclosed information or sensitive data, etc., after the sender of the mail sends the mail, the receiving end can freely spread or disclose the mail, and the important mail may be adversely affected after being disclosed. At the same time, it also brings unnecessary trouble to the sender of the mail, and thus it can be seen that there is a technical problem of low security in the prior art mail distribution.
  • the present invention provides a mail transmission method, a mail control method, a transmitting end, and a receiving end that overcome the above problems or at least partially solve the above problems.
  • an embodiment of the present invention provides a method for sending a mail, including:
  • the sender obtains the original message
  • the sending end adds first extended information to the original mail, thereby obtaining the processed original mail;
  • the sending end sends the processed original mail to the receiving end, so that the receiving end controls the operation authority of the original mail based on the first extended information.
  • an embodiment of the present invention provides a mail control method, including:
  • the receiving end receives the mail sent by the sending end
  • the receiving end reads the first extended information added by the sending end in the mail
  • the receiving end implements control of the operation authority of the mail according to the first extension information.
  • an embodiment of the present invention provides a sending end, including:
  • Get unit used to get the original mail
  • Adding unit configured to add first extended information to the original mail, thereby obtaining the processed original mail;
  • the sending unit is configured to send the processed original mail to the receiving end, so that the receiving end controls the operation authority of the original mail based on the first extended information.
  • an embodiment of the present invention provides a receiving end, including:
  • Receiving unit for receiving an email sent by the sending end
  • a reading unit configured to read the first extended information added by the sending end in the mail
  • the control unit is configured to implement control of the operation authority of the mail according to the first extended information.
  • an embodiment of the present invention provides a computer program, including computer readable code, when the computer readable code is run on a computing device, causing the computing device to perform a mail sending method or a mail control method according to the foregoing .
  • an embodiment of the invention is a computer readable medium storing a computer program as described above.
  • the first extended information needs to be added to the original mail, and then sent to the receiving end, so that the receiving end can receive the mail sent by the sending end,
  • the first extended information included in the mail implements the control of the operation authority of the original mail, thereby controlling the permission of the recipient to receive the mail, thereby preventing the mail receiving party from freely processing the mail, thereby Achieve the technical effect of improving the security of mail sending and receiving;
  • the operation authority of the original mail is completed by the sender adding the first extension information in the original mail, and the participation of the mail server is not required in the implementation process, as long as the receiving client can recognize And extracting the first extended information can realize the control of the operation authority of receiving the mail. Therefore, the technical solution of the present invention has no restrictions on the mail server, and only has requirements for the sending and receiving client, and the specific mail client can be matched with any server. Complete control over the recipient's operational permissions, which will allow for a wider range of uses and higher penetration rates.
  • FIG. 1 is a flow chart showing a mail sending method according to an embodiment of the present invention
  • FIG. 2 is a flow chart showing a mail control method according to an embodiment of the present invention.
  • FIG. 3 shows a schematic diagram of a transmitting end according to an embodiment of the present invention
  • FIG. 4 shows a schematic diagram of a receiving end according to an embodiment of the present invention
  • Figure 5 shows schematically a block diagram of a computing device for performing the method according to the invention
  • Fig. 6 schematically shows a storage unit for holding or carrying program code implementing the method according to the invention.
  • the embodiment of the invention provides a mail sending method, a mail control method and a device, which are used to solve the technical problem of low security of mail in the prior art.
  • a method for sending a mail includes:
  • S102 The sending end adds first extended information to the original mail, so as to obtain the processed original mail.
  • the sending end sends the processed original mail to the receiving end, so that the receiving end controls the operation authority of the original mail based on the first extended information.
  • the foregoing mail sending method provided by the present application can be applied to a mail client that uses any protocol to send and receive mail, for example, IMAP (Internet Mail Access Protocol), POP3. (Post Office Protocol 3, the third version of the post office protocol), SMTP (Simple Mail Transfer Protocol), ESMTP (Extended SMTP) and other protocols.
  • IMAP Internet Mail Access Protocol
  • POP3 Post Office Protocol 3, the third version of the post office protocol
  • SMTP Simple Mail Transfer Protocol
  • ESMTP Extended SMTP
  • the mail client can set up various mail servers to use, just complete the configuration according to the relevant mail server address. For example, if a mail client wants to use the SINA mail server, the mail server address (POP3) can be configured.
  • step S101 the sender obtains the original mail.
  • the mail format of the original mail here is not limited.
  • MIMO the full name is “MultipurposeInternet MailExtensions”
  • the more exact Chinese name is “Multipurpose Internet Mail Extension”
  • MIME mail is by mail header and
  • the mail body consists of two parts.
  • the mail header contains important information such as sender, recipient, subject, time, MIME version, and type of mail content.
  • the main format and content are as follows (of course, the following format is only an example, Other formats may be used in the embodiments of the present invention.
  • Content-Type multipart/related
  • the content of the original mail can include text, images, sounds, and various attachment formats.
  • Step S102 the sending end adds the first extended information to the original mail, thereby obtaining the processed original mail.
  • the first extended information is used to control the operation authority of the receiving end to forward and/or reply to the original mail, for example, the first extended information is used to control the receiving end to prohibit forwarding of the original mail, and to prohibit replying, Prohibition of forwarding and prohibiting reply and so on. It should be noted that the first extended information may also be used to limit the operation permission that the receiving end can view the receiving mail, such as archiving, printing, and the like, which are visible to the daily mail client, and are not limited in the present invention.
  • the receiving end has the operation authority for the original mail being prohibited from being forwarded; and/or, if the first The extension information includes the second preset content, and the operation authority of the receiving end to the original mail is a forbidden reply.
  • the first extended information may include a plurality of extended information, for example, a first function field, a first function tag, and the like, and the first preset content (or the second preset content) is different according to the first extended information. What content is for the first preset content (or the second preset content) will be introduced later.
  • the receiving end may determine whether the first extended information is included in the original mail. If the first extended information is included, the receiving end may control whether the first extended information controls the operating authority of the original mail.
  • the sending end adds the first extended information to the original mail, and the specific steps include: the sending end embeds the first function field in the original mail; the sending end assigns a value to the first function field, where the first The function field is given a different value, and the receiving end has different operating permissions on the original message.
  • the assignment of the first function field is the first preset value
  • the operation permission of the receiving end to the original mail is prohibition of forwarding; and/or, if the assignment of the first function field is the second preset value, receiving The operation right of the original mail is forbidden to reply.
  • the first function field implanted in the original mail is XX-CanNotXX, and if the XX-CanNotXX value is 0 (of course, other values, for example, 00, 10, etc.), The operation permission of the receiving end to the original mail is forbidden to be forwarded, and the receiving end does not provide the forwarding operation right for the original mail.
  • the first preset content in the first extended information is the first pre-assigned by the first functional field. Set the value (for example: 0, 00, 10, etc.); if the XX-CanNotXX value is 1 (of course, can also be other values, such as: 01, 11, etc.), the receiving end has the right to operate on the original mail.
  • the reply function is forbidden, so that the receiving end does not provide the reply function and the reply function for the original mail.
  • the first preset content in the first extended information is the second preset value that the first function field is assigned (for example: 1. 01, 11, etc.); if the XX-CanNotXX value is 0/1 (of course, other values, such as: 00/01, 10/11, etc.), the receiving end has the right to operate the original mail to prohibit reply and Forwarding is prohibited, so the receiving end does not provide forwarding for the original message.
  • reply all reply operation functions; if the XX-CanNotXX value is 2 (of course, other values, such as: 110, 111, etc.), the receiving end's operation authority on the original mail is, for example, prohibiting forwarding and only The sender can reply, and the receiving end will not bring the original mail body text when replying. At this time, the receiving end does not provide the operation function of forwarding and all reply, but provides the operation function of reply.
  • the sending end adds the first extended information to the original mail
  • the specific step includes: the sending end adds a first function mark to the original mail, and based on whether the first mail received by the receiving end has the first The function tag, the receiving end has different operation rights to the original mail.
  • the sending end adds a first function tag to the original mail
  • the first function tag is, for example, XX-CanNotFW, XX-CanNotRE (of course, may also be other function identifiers), etc.
  • the receiving end is After receiving the mail, it can be determined whether the first function mark is included in the mail, thereby determining the operation authority of the original mail.
  • the operation authority of the receiving end to the original mail is prohibited from being forwarded, and/or the reply is prohibited.
  • different first function fields may be set for forwarding rights and reply rights.
  • the first function added by the sending end to the original mail is: XX-CanNotFW, and the receiving end responds to the original mail.
  • the operation permission is forbidden to be forwarded, and the receiving end does not provide the forwarding operation function; if the first function added by the sending end to the original mail is marked as: XX-CanNotRE, the receiving end has the operation permission for the original mail to prohibit reply, thereby receiving The operation function of replying and replying all is not provided; if the first function added by the sending end to the original mail is marked as: XX-CanNotRE&FW, the receiving end has the operation permission for the original mail to prohibit reply and prohibit forwarding, and the receiving end is original.
  • the operation permission of the mail is to prohibit replying and prohibiting forwarding, so that the receiving end does not provide the operation function of forwarding, replying, and all replying.
  • the correspondence between the first function field and the operation authority is merely an example and is not a limitation.
  • the first preset content (or the second preset content) is the first function field.
  • the first prompt information for prompting the prohibition of forwarding is given at the receiving end; and/or,
  • the second prompt information for prompting the prohibition of the reply is given at the receiving end.
  • the first prompt information (or the second prompt information) is, for example, text, a picture, a voice, and the like, and the receiving end may determine that the operation permission of the receiving end to the original mail is prohibited from being forwarded.
  • the first prompt information (or the second prompt information) is directly added to the original mail, and the receiving end directly reads the first prompt information (or the second prompt information) in the processed original mail and outputs the first prompt information ( Or the second prompt information); or, the receiving end only adds the corresponding first extended information to the original mail, and after receiving the processed original mail, the receiving end parses the operation authority for the original mail to prohibit forwarding,
  • the first prompt information is generated and output; if the operation permission for the original mail is parsed as prohibiting the reply, the second prompt information is generated and outputted, and the like.
  • the receiving end may output the first prompt information (or the second prompt information) in the form of a pop-up prompt window, or display the watermark form in the received mail body, and the specific display manner is not specifically limited in the present invention.
  • the receiving end can generate prompt information (first prompt information or second prompt information) for the corresponding operation authority, so that the user at the receiving end can be prevented from generating useless operations, thereby improving the efficiency of the mail operation.
  • the sending end adds the first extended information to the original mail, so as to obtain the processed original mail, which specifically includes:
  • the sender packages the original mail into an attachment to the new mail
  • the sender adds the first extension information to the new message, and then obtains the processed original message.
  • the accessory may be an attachment in any format, for example, a compressed file, an email, or the like.
  • the attachment is generated by using an encryption and packaging method.
  • the mail can be parsed to obtain the original mail if the receiving end knows the password of the attachment.
  • the packaged accessory is in the data.360smail format, and includes a file header description and a real file content.
  • 2nd, 3rd byte encrypted data check value
  • the data file content EML of the mail can be encrypted by a symmetric encryption algorithm with an encryption strength of AES256.
  • the receiving end may obtain the original mail included in the attachment; if the mail receiving system of the receiving end is not the specified mail In the system, the receiving end cannot obtain the original mail contained in the attachment.
  • the original mail contained in the attachment cannot be obtained, for example, the receiving end cannot download the attachment, the receiving end can download the attachment but cannot parse the original mail, and the like.
  • the designated mail system can be the same mail system as the mail receiving system of the sending end, or any mail system selected by the sending end.
  • the mail system of the sending end is a 360 mail system, and the 360 mail system sets a special special decoding for the mail. Format, after the sender processes the original mail into the special format, it is sent to the receiving end as an attachment of the new mail; after receiving the processed original mail, the receiving end determines that the mail receiving system is not the 360 mail system, then The receiving end can't download the attachment; or the receiving end can read the original mail in a special format. If the receiving end is the same as the 360 mail system, it can parse the original mail. If the receiving end is not the 360 mail system, the receiving end The original message could not be parsed.
  • the designated mail system can obtain the attachments included in the original mail, thereby further improving the security of the original mail distribution.
  • the receiving end if the receiving end is not the designated mail system, the receiving end provides third prompt information after obtaining the processed original mail, where the third prompt information is used. Instructing the receiving end to use the designated mail system.
  • the third prompt information may be text, image, audio, etc., wherein if the third prompt information is a text or an image, the third prompt information is popped up at the client receiving the mail.
  • the form of the window is displayed, or the body of the received mail is displayed in the form of a watermark, for example, if the sender sets only the 360 mail system to be able to parse the original mail, the receiving end sends the current mail receiving system after obtaining the processed original mail. If the system is not a 360 mail system, the following third prompt message "Please use the 360 mail system to parse the attachment" can be generated through a pop-up window.
  • the specific display manner of the third prompt information is not specifically limited in the present invention.
  • the processed original mail further includes: second extended information, where the The second extension information is used to control the expiration time of the original mail.
  • the second extended information may be added to an area such as a mail header or a mail body of the original mail.
  • the expiration time of the mail can be effectively controlled, thereby further improving the security of mail distribution.
  • the second extended information is a second function field, and if the value of the second function field includes a time point, the original mail fails after the time point; If the value of the two-function field does not include the point in time, the original message will not expire.
  • the second function field is XX-LoseEfficacy, and the value is: Tue, 10Feb 2015 15:36:57+0800, which means that the original mail expires on February 10, 2015. :36:57, if the current browsing time has exceeded the expiration time of 15:36:57 on February 10, 2015, the original mail will be invalid and will not be able to browse normally. Otherwise, if the value of the second function field is empty, it means that the original mail is not controlled by the expiration time, and the original mail can be browsed indefinitely.
  • the second extended information is a second function identifier, and if the second email is included in the original email obtained by the receiving end, the original email is after a preset time period. If the second function tag is not included in the original mail obtained by the receiving end, the original mail will not be invalid.
  • the preset time period may be manually set by the user when sending the email, or may be automatically generated by the system, for example, the system is set to the expiration time after 2 months from the start of the mail sending time, where the preset time is specific.
  • the implementation form is not limited.
  • the second function is marked as XX-LoseEfficacy in the original mail, and the system sets the expiration time to be 1 month after the start of the sending time, and the sending time is 10:00 on January 1, 2016. 1 point, then at 10:1 on February 1, 2016, it is the expiration time point of the original mail. If the current reading time has exceeded the expiration time, the original mail will be invalid and will not be read any more.
  • the expiration time can be set in batches for the mail, thereby improving the efficiency of setting the expiration time.
  • the step S103 is performed, and the sending end sends the processed original mail to the receiving end, so that the receiving end controls the operation authority of the original mail based on the first extended information.
  • the sending end sends the processed original mail, that is, the original mail with the first extended information, to the receiving end
  • the receiving end controls the operation authority of the original mail according to the specific situation of the first extended information, specifically The implementation method will be described in detail later.
  • a mail control method including:
  • S201 The receiving end receives the mail sent by the sending end
  • S202 The receiving end reads the first extended information added by the sending end in the mail.
  • S203 The receiving end implements control of an operation authority of the mail according to the first extended information.
  • Step S201 the receiving end receives the mail sent by the sending end;
  • the mail format of the original mail here is a MIMO format, and is composed of a mail head and a mail body, and the mail header includes the sender, the recipient, the subject, the time, and Important information such as the MIME version, the type of mail content, and the content of the original mail contains text, images, sounds, and various attachment formats.
  • step S202 the receiving end reads the first extended information added by the sending end in the mail
  • the receiving end reads the first extended information added by the sending end in the mail, and is used to control the receiving right of the receiving end to forward and/or reply to the original mail, for example: An extended information control receiving end prohibits forwarding of the original mail, prohibits replying, prohibits forwarding, and prohibits replying.
  • the first extended information may also be used to limit the operation permission that the receiving end can view the receiving mail, such as archiving, printing, and the like, which are visible to the daily mail client, and are not limited in the present invention.
  • the receiving end has the operation authority for the original mail being prohibited from being forwarded; and/or, if the first The extension information includes the second preset content, and the operation authority of the receiving end to the original mail is a forbidden reply.
  • the first extended information may include a plurality of extended information, for example, a first function field, a first function tag, and the like, and the first preset content (or the second preset content) is different according to the first extended information. What content is for the first preset content (or the second preset content) will be introduced later.
  • the receiving end may determine whether the first extended information is included in the original mail. If the first extended information is included, the receiving end may control whether the first extended information controls the operating authority of the original mail.
  • the receiving end reads that the sending end adds the first extended information to the original mail as a first function field that is sent by the sending end in the original mail; the first function field is assigned by the sending end, where The first function field is given a different value, and the receiving end has different operation rights to the original mail.
  • the assignment of the first function field is the first preset value
  • the operation permission of the receiving end to the original mail is prohibition of forwarding; and/or, if the assignment of the first function field is the second preset value, receiving The operation right of the original mail is forbidden to reply.
  • the first function field implanted in the original mail is XX-CanNotXX, and if the XX-CanNotXX value is 0 (of course, other values, for example, 00, 10, etc.), The operation permission of the receiving end to the original mail is forbidden to be forwarded, and the receiving end does not provide the forwarding operation right for the original mail.
  • the first preset content in the first extended information is the first pre-assigned by the first functional field. Set the value (for example: 0, 00, 10, etc.); if the XX-CanNotXX value is 1 (of course, can also be other values, such as: 01, 11, etc.), the receiving end has the right to operate on the original mail.
  • the reply function is forbidden, so that the receiving end does not provide the reply function and the reply function for the original mail.
  • the first preset content in the first extended information is the second preset value that the first function field is assigned (for example: 1. 01, 11, etc.); if the XX-CanNotXX value is 0/1 (of course, other values, such as: 00/01, 10/11, etc.), the receiving end has the right to operate the original mail to prohibit reply and Forwarding is prohibited, so the receiving end does not provide forwarding for the original message.
  • reply all reply operation functions; if the XX-CanNotXX value is 2 (of course, other values, such as: 110, 111, etc.), the receiving end's operation authority on the original mail is, for example, prohibiting forwarding and only The sender can reply, and the receiving end will not bring the original mail body text when replying. At this time, the receiving end does not provide the operation function of forwarding and all reply, but provides the operation function of reply.
  • the receiving end reads the first extended information added by the sending end to the original mail, and the sending end adds a first function identifier to the original mail, based on whether the original mail received by the receiving end exists.
  • a function tag the receiving end has different operating rights to the original mail.
  • the sending end adds the first function tag to the original mail, for example, XX-CanNotFW, XX-CanNotRE (of course, other function identifiers), and the like, and then the receiving end receives the mail. You can determine whether the first function tag is included in the message to determine the permission to operate the original message.
  • the first function tag for example, XX-CanNotFW, XX-CanNotRE (of course, other function identifiers), and the like.
  • the operation authority of the receiving end to the original mail is prohibited from being forwarded, and/or the reply is prohibited.
  • different first function fields may be set for forwarding rights and reply rights.
  • the first function added by the sending end to the original mail is: XX-CanNotFW, and the receiving end responds to the original mail.
  • the operation permission is forbidden to be forwarded, and the receiving end does not provide the forwarding operation function; if the first function added by the sending end to the original mail is marked as: XX-CanNotRE, the receiving end has the operation permission for the original mail to prohibit reply, thereby receiving The operation function of replying and replying all is not provided; if the first function added by the sending end to the original mail is marked as: XX-CanNotRE&FW, the receiving end has the operation permission for the original mail to prohibit reply and prohibit forwarding, and the receiving end is original.
  • the operation permission of the mail is to prohibit replying and prohibiting forwarding, so that the receiving end does not provide the operation function of forwarding, replying, and all replying.
  • the correspondence between the first function field and the operation authority is merely an example and is not a limitation.
  • the first preset content (or the second preset content) is the first function field.
  • the first prompt information for prompting the prohibition of forwarding is given at the receiving end; and/or,
  • the second prompt information for prompting the prohibition of the reply is given at the receiving end.
  • the first prompt information (or the second prompt information) is, for example, text, a picture, a voice, and the like, and the receiving end may determine that the operation permission of the receiving end to the original mail is prohibited from being forwarded.
  • the first prompt information (or the second prompt information) is directly added to the original mail, and the receiving end directly reads the first prompt information (or the second prompt information) in the processed original mail and outputs the first prompt information ( Or the second prompt information); or, the receiving end only adds the corresponding first extended information to the original mail, and after receiving the processed original mail, the receiving end parses the operation authority for the original mail to prohibit forwarding,
  • the first prompt information is generated and output; if the operation permission for the original mail is parsed as prohibiting the reply, the second prompt information is generated and outputted, and the like.
  • the receiving end may output the first prompt information (or the second prompt information) in the form of a pop-up prompt window, or display the watermark form in the received mail body, and the specific display manner is not specifically limited in the present invention.
  • the receiving end can generate prompt information (first prompt information or second prompt information) for the corresponding operation authority, so that the user at the receiving end can be prevented from generating useless operations, thereby improving the efficiency of the mail operation.
  • the receiving end reads the first extended information that the sender adds the original mail to the attachment of the new mail and adds the new mail.
  • the accessory may be an attachment in any format, for example, a compressed file, a mail, or the like.
  • the attachment is encrypted.
  • the mail generated by the package method can be parsed to obtain the original mail if the receiving end knows the password of the attachment.
  • the packaged accessory is in the data.360smail format, and includes a file header description and a real file content.
  • 2nd, 3rd byte encrypted data check value
  • the data file content EML of the mail can be encrypted by a symmetric encryption algorithm with an encryption strength of AES256.
  • the receiving end may obtain the original mail included in the attachment; if the mail receiving system of the receiving end is not the specified mail In the system, the receiving end cannot obtain the original mail contained in the attachment.
  • the original mail contained in the attachment cannot be obtained, for example, the receiving end cannot download the attachment, the receiving end can download the attachment but cannot parse the original mail, and the like.
  • the designated mail system can be the same mail system as the mail receiving system of the sending end, or any mail system selected by the sending end.
  • the mail system of the sending end is a 360 mail system, and the 360 mail system sets a special special decoding for the mail. Format, after the sender processes the original mail into the special format, it is sent to the receiving end as an attachment of the new mail; after receiving the processed original mail, the receiving end determines that the mail receiving system is not the 360 mail system, then The receiving end can't download the attachment; or the receiving end can read the original mail in a special format. If the receiving end is the same as the 360 mail system, it can parse the original mail. If the receiving end is not the 360 mail system, the receiving end The original message could not be parsed.
  • the designated mail system can obtain the attachments included in the original mail, thereby further improving the security of the original mail distribution.
  • the receiving end if the receiving end is not the designated mail system, the receiving end provides third prompt information after obtaining the processed original mail, where the third prompt information is used. Instructing the receiving end to use the designated mail system.
  • the third prompt information may be text, image, audio, etc., wherein if the third prompt information is a text or an image, the third prompt information is popped up at the client receiving the mail.
  • the form of the window is displayed, or the body of the received mail is displayed in the form of a watermark, for example, if the sender sets only the 360 mail system to be able to parse the original mail, the receiving end sends the current mail receiving system after obtaining the processed original mail. If the system is not a 360 mail system, the following third prompt message "Please use the 360 mail system to parse the attachment" can be generated through a pop-up window.
  • the specific display manner of the third prompt information is not specifically limited in the present invention.
  • step S202 the receiving end reads information from the mail message further includes second extended information, where the second extended information is used to control an expiration time of the original mail.
  • the second extended information may be added to the header of the original email, Area such as mail body.
  • the expiration time of the mail can be effectively controlled, thereby further improving the security of mail distribution.
  • the second extended information is a second function field, and if the value of the second function field includes a time point, the original mail fails after the time point; If the value of the two-function field does not include the point in time, the original message will not expire.
  • the second function field is XX-LoseEfficacy, and the value is: Tue, 10Feb 2015 15:36:57+0800, which means that the original mail expires on February 10, 2015. :36:57, if the current browsing time has exceeded the expiration time of 15:36:57 on February 10, 2015, the original mail will be invalid and will not be able to browse normally. Otherwise, if the value of the second function field is empty, it means that the original mail is not controlled by the expiration time, and the original mail can be browsed indefinitely.
  • the second extended information is a second function identifier, and if the second email is included in the original email obtained by the receiving end, the original email is after a preset time period. If the second function tag is not included in the original mail obtained by the receiving end, the original mail will not be invalid.
  • the preset time period may be manually set by the user when sending the email, or may be automatically generated by the system, for example, the system is set to the expiration time after 2 months from the start of the mail sending time, where the preset time is specific.
  • the implementation form is not limited.
  • the second function is marked as XX-LoseEfficacy in the original mail
  • the system sets the expiration time to be 1 month after the start of the sending time, and the sending time is 10:00 on January 1, 2016. 1 point, then at 10:1 on February 1, 2016, it is the expiration time point of the original mail. If the current reading time has exceeded the expiration time, the original mail will be invalid and will not be read any more.
  • the expiration time can be set in batches for the mail, thereby improving the efficiency of setting the expiration time.
  • step S203 the receiving end implements control of the operation authority of the mail according to the first extended information.
  • the receiving end controls the operation authority of the original mail according to the specific situation of the first extended information.
  • a transmitting end including:
  • the obtaining unit 31 is configured to obtain the original mail
  • Adding unit 32 for adding first extended information to the original mail, thereby obtaining the processed original mail;
  • the sending unit 33 sends the processed original mail to the receiving end, so that the receiving end implements control of the operating authority of the original mail based on the first extended information.
  • the adding unit includes:
  • the implanting module 321 is configured to: implant a first function field in the original mail;
  • the assignment module 322 is configured to assign a value to the first function field, wherein the first function field is assigned a different value, and the receiving end has different operation rights to the original mail.
  • the adding unit 32 further includes:
  • a first adding module 323 configured to add a first function tag to the original mail, based on the receiving end Whether the first function tag exists in the received original mail, and the receiving end has different operation rights to the original mail.
  • the first extended information is used to control the operation authority of the receiving end to forward and/or reply to the original mail.
  • the operation permission of the receiving end to the original mail is prohibition of forwarding
  • the operation permission of the receiving end to the original mail is prohibitive reply.
  • the first prompt information for prompting for prohibiting forwarding is given at the receiving end;
  • the second prompt information for prompting the prohibition of the reply is given at the receiving end.
  • the adding unit further includes:
  • a packaging module 325 an accessory for packaging the original mail into a new mail
  • the second adding module 324 is configured to add the first extended information to the new mail, and obtain the processed original mail.
  • the attachment is a mail generated by an encrypted package.
  • the receiving end may obtain the original mail included in the attachment; if the mail receiving system of the receiving end is not the designated mail receiving system The receiving end cannot obtain the original mail included in the attachment.
  • the receiving end if the receiving end is not the mail client of the specified mail system, the receiving end provides third prompt information after obtaining the processed original mail, where the third prompt information is used to indicate The receiving end uses the mail client of the specified mail system.
  • the processed original mail further includes: second extended information, where the second extended information is used to control an expiration time of the original mail.
  • the second extended information is a second function field, and if the value of the second function field includes a time point, the original mail expires after the time point; if the second function field is If the value does not include the time point, the original message will not expire; or,
  • the second extension information is a second function identifier. If the second email is included in the original email obtained by the receiving end, the original email is invalid after a preset time period; if the receiving end obtains The original function message does not contain the second function tag, and the original message does not expire.
  • the adding unit 32 is further configured to:
  • the first extended information is implanted in a header of the original mail.
  • a receiving end including:
  • the receiving unit 41 is configured to receive the mail sent by the sending end;
  • the reading unit 42 is configured to read the first extended information added by the sending end in the mail;
  • the control unit 43 is configured to implement control of the operation authority of the mail according to the first extension information.
  • the reading unit 41 includes:
  • a first reading module 421 configured to read an assignment of a first function field in the mail message
  • the control unit 43 is configured to:
  • the receiving end has different operating rights to the mail based on the assignment of the first function field.
  • the reading unit 42 further includes:
  • a second reading module 422 configured to read a first function tag in the mail message
  • control unit 43 is configured to:
  • Controlling the operation authority of forwarding and/or replying to the mail is implemented according to the first extension information.
  • control unit 43 is configured to:
  • the operation permission for the original mail is prohibitive forwarding; and/or,
  • the operation authority for the original mail is prohibitive reply.
  • the receiving end further includes: an information prompting unit, configured to:
  • the receiving end If the operation permission of the receiving end to the original mail is prohibitive forwarding, the receiving end provides first prompt information for prompting to prohibit forwarding; and/or,
  • the receiving end If the receiving end has the operation permission for the original mail to prohibit the reply, the receiving end gives the second prompt information for prompting the prohibition of the reply.
  • the email includes an attachment generated by the sending end to package the original mail.
  • the attachment is a mail generated by an encrypted package.
  • the receiving end may obtain the original mail included in the attachment; if the mail receiving system of the receiving end is not the designated mail receiving system The receiving end cannot obtain the original mail included in the attachment.
  • the information prompting unit is further configured to: if the mail receiving system is not the specified mail receiving system, generate third prompt information, where the third prompt information is used to indicate that the receiving end uses the Specify the mail receiving system.
  • the reading unit further includes:
  • a third reading module 423 configured to read second extended information from the mail
  • the control unit 43 is further configured to: control, according to the second extended information, a dead time of the mail.
  • control unit 43 is configured to:
  • the second extended information is a second function field, and the value of the second function field includes a time point, the original mail expires after the time point; if the read second function field The value does not include the point in time, then the original message will not expire; or,
  • the mail expires after a preset time period; if the second function mark is not included in the mail, the original mail does not expire.
  • the reading unit is configured to: read the first extended information from a mail header of the mail.
  • the original mail before the original mail is sent by the transmitting end, the original mail needs to be The first extended information is added, and then sent to the receiving end, so after receiving the mail sent by the sending end, the receiving end can control the operating authority of the original mail based on the first extended information included in the mail, thereby To control the recipient's permission to receive mail, so as to avoid the situation where the mail receiver can handle the mail at will, thereby improving the technical effect of improving the security of mail sending and receiving;
  • the operation authority of the original mail is completed by the sender adding the first extension information in the original mail, and the participation of the mail server is not required in the implementation process, as long as the receiving client can recognize And extracting the first extended information can realize the control of the operation authority of receiving the mail. Therefore, the technical solution of the present invention has no restrictions on the mail server, and only has requirements for the sending and receiving client, and the specific mail client can be matched with any server. Complete control over the recipient's operational permissions, which will allow for a wider range of uses and higher penetration rates.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor DSP
  • DSP digital signal processor
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals.
  • signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • Figure 5 shows a block diagram of a computing device for performing the method in accordance with the present invention.
  • the computing device conventionally includes a processor 510 and a computer program product or computer readable medium in the form of a memory 520.
  • the memory 520 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • Memory 520 has a storage space 530 that stores program code 531 for performing any of the method steps described above.
  • storage space 530 for program code may include various program code 531 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
  • Such computer program products are typically portable or fixed storage units such as those described in FIG.
  • the storage unit may have storage segments, storage spaces, and the like that are similarly arranged to memory 520 in the computing device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit stores computer readable program code 531' for performing the steps of the method according to the present invention, ie program code readable by a processor such as 510, when the program code is run by the computing device, resulting in The computing device performs the various steps in the methods described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明公开了一种邮件发送方法、邮件控制方法、发送端及接收端。该方法包括:发送端获得原始邮件;所述发送端为所述原始邮件添加第一扩展信息,从而获得处理后的所述原始邮件;所述发送端将所述处理后的所述原始邮件发送至接收端,以供所述接收端基于所述第一扩展信息实现对所述原始邮件的操作权限的控制。解决了现有技术中邮件传播的安全性较低的技术问题,避免了邮件接收方可以随意对邮件进行处理的情况。

Description

一种邮件发送方法、邮件控制方法、发送端及接收端 技术领域
本发明涉及通信技术领域,尤其涉及一种邮件发送方法、邮件控制方法、发送端及接收端。
背景技术
随着科技的发展,电子邮件的应用范围越来越广,电子邮件是人们日常工作常用的办公通信工具,技术人员在工作过程中会频繁利用办公电脑、个人电脑、手机等电子产品收发电子邮件,因此,电子邮件的信息安全就变得尤其重要。由于很多电子邮件内容涉及重要机密、未公开信息或敏感数据等,而邮件发送人在将邮件发送出去之后,接收端可以对邮件进行随意传播或者公开,而重要邮件被公开后可能产生恶劣的影响,同时也对邮件发送人带来不必要的麻烦,由此可见,现有技术中的邮件传播存在着安全性较低的技术问题。
发明内容
鉴于上述问题,本发明提出了一种克服上述问题或者至少部分地解决上述问题的一种邮件发送方法、邮件控制方法、发送端及接收端。
第一方面,本发明实施例提供一种邮件发送方法,包括:
发送端获得原始邮件;
所述发送端为所述原始邮件添加第一扩展信息,从而获得处理后的所述原始邮件;
所述发送端将所述处理后的所述原始邮件发送至接收端,以供所述接收端基于所述第一扩展信息实现对所述原始邮件的操作权限的控制。
第二方面,本发明实施例提供一种邮件控制方法,包括:
接收端接收发送端发送的邮件;
所述接收端读取所述邮件中由所述发送端添加的第一扩展信息;
所述接收端根据所述第一扩展信息实现对所述邮件的操作权限的控制。
第三方面,本发明实施例提供一种发送端,包括:
获取单元:用于获得原始邮件;
添加单元:用于为所述原始邮件添加第一扩展信息,从而获得处理后的所述原始邮件;
发送单元:用于将所述处理后的所述原始邮件发送至接收端,以供所述接收端基于所述第一扩展信息实现对所述原始邮件的操作权限的控制。
第四方面,本发明实施例提供一种接收端,包括:
接收单元:用于接收发送端发送的邮件;
读取单元:用于读取所述邮件中由所述发送端添加的第一扩展信息;
控制单元:用于根据所述第一扩展信息实现对所述邮件的操作权限的控制。
第五方面,本发明实施例提供一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据上述的邮件发送方法或邮件控制方法。
第六方面,本发明实施例一种计算机可读介质,其中存储了如上所述的计算机程序。
本申请实施例中提供的技术方案,至少具有如下技术效果或优点:
根据本发明的邮件发送方法,在发送端发送原始邮件前,需要为所述原始邮件添加第一扩展信息,之后再发送至接收端,从而接收端在接收到发送端发送的邮件之后,可以基于邮件中所包含的第一扩展信息实现对原始邮件的操作权限的控制,以此来控制收件人对接收邮件的操作权限,以此来避免邮件接收方可以随意对邮件进行处理的情况,从而达到提高邮件收发安全性的技术效果;
同时,从本发明技术方案实现过程来看,对原始邮件的操作权限是由发送端在原始邮件中添加第一扩展信息来完成的,实现过程中无需邮件服务器的参与,只要接收客户端能识别并提取到第一扩展信息就能实现对接收邮件的操作权限的控制,因此说,本发明技术方案对邮件服务器没有任何限制,只对收发客户端有要求,特定邮件客户端搭配任意服务器均可完成对收件人操作权限的控制,这样使用范围更广,普及率会更高。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了根据本发明一个实施例的一种邮件发送方法流程图;
图2示出了根据本发明一个实施例的一种邮件控制方法流程图;
图3示出了根据本发明一个实施例的一种发送端的示意图;
图4示出了根据本发明一个实施例的一种接收端的示意图;
图5示意性地示出了用于执行根据本发明的方法的计算设备的框图;以及
图6示意性地示出了用于保持或者携带实现根据本发明的方法的程序代码的存储单元。
具体实施例
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
本发明实施例提供一种邮件发送方法、邮件控制方法和装置,用以解决现有技术中邮件的安全性较低的技术问题。
请参考图1,本申请实施例提供的一种邮件发送方法,该方法包括:
S101:发送端获得原始邮件;
S102:所述发送端为所述原始邮件添加第一扩展信息,从而获得处理后的所述原始邮件;
S103:所述发送端将所述处理后的所述原始邮件发送至接收端,以供所述接收端基于所述第一扩展信息实现对所述原始邮件的操作权限的控制。
需要说明的是,在具体实施过程中,本申请提供的上述邮件发送方法可应用于使用任意协议收发邮件的邮件客户端,例如:IMAP(Internet Mail Access Protocol,交互式邮件存取协议)、POP3(Post Office Protocol 3,邮局协议的第3个版本)、SMTP(Simple Mail Transfer Protocol,简单邮件传输协议)、ESMTP(Extended SMTP,扩展SMTP)等协议。且该邮件客户端可以搭建各种邮件服务器来使用,只需按照相关邮件服务器地址完成配置即可,举例来说明,如某邮件客户端要使用SINA邮件服务器,可配置接收邮件服务器地址(POP3)为:pop.sina.com.cn或:pop3.sina.com.cn,发送邮件服务器地址(SMTP)为:smtp.sina.com.cn,即可使用,该方法应用广泛,操作方便。
下面,结合图1详细介绍本邮件发送方法的具体实现步骤:
步骤S101,发送端获得原始邮件。这里的原始邮件的邮件格式不做限制,为目前广泛应用的一种电子邮件技术规范MIMO,全称为“MultipurposeInternetMailExtensions”,比较确切的中文名称为“多用途互联网邮件扩展”,MIME邮件由邮件头和邮件体两大部分组成,邮件头包含了发件人、收件人、主题、时间、MIME版本、邮件内容的类型等重要信息,主要格式及内容例如如下(当然,以下格式仅仅作为举例,还可以为其他格式,本发明实施例不作限制):
Date:Tue,31 Jan 2012 10:07:39+0800
From:abc<abc@domain.com>
To:zhang<abc@test.com>
Subject:=?gb2312?B?1vfM4g==?=
X-Priority:3
Mime-Version:1.0
Message-ID:<201201311007392182841@domain.cn>
Content-Type:multipart/related;
boundary="----=_001_NextPart076188650547_=----"
其中原始邮件的邮件内容可包含文本、图像、声音、以及各种附件格式等。
步骤S102,发送端为原始邮件添加第一扩展信息,从而获得处理后的原始邮件。
其中,在本申请实施例中,第一扩展信息用于控制接收端对原始邮件进行转发和/或回信的操作权限,例如:通过第一扩展信息控制接收端对原始邮件禁止转发、禁止回信、禁止转发且禁止回信等等。需要说明的是,第一扩展信息还可用于限制接收端对接收邮件进行存档、打印等日常邮件客户端可见的操作权限,本发明中不做限制。
作为一种可选的实施例,如果所述第一扩展信息中包含第一预设内容,则所述接收端对所述原始邮件的操作权限为禁止转发;和/或,如果所述第一扩展信息中包含第二预设内容,则所述接收端对所述原始邮件的操作权限为禁止回信。
其中,第一扩展信息可以包含多种扩展信息,例如:第一功能字段、第一功能标记等等,基于第一扩展信息不同导致第一预设内容(或者第二预设内容)也不同,对于第一预设内容(或者第二预设内容)为何种内容将在后续进行介绍。接收端在接收到处理后的原始邮件之后,可以判断原始邮件中是否包含第一扩展信息,如果包含第一扩展信息的话,则可以基于第一扩展信息是否对原始邮件的操作权限的控制。
作为一种可选的实施例,发送端为原始邮件添加第一扩展信息,具体步骤包括:发送端在原始邮件中植入第一功能字段;发送端为第一功能字段赋值,其中,第一功能字段被赋予的值不同,接收端对原始邮件的操作权限就会不同。
具体的,如果第一功能字段的赋值为第一预设值,则接收端对原始邮件的操作权限为禁止转发;和/或,如果第一功能字段的赋值为第二预设值,则接收端对所述原始邮件的操作权限为禁止回信。
具体在本实施例中,举例说明:在原始邮件中植入的第一功能字段为XX-CanNotXX,如果XX-CanNotXX值为0(当然还可以为其他值,例如:00、10等等),则接收端对原始邮件的操作权限为禁止转发,则接收端针对原始邮件不提供转发的操作权限,此时第一扩展信息中的第一预设内容为第一功能字段被赋予的第一预设值(例如:0、00、10等等);如果XX-CanNotXX值为1(当然还可以为其他值,例如:01、11等等),则接收端对所述原始邮件的操作权限为禁止回信,从而接收端针对原始邮件不提供回复、全部回复的操作功能,此时第一扩展信息中的第一预设内容为第一功能字段被赋予的第二预设值(例如:1、01、11等等);如果XX-CanNotXX值为0/1(当然还可以为其他值,例如:00/01、10/11等等),则接收端对原始邮件的操作权限为禁止回信和禁止转发,从而接收端针对原始邮件不提供转发、回复、全部回复的操作功能;如果XX-CanNotXX值为2(当然还可以为其他值,例如:110、111等等),则接收端对所述原始邮件的操作权限例如为禁止转发和仅可对发信人回信,则接收端在回信时不会带上原始邮件的正文,此时接收端不提供转发和全部回复的操作功能,但提供回复的操作功能。
作为另一种可选的实施例,发送端为原始邮件添加第一扩展信息,具体步骤包括:发送端为原始邮件添加第一功能标记,基于接收端所接收到的原始邮件中是否存在第一功能标记,接收端对原始邮件的操作权限不同。
具体在本实施例中,举例说明:发送端为原始邮件添加第一功能标记,第一功能标记例如为XX-CanNotFW、XX-CanNotRE(当然也可以为其他功能标识)等等,进而接收端在接收到邮件之后,可以判断邮件中是否包含第一功能标记,进而确定对原始邮件的操作权限。
进一步的,依据在原始邮件中是否存在具体的第一功能标记,来控制接收端对原始邮件的操作权限是禁止转发,和/或,禁止回信。
具体在本实施例中,举例说明:可以针对转发权限和回复权限设置不同的第一功能字段,例如:发送端为原始邮件添加的第一功能标记为:XX-CanNotFW,则接收端对原始邮件的操作权限为禁止转发,且接收端不提供转发的操作功能;如果发送端为原始邮件添加的第一功能标记为:XX-CanNotRE,则接收端对原始邮件的操作权限为禁止回复,从而接收端不提供回复、全部回复的操作功能;如果发送端为原始邮件添加的第一功能标记为:XX-CanNotRE&FW,则接收端对原始邮件的操作权限为禁止回复和禁止转发,则接收端对原始邮件的操作权限为禁止回信和禁止转发,从而接收端不提供转发、回复、全部回复的操作功能。当然以上第一功能字段与操作权限的对应关系仅仅为举例,并不作为限制。在上述方案中,第一预设内容(或者第二预设内容)则为第一功能字段。
由于在上述方案中,针对原始邮件只需要赋予第一功能字段,就可以实现接收端对原始邮件操作权限的控制,而不需要多次操作,故而降低了发送端的处理负担。
进一步的,如果接收端对原始邮件的操作权限为禁止转发,则在接收端给出用于提示禁止转发的第一提示信息;和/或,
如果接收端对原始邮件的操作权限为禁止回信,则在接收端给出用于提示禁止回信的第二提示信息。
具体在本实施例中,举例说明:第一提示信息(或者第二提示信息)例如为:文字、图片、声音等等,接收端可以确定出接收端对原始邮件的操作权限为禁止转发之后,直接在原始邮件中添加第一提示信息(或者第二提示信息),进而接收端直接读取处理后的原始邮件中的第一提示信息(或者第二提示信息)并输出该第一提示信息(或者第二提示信息);又或者,接收端仅仅为原始邮件添加对应的第一扩展信息,接收端在接收到处理后的原始邮件之后,如果解析出对原始邮件的操作权限为禁止转发,则产生第一提示信息并输出;如果解析出对原始邮件的操作权限为禁止回复,则产生第二提示信息并输出等等。
接收端可以以弹出提示窗口的形式输出第一提示信息(或者第二提示信息)、或者在接收邮件正文以水印形式显示等,具体显示方式本发明不做具体限制。
由于在上述方案中,接收端针对对应的操作权限可以产生提示信息(第一提示信息或第二提示信息),故而能够防止接收端的用户产生无用的操作,以提高对邮件操作的效率。
作为另一种可选的实施例,发送端为原始邮件添加第一扩展信息,从而获得处理后的原始邮件,具体包括:
发送端将原始邮件打包成新的邮件的附件;
发送端为新的邮件添加第一扩展信息,进而获得处理后的原始邮件。
其中,所述附件可以为任意格式的附件,例如:压缩文件、邮件等等,作为一种可选的实施例,为了进一步的提高原始邮件的安全等级,所述附件为通过加密打包方式生成的邮件,从而在接收端得知该附件的密码的情况下,才能够解析获得该原始邮件。
具体在本实施例中,举例说明:所述打包后的附件为data.360smail格式,包含文件头描述和真正文件内容。
文件头描述:
第1Byte:版本号;
第2、3Byte:加密数据校验值;
第4—99Byte:暂空。
真正文件内容:
100Byte之后:真正加密邮件的数据文件。
例如,可以采用对称加密算法对邮件的数据文件内容EML进行加密,加密强度AES256。
作为一种可选的实施例,若所述接收端的邮件接收系统为指定邮件系统,则所述接收端可以获得所述附件中所包含的原始邮件;若接收端的邮件接收系统不是所述指定邮件系统,则接收端无法获得所述附件中所包含的原始邮件。
举例来说,无法获得附件中所包含的原始邮件例如为:接收端无法下载附件、接收端虽然能够下载附件但是无法解析该原始邮件等等。该指定邮件系统可以为与发送端邮件接收系统相同的邮件系统,也可以为发送端选择的任意邮件系统,例如:发送端的邮件系统为360邮件系统,360邮件系统自行设定对邮件解码的特殊格式,发送端将原始邮件处理为该特殊格式之后,作为新的邮件的附件形式发送至接收端;接收端接收到处理后的原始邮件之后,如果判断出其邮件接收系统并非360邮件系统,则控制接收端无法下载附件;又或者,接收端可以读取出特殊格式的原始邮件,如果接收端同为360邮件系统,则其可以解析原始邮件,如果接收端不为360邮件系统,则接收端不能够解析原始邮件。
由于在上述方案中,指定邮件系统才能够获得原始邮件中所包含的附件,故而进一步的提高了原始邮件传播的安全性。
作为一种可选的实施例,若所述接收端非所述指定邮件系统,则所述接收端在获得处理后的所述原始邮件之后提供第三提示信息,所述第三提示信息用于指示所述接收端使用所述指定邮件系统。
具体在本实施例中,举例说明:第三提示信息可以为文字、图像、音频等等,其中,如果第三提示信息为文字或者图像,则第三提示信息以在接收邮件的客户端弹出提示窗口的形式来显示,或者在接收邮件正文以水印形式显示等,例如:如果发送端设置只有360邮件系统能够解析原始邮件,则接收端在获得处理后的原始邮件之后,如果发送当前邮件接收系统并非360邮件系统,则可以通过弹出窗口产生以下第三提示信息“请使用360邮件系统解析该附件”,当然,对于第三提示信息的具体显示方式本发明不做具体限制。
进一步的,S102步骤中,处理后的原始邮件中还包括:第二扩展信息,所述第 二扩展信息用于控制所述原始邮件的失效时间。
具体在本实施例中,举例说明:第二扩展信息可以添加于原始邮件的邮件头、邮件体等区域。
通过上述方案,能够对邮件的失效时间进行有效控制,从而进一步的提高邮件传播的安全性。
作为一种可选实施例,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述原始邮件在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述原始邮件不会失效。例如,在具体实施例中,所述第二功能字段为XX-LoseEfficacy,设值为:Tue,10Feb 2015 15:36:57+0800,这表示原始邮件的失效时间为2015年2月10日15:36:57,如果当前浏览邮件的时间已经超出了所述的失效时间2015年2月10日15:36:57,那么原始邮件将失效,将无法正常浏览。否则,如果第二功能字段的值为空,则代表原始邮件不受失效时间控制,所述原始邮件可以被无限期的浏览。
作为另一种可选实施例,所述第二扩展信息为第二功能标记,若所述接收端所获得原始邮件中包含所述第二功能标记,则所述原始邮件在预设时间段之后失效;若所述接收端所获得的原始邮件中不包含所述第二功能标记,则所述原始邮件不会失效。其中,所述预设时间段可以由用户在发送邮件时手动设置,也可以由系统自动设置生成,如系统设置为邮件发送时间开始的2个月后为失效时间,这里的预设时间的具体实现形式不做限制。例如,在具体实施例中,若在原始邮件中添加第二功能标记为XX-LoseEfficacy,且系统设置的失效时间为发送时间开始1个月后,而发送时间为2016年1月1日10点1分,那么到2016年2月1日10点1分就为原始邮件的失效时间点,若当前阅读时间已超过该失效时间,那么原始邮件就已经失效,将不能再被阅读。
通过上述方案,可以针对邮件批量设置失效时间,由此提高了对失效时间设置的效率。
接下来执行S103步骤,发送端将处理后的原始邮件发送至接收端,以供接收端基于所述第一扩展信息实现对所述原始邮件的操作权限的控制。具体的,发送端将处理后的原始邮件,即添加了第一扩展信息的原始邮件发送到接收端后,接收端基于第一扩展信息的具体情况来实现对原始邮件的操作权限的控制,具体实现方法将在后面内容中详细描述。
请参考图2,根据本发明的另一个方面,还提供了一种邮件控制方法,包括:
S201:接收端接收发送端发送的邮件;
S202:所述接收端读取所述邮件中所由所述发送端添加的第一扩展信息;
S203:所述接收端根据所述第一扩展信息实现对所述邮件的操作权限的控制。
下面,结合图2详细介绍本邮件控制方法的具体实现步骤:
步骤S201,接收端接收发送端发送的邮件;这里的原始邮件的邮件格式为MIMO格式,由邮件头和邮件体两大部分组成,邮件头包含了发件人、收件人、主题、时间、MIME版本、邮件内容的类型等重要信息,其中原始邮件的邮件内容包含文本、图像、声音、以及各种附件格式等。
然后执行步骤S202,所述接收端读取所述邮件中由所述发送端添加的第一扩展信息;
其中,在本申请实施例中,接收端读取所述邮件中由所述发送端添加的第一扩展信息用于控制接收端对原始邮件进行转发和/或回信的操作权限,例如:通过第一扩展信息控制接收端对原始邮件禁止转发、禁止回信、禁止转发且禁止回信等等。需要说明的是,第一扩展信息还可用于限制接收端对接收邮件进行存档、打印等日常邮件客户端可见的操作权限,本发明中不做限制。
作为一种可选的实施例,如果所述第一扩展信息中包含第一预设内容,则所述接收端对所述原始邮件的操作权限为禁止转发;和/或,如果所述第一扩展信息中包含第二预设内容,则所述接收端对所述原始邮件的操作权限为禁止回信。
其中,第一扩展信息可以包含多种扩展信息,例如:第一功能字段、第一功能标记等等,基于第一扩展信息不同导致第一预设内容(或者第二预设内容)也不同,对于第一预设内容(或者第二预设内容)为何种内容将在后续进行介绍。接收端在接收到处理后的原始邮件之后,可以判断原始邮件中是否包含第一扩展信息,如果包含第一扩展信息的话,则可以基于第一扩展信息是否对原始邮件的操作权限的控制。
作为一种可选的实施例,接收端读取所述发送端为原始邮件添加第一扩展信息为发送端在原始邮件中植入的第一功能字段;第一功能字段由发送端赋值,其中,第一功能字段被赋予的值不同,接收端对原始邮件的操作权限就会不同。
具体的,如果第一功能字段的赋值为第一预设值,则接收端对原始邮件的操作权限为禁止转发;和/或,如果第一功能字段的赋值为第二预设值,则接收端对所述原始邮件的操作权限为禁止回信。
具体在本实施例中,举例说明:在原始邮件中植入的第一功能字段为XX-CanNotXX,如果XX-CanNotXX值为0(当然还可以为其他值,例如:00、10等等),则接收端对原始邮件的操作权限为禁止转发,则接收端针对原始邮件不提供转发的操作权限,此时第一扩展信息中的第一预设内容为第一功能字段被赋予的第一预设值(例如:0、00、10等等);如果XX-CanNotXX值为1(当然还可以为其他值,例如:01、11等等),则接收端对所述原始邮件的操作权限为禁止回信,从而接收端针对原始邮件不提供回复、全部回复的操作功能,此时第一扩展信息中的第一预设内容为第一功能字段被赋予的第二预设值(例如:1、01、11等等);如果XX-CanNotXX值为0/1(当然还可以为其他值,例如:00/01、10/11等等),则接收端对原始邮件的操作权限为禁止回信和禁止转发,从而接收端针对原始邮件不提供转发、回复、全部回复的操作功能;如果XX-CanNotXX值为2(当然还可以为其他值,例如:110、111等等),则接收端对所述原始邮件的操作权限例如为禁止转发和仅可对发信人回信,则接收端在回信时不会带上原始邮件的正文,此时接收端不提供转发和全部回复的操作功能,但提供回复的操作功能。
作为另一种可选的实施例,接收端读取发送端为原始邮件添加的第一扩展信息为发送端为原始邮件添加第一功能标记,基于接收端所接收到的原始邮件中是否存在第一功能标记,接收端对原始邮件的操作权限不同。
具体在本实施例中,举例说明:发送端为原始邮件添加第一功能标记例如为XX-CanNotFW、XX-CanNotRE(当然也可以为其他功能标识)等等,进而接收端在接收到邮件之后,可以判断邮件中是否包含第一功能标记,进而确定对原始邮件的操作权限。
进一步的,依据在原始邮件中是否存在具体的第一功能标记,来控制接收端对原始邮件的操作权限是禁止转发,和/或,禁止回信。
具体在本实施例中,举例说明:可以针对转发权限和回复权限设置不同的第一功能字段,例如:发送端为原始邮件添加的第一功能标记为:XX-CanNotFW,则接收端对原始邮件的操作权限为禁止转发,且接收端不提供转发的操作功能;如果发送端为原始邮件添加的第一功能标记为:XX-CanNotRE,则接收端对原始邮件的操作权限为禁止回复,从而接收端不提供回复、全部回复的操作功能;如果发送端为原始邮件添加的第一功能标记为:XX-CanNotRE&FW,则接收端对原始邮件的操作权限为禁止回复和禁止转发,则接收端对原始邮件的操作权限为禁止回信和禁止转发,从而接收端不提供转发、回复、全部回复的操作功能。当然以上第一功能字段与操作权限的对应关系仅仅为举例,并不作为限制。在上述方案中,第一预设内容(或者第二预设内容)则为第一功能字段。
由于在上述方案中,针对原始邮件只需要赋予第一功能字段,就可以实现接收端对原始邮件操作权限的控制,而不需要多次操作,故而降低了发送端的处理负担。
进一步的,如果接收端对原始邮件的操作权限为禁止转发,则在接收端给出用于提示禁止转发的第一提示信息;和/或,
如果接收端对原始邮件的操作权限为禁止回信,则在接收端给出用于提示禁止回信的第二提示信息。
具体在本实施例中,举例说明:第一提示信息(或者第二提示信息)例如为:文字、图片、声音等等,接收端可以确定出接收端对原始邮件的操作权限为禁止转发之后,直接在原始邮件中添加第一提示信息(或者第二提示信息),进而接收端直接读取处理后的原始邮件中的第一提示信息(或者第二提示信息)并输出该第一提示信息(或者第二提示信息);又或者,接收端仅仅为原始邮件添加对应的第一扩展信息,接收端在接收到处理后的原始邮件之后,如果解析出对原始邮件的操作权限为禁止转发,则产生第一提示信息并输出;如果解析出对原始邮件的操作权限为禁止回复,则产生第二提示信息并输出等等。
接收端可以以弹出提示窗口的形式输出第一提示信息(或者第二提示信息)、或者在接收邮件正文以水印形式显示等,具体显示方式本发明不做具体限制。
由于在上述方案中,接收端针对对应的操作权限可以产生提示信息(第一提示信息或第二提示信息),故而能够防止接收端的用户产生无用的操作,以提高对邮件操作的效率。
作为另一种可选的实施例,接收端读取的是发送端将原始邮件打包成新的邮件的附件并在新的邮件添加的第一扩展信息。
其中,所述附件可以为任意格式的附件,例如:压缩文件、邮件等等,作为一种可选的实施例,为了进一步的提高原始邮件的安全等级,所述附件为通过加密打 包方式生成的邮件,从而在接收端得知该附件的密码的情况下,才能够解析获得该原始邮件。
具体在本实施例中,举例说明:所述打包后的附件为data.360smail格式,包含文件头描述和真正文件内容。
文件头描述:
第1Byte:版本号;
第2、3Byte:加密数据校验值;
第4—99Byte:暂空。
真正文件内容:
100Byte之后:真正加密邮件的数据文件。
例如,可以采用对称加密算法对邮件的数据文件内容EML进行加密,加密强度AES256。
作为一种可选的实施例,若所述接收端的邮件接收系统为指定邮件系统,则所述接收端可以获得所述附件中所包含的原始邮件;若接收端的邮件接收系统不是所述指定邮件系统,则接收端无法获得所述附件中所包含的原始邮件。
举例来说,无法获得附件中所包含的原始邮件例如为:接收端无法下载附件、接收端虽然能够下载附件但是无法解析该原始邮件等等。该指定邮件系统可以为与发送端邮件接收系统相同的邮件系统,也可以为发送端选择的任意邮件系统,例如:发送端的邮件系统为360邮件系统,360邮件系统自行设定对邮件解码的特殊格式,发送端将原始邮件处理为该特殊格式之后,作为新的邮件的附件形式发送至接收端;接收端接收到处理后的原始邮件之后,如果判断出其邮件接收系统并非360邮件系统,则控制接收端无法下载附件;又或者,接收端可以读取出特殊格式的原始邮件,如果接收端同为360邮件系统,则其可以解析原始邮件,如果接收端不为360邮件系统,则接收端不能够解析原始邮件。
由于在上述方案中,指定邮件系统才能够获得原始邮件中所包含的附件,故而进一步的提高了原始邮件传播的安全性。
作为一种可选的实施例,若所述接收端非所述指定邮件系统,则所述接收端在获得处理后的所述原始邮件之后提供第三提示信息,所述第三提示信息用于指示所述接收端使用所述指定邮件系统。
具体在本实施例中,举例说明:第三提示信息可以为文字、图像、音频等等,其中,如果第三提示信息为文字或者图像,则第三提示信息以在接收邮件的客户端弹出提示窗口的形式来显示,或者在接收邮件正文以水印形式显示等,例如:如果发送端设置只有360邮件系统能够解析原始邮件,则接收端在获得处理后的原始邮件之后,如果发送当前邮件接收系统并非360邮件系统,则可以通过弹出窗口产生以下第三提示信息“请使用360邮件系统解析该附件”,当然,对于第三提示信息的具体显示方式本发明不做具体限制。
进一步的,S202步骤中,接收端从所述邮件中读取信息还包括第二扩展信息,所述第二扩展信息用于控制所述原始邮件的失效时间。
具体在本实施例中,举例说明:第二扩展信息可以添加于原始邮件的邮件头、 邮件体等区域。
通过上述方案,能够对邮件的失效时间进行有效控制,从而进一步的提高邮件传播的安全性。
作为一种可选实施例,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述原始邮件在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述原始邮件不会失效。例如,在具体实施例中,所述第二功能字段为XX-LoseEfficacy,设值为:Tue,10Feb 2015 15:36:57+0800,这表示原始邮件的失效时间为2015年2月10日15:36:57,如果当前浏览邮件的时间已经超出了所述的失效时间2015年2月10日15:36:57,那么原始邮件将失效,将无法正常浏览。否则,如果第二功能字段的值为空,则代表原始邮件不受失效时间控制,所述原始邮件可以被无限期的浏览。
作为另一种可选实施例,所述第二扩展信息为第二功能标记,若所述接收端所获得原始邮件中包含所述第二功能标记,则所述原始邮件在预设时间段之后失效;若所述接收端所获得的原始邮件中不包含所述第二功能标记,则所述原始邮件不会失效。其中,所述预设时间段可以由用户在发送邮件时手动设置,也可以由系统自动设置生成,如系统设置为邮件发送时间开始的2个月后为失效时间,这里的预设时间的具体实现形式不做限制。例如,在具体实施例中,若在原始邮件中添加第二功能标记为XX-LoseEfficacy,且系统设置的失效时间为发送时间开始1个月后,而发送时间为2016年1月1日10点1分,那么到2016年2月1日10点1分就为原始邮件的失效时间点,若当前阅读时间已超过该失效时间,那么原始邮件就已经失效,将不能再被阅读。通过上述方案,可以针对邮件批量设置失效时间,由此提高了对失效时间设置的效率。
接下来执行步骤S203,所述接收端根据所述第一扩展信息实现对所述邮件的操作权限的控制。
具体的,接收端读取第一扩展信息后,接收端基于第一扩展信息的具体情况来实现对原始邮件的操作权限的控制。
基于同一发明构思,请参考图3,根据本发明的另一个方面,还提供了一种发送端,包括:
获取单元31:用于获得原始邮件;
添加单元32:用于为所述原始邮件添加第一扩展信息,从而获得处理后的所述原始邮件;
发送单元33:将所述处理后的所述原始邮件发送至接收端,以供所述接收端基于所述第一扩展信息实现对所述原始邮件的操作权限的控制。
可选的,所述添加单元,包括:
植入模块321:用于在所述原始邮件中植入第一功能字段;
赋值模块322:用于为所述第一功能字段赋值,其中,所述第一功能字段被赋予的值不同,所述接收端对所述原始邮件的操作权限不同。
可选的,所述添加单元32,还包括:
第一添加模块323:用于为所述原始邮件添加第一功能标记,基于所述接收端所 接收到的所述原始邮件中是否存在所述第一功能标记,所述接收端对所述原始邮件的操作权限不同。
可选的,所述第一扩展信息用于控制所述接收端对所述原始邮件进行转发和/或回信的操作权限。
可选的,如果所述第一扩展信息中包含第一预设内容,则所述接收端对所述原始邮件的操作权限为禁止转发;和/或,
如果所述第一扩展信息中包含第二预设内容,则所述接收端对所述原始邮件的操作权限为禁止回信。
可选的,如果所述接收端对所述原始邮件的操作权限为禁止转发,则在接收端给出用于提示禁止转发的第一提示信息;和/或,
如果所述接收端对所述原始邮件的操作权限为禁止回信,则在所述接收端给出用于提示禁止回信的第二提示信息。
可选的,所述添加单元,还包括:
打包模块325:用于将所述原始邮件打包成新的邮件的附件;
第二添加模块324:用于为所述新的邮件添加所述第一扩展信息,进而获得处理后的所述原始邮件。
可选的,所述附件为通过加密打包方式生成的邮件。
可选的,若所述接收端的邮件接收系统为指定邮件接收系统,则所述接收端可以获得所述附件中所包含的原始邮件;若所述接收端的邮件接收系统不是所述指定邮件接收系统,则所述接收端无法获得所述附件中所包含的所述原始邮件。
可选的,若所述接收端非所述指定邮件系统的邮件客户端,则所述接收端在获得处理后的所述原始邮件之后提供第三提示信息,所述第三提示信息用于指示所述接收端使用所述指定邮件系统的邮件客户端。
可选的,所述处理后的原始邮件中还包括:第二扩展信息,所述第二扩展信息用于控制所述原始邮件的失效时间。
可选的,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述原始邮件在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述原始邮件不会失效;或者,
所述第二扩展信息为第二功能标记,若所述接收端所获得原始邮件中包含所述第二功能标记,则所述原始邮件在预设时间段之后失效;若所述接收端所获得的原始邮件中不包含所述第二功能标记,则所述原始邮件不会失效。
可选的,所述添加单元32,还用于:
在所述原始邮件的邮件头植入所述第一扩展信息。
基于同一发明构思,请参考图4,根据本发明的另一个方面,还提供了一种接收端,包括:
接收单元41:用于接收发送端发送的邮件;
读取单元42:用于读取所述邮件中由所述发送端添加的第一扩展信息;
控制单元43:用于根据所述第一扩展信息实现对所述邮件的操作权限的控制。
可选的,所述读取单元41,包括:
第一读取模块421:用于读取所述邮件中的第一功能字段的赋值;
所述控制单元43,用于:
基于第一功能字段的赋值不同,所述接收端对所述邮件的操作权限不同。
可选的,所述读取单元42,还包括:
第二读取模块422:用于读取所述邮件中的第一功能标记;
其中,根据所述第一功能标记是否存在来实现对所述邮件不同的操作权限。
可选的,所述控制单元43用于:
根据所述第一扩展信息实现对所述邮件的转发和/或回信的操作权限的控制。
可选的,所述控制单元43用于:
如果所述第一扩展信息中包含第一预设内容,对所述原始邮件的操作权限为禁止转发;和/或,
如果所述第一扩展信息中包含第二预设内容,对所述原始邮件的操作权限为禁止回信。
可选的,所述接收端还包括:信息提示单元,用于
如果所述接收端对所述原始邮件的操作权限为禁止转发,所述接收端给出用于提示禁止转发的第一提示信息;和/或,
如果所述接收端对所述原始邮件的操作权限为禁止回信,所述接收端给出用于提示禁止回信的第二提示信息。
可选的,所述邮件中包括所述发送端对原始邮件打包生成的附件。
可选的,所述附件为通过加密打包方式生成的邮件。
可选的,若所述接收端的邮件接收系统为指定邮件接收系统,则所述接收端可以获得所述附件中所包含的原始邮件;若所述接收端的邮件接收系统不是所述指定邮件接收系统,则所述接收端无法获得所述附件中所包含的所述原始邮件。
可选的,所述信息提示单元,还用于:如果所述邮件接收系统不为所述指定邮件接收系统,产生第三提示信息,所述第三提示信息用于指示所述接收端使用所述指定邮件接收系统。
可选的,所述读取单元还包括:
第三读取模块423:用于从所述邮件中读取第二扩展信息;
所述控制单元43还用于:基于所述第二扩展信息对所述邮件的失效时间进行控制。
可选的,所述控制单元43,用于:
若所述第二扩展信息为第二功能字段,且所述第二功能字段的值包含时间点,则所述原始邮件在所述时间点后失效;若读取到的所述第二功能字段的值不包含所述时间点,则所述原始邮件不会失效;或者,
若所述第二扩展信息为第二功能标记,则所述邮件在预设时间段之后失效;若所述邮件中不包含所述第二功能标记,则所述原始邮件不会失效。
可选的,所述读取单元用于:从所述邮件的邮件头读取所述第一扩展信息。
本申请实施例中提供的技术方案,至少具有如下技术效果或优点:
根据本发明的邮件发送方法,在发送端发送原始邮件前,需要为所述原始邮件 添加第一扩展信息,之后再发送至接收端,从而接收端在接收到发送端发送的邮件之后,可以基于邮件中所包含的第一扩展信息对实现对原始邮件的操作权限的控制,以此来控制收件人对接收邮件的操作权限,以此来避免邮件接收方可以随意对邮件进行处理的情况,从而达到提高邮件收发安全性的技术效果;
同时,从本发明技术方案实现过程来看,对原始邮件的操作权限是由发送端在原始邮件中添加第一扩展信息来完成的,实现过程中无需邮件服务器的参与,只要接收客户端能识别并提取到第一扩展信息就能实现对接收邮件的操作权限的控制,因此说,本发明技术方案对邮件服务器没有任何限制,只对收发客户端有要求,特定邮件客户端搭配任意服务器均可完成对收件人操作权限的控制,这样使用范围更广,普及率会更高。
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在 实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的发送端和接收端中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
例如,图5示出了用于执行根据本发明的方法的计算设备的框图。该计算设备传统上包括处理器510和以存储器520形式的计算机程序产品或者计算机可读介质。存储器520可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器520具有存储用于执行上述方法中的任何方法步骤的程序代码531的存储空间530。例如,用于程序代码的存储空间530可以包括分别用于实现上面的方法中的各种步骤的各个程序代码531。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为例如图6所述的便携式或者固定存储单元。该存储单元可以具有与图5的计算设备中的存储器520类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元存储有用于执行根据本发明的方法步骤的计算机可读程序代码531’,即可以由诸如510之类的处理器读取的程序代码,当这些程序代码由计算设备运行时,导致该计算设备执行上面所描述的方法中的各个步骤。
本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语例子不一定全指同一个实施例。
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。
此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题而选择的。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围由所附权利要求书限定。

Claims (54)

  1. 一种邮件发送方法,包括:
    发送端获得原始邮件;
    所述发送端为所述原始邮件添加第一扩展信息,从而获得处理后的所述原始邮件;
    所述发送端将所述处理后的所述原始邮件发送至接收端,以供所述接收端基于所述第一扩展信息实现对所述原始邮件的操作权限的控制。
  2. 如权利要求1所述的方法,其特征在于,所述发送端为所述原始邮件添加第一扩展信息,包括:
    所述发送端在所述原始邮件中植入第一功能字段;
    所述发送端为所述第一功能字段赋值,其中,所述第一功能字段被赋予的值不同,所述接收端对所述原始邮件的操作权限不同。
  3. 如权利要求1所述的方法,其特征在于,所述发送端为所述原始邮件添加第一扩展信息,包括:
    所述发送端为所述原始邮件添加第一功能标记,基于所述接收端所接收到的所述原始邮件中是否存在所述第一功能标记,所述接收端对所述原始邮件的操作权限不同。
  4. 如权利要求1所述的方法,其特征在于,所述第一扩展信息用于控制所述接收端对所述原始邮件进行转发和/或回信的操作权限。
  5. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    如果所述第一扩展信息中包含第一预设内容,则所述接收端对所述原始邮件的操作权限为禁止转发;和/或,
    如果所述第一扩展信息中包含第二预设内容,则所述接收端对所述原始邮件的操作权限为禁止回信。
  6. 如权利要求1所述的方法,其特征在于,如果所述接收端对所述原始邮件的操作权限为禁止转发,则在接收端给出用于提示禁止转发的第一提示信息;和/或,
    如果所述接收端对所述原始邮件的操作权限为禁止回信,则在所述接收端给出用于提示禁止回信的第二提示信息。
  7. 如权利要求1-6任一所述的方法,其特征在于,所述发送端为所述原始邮件添加第一扩展信息,从而获得处理后的所述原始邮件,包括:
    所述发送端将所述原始邮件打包成新的邮件的附件;
    所述发送端为所述新的邮件添加所述第一扩展信息,进而获得处理后的所述原始邮件。
  8. 如权利要求7所述的方法,其特征在于,所述附件为通过加密打包方式生成的邮件。
  9. 如权利要求8所述的方法,其特征在于,若所述接收端的邮件接收系统为指定邮件系统,则所述接收端可以获得所述附件中所包含的原始邮件;若所述接收端的邮件接收系统不是所述指定邮件系统,则所述接收端无法获得所述附件中所包含的所述原始邮件。
  10. 如权利要求9所述的方法,其特征在于,若所述接收端的邮件接收系统非所述指定邮件系统,则所述接收端在获得处理后的所述原始邮件之后提供第三提示信息,所述第三提示信息用于指示所述接收端使用所述指定邮件系统。
  11. 如权利要求1-6任一所述的方法,其特征在于,所述处理后的原始邮件中还包括:第二扩展信息,所述第二扩展信息用于控制所述原始邮件的失效时间。
  12. 如权利要求11所述的方法,其特征在于,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述原始邮件在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述原始邮件不会失效;或者,
    所述第二扩展信息为第二功能标记,若所述接收端所获得原始邮件中包含所述第二功能标记,则所述原始邮件在预设时间段之后失效;若所述接收端所获得的原始邮件中不包含所述第二功能标记,则所述原始邮件不会失效。
  13. 如权利要求1-6任一所述的方法,其特征在于,所述发送端为所述原始邮件添加第一扩展信息,包括:
    所述发送端在所述原始邮件的邮件头植入所述第一扩展信息。
  14. 一种邮件控制方法,包括:
    接收端接收发送端发送的邮件;
    所述接收端读取所述邮件中由所述发送端添加的第一扩展信息;
    所述接收端根据所述第一扩展信息实现对所述邮件的操作权限的控制。
  15. 如权利要求14所述的方法,其特征在于,所述接收端读取所述邮件中所由所述发送端添加的第一扩展信息,包括:
    所述接收端读取所述邮件中的第一功能字段的赋值;
    所述接收端根据所述第一扩展信息实现对所述邮件的操作权限的控制,包括:
    基于第一功能字段的赋值不同,所述接收端对所述邮件的操作权限不同。
  16. 如权利要求14所述的方法,其特征在于,所述接收端读取所述邮件中所由所述发送端添加的第一扩展信息,包括:
    所述接收端读取所述邮件中的第一功能标记;
    其中,所述接收端根据所述第一功能标记是否存在来实现对所述邮件不同的操作权限。
  17. 如权利要求14所述的方法,其特征在于,所述接收端根据所述第一扩展信息实现对所述邮件的操作权限的控制,包括:
    所述接收端根据所述第一扩展信息实现对所述邮件的转发和/或回信的操作权限的控制。
  18. 如权利要求14所述的方法,其特征在于,所述接收端根据所述第一扩展信息实现对所述原始邮件的操作权限的控制,包括:
    如果所述第一扩展信息中包含第一预设内容,所述接收端对所述原始邮件的操作权限为禁止转发;和/或,
    如果所述第一扩展信息中包含第二预设内容,所述接收端对所述原始邮件的操作权限为禁止回信。
  19. 如权利要求14所述的方法,其特征在于,所述方法还包括:
    如果所述接收端对所述原始邮件的操作权限为禁止转发,所述接收端给出用于提示禁止转发的第一提示信息;和/或,
    如果所述接收端对所述原始邮件的操作权限为禁止回信,所述接收端给出用于提示禁止回信的第二提示信息。
  20. 如权利要求14-19任一所述的方法,其特征在于,所述邮件中包括所述发送端对原始邮件打包生成的附件。
  21. 如权利要求19所述的方法,其特征在于,所述附件为通过加密打包方式生成的邮件。
  22. 如权利要求20所述的方法,其特征在于,若所述接收端的邮件接收系统为指定邮件系统,则所述接收端可以获得所述附件中所包含的原始邮件;若所述接收端的邮件接收系统不是所述指定邮件系统,则所述接收端无法获得所述附件中所包含的所述原始邮件。
  23. 如权利要求20所述的方法,其特征在于,所述方法还包括:
    如果所述邮件接收系统不为所述指定邮件系统,产生第三提示信息,所述第三提示信息用于指示所述接收端使用所述指定邮件系统。
  24. 如权利要求14-19任一所述的方法,其特征在于,所述还包括:
    所述接收端从所述邮件中读取第二扩展信息;
    所述接收端基于所述第二扩展信息对所述邮件的失效时间进行控制。
  25. 如权利要求24所述的方法,其特征在于,所述接收端基于所述第二扩展信息对所述邮件的失效时间进行控制,包括:
    若所述第二扩展信息为第二功能字段,且所述第二功能字段的值包含时间点,则所述原始邮件在所述时间点后失效;若读取到的所述第二功能字段的值不包含所述时间点,则所述原始邮件不会失效;或者,
    若所述第二扩展信息为第二功能标记,则所述邮件在预设时间段之后失效;若所述邮件中不包含所述第二功能标记,则所述原始邮件不会失效。
  26. 如权利要求14-19任一所述的方法,其特征在于,所述接收端读取所述邮件中所由所述发送端添加的第一扩展信息,包括:
    所述接收端从所述邮件的邮件头读取所述第一扩展信息。
  27. 一种发送端,包括:
    获取单元:用于获得原始邮件;
    添加单元:用于为所述原始邮件添加第一扩展信息,从而获得处理后的所述原始邮件;
    发送单元:用于将所述处理后的所述原始邮件发送至接收端,以供所述接收端基于所述第一扩展信息实现对所述原始邮件的操作权限的控制。
  28. 如权利要求27所述的发送端,其特征在于,所述添加单元,包括:
    植入模块:用于在所述原始邮件中植入第一功能字段;
    赋值模块:用于为所述第一功能字段赋值,其中,所述第一功能字段被赋予的值不同,所述接收端对所述原始邮件的操作权限不同。
  29. 如权利要求27所述的发送端,其特征在于,所述添加单元,还包括:
    第一添加模块:用于为所述原始邮件添加第一功能标记,基于所述接收端所接收到的所述原始邮件中是否存在所述第一功能标记,所述接收端对所述原始邮件的操作权限不同。
  30. 如权利要求27所述的发送端,其特征在于,所述第一扩展信息用于控制所述接收端对所述原始邮件进行转发和/或回信的操作权限。
  31. 如权利要求27所述的发送端,其特征在于,
    如果所述第一扩展信息中包含第一预设内容,则所述接收端对所述原始邮件的操作权限为禁止转发;和/或,
    如果所述第一扩展信息中包含第二预设内容,则所述接收端对所述原始邮件的操作权限为禁止回信。
  32. 如权利要求27所述的邮件发送端,其特征在于,
    如果所述接收端对所述原始邮件的操作权限为禁止转发,则在接收端给出用于提示禁止转发的第一提示信息;和/或,
    如果所述接收端对所述原始邮件的操作权限为禁止回信,则在所述接收端给出用于提示禁止回信的第二提示信息。
  33. 如权利要求27-32任一所述的发送端,其特征在于,所述添加单元,还包括:
    打包模块:用于将所述原始邮件打包成新的邮件的附件;
    第二添加模块:用于为所述新的邮件添加所述第一扩展信息,进而获得处理后的所述原始邮件。
  34. 如权利要求33所述的发送端,其特征在于,所述附件为通过加密打包方式生成的邮件。
  35. 如权利要求34所述的发送端,其特征在于,若所述接收端的邮件接收系统为指定邮件接收系统,则所述接收端可以获得所述附件中所包含的原始邮件;若所述接收端的邮件接收系统不是所述指定邮件接收系统,则所述接收端无法获得所述附件中所包含的所述原始邮件。
  36. 如权利要求35所述的发送端,其特征在于,若所述接收端非所述指定邮件系统的邮件客户端,则所述接收端在获得处理后的所述原始邮件之后提供第三提示信息,所述第三提示信息用于指示所述接收端使用所述指定邮件系统的邮件客户端。
  37. 如权利要求27-32任一所述的发送端,其特征在于,所述处理后的原始邮件中还包括:第二扩展信息,所述第二扩展信息用于控制所述原始邮件的失效时间。
  38. 如权利要求37所述的发送端,其特征在于,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述原始邮件在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述原始邮件不会失效;或者,
    所述第二扩展信息为第二功能标记,若所述接收端所获得原始邮件中包含所述第二功能标记,则所述原始邮件在预设时间段之后失效;若所述接收端所获得的原始邮件中不包含所述第二功能标记,则所述原始邮件不会失效。
  39. 如权利要求27-32任一所述的发送端,其特征在于,所述添加单元,用于:
    在所述原始邮件的邮件头植入所述第一扩展信息。
  40. 一种接收端,包括:
    接收单元:用于接收发送端发送的邮件;
    读取单元:用于读取所述邮件中由所述发送端添加的第一扩展信息;
    控制单元:用于根据所述第一扩展信息实现对所述邮件的操作权限的控制。
  41. 如权利要求40所述的接收端,其特征在于,所述读取单元,包括:
    第一读取模块:用于读取所述邮件中的第一功能字段的赋值;
    所述控制单元,用于:
    基于第一功能字段的赋值不同,对所述邮件的操作权限不同。
  42. 如权利要求40所述的接收端,其特征在于,所述读取单元,还包括:
    第二读取模块:用于读取所述邮件中的第一功能标记;
    其中,根据所述第一功能标记是否存在来实现对所述邮件不同的操作权限。
  43. 如权利要求40所述的接收端,其特征在于,所述控制单元用于:
    根据所述第一扩展信息实现对所述邮件的转发和/或回信的操作权限的控制。
  44. 如权利要求40所述的接收端,其特征在于,所述控制单元用于:
    如果所述第一扩展信息中包含第一预设内容,对所述原始邮件的操作权限为禁止转发;和/或,
    如果所述第一扩展信息中包含第二预设内容,对所述原始邮件的操作权限为禁止回信。
  45. 如权利要求40所述的接收端,其特征在于,所述接收端还包括:信息提示单元,用于如果所述接收端对所述原始邮件的操作权限为禁止转发,所述接收端给出用于提示禁止转发的第一提示信息;和/或,
    如果所述接收端对所述原始邮件的操作权限为禁止回信,所述接收端给出用于提示禁止回信的第二提示信息。
  46. 如权利要求40-45任一所述的接收端,其特征在于,所述邮件中包括所述发送端对原始邮件打包生成的附件。
  47. 如权利要求45所述的接收端,其特征在于,所述附件为通过加密打包方式生成的邮件。
  48. 如权利要求46所述的接收端,其特征在于,
    若所述接收端的邮件接收系统为指定邮件接收系统,则所述接收端可以获得所述附件中所包含的原始邮件;若所述接收端的邮件接收系统不是所述指定邮件接收系统,则所述接收端无法获得所述附件中所包含的所述原始邮件。
  49. 如权利要求46所述的接收端,其特征在于,所述信息提示单元,还用于:如果所述邮件接收系统不为所述指定邮件接收系统,产生第三提示信息,所述第三提示信息用于指示所述接收端使用所述指定邮件接收系统。
  50. 如权利要求40-45任一所述的接收端,其特征在于,所述读取单元还包括:
    第三读取模块:用于从所述邮件中读取第二扩展信息;
    所述控制单元还用于:基于所述第二扩展信息对所述邮件的失效时间进行控制。
  51. 如权利要求50所述的接收端,其特征在于,所述控制单元,用于:
    若所述第二扩展信息为第二功能字段,且所述第二功能字段的值包含时间点,则所述原始邮件在所述时间点后失效;若读取到的所述第二功能字段的值不包含所 述时间点,则所述原始邮件不会失效;或者,
    若所述第二扩展信息为第二功能标记,则所述邮件在预设时间段之后失效;若所述邮件中不包含所述第二功能标记,则所述原始邮件不会失效。
  52. 如权利要求40-45任一所述的接收端,其特征在于,所述读取单元还用于:从所述邮件的邮件头读取所述第一扩展信息。
  53. 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求1-13中的任一个所述的邮件发送方法,或者执行根据权利要求14-26中的任一个所述的邮件控制方法。
  54. 一种计算机可读介质,其中存储了如权利要求53所述的计算机程序。
PCT/CN2017/117562 2016-12-21 2017-12-20 一种邮件发送方法、邮件控制方法、发送端及接收端 WO2018113707A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611189995.6A CN106789574A (zh) 2016-12-21 2016-12-21 一种邮件发送方法、邮件控制方法、发送端及接收端
CN201611189995.6 2016-12-21

Publications (1)

Publication Number Publication Date
WO2018113707A1 true WO2018113707A1 (zh) 2018-06-28

Family

ID=58893422

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/117562 WO2018113707A1 (zh) 2016-12-21 2017-12-20 一种邮件发送方法、邮件控制方法、发送端及接收端

Country Status (2)

Country Link
CN (1) CN106789574A (zh)
WO (1) WO2018113707A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789574A (zh) * 2016-12-21 2017-05-31 北京奇虎科技有限公司 一种邮件发送方法、邮件控制方法、发送端及接收端
CN109981439A (zh) * 2018-11-29 2019-07-05 阿里巴巴集团控股有限公司 邮件传送方法、装置、电子设备及计算机可读存储介质
CN111083041B (zh) * 2019-11-29 2022-08-05 百度在线网络技术(北京)有限公司 一种邮件处理方法、装置以及电子设备
CN113595856B (zh) 2020-04-30 2022-09-30 北京字节跳动网络技术有限公司 信息交互方法、装置、设备及介质
CN115334033A (zh) * 2022-08-24 2022-11-11 杭州谱链智能科技有限公司 基于电子邮件的企业数据交换方法及装置
CN115529289A (zh) * 2022-09-30 2022-12-27 杭州谱链智能科技有限公司 基于电子邮件协议的企业数据交互控制方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2541857A1 (en) * 2011-06-30 2013-01-02 Alcatel Lucent Method to forbid an email from being forwarded or repleid to all
CN102958006A (zh) * 2011-08-25 2013-03-06 中兴通讯股份有限公司 邮件的处理方法和邮件客户端
CN104660491A (zh) * 2014-12-26 2015-05-27 盈世信息科技(北京)有限公司 一种邮件处理方法
CN105184545A (zh) * 2014-05-28 2015-12-23 联想(北京)有限公司 电子邮件的处理方法和装置
CN106789574A (zh) * 2016-12-21 2017-05-31 北京奇虎科技有限公司 一种邮件发送方法、邮件控制方法、发送端及接收端

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2339228A1 (en) * 1998-08-04 2000-02-17 Gregory A. Frascadore Systems and methods for securing electronic message
US9137012B2 (en) * 2006-02-03 2015-09-15 Emc Corporation Wireless authentication methods and apparatus
CN101877644A (zh) * 2010-07-30 2010-11-03 钟长林 电子邮件发送方法、发送客户端及发送服务器
CN105871688A (zh) * 2016-03-28 2016-08-17 珠海格力电器股份有限公司 邮件发送方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2541857A1 (en) * 2011-06-30 2013-01-02 Alcatel Lucent Method to forbid an email from being forwarded or repleid to all
CN102958006A (zh) * 2011-08-25 2013-03-06 中兴通讯股份有限公司 邮件的处理方法和邮件客户端
CN105184545A (zh) * 2014-05-28 2015-12-23 联想(北京)有限公司 电子邮件的处理方法和装置
CN104660491A (zh) * 2014-12-26 2015-05-27 盈世信息科技(北京)有限公司 一种邮件处理方法
CN106789574A (zh) * 2016-12-21 2017-05-31 北京奇虎科技有限公司 一种邮件发送方法、邮件控制方法、发送端及接收端

Also Published As

Publication number Publication date
CN106789574A (zh) 2017-05-31

Similar Documents

Publication Publication Date Title
WO2018113707A1 (zh) 一种邮件发送方法、邮件控制方法、发送端及接收端
US9596219B2 (en) Method of transmission of encrypted documents
US8365305B2 (en) E-mail with secure message parts
US10038735B2 (en) Delivery control for HTTP communications among multiple end user communication devices
US9225524B2 (en) Forwarding e-mail from a wireless device
CN106487666A (zh) 一种即时通信发送方法、控制方法、发送端及接收端
US8621648B2 (en) Method and system for secure exchange and use of electronic business cards
US7840799B2 (en) Transmission of secure electronic mail formats
JP2009118174A (ja) 情報処理装置、承認方法、およびプログラム
KR20070102974A (ko) 보안 전자 메일 포맷의 전송
JP6418802B2 (ja) 送信元の電子メールアドレスを匿名化して受信することができ、受信した電子メールに、秘匿したプライベートな電子メールアドレスから返信することを可能としたメール中継システム
JP2011166467A (ja) 電子メール配送システム
JP2007011431A (ja) 電子メール送信装置及び電子メール送信制御方法
EP1791316B1 (en) E-mail with secure message parts
JP2013058256A (ja) 代理メールアドレスによる電子メール送信システム
JP2014026673A (ja) 代理メールアドレスによる電子メール送信システム
Murchison et al. Sieve Extension: File Carbon Copy (FCC)
JP2008226256A (ja) 代理メールアドレスによる電子メール送信システム
JP2011055522A (ja) 代理メールアドレスによる電子メール送信システム
JP2020035498A (ja) 代理メールアドレスによる電子メール送信システム
JP2009182749A (ja) 電子メール配信装置、電子メール配信方法および電子メール配信プログラム
JP2004215312A (ja) 代理メールアドレスによる電子メール送信システム
JP2018195352A (ja) 代理メールアドレスによる電子メール送信システム
JP2008306755A (ja) 代理メールアドレスによる電子メール送信システム
JP2018088283A (ja) 代理メールアドレスによる電子メール送信システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17883163

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17883163

Country of ref document: EP

Kind code of ref document: A1