Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and WAPI terminal for transmitting e-mail

An e-mail and sending terminal technology, applied in the field of communication, can solve the problem of insecurity in sending e-mails, and achieve the effect of ensuring business security

Inactive Publication Date: 2009-06-24
ZTE CORP
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention aims to provide a method, system and WAPI terminal for transmitting email, so as to solve the insecure problem of transmitting email through the WAPI terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and WAPI terminal for transmitting e-mail
  • Method, system and WAPI terminal for transmitting e-mail
  • Method, system and WAPI terminal for transmitting e-mail

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] According to an embodiment of the present invention, a WAPI terminal is also provided.

[0087] Figure 9 It is a block diagram of a WAPI terminal according to Embodiment 1 of the device of the present invention, such as Figure 9 As shown, the terminal includes: a first encryption module 11, a second encryption module 12, a first acquisition module 13, a third encryption module 14, and a sending module 15, specifically:

[0088] The first encryption module 11 is used for utilizing the private key of the WAPI terminal to encrypt the email text to obtain a signature;

[0089] The second encryption module 12 is connected to the first encryption module 11, and is used to encrypt the mail text and the signature to obtain the ciphertext using the randomly generated session key;

[0090] The first obtaining module 13 is used to obtain the public key of the receiving terminal through the WAPI server;

[0091] The third encryption module 14 is connected to the first acquisit...

Embodiment 2

[0094] According to an embodiment of the present invention, a WAPI terminal is also provided.

[0095] Figure 10 It is a block diagram of a WAPI terminal according to Embodiment 2 of the device of the present invention, such as Figure 10 As shown, the terminal includes: a receiving module 21, a first decryption module 22, a second decryption module 23, a second acquisition module 24, a third decryption module 25, and a verification module 26, specifically:

[0096] A receiving module 21, configured to receive the encrypted session key and ciphertext from the sending terminal;

[0097] The first decryption module 22 is connected to the receiving module 21, for utilizing the private key of the WAPI terminal to decrypt the session key;

[0098] The second decryption module 23 is connected to the first decryption module 22, and is used to decrypt the ciphertext using the decrypted session key to obtain the mail text and signature;

[0099] The second obtaining module 24 is co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a transmitting method for e-mails, a system and a WAPI terminal thereof; wherein, the method comprises that: a transmitting terminal utilizes a session key randomly generated to encrypt mail text and signature so as to obtain the cryptograph; wherein, the signature can be obtained by utilizing a private key thereof to encrypt the mail text by the transmitting terminal; the transmitting terminal can encrypt the session key by utilizing a public key of a receiving terminal, and then sends the encrypted session key and the cryptograph to the receiving terminal; the receiving terminal receives the encrypted session key and the cryptograph from the transmitting terminal; the session key can be decrypted by utilizing the private key thereof; the cryptograph can be decrypted by utilizing the decrypted session key, so as to obtain the mail text and the signature; the receiving terminal can obtain the decrypted result by utilizing the decrypted signature of the public key of the transmitting terminal, and can verify the transmitting terminal according to the decrypted result and the decrypted mail text. The business security of the e-mails at the WAPI terminal can be ensured by adopting the method and the system.

Description

technical field [0001] The present invention relates to the communication field, in particular, to an e-mail transmission method, system and WAPI terminal. Background technique [0002] In order to solve the security loopholes in the Wired Equivalent Privacy (WEP) security mechanism defined in the international standard ISO / IEC 802.11 for wireless local area networks, my country promulgated the national standard for wireless local area networks and its No. 1 amendment. WLAN Authentication and Privacy Infrastructure (WAPI for short) is adopted to replace WEP to solve the security problem of WLAN. [0003] The WAPI is composed of a wireless local area network authentication infrastructure (WLAN Authentication Infrastructure, WAI for short) and a wireless local area network privacy infrastructure (WLAN Privacy Infrastructure, WPI for short). Among them, WAI uses public key encryption technology for mutual identity authentication between terminals and access points; WPI uses the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/12H04L12/04H04W12/06H04W84/12
CPCH04L12/58H04L63/045H04L51/00H04W84/12H04W12/033
Inventor 施元庆梁洁辉冯明
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products