Unlock instant, AI-driven research and patent intelligence for your innovation.
Method, system and WAPI terminal for transmitting e-mail
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
An e-mail and sending terminal technology, applied in the field of communication, can solve the problem of insecurity in sending e-mails, and achieve the effect of ensuring business security
Inactive Publication Date: 2009-06-24
ZTE CORP
View PDF0 Cites 31 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0008] The present invention aims to provide a method, system and WAPI terminal for transmitting email, so as to solve the insecure problem of transmitting email through the WAPI terminal
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0086] According to an embodiment of the present invention, a WAPI terminal is also provided.
[0087] Figure 9 It is a block diagram of a WAPI terminal according to Embodiment 1 of the device of the present invention, such as Figure 9 As shown, the terminal includes: a first encryption module 11, a second encryption module 12, a first acquisition module 13, a third encryption module 14, and a sending module 15, specifically:
[0088] The first encryption module 11 is used for utilizing the private key of the WAPI terminal to encrypt the email text to obtain a signature;
[0089] The second encryption module 12 is connected to the first encryption module 11, and is used to encrypt the mail text and the signature to obtain the ciphertext using the randomly generated session key;
[0090] The first obtaining module 13 is used to obtain the public key of the receiving terminal through the WAPI server;
[0091] The third encryption module 14 is connected to the first acquisit...
Embodiment 2
[0094] According to an embodiment of the present invention, a WAPI terminal is also provided.
[0095] Figure 10 It is a block diagram of a WAPI terminal according to Embodiment 2 of the device of the present invention, such as Figure 10 As shown, the terminal includes: a receiving module 21, a first decryption module 22, a second decryption module 23, a second acquisition module 24, a third decryption module 25, and a verification module 26, specifically:
[0096] A receiving module 21, configured to receive the encrypted session key and ciphertext from the sending terminal;
[0097] The first decryption module 22 is connected to the receiving module 21, for utilizing the private key of the WAPI terminal to decrypt the session key;
[0098] The second decryption module 23 is connected to the first decryption module 22, and is used to decrypt the ciphertext using the decrypted session key to obtain the mail text and signature;
[0099] The second obtaining module 24 is co...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a transmitting method for e-mails, a system and a WAPI terminal thereof; wherein, the method comprises that: a transmitting terminal utilizes a session key randomly generated to encrypt mail text and signature so as to obtain the cryptograph; wherein, the signature can be obtained by utilizing a private key thereof to encrypt the mail text by the transmitting terminal; the transmitting terminal can encrypt the session key by utilizing a public key of a receiving terminal, and then sends the encrypted session key and the cryptograph to the receiving terminal; the receiving terminal receives the encrypted session key and the cryptograph from the transmitting terminal; the session key can be decrypted by utilizing the private key thereof; the cryptograph can be decrypted by utilizing the decrypted session key, so as to obtain the mail text and the signature; the receiving terminal can obtain the decrypted result by utilizing the decrypted signature of the public key of the transmitting terminal, and can verify the transmitting terminal according to the decrypted result and the decrypted mail text. The business security of the e-mails at the WAPI terminal can be ensured by adopting the method and the system.
Description
technical field [0001] The present invention relates to the communication field, in particular, to an e-mail transmission method, system and WAPI terminal. Background technique [0002] In order to solve the security loopholes in the Wired Equivalent Privacy (WEP) security mechanism defined in the international standard ISO / IEC 802.11 for wireless local area networks, my country promulgated the national standard for wireless local area networks and its No. 1 amendment. WLAN Authentication and Privacy Infrastructure (WAPI for short) is adopted to replace WEP to solve the security problem of WLAN. [0003] The WAPI is composed of a wirelesslocal area networkauthentication infrastructure (WLAN Authentication Infrastructure, WAI for short) and a wireless local area network privacy infrastructure (WLAN Privacy Infrastructure, WPI for short). Among them, WAI uses public key encryption technology for mutual identity authentication between terminals and access points; WPI uses the...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.