Unlock instant, AI-driven research and patent intelligence for your innovation.

E-mail IBE (Internet Booking Engine) encryption realizing method

A technology of e-mail and implementation method, applied in e-mail client to realize mail IBE encryption without modification, in the field of e-mail IBE encryption implementation, it can solve the problem of not supporting IBE encryption, incompatibility, not being widely used, etc. question

Active Publication Date: 2013-05-01
WUHAN UNIV OF TECH +1
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although it can be used for email encryption, the use of PKI digital certificates for email encryption has a prominent disadvantage: the sender of the encrypted email needs to obtain the (encryption) Digital certificates, which have brought great inconvenience and obstacles to the application of digital certificate-based email encryption, and have also made digital certificate-based email encryption not widely used so far
However, there is also a prominent problem in using IBE for email encryption: currently, various commonly used dedicated email clients do not support IBE encryption (such as Outlook, Foxmail, Thunderbird, etc.)
But this method also has the following problems: the data format of the encrypted e-mail using this scheme is not compatible with the standard data format S / MIME (Secure / Multipurpose Internet Mail Extensions) of the encrypted e-mail, so that the sending end and the receiving end of the encrypted e-mail must use the same email client and add-in, and a custom encrypted data format (not easy to interoperate)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • E-mail IBE (Internet Booking Engine) encryption realizing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with the accompanying drawings and examples of implementation.

[0034] Adopt structural block diagram of the present invention as figure 1 shown.

[0035] There are two ways to implement the bridge digital certificate in the present invention. One is to use the applicant for the patent application of the present invention in his patent application "an IBE data encryption system based on media digital certificate" (patent application number: 201110189108.6) The proposed media digital certificate; the second is the application of the applicant for the patent application of the present invention in his patent application "A New Public Key Encryption Algorithm Application Implementation Method Based on Pseudo-RSA Key" (patent application number: 201110248050.8) Proposed pseudo-RSA digital certificate.

[0036] If the bridge digital certificate is implemented using the media digital certificate, the impl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an E-mail IBE (Internet Booking Engine) encryption realizing method. A device related to the method comprises a bridge digital certificate, a bridge digital certificate generating module, an IBE private key service client-side, an IBE cryptographic module, an IBE private key generator, an IBE add-in and a mail special client-side, wherein the bridge digital certificate serving as the IBE encryption and decryption bridge of the mail special client-side is generated by the bridge digital certificate generating module, and a public key and a private key of the bridge certificate respectively correspond to one IBE public key and one IBE private key; the IBE private key is acquired by the IBE private key service client-side from the IBE private key generator; the bridge certificate required by IBE encryption and decryption is automatically generated when a mail is sent and received or read by the IBE add-in; and a password operation using the public key or the private key of the bridge certificate is converted to a corresponding IBE password operation using the corresponding IBE public key or private key by the IBE cryptographic module. With the method, the IBE encryption of the mail is realized by the mail special client-side supporting the certificate encryption and add-in mechanism without making changes.

Description

technical field [0001] The invention belongs to the technical field of data encryption, and is an email IBE (Identity Based Encryption) encryption implementation method for an email-specific client, in particular an email client that does not support IBE encryption without modification. A method for implementing IBE encryption of emails. Background technique [0002] Most of the current dedicated email clients (non-browser-based email clients), such as Outlook, Outlook Express, Thunderbird, Foxmail, etc., support email encryption based on PKI (Public Key Infrastructure) digital certificates. PKI digital certificate is an encryption technology (or system, system) based on public key encryption algorithm. Commonly used public key encryption algorithms include RSA, ECC (elliptic curve encryption), DSA algorithm, etc. In the public key encryption algorithm, a pair of keys is involved, one of which is public, called the public key (public key) for data encryption and digital sig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L12/58
Inventor 龙毅宏黄强唐志红刘旭
Owner WUHAN UNIV OF TECH