Check patentability & draft patents in minutes with Patsnap Eureka AI!

Mail user identity authentication and key distribution method, system, equipment and medium

A technology of user identity authentication and key distribution, which is applied to key distribution, can solve problems such as message integrity protection attacks, high error rate, and key leakage, so as to rectify email insecurity and chaos, protect security, and save development costs Effect

Active Publication Date: 2021-11-23
XIDIAN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problems existing in the prior art, the present invention provides a mail user identity authentication and key distribution method, system, device and medium to solve the problem of message integrity protection attack and potential Key generation center leak attack, large amount of calculation, high error rate technical problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail user identity authentication and key distribution method, system, equipment and medium
  • Mail user identity authentication and key distribution method, system, equipment and medium
  • Mail user identity authentication and key distribution method, system, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0088] as attached Figure 1-3 As shown, the present embodiment provides a mail user identity authentication and key distribution method, involving a mail verification code unit, a key generation unit KGC, and a mail sending and receiving system; Operations such as writing emails can also realize the encryption and decryption of emails; however, the prerequisite for email encryption and decryption is to have the user's own public and private keys, and only the user knows it; otherwise, the security of emails cannot be guaranteed; this embodiment passes email verification The code unit is used to send the verification code email and verify the verification code, and then realize the user identity authentication, and finally the key generation unit KGC securely issues the private key belonging to the user identity.

[0089] Specifically include the following steps:

[0090] Step 1. Authentication

[0091] Step 11, the user logs into the mailbox; wherein, the login mailbox is t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mail user identity authentication and key distribution method, system, equipment and medium, including verifying the user identity; using the mailbox account as the identity mark, performing SM9 algorithm encryption processing on the symmetric key Key and the symmetric encryption algorithm , to obtain the ciphertext C1; according to the mailbox account ID, obtain the user verification private key; use the user verification private key to decrypt the ciphertext C1, and obtain the decrypted symmetric key Key; use the decrypted symmetric key Key, use the symmetric The encryption algorithm encrypts the user verification private key to obtain the ciphertext C2; uses the symmetric key Key to decrypt the ciphertext C2, obtains the user's private key for sending and receiving, and encrypts and saves the user's sending and receiving private key, that is, completes identity authentication and encryption. key distribution; the invention can well rectify insecure emails, protect user emails, avoid key generation center leak attacks, and have a low error rate.

Description

technical field [0001] The invention belongs to the technical field of network space security, and in particular relates to a mail user identity authentication and key distribution method, system, equipment and medium. Background technique [0002] With the maturity of the Internet, the development of e-mail on the PC side has stabilized, and the e-mail on the mobile side has developed rapidly; the intercommunication between the mobile end and the PC end is conducive to the integration of various information and materials on the user's mobile end and PC end, helping users to more It is convenient to process various design and office information, and improve the user experience of using e-mail on the mobile terminal; however, due to the openness of the network, some e-mail accounts use weak passwords, and the e-mail data is easily eavesdropped and maliciously tampered with in plain text transmission, and the e-mail cannot be guaranteed. The confidentiality and integrity of em...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L12/58
CPCH04L63/0435H04L63/083H04L63/18H04L9/0869H04L51/42
Inventor 李金库周权于晨曦蒋忠元马建峰
Owner XIDIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More