Mail transmission system and transmission method based on quantum security key

A security key and quantum key technology, applied in the field of security application products, can solve problems such as increasing labor costs

Active Publication Date: 2021-08-20
中电信量子科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Moreover, the existing mail transmission system also requires a large number of third parties to participate, which will increase labor costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail transmission system and transmission method based on quantum security key
  • Mail transmission system and transmission method based on quantum security key
  • Mail transmission system and transmission method based on quantum security key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] Embodiment 1 Email transmission method based on quantum security key

[0096] Such as figure 1 As shown, this embodiment discloses a method for transmitting mail based on quantum security keys, using a transmission system for mail based on quantum security keys, the system includes:

[0097] Mailbox system, used to provide the function of sending and receiving emails;

[0098] A quantum random number generator for generating quantum keys;

[0099]The quantum exchange cipher machine receives the quantum key issued by the quantum random number generator to provide key services. The quantum exchange cipher machine has a key pre-stored in it, which is the key pre-generated by the quantum random number generator. And stored in the quantum exchange cipher machine, and the key in the quantum security chip is a symmetric key;

[0100] Quantum key filling machine, connected with the output end of the quantum exchange cipher machine, for filling the quantum key;

[0101] The ...

Embodiment 2

[0156] Embodiment 2 An encryption method for sending mail based on quantum security keys, which is applied to mail sending equipment

[0157] This embodiment discloses an encryption method for sending mail based on a quantum security key, which is applied to a mail sending device.

[0158] The mail sending device is used for sending mail, and has a built-in or external quantum security chip.

[0159] The quantum security chip stores the quantum security key. The security key in the quantum security chip undergoes symmetric entity authentication through the network and the quantum password management service system. The quantum security chip can be in the form of a SIM card or a U disk. The security in the quantum security chip The key is pre-built, and the quantum security chip is filled in advance through the quantum key filling machine when the card is issued. The quantum security chip used has a preset quantum cryptography, that is, the principle is: the quantum security ch...

Embodiment 3

[0192] Embodiment 3 A decryption method for receiving emails based on quantum security keys, applied to email receiving equipment

[0193] This embodiment discloses a method for decrypting mail received based on a quantum security key, which is applied to mail receiving equipment.

[0194] The mail receiving device is used for receiving mail, and has a built-in or external quantum security chip.

[0195] The quantum security chip stores the quantum security key. The security key in the quantum security chip undergoes symmetric entity authentication through the network and the quantum password management service system. The quantum security chip can be in the form of a SIM card or a U disk. The security in the quantum security chip The key is pre-built, and the quantum security chip is filled in advance through the quantum key filling machine when the card is issued. The quantum security chip used has a preset quantum cryptography, that is, the principle is: the quantum securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mail transmission system and a mail transmission method based on a quantum security key. The mail transmission system comprises a mail box system; a quantum random number generator; a quantum exchange cipher machine in which a secret key is pre-stored; a quantum key charging machine which is connected with the output end of the quantum exchange cipher machine; a quantum password management service system which is used for providing a mail encryption key and an identity authentication function; quantum security chips which are used for storing quantum security keys, the keys stored in each quantum security chip and the keys pre-stored in the quantum exchange cipher machine are symmetric keys, and symmetric entity authentication is carried out on the security keys in the quantum security chips through a network and a quantum cipher management service system; and a mail transceiver which is internally or externally connected with a quantum security chip. By adopting the technical scheme, the threat of an environment with increasingly severe network attacks to a mailbox transceiving environment is solved, the security threat brought by a quantum computer and a quantum algorithm in the future is prevented, and the scheme is easy to implement.

Description

technical field [0001] The application belongs to the field of security application products, and in particular relates to a quantum key-based system and method for secure email authentication and email encryption. Background technique [0002] At present, the increasingly severe environment of network attacks poses a threat to the mailbox sending and receiving environment, including: the identity authentication of the sending and receiving entity of the mail, the problem of the content of the mail being stolen during the process of mail transmission and storage, and the possible existence of the sender and receiver during the mail transmission process. Tampering and email message tampering issues. [0003] Application date: 2019.09.24, application number: CN201910904251.5 The patent application discloses a quantum digital signature-based mail system and sending and receiving method. In order to ensure the authenticity of the sent information, a specific signature algorithm ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L12/58H04L29/06
CPCH04L9/0852H04L9/0869H04L9/0897H04L9/3226H04L63/0435H04L63/083H04L63/0869H04L51/42
Inventor 刘驰李杏桃王建黄伟胜王丙磊胡缙程显赫
Owner 中电信量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products