E-mail secure transmission method and system

A technology of e-mail and mail, which is applied in the field of information security, can solve problems such as the inability to solve the problem of user identity authenticity, sender repudiation and key transmission security.

Inactive Publication Date: 2021-09-10
CHINA TELECOM CORP LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventor found through research that the existing email sending scheme cannot solve the authenticity of user identity, sender repudiation and security issues of key transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • E-mail secure transmission method and system
  • E-mail secure transmission method and system
  • E-mail secure transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. The description of the exemplary embodiments is illustrative only, and in no way restricts the disclosure, its application or uses. The present disclosure can be implemented in many different forms and is not limited to the embodiments described here. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. It should be noted that the relative arrangement of parts and steps, the composition of materials and numerical values ​​set forth in these embodiments should be interpreted as illustrative only and not as limiting unless specifically stated otherwise.

[0028] Words such as "comprising" or "comprising" used in the present disclosure mean that the elements preceding the word cover the elements listed after the word, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an E-mail secure transmission method and system. The mail sender logs in the mail server by using the own PKI digital certificate, encrypts the content of the mail by using the mail receiver address of the mail as an IBC public key after successful login, calls the PKI private key to perform signature processing on the mail, and sends the processed mail to the mail receiver through the mail server; after receiving the mail, the mail receiver verifies the signature of the received mail by using the PKI public key; and after the signature verification succeeds, the mail receiver obtains the corresponding IBC private key from the third-party authentication platform, and decrypts the received mail by using the IBC private key to obtain a mail plaintext. According to the invention, the authenticity of the user is verified by using the PKI certificate, and the secure transmission of the secret key is realized by using the IBC password system, so that the secure transmission of the mail can be effectively realized.

Description

technical field [0001] The present disclosure relates to the field of information security, in particular to a method and system for secure email transmission. Background technique [0002] In recent years, there has been a high incidence of foreign agencies stealing my country's political, economic, military, technological and other intelligence through the mail system. For example, the mail server of a certain unit has been controlled by foreign countries for a long time, which has brought great hidden dangers to information security. [0003] The mail sending method currently adopted is: the mail sender uses a key to encrypt the mail, and the mail receiver uses a corresponding symmetric cipher or asymmetric key to decrypt the mail. Contents of the invention [0004] The inventor found through research that the existing email sending scheme cannot solve the problems of authenticity of user identity, repudiation of the sender and security of key transmission. [0005] A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L12/58H04L29/06
CPCH04L9/0861H04L9/083H04L9/3247H04L9/3263H04L63/0428H04L63/0823H04L63/0876H04L51/42
Inventor 王聪丽王锦华薛伟佳任永攀王渭清
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products