Sending mail encryption method based on quantum security key

A technology for sending emails and security keys, applied in the field of email sending based on quantum keys, can solve problems such as increasing labor costs, and achieve the effects of enhancing security, improving network security capabilities, and reducing transformation costs

Active Publication Date: 2021-09-28
中电信量子科技有限公司
View PDF25 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Moreover, the existing mail transmission system also requires a large number of third parties to participate, which will increase labor costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sending mail encryption method based on quantum security key
  • Sending mail encryption method based on quantum security key
  • Sending mail encryption method based on quantum security key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] Embodiment 1 An encryption method for sending mail based on quantum security keys, which is applied to mail sending equipment

[0090] This embodiment discloses an encryption method for sending mail based on a quantum security key, which is applied to a mail sending device.

[0091] The mail sending device is used for sending mail, and has a built-in or external quantum security chip.

[0092] The quantum security chip stores the quantum security key. The security key in the quantum security chip undergoes symmetric entity authentication through the network and the quantum password management service system. The quantum security chip can be in the form of a SIM card or a U disk. The security in the quantum security chip The key is pre-built, and the quantum security chip is filled in advance through the quantum key filling machine when the card is issued. The quantum security chip used has a preset quantum cryptography, that is, the principle is: the quantum security ch...

Embodiment 2

[0125] Embodiment 2 Mail transmission method based on quantum security key

[0126] This embodiment is an email sending and receiving method using the encryption method for sending emails in Embodiment 1, including sending and receiving processes.

[0127] Such as figure 1 As shown, this embodiment discloses a method for transmitting mail based on quantum security keys, using a transmission system for mail based on quantum security keys, the system includes:

[0128] Mailbox system, used to provide the function of sending and receiving emails;

[0129] A quantum random number generator for generating quantum keys;

[0130] The quantum exchange cipher machine receives the quantum key issued by the quantum random number generator to provide key services. The quantum exchange cipher machine has a key pre-stored in it, which is the key pre-generated by the quantum random number generator. And stored in the quantum exchange cipher machine, and the key in the quantum security chi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a sending mail encryption method based on a quantum security key, which is applied to mail sending equipment. The method comprises the following steps that S1 ', before a mail is sent, mail sending equipment carries out identity verification through a quantum password management service system, the mail sending equipment reads a quantum security key preset in a built-in quantum security chip and carries out symmetric entity identity authentication with the quantum password management service system, and finally an authentication result is returned; S2 ', after the user completes login authentication in the step S1, when a mail needs to be sent, a sender needs to use a preset key in the quantum security chip to make an application for obtaining a mail encryption key to a quantum password management service system. By adopting the technical scheme, the threat of the environment with increasingly severe network attacks to the mailbox sending environment is solved, the security threat brought by a quantum computer and a quantum algorithm in the future is prevented, and the scheme is easy to implement.

Description

technical field [0001] The application belongs to the field of security application products, and in particular relates to a quantum key-based mail sending method. Background technique [0002] At present, the increasingly severe environment of network attacks poses a threat to the mailbox sending and receiving environment, including: the identity authentication of the sending and receiving entity of the mail, the problem of the content of the mail being stolen during the process of mail transmission and storage, and the possible existence of the sender and receiver during the mail transmission process. Tampering and email message tampering issues. [0003] Application date: 2019.09.24, application number: CN201910904251.5 The patent application discloses a quantum digital signature-based mail system and sending and receiving method. In order to ensure the authenticity of the sent information, a specific signature algorithm is often passed before the information is sent. (s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L12/58
CPCH04L63/0838H04L9/3239H04L63/0435H04L9/0852H04L63/12H04L51/42
Inventor 刘驰李杏桃
Owner 中电信量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products