Unlock instant, AI-driven research and patent intelligence for your innovation.

Mail encryption and decryption method based on block chain technology

A block chain, encryption and decryption technology, applied in the field of mail security, can solve the problems of core algorithm security loopholes, high threshold, complex configuration, etc., to achieve the effect of good usability, high security, and high difficulty in cracking

Pending Publication Date: 2022-03-29
北京送好运信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Because the configuration of email encryption using PGP is relatively complicated, it is necessary not only to download PGP auxiliary software, but also to learn to use its public and private keys reasonably to complete the encryption and decryption of emails. The threshold is too high for ordinary users, and its core algorithm has been Security vulnerabilities were found, there are some issues with security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail encryption and decryption method based on block chain technology
  • Mail encryption and decryption method based on block chain technology
  • Mail encryption and decryption method based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] An email encryption and decryption method based on blockchain technology, which is applied to servers and clients that support encryption algorithms. Please refer to the attached figure 2 and image 3 To illustrate the specific steps of this embodiment, including:

[0055] S11. The mail client creates or imports the first blockchain wallet, enables the encryption function, and updates the first public key P1 to the mail server. The first public key P1 is an asymmetric encryption key;

[0056] Blockchain wallets include wallet private key and wallet public key, so the first blockchain wallet includes the first private key and the first public key P1, and the first private key is the wallet private key of the first blockchain wallet. Key, the first public key is the wallet public key of the first blockchain wallet, the first private key and the first public key P1 in the first blockchain wallet are used by individuals to encrypt and decrypt emails, so the first private ...

Embodiment 2

[0092] An email encryption and decryption method based on blockchain technology, which is applied between clients to complete email encryption and decryption, without the need for email servers to participate in encryption and decryption. Please refer to the attached Figure 4-7 To illustrate the specific steps of this embodiment, including:

[0093] S21. The client creates or imports the first blockchain wallet, and sets the configuration for receiving encrypted emails;

[0094] This is the same as in Embodiment 1. After the mail client generates or imports the first blockchain wallet, the first private key and the first public key P1 corresponding to the first blockchain wallet are obtained. The first public key P1 is An asymmetric encryption key in a non-compressed format, using the first private key and first public key of the first blockchain wallet as the private key and public key for subsequent email encryption and decryption.

[0095] Example: Using the client functi...

Embodiment 3

[0132] An email encryption and decryption method based on blockchain technology, which is applied to email encryption with multiple management parties. This embodiment is based on the implementation of personal email encryption in embodiments 1 and 2, and provides a solution for the administrator to encrypt emails. This is because sometimes emails are not only read by the user alone, but may also be viewed by other personnel. E-mail, such as the management of employees' e-mails by company managers, and the management of children's e-mails by parents. Refer to the attached Figure 8 and 9 To illustrate the specific steps of this embodiment, including:

[0133] S31. Manage the email client to create or import the second blockchain wallet, enable the encryption function, and update the second public key P0 to the email server as the manager's public key in the email server, or for those using this encryption algorithm The mail client, updating the second public key P0 to the m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mail encryption and decryption method based on a block chain technology, and the method comprises the steps: generating a public key and a private key needed by the encryption and decryption of a mail through employing the wallet technology of a block chain, encrypting the content of the mail through employing the wallet public key of a receiver, reassembling the encrypted mail, writing the information related to the encryption into the header information of the mail, and carrying out the encryption and decryption of the mail. Replacing the mail content with the encrypted prompt information and the encrypted attachment; and in the decryption process, the encrypted mail is decomposed, and related mail information is decrypted by using the wallet private key of the receiver. The encryption and decryption functions of the mail content are realized through asymmetric encryption and symmetric encryption between the client side and the server side of the mail by using the block chain wallet, and meanwhile, the multi-party management requirement of the mail can be met by using the multi-manager encrypted mail management method disclosed by the invention. The encryption and decryption configuration operation is simple and convenient, and compared with a traditional mail encryption and decryption mode, the operation is simpler, and the security of the mail is higher.

Description

technical field [0001] The invention relates to the field of mail security, in particular to a method for encrypting and decrypting mail based on block chain technology. Background technique [0002] With the rapid development of Internet technology, the threat of information leakage is ubiquitous. E-mail is the most commonly used communication method for people. For emails stored in plain text, once the mailbox password is cracked, all email information can be illegally downloaded and viewed by intruders. In addition, other persons who have access to the mail data file, such as the administrator of the server, can also view the content of the mail. Once the e-mail serving the enterprise is illegally viewed by others and involves enterprise secrets, it may bring irreparable losses to the enterprise. [0003] The main method currently used to solve the above problems is to encrypt emails. At present, there are two main ways to solve the above problems: 1. End-to-end encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06F21/64G06F21/60
CPCG06Q10/107G06F21/602G06F21/64
Inventor 韩现龙刘青艳
Owner 北京送好运信息技术有限公司