Mail encryption and decryption method based on block chain technology
A block chain, encryption and decryption technology, applied in the field of mail security, can solve the problems of core algorithm security loopholes, high threshold, complex configuration, etc., to achieve the effect of good usability, high security, and high difficulty in cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] An email encryption and decryption method based on blockchain technology, which is applied to servers and clients that support encryption algorithms. Please refer to the attached figure 2 and image 3 To illustrate the specific steps of this embodiment, including:
[0055] S11. The mail client creates or imports the first blockchain wallet, enables the encryption function, and updates the first public key P1 to the mail server. The first public key P1 is an asymmetric encryption key;
[0056] Blockchain wallets include wallet private key and wallet public key, so the first blockchain wallet includes the first private key and the first public key P1, and the first private key is the wallet private key of the first blockchain wallet. Key, the first public key is the wallet public key of the first blockchain wallet, the first private key and the first public key P1 in the first blockchain wallet are used by individuals to encrypt and decrypt emails, so the first private ...
Embodiment 2
[0092] An email encryption and decryption method based on blockchain technology, which is applied between clients to complete email encryption and decryption, without the need for email servers to participate in encryption and decryption. Please refer to the attached Figure 4-7 To illustrate the specific steps of this embodiment, including:
[0093] S21. The client creates or imports the first blockchain wallet, and sets the configuration for receiving encrypted emails;
[0094] This is the same as in Embodiment 1. After the mail client generates or imports the first blockchain wallet, the first private key and the first public key P1 corresponding to the first blockchain wallet are obtained. The first public key P1 is An asymmetric encryption key in a non-compressed format, using the first private key and first public key of the first blockchain wallet as the private key and public key for subsequent email encryption and decryption.
[0095] Example: Using the client functi...
Embodiment 3
[0132] An email encryption and decryption method based on blockchain technology, which is applied to email encryption with multiple management parties. This embodiment is based on the implementation of personal email encryption in embodiments 1 and 2, and provides a solution for the administrator to encrypt emails. This is because sometimes emails are not only read by the user alone, but may also be viewed by other personnel. E-mail, such as the management of employees' e-mails by company managers, and the management of children's e-mails by parents. Refer to the attached Figure 8 and 9 To illustrate the specific steps of this embodiment, including:
[0133] S31. Manage the email client to create or import the second blockchain wallet, enable the encryption function, and update the second public key P0 to the email server as the manager's public key in the email server, or for those using this encryption algorithm The mail client, updating the second public key P0 to the m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


