Method for integrating safety E-mail and Lotus Notes

An e-mail and security technology, applied in the direction of electrical components, electrical digital data processing, special data processing applications, etc., can solve problems such as being cracked, strength limited, fixed, etc., to reduce operating steps, improve encryption strength, and reduce learning time Effect

Inactive Publication Date: 2002-06-05
KOAL SOFTWARE CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 4. The recipient cannot confirm the identity of the sender, nor can it prevent the sender from denying the letter afterwards
[0026] 1. Users must leave the use environment of Lotus Notes to manually complete email encryption and decryption, signature and signature verification, which brings great inconvenience to users;
[0027] 2. The content of the text must be written with other editing tools, encrypted and sent to the other party as an attachment, and the powerful editing functions of Lotus Notes cannot be used;
[0028] 3. Symmetric encryption algorithms generally use foreign algorithms, which are limited in strength, so there is a possibility of being cracked at a low cost;
[0029] 4. The symmetric encryption algorithm used is relatively single and fixed, and is not suitable for use in applications with relatively high security requirements or special regulations (such as government departments)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for integrating safety E-mail and Lotus Notes
  • Method for integrating safety E-mail and Lotus Notes
  • Method for integrating safety E-mail and Lotus Notes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described below by the following examples.

[0056] The Lotus Notes security extension component uses Notes script language and sub-forms to customize the Notes interface. The Lotus Notes security extension component consists of an application layer and a base layer, and the base layer includes a digital management center. In the implementation of Lotus Notes security extension, each Notes user needs to apply for a certificate from the digital management center to identify his identity. The issuance, revocation, downloading, verification of validity, and update of the certificate revocation list will be managed and maintained by the digital certificate management center. The digital certificate corresponding to each Notes user is called the user identifier, and the information contained in the user identifier, including the certificate and its corresponding private key, is called user information. The part of Lotus Notes security e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for integrating safety E-mail with Lotus Notes. In the process of sending and receiving E-mail, the operating interface is customized and the functions are extended in Lotus Notes by using its safety extension module so as to realize encryption / signature and decryption / validation of signature. The invented method possesses merits of convenient for operation, easy to operate and safety to use.

Description

technical field [0001] The invention relates to a method for integrating secure e-mail and Lotus Notes. Background technique [0002] Secure e-mail mainly uses the digital envelope and digital signature technology based on the public key architecture system. By combining digital envelopes and digital signatures, users can simultaneously obtain confidentiality, integrity and non-repudiation when exchanging data. [0003] Both the digital envelope and the digital signature use the asymmetric encryption algorithm, which uses a pair of keys to complete the encryption and decryption work. In secure e-mail, the symmetric key used for encryption randomly generated in the digital envelope will be encrypted with the recipient's public key, and only the recipient with the corresponding private key can decrypt it, so as to ensure data confidentiality Effect. The digital signature uses the private key of the sender to sign the data, because only the owner of the private key can obtai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 宋寒松余宏伟
Owner KOAL SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products