Electronic mail system and method based on CPK safety authentication

An email and security authentication technology, applied in electrical components, transmission systems, digital transmission systems, etc., can solve the problems of low efficiency, slow processing speed, large storage space, etc., so as to achieve no storage space occupation, increased processing speed, The effect of improving operational efficiency

Inactive Publication Date: 2006-09-20
BEIJING E HENXEN AUTHENTICATION TECH
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] But, the method for these two kinds of electronic mail system passive security certifications all needs to maintain the database existence with a large amount of data, takes up a large amount of storage space, and the efficiency of operation is not high, and processing speed is very slow, can not adapt to public network (such as international network) Internet (Internet) security has changed from passive protection to active protection of trusted requirements, and it is impossible to establish a trusted system within the scope of an ultra-large-scale public network such as an e-mail system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic mail system and method based on CPK safety authentication
  • Electronic mail system and method based on CPK safety authentication
  • Electronic mail system and method based on CPK safety authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Attached below figure 1 ~ 3 further details a kind of email system and method based on CPK security authentication of the present invention.

[0037] The combined public key (Combined Public Key, CPK) security authentication algorithm is a discrete logarithm puzzle type identity-based key generation and management system. Based on the mathematical principle of the discrete logarithm problem, it constructs the encryption and decryption algorithm in the security authentication algorithm, generates the public key and private key matrix, and uses the hash function (HASH) and cryptographic transformation to map the identity of the entity to the row coordinates and column coordinates of the matrix Sequence, and select and combine matrix elements to generate a large number of public and private key pairs composed of public and private keys, so as to realize ultra-large-scale key generation and distribution based on identification.

[0038] The CPK key algorithm uses discrete ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The system includes ID certificate module and protocol module. ID certificate module is in use as ID for encrypting, authenticating, and signing E-mail when transmission of E-mail, and CPK private key. In procedure of transferring E-mail, protocol module uses ID provided by ID certificate module and CPK private key to encrypt, authenticate, and validate, and sign E-mail as well as validate validity of signature. The invention also discloses method of safety certification based on CPK E-mail. Features are: making E-mail safer, higher efficiency, and more economy.

Description

technical field [0001] The invention relates to the field of digital communication security authentication, in particular to an electronic mail system and method based on combined public key algorithm (CPK) security authentication. Background technique [0002] With the development of China's Internet and the process of government and enterprise informatization, the email system is increasingly occupying a pivotal position. The application of e-mail system in China has experienced the development process from the special working method of scientific research institutions to the daily life of ordinary people, to being recognized by the government and many enterprises, and becoming the "standard configuration" of people's work and life. According to the latest statistics released by CNNIC in January this year, the total number of e-mail accounts of Chinese netizens has exceeded 70 million; and according to the survey, 24.03% of domestic enterprises have their own e-mail system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L12/58
CPCH04L63/0823H04L12/58H04L63/12H04L63/0428H04L51/00
Inventor 南相浩郭文嘉
Owner BEIJING E HENXEN AUTHENTICATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products