Email authentication and reliable sorted transmission method for identifier-based cryptographic technique
A cryptographic technology and email technology, applied in the field of cryptographic email authentication and reliable classified delivery, can solve time-consuming and cumbersome problems, and achieve the effect of being simple, easy to implement, and convenient for large-scale promotion.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment
[0081] The cryptographic center of the present invention is established by adopting identification-based cryptographic technology, (1) to determine the use of identification signature algorithm, such as the IBS-2 algorithm in prior art 1; (2) generating system parameters (including master key). See the appendix in Technique 1 for an example.
[0082] User application process. First of all, users need to apply for registration with the password center. Individual users generally use their own email addresses as identifications, and other users can use their own legal identifications as registration identifications, such as IP addresses, domain names, etc., or email addresses. The password center can use Any registration authentication method, such as "A method for authenticating the user identity of a public network security communication service based on identification cryptographic technology" disclosed in CN1697379, performs registration authentication, as long as it can eff...
Embodiment approach
[0087] When processing signed emails, verify whether the user's identity is in the identity blacklist, and if it is in the blacklist, it will be treated as spam;
[0088] For emails without signatures, emails beyond the validity period of the service, and emails whose signature validity has not been verified, email filtering will be performed as ordinary emails;
[0089] The present invention can also include the update process of identifying the blacklist: the user thinks that a mail that has passed the signature authentication is spam, and can send the entire mail to the password center to report the mail; the password center verifies the authenticity of the signature of the reported mail Finally, determine whether the reported email is spam according to known rules, and determine whether to blacklist its user ID.
[0090] For the identification-based cryptographic technology and methods and algorithms for generating public and private keys mentioned in the present invention, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com