Email authentication and reliable sorted transmission method for identifier-based cryptographic technique

A cryptographic technology and email technology, applied in the field of cryptographic email authentication and reliable classified delivery, can solve time-consuming and cumbersome problems, and achieve the effect of being simple, easy to implement, and convenient for large-scale promotion.

Active Publication Date: 2007-05-23
SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will be a heavy and time-consuming o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Email authentication and reliable sorted transmission method for identifier-based cryptographic technique
  • Email authentication and reliable sorted transmission method for identifier-based cryptographic technique
  • Email authentication and reliable sorted transmission method for identifier-based cryptographic technique

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0081] The cryptographic center of the present invention is established by adopting identification-based cryptographic technology, (1) to determine the use of identification signature algorithm, such as the IBS-2 algorithm in prior art 1; (2) generating system parameters (including master key). See the appendix in Technique 1 for an example.

[0082] User application process. First of all, users need to apply for registration with the password center. Individual users generally use their own email addresses as identifications, and other users can use their own legal identifications as registration identifications, such as IP addresses, domain names, etc., or email addresses. The password center can use Any registration authentication method, such as "A method for authenticating the user identity of a public network security communication service based on identification cryptographic technology" disclosed in CN1697379, performs registration authentication, as long as it can eff...

Embodiment approach

[0087] When processing signed emails, verify whether the user's identity is in the identity blacklist, and if it is in the blacklist, it will be treated as spam;

[0088] For emails without signatures, emails beyond the validity period of the service, and emails whose signature validity has not been verified, email filtering will be performed as ordinary emails;

[0089] The present invention can also include the update process of identifying the blacklist: the user thinks that a mail that has passed the signature authentication is spam, and can send the entire mail to the password center to report the mail; the password center verifies the authenticity of the signature of the reported mail Finally, determine whether the reported email is spam according to known rules, and determine whether to blacklist its user ID.

[0090] For the identification-based cryptographic technology and methods and algorithms for generating public and private keys mentioned in the present invention, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to mail identification method and reliability classified transmission method, based on label password technique, wherein it comprises that: user requests register identification and legal mark to the password center; user uses private key and client software to sign and send mail; when user receives mail, judges if it has sign; if there is sign, the mail is effective, but not be filtered. The invention can support lots of users, with simple process and high reliability.

Description

technical field [0001] The invention belongs to the field of network technology, in particular to a method for mail authentication and reliable classified delivery based on identification encryption technology. Background technique [0002] With the development of the Internet, the email system has become an important communication tool for people. This has also produced many problems, one of which is the flood of spam. Due to the congenital deficiency in the design of the mail transfer protocol widely used in the Internet, there is no strong identity authentication for the sender, which makes it easier for spammers to pretend to be other people's mail addresses to send a large number of mails, while avoiding responsibility. In order to solve the problem of spam, among the various existing technologies, the widely used ones are: [0003] 1. Filter: Through default rules, users set filter rules, learn rules from user behavior, etc., and establish a fil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/58
Inventor 程朝辉王李琰
Owner SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products