CN108769014B - A method of PGP verification is carried out to Email based on block chain technology - Google Patents
A method of PGP verification is carried out to Email based on block chain technology Download PDFInfo
- Publication number
- CN108769014B CN108769014B CN201810531557.6A CN201810531557A CN108769014B CN 108769014 B CN108769014 B CN 108769014B CN 201810531557 A CN201810531557 A CN 201810531557A CN 108769014 B CN108769014 B CN 108769014B
- Authority
- CN
- China
- Prior art keywords
- userid
- server
- user
- authentication server
- userb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
A method of PGP verification is carried out to Email based on block chain technology, by chain structure based on block chain technology, can not distort, the technologies such as intelligent contract, common recognition mechanism, asymmetric encryption and data secure storage, it realizes in e-mail management and the transmitting-receiving of the safe transmission of confidential data, data is authenticated, and set up using distributed accounting system and improve careful data protection system.Independent authentication technology is realized by the way that authentication server Server is arranged, it is using accurate time source, the security mechanism of high-intensitive high standard, to confirm that system processes data in the relative chronological order of existence and relevant operation sometime, provides infrastructure service for the time anti-repudiation in information system;It is kept accounts using distribution and promotes Information Security, have the distributed node processing system of the simultaneous techniques of digitlization, high reliability, high real-time, high flexibility, high scalability and original creation, effectively antagonize hacker attack and artificially distorted.
Description
Technical field
The present invention relates to the data safety of information technology and protection technology fields, and in particular to one kind is based on block chain technology
The method that PGP verification is carried out to Email.
Background technique
There are many shortcomings for business account book used at present.Their inefficiency, at high cost, opaque and easy hair
Raw fraud and abuse.These problems are derived from centralization, third party system based on trust, such as financial institution, these concentrations
Change, the account book system based on trust can bring bottleneck and obstacle to settlement of transactions.Lack the transparency, and is easy to occur rotten
It loses and cheats, these will lead to dispute.The cost for solving dispute, trade reversals or offer transaction insurance is very high.These risks and
Uncertainty, which results in, misses business opportunity.
Summary of the invention
Email is added in target block chain to overcome the above deficiencies, the invention provides a kind of,
Encryption software series based on RSA public affairs spoon and private spoon encryption system, it is ensured that Email from be issued to be received it is entire
The confidentiality of information, integrality and non repudiation based on block chain technology carry out PGP verification to Email in the process
Method.
The present invention overcomes the technical solution used by its technical problem to be:
A method of PGP verification is carried out to Email based on block chain technology, comprising:
A) one authentication server Server is set on network, when a user UserA is to another user
When UserB sends Email, user UserA sends to authentication server Server and requests, and indicates that data connect in request
Receipts person is UserB;
B) authentication server Server records effective timing after receiving request, and generates one by Encryption Algorithm
New UserID, while generating a pair of new symmetrical identity code is UserID_001 and UserID_002;
C) authentication server Server obtains the public key of user UserB, and authentication server Server utilizes use
The public key of family UserB encrypts UserID and generates UserID_S;
D) UserID_S of identity code UserID_001 and generation are sent to use by authentication server Server
Family UserA;
E) Email is generated electronics abstract Digest using HASH function by user UserA;
F) user UserA using the identity code UserID_001 that receives by Email and electronics make a summary Digest into
Row encryption generates encryption file DE;
G) electronics abstract Digest is sent to authentication server Server, authentication server by user UserA
Server retains electronics abstract Digest;
H) user UserA is sent to user UserB for file DE and received UserID_S is encrypted;
I) user UserB decrypts the UserID_S received with the private key of oneself, and decryption generates UserID, and will be after decryption
UserID is sent to authentication server Server;
J) authentication server Server receives the UserID that sends of user UserB and records behavior, authentication clothes
Symmetrical identity code UserID_002 is sent to user UserB by business device Server;
K) user UserB decrypts received encryption file DE, solution using the symmetrical identity code UserID_002 received
Email and electronics abstract Digest are obtained after close;
L) user UserB by the electronics obtained after decryption abstract Digest and step g) in authentication server Server
The electronics abstract Digest of retention is compared.
Further, Encryption Algorithm is SHA256 algorithm in step b).
The beneficial effects of the present invention are: by chain structure based on block chain technology, can not distort, intelligent contract, altogether
The technologies such as knowledge mechanism, asymmetric encryption and data secure storage are realized in e-mail management and are passed to the safety of confidential data
Defeated, data transmitting-receiving certifications, and set up using distributed accounting system and improve careful data protection system.By the way that body is arranged
Part certificate server Server realizes independent authentication technology, it is using accurate time source, the safe machine of high-intensitive high standard
System, to confirm that system processes data is in information system in the relative chronological order of existence and relevant operation sometime
Time anti-repudiation provide infrastructure service;It is kept accounts using distribution and promotes Information Security, have digitlization, high reliability, height
Real-time, high flexibility, high scalability and the simultaneous techniques of original creation distributed node processing system, it is multiple for numerous industries
In miscellaneous changeable application demand, effectively antagonizes hacker attack and artificially distort.
Specific embodiment
The present invention will be further described below.
A method of PGP verification is carried out to Email based on block chain technology, comprising:
A) one authentication server Server is set on network, when a user UserA is to another user
When UserB sends Email, user UserA sends to authentication server Server and requests, and indicates that data connect in request
Receipts person is UserB;
B) authentication server Server records effective timing after receiving request, and generates one by Encryption Algorithm
New UserID, while generating a pair of new symmetrical identity code is UserID_001 and UserID_002;
C) authentication server Server obtains the public key of user UserB, and authentication server Server utilizes use
The public key of family UserB encrypts UserID and generates UserID_S;
D) UserID_S of identity code UserID_001 and generation are sent to use by authentication server Server
Family UserA;
E) Email is generated electronics abstract Digest using HASH function by user UserA;
F) user UserA using the identity code UserID_001 that receives by Email and electronics make a summary Digest into
Row encryption generates encryption file DE;
G) electronics abstract Digest is sent to authentication server Server, authentication server by user UserA
Server retains electronics abstract Digest;
H) user UserA is sent to user UserB for file DE and received UserID_S is encrypted;
I) user UserB decrypts the UserID_S received with the private key of oneself, and decryption generates UserID, and will be after decryption
UserID is sent to authentication server Server;
J) authentication server Server receives the UserID that sends of user UserB and records behavior, it is therefore an objective to guarantee
User UserB is received and without denial, and symmetrical identity code UserID_002 is sent to use by authentication server Server
Family UserB;
K) user UserB decrypts received encryption file DE, solution using the symmetrical identity code UserID_002 received
Email and electronics abstract Digest are obtained after close;
L) user UserB by the electronics obtained after decryption abstract Digest and step g) in authentication server Server
The electronics abstract Digest of retention is compared.If compare content be it is consistent, illustrate that Email is not tampered with.
By chain structure based on block chain technology, can not distort, intelligent contract, common recognition mechanism, asymmetric encryption and
The technologies such as data safety storage are realized in e-mail management and are authenticated to the transmitting-receiving of the safe transmission of confidential data, data, and
It is set up using distributed accounting system and improves careful data protection system.It is real by setting authentication server Server
Independent authentication technology is showed, it is using accurate time source, the security mechanism of high-intensitive high standard, to confirm system processes data
In the relative chronological order of existence and relevant operation sometime, basic clothes are provided for the time anti-repudiation in information system
Business;It is kept accounts using distribution and promotes Information Security, have digitlization, high reliability, high real-time, high flexibility, high extension
The distributed node processing system of property and the simultaneous techniques of original creation has in numerous industries application demand complicated and changeable
Effect is fought hacker attack and is artificially distorted.
Further, Encryption Algorithm is SHA256 algorithm in step b).
Claims (2)
1. a kind of method for carrying out PGP verification to Email based on block chain technology characterized by comprising
A) one authentication server Server is set on network, when a user UserA is sent out to another user UserB
When sending Email, user UserA sends to authentication server Server and requests, and indicates that Data receiver is in request
UserB;
B) authentication server Server records effective timing after receiving request, and generates one newly by Encryption Algorithm
UserID, while generating a pair of new symmetrical identity code is UserID_001 and UserID_002;
C) authentication server Server obtains the public key of user UserB, and authentication server Server utilizes user
The public key of UserB encrypts UserID and generates UserID_S;
D) UserID_S of identity code UserID_001 and generation are sent to user by authentication server Server
UserA;
E) Email is generated electronics abstract Digest using HASH function by user UserA;
F) user UserA is added Email and electronics abstract Digest using the identity code UserID_001 received
It is close, generate encryption file DE;
G) electronics abstract Digest is sent to authentication server Server, authentication server by user UserA
Server retains electronics abstract Digest;
H) user UserA is sent to user UserB for file DE and received UserID_S is encrypted;
I) user UserB decrypts the UserID_S received with the private key of oneself, and decryption generates UserID, and will be after decryption
UserID is sent to authentication server Server;
J) authentication server Server receives the UserID that sends of user UserB and records behavior, authentication server
Symmetrical identity code UserID_002 is sent to user UserB by Server;
K) user UserB decrypts received encryption file DE using the symmetrical identity code UserID_002 received, after decryption
Obtain Email and electronics abstract Digest;
L) user UserB retains authentication server Server in the electronics obtained after decryption abstract Digest and step g)
Electronics abstract Digest be compared.
2. the method according to claim 1 for carrying out PGP verification to Email based on block chain technology, feature exist
In: Encryption Algorithm is SHA256 algorithm in step b).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810531557.6A CN108769014B (en) | 2018-05-29 | 2018-05-29 | A method of PGP verification is carried out to Email based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810531557.6A CN108769014B (en) | 2018-05-29 | 2018-05-29 | A method of PGP verification is carried out to Email based on block chain technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108769014A CN108769014A (en) | 2018-11-06 |
CN108769014B true CN108769014B (en) | 2019-05-14 |
Family
ID=64003514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810531557.6A Active CN108769014B (en) | 2018-05-29 | 2018-05-29 | A method of PGP verification is carried out to Email based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108769014B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831374B (en) * | 2019-03-18 | 2020-04-21 | 深圳幂度信息科技有限公司 | Mail receiving and sending system based on block chain |
CN110351185A (en) * | 2019-06-28 | 2019-10-18 | 太原理工大学 | A kind of distributed electronic mailbox system based on block chain technology |
CN113014531B (en) * | 2019-12-20 | 2022-11-29 | 中标软件有限公司 | Method for encrypting and transmitting e-mail data |
CN113761578A (en) * | 2021-09-10 | 2021-12-07 | 马治国 | Document true checking method based on block chain |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043512A (en) * | 2006-03-21 | 2007-09-26 | 环达电脑(上海)有限公司 | Electronic mail system |
US20120314865A1 (en) * | 2011-06-07 | 2012-12-13 | Broadcom Corporation | NFC Communications Device for Setting Up Encrypted Email Communication |
CN107070644B (en) * | 2016-12-26 | 2020-02-28 | 北京科技大学 | Decentralized public key management method and management system based on trust network |
CN106790234B (en) * | 2017-01-18 | 2018-09-04 | 维沃移动通信有限公司 | A kind of e-mail sending method, method of reseptance, first terminal and second terminal |
-
2018
- 2018-05-29 CN CN201810531557.6A patent/CN108769014B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN108769014A (en) | 2018-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107528688B (en) | Block chain key keeping and recovering method and device based on encryption delegation technology | |
US10673632B2 (en) | Method for managing a trusted identity | |
TWI709314B (en) | Data processing method and device | |
CN108418680B (en) | Block chain key recovery method and medium based on secure multi-party computing technology | |
US9967090B2 (en) | Efficient methods for protecting identity in authenticated transmissions | |
CN108769014B (en) | A method of PGP verification is carried out to Email based on block chain technology | |
US10461933B2 (en) | Methods for secure credential provisioning | |
US7028180B1 (en) | System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature | |
CN106934605B (en) | User identity management method and system in digital currency | |
US10116445B2 (en) | Method and system for protected exchange of data | |
US20180288031A1 (en) | Collection point anchored multi-property identity based application specific token origination | |
CN109845220A (en) | For providing the method and apparatus of block chain participant's identity binding | |
CN106534097A (en) | Block chain trading based authority control method and system | |
CN109450843B (en) | SSL certificate management method and system based on block chain | |
Gupta et al. | Role of multiple encryption in secure electronic transaction | |
CN105577612B (en) | Identity authentication method, third-party server, merchant server and user terminal | |
CN103985036A (en) | Two-dimension code payment method with biological characteristics | |
WO2011082082A1 (en) | System and method for securing data | |
WO2020176950A1 (en) | Systems, methods and devices for provision of a secret | |
Rattan et al. | E-Commerce Security using PKI approach | |
Dwivedi et al. | A cryptographic algorithm analysis for security threats of Semantic E-Commerce Web (SECW) for electronic payment transaction system | |
CN113849797A (en) | Method, device, equipment and storage medium for repairing data security vulnerability | |
EP1164745A2 (en) | System and method for usage of a role certificate in encryption, and as a seal, digital stamp, and a signature | |
Boontaetae et al. | RDI: Real digital identity based on decentralized PKI | |
CN107403310A (en) | Payment system and its method of payment under quantum Metropolitan Area Network (MAN) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A method for PGP verification of email based on blockchain technology Effective date of registration: 20220819 Granted publication date: 20190514 Pledgee: Ji'nan finance Company limited by guarantee Pledgor: SHANDONG JIUZHOU XINTAI INFORMATION TECHNOLOGY CO.,LTD. Registration number: Y2022980012898 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right |