CN108769014B - A method of PGP verification is carried out to Email based on block chain technology - Google Patents

A method of PGP verification is carried out to Email based on block chain technology Download PDF

Info

Publication number
CN108769014B
CN108769014B CN201810531557.6A CN201810531557A CN108769014B CN 108769014 B CN108769014 B CN 108769014B CN 201810531557 A CN201810531557 A CN 201810531557A CN 108769014 B CN108769014 B CN 108769014B
Authority
CN
China
Prior art keywords
userid
server
user
authentication server
userb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810531557.6A
Other languages
Chinese (zh)
Other versions
CN108769014A (en
Inventor
段吉民
刘明伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Kyushu Xintai Information Polytron Technologies Inc
Original Assignee
Shandong Kyushu Xintai Information Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Kyushu Xintai Information Polytron Technologies Inc filed Critical Shandong Kyushu Xintai Information Polytron Technologies Inc
Priority to CN201810531557.6A priority Critical patent/CN108769014B/en
Publication of CN108769014A publication Critical patent/CN108769014A/en
Application granted granted Critical
Publication of CN108769014B publication Critical patent/CN108769014B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

A method of PGP verification is carried out to Email based on block chain technology, by chain structure based on block chain technology, can not distort, the technologies such as intelligent contract, common recognition mechanism, asymmetric encryption and data secure storage, it realizes in e-mail management and the transmitting-receiving of the safe transmission of confidential data, data is authenticated, and set up using distributed accounting system and improve careful data protection system.Independent authentication technology is realized by the way that authentication server Server is arranged, it is using accurate time source, the security mechanism of high-intensitive high standard, to confirm that system processes data in the relative chronological order of existence and relevant operation sometime, provides infrastructure service for the time anti-repudiation in information system;It is kept accounts using distribution and promotes Information Security, have the distributed node processing system of the simultaneous techniques of digitlization, high reliability, high real-time, high flexibility, high scalability and original creation, effectively antagonize hacker attack and artificially distorted.

Description

A method of PGP verification is carried out to Email based on block chain technology
Technical field
The present invention relates to the data safety of information technology and protection technology fields, and in particular to one kind is based on block chain technology The method that PGP verification is carried out to Email.
Background technique
There are many shortcomings for business account book used at present.Their inefficiency, at high cost, opaque and easy hair Raw fraud and abuse.These problems are derived from centralization, third party system based on trust, such as financial institution, these concentrations Change, the account book system based on trust can bring bottleneck and obstacle to settlement of transactions.Lack the transparency, and is easy to occur rotten It loses and cheats, these will lead to dispute.The cost for solving dispute, trade reversals or offer transaction insurance is very high.These risks and Uncertainty, which results in, misses business opportunity.
Summary of the invention
Email is added in target block chain to overcome the above deficiencies, the invention provides a kind of, Encryption software series based on RSA public affairs spoon and private spoon encryption system, it is ensured that Email from be issued to be received it is entire The confidentiality of information, integrality and non repudiation based on block chain technology carry out PGP verification to Email in the process Method.
The present invention overcomes the technical solution used by its technical problem to be:
A method of PGP verification is carried out to Email based on block chain technology, comprising:
A) one authentication server Server is set on network, when a user UserA is to another user When UserB sends Email, user UserA sends to authentication server Server and requests, and indicates that data connect in request Receipts person is UserB;
B) authentication server Server records effective timing after receiving request, and generates one by Encryption Algorithm New UserID, while generating a pair of new symmetrical identity code is UserID_001 and UserID_002;
C) authentication server Server obtains the public key of user UserB, and authentication server Server utilizes use The public key of family UserB encrypts UserID and generates UserID_S;
D) UserID_S of identity code UserID_001 and generation are sent to use by authentication server Server Family UserA;
E) Email is generated electronics abstract Digest using HASH function by user UserA;
F) user UserA using the identity code UserID_001 that receives by Email and electronics make a summary Digest into Row encryption generates encryption file DE;
G) electronics abstract Digest is sent to authentication server Server, authentication server by user UserA Server retains electronics abstract Digest;
H) user UserA is sent to user UserB for file DE and received UserID_S is encrypted;
I) user UserB decrypts the UserID_S received with the private key of oneself, and decryption generates UserID, and will be after decryption UserID is sent to authentication server Server;
J) authentication server Server receives the UserID that sends of user UserB and records behavior, authentication clothes Symmetrical identity code UserID_002 is sent to user UserB by business device Server;
K) user UserB decrypts received encryption file DE, solution using the symmetrical identity code UserID_002 received Email and electronics abstract Digest are obtained after close;
L) user UserB by the electronics obtained after decryption abstract Digest and step g) in authentication server Server The electronics abstract Digest of retention is compared.
Further, Encryption Algorithm is SHA256 algorithm in step b).
The beneficial effects of the present invention are: by chain structure based on block chain technology, can not distort, intelligent contract, altogether The technologies such as knowledge mechanism, asymmetric encryption and data secure storage are realized in e-mail management and are passed to the safety of confidential data Defeated, data transmitting-receiving certifications, and set up using distributed accounting system and improve careful data protection system.By the way that body is arranged Part certificate server Server realizes independent authentication technology, it is using accurate time source, the safe machine of high-intensitive high standard System, to confirm that system processes data is in information system in the relative chronological order of existence and relevant operation sometime Time anti-repudiation provide infrastructure service;It is kept accounts using distribution and promotes Information Security, have digitlization, high reliability, height Real-time, high flexibility, high scalability and the simultaneous techniques of original creation distributed node processing system, it is multiple for numerous industries In miscellaneous changeable application demand, effectively antagonizes hacker attack and artificially distort.
Specific embodiment
The present invention will be further described below.
A method of PGP verification is carried out to Email based on block chain technology, comprising:
A) one authentication server Server is set on network, when a user UserA is to another user When UserB sends Email, user UserA sends to authentication server Server and requests, and indicates that data connect in request Receipts person is UserB;
B) authentication server Server records effective timing after receiving request, and generates one by Encryption Algorithm New UserID, while generating a pair of new symmetrical identity code is UserID_001 and UserID_002;
C) authentication server Server obtains the public key of user UserB, and authentication server Server utilizes use The public key of family UserB encrypts UserID and generates UserID_S;
D) UserID_S of identity code UserID_001 and generation are sent to use by authentication server Server Family UserA;
E) Email is generated electronics abstract Digest using HASH function by user UserA;
F) user UserA using the identity code UserID_001 that receives by Email and electronics make a summary Digest into Row encryption generates encryption file DE;
G) electronics abstract Digest is sent to authentication server Server, authentication server by user UserA Server retains electronics abstract Digest;
H) user UserA is sent to user UserB for file DE and received UserID_S is encrypted;
I) user UserB decrypts the UserID_S received with the private key of oneself, and decryption generates UserID, and will be after decryption UserID is sent to authentication server Server;
J) authentication server Server receives the UserID that sends of user UserB and records behavior, it is therefore an objective to guarantee User UserB is received and without denial, and symmetrical identity code UserID_002 is sent to use by authentication server Server Family UserB;
K) user UserB decrypts received encryption file DE, solution using the symmetrical identity code UserID_002 received Email and electronics abstract Digest are obtained after close;
L) user UserB by the electronics obtained after decryption abstract Digest and step g) in authentication server Server The electronics abstract Digest of retention is compared.If compare content be it is consistent, illustrate that Email is not tampered with.
By chain structure based on block chain technology, can not distort, intelligent contract, common recognition mechanism, asymmetric encryption and The technologies such as data safety storage are realized in e-mail management and are authenticated to the transmitting-receiving of the safe transmission of confidential data, data, and It is set up using distributed accounting system and improves careful data protection system.It is real by setting authentication server Server Independent authentication technology is showed, it is using accurate time source, the security mechanism of high-intensitive high standard, to confirm system processes data In the relative chronological order of existence and relevant operation sometime, basic clothes are provided for the time anti-repudiation in information system Business;It is kept accounts using distribution and promotes Information Security, have digitlization, high reliability, high real-time, high flexibility, high extension The distributed node processing system of property and the simultaneous techniques of original creation has in numerous industries application demand complicated and changeable Effect is fought hacker attack and is artificially distorted.
Further, Encryption Algorithm is SHA256 algorithm in step b).

Claims (2)

1. a kind of method for carrying out PGP verification to Email based on block chain technology characterized by comprising
A) one authentication server Server is set on network, when a user UserA is sent out to another user UserB When sending Email, user UserA sends to authentication server Server and requests, and indicates that Data receiver is in request UserB;
B) authentication server Server records effective timing after receiving request, and generates one newly by Encryption Algorithm UserID, while generating a pair of new symmetrical identity code is UserID_001 and UserID_002;
C) authentication server Server obtains the public key of user UserB, and authentication server Server utilizes user The public key of UserB encrypts UserID and generates UserID_S;
D) UserID_S of identity code UserID_001 and generation are sent to user by authentication server Server UserA;
E) Email is generated electronics abstract Digest using HASH function by user UserA;
F) user UserA is added Email and electronics abstract Digest using the identity code UserID_001 received It is close, generate encryption file DE;
G) electronics abstract Digest is sent to authentication server Server, authentication server by user UserA Server retains electronics abstract Digest;
H) user UserA is sent to user UserB for file DE and received UserID_S is encrypted;
I) user UserB decrypts the UserID_S received with the private key of oneself, and decryption generates UserID, and will be after decryption UserID is sent to authentication server Server;
J) authentication server Server receives the UserID that sends of user UserB and records behavior, authentication server Symmetrical identity code UserID_002 is sent to user UserB by Server;
K) user UserB decrypts received encryption file DE using the symmetrical identity code UserID_002 received, after decryption Obtain Email and electronics abstract Digest;
L) user UserB retains authentication server Server in the electronics obtained after decryption abstract Digest and step g) Electronics abstract Digest be compared.
2. the method according to claim 1 for carrying out PGP verification to Email based on block chain technology, feature exist In: Encryption Algorithm is SHA256 algorithm in step b).
CN201810531557.6A 2018-05-29 2018-05-29 A method of PGP verification is carried out to Email based on block chain technology Active CN108769014B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810531557.6A CN108769014B (en) 2018-05-29 2018-05-29 A method of PGP verification is carried out to Email based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810531557.6A CN108769014B (en) 2018-05-29 2018-05-29 A method of PGP verification is carried out to Email based on block chain technology

Publications (2)

Publication Number Publication Date
CN108769014A CN108769014A (en) 2018-11-06
CN108769014B true CN108769014B (en) 2019-05-14

Family

ID=64003514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810531557.6A Active CN108769014B (en) 2018-05-29 2018-05-29 A method of PGP verification is carried out to Email based on block chain technology

Country Status (1)

Country Link
CN (1) CN108769014B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831374B (en) * 2019-03-18 2020-04-21 深圳幂度信息科技有限公司 Mail receiving and sending system based on block chain
CN110351185A (en) * 2019-06-28 2019-10-18 太原理工大学 A kind of distributed electronic mailbox system based on block chain technology
CN113014531B (en) * 2019-12-20 2022-11-29 中标软件有限公司 Method for encrypting and transmitting e-mail data
CN113761578A (en) * 2021-09-10 2021-12-07 马治国 Document true checking method based on block chain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043512A (en) * 2006-03-21 2007-09-26 环达电脑(上海)有限公司 Electronic mail system
US20120314865A1 (en) * 2011-06-07 2012-12-13 Broadcom Corporation NFC Communications Device for Setting Up Encrypted Email Communication
CN107070644B (en) * 2016-12-26 2020-02-28 北京科技大学 Decentralized public key management method and management system based on trust network
CN106790234B (en) * 2017-01-18 2018-09-04 维沃移动通信有限公司 A kind of e-mail sending method, method of reseptance, first terminal and second terminal

Also Published As

Publication number Publication date
CN108769014A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN107528688B (en) Block chain key keeping and recovering method and device based on encryption delegation technology
US10673632B2 (en) Method for managing a trusted identity
TWI709314B (en) Data processing method and device
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
US9967090B2 (en) Efficient methods for protecting identity in authenticated transmissions
CN108769014B (en) A method of PGP verification is carried out to Email based on block chain technology
US10461933B2 (en) Methods for secure credential provisioning
US7028180B1 (en) System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature
CN106934605B (en) User identity management method and system in digital currency
US10116445B2 (en) Method and system for protected exchange of data
US20180288031A1 (en) Collection point anchored multi-property identity based application specific token origination
CN109845220A (en) For providing the method and apparatus of block chain participant's identity binding
CN106534097A (en) Block chain trading based authority control method and system
CN109450843B (en) SSL certificate management method and system based on block chain
Gupta et al. Role of multiple encryption in secure electronic transaction
CN105577612B (en) Identity authentication method, third-party server, merchant server and user terminal
CN103985036A (en) Two-dimension code payment method with biological characteristics
WO2011082082A1 (en) System and method for securing data
WO2020176950A1 (en) Systems, methods and devices for provision of a secret
Rattan et al. E-Commerce Security using PKI approach
Dwivedi et al. A cryptographic algorithm analysis for security threats of Semantic E-Commerce Web (SECW) for electronic payment transaction system
CN113849797A (en) Method, device, equipment and storage medium for repairing data security vulnerability
EP1164745A2 (en) System and method for usage of a role certificate in encryption, and as a seal, digital stamp, and a signature
Boontaetae et al. RDI: Real digital identity based on decentralized PKI
CN107403310A (en) Payment system and its method of payment under quantum Metropolitan Area Network (MAN)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method for PGP verification of email based on blockchain technology

Effective date of registration: 20220819

Granted publication date: 20190514

Pledgee: Ji'nan finance Company limited by guarantee

Pledgor: SHANDONG JIUZHOU XINTAI INFORMATION TECHNOLOGY CO.,LTD.

Registration number: Y2022980012898

PE01 Entry into force of the registration of the contract for pledge of patent right