CN108769014A - A method of PGP verifications are carried out to Email based on block chain technology - Google Patents

A method of PGP verifications are carried out to Email based on block chain technology Download PDF

Info

Publication number
CN108769014A
CN108769014A CN201810531557.6A CN201810531557A CN108769014A CN 108769014 A CN108769014 A CN 108769014A CN 201810531557 A CN201810531557 A CN 201810531557A CN 108769014 A CN108769014 A CN 108769014A
Authority
CN
China
Prior art keywords
userid
server
user
authentication server
userb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810531557.6A
Other languages
Chinese (zh)
Other versions
CN108769014B (en
Inventor
段吉民
刘明伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Kyushu Xintai Information Polytron Technologies Inc
Original Assignee
Shandong Kyushu Xintai Information Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Kyushu Xintai Information Polytron Technologies Inc filed Critical Shandong Kyushu Xintai Information Polytron Technologies Inc
Priority to CN201810531557.6A priority Critical patent/CN108769014B/en
Publication of CN108769014A publication Critical patent/CN108769014A/en
Application granted granted Critical
Publication of CN108769014B publication Critical patent/CN108769014B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

A method of PGP verifications are carried out to Email based on block chain technology, by chain structure based on block chain technology, can not distort, the technologies such as intelligent contract, common recognition mechanism, asymmetric encryption and data secure storage, the transmitting-receiving certification of the safe transmission, data in e-mail management to confidential data is realized, and perfect careful data protection system is set up using distributed accounting system.Independent authentication technology is realized by the way that authentication server Server is arranged, it is using accurate time source, the security mechanism of high intensity high standard, to confirm that in the relative chronological order of existence and relevant operation sometime, infrastructure service is provided for the time anti-repudiation in information system for system processes data;It is kept accounts using distribution and promotes Information Security, have the distributed node processing system of the simultaneous techniques of digitlization, high reliability, high real-time, high flexibility, high scalability and original creation, effectively antagonized hacker attack and artificially distort.

Description

A method of PGP verifications are carried out to Email based on block chain technology
Technical field
The present invention relates to the data safety of information technology and protection technology fields, and in particular to one kind being based on block chain technology The method that PGP verifications are carried out to Email.
Background technology
There are many shortcomings for business account book used at present.Their inefficiency, of high cost, opaque and easy hair Raw fraud and abuse.These problems are derived from centralization, third party system based on trust, such as financial institution, these concentrations Change, the account book system based on trust can bring bottleneck and obstacle to settlement of transactions.Lack the transparency, and is easy to occur rotten It loses and cheats, these can lead to controversy.The cost for solving dispute, trade reversals or offer transaction insurance is very high.These risks and Uncertainty, which results in, misses business opportunity.
Invention content
Email is added in target block chain to overcome the above deficiencies, the invention provides a kind of, Encryption software series based on RSA public affairs spoon and private spoon encryption system, it is ensured that Email from be issued to be received it is entire The confidentiality of information, integrality and non repudiation based on block chain technology carry out PGP verifications to Email in the process Method.
Technical solution is used by the present invention overcomes its technical problem:
A method of PGP verifications are carried out to Email based on block chain technology, including:
A) one authentication server Server is set on network, when a user UserA is sent out to another user UserB When sending Email, user UserA sends request to authentication server Server, indicates that data recipient is in request UserB;
B) authentication server Server records effective sequential after receiving request, and by Encryption Algorithm generate one it is new UserID, while it is UserID_001 and UserID_002 to generate a pair of new symmetrical identity code;
C) authentication server Server obtains the public key of user UserB, and authentication server Server utilizes user The public key of UserB encrypts UserID and generates UserID_S;
D) UserID_S of identity code UserID_001 and generation are sent to user by authentication server Server UserA;
E) Email is generated electronics abstract Digest by user UserA using HASH functions;
F) user UserA is added Email and electronics abstract Digest using the identity code UserID_001 received It is close, generate encryption file DE;
G) electronics abstract Digest is sent to authentication server Server, authentication server by user UserA Server retains electronics abstract Digest;
H) UserID_S for encrypting file DE and reception is sent to user UserB by user UserA;
I) user UserB decrypts the UserID_S received with the private key of oneself, and decryption generates UserID, and will be after decryption UserID is sent to authentication server Server;
J) authentication server Server receives the UserID that send of user UserB and records behavior, authentication server Symmetrical identity code UserID_002 is sent to user UserB by Server;
K) the encryption file DE that user UserB is received using the symmetrical identity code UserID_002 decryption received, after decryption Obtain Email and electronics abstract Digest;
L) user UserB makes a summary the electronics that server is retained in the electronics obtained after decryption abstract Digest and step g) Digest is compared.
Further, Encryption Algorithm is SHA256 algorithms in step b).
The beneficial effects of the invention are as follows:By chain structure based on block chain technology, can not distort, intelligent contract, altogether The technologies such as knowledge mechanism, asymmetric encryption and data secure storage realize the safety in e-mail management to confidential data and pass Defeated, data transmitting-receiving certifications, and set up perfect careful data protection system using distributed accounting system.By the way that body is arranged Part certificate server Server realizes independent authentication technology, it is using accurate time source, the safe machine of high intensity high standard System, to confirm that system processes data is in information system in the relative chronological order of existence and relevant operation sometime Time anti-repudiation provide infrastructure service;It is kept accounts using distribution and promotes Information Security, have digitlization, high reliability, height The distributed node processing system of real-time, high flexibility, high scalability and the simultaneous techniques of original creation, it is multiple for numerous industries In miscellaneous changeable application demand, effectively antagonizes hacker attack and artificially distort.
Specific implementation mode
The present invention will be further described below.
A method of PGP verifications are carried out to Email based on block chain technology, including:
A) one authentication server Server is set on network, when a user UserA is sent out to another user UserB When sending Email, user UserA sends request to authentication server Server, indicates that data recipient is in request UserB;
B) authentication server Server records effective sequential after receiving request, and by Encryption Algorithm generate one it is new UserID, while it is UserID_001 and UserID_002 to generate a pair of new symmetrical identity code;
C) authentication server Server obtains the public key of user UserB, and authentication server Server utilizes user The public key of UserB encrypts UserID and generates UserID_S;
D) UserID_S of identity code UserID_001 and generation are sent to user by authentication server Server UserA;
E) Email is generated electronics abstract Digest by user UserA using HASH functions;
F) user UserA is added Email and electronics abstract Digest using the identity code UserID_001 received It is close, generate encryption file DE;
G) electronics abstract Digest is sent to authentication server Server, authentication server by user UserA Server retains electronics abstract Digest;
H) UserID_S for encrypting file DE and reception is sent to user UserB by user UserA;
I) user UserB decrypts the UserID_S received with the private key of oneself, and decryption generates UserID, and will be after decryption UserID is sent to authentication server Server;
J) authentication server Server receives the UserID that send of user UserB and records behavior, it is therefore an objective to ensure user UserB is received and without denial, and symmetrical identity code UserID_002 is sent to user by authentication server Server UserB;
K) the encryption file DE that user UserB is received using the symmetrical identity code UserID_002 decryption received, after decryption Obtain Email and electronics abstract Digest;
L) user UserB makes a summary the electronics that server is retained in the electronics obtained after decryption abstract Digest and step g) Digest is compared.If it is consistent to compare content, illustrate that Email is not tampered with.
By chain structure based on block chain technology, can not distort, intelligent contract, common recognition mechanism, asymmetric encryption and The technologies such as data safety storage, realize the transmitting-receiving certification of the safe transmission, data in e-mail management to confidential data, and Perfect careful data protection system is set up using distributed accounting system.It is real by the way that authentication server Server is arranged Independent authentication technology is showed, it is using accurate time source, the security mechanism of high intensity high standard, to confirm system processes data In the relative chronological order of existence and relevant operation sometime, basic clothes are provided for the time anti-repudiation in information system Business;It is kept accounts using distribution and promotes Information Security, have digitlization, high reliability, high real-time, high flexibility, high extension The distributed node processing system of property and the simultaneous techniques of original creation has in numerous industries application demand complicated and changeable Effect is fought hacker attack and is artificially distorted.
Further, Encryption Algorithm is SHA256 algorithms in step b).

Claims (2)

1. a kind of method carrying out PGP verifications to Email based on block chain technology, which is characterized in that including:
A) one authentication server Server is set on network, when a user UserA is sent out to another user UserB When sending Email, user UserA sends request to authentication server Server, indicates that data recipient is in request UserB;
B) authentication server Server records effective sequential after receiving request, and by Encryption Algorithm generate one it is new UserID, while it is UserID_001 and UserID_002 to generate a pair of new symmetrical identity code;
C) authentication server Server obtains the public key of user UserB, and authentication server Server utilizes user The public key of UserB encrypts UserID and generates UserID_S;
D) UserID_S of identity code UserID_001 and generation are sent to user by authentication server Server UserA;
E) Email is generated electronics abstract Digest by user UserA using HASH functions;
F) user UserA is added Email and electronics abstract Digest using the identity code UserID_001 received It is close, generate encryption file DE;
G) electronics abstract Digest is sent to authentication server Server, authentication server by user UserA Server retains electronics abstract Digest;
H) UserID_S for encrypting file DE and reception is sent to user UserB by user UserA;
I) user UserB decrypts the UserID_S received with the private key of oneself, and decryption generates UserID, and will be after decryption UserID is sent to authentication server Server;
J) authentication server Server receives the UserID that send of user UserB and records behavior, authentication server Symmetrical identity code UserID_002 is sent to user UserB by Server;
K) the encryption file DE that user UserB is received using the symmetrical identity code UserID_002 decryption received, after decryption Obtain Email and electronics abstract Digest;
L) user UserB makes a summary the electronics that server is retained in the electronics obtained after decryption abstract Digest and step g) Digest is compared.
2. the method according to claim 1 for carrying out PGP verifications to Email based on block chain technology, feature exist In:Encryption Algorithm is SHA256 algorithms in step b).
CN201810531557.6A 2018-05-29 2018-05-29 A method of PGP verification is carried out to Email based on block chain technology Active CN108769014B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810531557.6A CN108769014B (en) 2018-05-29 2018-05-29 A method of PGP verification is carried out to Email based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810531557.6A CN108769014B (en) 2018-05-29 2018-05-29 A method of PGP verification is carried out to Email based on block chain technology

Publications (2)

Publication Number Publication Date
CN108769014A true CN108769014A (en) 2018-11-06
CN108769014B CN108769014B (en) 2019-05-14

Family

ID=64003514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810531557.6A Active CN108769014B (en) 2018-05-29 2018-05-29 A method of PGP verification is carried out to Email based on block chain technology

Country Status (1)

Country Link
CN (1) CN108769014B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831374A (en) * 2019-03-18 2019-05-31 深圳幂度信息科技有限公司 A kind of email distribution and reception system based on block chain
CN110351185A (en) * 2019-06-28 2019-10-18 太原理工大学 A kind of distributed electronic mailbox system based on block chain technology
CN113014531A (en) * 2019-12-20 2021-06-22 中标软件有限公司 Method for encrypting and transmitting e-mail data
CN113761578A (en) * 2021-09-10 2021-12-07 马治国 Document true checking method based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043512A (en) * 2006-03-21 2007-09-26 环达电脑(上海)有限公司 Electronic mail system
CN102820969A (en) * 2011-06-07 2012-12-12 美国博通公司 NFC communications device for setting up encrypted email communication
CN106790234A (en) * 2017-01-18 2017-05-31 维沃移动通信有限公司 A kind of e-mail sending method, method of reseptance, first terminal and second terminal
CN107070644A (en) * 2016-12-26 2017-08-18 北京科技大学 A kind of decentralization public key management method and management system based on trust network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043512A (en) * 2006-03-21 2007-09-26 环达电脑(上海)有限公司 Electronic mail system
CN102820969A (en) * 2011-06-07 2012-12-12 美国博通公司 NFC communications device for setting up encrypted email communication
CN107070644A (en) * 2016-12-26 2017-08-18 北京科技大学 A kind of decentralization public key management method and management system based on trust network
CN106790234A (en) * 2017-01-18 2017-05-31 维沃移动通信有限公司 A kind of e-mail sending method, method of reseptance, first terminal and second terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831374A (en) * 2019-03-18 2019-05-31 深圳幂度信息科技有限公司 A kind of email distribution and reception system based on block chain
WO2020186672A1 (en) * 2019-03-18 2020-09-24 深圳幂度信息科技有限公司 Blockchain-based mail transmission and reception system
CN110351185A (en) * 2019-06-28 2019-10-18 太原理工大学 A kind of distributed electronic mailbox system based on block chain technology
CN113014531A (en) * 2019-12-20 2021-06-22 中标软件有限公司 Method for encrypting and transmitting e-mail data
CN113761578A (en) * 2021-09-10 2021-12-07 马治国 Document true checking method based on block chain

Also Published As

Publication number Publication date
CN108769014B (en) 2019-05-14

Similar Documents

Publication Publication Date Title
CN107528688B (en) Block chain key keeping and recovering method and device based on encryption delegation technology
TWI709314B (en) Data processing method and device
AU2015204470B2 (en) Efficient methods for protecting identity in authenticated transmissions
CN108769014B (en) A method of PGP verification is carried out to Email based on block chain technology
CN106934605B (en) User identity management method and system in digital currency
US7028180B1 (en) System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature
US20210019429A1 (en) Internet of things devices for use with an encryption service
US9704159B2 (en) Purchase transaction system with encrypted transaction information
CN106534097A (en) Block chain trading based authority control method and system
JP2020517165A (en) Anonymity and traceability of digital property transactions on distributed transaction agreement networks
US20110161671A1 (en) System and method for securing data
Gupta et al. Role of multiple encryption in secure electronic transaction
US20090271627A1 (en) Secure Data Transmission
WO1997031321A1 (en) Electronic commerce system
WO2021134897A1 (en) Blockchain supply chain transaction hidden dynamic supervision system and method
Rattan et al. E-Commerce Security using PKI approach
CN114363013B (en) Supervision-friendly blockchain content privacy protection system, message sending and query method
Dwivedi et al. A cryptographic algorithm analysis for security threats of Semantic E-Commerce Web (SECW) for electronic payment transaction system
Ahmad et al. E-commerce security through elliptic curve cryptography
EP1164745A2 (en) System and method for usage of a role certificate in encryption, and as a seal, digital stamp, and a signature
CN107403310A (en) Payment system and its method of payment under quantum Metropolitan Area Network (MAN)
Haseeb et al. Secure E-commerce protocol
CN111342968B (en) Method and system for issuing double digital certificates
KR102475434B1 (en) Security method and system for crypto currency
van Oorschot Public key cryptography’s impact on society: how Diffie and Hellman changed the world

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method for PGP verification of email based on blockchain technology

Effective date of registration: 20220819

Granted publication date: 20190514

Pledgee: Ji'nan finance Company limited by guarantee

Pledgor: SHANDONG JIUZHOU XINTAI INFORMATION TECHNOLOGY CO.,LTD.

Registration number: Y2022980012898

PE01 Entry into force of the registration of the contract for pledge of patent right