[go: up one dir, main page]

CN104065558A - Sending and accepting methods and sending and accepting devices for email - Google Patents

Sending and accepting methods and sending and accepting devices for email Download PDF

Info

Publication number
CN104065558A
CN104065558A CN201310090831.8A CN201310090831A CN104065558A CN 104065558 A CN104065558 A CN 104065558A CN 201310090831 A CN201310090831 A CN 201310090831A CN 104065558 A CN104065558 A CN 104065558A
Authority
CN
China
Prior art keywords
email
signature
result
sign
annex
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310090831.8A
Other languages
Chinese (zh)
Inventor
南相浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongfang Information Technology Research Institute (beijing) Co Ltd
Original Assignee
Dongfang Information Technology Research Institute (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongfang Information Technology Research Institute (beijing) Co Ltd filed Critical Dongfang Information Technology Research Institute (beijing) Co Ltd
Priority to CN201310090831.8A priority Critical patent/CN104065558A/en
Publication of CN104065558A publication Critical patent/CN104065558A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses sending and accepting methods and sending and accepting devices for an email. The methods include the following steps: carrying out identity signature on an email which needs to be sent, wherein identity signature carried out on the email includes using a private key of a sending party to sign parameter information of the email; sending the email, a signature result of the sending party after identity signature is carried out and the parameter information to a receiving party of the email; and the sending party providing a basis for identity authentication and the receiving party carrying out judgment according to the basis provided by the sending party. Through relying on an identity authentication technology, a problem of authenticity identification in an accepting process before a receiving process is solved so that initiative of a receiving party of the email is brought into full display and the cleanness of an electronic office environment is ensured effectively.

Description

The transmission of Email and acceptance method and transmission and acceptance apparatus
Technical field
The present invention relates to mail transfer field, and especially, relate to a kind of transmission and acceptance method and transmission and acceptance apparatus of Email.
Background technology
E-mail system consists of originating party and debit.On the surface, transmit leg is initiatively forever, no matter be the content sending or the time sending, all by transmit leg, is grasped completely, and when transmit leg carries out malicious attack or demagogy to recipient intentionally, tend to virus, wooden horse, spam etc. to send to recipient.And recipient does not have deciding ability to this.Once recipient has opened the mail that transmit leg maliciously sends, will be under attack or be adversely affected, this is also the problem that current numerous Internet users generally feel headache.
Although recipient looks like passive side's, also there is the initiative of oneself.Whether its initiative is embodied in opens mail and how to open mail, and to this, transmit leg can not determine.Therefore, recipient must determine whether need reading mail before opening mail, and then determined whether to open mail.
That is to say, recipient user, when receiving an envelope mail, need to just can correctly judge and whether should open this mail before opening this mail, was only so significant.But, the mailing system or the identification system that use at present, be all first to open mail, just can differentiate afterwards true and false (this discrimination process can be described as afterwards and differentiates) of its letter, but this authentication schemes is actual cannot stop malicious attack or the fallacious message comprising in mail.
Effective not for the discriminating for Email in correlation technique, cannot truly to realize authentication problem, not yet proposes effective solution at present.
Summary of the invention
Effective not for the discriminating for Email in correlation technique, cannot truly to realize authentication problem, the present invention proposes a kind of transmission and acceptance method and transmission and acceptance apparatus of Email, can make email recipient can identify the true and false of Email before receiving Email, give full play to the initiative of email recipient, improve recipient and accept the fail safe in process at mail.
Technical scheme of the present invention is achieved in that
A kind of sending method of Email is provided according to an aspect of the present invention.
This sending method comprises:
The Email that needs are sent identify signature, wherein, Email is identified to sign comprises and utilizes the private key of transmit leg to sign to the parameter information of Email;
Email, transmit leg are identified to signature result and the parameter information recipient that is sent to Email after signature.
This sending method can further comprise: utilize recipient's PKI to be encrypted Email;
And the Email of transmission is the Email after encrypting.
In addition,, before sending Email, this sending method can further comprise: utilize the private key of transmit leg to sign to Email; And the result of signature is sent to recipient;
And the Email of transmission is the Email after signature.
In addition,, in the situation that Email comprises annex, sending method can further comprise:
According to the sign of transmit leg, annex is carried out to document signature;
According to recipient's PKI, the content of annex is encrypted;
Annex is identified to signature, wherein, annex is identified to signature and comprise and utilize the private key of transmit leg and parameter information to sign to annex;
By the annex of encryption, annex is carried out to result after document signature and result that annex is identified after signature is sent to recipient.
In addition, parameter information comprises temporal information.
A kind of acceptance method of Email is provided according to a further aspect in the invention.
This acceptance method comprises:
Reception identifies signature result after signature to Email and for identify the parameter information of signing;
Sign signature to the Email receiving is verified, is verified result, wherein, the sign signature of Email is verified and is comprised and utilize the PKI of transmit leg and parameter information to verify Email;
In the situation that the result does not conform to the signature result after the carrying out sign signature receiving, forbid opening Email.
In addition, in the situation that the result with identify signature after signature result conform to and Email encrypted, this acceptance method can further comprise:
Utilize recipient's private key to be decrypted Email.
And in the situation that the result conforms to and transmit leg Email is signed with the signature result identifying after signature, this acceptance method can further comprise:
Receive the result that transmit leg utilizes its private key to sign to Email;
Utilize the PKI of transmit leg to verify the signature of Email;
If the result that the signature of Email is verified, with coming to the same thing that the transmit leg that receives is signed to Email, determine that the signature of Email is by checking.
In addition, in the situation that the result with identify signature after signature result conform to and Email in comprise encryption annex, this acceptance method can further comprise:
The annex of receive encrypting, annex is carried out the result after document signature and annex identify to the result after signing;
Sign signature to annex verifies, wherein, the sign signature of annex verify and comprised and utilize the PKI of transmit leg and the parameter information of reception that the sign of annex is signed and verified;
If the result that the sign signature of annex is verified, conformed to the result that annex is identified after signing receiving, utilize recipient's private key to be decrypted annex;
Utilize recipient's sign to verify the document signature of annex, if the result that the document signature of annex is verified, conformed to the result that annex is carried out after document signature receiving, determine that annex is by checking, and determine and allow to open described annex.
In addition, parameter information comprises temporal information.
A kind of dispensing device of Email is provided according to a further aspect in the invention.
This dispensing device comprises:
Signature blocks, identify signature for the Email that needs are sent, and wherein, Email is identified to sign comprises and utilizes the private key of transmit leg to sign to the parameter information of Email;
Sending module, for identifying Email, transmit leg signature result and the parameter information recipient that is sent to Email after signature.
A kind of acceptance apparatus of Email is provided according to a further aspect in the invention.
This acceptance apparatus comprises:
Receiver module, identifies signature result after signature and for identify the parameter information of signing for receiving to Email;
Authentication module, verifies for the sign signature to the Email receiving, and is verified result, wherein, the sign signature of Email is verified and is comprised and utilize the PKI of transmit leg and parameter information to verify Email;
Control module, in the situation that the result of authentication module does not conform to the signature result after the carrying out sign signature receiving, forbids opening Email.
The present invention identifies signature by the Email that needs are sent, and comprises and utilizes the private key of transmit leg to sign to the parameter information of Email; And Email, transmit leg are identified to signature result and the parameter information recipient that is sent to Email after signature, can make Email reciever can identify the true and false of Email before receiving Email, give full play to the initiative of email recipient.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the E-mail sending method flow chart according to the embodiment of the present invention;
Fig. 2 is the Email acceptance method flow chart according to the embodiment of the present invention;
Fig. 3 is the Email dispensing device structured flowchart according to the embodiment of the present invention;
Fig. 4 is the Email acceptance apparatus structured flowchart according to the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, the every other embodiment that those of ordinary skills obtain, belongs to the scope of protection of the invention.
For the technical problem in correlation technique, the present invention proposes, and differentiates the true and false of letter before opening envelope, and this mode can be described as prior discriminating, because only have prior discriminating could embody debit's initiative.Concrete processing scheme for Email of the present invention will be described in detail below.Wherein, it should be noted that, Email described herein not merely comprises the annexes such as letter that common people use while contacting each other, can also comprise the multiple information carrier with data or the transmission of other forms such as electronic bill (for example, bank money), digital certificates.
According to embodiments of the invention, provide a kind of sending method of Email.
As shown in Figure 1, according to the sending method of the Email of the embodiment of the present invention, comprise:
Step S101, the Email that needs are sent identify signature, wherein, Email is identified to sign comprises and utilizes the private key of transmit leg to sign to the parameter information of Email;
Step S103, identifies signature result and the parameter information recipient that is sent to Email after signature by Email, transmit leg.
Wherein, the sign signature that adopted is herein the signature of private key to certain predefined parameter, that is, utilize user's private key and predetermined signature function to sign to this parameter.For example, can sign to the time, now, the object that identifies signature is to prove the authenticity of this sign constantly, for other parameters, can select equally the object as sign signature.
Wherein, before sending Email, this sending method can further comprise:
Utilize recipient's PKI to be encrypted Email;
And the Email of transmission is the Email after encrypting;
Utilize the private key of transmit leg to sign to Email, for example, transmit leg is signature on letter, to show responsible property;
The result of signature is sent to recipient;
And the Email of transmission is the Email after signature.
In addition, at Email, comprise that for example, in the situation of annex (, hereinafter described document) this sending method can further comprise:
According to the sign of transmit leg, annex is carried out to document signature;
According to recipient's PKI, the content of annex is encrypted;
Annex is identified to signature, wherein, annex is identified to signature and comprise and utilize the private key of transmit leg and parameter information to sign to annex;
By the annex of encryption, annex is carried out to result after document signature and result that annex is identified after signature is sent to recipient.
And parameter information comprises temporal information.
According to the present invention, be embodiment, a kind of acceptance method of Email is also provided.
As shown in Figure 2, according to the Email acceptance method of the embodiment of the present invention, comprise:
Step S201, receives Email identify to signature result after signature and for identifying the parameter information of signing;
Step S203, sign signature to the Email receiving is verified, be verified result, wherein, the sign signature of Email verify and comprised and utilize the PKI of transmit leg and parameter information to verify (the checking here refers to according to PKI and parameter information and calculate, and obtains the sign result of signing) to Email;
Step S205, in the situation that the result does not conform to the signature result after the carrying out sign signature receiving, (this step refers to that the result that the sign receiving in the result of the sign signature calculating before and step S201 is signed compares, judge whether both conform to or identical), forbid opening Email.
In addition, in the situation that the result with identify signature after signature result conform to and Email encrypted, acceptance method can further comprise:
Utilize recipient's private key to be decrypted Email.
In addition,, in the situation that the result conforms to and transmit leg Email is signed with the signature result identifying after signature, acceptance method further comprises:
Receive the result that transmit leg utilizes its private key to sign to Email;
Utilize the PKI of transmit leg to verify the signature of Email;
If the result that the signature of Email is verified, with coming to the same thing that the transmit leg that receives is signed to described Email, determine that the signature of Email is by checking.
And, in the situation that the result with identify signature after signature result conform to and Email in comprise encryption annex, this acceptance method can further comprise:
The annex of receive encrypting, annex is carried out the result after document signature and annex identify to the result after signing;
Sign signature to annex verifies, wherein, the sign signature of annex verify and comprised and utilize the PKI of transmit leg and the parameter information of reception that the sign of annex is signed and verified;
If the result that the sign signature of annex is verified, conformed to the result that annex is identified after signing receiving, utilize recipient's private key to be decrypted annex;
Utilize recipient's sign to verify the document signature of annex, if the result that the document signature of annex is verified, conformed to the result that annex is carried out after document signature receiving, determine that annex is by checking, and determine and allow to open described annex.
In addition, parameter information comprises temporal information.
According to embodiments of the invention, also provide a kind of dispensing device of Email.
As shown in Figure 3, this dispensing device comprises:
Signature blocks 31, identify signature for the Email that needs are sent, and wherein, Email is identified to sign comprises and utilizes the private key of transmit leg to sign to the parameter information of Email;
Sending module 32, for identifying Email, transmit leg signature result and the parameter information recipient that is sent to Email after signature.
According to embodiments of the invention, also provide a kind of acceptance apparatus of Email.
As shown in Figure 4, this acceptance apparatus comprises:
Receiver module 41, identifies signature result after signature and for identify the parameter information of signing for receiving to Email;
Authentication module 42, verifies for the sign signature to the Email receiving, and is verified result, wherein, the sign signature of Email is verified and is comprised and utilize the PKI of transmit leg and parameter information to verify Email;
Control module 43, in the situation that the result of authentication module does not conform to the signature result after the carrying out sign signature receiving, forbids opening Email.
To illustrate technique scheme of the present invention below.
The prior discriminating that the present invention proposes could realize based on Truth Value Logic; Truth Value Logic is that the public key system (being called for short sign PKI) based on sign could build.There have been sign PKI and Truth Value Logic, just can have realized prior differentiation, made the recipient in passive position there is autonomous control ability, exercised the right of accepting, receiving.
Particularly, the present invention proposes the public key system based on sign, wherein, the public key system of PKI based on sign is to produce public private key pair key cryptosystem by sign.For example, suppose that entity identification is Alice, alice represents the private key of Alice, and ALICE represents PKI, and the mapping algorithm of private key is σ 1, the mapping algorithm of PKI is σ 2, can draw so: Alice → σ 1→ alice; Alice → σ 2→ ALICE.
Wherein, sign Alice will have generally acknowledged property, without special announcement; σ 1zhi KMC (KMC) possesses, and therefore only has KMC could generate private key, and σ 2each user has, and therefore, as long as each user knows sign, just can generate corresponding PKI.
Sign differentiates it is that sign realizes the signature of time.SIG alice(time) wherein, SIG is signature function to=(s, c).The formation of signed codevector: { c} relying party verifies the signature of Alice for time, s: the PKI of first obtaining Alice: Alice → σ 2the signature of → ALICE checking Alice: VER aLICEwherein, VER is checking function to (time, s)=c '.If c=c ', proves that this Alice is constantly true.
In addition, the present invention proposes the Truth Value Logic of differentiating based on sign.Truth Value Logic is sign and body entity division, therefore, the authenticity of an entity is to meet the authenticity of sign (ID) and the authenticity of body (BD) simultaneously: AUTH (Entity)=AUTH (ID) ∩ AUTH (BD) wherein, it is the signature of tagged keys to the time that sign is differentiated, if: ID=Alice, SIG alice(time)=(s 1, c 1), it is the signature of tagged keys to data that body is differentiated, establishes: BD=macSIG alice(mac)=(s 2, c 2).Sign was differentiated before body is differentiated and is carried out, therefore can accomplish above-mentioned prior discriminating.
Truth Value Logic is divided into the process of accepting and receiving course transaction, therefore the authenticity of a transaction is the authenticity that simultaneously meets the process of accepting (AP) and reception process (RP): AUTH (Trans)=AUTH (AP) ∩ AUTH (RP) wherein, it is the signature of tagged keys to the time that sign is differentiated, if: AP=Alice, SIG alice(time)=(s 1, c 1), it is the signature of tagged keys to data that body is differentiated, establishes: RP=macSIG alice(mac)=(s 2, c 2).In transaction is differentiated, the process of accepting is that the form that identifies discriminating is carried out, and receiving course is to carry out with the form of body discriminating, therefore, before receiving course, can first accept the discriminating of process.
Autonomous controlled electron mailing system consists of the process of accepting of mail and the receiving course of mail.The process of accepting of mail occurred before the receiving course of mail.Whether accepting of mail, is differentiated and judges according to sign by debit.
Two scenes of take are below example, to the transmission of mail and (reception) process of accepting describe respectively.
(scene one) Email is without annex
Suppose: addresser is Alice, receiver is Bob, and the user name of Alice is alice@com, and the user name of Bob is bob@com.In e-mail system, all using user name as sign, and Alice and Bob have subscriber card.In subscriber card, note has private key alice@com and bob@com respectively.
The first step, Alice writes letter (letter), comprises the following steps:
1) Alice signature on letter, to show responsible property.SIG alice@com(letter)=(s 1, c 1), wherein, (s 1, c 1) result of Email being signed for transmit leg;
2) Alice will believe encryption (option): ENC bOB(letter)=code;
3) Alice identifies signature, for relying party provides the foundation of " in advance differentiate ": SIG alice@com(time)=(s 2, c 2), wherein, the time (time), alice@com was the private key of transmit leg Alice, (s in order to identify the parameter information (in other embodiments, can identify signature to other parameter informations outside the time equally) of signature 2, c 2) be that transmit leg identifies the result of signature to Email;
Alice is by { code, time, (s 1, c 1), (s 2, c 2) send.
Second step, first Bob verifies the signature of Alice@com: VER aLCE@COM(time, s 2)=c 2';
Whether check c 2=c 2', if be not inconsistent or there is no authentication code, prompting, provides the convenience of rejecting this mail or otherwise processed to user.If met, down proceed next step.
The private key DecryptDecryption (if having added close) of oneself for Bob, DEC bob(code)=letter
Bob reexamines the responsible property of letter: VER aLCE@COM(letter, s 1)=c 1'
Whether check c 1=c 1', if be not inconsistent or there is no authentication code, point out, the convenience of rejecting this letter or otherwise processed is provided to user.
In (scene two) Email with annex
Annex and mail are two independently processes, need process respectively.
E-mail identifies with user name, as: alice@com, bob@com etc.
Document in annex makes a check mark with real name, as Alice, and Bob etc.
Therefore a people will process e-mail and document simultaneously, at least comprises subscriber card and real name card in its ID card.
(2) realize the implementation step of autonomous controlled electron mail and attachment documents as follows:
The first step, if any annex, first does attachment documents;
1) with own name to document signature, for filing; SIG alice(file)=(s 1, c 1);
2) if need to be to file encryption, with encrypting with the other side's name PKI BOB: ENC bOB(file)=code 1;
3) Alice identifies signature to annex, wherein, and (s 2, c 2) for annex being identified to the result of signature, for providing the other side to realize the foundation of differentiation;
SIG alice(time 1)=(s 2,c 2);
Second step, Alice writes mail;
1) Alice signature on letter, to show responsible property.SIG alice@com(letter)=(s 3,c 3)
2) Alice will believe encryption (option): ENC bOB@COM(letter)=code 2
3) Alice identifies signature to Email, for relying party provides the foundation of " in advance differentiate ": SIG alice@com(time 2)=(s 4, c 4)
Alice is by annex { code 1, time 1, (s 1, c 1), (s 2, c 2) and mail { code 2, time 2, (s 3, c 3), (s 4, c 4) send.
The 3rd step, Bob accepts and receives mail;
Accept inspection: the true and false that judges whether alice@com: VER aLICE@COM(time 2, s 4)=c 4', wherein, c 4' for recipient Bob is by the result of the sign signature of the Email that calculates, if c 4=c 4' (the sign signature verification success to Email is described, coming to the same thing of the result that recipient calculates (result to the sign signature of Email), the signature of the sign to Email that sends over transmit leg), by checking, alice@com is true, and prompting " being verified " is is automatically accepted and changed mail and down proceed, if do not passed through, prompting " checking is not passed through ", illustrates the reason of not passing through, and for follow-up classification, processes and provides convenience.The situation by checking, often because there is no authentication code in mail, because malious email, spam etc. can be with authentication code, if there is authentication code, just can be followed the tracks of and search.
Receiving check: by the mail DecryptDecryption in mail (close if mail has been added):
DEC bob@com(code 2)=letter;
Check the digital signature of mail, confirm to be responsible for property: VER aLICE@COM(letter, s 3)=c 3if ' c 3=c 3', the content of certificate is responsible for by alice@com.If do not passed through, prompting, illustrates the reason of not passing through, for subsequent treatment is provided convenience.
The 4th step, the accepting and receiving of annex.
Accept inspection: the true and false of judgement alice: VER aLICE(time 1, s 2)=c 2'
If c 2=c 2' (the sign signature verification success to annex is described,, coming to the same thing of the result that recipient calculates (result to the sign signature of annex), the signature of the sign to annex that sends over transmit leg),, by checking, provable Alice is true, decision is accepted, can proceed next step, if do not passed through, prompting, and the reason of not passing through is described, for follow-up classification, process and provide convenience.Situation about not passing through does not have the occasion of authentication code more often, because malious email, spam etc. can be with authentication code, if there is authentication code, just can follows the tracks of and search.
Receiving check: by the document DecryptDecryption in annex (if having added close): DEC bob(code 1)=file;
Check the digital signature of mail, confirm to be responsible for property: VER aLICE(file, s 1)=c 1if ' c 1=c 1', the content of certificate is responsible for by Alice.If do not passed through, prompting, for subsequent treatment is provided convenience.
Email is the Main Means of teleworking.Email has been contained exchanging of letter dealing in transaction and document.The measure in the past adopting is to be only limited to the encryption of data or signature.This yes effectively method, but can only be to accept and reception could differentiate that it is true and false after finishing.If what receive is logic bomb, consequence is serious.
And can find out by above description, " differentiating in advance " is that dependence sign differentiates prior,, on original encryption, signature technology basis, increased sign to differentiate, specially for " differentiating in advance " provides foundation.
In the solution of the present invention, the foundation that transmit leg provides sign to differentiate, debit according to originating party, provide according to differentiating.Therefore this system is first easily accomplished in private network.In having realized the private network of autonomous controlled electron mailing system, illegal mail, spam will be restricted, and have guaranteed the clean of teleworking environment.Concerning debit, the result of judgement is exactly mainly three kinds below: have and identify authentication code; Nothing sign authentication code; Sign authentication code is wrong, three kinds of different situations is carried out to the corresponding mail that just can realize high security of processing and accept.
In sum, by means of technique scheme of the present invention, by dependence, identify authentication technique, solved receive and open mail before the whether safe and reliable difficult problem of None-identified mail, given full play to the initiative of email recipient, and the present invention is not only applicable to message system, also be for bank money system, its principle also adapts in all process of exchanges, communication process.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (12)

1. a sending method for Email, is characterized in that, comprising:
The Email that needs are sent identify signature, wherein, described Email is identified to sign comprises and utilizes the private key of transmit leg to sign to the parameter information of described Email;
Described Email, described transmit leg are identified to signature result and the described parameter information recipient that is sent to described Email after signature.
2. sending method according to claim 1, is characterized in that, before sending described Email, described sending method further comprises:
Utilize described recipient's PKI to be encrypted described Email;
And the described Email of transmission is the Email after encrypting.
3. sending method according to claim 1, is characterized in that, before sending described Email, described sending method further comprises:
Utilize the private key of described transmit leg to sign to described Email;
The result of signature is sent to described recipient;
And the described Email of transmission is the Email after signature.
4. sending method according to claim 1, is characterized in that, in the situation that described Email comprises annex, described sending method further comprises:
According to the sign of described transmit leg, described annex is carried out to document signature;
Described annex is identified to signature, wherein, described annex is identified to signature and comprise and utilize the private key of transmit leg and described parameter information to sign to described annex;
By the described annex of encrypting, described annex is carried out to the result after document signature and result that described annex identify after signing is sent to described recipient.
5. sending method according to claim 1, is characterized in that, described parameter information comprises temporal information.
6. an acceptance method for Email, is characterized in that, comprising:
Reception identifies signature result after signature to Email and for identify the parameter information of signing;
Sign signature to the Email receiving is verified, is verified result, wherein, the sign signature of described Email is verified and is comprised and utilize the PKI of transmit leg and described parameter information to verify described Email;
In the situation that the result does not conform to the signature result after the carrying out sign signature receiving, forbid opening described Email.
7. acceptance method according to claim 6, is characterized in that, in the situation that the result with identify signature after signature result conform to and described Email encrypted, described acceptance method further comprises:
Utilize described recipient's private key to be decrypted described Email.
8. acceptance method according to claim 6, is characterized in that, in the situation that the result conforms to and described transmit leg described Email is signed with the signature result identifying after signature, described acceptance method further comprises:
Receive the result that described transmit leg utilizes its private key to sign to described Email;
Utilize the PKI of described transmit leg to verify the signature of described Email;
If the result that the signature of described Email is verified, with coming to the same thing that the described transmit leg that receives is signed to described Email, determine that the signature of described Email is by checking.
9. acceptance method according to claim 6, is characterized in that, in the situation that the result with identify signature after signature result conform to and described Email in comprise encryption annex, described acceptance method further comprises:
The described annex of receive encrypting, described annex is carried out the result after document signature and described annex identify to the result after signing;
Sign signature to described annex verifies, wherein, the sign signature of described annex verify and comprised and utilize the PKI of transmit leg and the described parameter information of reception that the sign of described annex is signed and verified;
If the result that the sign signature of described annex is verified, conformed to the result that described annex is identified after signing receiving, utilize described recipient's private key to be decrypted described annex;
Utilize described recipient's sign to verify the document signature of described annex, if the result that the document signature of described annex is verified, conformed to the result that described annex is carried out after document signature receiving, determine that described annex is by checking, and determine and allow to open described annex.
10. acceptance method according to claim 6, is characterized in that, described parameter information comprises temporal information.
The dispensing device of 11. 1 kinds of Emails, is characterized in that, comprising:
Signature blocks, identify signature for the Email that needs are sent, and wherein, described Email is identified to sign comprises and utilizes the private key of transmit leg to sign to the parameter information of described Email;
Sending module, for identifying described Email, described transmit leg signature result and the described parameter information recipient that is sent to described Email after signature.
The acceptance apparatus of 12. 1 kinds of Emails, is characterized in that, comprising:
Receiver module, identifies signature result after signature and for identify the parameter information of signing for receiving to Email;
Authentication module, verifies for the sign signature to the Email receiving, and is verified result, wherein, the sign signature of described Email is verified and is comprised and utilize the PKI of transmit leg and described parameter information to verify described Email;
Control module, in the situation that the result of described authentication module does not conform to the signature result after the carrying out sign signature receiving, forbids opening described Email.
CN201310090831.8A 2013-03-20 2013-03-20 Sending and accepting methods and sending and accepting devices for email Pending CN104065558A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310090831.8A CN104065558A (en) 2013-03-20 2013-03-20 Sending and accepting methods and sending and accepting devices for email

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310090831.8A CN104065558A (en) 2013-03-20 2013-03-20 Sending and accepting methods and sending and accepting devices for email

Publications (1)

Publication Number Publication Date
CN104065558A true CN104065558A (en) 2014-09-24

Family

ID=51553097

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310090831.8A Pending CN104065558A (en) 2013-03-20 2013-03-20 Sending and accepting methods and sending and accepting devices for email

Country Status (1)

Country Link
CN (1) CN104065558A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104753671A (en) * 2013-12-27 2015-07-01 东方斯泰克信息技术研究院(北京)有限公司 Method of interconnection among network entities, device, CYBERnet construction method and device
CN105743884A (en) * 2016-01-22 2016-07-06 广东信鉴信息科技有限公司 Mail hiding method and mail hiding system
CN106789585A (en) * 2016-12-27 2017-05-31 沃通电子认证服务有限公司 Can verify that Email sends the method and device of time
CN112258192A (en) * 2020-09-15 2021-01-22 山东鲁能软件技术有限公司 Mail confirmation method and device based on block chain wallet address
CN117708791A (en) * 2023-11-30 2024-03-15 中科迅联智慧网络科技(北京)有限公司 Document-based identity verification method, device, electronic equipment and media

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001010090A1 (en) * 1999-07-28 2001-02-08 Tomkow Terrance A System and method for verifying delivery and integrity of electronic messages
CN1595916A (en) * 2004-07-12 2005-03-16 白而强 Special purpose mail system and method for preserving original state of digital file in network
CN101170401A (en) * 2006-10-27 2008-04-30 鸿富锦精密工业(深圳)有限公司 Mail encryption/decryption system and method
CN101466079A (en) * 2009-01-12 2009-06-24 中兴通讯股份有限公司 Method, system and WAPI terminal for transmitting e-mail
CA2450584C (en) * 2001-06-12 2011-01-04 Research In Motion Limited Certificate management and transfer system and method
CN102118381A (en) * 2010-09-20 2011-07-06 中科方德软件有限公司 Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method
CN102170419A (en) * 2010-02-25 2011-08-31 北京邮电大学 A secure mail client system and a method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001010090A1 (en) * 1999-07-28 2001-02-08 Tomkow Terrance A System and method for verifying delivery and integrity of electronic messages
CA2450584C (en) * 2001-06-12 2011-01-04 Research In Motion Limited Certificate management and transfer system and method
CN1595916A (en) * 2004-07-12 2005-03-16 白而强 Special purpose mail system and method for preserving original state of digital file in network
CN101170401A (en) * 2006-10-27 2008-04-30 鸿富锦精密工业(深圳)有限公司 Mail encryption/decryption system and method
CN101466079A (en) * 2009-01-12 2009-06-24 中兴通讯股份有限公司 Method, system and WAPI terminal for transmitting e-mail
CN102170419A (en) * 2010-02-25 2011-08-31 北京邮电大学 A secure mail client system and a method thereof
CN102118381A (en) * 2010-09-20 2011-07-06 中科方德软件有限公司 Safe mail system based on USBKEY (Universal Serial Bus Key) and mail encrypting-decrypting method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104753671A (en) * 2013-12-27 2015-07-01 东方斯泰克信息技术研究院(北京)有限公司 Method of interconnection among network entities, device, CYBERnet construction method and device
CN105743884A (en) * 2016-01-22 2016-07-06 广东信鉴信息科技有限公司 Mail hiding method and mail hiding system
CN106789585A (en) * 2016-12-27 2017-05-31 沃通电子认证服务有限公司 Can verify that Email sends the method and device of time
WO2018120311A1 (en) * 2016-12-27 2018-07-05 沃通电子认证服务有限公司 Method and device capable of verifying sending time of electronic mail
CN112258192A (en) * 2020-09-15 2021-01-22 山东鲁能软件技术有限公司 Mail confirmation method and device based on block chain wallet address
CN112258192B (en) * 2020-09-15 2023-07-28 山东鲁能软件技术有限公司 Mail confirmation method and device based on blockchain wallet address
CN117708791A (en) * 2023-11-30 2024-03-15 中科迅联智慧网络科技(北京)有限公司 Document-based identity verification method, device, electronic equipment and media

Similar Documents

Publication Publication Date Title
RU2710897C2 (en) Methods for safe generation of cryptograms
CN103440444B (en) The signing method of electronic contract
AU2015277000C1 (en) Efficient methods for authenticated communication
CN107196966A (en) The identity identifying method and system of multi-party trust based on block chain
KR101856682B1 (en) Entity authentication method and device
JP7302606B2 (en) system and server
US10044684B2 (en) Server for authenticating smart chip and method thereof
CN109064324A (en) Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
WO2002073877A2 (en) System and method of user and data verification
CN104243494B (en) A kind of data processing method
CN103001773A (en) NFC-based fingerprint authentication system and fingerprint authentication method
CN114710298B (en) Chameleon hash-based document batch signing method, device, equipment and medium
CN103971241A (en) Two-channel payment method and system
CN104065558A (en) Sending and accepting methods and sending and accepting devices for email
JP2002534701A (en) Auto-recoverable, auto-encryptable cryptosystem using escrowed signature-only keys
CN103701598A (en) SM2 signature algorithm-based double-check signature method and digital signature equipment
CN103346887A (en) Low-complexity identity authentication method based on intelligent card and under multiserver environment
JP7231023B2 (en) Verification system, client and server
CN105245342A (en) Smart phone-based electronic contract signing method and system
CN103493428A (en) Data encryption
Singh et al. Survey on techniques developed using digital signature: public key cryptography
Zhang et al. The Improvement of digital signature algorithm based on elliptic curve cryptography
Pasupathinathan et al. An on-line secure e-passport protocol
CN104320261B (en) Identity authentication method, financial smart card and terminal are realized on financial smart card
CN110224810A (en) A kind of method for anti-counterfeit of two dimensional code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140924

RJ01 Rejection of invention patent application after publication