Mail transmission system and transmission method based on quantum security key
A security key and quantum key technology, applied in the field of security application products, can solve problems such as increasing labor costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0095] Embodiment 1 Email transmission method based on quantum security key
[0096] Such as figure 1 As shown, this embodiment discloses a method for transmitting mail based on quantum security keys, using a transmission system for mail based on quantum security keys, the system includes:
[0097] Mailbox system, used to provide the function of sending and receiving emails;
[0098] A quantum random number generator for generating quantum keys;
[0099]The quantum exchange cipher machine receives the quantum key issued by the quantum random number generator to provide key services. The quantum exchange cipher machine has a key pre-stored in it, which is the key pre-generated by the quantum random number generator. And stored in the quantum exchange cipher machine, and the key in the quantum security chip is a symmetric key;
[0100] Quantum key filling machine, connected with the output end of the quantum exchange cipher machine, for filling the quantum key;
[0101] The ...
Embodiment 2
[0156] Embodiment 2 An encryption method for sending mail based on quantum security keys, which is applied to mail sending equipment
[0157] This embodiment discloses an encryption method for sending mail based on a quantum security key, which is applied to a mail sending device.
[0158] The mail sending device is used for sending mail, and has a built-in or external quantum security chip.
[0159] The quantum security chip stores the quantum security key. The security key in the quantum security chip undergoes symmetric entity authentication through the network and the quantum password management service system. The quantum security chip can be in the form of a SIM card or a U disk. The security in the quantum security chip The key is pre-built, and the quantum security chip is filled in advance through the quantum key filling machine when the card is issued. The quantum security chip used has a preset quantum cryptography, that is, the principle is: the quantum security ch...
Embodiment 3
[0192] Embodiment 3 A decryption method for receiving emails based on quantum security keys, applied to email receiving equipment
[0193] This embodiment discloses a method for decrypting mail received based on a quantum security key, which is applied to mail receiving equipment.
[0194] The mail receiving device is used for receiving mail, and has a built-in or external quantum security chip.
[0195] The quantum security chip stores the quantum security key. The security key in the quantum security chip undergoes symmetric entity authentication through the network and the quantum password management service system. The quantum security chip can be in the form of a SIM card or a U disk. The security in the quantum security chip The key is pre-built, and the quantum security chip is filled in advance through the quantum key filling machine when the card is issued. The quantum security chip used has a preset quantum cryptography, that is, the principle is: the quantum securit...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com