Quantum security digital terminal applied to PSTN (Public Switched Telephone Network)

A quantum security and digital terminal technology, which is applied to key distribution, can solve problems such as short security periods, and achieve the effect of increasing speed and improving security

Inactive Publication Date: 2013-04-17
ANHUI QASKY QUANTUM SCI & TECH CO LTD
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Secure voice communication and file transmission play an important role in secure communication. Most of the existing secure telephones use public key negotiation or symmetric encryption based on algorithm complexity. Under the premise of rapid improvement in computing performance and rapid decline in cost, the security cycle getting shorter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum security digital terminal applied to PSTN (Public Switched Telephone Network)
  • Quantum security digital terminal applied to PSTN (Public Switched Telephone Network)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] see figure 1 and figure 2 , the quantum security digital terminal applied to the PSTN network, including a main controller, a QKD key service interface, a voice compression coding module, a CODEC module, a modem module, a line selection module, a first telephone line interface and a second telephone line Interface; the main controller is connected to the quantum key server through the QKD key service interface; the main controller sends the user ID of the other party and the size of the required quantum key to the quantum key server through the QKD key service interface; the main controller The quantum key is also received through the QKD key service interface; the main controller is electrically connected to the modem module, the modem module is connected to the line selection module, and the line selection module is electrically connected to the main controller; the main controller is connected to the voice compression coding The modules are electrically connected, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum security digital terminal applied to a PSTN (Public Switched Telephone Network). A method for using the quantum security digital terminal comprises the steps that: when a call is received, a modulation and demodulation module converts an analog speech signal into a digital speech signal; a main controller decrypts the digital speech signal by using a quantum secret key, and converts the analog speech signal into the digital speech signal when the call is sent out, a speech compression coding module compresses the digital speech signal to from a compressed digital signal; the main controller encrypts the compressed digital signal by using the quantum secret key to form an encrypted digital signal; and the main controller converts the encrypted digital signal into an analog signal by a modulator-demodulator, and the analog signal is output through a second phone wire interface. The quantum security digital terminal applied to the PSTN is capable of using a quantum encryption technology on the PSTN, and realizes the unconditional security digital communication.

Description

technical field [0001] The invention relates to an intelligent security digital terminal, in particular to a quantum security digital terminal applied to a PSTN network. Background technique [0002] Secure voice communication and file transmission play an important role in secure communication. Most of the existing secure telephones use public key negotiation or symmetric encryption based on algorithm complexity. Under the premise of rapid improvement in computing performance and rapid decline in cost, the security cycle getting shorter and shorter. Quantum key distribution loads key bits on quantum carriers such as light quanta, and uses the quantum specificity of signals to ensure the security of key distribution in different places from the level of physical principles, and realize unconditionally safe, dynamic and real-time key distribution. The use of quantum keys to distribute real-time and secure distribution keys and ensure the security of the system by physical me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 李大伟陈巍郭俊福
Owner ANHUI QASKY QUANTUM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products