Electric power security communication network based on quantum key distribution technology

A quantum key distribution, quantum key distribution technology, applied in key distribution, can solve problems such as cracking and tampering

Active Publication Date: 2014-04-30
STATE GRID CORP OF CHINA +3
View PDF4 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, classical cryptographic algorithms are generally used in power vertical encryption authentic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power security communication network based on quantum key distribution technology
  • Electric power security communication network based on quantum key distribution technology
  • Electric power security communication network based on quantum key distribution technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] see figure 2 as shown, figure 2 In , only the principle of mutual communication between any two users in the power security communication network based on quantum key distribution technology is shown, that is, a model combining the QKD system and the power longitudinal encryption authentication device is established. An electric power security communication network based on quantum key distribution technology of the present invention includes a key generation control server 10 , a classical switch 20 , a QKD system 30 and an electric power longitudinal encryption authentication device 40 .

[0045] The key generation control server 10 is connected to the QKD system 30 through the classical switch 20, each user terminal includes a power vertical encryption authentication device 40, and each power vertical encryption authentication device 40 deploys a QKD system 30. The QKD system 30 is connected with the corresponding power longitudinal encryption authentication devic...

Embodiment 2

[0048] like image 3 As shown in Fig. 1 , the model of the combination of QKD system and power longitudinal encryption and authentication device is given in the multi-user application scenario of power system. In fact, power communication networks exist with multiple users at the same time. Taking provincial-level power communication networks as an example, existing power communication networks usually have provincial power dispatching centers, city management centers under the jurisdiction of the province, and city subordinates. each factory station. Each plant has multiple power users. In order to realize the communication between any two users, in this embodiment, on the basis of the model of the power security communication network based on the quantum key distribution technology in the first embodiment, an all-pass optical quantum switch is used, and the specific structure as described below.

[0049] The power security communication network based on quantum key distri...

Embodiment 3

[0058] As mentioned above, in the actual electric power communication network, multiple users exist at the same time. Taking the provincial electric power communication network as an example, the existing electric power communication network usually has a provincial electric power dispatching center. The city management center, each plant station under the city, and each plant station includes multiple power users. Embodiment 2 discusses encrypted data transmission between multiple power users under each plant station. refer to Figure 4 , this embodiment gives an example of the integration of the power communication network and the quantum network under the jurisdiction of the provincial dispatching center. In this embodiment, an implementation based on a quantum centralized control station will be described. For the implementation based on trusted relay, there is no substantial difference in principle from the implementation based on quantum centralized control station. Af...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An electric power security communication network based on quantum key distribution technology comprises a power longitudinal encryption authentication device, a key generation control server, a classic switch, and a QKD system. The key generation control server is connected to the QKD system through the classic switch. Each power longitudinal encryption authentication device is provided with a QKD system which is connected to the power longitudinal encryption authentication device. The quantum key distribution is achieved through quantum channels among QKD systems. Communication among power longitudinal encryption authentication devices is achieved through classical channels. The power longitudinal encryption authentication device includes a quantum key transmission unit, a quantum key processing unit and an electric power communication data encryption unit, which are connected in sequence. Under a multi-user application situation, the interconnection among all the QKD systems will be achieved through all-pass typed light quantum switches. The invention further discloses an embodiment of integration of the electric power communication network and the quantum network. The electric power security communication network based on quantum key distribution technology has the advantage that the security in electric power communication network data transmission can be greatly improved by applying quantum communication technology into the traditional electric power communication network.

Description

technical field [0001] The invention relates to a power security communication network, in particular to a power security communication network based on quantum key distribution technology. Background technique [0002] Security is an important evaluation index in communication network, and cryptography provides a strong guarantee for secure communication. Traditional cryptography is based on the computational complexity of mathematical algorithms and cannot guarantee the absolute security of keys. Quantum cryptography uses the basic principles of quantum mechanics to ensure the absolute security of passwords: any measurement of a quantum system will interfere with the system, and if a third party tries to eavesdrop on the password, it must be measured in a certain way, and its measurement will bring security. When an abnormality is detected, both parties in communication will know. This is one of the most important and unique properties of quantum cryptography. When eavesd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/00H04B3/54
Inventor 雷煜卿周静陈希孙坚唐世彪陈腾云
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products