Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Mobile secret communication method based on quantum key distribution network

A quantum key distribution and secure communication technology, which is applied in the field of mobile communication encryption, can solve problems such as the limitation of the shared quantum key generation distance, the long consumption of business keys, and the impact on service quality, etc., to expand the scope of business application and shorten the construction period. The effect of short and low modification cost

Active Publication Date: 2014-12-24
QUANTUMCTEK +1
View PDF6 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limitations of the characteristics of quantum keys, the generation of shared quantum keys between the two places is currently limited by distance. Therefore, if you want to build a quantum key distribution network with a certain physical coverage, you need to join new A trusted relay device that relays the actual communication service key
However, in some communication services that require high real-time performance, even if the key relay type mobile confidential communication is adopted, it may also face problems in the generation and relay of service keys due to the number of concurrent calls and too many relay nodes. The process takes a long time, which leads to the problem of key arrival lag and affects the quality of service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile secret communication method based on quantum key distribution network
  • Mobile secret communication method based on quantum key distribution network
  • Mobile secret communication method based on quantum key distribution network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0068]The main hardware devices involved in the mobile secure communication method based on the quantum key distribution network include: ① mobile terminal, which can be a smart phone, a tablet computer, a set-top box, a notebook computer, a PDA or other mobile devices, it is the initiator of communication services and receiver. There should be a permanent storage device inside it, such as a flash memory chip, for storing the downloaded shared key with the centralized control station; there should be a temporary storage device, such as a memory, for storing the downloaded business key; Hardware modules capable of supporting network access can exchange data with the outside world through traditional uplink and downlink network channels (including various wireless networks); should have the ability to exchange information with quantum key distribution networks;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile secret communication method based on a quantum key distribution network. The method includes the steps that a mobile terminal registers to have access to the network, and the binding relationship between the mobile terminal and some centralized control station in the quantum key distribution network is built; after communication service is started, the mobile terminal participating in the communication applies for a service key from the quantum key distribution network; the quantum key distribution network obtains the addresses of all centralized control stations participating in service key distribution in the communication, and a service key generation centralized control station is assigned according to the current state indicators of all the centralized control stations; the service key generation centralized control station generates the service key needed by the communication and distributes the service key to the mobile terminal participating in the communication; the mobile terminal participating in the communication uses the service key, and secret communication is performed through the original data link of the communication service of the class. According to the method, the existing scheme in the industry is improved in the service key generation link and the key relay link, and the problem that when there are lots of relay nodes, key arrival lags behind, and the quality of service is influenced is solved.

Description

technical field [0001] The invention belongs to the field of mobile communication encryption, in particular to a mobile security communication method based on a quantum key distribution network. Background technique [0002] The modern cryptography system is mainly based on the one-way calculation, and its security can only be guaranteed by experience; the future quantum computer will make it possible to quickly decompose the prime factor algorithm, so that the foundation of the existing cryptography system will no longer exist. Quantum key distribution technology is a new type of communication encryption method that has emerged in recent years. It uses quantum state encoding information at the single photon level, and can distribute arbitrary lengths between quantum signal transmitters and quantum signal receivers located in two places. A string of identical random numbers, that is, both parties can share a large number of random keys. These random keys can be used to encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0819H04L9/0822H04L9/0852H04L63/062H04L9/083H04L9/0855H04L2209/80H04W12/041H04W12/0431
Inventor 赵勇刘春华
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products