Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mobile secure communication method based on quantum key distribution network

A quantum key distribution and secure communication technology, which is applied in the field of mobile communication encryption, can solve problems such as the limitation of the shared quantum key generation distance, the long consumption of business keys, and the impact on service quality, etc., to expand the scope of business application and shorten the construction period. The effect of short and low modification cost

Active Publication Date: 2017-03-29
QUANTUMCTEK +1
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limitations of the characteristics of quantum keys, the generation of shared quantum keys between the two places is currently limited by distance. Therefore, if you want to build a quantum key distribution network with a certain physical coverage, you need to join new A trusted relay device that relays the actual communication service key
However, in some communication services that require high real-time performance, even if the key relay type mobile confidential communication is adopted, it may also face problems in the generation and relay of service keys due to the number of concurrent calls and too many relay nodes. The process takes a long time, which leads to the problem of key arrival lag and affects the quality of service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile secure communication method based on quantum key distribution network
  • A mobile secure communication method based on quantum key distribution network
  • A mobile secure communication method based on quantum key distribution network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0068]The main hardware devices involved in the mobile secure communication method based on the quantum key distribution network include: ① mobile terminal, which can be a smart phone, a tablet computer, a set-top box, a notebook computer, a PDA or other mobile devices, it is the initiator of communication services and receiver. There should be a permanent storage device inside it, such as a flash memory chip, for storing the downloaded shared key with the centralized control station; there should be a temporary storage device, such as a memory, for storing the downloaded business key; Hardware modules capable of supporting network access can exchange data with the outside world through traditional uplink and downlink network channels (including various wireless networks); should have the ability to exchange information with quantum key distribution networks;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a mobile secret communications method based on a quantum key distribution network, comprising the following steps: a mobile terminal registering to access the network and establishing a binding relationship with a certain centralized control station in the quantum key distribution network; after a communication service is initiated, the mobile terminals participating in the current communication applying for service keys from the quantum key distribution network; the quantum key distribution network obtaining addresses of the centralized control stations participating in service key distribution during the current communication, designating a service key generation centralized control station according to a current state indicator of each centralized control station; the service key generation centralized control station generating service keys required in the current communication and distributing the keys to the mobile terminals participating in the current communication; the mobile terminals participating in the current communication using the service keys and performing secret communication through an original data link of such a communication service. The present invention makes improvement to the existing solution of a service key generation phase and a key relay phase, and solves the problem that the service quality is affected when there are a large number of relay nodes and after the arrival of the key lags.

Description

technical field [0001] The invention belongs to the field of mobile communication encryption, in particular to a mobile security communication method based on a quantum key distribution network. Background technique [0002] The modern cryptography system is mainly based on the one-way calculation, and its security can only be guaranteed by experience; the future quantum computer will make it possible to quickly decompose the prime factor algorithm, so that the foundation of the existing cryptography system will no longer exist. Quantum key distribution technology is a new type of communication encryption method that has emerged in recent years. It uses quantum state encoding information at the single photon level, and can distribute arbitrary lengths between quantum signal transmitters and quantum signal receivers located in two places. A string of identical random numbers, that is, both parties can share a large number of random keys. These random keys can be used to encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0819H04L9/0822H04L9/0852H04L63/062H04L9/083H04L9/0855H04L2209/80H04W12/041H04W12/0431
Inventor 赵勇刘春华
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products