Quantum key transmission control method and system

A quantum key and transmission control technology, which is applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as one-time pads that have not been practically applied

Active Publication Date: 2015-05-27
SHANDONG INST OF QUANTUM SCI & TECH +1
View PDF3 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And how to generate a large number of random number keys has always been a problem, so the one-time pad has not been practically applied.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key transmission control method and system
  • Quantum key transmission control method and system
  • Quantum key transmission control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] see figure 2 , the embodiment of the present invention provides a quantum key transmission control method, wherein the business application terminal at the sending end and the receiving end can use the quantum key to provide secure communication services for user business or data, and the business application terminal at the sending end and the first quantum key The key management terminal is connected, and the service application terminal at the receiving end is connected with the second quantum key management terminal. The method includes the following steps:

[0075] Step 1, the business application terminal at the sending end and the business application terminal at the receiving end negotiate to obtain various parameters of the quantum key, which parameters include: start ID, purpose ID, key usage method, and the number of bytes of the requested key; among them, the start ID and purpose ID are the acquisition identifiers of the quantum key, which are used to ident...

Embodiment 2

[0122] see Figure 12 , an embodiment of the present invention provides a quantum key transmission control system, including a sending end service application terminal and a receiving end service application terminal, a first quantum key management terminal and a second quantum key management terminal, characterized in that:

[0123] The service application terminal at the sending end is used to negotiate with the service application terminal at the receiving end to obtain various parameters of the quantum key, and send a key request to the first quantum key management terminal according to the negotiated parameters and obtain the quantum key. The parameters include : start ID, purpose ID, key usage method, and the number of bytes of the requested key; wherein, the start ID and purpose ID are the quantum key acquisition identifiers, which are used to identify the first quantum key corresponding to the service application terminal at the sending end The second quantum key corre...

Embodiment 3

[0150] see Figure 12a , the embodiment of the present invention provides a quantum key management terminal, which is used in the quantum key transmission control system described in the second embodiment, and provides quantum keys for secure communication between multiple service application terminals. The quantum key Management terminals include:

[0151] The storage module is used to store the quantum keys sent by the quantum key distribution (QKD) system, and send a corresponding number of quantum keys to the first quantum key interaction module according to the key requirements of the corresponding business application terminals;

[0152] The first quantum key interaction module is configured to receive the key request sent by the corresponding service application terminal, and obtain the quantum key from the storage module, so as to realize the output of the quantum key to the service application terminal.

[0153] The quantum key transmission control system includes tw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum key transmission control method. The method comprises steps as follows: a sending-end service application terminal and a receiving-end service application terminal negotiate to acquire various parameters of quantum keys; the sending-end and receiving-end service application terminals send key requests to first and second quantum key management terminals respectively and acquire the quantum keys; the sending-end and receiving-end service application terminals use the quantum keys to perform encryption, decryption and the like on user services or data, so that safe communication services are provided. The invention further provides the corresponding quantum key management terminals, the corresponding service application terminals and a corresponding quantum key transmission control system. With the adoption of the method and the system, the high efficiency and the consistency of application and acquisition of the quantum keys by the service application terminals can be guaranteed, the universality is good, and the method and the system can be applied to communication processes of different service application terminals and quantum key management terminals.

Description

technical field [0001] The present invention relates to the field of quantum security communication, and in particular provides a quantum key transmission control method, system, quantum key management terminal and service application terminal. Background technique [0002] With the rapid development of network technology, a large amount of sensitive information needs to be transmitted through the network, and people need to protect sensitive information from being lost or attacked. Encryption is one of the important means to ensure information security. For classical communication, the most commonly used encryption technology currently uses complex mathematical algorithms to change the original information, such as AES, 3DES, RSA, MD5, SHA-1 and so on. [0003] The existing classical encryption system is based on computational complexity. With the advancement of mathematics and the continuous improvement of computer speed, it may be deciphered, but it is not absolutely rel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0858H04L63/06
Inventor 赵梅生李霞赵波周雷
Owner SHANDONG INST OF QUANTUM SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products