Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A quantum key transmission control method and system

A quantum key and transmission control technology, applied in transmission systems, digital transmission systems, and key distribution, which can solve the problem that one-time pads have not been practically applied.

Active Publication Date: 2017-05-31
SHANDONG INST OF QUANTUM SCI & TECH +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And how to generate a large number of random number keys has always been a problem, so the one-time pad has not been practically applied.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A quantum key transmission control method and system
  • A quantum key transmission control method and system
  • A quantum key transmission control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] See figure 2 , The embodiment of the present invention provides a quantum key transmission control method, wherein the quantum key can be used between the sender and the receiver business application terminal to provide secure communication services for user business or data, and the sender business application terminal and the first quantum key The key management terminal is connected, and the receiving end service application terminal is connected to the second quantum key management terminal. The method includes the following steps:

[0075] Step 1. The service application terminal at the sending end and the service application terminal at the receiving end negotiate to obtain various parameters of the quantum key. The parameters include: start ID, destination ID, key usage mode, and requested key bytes; where, start ID and destination ID are the quantum key acquisition identifiers, which are used to identify the quantum key shared between the first quantum key manageme...

Embodiment 2

[0122] See Picture 12 , The embodiment of the present invention provides a quantum key transmission control system, including a sending end service application terminal and a receiving end service application terminal, a first quantum key management terminal and a second quantum key management terminal, characterized in that:

[0123] The sending end service application terminal is used to negotiate with the receiving end service application terminal to obtain various parameters of the quantum key, and send a key request to the first quantum key management terminal according to the negotiated parameters and obtain the quantum key, the parameters including : Start ID, destination ID, key usage mode, and requested key bytes; where the start ID and destination ID are the identifications for obtaining quantum keys, which are used to identify the first quantum key corresponding to the sending end service application terminal The second quantum key management terminal corresponding to ...

Embodiment 3

[0150] See Figure 12a The embodiment of the present invention provides a quantum key management terminal, which is used in the quantum key transmission control system described in the second embodiment to provide a quantum key for secure communication between multiple service application terminals. The management terminal includes:

[0151] The storage module is used to store the quantum keys sent by the quantum key distribution (QKD) system, and send a corresponding number of quantum keys to the first quantum key interaction module according to the key requirements of the corresponding business application terminal;

[0152] The first quantum key interaction module is configured to receive the key request sent by the corresponding service application terminal, and obtain the quantum key from the storage module, so as to realize the quantum key output to the service application terminal.

[0153] In the quantum key transmission control system, there are two service application termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum key transmission control method. The method comprises steps as follows: a sending-end service application terminal and a receiving-end service application terminal negotiate to acquire various parameters of quantum keys; the sending-end and receiving-end service application terminals send key requests to first and second quantum key management terminals respectively and acquire the quantum keys; the sending-end and receiving-end service application terminals use the quantum keys to perform encryption, decryption and the like on user services or data, so that safe communication services are provided. The invention further provides the corresponding quantum key management terminals, the corresponding service application terminals and a corresponding quantum key transmission control system. With the adoption of the method and the system, the high efficiency and the consistency of application and acquisition of the quantum keys by the service application terminals can be guaranteed, the universality is good, and the method and the system can be applied to communication processes of different service application terminals and quantum key management terminals.

Description

Technical field [0001] The invention relates to the field of quantum security communication, and in particular provides a quantum key transmission control method, system, quantum key management terminal and business application terminal. Background technique [0002] With the rapid development of network technology, a large amount of sensitive information needs to be transmitted over the network, and people need to protect sensitive information from loss or attack. Encryption is one of the important means to ensure information security. For classic communication, the most commonly used encryption technology currently uses complex mathematical algorithms to change the original information, such as AES, 3DES, RSA, MD5, SHA-1, and so on. [0003] The existing classic encryption system is based on computational complexity. With the advancement of mathematics and the continuous increase of computer speed, its existence may be deciphered, and it is not absolutely reliable. In the class...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0858H04L63/06
Inventor 赵梅生李霞赵波周雷
Owner SHANDONG INST OF QUANTUM SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products