Handheld device encryption method and system based on quantum cryptography
A hand-held device and quantum cryptography technology, applied in key distribution, can solve problems such as attacks that cannot resist super computing power
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] see figure 1 , figure 2 , image 3 and Figure 4 , this hand-held device encryption method based on quantum cryptography comprises the following steps:
[0048] Quantum key storage: when the handheld device communicates, the handheld device that initiates the call is the calling terminal, and the called handheld device is the called terminal; the quantum key is stored in the handheld device through the key storage module;
[0049] The calling terminal initiates a call: the calling terminal initiates an encrypted communication request to the called terminal;
[0050] Called terminal key synchronization: After the called terminal confirms to accept the communication, the called terminal first sends a key synchronization request message to KMC through a short message; the key synchronization request message contains the phone number of the called terminal and the phone number of the calling terminal Phone number; KMC randomly generates a group of keys as the communica...
Embodiment 2
[0068] see figure 2 and Figure 4 , the handheld device encryption system based on quantum cryptography, including a handheld device and a quantum key management center; a wireless connection between the handheld device and the quantum key management center; the handheld device includes a radio frequency module, MCU, Beidou or GPS module, plus Decryption module, key module, microphone, touch screen and speaker; radio frequency module, Beidou or GPS module, encryption and decryption module, key module, microphone, touch screen and speaker are electrically connected to MCU; Realize the air interface function; the microphone is used for voice collection; the speaker is used for voice playback; the Beidou or GPS module is used to realize the functions of satellite positioning and timing; the encryption and decryption module: used to realize the data encryption and decryption process; the key module is used for quantum storage and distribution of keys;
[0069] The calling termi...
Embodiment 3
[0072] see Figure 5 , the encryption method for handheld devices based on quantum cryptography is characterized in that: there are n+1 quantum key distribution terminals QKD, including QKD0, QKD1, QKD2 to QKDn; there are n handheld device terminals TD, including TD1, TD2 to TDn TD and QKD correspond one-to-one, TD1 is connected with QKD1 through the key channel, TD2 is connected with QKD2 through the key channel, until TDn is connected with QKDn through the key channel; QKD0 distributes the quantum key through the quantum key distribution channel QL, and Generate the same point-to-point key pair between any two QKDx (x>=1) and QKDy (n>=y>x) points in QKD1 to QKDn; correspondingly, the handheld device terminal TDx passes through the key channel KLx Obtain the key from QKDx and store it in the storage space of the handheld device TDx; the terminal TDy of the handheld device obtains the key from QKDy through the key channel KLy and store it in the storage space of the handheld d...
PUM

Abstract
Description
Claims
Application Information

- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com