Mobile terminal secrecy system and method based on quantum true random number

A quantum random number and true random number technology, applied in digital transmission systems, transmission systems, and key distribution, can solve the problem that there is no similar technology application in the field of relay service security, it is difficult to meet the high-speed requirements of mobile communications, and it is impossible to quickly generate true random numbers And other issues

Active Publication Date: 2015-09-16
SHANGHAI JIAODA INTELLECTUAL PORPERTY MANAGEMENT CO LTD
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this technology is an algorithm based on difficult problems, which cannot quickly generate a large number of true random numbers, and is difficult to meet the high-speed requirements of mobile communications.
[0005] The technology of quantum random number generation is disclosed in the prior art, such as A.Stefanov, N.Gisin, O.Guinnard, L.Guinnard, and H.Zbinben, Optical quantum random number Generator, Optical Quantum Random Number Generator, Journal of Modern Optics 47, 595 (2000), and Y.-Q.Nie, H.-F.Zhang, Z.Zhang, J.Wang, X.Ma, J

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal secrecy system and method based on quantum true random number
  • Mobile terminal secrecy system and method based on quantum true random number

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] Such as figure 2 As shown, in this embodiment, the system of the present invention is pre-installed on the mobile terminal, and its security method specifically includes the following steps:

[0023] Step 1, detect whether the random number key information is reserved in the mobile terminal, when not, generate the random number key information by the quantum random number generation module and store it in the mobile terminal key file storage module, when there are enough keys in the mobile terminal For the key file, skip step 1 and go directly to step 2;

[0024] The random number key information consumes the key according to the number of times of encryption and the amount of use each time after the random number is generated, specifically: the number of times of encryption and the number of times of each The usage amount of is stored as key usage information, which determines where the next encryption starts, so that the used key will not be used next time.

[0025...

Embodiment 2

[0038] This embodiment decrypts the above-mentioned encrypted file, which specifically includes the following steps:

[0039] Step a, the user generates a certain capacity of random number key information through the quantum random number generation module and stores it in the key file storage module, if there are enough key files in the mobile terminal, skip step a and directly proceed to step b.

[0040] Step b. The user selects the file to be decrypted from the external file storage module. If the selected file is not of the "*.quantum" type, it prompts that the selected file does not need to be decrypted, and ends the operation. Otherwise, proceed to step b.

[0041] Step c, read the file to be decrypted from the external file storage module in the form of a byte stream and save it in a byte array buffer, and obtain the key file to start reading according to the first N bytes of the byte array position x d (that is, the updated key usage information content), the content ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile terminal secrecy system and method based on a quantum true random number. The system comprises a quantum random number generating module, a key file storage module, an encryption module, a decryption module, a key information storage module and an external file storage module, wherein the quantum random number generating module is connected with the key file storage module and used for transmitting random number key information, the key file storage module is respectively connected with the encryption module and the decryption module and used for transmitting encrypted key information and decrypted key information; the decryption module is connected with the external file storage module and used for transmitting a to-be-decrypted file and a decrypted file; the encryption module is connected with the external file storage module and used for transmitting the to-be-encrypted file and the encrypted file; the encryption module is connected with the key information storage module and used for transmitting key use condition information. The feasibility of guaranteeing the absolute security of the data through the daily application of one-time padding is provided, and the encryption of the data can be easily realized.

Description

technical field [0001] The invention relates to a technology in the field of wireless encrypted communication, in particular to a mobile terminal security system and method based on quantum true random numbers. Background technique [0002] Wireless mobile communication devices face a greater risk of eavesdropping than traditional wired communication methods, but many messages are still sent in clear text. Even if traditional encryption methods are used, which are divided into symmetric encryption algorithms such as DES, AES, RC5, etc. and asymmetric encryption algorithms such as RSA, Elgamal, etc., these can be cracked in theory. Only the one-time pad encryption method can guarantee absolute security, and the one-time pad method has long been used by the military and the government to ensure the security of top secret encrypted files. The reason why this method of ensuring absolute security is not widely used in commercial and civilian use is that the one-time pad requires...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04L9/08H04W12/041
CPCH04L9/0852H04W12/04
Inventor 金贤敏乔璐枫李龙曾伟磊嵇玲林晓锋
Owner SHANGHAI JIAODA INTELLECTUAL PORPERTY MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products