Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for authenticating identity based on quantum key

A quantum key and identity authentication technology, applied in user identity/authority verification, transmission systems, digital transmission systems, etc., can solve the problems of inability to replicate quantum states, and cannot be accurately measured, to increase the complexity, The effect of strong anti-replay attack and improved security

Active Publication Date: 2016-04-20
ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The quantum uncertainty principle shows that an unknown quantum state cannot be accurately measured, and the quantum non-cloning principle shows that people cannot copy an unknown quantum state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for authenticating identity based on quantum key
  • System and method for authenticating identity based on quantum key
  • System and method for authenticating identity based on quantum key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0036] like figure 1 The present invention shown is composed of a client, an authentication server and a network connecting the two, and the client and the authentication server are connected through respective quantum gateways, and there are two channels between the quantum gateways, that is, the quantum channel and the classical Channels, quantum channels are used to distribute quantum keys, and classical channels are used to transmit classical information other than quantum keys. The client and the authentication server not only have their own quantum gateways, but also have their own quantum key generation control servers, quantum key storage management servers, encryption algorithm libraries, and hash algorithm libraries. The authentication server also has an authentication server and a user information database for storing user informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for authenticating identity based on a quantum key. The system comprises a user side, an authentication server side, a quantum network and a classic network. The method comprises the steps of using a plain text for identity authentication and a quantum key K1 in a traditional technology as a plain text for each authentication after serially combining the plain text with the quantum key K1; firstly, carrying out abstract extraction on the plain text; secondly, encrypting an abstract of the plain text by using an encryption algorithm; finally, transmitting an encrypted ciphertext to the authentication server side. According to the method for authenticating the legal identity of a user by applying the quantum key, provided by the invention, the authentication of the system on the legal identity of the user is realized, and transmission of data needed for authentication in a network is absolutely safe.

Description

technical field [0001] The invention belongs to the field of quantum communication, and in particular relates to a quantum key-based identity authentication system and method. Background technique [0002] As human society enters into informatization, people communicate more and more frequently, people's demand for information is increasing day by day, and the acquisition and release of information has penetrated into everyone's daily life. But at the same time, various incidents of information leakage and illegal access to information continue to occur, which makes information security increasingly the focus of attention. [0003] Communication security is not only the primary concern of both communication parties, but also the most prominent security issue in the information society. Verifying the legal identity of users is the first guarantee to ensure communication security. The existing identity authentication mechanism generally adopts the verification mechanism of u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0852H04L9/3226
Inventor 夏从俊喻斌黄天其蔡晓宇
Owner ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products