Mobile phone token identity authentication system and method based on quantum cipher network

A technology of quantum cryptography and identity authentication, applied in the field of mobile phone token identity authentication system

Active Publication Date: 2017-05-24
QUANTUMCTEK SHANGHAI CO LTD
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The purpose of the present invention is to overcome the deficiencies of the prior art, to provide a mobile phone token identity authentication system and method based on quantum cryptography network, aiming at overcoming the defects of the existing mobile phone token to realize the dynamic passw

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone token identity authentication system and method based on quantum cipher network
  • Mobile phone token identity authentication system and method based on quantum cipher network
  • Mobile phone token identity authentication system and method based on quantum cipher network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0092] This embodiment constructs a specific mobile phone token identity authentication system based on the quantum cryptography network, and provides a specific protocol of the system implementation process.

[0093] System structure such as figure 1 As shown, it includes a quantum authentication center, a quantum cryptography network terminal, a mobile terminal, an application terminal, an application server and a mobile memory. There can be one or more application servers. Quantum key encrypted communication is used between the quantum cryptography network terminal and the quantum authentication center. The quantum authentication center, the application server, and the application terminal use the classical network communication method to communicate.

[0094] The functions of each component of the system are briefly described as follows:

[0095] The Quantum Authentication Center provides identity authentication services for mobile terminals and application servers, and...

specific example

[0106] 1. The registration process of the mobile terminal and the application server in the Quantum Certification Center (hereinafter referred to as QCA).

[0107] image 3 is the flow chart of mobile terminal registration in QCA through quantum cryptography network terminal, from image 3 You can clearly understand each step of mobile terminal registration in QCA. The mobile terminal realizes the registration in QCA through the quantum cryptography network terminal. During the registration process, the communication information between the quantum cryptography network terminal and QCA is encrypted and transmitted using the quantum key to ensure the security of the registration information. Preferably, in order to ensure the unconditional security of the registration information, a quantum key is used for one-time pad encryption. During the registration process, the mobile terminal user (hereinafter referred to as the user) first sets the user name (ID) to be registered, and...

Embodiment 2

[0142] This embodiment specifically describes the generation of the dynamic password of the mobile terminal and the method for verifying the dynamic password of the user by the quantum authentication center.

[0143] The dynamic password generation process is as follows: Figure 8 As shown, it is divided into the following steps:

[0144] Step 1: Divide the number of the unit quantum key.

[0145] The quantum key downloaded by the mobile terminal is logically divided into unit quantum keys according to the data length required for each dynamic password generation, and the unit quantum keys are numbered sequentially; the quantum authentication center adopts the same division and numbering method , and divide and number it with the corresponding shared quantum key between mobile terminals. The corresponding unit quantum keys between the mobile terminal and the quantum authentication center have the same number.

[0146] In this embodiment, the selected key-related hash operat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile phone token identity authentication system based on a quantum cipher network. A mobile terminal and an application server register a quantum authentication center through a quantum cipher network terminal, an ID, an IMEI code or a domain name is provided in registration, and PIN codes are set. The mobile terminal and the application server download a quantum key at the quantum cipher network terminal, and the database of the quantum authentication center stores downloaded quantum key data. A mobile terminal user provides an ID of the mobile terminal user when the application server registers. When the application server needs the identity authentication of the mobile terminal user, the mobile terminal calculates a dynamic password by using the download quantum key, the application server transfers the dynamic password to the quantum authentication center, and the quantum authentication center notifies the mobile terminal user of a verification result through the application server. The invention also provides an authentication method. The system and the method have the advantages of unconditional safety, high synchronization between key use of the mobile terminal and the quantum authentication center, and the improvement of the convenience of user use.

Description

technical field [0001] The invention belongs to the field of network security communication, and in particular relates to a mobile phone token identity authentication system and method based on a quantum cryptography network. Background technique [0002] Quantum communication is a new interdisciplinary subject developed in the past two decades, and a new research field combining quantum theory and information theory. Recently, this subject has gradually moved from theory to experiment, and to practical development. Efficient and secure information transmission has attracted increasing attention. [0003] Physically, quantum communication can be understood as high-performance communication realized by using quantum effects under the physical limit. In informatics, we believe that quantum communication is the use of the basic principles of quantum mechanics (such as the principle of non-cloning of quantum states and the measurement collapse properties of quantum states, etc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04M1/725H04L29/06
Inventor 赵波原磊武宏宇赵梅生
Owner QUANTUMCTEK SHANGHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products