Two-Dimensional Code Authentication System Based on Quantum Encryption

A quantum encryption and authentication system technology, applied in the field of two-dimensional code authentication system, can solve problems such as hidden safety hazards, cumbersome operation, and inconvenient management

Active Publication Date: 2020-11-17
ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. In the prior art, in the process of using dynamic tokens for identity authentication, application terminal users need to manually input dynamic tokens, which is too cumbersome to operate and has potential safety hazards
[0011] 2. In the prior art, only the user equipment of the quantum communication network is authenticated, and the user of the user equipment of the quantum communication network is not authenticated
[0012] 3. In the existing technology, the account authentication center of each application server is independent, and the application terminal needs to maintain multiple sets of accounts and their corresponding passwords, which is inconvenient to manage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-Dimensional Code Authentication System Based on Quantum Encryption
  • Two-Dimensional Code Authentication System Based on Quantum Encryption
  • Two-Dimensional Code Authentication System Based on Quantum Encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] QR code authentication process QRA_FLOW

[0076] The parties directly involved in QRA_FLOW are the mobile terminal MT, the application terminal AT (the current quantum key card is ATK, and its identification number is ATKID), the application server AS (the current quantum key card is ASK, and its identification number is ASKID), The authentication service module QAT of the quantum communication service station corresponding to the ATK current key (its identification number is QATID), and the authentication service module QAS of the quantum communication service station corresponding to the ASK current key (its identification number is QASID).

[0077] AT users hold MT. MT has its unique identification information MTINFO, MTINFO includes but not limited to MT's IMEI code, mobile communication number and network card MAC address, etc.; in the case of MT_IS_QT, MT has a quantum key card (let the quantum key card be MTK, Its identification number is MTKID), the authenticat...

Embodiment 2

[0160] QR code authentication simplified process QRA_SFLOW

[0161] The special case of QRA_FLOW is that when the quantum communication service station corresponding to the quantum key card used by the application server and the application terminal is the same, that is, when there is only QAS and no QAT and QMT, the process is appropriately simplified. Its specific process is similar to the QRA_FLOW of Embodiment 1, only a few steps of communication between QAS, QMT and QAT are omitted.

[0162] See image 3 , QRA_SFLOW is as follows:

[0163] 4.1 AT sends user access request to AS

[0164] 4.2 AS processes user access requests

[0165] 4.3 AS sends the QR code authentication information and the contact information of the QR code generator to AT

[0166] 4.4 AT generates the QR code response value and displays the QR code picture

[0167] 4.4.1 AT generates QR code response value

[0168] 4.4.2 AT generates QR code pictures

[0169] 4.4.3 AT displays the QR code pictur...

Embodiment 3

[0191] Simplified operation of QR code authentication process SQRA_FLOW

[0192] For the aforementioned QRA_FLOW and QRA_SFLOW, the first step needs to input the UID to the AT. If the input of the UID is complicated, the operation will be inconvenient. To further facilitate user operation, the following flow SQRA_FLOW that does not require AT users to input UID can be used.

[0193] The parties directly involved in SQRA_FLOW are the same as QRA_FLOW.

[0194] AT users hold MT to register with AS. AS records MTINFO to the account database of AS. AS can also store the user's biological characteristics corresponding to MTINFO to the account database, such as fingerprint characteristics, iris characteristics, face characteristics, vein characteristics, palmprint characteristics, etc.

[0195] See Figure 4 , SQRA_FLOW is as follows:

[0196] 5.1 AT sends user access request to AS

[0197] The types of access requests include: displaying AT-related business interfaces; perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-dimensional code authentication system based on quantum encryption, comprising an application server, an application terminal, a mobile terminal and a quantum communication service station, wherein the application server and the application terminal are separately provided with quantum key cards, and corresponding quantum keys are stored between each quantum key cardand the quantum communication service station to perform encryption communication or two-dimensional code authentication; during two-dimensional code authentication, the application terminal obtainstwo-dimensional code authentication information from the application server through application, and the application terminal calculates application terminal two-dimensional code response values by using the stored quantum keys in the configured quantum key cards, and outputs corresponding two-dimensional codes; and the mobile terminal acquires the two-dimensional codes from the application terminal, extracts the application terminal two-dimensional code response values, and sends the response values to the quantum communication service station for authentication through the application server. According to the scheme of the invention, user equipment and users of a quantum communication network are authenticated by using the mobile terminal, and thus the security of the system can be greatly improved.

Description

technical field [0001] The invention relates to the field of network security communication, in particular to a two-dimensional code authentication system based on a quantum communication network. Background technique [0002] During identity authentication, static passwords are easy to be stolen by malware, or cracked violently because they are fixed. In order to solve the security problem of static passwords, dynamic token technology has become popular. [0003] Dynamic tokens replace traditional static passwords with one-time passwords generated based on three variables: time, event, and key. Each dynamic token card has a unique key, which is stored on the server side at the same time. Each time the dynamic token card and the server are authenticated according to the same key, the same random parameters (time, event) and The same algorithm calculates the dynamic token to be authenticated, so as to ensure the consistency of the password bilaterally and realize the identi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/0807H04L63/083H04L63/0861H04L63/0876
Inventor 富尧钟一民
Owner ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products