Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication method and system based on quantum Ukey

A communication method and quantum technology, applied in the field of communication, can solve the problems of insecure authentication and encryption algorithms, insufficient strength of user passwords, and difficulties in key distribution and management, so as to achieve rich applications and development, wide protection range, and enhanced security. sexual effect

Active Publication Date: 2018-03-06
QUANTUMCTEK GUANGDONG CO LTD
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The quantum UKey-based communication method and system provided by the embodiments of the present invention solve the problems of current identity authentication and secure access to cloud service applications, such as insecure authentication and encryption algorithms, insufficient user password strength, user password plaintext input, The potential security problems caused by key distribution and management difficulties and the inability to automatically update keys have realized the organic combination of quantum keys and traditional authentication and encryption mechanisms, giving full play to the advantages of quantum keys in secure communication, effectively Enhanced the security of traditional authentication and encryption mechanisms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method and system based on quantum Ukey
  • Communication method and system based on quantum Ukey
  • Communication method and system based on quantum Ukey

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] See figure 1 , The first embodiment of the present invention provides a schematic flow chart of a quantum UKey-based communication method, the method specifically includes the following steps:

[0046] 101. When an instruction to access the application service is obtained, the user terminal determines a first quantum key through the quantum UKey that has established the connection relationship, and sends a corresponding authentication message to the authentication management platform for identity authentication, the authentication report The text includes user information in plain text and identity information encrypted using the first quantum key, and the identity information includes user information in the plain text and a time stamp;

[0047] In this embodiment, in order to improve the security of the user when accessing the application server, first, when the instruction to access the application service is obtained, the user terminal determines a first quantum key throu...

Embodiment 2

[0063] See figure 2 , The second embodiment of the present invention provides a schematic flow chart of a quantum UKey-based communication method, which specifically includes the following steps:

[0064] 201. When an instruction to access an application service is obtained, the user terminal determines a first quantum key through the quantum UKey that has established a connection relationship, and sends a corresponding authentication message to the authentication management platform for identity authentication, the authentication report The text includes user information in plain text and identity information encrypted using the first quantum key, and the identity information includes user information in the plain text and a time stamp;

[0065] 202. The authentication management platform obtains a second quantum key from KMS according to the user information in the plain text in the authentication message, and uses the second quantum key to decrypt the encrypted identity informat...

Embodiment 3

[0081] See image 3 , The third embodiment of the present invention provides a schematic flow diagram of a quantum UKey-based communication method, which specifically includes the following steps:

[0082] 301. When an instruction to access an application service is obtained, the user terminal determines a first quantum key through the quantum UKey that has established a connection relationship, and sends a corresponding authentication message to the authentication management platform for identity authentication, the authentication report The text includes user information in plain text and identity information encrypted using the first quantum key, and the identity information includes user information in the plain text and a time stamp;

[0083] 302. The authentication management platform obtains a second quantum key from KMS according to the user information in the plain text in the authentication message, and uses the second quantum key to decrypt the encrypted identity informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication method and system based on the quantum Ukey, aiming to solve the potential safety hazards that the algorithm is not safe, the user password strength is not highenough, the user password plaintext input, secret key distribution and management are difficult, and the secret key cannot be automatically updated in the aspects of current identity authentication and security access cloud service application. The communication method based on the quantum Ukey comprises the following steps that when an access application service instruction is acquired, a user terminal determines a first quantum key by the quantum Ukey established the connection relation, and sending the corresponding authentication message to an authentication management platform for identity authentication; the authentication management platform obtains a second quantum key from the KMS according to the authentication message, and decrypting the encrypted information in the authentication message, if the decrypted information is consistent with the plaintext information in the authentication message, the identity authentication is determined to pass, and the passing information isreturned to the user terminal, so that the user terminal accesses the application server through the first quantum key.

Description

Technical field [0001] The present invention relates to the field of communication technology, in particular to a communication method and system based on quantum UKey. Background technique [0002] Quantum communication technology is a new technology developed in recent decades. It is the product of the combination of quantum theory and information theory. It is currently the only secure communication technology whose security has been strictly proven, and can realize the secure distribution of keys. In the application field, a quantum gateway is generally used to generate a symmetric quantum key at two users through a quantum channel and used to encrypt the communication data at both ends to ensure the security of data communication. However, due to the large volume of existing quantum gateway products, it is not suitable for certain special occasions, such as mobile office. Quantum cryptography is different from traditional cryptographic systems in that it relies on physics a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/08
Inventor 陈庆林加毅丁松燕潘羡忠
Owner QUANTUMCTEK GUANGDONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products