Unlock instant, AI-driven research and patent intelligence for your innovation.

Data sending end, data receiving end, data transmission method and data transmission system

A data transmission method and technology of the receiving end, applied in the fields of data transmission method and system, data sending end, and data receiving end, can solve the problems of low data transmission security, simplify the chain building process, enhance the user experience, and enhance the chain building. effect of speed

Inactive Publication Date: 2018-05-25
ZTE CORP
View PDF8 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a data sending end, a data receiving end, a data transmission method and a system to solve the problem of low security of existing user data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sending end, data receiving end, data transmission method and data transmission system
  • Data sending end, data receiving end, data transmission method and data transmission system
  • Data sending end, data receiving end, data transmission method and data transmission system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0045] figure 1 It is a flow chart of the data transmission method provided by the first embodiment of the present invention, consisting offigure 1 It can be seen that the data transmission method provided in this embodiment includes:

[0046] S101: When the data sending end needs to obtain the business encryption key, it sends an encryption key request to the quantum key management terminal; when sending the encryption key request, it simultaneously sends a synchronization request to the data receiving end of the current business; receives the quantum key The quantum key returned by the management terminal is used as the business encryption key;

[0047] In practical applications, the data sender needs to determine whether to obtain the service encryption key. For example, before the establishment of the SA link, when the data sender and the receiver complete the handshake, when using the SA link for data transmission, due to quantum The high updateability of the key, when i...

no. 2 example

[0083] figure 2 It is a schematic structural diagram of the VPN data transmission system provided by the second embodiment of the present invention, which is represented by figure 2 It can be seen that the VPN data transmission system provided in this embodiment includes: a quantum key management terminal 3 ( figure 2 Shown 3a and 3b), data sending end 1 and data receiving end 2, wherein,

[0084] Quantum key management terminal 3 is used to generate quantum key;

[0085] The data sending end 1 is used to send an encryption key request to the quantum key management terminal when it is necessary to obtain a business encryption key; when sending an encryption key request, send a synchronization request to the data receiving end of the current business synchronously; receive the quantum key The quantum key returned by the key management terminal is used as the business encryption key;

[0086]The data receiving end 2 is used to send a decryption key request to the quantum k...

no. 3 example

[0102] Taking VPN as the application object, the present invention will be further explained in combination with specific application scenarios.

[0103] In order to overcome the problems and defects in the prior art that security is increasingly challenged, this embodiment provides a method and system for implementing IPsec using quantum keys. The system for implementing IPsec using quantum keys provided in this embodiment includes: an IPsec VPN gateway 1, an IPsec VPN gateway 2, and two corresponding quantum key management terminals 3a and 3b.

[0104] Such as image 3 As shown, the IPsec VPN gateway includes a configuration management module 31, an ipsec SA management module 32, an ipsec encryption and decryption processing module 33, a handshake management module 34, a quantum key acquisition and processing module 35, and a quantum key cache management module 36, wherein, The configuration management module 31, the ipsec SA management module 32, and the ipsec encryption a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data sending end, a data receiving end, a data transmission method and a data transmission system. The method comprises the steps that: the data sending endsends an encryption key request to a quantum key management terminal, receives a quantum key returned by the quantum key management terminal as a service encryption key, sends a synchronization request to the data receiving end, receives the hash value of a service decryption key returned by the data receiving end, calculates the hash value of the service encryption key, compares the hash value ofthe service decryption key with the hash value of the service encryption key, and performs encryption sending of a service message by using the service encryption key after comparison is passed; and,while receiving the synchronization request, the data receiving end sends a decryption key request to the quantum key management terminal, receives a quantum key returned by the quantum key management terminal as the service decryption key, calculates the hash value of the service decryption key, returns the hash value of the service decryption key to the data sending end, and decrypts the received service message by using the service decryption key. According to the data sending end, the data receiving end, the data transmission method and the data transmission system provided by the invention, the quantum key is introduced and used as the service key; and thus, the security of data transmission in a service is greatly improved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a data sending end, a data receiving end, a data transmission method and a system. Background technique [0002] When some communication networks transmit business messages, it is necessary to encrypt and decrypt the messages to ensure the security of the messages, such as VPN (Virtual Private Network, virtual private network), which is a public communication infrastructure A network that is logically isolated on the network is equivalent to establishing a virtual private line in a wide area network. VPN encryption technology is implemented by IP Security Protocol (IPSec). Internet Key Exchange (IKE) protocol is the most important part of IPSec. In a public network, before using IPSec to protect an IP data packet, a secure channel must be established first. , that is, Security Association (SA). The existing IKE protocol uses the Diffie-Hellman key exchange algorithm to directl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/0428H04L63/06
Inventor 陈丽英
Owner ZTE CORP