Data sending end, data receiving end, data transmission method and data transmission system
A data transmission method and technology of the receiving end, applied in the fields of data transmission method and system, data sending end, and data receiving end, can solve the problems of low data transmission security, simplify the chain building process, enhance the user experience, and enhance the chain building. effect of speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0045] figure 1 It is a flow chart of the data transmission method provided by the first embodiment of the present invention, consisting offigure 1 It can be seen that the data transmission method provided in this embodiment includes:
[0046] S101: When the data sending end needs to obtain the business encryption key, it sends an encryption key request to the quantum key management terminal; when sending the encryption key request, it simultaneously sends a synchronization request to the data receiving end of the current business; receives the quantum key The quantum key returned by the management terminal is used as the business encryption key;
[0047] In practical applications, the data sender needs to determine whether to obtain the service encryption key. For example, before the establishment of the SA link, when the data sender and the receiver complete the handshake, when using the SA link for data transmission, due to quantum The high updateability of the key, when i...
no. 2 example
[0083] figure 2 It is a schematic structural diagram of the VPN data transmission system provided by the second embodiment of the present invention, which is represented by figure 2 It can be seen that the VPN data transmission system provided in this embodiment includes: a quantum key management terminal 3 ( figure 2 Shown 3a and 3b), data sending end 1 and data receiving end 2, wherein,
[0084] Quantum key management terminal 3 is used to generate quantum key;
[0085] The data sending end 1 is used to send an encryption key request to the quantum key management terminal when it is necessary to obtain a business encryption key; when sending an encryption key request, send a synchronization request to the data receiving end of the current business synchronously; receive the quantum key The quantum key returned by the key management terminal is used as the business encryption key;
[0086]The data receiving end 2 is used to send a decryption key request to the quantum k...
no. 3 example
[0102] Taking VPN as the application object, the present invention will be further explained in combination with specific application scenarios.
[0103] In order to overcome the problems and defects in the prior art that security is increasingly challenged, this embodiment provides a method and system for implementing IPsec using quantum keys. The system for implementing IPsec using quantum keys provided in this embodiment includes: an IPsec VPN gateway 1, an IPsec VPN gateway 2, and two corresponding quantum key management terminals 3a and 3b.
[0104] Such as image 3 As shown, the IPsec VPN gateway includes a configuration management module 31, an ipsec SA management module 32, an ipsec encryption and decryption processing module 33, a handshake management module 34, a quantum key acquisition and processing module 35, and a quantum key cache management module 36, wherein, The configuration management module 31, the ipsec SA management module 32, and the ipsec encryption a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


