A quantum key output method and system
A technology of quantum key and output method, applied in transmission system, digital transmission system, key distribution, can solve the problems of reducing data security, no need for negotiation, hidden danger of data transmission in key negotiation, etc., to avoid security problems , the effect of streamlining hardware configuration and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] Such as figure 2 Shown:
[0053] The key management layer device A and the key management layer device B conduct key negotiation through the quantum network, and if they agree, the application layer device A and the application layer device B receive the agreed quantum key respectively, and then they can use the quantum key The key transmits encrypted business data in the application network.
[0054] For the present invention, as long as the quantum key agreement is realized through the quantum network, the methods for obtaining the agreed quantum key without negotiating between the application layer devices all belong to the content protected by the present invention. The method and steps of key agreement are also the content to be protected by the present invention, and are not limited to the method of key agreement described in the listed embodiments of the present invention, and are not exhaustively listed in the present invention.
Embodiment 2
[0056] Such as image 3 , 4 shown.
[0057] A kind of quantum key output method as described in embodiment 1, described carrying out key agreement through quantum network, comprising:
[0058] a) The application layer device A initiates a key acquisition request to the key management layer device A, including the device identification and key amount of the application layer device B;
[0059] b) The key management layer device A finds the relevant key according to the device identification of the application layer device B and obtains a key of corresponding length according to the key amount, and calculates the key checksum;
[0060] c) The key management layer device A sends a key acquisition request notification to the key management layer device B through the quantum network, including the key identifier, the key amount, and the key checksum;
[0061] d) After the key management layer device B receives the key acquisition request notification sent by the key management l...
Embodiment 3
[0066] Such as image 3 , 5 shown.
[0067] A quantum key output method as described in Embodiment 2, the difference is that the key management layer device B sends a key acquisition request failure response threshold to the key management layer device A in advance;
[0068] If the comparison is inconsistent, the key management layer device B sends a key acquisition request failure response to the key management layer device A;
[0069] When the key management layer device B sends the key acquisition request failure response times to the key management layer device A is less than the threshold, repeat steps b)-e), or repeat steps c)-e); when the key management layer When the number of key acquisition request failure responses sent by device B to key management layer device A is equal to the threshold, key management layer device A returns a key acquisition request failure response to application layer device A.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


