Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication system based on quantum network

An identity authentication and quantum technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as insufficient security, time stamp replay attacks, and high requirements for system time synchronization, and achieve good security effects

Inactive Publication Date: 2018-09-21
RUBAN QUANTUM TECH CO LTD
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Existing identity authentication technology based on the Kerberos authentication scheme uses time stamps, resulting in the possibility of replay attacks
[0008] (2) The requirements of the Kerberos protocol are based on clock synchronization in the network, which has high requirements for time synchronization of the entire system, and is difficult to achieve in large-scale distributed systems
[0009] (3) In the prior art, the client key is stored in the client memory and can be stolen by malicious software or malicious operations
[0010] (4) In the existing technology, the long-term key of the client is unchanged, and the security is not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system based on quantum network
  • Identity authentication system based on quantum network
  • Identity authentication system based on quantum network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] Embodiment 1, authentication of two client terminals belonging to the same quantum network service station in the local area network

[0078] In the following steps, the encryption, decryption and encryption operations involved in each client side are all performed in the matched quantum key card. The encryption and decryption operations involved in the identity authentication server and ticket permission server are completed in the encryption and decryption server of the quantum network service station.

[0079] Such as figure 2 As shown, when both client A and client B belong to the same quantum network service station, the quantum key card involved in the identity authentication process is registered and issued at the local quantum network service station. For specific steps, see Figure 4 , in the figure, the curly brackets indicate the encrypted part, and the following content indicates the key used, such as {Ainfo+N1}KA means that Ainfo+N1 is encrypted with KA....

Embodiment 2

[0127] Embodiment 2, identity authentication of two client terminals in the wide area network

[0128] Such as image 3 As shown, when client A and client B do not belong to the same quantum network service station, the quantum key cards involved in the identity authentication process are registered and issued by the quantum network service station to which the client belongs. The difference between the system architecture in this embodiment and Embodiment 1 is that it is applied in a wide area network. The first-level switching center is a quantum network core station in a prefecture-level city or a fairly large area, and the second-level switching center is a county-level city or equivalent. The quantum network core station of a large or small area, the quantum network service station is a quantum communication access site of a fairly large area of ​​a township or street office.

[0129] The primary switching center is connected with multiple subordinate secondary switching...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication system based on a quantum network. The system comprises a user side A, a user side B, and a quantum network service station; the user side A appliesTGT and corresponding Ticket to the quantum network service station, and acquired Ticket is used for accessing the user side B; each user side is respectively configured with a quantum key card, a corresponding quantum key is stored between a quantum key card and the quantum network service station; and the configured quantum key card is used for performing identity authentication when the user side A is communicated with the quantum network service station and two user sides are communicated. The time stamp of the prior art is replaced by a quantum real random number, and the possibility of the replay attack is solved. The user side key is stored by using the quantum key card but not the user-side storage unit; the quantum key card is independent hardware equipment, and the possibility ofstealing the key by malicious software or malicious operation is greatly reduced. The key can be frequently changed, and the security is greatly improved.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to an identity authentication system based on a quantum network. Background technique [0002] Identity authentication is the basic technology to achieve information security. The system checks the user's identity to confirm whether the user has access and use rights to certain resources, and can also perform identity authentication between systems. [0003] Currently, the identity authentication system in the communication network generally adopts the Kerberos authentication scheme. Kerberos is a network authentication protocol designed to provide strong authentication services for client / server applications through a key system. The realization of the authentication process does not depend on the authentication of the host operating system, does not require trust based on the host address, does not require the physical security of all hosts on the network, and assum...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L9/0869H04L63/083H04L63/0846H04L63/0853
Inventor 富尧钟一民
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products