Quantum encrypted communication method, communication terminal and computer-readable storage medium
A communication terminal and communication method technology, applied in the field of computer-readable storage medium, quantum encryption communication method, and communication terminal, can solve the problems of low efficiency of quantum terminal use and the like
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] This embodiment provides a quantum encryption communication method, such as figure 1 shown. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here. The process includes the following steps:
[0032] Step S10, the first communication terminal sends an identity authentication request to the sub-terminal, and the identity authentication request carries terminal identity information of the first communication terminal.
[0033] In this example, if figure 2 As shown, while the first communication terminal sends an identity authentication request to the sub-terminal, the second communication terminal also sends an identity authentication request to the sub-terminal. Similarly, the identity authentica...
Embodiment 2
[0048] This embodiment provides a quantum encryption communication method, such as Figure 5 shown. This method is the embodiment of the method in Embodiment 1 in the second communication terminal communicating with the first communication terminal, and what has been explained in Embodiment 1 will not be repeated. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here. The process includes the following steps:
[0049] Step S100, the second communication terminal receives the key ID sent by the first communication terminal. In this embodiment, the key ID is obtained after the first communication terminal sends an encryption key request to the sub-terminal.
[0050] In step S200, the second communicati...
Embodiment 3
[0060] In this embodiment, a first communication terminal is provided, and the terminal is used to implement the above-mentioned embodiment 1 and its preferred implementation modes, and what has been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the terminals described in the following embodiments are preferably implemented by software, implementation by hardware, or a combination of software and hardware is also possible and conceivable.
[0061] The first communication terminal provided in this embodiment establishes a communication connection with the second communication terminal, such as Image 6 As shown, the first communication terminal includes: an authentication request module 10 , a key request module 20 , a key ID receiving module 30 , an encryption key acquisition module 40 and a data encryption module 50 .
[0062] Among them, the authentication re...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com