Quantum encrypted communication method, communication terminal and computer-readable storage medium

A communication terminal and communication method technology, applied in the field of computer-readable storage medium, quantum encryption communication method, and communication terminal, can solve the problems of low efficiency of quantum terminal use and the like

Active Publication Date: 2018-12-21
SUZHOU KEDA TECH
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the technical problem to be solved by the present invention is to solve the data transmission method in the prior art. Each quantum terminal can only be used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum encrypted communication method, communication terminal and computer-readable storage medium
  • Quantum encrypted communication method, communication terminal and computer-readable storage medium
  • Quantum encrypted communication method, communication terminal and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides a quantum encryption communication method, such as figure 1 shown. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here. The process includes the following steps:

[0032] Step S10, the first communication terminal sends an identity authentication request to the sub-terminal, and the identity authentication request carries terminal identity information of the first communication terminal.

[0033] In this example, if figure 2 As shown, while the first communication terminal sends an identity authentication request to the sub-terminal, the second communication terminal also sends an identity authentication request to the sub-terminal. Similarly, the identity authentica...

Embodiment 2

[0048] This embodiment provides a quantum encryption communication method, such as Figure 5 shown. This method is the embodiment of the method in Embodiment 1 in the second communication terminal communicating with the first communication terminal, and what has been explained in Embodiment 1 will not be repeated. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here. The process includes the following steps:

[0049] Step S100, the second communication terminal receives the key ID sent by the first communication terminal. In this embodiment, the key ID is obtained after the first communication terminal sends an encryption key request to the sub-terminal.

[0050] In step S200, the second communicati...

Embodiment 3

[0060] In this embodiment, a first communication terminal is provided, and the terminal is used to implement the above-mentioned embodiment 1 and its preferred implementation modes, and what has been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the terminals described in the following embodiments are preferably implemented by software, implementation by hardware, or a combination of software and hardware is also possible and conceivable.

[0061] The first communication terminal provided in this embodiment establishes a communication connection with the second communication terminal, such as Image 6 As shown, the first communication terminal includes: an authentication request module 10 , a key request module 20 , a key ID receiving module 30 , an encryption key acquisition module 40 and a data encryption module 50 .

[0062] Among them, the authentication re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum encrypted communication method, a communication terminal and a computer-readable storage medium. The quantum encrypted communication method comprises the following steps: a first communication terminal sends an identity authentication request to the quantum terminal; The first communication terminal receives the authentication notification returned by the quantumterminal and sends an encryption key request to the quantum terminal. The first communication terminal receives the key ID returned by the quantum terminal and sends the key ID to the second communication terminal. When the first communication terminal receives the decryption key acquisition notification returned by the second communication terminal, obtaining an encryption key from the quantum terminal according to the key ID; the first communication terminal encrypts the communication data using the encryption key and transmits the encrypted communication data to the second communication terminal. The invention can solve the problem that each quantum terminal can only be used by one communication terminal or two communication terminals which have established communication connection, andthe use efficiency of the quantum terminal is low.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a quantum encryption communication method, a communication terminal and a computer-readable storage medium. Background technique [0002] With the development of computer technology and the Internet, data transmission between multiple terminals is becoming more and more frequent. In order to ensure the security of transmitted data, people have developed encryption algorithms to transmit data confidentially. Shannon had proved in 1948 that if the password is secure, the content of the communication is strictly secure, but the existing classical protocol cannot ensure the security of the shared password between the two parties in communication. Taking the method of using a secret channel to establish a common password as an example, there is no verifiably secure secret channel in classical communication, because in principle, eavesdroppers can always obtain the inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04B10/70
CPCH04B10/70H04L9/0852H04L9/0855
Inventor 李亚凯王彦杰顾志松
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products