Anti-quantum computing smart home cloud storage method and system based on key card

A smart home, quantum computing technology, applied in transmission systems, digital transmission systems, public keys for secure communications, etc., can solve problems such as malware or malicious operation theft, paralysis of smart home solutions, and the danger of cloud servers. The effect of reducing risk, reducing the risk of malware or malicious action stealing

Active Publication Date: 2019-03-19
RUBAN QUANTUM TECH CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The home gateway is the central network element of the smart home, and has the ability to access the Internet. It is very likely to be infected with a virus Trojan horse, thereby stealing information; or being attacked and paralyzed, resulting in the paralysis of the entire smart home solution.
[0007] (2) In the prior art, the mobile terminal key is stored in the memory of the mobile terminal, exposed to the threat of viruses and Trojan horses in the mobile terminal, and can be stolen by malicious software or malicious operations
[0008] (3) Key storage on the cloud server is dangerous
Public cloud customers have worries about data migration to the cloud
[0009] (4) Since the quantum computer can quickly obtain the corresponding private key through the public key, the existing smart home cloud storage method based on the public-private key is easily cracked by the quantum computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing smart home cloud storage method and system based on key card
  • Anti-quantum computing smart home cloud storage method and system based on key card
  • Anti-quantum computing smart home cloud storage method and system based on key card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] In this embodiment, the smart home component uploads files to the security cloud, and the uploading of files to the security cloud by the smart home component is divided into the following four situations, the mobile terminal M uploads the file to the security cloud, the home gateway S uploads the file to the security cloud, and the high-performance home device CH uploads files to the secure cloud and low-performance home device CL uploads files to the secure cloud.

[0066] Case 1: The mobile terminal uploads files to the secure cloud.

[0067] Step 1.1.1: The mobile terminal encrypts files.

[0068] Mobile terminal M generates file encryption random number rf according to the true random number generator in the matching key card, uses rf to encrypt the file to be uploaded and uses its own public key to encrypt rf.

[0069] Step 1.1.2: The mobile terminal shares files with other smart home components.

[0070] Step 1.1.2.1: If it needs to be shared with some other mo...

Embodiment 2

[0104] In this embodiment, the smart home component downloads files from the security cloud, and the smart home component downloads files from the security cloud into the following four situations. The mobile terminal M downloads files from the security cloud, and the home gateway S downloads files from the security cloud. , the high-performance home device CH downloads files from the secure cloud and the low-performance home device CL downloads files from the secure cloud.

[0105] Case 1: The mobile terminal downloads files from the secure cloud.

[0106] After the mobile terminal M obtains the rf encrypted with M's public key and the encrypted file from the security cloud SS, it decrypts the rf with its own private key and decrypts the file with the rf.

[0107] Case 2: The home gateway downloads files from the secure cloud.

[0108] After the home gateway S obtains the rf encrypted with S's public key and the encrypted file from the security cloud SS, it decrypts the rf w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-quantum computing smart home cloud storage method and system based on a key card. The smart home system comprises smart home components and security cloud. Each smarthome component is provided with a key card. An anti-quantum computing public key is combined with an asymmetric key pool in a key card to extract the public key of each smart home component. A real random number encrypted file in the own key card and a true random number are encrypted and uploaded to the security cloud. Each smart home component is equipped with a key card in order to ensure the security in key storage and use of all components. At the same time, only files encrypted by quantum random numbers and encrypted keys are stored in the security cloud, thereby solving the problem thata user worries about the data cloud. Each smart home component extracts the public keys of required smart home components by combining an anti-quantum computing public key with the asymmetric key pool, thereby effectively lowering the risk that a quantum computer acquires a corresponding public key rapidly through a public key.

Description

technical field [0001] The invention relates to the technical field of smart home equipment, in particular to a quantum computing-resistant smart home cloud storage method and system based on a key card. Background technique [0002] With the continuous development of information technology and social economy, people's living standards have been continuously improved, and the pace of life has gradually accelerated. Residents can conveniently and quickly enjoy smart, comfortable, efficient and safe home life through mobile phones and other terminals. . With the gradual increase of home smart devices, people put forward higher requirements for the smart operation of home devices. In general smart home device communication methods, asymmetric key encryption is used to ensure data security. Asymmetric key encryption requires the use of different keys to complete encryption and decryption operations. One is publicly released, that is, the public key, and the other is public. Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L29/06
CPCH04L9/0852H04L9/0863H04L9/0869H04L9/30H04L9/3234H04L9/3247H04L63/0428H04L63/083
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products