Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application system based on quantum keys, and use method of application system

A quantum key and application system technology, applied in the field of data security, can solve problems such as no key cache mechanism, unsolved application system key security, organic combination of quantum key and business, and achieve increased key attribute management, Promote further development and enhance the effect of safety in use

Active Publication Date: 2019-04-19
北京安御道合科技有限公司
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] ①It only reuses the characteristics of the quantum network, realizes the problem of key transmission in a non-secure environment, only solves the problem of network transmission, does not organically combine quantum keys with services, and does not solve the problem of application system encryption. key security issues
For example, the timely update of business system keys and the management of historical key versions have not effectively improved the security of the application system;
[0010] ②Without a key caching mechanism, the high availability of the system cannot be maintained, and the problem of insufficient supply of quantum keys cannot be solved;
[0011] ③The existing solution maintains the key itself, which forms a tight coupling between the business and the quantum network, which affects the rapid expansion of the business system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application system based on quantum keys, and use method of application system
  • Application system based on quantum keys, and use method of application system
  • Application system based on quantum keys, and use method of application system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. However, it should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0046] refer to figure 2 , an application system based on quantum keys, including:

[0047] Institutional key management centers established at various institutions, said institutional key management centers provide unified quantum key services for application security and communication security;

[0048] The National Key Management Center, which communicates with the institutional key mana...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application system based on quantum keys. The system comprises institution key management centers arranged at all institutions and used for providing unified quantum key services for application security and communication security, and a national key management center communicating with the institution key management centers of the institutions and responsible for distributing and sending the quantum keys or quantum key IDs for the institutions; and the two institution key management centers need to simultaneously initiate requests of obtaining the same quantum key to the national key management center. A barrier between an entity quantum network and a virtual application network is broken through, so that the high-security characteristics of the quantum keys arefurther extended to the service field, and further development of information security work is promoted; and by utilizing high security of the quantum network, the difficult problem of key distribution synchronization in the service field is solved, and the problems of the authority, credibility and security of key sources are solved, so that the confidentiality and the tamper-proofing performance of service information transmitted in an untrusted network are further guaranteed.

Description

technical field [0001] The invention relates to the field of data security, in particular to an application system based on a quantum key and a method for using the same. Background technique [0002] Quantum key management technology is the first quantum information technology to be practical. This technology utilizes the characteristics of indivisible single photon and non-replicable quantum state to realize secure key distribution between two parties in communication, combined with "one-time pad" to realize undecipherable unconditional secure encrypted communication. Different from traditional encrypted communication technology, the security of quantum secret communication based on quantum key management technology is guaranteed by the principle of quantum physics. [0003] At present, quantum key management technology has been applied in the financial industry one after another. The relevant cases are as follows: [0004] At the beginning of 2017, the People's Bank of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L9/12
CPCH04L9/083H04L9/0852H04L9/0855H04L9/12H04L63/062
Inventor 张根青叶雷胡瑾王新树谢依夫房毅李伟斌马红霞邱伟霞
Owner 北京安御道合科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products