Anti-quantum computing intelligent household quantum cloud storage method and system based on quantum key card

A smart home and quantum computing technology, applied in quantum computers, calculations, computing models, etc., can solve problems such as cracking, stealing information, malicious software or malicious operation theft, so as to prevent the use of secure clouds, improve security, and reduce cracking risk effect

Active Publication Date: 2019-06-28
RUBAN QUANTUM TECH CO LTD
View PDF8 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The home gateway is the central network element of the smart home, and has the ability to access the Internet. It is very likely to be infected with a virus Trojan horse, thereby stealing information; or being attacked and paralyzed, resulting in the paralysis of the entire smart home solution.
[0007] (2) In the prior art, the mobile terminal key is stored in the memory of the mobile terminal, exposed to the threat of viruses and Trojan horses in the mobile terminal, and can be stolen by malicious software or malicious operations
[0008] (3) Since the quantum computer can quickly obtain the corresponding private key through the public key, the existing smart home communication method based on the public-private key is easily cracked by the quantum computer
[0009] (4) In the existing technology, the input and output of digital signatures based on public and private

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing intelligent household quantum cloud storage method and system based on quantum key card
  • Anti-quantum computing intelligent household quantum cloud storage method and system based on quantum key card
  • Anti-quantum computing intelligent household quantum cloud storage method and system based on quantum key card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0093] In this embodiment, smart family members upload files to the security cloud. The uploading of files by smart family members to the security cloud is divided into the following three situations: mobile terminal M uploads files to the security cloud, home gateway S uploads files to the security cloud, and home device C uploads files to the security cloud. files to the secure cloud.

[0094] Case 1: The mobile terminal uploads files to the secure cloud. like figure 1 As shown, the mobile terminal uploads files to the secure cloud through the quantum communication service station.

[0095] Step 1.1.1: The mobile terminal sends the file to the quantum communication service station.

[0096] The mobile terminal M generates a true random number R according to the true random number generator in the matching quantum key fob M (hereinafter referred to as R M , and other similarities omit the Chinese character part as the abbreviation). R M Combining with a specific key ge...

Embodiment 2

[0130] In this embodiment, smart family members download files from the safe cloud, and the smart family members download files from the safe cloud into the following three situations: mobile terminal M downloads files from the safe cloud, home gateway S downloads files from the safe cloud, and home device C Download files from a secure cloud.

[0131] Case 1: The mobile terminal downloads files from the secure cloud.

[0132] Step 2.1.1: The mobile terminal sends a file download request to the security cloud.

[0133] The download file request sent by the mobile terminal to the security cloud is transferred through the quantum communication service station, and the request includes the MID of the mobile terminal.

[0134] Step 2.1.2: The quantum communication service station obtains and transmits files.

[0135] After receiving the request for downloading the file, Security Cloud SS will verify the MID, and if it exists in the legal user list, it will pass the verification....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-quantum computing intelligent household quantum cloud storage method and system based on a quantum key card. Each intelligent household assembly, the quantum communication service station and the security cloud are respectively provided with a quantum key card. A private key, an asymmetric key pool and a public key pointer random number are stored in each quantum key card, a third symmetric key pool is further stored in the mobile terminal, the home gateway and the quantum key card of the security cloud, and all the symmetric key pools are stored in the quantumkey cards of the quantum communication service station at the same time. When the smart home component and the security cloud communicate to access a file, the file signs and verifies the file by using quantum key cards of the two parties and adopting an asymmetric algorithm. When files are forwarded between the intelligent home component and the quantum communication service station and betweenthe quantum communication service station and the security cloud, a key is generated by utilizing a corresponding symmetric key pool, and encrypted communication is carried out by adopting a symmetricalgorithm.

Description

technical field [0001] The invention relates to the technical field of smart home equipment, in particular to a quantum computing-resistant smart home communication method based on a quantum key card. Background technique [0002] With the continuous development of information technology and social economy, people's living standards have been continuously improved, and the pace of life has gradually accelerated. Residents can conveniently and quickly enjoy smart, comfortable, efficient and safe home life through mobile phones and other terminals. . With the gradual increase of home smart devices, people put forward higher requirements for the smart operation of home devices. In general smart home device communication methods, asymmetric key encryption is used to ensure data security. Asymmetric key encryption requires the use of different keys to complete the encryption and decryption operations. One is publicly released, that is, the public key, and the other is public. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L9/32H04L9/08G06N10/00
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products