Internet behavior auditing system and method based on quantum key encryption technology

A quantum key and quantum encryption technology, applied in the field of online behavior audit system based on quantum key encryption technology, can solve the problem that data cannot be transmitted securely, and achieve the effect of reducing generation cost, saving cost, and facilitating centralized management

Pending Publication Date: 2019-10-29
BEIJING SAFESOFT GREATMAKER CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to solve the above-mentioned problems in the prior art, that is, in order to solve the problem that the data of the existing online behavior terminal cannot be safely transmitted to the public security audit system, the first aspect of the present invention provides a quantum key encryption technology-based A behavior auditing system, the online behavior auditing system includes: a quantum key management device, which is configured to generate and issue a terminal quantum key and a server quantum key; a quantum encryption terminal, which communicates with the quantum key management device , configured to use the terminal quantum key to encrypt the online behavior data after receiving the terminal quantum key and the online behavior data; a quantum encryption server, which communicates with the quantum key management device and the quantum The encrypted terminal communication connection is configured to use the server quantum key to decrypt the encrypted data after receiving the encrypted data sent by the quantum encrypted terminal and the server quantum key issued by the quantum key management device; The online behavior terminal, which is connected to the quantum encryption terminal, is configured to be able to send the online behavior data to the quantum encryption terminal; the online behavior audit server, which is connected to the quantum encryption server, is configured to receive the data. The decrypted data sent by the quantum encryption server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet behavior auditing system and method based on quantum key encryption technology
  • Internet behavior auditing system and method based on quantum key encryption technology
  • Internet behavior auditing system and method based on quantum key encryption technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107] The preferred implementation of the present invention will be described below in conjunction with the public security audit system. Those skilled in the art should understand that these embodiments are only used to explain the technical principle of the present invention, and are not intended to limit the protection scope of the present invention. The technical solution of the present invention can obviously also be applied to other online behavior auditing systems.

[0108] In addition, in order to better illustrate the present invention, numerous specific details are given in the specific embodiments below. It will be understood by those skilled in the art that the present invention may be practiced without certain of the specific details. It should also be noted that although the various steps are described in order in the present application, those skilled in the art should understand that this order is not limiting, and those skilled in the art can make adjustments...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of quantum encryption, aims to solve the problem that data of an existing internet behavior terminal cannot be safely transmitted to a public security auditing system, and provides an internet behavior auditing system and method based on a quantum key encryption technology. The internet behavior auditing system comprises quantum key management equipmentwhich is used for generating and issuing a quantum key; a quantum encryption terminal which is in communication connection with the quantum key management equipment so as to encrypt the internet behavior data; a quantum encryption server which is in communication connection with the quantum key management equipment and the quantum encryption terminal and is used for decrypting the encrypted data;an internet behavior terminal which is in communication connection with the quantum encryption terminal so as to send internet behavior data to the quantum encryption terminal; and an internet behavior auditing server which is in communication connection with the quantum encryption server so as to receive decryption data sent by the quantum encryption server. According to the system provided by the invention, the security of data transmission can be greatly improved, the monitoring management of an internet behavior auditing end is facilitated, the laying of channels is reduced, and the datamonitoring range is expanded.

Description

technical field [0001] The invention relates to the field of quantum encryption technology, in particular to a system and method for auditing online behavior based on quantum key encryption technology. Background technique [0002] In order to strengthen network supervision, in accordance with the provisions of the National Network Security Law, non-commercial Internet service places such as hotels and hotels must be equipped with Internet behavior management equipment, real-name authentication must be adopted for Internet users in the places, and users' Internet information data must be obtained from The location side transmits back to the public security server through the Internet, and data theft is prone to occur during the data transmission process. Therefore, how to ensure the security of data transmission becomes very important. [0003] The existing method for ensuring the security of data transmission is to encrypt the transmitted data, and the encrypted data is tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0855H04L9/0852H04L9/083H04L63/0435H04L63/062H04L63/067H04L63/08
Inventor 杨超
Owner BEIJING SAFESOFT GREATMAKER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products