Quantum key distribution method, device and system

A quantum key distribution system technology, applied in the field of devices and systems, quantum key distribution methods, can solve the problems of high cost of quantum key distribution network, heavy operation and maintenance workload, etc., to reduce network construction and operation and maintenance cost effect

Active Publication Date: 2019-11-08
STATE GRID ANHUI ELECTRIC POWER +4
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the large geographical overlap of businesses in different security regions, the cost of independently building quantum key distribution networks in different regions is high, and the workload of operation and maintenance is heavy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key distribution method, device and system
  • Quantum key distribution method, device and system
  • Quantum key distribution method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] A quantum key distribution method is provided in an embodiment of the present invention, which specifically includes the following steps:

[0063] (1) Send instructions to each communication-connected first quantum secret key management service terminal, and control each first quantum secret key management service terminal to send the quantum secret key to the corresponding communication-connected second quantum secret key management service terminal, wherein , the first quantum secret key management service terminal and the second quantum secret key management service terminal use the same ID to store the same quantum secret key, so that each first quantum secret key management service terminal or each second quantum secret key management service terminal In the process of communication, obtain the quantum key of the same ID to encrypt and decrypt business data;

[0064] (2) Send a destruction instruction to each communication-connected first quantum key management ser...

Embodiment 2

[0071] The difference between the embodiment of the present invention and embodiment 1 is that the method further includes:

[0072] After detecting that a second quantum key management service terminal uses a certain quantum key to encrypt and decrypt business data, it sends a destroy command to the corresponding second quantum key management service terminal to destroy the used quantum key, ensuring One time password.

Embodiment 3

[0074] An embodiment of the present invention provides a method for distributing quantum keys, which is suitable for quantum key distribution suitable for cross-safety areas of power systems, and specifically includes the following steps:

[0075] (1) Obtain the quantum secret key;

[0076] (2) Distribute the obtained quantum secret key to the first quantum secret key management service terminal connected by communication, and the same quantum secret key is stored with the same ID in each first quantum secret key management service terminal, so that each first quantum secret key During the communication process, the secret key management service terminal obtains the quantum secret key of the same ID to encrypt and decrypt the business data, so as to realize the business data encryption inside each area; preferably, each first quantum secret key management service terminal passes through The quantum secret key distribution network is connected in communication, and the quantum ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum key distribution method, device and system. The method comprises the following steps: sending an instruction to each first quantum key management service terminal incommunication connection, controlling each first quantum key management service terminal to send the quantum key to a corresponding second quantum key management service terminal in communication connection; adopting the same ID storage for the same quantum key in each first quantum key management service terminal and each second quantum key management service terminal; enabling each first quantum secret key management service terminal or each second quantum secret key management service terminal to obtain quantum secret keys with the same ID to encrypt and decrypt the service data in the communication process; and sending a destroying instruction to each first quantum key management service terminal in communication connection, so that each first quantum key management service terminal in communication connection destroys the distributed quantum key. According to the invention, the quantum key is provided for different safe large-area services based on one quantum key distribution network, and the network construction and operation and maintenance costs are greatly reduced.

Description

technical field [0001] The invention belongs to the field of quantum information technology and the field of power system information security, and in particular relates to a quantum key distribution method, device and system. Background technique [0002] In order to ensure the safe and stable operation of the power system, the State Grid Corporation of China has built a security protection system based on "safe partition, dedicated network, horizontal isolation, and vertical authentication". Among them, the production control business is located in Zone I / II (high security level area), and the management information business is located in III / IV Zone (low security level zone). Different security zones are separated horizontally to ensure high security The business in the high-level area is not affected by the business in the low-security level area, and the attacks from the low-security level area are isolated. [0003] At present, different security regions independently...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0891
Inventor 冯宝于浩王旭东赵高峰李振伟樊强卞宇翔胡倩倩贾玮刘金锁完颜绍澎张影吕超朱雪阳
Owner STATE GRID ANHUI ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products