A quantum key distribution method, device and system
A quantum key distribution and quantum key technology, applied in the field of quantum information technology and power system information security, can solve the problems of large operation and maintenance workload and high cost of quantum key distribution network
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0062] An embodiment of the present invention provides a method for distributing a quantum key, which specifically includes the following steps:
[0063] (1) Send an instruction to each communicatively connected first quantum key management service terminal, and control each first quantum key management service terminal to send the quantum key to the corresponding communicatively connected second quantum key management service terminal, wherein , the same quantum key is stored with the same ID in the first quantum key management service terminal and the second quantum key management service terminal, so that each first quantum key management service terminal or each second quantum key management service terminal In the process of communication, obtain the quantum key of the same ID to encrypt and decrypt the business data;
[0064] (2) Sending a destruction instruction to the first quantum key management service terminal connected to each communication, so that the first quant...
Embodiment 2
[0071] The difference between the embodiment of the present invention and the embodiment 1 is that the method further includes:
[0072] When it is detected that a second quantum key management service terminal uses a certain quantum key to encrypt and decrypt business data, it sends a destruction instruction to the corresponding second quantum key management service terminal to destroy the used quantum key to ensure that the used quantum key is destroyed. One pass at a time.
Embodiment 3
[0074] The embodiment of the present invention provides a method for distributing quantum keys, which is suitable for distribution of quantum keys suitable for cross-safety area business of power systems, and specifically includes the following steps:
[0075] (1) Obtain the quantum key;
[0076] (2) Distribute the obtained quantum key to the first quantum key management service terminal connected by communication, and the same quantum key is stored in each first quantum key management service terminal with the same ID, so that each first quantum key is stored with the same ID. During the process of communication, the key management service terminal obtains the quantum key of the same ID to encrypt and decrypt the business data, so as to realize the encryption of the business data in each area; The quantum key distribution network is communicatively connected, the quantum key is generated by the quantum key distribution network, and distributed by the quantum key distribution ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com