Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A quantum key distribution method, device and system

A quantum key distribution and quantum key technology, applied in the field of quantum information technology and power system information security, can solve the problems of large operation and maintenance workload and high cost of quantum key distribution network

Active Publication Date: 2022-05-27
STATE GRID ANHUI ELECTRIC POWER CO LTD +4
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the large geographical overlap of businesses in different security regions, the cost of independently building quantum key distribution networks in different regions is high, and the workload of operation and maintenance is heavy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A quantum key distribution method, device and system
  • A quantum key distribution method, device and system
  • A quantum key distribution method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] An embodiment of the present invention provides a method for distributing a quantum key, which specifically includes the following steps:

[0063] (1) Send an instruction to each communicatively connected first quantum key management service terminal, and control each first quantum key management service terminal to send the quantum key to the corresponding communicatively connected second quantum key management service terminal, wherein , the same quantum key is stored with the same ID in the first quantum key management service terminal and the second quantum key management service terminal, so that each first quantum key management service terminal or each second quantum key management service terminal In the process of communication, obtain the quantum key of the same ID to encrypt and decrypt the business data;

[0064] (2) Sending a destruction instruction to the first quantum key management service terminal connected to each communication, so that the first quant...

Embodiment 2

[0071] The difference between the embodiment of the present invention and the embodiment 1 is that the method further includes:

[0072] When it is detected that a second quantum key management service terminal uses a certain quantum key to encrypt and decrypt business data, it sends a destruction instruction to the corresponding second quantum key management service terminal to destroy the used quantum key to ensure that the used quantum key is destroyed. One pass at a time.

Embodiment 3

[0074] The embodiment of the present invention provides a method for distributing quantum keys, which is suitable for distribution of quantum keys suitable for cross-safety area business of power systems, and specifically includes the following steps:

[0075] (1) Obtain the quantum key;

[0076] (2) Distribute the obtained quantum key to the first quantum key management service terminal connected by communication, and the same quantum key is stored in each first quantum key management service terminal with the same ID, so that each first quantum key is stored with the same ID. During the process of communication, the key management service terminal obtains the quantum key of the same ID to encrypt and decrypt the business data, so as to realize the encryption of the business data in each area; The quantum key distribution network is communicatively connected, the quantum key is generated by the quantum key distribution network, and distributed by the quantum key distribution ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum key distribution method, device and system, including sending instructions to each first quantum secret key management service terminal connected in communication, and controlling each first quantum secret key management service terminal to send the quantum secret key to the corresponding Among the second quantum secret key management service terminals connected by communication, each first quantum secret key management service terminal and each second quantum secret key management service terminal use the same ID to store the same quantum secret key, so that each first quantum secret key During the communication process, the secret key management service terminal or each second quantum secret key management service terminal obtains the quantum secret key with the same ID to encrypt and decrypt the business data; sends a destruction command to each communication-connected first quantum secret key management The service terminal makes each communication-connected first quantum key management service terminal destroy the distributed quantum key. The invention provides quantum keys for services in different security areas based on a quantum key distribution network, which greatly reduces the cost of network construction and operation and maintenance.

Description

technical field [0001] The invention belongs to the technical field of quantum information and the field of power system information security, and particularly relates to a method, device and system for distributing quantum keys. Background technique [0002] In order to ensure the safe and stable operation of the power system, the State Grid Corporation of China has built a security protection system based on "safety partitions, dedicated networks, horizontal isolation, and vertical certification". Among them, production control business is located in I / II area (high security level area), management information business is located in III / IV area (low security level area), and different security areas are horizontally isolated to ensure high security. Businesses in high-level areas are not affected by services in low-security areas, and attacks from low-security areas are isolated. [0003] At present, different security regions independently build encryption systems for co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0891
Inventor 冯宝于浩王旭东赵高峰李振伟樊强卞宇翔胡倩倩贾玮刘金锁完颜绍澎张影吕超朱雪阳
Owner STATE GRID ANHUI ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products