Anti-quantum computing access control method and system based on disposable asymmetric key pair and movable identity recognition device

An asymmetric key, quantum computing technology, applied in the field of anti-quantum computing access control, can solve the problems of inability to resist quantum computing, disadvantageous identification, ID information leakage, etc., to improve system security, reduce costs, and reduce storage costs. Effect

Pending Publication Date: 2019-12-10
RUBAN QUANTUM TECH CO LTD +1
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If lost, it may cause ID information leakage
If the ID is recorded at multiple access control identification devices, ID tracking can be realized, which is a serious information leakage in some application scenarios;
[0011] 2. Issue a symmetric key to the mobile identification device, because the symmetric key cannot be used for reliable digital signatures, so it is not good for identification;
[0012] 3. Issue an asymmetric key pair to the mobile identification dev

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing access control method and system based on disposable asymmetric key pair and movable identity recognition device
  • Anti-quantum computing access control method and system based on disposable asymmetric key pair and movable identity recognition device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0041] This application discloses an anti-quantum computing access control method based on a one-time asymmetric key pair and a movable identification device. The anti-quantum computing access control method includes:

[0042] As the access control terminal of the movable identification device, the first true random number is generated, and the first sub-message is generated, and the first sub-message includes the first true random number and the access control terminal information; The first sub-message signature is calculated to obtain a first signature, and a first key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-quantum computing access control method and system based on a disposable asymmetric secret key pair and a movable identity recognition device. A secret key card used in the method is independent hardware isolation equipment. The public key, the private key and other related parameters are all stored in the data security area in the key card, so that the possibilityof stealing the key by malicious software or malicious operation is greatly reduced, and the key cannot be acquired and cracked by the quantum computer. Since the transmission of public and private keys and algorithm parameters is not involved in the classical network, the risk that the asymmetric key is cracked is very low.

Description

technical field [0001] The present application relates to the technical field of secure communication, in particular to a quantum computing-resistant access control method and system based on a one-time asymmetric key pair and a movable identification device. Background technique [0002] The rapid development of the Internet has brought great convenience to people's life and work. People can sit at home to send and receive e-mails, make phone calls, conduct online shopping, bank transfers and other activities through the Internet. At the same time, network information security has gradually become a potential huge problem. Generally speaking, network information faces the following security risks: network information is stolen, information is tampered with, attackers fake information, malicious damage, etc. [0003] Among them, identity authentication is one of the means to protect people's network information. Identity authentication is also known as "identity verificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06G07C9/00
CPCH04L9/0869H04L9/0825H04L9/0852H04L9/0894H04L9/3247H04L63/067H04L63/0876H04L63/0853H04L63/062
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products