Route distribution method based on encryption service and electronic equipment

A distribution method and routing technology, applied in the field of communication, can solve the problems of security risks, key consumption reducing the success rate of encrypted service requests, quantum key injection and consumption imbalance, etc., and achieve the effect of injection and consumption balance

Active Publication Date: 2020-05-12
BEIJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the injection and consumption of quantum keys in the quantum key pool are usually unbalanced. For example, if there are too many keys accumulated in the quantum key pool, it will bring security risks. Request success rate of encrypted business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Route distribution method based on encryption service and electronic equipment
  • Route distribution method based on encryption service and electronic equipment
  • Route distribution method based on encryption service and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0050] In order to achieve the above purpose, the embodiment of the present invention provides a route distribution method based on encrypted services, figure 1 A schematic flow diagram of an encrypted service-based routing assignment method provided by an embodiment of the present invention may include:

[0051] S101: Determine a candidate route corresponding to the encrypted service.

[0052] In one embodiment, the candidate route can be calculated according to the source and sink nodes of the encrypted service, and the candidate route is a route that can be selected by the encrypted service, and the candidate route can include a main route and an alternate route; the main route is the route with the least number of hop...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a route distribution method based on an encryption service and electronic equipment, and relates to the technical field of communication, and the method comprises the steps: determining candidate routes corresponding to the encryption service; determining the number of available keys in a key pool corresponding to each candidate route; selecting a candidate route with the maximum available key number as a target route based on the available key number; and transmitting the encrypted service based on the target route. According to the invention, candidate routes of whichthe available key numbers are from large to small are successively selected as target routes based on the available key numbers; the encryption service is transmitted based on the target route, so that the encryption service can preferentially distribute the encryption service to the target route with a large number of available keys according to the number of the available keys, and quantum keyinjection and consumption in a quantum key pool in the route are more balanced.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for route distribution based on encrypted services and electronic equipment. Background technique [0002] Quantum key distribution (English: quantum key distribution, referred to as QKD), is to use the characteristics of quantum mechanics to ensure communication security. It enables communicating parties to generate and share a random, secure key to encrypt and decrypt messages. [0003] At present, quantum key distribution technology usually directly generates keys through negotiation between source and sink nodes. Specifically, a quantum key pool can be constructed on each pair of quantum transceiver nodes and the quantum communication routes (quantum channel + classical channel) occupied by them. The key space in the key pool can store quantum keys continuously generated between quantum node pairs to ensure the security of key distribution. [0004] However,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/725H04L12/721H04L12/707H04L9/08H04L45/24
CPCH04L45/306H04L45/12H04L45/22H04L9/0852
Inventor 赵永利左颖敏郁小松张杰
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products