Unlock instant, AI-driven research and patent intelligence for your innovation.

Quantum key distribution protection method and system based on service security level

A technology of quantum key distribution and security level, which is applied in the field of optical network quantum key distribution, can solve problems such as high failure risk, achieve the effects of solving survivability, improving security stability, and ensuring security and transmission

Active Publication Date: 2020-09-25
SUZHOU UNIV
View PDF11 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Therefore, the technical problem to be solved by the present invention is to overcome the problem of high failure risk in the process of data transmission in the prior art, thereby providing a method to reduce the risk of failure in the process of data transmission and ensure the smooth operation of service requests in the transmission process. Quantum key distribution protection method and system based on business security level for quality of service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key distribution protection method and system based on service security level
  • Quantum key distribution protection method and system based on service security level
  • Quantum key distribution protection method and system based on service security level

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Such as figure 1 As shown, this embodiment provides a quantum key distribution protection method based on the service security level, step S1: set the network topology, and initialize the network parameters in the network topology; step S2: establish a service request, and Generate a service request security level; Step S3: Calculate multiple candidate paths from the source node to the destination node according to the source node and the destination node of the connection request, select the optimal path as the working path, and allocate resources to the working path; Step S4: Set the maximum protection threshold of the quantum key, establish a protection path disjoint with the quantum channel according to the security requirements of the business request and the quantum key sharing degree, and allocate resources to the protection path; Step S5: Complete all The allocation of the corresponding wavelengths of the working path and the protection path and the initializati...

Embodiment 2

[0062] Such as Figure 4 As shown, based on the same inventive concept, this embodiment provides a quantum key distribution protection system based on business security level, and its problem-solving principle is similar to the quantum key distribution protection method based on business security level, repeating I won't repeat them here.

[0063] This embodiment provides a quantum key distribution protection system based on business security level, including:

[0064] A network initialization module 10, configured to set a network topology, and initialize network parameters in the network topology;

[0065] A service request module 20, configured to establish a service request and generate a service request security level;

[0066] The working path module 30 is used to calculate multiple candidate paths from the source node to the destination node according to the source node and the destination node of the connection request, select the optimal path as the working path, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a quantum key distribution protection method and system based on a service security level, and the method comprises the steps: setting a network topological structure, and carrying out the initialization of network parameters in the network topological structure; establishing a service request, and generating a service request security level; according to the source node and the destination node of the connection request, calculating a plurality of candidate paths from the source node to the destination node, selecting an optimal path as a working path, and carrying out resource allocation on the working path; setting a maximum protection threshold of the quantum key, establishing a protection path which is not intersected with the quantum channel according to thesecurity requirement degree of the service request and the quantum key sharing degree, and performing resource allocation on the protection path; and completing allocation of corresponding wavelengthsof the working path and the protection path and initialization and updating of quantum key resources. According to the invention, the fault risk of the service request in the transmission process isreduced, and the service quality of the service request in the transmission process is ensured.

Description

technical field [0001] The present invention relates to the technical field of optical network quantum key distribution, in particular to a quantum key distribution protection method and system based on service security level. Background technique [0002] With the continuous development of optical networks, optical networks have gradually become larger in capacity, smarter, and more widely used. In military, economic and other fields, the security of optical network transmission data has attracted more and more people's attention, and the loss of optical network transmission data security may affect a large number of users and services. Today, the optical network is the infrastructure for data service transmission. Because of the inherent isolation of optical signals inside the optical fiber medium, the optical fiber transmission network is considered to be a very secure network. However, with the occurrence of more and more attacks on optical fibers, optical networks suff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/707H04L45/24
CPCH04L9/0852H04L45/22
Inventor 陈伯文马维克沈纲祥高明义向练陈虹
Owner SUZHOU UNIV