Unlock instant, AI-driven research and patent intelligence for your innovation.

Quantum key distribution protection method and system based on business security level

A technology of quantum key distribution and security level, which is applied in the field of optical network quantum key distribution, can solve problems such as high failure risk, achieve the effects of solving survivability, improving security stability, and ensuring security and transmission

Active Publication Date: 2021-08-31
SUZHOU UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Therefore, the technical problem to be solved by the present invention is to overcome the problem of high failure risk in the process of data transmission in the prior art, thereby providing a method to reduce the risk of failure in the process of data transmission and ensure the smooth operation of service requests in the transmission process. Quantum key distribution protection method and system based on business security level for quality of service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key distribution protection method and system based on business security level
  • Quantum key distribution protection method and system based on business security level
  • Quantum key distribution protection method and system based on business security level

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Such as figure 1 As shown, this embodiment provides a quantum key distribution protection method based on the service security level, step S1: set the network topology, and initialize the network parameters in the network topology; step S2: establish a service request, and Generate a service request security level; Step S3: Calculate multiple candidate paths from the source node to the destination node according to the source node and the destination node of the connection request, select the optimal path as the working path, and allocate resources to the working path; Step S4: Set the maximum protection threshold of the quantum key, establish a protection path disjoint with the quantum channel according to the security requirements of the business request and the quantum key sharing degree, and allocate resources to the protection path; Step S5: Complete all The allocation of the corresponding wavelengths of the working path and the protection path and the initializati...

Embodiment 2

[0062] Such as Figure 4 As shown, based on the same inventive concept, this embodiment provides a quantum key distribution protection system based on business security level, and its problem-solving principle is similar to the quantum key distribution protection method based on business security level, repeating I won't repeat them here.

[0063] This embodiment provides a quantum key distribution protection system based on business security level, including:

[0064] A network initialization module 10, configured to set a network topology, and initialize network parameters in the network topology;

[0065] A service request module 20, configured to establish a service request and generate a service request security level;

[0066] The working path module 30 is used to calculate multiple candidate paths from the source node to the destination node according to the source node and the destination node of the connection request, select the optimal path as the working path, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a quantum key distribution protection method and system based on service security levels, comprising: setting a network topology, initializing network parameters in the network topology; establishing a service request, and generating a service request security level; According to the source node and the destination node of the connection request, calculate multiple candidate paths from the source node to the destination node, select the optimal path as the working path, and allocate resources to the working path; set the maximum protection threshold of the quantum key, According to the degree of security requirements of the service request and the degree of quantum key sharing, establish a protection path that is disjoint with the quantum channel, and allocate resources to the protection path; complete the allocation of the corresponding wavelengths of the working path and the protection path and the quantum key resources Initialize and update. The invention reduces the failure risk in the transmission process of the service request and ensures the service quality of the service request in the transmission process.

Description

technical field [0001] The present invention relates to the technical field of optical network quantum key distribution, in particular to a quantum key distribution protection method and system based on service security level. Background technique [0002] With the continuous development of optical networks, optical networks have gradually become larger in capacity, smarter, and more widely used. In military, economic and other fields, the security of optical network transmission data has attracted more and more people's attention, and the loss of optical network transmission data security may affect a large number of users and services. Today, the optical network is the infrastructure for data service transmission. Because of the inherent isolation of optical signals inside the optical fiber medium, the optical fiber transmission network is considered to be a very secure network. However, with the occurrence of more and more attacks on optical fibers, optical networks suff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L12/707H04L45/24
CPCH04L9/0852H04L45/22
Inventor 陈伯文马维克沈纲祥高明义向练陈虹
Owner SUZHOU UNIV