Quantum key distribution protection method and system based on business security level
A technology of quantum key distribution and security level, which is applied in the field of optical network quantum key distribution, can solve problems such as high failure risk, achieve the effects of solving survivability, improving security stability, and ensuring security and transmission
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Such as figure 1 As shown, this embodiment provides a quantum key distribution protection method based on the service security level, step S1: set the network topology, and initialize the network parameters in the network topology; step S2: establish a service request, and Generate a service request security level; Step S3: Calculate multiple candidate paths from the source node to the destination node according to the source node and the destination node of the connection request, select the optimal path as the working path, and allocate resources to the working path; Step S4: Set the maximum protection threshold of the quantum key, establish a protection path disjoint with the quantum channel according to the security requirements of the business request and the quantum key sharing degree, and allocate resources to the protection path; Step S5: Complete all The allocation of the corresponding wavelengths of the working path and the protection path and the initializati...
Embodiment 2
[0062] Such as Figure 4 As shown, based on the same inventive concept, this embodiment provides a quantum key distribution protection system based on business security level, and its problem-solving principle is similar to the quantum key distribution protection method based on business security level, repeating I won't repeat them here.
[0063] This embodiment provides a quantum key distribution protection system based on business security level, including:
[0064] A network initialization module 10, configured to set a network topology, and initialize network parameters in the network topology;
[0065] A service request module 20, configured to establish a service request and generate a service request security level;
[0066] The working path module 30 is used to calculate multiple candidate paths from the source node to the destination node according to the source node and the destination node of the connection request, select the optimal path as the working path, an...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


