Train service data processing method and system based on quantum key

A business data, quantum key technology, applied in digital transmission system, transmission system, key distribution, can solve the problem of security strength and security not being guaranteed

Active Publication Date: 2021-05-28
安徽量安通信息科技有限公司
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing locomotive communication systems usually use international common cryptographic algorithms (such as RSA, AES, SHA series, etc.) and suppor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Train service data processing method and system based on quantum key
  • Train service data processing method and system based on quantum key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] For ease of understanding, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Example. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] Such as figure 1 As shown, according to an embodiment of the present invention, the present invention proposes a quantum key-based train service data processing method, the method comprising:

[0035] Step S101. After the locomotive client receives the service data processing request from the locomotive, it calls the SATA encryption module to start the service data encryption process;

[0036] Step S102....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a train service data processing method and system based on a quantum key, and the method comprises the steps: a locomotive client receives a business data processing request from a locomotive, and then calls an SATA password module to enter a business data encryption starting process; the SATA cryptographic module automatically judges whether effective static session key pairs and application key pairs exist or not, if not, entering an SATA cryptographic module self-checking mode, if yes, encrypting service data and subjecting to signature operation, wherein the encrypted first encrypted data are sent to the locomotive server side from the locomotive client side, and the locomotive server calls the quantum security service platform to decrypt the first encrypted data and returns the decrypted data ciphertext to the locomotive server, and the locomotive server correspondingly processes the business data. According to the invention, data encryption transmission of train operation production data from a train end to a business background is realized, so that comprehensive password protection is provided for locomotive operation control, state acquisition and sensitive data transmission.

Description

technical field [0001] The invention belongs to the field of quantum encryption, and in particular relates to a quantum key-based train service data processing method and system. Background technique [0002] At present, the current situation of network information security is becoming increasingly severe, and security threats are gradually shifting from destroying to stealing data. Relevant national laws and regulations are gradually improving, supervision is more stringent, and data security-related standards and management methods are being formulated. As the core technology and basic support of information security technology, cryptography is also a key technology for protecting data security. The existing cryptographic technology, along with the threat brought by the development of quantum computing, has attracted widespread attention to quantum secure communication technology and applications. Among them, quantum key distribution and quantum random number generator t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0852H04L63/0428H04L9/3247H04L63/06
Inventor 左美向王震
Owner 安徽量安通信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products