Supercharge Your Innovation With Domain-Expert AI Agents!

Security authentication system based on quantum confidential data

A technology of quantum security and security authentication, which is applied in the field of security authentication systems based on quantum security data, and can solve problems such as threats to data security authentication

Inactive Publication Date: 2021-06-04
安徽华典大数据科技有限公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies of the prior art, the purpose of the present invention is to provide a security authentication system based on quantum secret data, which solves the problem in the prior art that the data security authentication is threatened by the key being cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication system based on quantum confidential data
  • Security authentication system based on quantum confidential data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] In describing the present invention, it is to be understood that the terms "opening", "upper", "lower", "thickness", "top", "middle", "length", "inner", "surrounding" etc. Indicating orientation or positional relationship is only for the convenience of describing the present invention and simplifying the description, and does not indicate or imply that the components or elements referred to must have a specific orientation, be constructed and operated in a sp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication system based on quantum confidential data, which belongs to the technical field of data security and comprises a quantum key management and control server, a data transmitter and a data receiver. The quantum key management and control server comprises a quantum random number generator, the quantum random number generator is used for generating a binary quantum random number as an original quantum random number key seed, and the quantum key management and control server performs XOR on the random number key seed and a system random number key seed generated by real-time system information to generate a quantum key; the data transmitter obtains the quantum key from the quantum key management and control server, and the data transmitter encrypts original data and the quantum key to obtain encrypted quantum data; the data receiver receives the encrypted quantum data and transmits the encrypted quantum data to a quantum key management and control server; the problem that data security authentication is threatened due to the fact that a secret key is cracked in the prior art is solved.

Description

technical field [0001] The invention relates to the technical field of data security, more specifically, to a security authentication system based on quantum secret data. Background technique [0002] As information security issues are getting more and more attention from people, various data encryption devices and software are used in data protection to provide protection for people's data security. These devices have certain advantages in technology. But what they have in common is that they all use a key to encrypt data. Once the key used for encryption is cracked, the data encrypted using the key pool will be cracked. [0003] The keys used by these devices and software come from random numbers, and random numbers are generally generated through certain algorithm simulations or physical phenomena. The random number generated by a certain algorithm simulation is called a pseudo-random number. The key generated by using this random number has a certain regularity. The reg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L12/46H04L29/06
CPCH04L9/0852H04L9/0869H04L63/0435H04L9/0625H04L12/4641
Inventor 汪国航丁晓光田宝同
Owner 安徽华典大数据科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More