Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum encryption communication system based on power distribution terminal equipment, and use method thereof

A power distribution terminal and quantum encryption technology, applied in key distribution, can solve problems such as increasing additional use costs, information theft, and difficulty in measuring security performance, and achieve the effects of increasing the difficulty of cracking, improving security, and increasing the frequency of supplementation

Active Publication Date: 2021-12-31
STATE GRID ZHEJIANG ELECTRIC POWER CO LTD JINHUA POWER SUPPLY CO +4
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the application process, it was found that a large number of attacks in the prior art do not directly attack the encrypted channel, but start from the interface of the encrypted gateway and the loopholes left in the gateway hardware device, and directly steal from the receiving end, eventually leading to Information protected during encryption is still stolen
In the existing technology, there is also a technical solution for secondary encryption of the transmitted information, but this requires an additional data encryption system. For the security system, the addition of a data encryption system not only increases the additional cost of use, but also Actual safety performance is also difficult to measure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum encryption communication system based on power distribution terminal equipment, and use method thereof
  • Quantum encryption communication system based on power distribution terminal equipment, and use method thereof
  • Quantum encryption communication system based on power distribution terminal equipment, and use method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] Example 1: When image data is included in the transmission data:

[0071]An encrypted communication system for power distribution terminals based on quantum encryption. Both the quantum key generation system and the quantum key scheduling system are installed in the power company building, and the quantum key generation system uses a quantum random number generator. The system serves Quantum Encryption of Communications between a Switchboard and Substation Master.

[0072] In order to ensure the security of the main station of the substation, a security boundary firewall is also installed on the side of the quantum security gateway. The power distribution terminal equipment on the switching station side first loads the charging key through the U-shield. The transmission data includes the power maintenance aerial pictures of the iron tower taken by the drone, such as figure 2 , image 3 As shown, it includes the step of obtaining the filling key by the power distribu...

Embodiment 2

[0089] Embodiment 2: When the transmission data does not include image data.

[0090] The device configuration and transmission process are the same as those in Embodiment 1, and will not be repeated here. The encryption process is: convert the filling key to generate an image as the image key for encrypting the transmitted data. The specific steps are: record the filling key as a one-dimensional array img, and convert each Convert the number to get the array img1={p 01 ,p 02 ,p 03 ,p 04 ,p 05 ,p 06 ,...,p 21 ,p 22 ,p 23 ,p 24 ,...,p n*24}, where p 01 is the first red component sub-pixel value of the first pixel, p 02 is the first green component sub-pixel value of the first pixel, p 03 is the first blue component sub-pixel value of the first pixel, p 04 is the second red component sub-pixel value of the first pixel, p 05 is the second green component sub-pixel value of the first pixel, …, p 24 is the 8th blue component sub-pixel value of the first pixel, p n*...

Embodiment 3

[0101] Example 3: When transferring larger files.

[0102] Usually when there is a large amount of transmission data, the transmission data is divided into multiple encrypted packages, and each encrypted package needs to be configured with an image key generated by filling the key separately, and the generation time of the encrypted package is earlier than the generation time of the image key and The transmission time of the encrypted package is shorter than the life cycle of the corresponding image key. The image of the image key has a time stamp, and the time stamp includes the generation time of the image key and the life cycle of the image key. The entire data package will self-destruct as soon as it exceeds the lifetime of the image key. In the actual operation process, both the power service server and the quantum security gateway can read the life cycle information of the image key, and compare the generation time of the image key with the time in the device. The actua...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a quantum encryption communication system based on the power distribution terminal equipment and a use method thereof. The partial charging secret key is used for encryption of transmission data and is converted into the image to serve as a decryption carrier, and a power business server can conveniently obtain the secret key. Through the technical scheme, the overall safety performance of the system is further improved. The data encryption still adopts the encryption information converted from the charging key sent by the quantum key scheduling system, so that secondary encryption can be performed on the transmitted data without configuring additional encryption equipment, and meanwhile, the circulation speed of the charging key is improved.

Description

technical field [0001] The invention relates to the field of quantum security communication. Background technique [0002] With the gradual maturity of quantum communication technology, the power system gradually considers the use of quantum communication network to replace the current optical fiber transmission method between the main station of distribution automation and the switching station, that is, the communication method with quantum cryptography is used to transmit information. The advantage of using quantum cryptography is that, in addition to the mathematical problems of classical cryptography, coupled with some characteristics of quantum mechanics, it can achieve effects that classical cryptography cannot achieve. For example, information encrypted in the quantum state cannot be copied; for example, any attempt to read the quantum state will change the quantum state itself, which makes any eavesdropping on the quantum state undetectable. [0003] The most famou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04W12/03H04W12/041H04W12/0431
CPCH04L9/0852H04W12/03H04W12/041H04W12/0431H04L2209/80
Inventor 张波罗俊杜响剑吕华山谢园平胡旭明瞿迪庆余侃姜艳李亚麟
Owner STATE GRID ZHEJIANG ELECTRIC POWER CO LTD JINHUA POWER SUPPLY CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products