Unlock instant, AI-driven research and patent intelligence for your innovation.

5G virtual quotient key library distribution method based on quantum security

A quantum key and key library technology, applied in security devices, secure communication devices, and key distribution, can solve the risks of physical security and information security of mobile media, risks of transmission channel information security, and 5G network access security strikes and other issues, to achieve the effect of solving the possibility of stealing secrets, high security, and strong practicability

Active Publication Date: 2022-02-11
STATE GRID FUJIAN ELECTRIC POWER CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, there are several transmission methods for card number resources: 1) Relying on mobile storage media for transmission, which is inconvenient for transmission, and there are risks in the physical security and information security of mobile media; 2) Relying on traditional VPN networks for transmission, this There are risks in the information security of transmission channels
[0005] The SIM card number resource has huge information value, if it is stolen and copied during the transmission process, it will bring a fatal blow to the access security of the 5G network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 5G virtual quotient key library distribution method based on quantum security
  • 5G virtual quotient key library distribution method based on quantum security
  • 5G virtual quotient key library distribution method based on quantum security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0037] It should be pointed out that the following detailed description is exemplary and is intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0038] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a 5G virtual quotient key library distribution method based on quantum security, and the method comprises the steps: deploying quantum VPN gateways and quantum QKD equipment at a place A and a place B which are provided with operator SIM card issuing database equipment and virtual operator SIM card issuing database equipment; respectively connecting the operator SIM card issuing database device and the virtual operator SIM card issuing database device with local quantum VPN gateways, and performing data communication through a TCP protocol VPN channel between the quantum VPN gateways; respectively generating a quantum key QKEY by quantum KD equipment at two places and simultaneously providing the quantum key QKEY to local database equipment and a quantum VPN gateway, so that a data source to be sent by the database equipment is encrypted in an application layer, data to be sent by the quantum VPN gateway is encrypted in a transmission layer, and the security of information source data and TCP protocol transmission is realized; and sharing the quantum key between the quantum QKD devices at the two places through a dedicated channel. According to the method, the security of SIM card number resource transmission between the operator and the virtual operator can be improved.

Description

technical field [0001] The invention belongs to the technical field of data transmission, and in particular relates to a method for distributing a 5G virtual quotient keystore based on quantum security. Background technique [0002] The 5G network is born for the industry, and the 5G architecture supports a variety of virtual operator networking solutions. One of the economical networking methods is that operators distribute their card number resources to virtual operators in batches. [0003] The card number resource is confidential data including identity information such as the root key of the USIM card. It needs to be confidentially communicated between the operator's computer room and the virtual operator's computer room, so as to realize the safe transmission of the operator's card number resources to the virtual operator's computer room. [0004] In the existing technology, there are several transmission methods for card number resources: 1) Relying on mobile storage...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/0431H04W12/069H04W12/40H04L9/08H04L12/46
CPCH04W12/0431H04W12/03H04W12/069H04W12/40H04L9/0852H04L9/085H04L9/0838H04L12/4641Y02D30/70
Inventor 张松磊李源灏陈爽刘刚陈人楷耿震磊陈瀚陈曦陈小倩范炜琳
Owner STATE GRID FUJIAN ELECTRIC POWER CO LTD