Quantum key charging method of communication terminal

A communication terminal and quantum key technology, applied in the field of quantum key charging, can solve problems such as limited use scope and misappropriation of quantum keys, and achieve the effect of preventing misappropriation and ensuring security

Pending Publication Date: 2022-02-25
安徽国盾量子云数据技术有限公司
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the existing quantum key filling process can only be applied to the area where the quantum private network is laid because the quantum key distribution equipment must rely on the private quantum network, and the scope of use is limited, and in the process of quantum key filling , prone to theft of quantum keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key charging method of communication terminal
  • Quantum key charging method of communication terminal
  • Quantum key charging method of communication terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0044] A quantum key filling method for a communication terminal, such as figure 2 As shown, the connection relationship between the charging terminal, quantum random number generator, exchange cipher machine and cryptographic service platform is established, specifically including:

[0045] S11. The exchange cipher machine registers with the cipher service p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to communication encryption, in particular to a quantum key charging method of a communication terminal. The method comprises the steps that connection relationships among a charging terminal, a quantum random number generator, an exchange cipher machine and a cipher service platform are established; the cipher service platform initializes a security medium in a communication terminal through the exchange cipher machine and the charging terminal; the quantum random number generator generates a charging key, and the exchange cipher machine generates an encryption key to encrypt the charging key; the charging terminal obtains the charging key based on a key obtaining token, and the exchange cipher machine encrypts the encryption key through a card public key and returns a charging key ciphertext and an encryption key ciphertext to the charging terminal; and the charging terminal imports the charging key ciphertext and the encryption key ciphertext into the security medium, the security medium returns a charging result to the charging terminal, and the charging terminal finishes key charging of the security medium. According to the technical scheme provided by the invention, the defects that an application range is limited and a quantum key is likely to be stolen in a quantum key charging process can be effectively overcome.

Description

technical field [0001] The invention relates to communication encryption, in particular to a quantum key charging method for a communication terminal. Background technique [0002] At present, the encryption measures for communication between mobile terminals mainly adopt the encryption system based on the combination of public-private key and symmetric key for communication encryption. The working key is distributed on the public network through the public-private key system. Each share a pair of public and private keys, the central site generates a working key, encrypts the working key with the public key, and sends it to the mobile terminal, and the mobile terminal decrypts it with the paired private key to obtain the working key. The link between the mobile terminal and the central site can use this working key as the key of the symmetric encryption algorithm for encryption and decryption. [0003] However, with the rapid development of quantum computer technology, espe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/0858H04L9/3247H04L63/0428H04L63/0853
Inventor 陈丹张如通陈尊耀刘露露杨红军
Owner 安徽国盾量子云数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products