Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A communication method and system based on quantum ukey

A communication method and quantum technology, applied in the field of communication, can solve problems such as insecure authentication and encryption algorithms, difficulties in key distribution and management, and insufficient strength of user passwords, so as to achieve rich application and development, wide protection range, and enhanced security sexual effect

Active Publication Date: 2020-12-29
QUANTUMCTEK GUANGDONG CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The quantum UKey-based communication method and system provided by the embodiments of the present invention solve the problems of current identity authentication and secure access to cloud service applications, such as insecure authentication and encryption algorithms, insufficient user password strength, user password plaintext input, The potential security problems caused by key distribution and management difficulties and the inability to automatically update keys have realized the organic combination of quantum keys and traditional authentication and encryption mechanisms, giving full play to the advantages of quantum keys in secure communication, effectively Enhanced the security of traditional authentication and encryption mechanisms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A communication method and system based on quantum ukey
  • A communication method and system based on quantum ukey
  • A communication method and system based on quantum ukey

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] see figure 1 , a schematic flowchart of a quantum UKey-based communication method provided in Embodiment 1 of the present invention, the method specifically includes the following steps:

[0046] 101. When the access application service instruction is obtained, the user terminal determines a first quantum key through the quantum UKey that has established a connection relationship, and sends the corresponding authentication message to the authentication management platform for identity authentication. The authentication message The text includes plaintext user information and identity information encrypted using the first quantum key, and the identity information includes the plaintext user information and a time stamp;

[0047] In this embodiment, in order to improve the security of the user when accessing the application server, first, when obtaining the instruction to access the application service, the user terminal determines a first quantum key through the quantum ...

Embodiment 2

[0063] see figure 2 , a schematic flowchart of a quantum UKey-based communication method provided by Embodiment 2 of the present invention, the method specifically includes the following steps:

[0064] 201. When the access application service instruction is obtained, the user terminal determines a first quantum key through the quantum UKey that has established a connection relationship, and sends the corresponding authentication message to the authentication management platform for identity authentication. The authentication report The text includes plaintext user information and identity information encrypted using the first quantum key, and the identity information includes the plaintext user information and a time stamp;

[0065] 202. The authentication management platform obtains a second quantum key from the KMS according to the plaintext user information in the authentication message, and uses the second quantum key to decrypt the encrypted identity information in the ...

Embodiment 3

[0081] see image 3 , a schematic flowchart of a quantum UKey-based communication method provided by Embodiment 3 of the present invention, the method specifically includes the following steps:

[0082] 301. When the access application service instruction is obtained, the user terminal determines a first quantum key through the quantum UKey that has established a connection relationship, and sends the corresponding authentication message to the authentication management platform for identity authentication. The authentication message The text includes plaintext user information and identity information encrypted using the first quantum key, and the identity information includes the plaintext user information and a time stamp;

[0083] 302. The authentication management platform obtains a second quantum key from the KMS according to the plaintext user information in the authentication message, and uses the second quantum key to decrypt the encrypted identity information in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication method and system based on the quantum Ukey, aiming to solve the potential safety hazards that the algorithm is not safe, the user password strength is not highenough, the user password plaintext input, secret key distribution and management are difficult, and the secret key cannot be automatically updated in the aspects of current identity authentication and security access cloud service application. The communication method based on the quantum Ukey comprises the following steps that when an access application service instruction is acquired, a user terminal determines a first quantum key by the quantum Ukey established the connection relation, and sending the corresponding authentication message to an authentication management platform for identity authentication; the authentication management platform obtains a second quantum key from the KMS according to the authentication message, and decrypting the encrypted information in the authentication message, if the decrypted information is consistent with the plaintext information in the authentication message, the identity authentication is determined to pass, and the passing information isreturned to the user terminal, so that the user terminal accesses the application server through the first quantum key.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a communication method and system based on quantum UKey. Background technique [0002] Quantum communication technology is a new technology developed in recent decades. It is the product of the combination of quantum theory and information theory. It is the only secure communication technology whose security has been strictly proved, and can realize the safe distribution of keys. In the field of application, quantum gateways are generally used to generate symmetric quantum keys at two clients through quantum channels and use them to encrypt communication data at both ends to ensure the security of data communication. However, due to the large size of existing quantum gateway products, it is not suitable for certain occasions, such as mobile office. Quantum cryptography differs from traditional cryptographic systems in that it relies on physics rather than mathematics as a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/08
Inventor 陈庆林加毅丁松燕潘羡忠
Owner QUANTUMCTEK GUANGDONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products