A communication method and system based on quantum ukey
A communication method and quantum technology, applied in the field of communication, can solve problems such as insecure authentication and encryption algorithms, difficulties in key distribution and management, and insufficient strength of user passwords, so as to achieve rich application and development, wide protection range, and enhanced security sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] see figure 1 , a schematic flowchart of a quantum UKey-based communication method provided in Embodiment 1 of the present invention, the method specifically includes the following steps:
[0046] 101. When the access application service instruction is obtained, the user terminal determines a first quantum key through the quantum UKey that has established a connection relationship, and sends the corresponding authentication message to the authentication management platform for identity authentication. The authentication message The text includes plaintext user information and identity information encrypted using the first quantum key, and the identity information includes the plaintext user information and a time stamp;
[0047] In this embodiment, in order to improve the security of the user when accessing the application server, first, when obtaining the instruction to access the application service, the user terminal determines a first quantum key through the quantum ...
Embodiment 2
[0063] see figure 2 , a schematic flowchart of a quantum UKey-based communication method provided by Embodiment 2 of the present invention, the method specifically includes the following steps:
[0064] 201. When the access application service instruction is obtained, the user terminal determines a first quantum key through the quantum UKey that has established a connection relationship, and sends the corresponding authentication message to the authentication management platform for identity authentication. The authentication report The text includes plaintext user information and identity information encrypted using the first quantum key, and the identity information includes the plaintext user information and a time stamp;
[0065] 202. The authentication management platform obtains a second quantum key from the KMS according to the plaintext user information in the authentication message, and uses the second quantum key to decrypt the encrypted identity information in the ...
Embodiment 3
[0081] see image 3 , a schematic flowchart of a quantum UKey-based communication method provided by Embodiment 3 of the present invention, the method specifically includes the following steps:
[0082] 301. When the access application service instruction is obtained, the user terminal determines a first quantum key through the quantum UKey that has established a connection relationship, and sends the corresponding authentication message to the authentication management platform for identity authentication. The authentication message The text includes plaintext user information and identity information encrypted using the first quantum key, and the identity information includes the plaintext user information and a time stamp;
[0083] 302. The authentication management platform obtains a second quantum key from the KMS according to the plaintext user information in the authentication message, and uses the second quantum key to decrypt the encrypted identity information in the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com