Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access authentication method and system based on quantum key

A technology of quantum key and network access, applied in the field of information management to achieve the effect of improving security

Active Publication Date: 2018-11-06
KEHUA DATA CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing authentication methods basically rely on mathematical calculation methods - encrypting information with complex digital strings, and no matter how complex the mathematical key is, the law can be found, which has become an important aspect of network access authentication. Hidden danger

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access authentication method and system based on quantum key
  • Network access authentication method and system based on quantum key
  • Network access authentication method and system based on quantum key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The core of the present application is to provide a quantum key-based network access authentication method, system, server and computer-readable storage medium for improving the security of network access authentication.

[0052] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0053] Please refer to figure 1 , figure 1 It is a flowchart of a quantum key-based network access authentication method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a network access authentication method based on a quantum key. The method includes the following steps: enabling a management platform to receive a user password sent by a terminal; determining whether the user password is consistent with a default password, wherein the default password is a password generated according to a quantum key that is obtained by the managementplatform and a password distribution node by using a QKD protocol; and if yes, allowing the terminal to access the network. According to the technical scheme provided by the application, the default password is generated according to the quantum key that is obtained by the management platform and the password distribution node by using the QKD protocol, since the quantum key has absolute securityand cannot be duplicated, the default password generated according to the quantum key can also have absolute security, and the security of network access authentication can be greatly improved. The application also provides a network access authentication system based on the quantum key, a server and a computer readable storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the field of information management, in particular to a quantum key-based network access authentication method, system, server and computer-readable storage medium. Background technique [0002] Network access authentication can ensure that the user's identity is a trust relationship before the user accesses the network, and only trusted computers can access the network, thereby preventing emerging hacking technologies such as viruses and worms from harming enterprise security. Through access authentication, customers can only allow legal and trustworthy terminal devices to access the network, and not allow other devices to access. [0003] However, the existing authentication methods basically rely on mathematical calculation methods - encrypting information with complex digital strings, and no matter how complex the mathematical key is, the law can be found, which has become an important aspect of network access aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/08H04L63/083
Inventor 陈四雄林建喜
Owner KEHUA DATA CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products