Method and system for network access authentication based on quantum key

A quantum key and network access technology, applied in the field of information management, to achieve the effect of improving security

Active Publication Date: 2021-10-08
KEHUA DATA CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing authentication methods basically rely on mathematical calculation methods - encrypting information with complex digital strings, and no matter how complex the mathematical key is, the law can be found, which has become an important aspect of network access authentication. Hidden danger

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for network access authentication based on quantum key
  • Method and system for network access authentication based on quantum key
  • Method and system for network access authentication based on quantum key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The core of the present application is to provide a quantum key-based network access authentication method, system, server and computer-readable storage medium for improving the security of network access authentication.

[0052] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0053] Please refer to figure 1 , figure 1 It is a flow chart of a quantum key-based network access authentication method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application discloses a method for network access authentication based on quantum keys, including: the management platform receives the user password sent by the terminal; judging whether the user password is consistent with the preset password; wherein, the preset password is based on the management platform and the password The password generated by the distribution node using the quantum key obtained by the QKD protocol; if so, the terminal is allowed to access the network. In the technical solution provided by this application, the preset password is generated by using the quantum key obtained by the management platform and the password distribution node using the QKD protocol. Since the quantum key has absolute security and cannot be copied, the quantum key is generated based on the quantum key. The preset password is also absolutely safe, which greatly improves the security of network access authentication. At the same time, the present application also provides a quantum key-based network access authentication system, server and computer-readable storage medium, which have the above-mentioned beneficial effects.

Description

technical field [0001] The present application relates to the field of information management, in particular to a quantum key-based network access authentication method, system, server and computer-readable storage medium. Background technique [0002] Network access authentication can ensure that the user's identity is a trust relationship before the user accesses the network, and only trusted computers can access the network, thereby preventing emerging hacking technologies such as viruses and worms from harming enterprise security. Through access authentication, customers can only allow legal and trustworthy terminal devices to access the network, and not allow other devices to access. [0003] However, the existing authentication methods basically rely on mathematical calculation methods - encrypting information with complex digital strings, and no matter how complex the mathematical key is, the law can be found, which has become an important aspect of network access aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/08H04L63/083
Inventor 陈四雄林建喜
Owner KEHUA DATA CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products