Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing smart home quantum cloud storage method and system based on quantum key card

A smart home and quantum computing technology, applied in the direction of quantum computers, computing, transmission systems, etc., can solve the problems of information theft, malicious software or malicious operation theft, cracking, etc., to improve security, reduce the risk of cracking, and prevent the use of security cloud effect

Active Publication Date: 2021-10-22
RUBAN QUANTUM TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The home gateway is the central network element of the smart home, and has the ability to access the Internet. It is very likely to be infected with a virus Trojan horse, thereby stealing information; or being attacked and paralyzed, resulting in the paralysis of the entire smart home solution.
[0007] (2) In the prior art, the mobile terminal key is stored in the memory of the mobile terminal, exposed to the threat of viruses and Trojan horses in the mobile terminal, and can be stolen by malicious software or malicious operations
[0008] (3) Since the quantum computer can quickly obtain the corresponding private key through the public key, the existing smart home communication method based on the public-private key is easily cracked by the quantum computer
[0009] (4) In the existing technology, the input and output of digital signatures based on public and private keys can be known by the enemy. In the presence of quantum computers, the private key may be deduced, resulting in a public-private key-based Smart home communication system hacked by quantum computer
[0010] (5) In the existing technology, if the files on the cloud storage do not use digital signatures, there will be no non-repudiation effect, and if there are illegal files, it will be difficult to trace the source
Even with digital signatures, there are illegal signatures caused by stolen private keys
[0011] (6) In the existing technology, there may be unauthorized users using the cloud, which may lead to security problems
[0012] (7) If the cloud storage key is not protected by hardware, it is not safe enough
[0013] (8) Uploading cloud storage generally uses the SSL protocol of the public key system to negotiate session keys, which will be cracked by quantum computers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing smart home quantum cloud storage method and system based on quantum key card
  • Anti-quantum computing smart home quantum cloud storage method and system based on quantum key card
  • Anti-quantum computing smart home quantum cloud storage method and system based on quantum key card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0093] In this embodiment, smart family members upload files to the security cloud. The uploading of files by smart family members to the security cloud is divided into the following three situations: mobile terminal M uploads files to the security cloud, home gateway S uploads files to the security cloud, and home device C uploads files to the security cloud. files to the secure cloud.

[0094] Case 1: The mobile terminal uploads files to the secure cloud. Such as figure 1 As shown, the mobile terminal uploads files to the secure cloud through the quantum communication service station.

[0095] Step 1.1.1: The mobile terminal sends the file to the quantum communication service station.

[0096] The mobile terminal M generates a true random number R according to the true random number generator in the matching quantum key fob M (hereinafter referred to as R M , and other similarities omit the Chinese character part as the abbreviation). R M Combining with a specific key ...

Embodiment 2

[0130] In this embodiment, smart family members download files from the safe cloud, and the smart family members download files from the safe cloud into the following three situations: mobile terminal M downloads files from the safe cloud, home gateway S downloads files from the safe cloud, and home device C Download files from a secure cloud.

[0131] Case 1: The mobile terminal downloads files from the secure cloud.

[0132] Step 2.1.1: The mobile terminal sends a file download request to the security cloud.

[0133] The download file request sent by the mobile terminal to the security cloud is transferred through the quantum communication service station, and the request includes the MID of the mobile terminal.

[0134] Step 2.1.2: The quantum communication service station obtains and transmits files.

[0135] After receiving the request for downloading the file, Security Cloud SS will verify the MID, and if it exists in the legal user list, it will pass the verification....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a quantum cloud storage method and system for an anti-quantum computing smart home based on quantum key cards. keys, asymmetric key pools, and public key pointer random numbers, the mobile terminal, the home gateway, and the quantum key card of the security cloud also store a third symmetric key pool, and all symmetric key The key pool is also stored in the quantum key card of the quantum communication service station at the same time; when the smart home component communicates with the security cloud to access the file, the file uses the quantum key card of both parties to process the file using an asymmetric algorithm. Signature and verification; when transferring files between the smart home components and the quantum communication service station, and between the quantum communication service station and the security cloud, use the corresponding symmetric key pool to generate a key, and use a symmetric algorithm for encrypted communication.

Description

technical field [0001] The invention relates to the technical field of smart home equipment, in particular to a quantum computing-resistant smart home communication method based on a quantum key card. Background technique [0002] With the continuous development of information technology and social economy, people's living standards have been continuously improved, and the pace of life has gradually accelerated. Residents can conveniently and quickly enjoy smart, comfortable, efficient and safe home life through mobile phones and other terminals. . With the gradual increase of home smart devices, people put forward higher requirements for the smart operation of home devices. In general smart home device communication methods, asymmetric key encryption is used to ensure data security. Asymmetric key encryption requires the use of different keys to complete the encryption and decryption operations. One is publicly released, that is, the public key, and the other is public. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/32H04L9/08G06N10/00
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products