Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Quantum cryptography network encryption communication method based on quantum key card

A technology of encrypted communication and quantum cryptography, which is applied in the field of encrypted communication networks, can solve problems such as the encryption and decryption shared key method of the quantum key card is not simple enough, the authentication process is complicated, and the network resources of the quantum cryptography are wasted, and the authentication process is simple and efficient. , reduce freshness, and save network resources

Pending Publication Date: 2022-07-19
QUANTUMCTEK +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of generating the quantum key card encryption and decryption shared key in this patent is not simple enough, which wastes the network resources of the quantum cryptography network, and needs to set up different levels of switching centers according to the different network ranges where the quantum network service station is located.
Another shortcoming of this patent scheme is that the authentication process is relatively complicated when the encrypted communication between the quantum key cards is complicated, between the quantum key card and the quantum network service station that has a shared key with it and between the quantum key cards authentication is required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum cryptography network encryption communication method based on quantum key card
  • Quantum cryptography network encryption communication method based on quantum key card
  • Quantum cryptography network encryption communication method based on quantum key card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present disclosure will be further described below with reference to the accompanying drawings and embodiments.

[0060] It should be noted that the following detailed description is exemplary and intended to provide further explanation of the present disclosure. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.

[0061] It should be noted that the terminology used herein is for the purpose of describing specific embodiments only, and is not intended to limit the exemplary embodiments according to the present disclosure. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural as well, furthermore, it is to be understood that when the terms "comprising" and / or "including" are used in this specification, it indicates that There are features, steps, operations, devices, component...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a quantum cryptography network encryption communication method based on a quantum key card. The method comprises the following steps: establishing an equipment network access authentication server in a quantum cryptography network; the quantum key card registers in the network access authentication server to obtain an authentication key; the quantum key card performs network access authentication, the network access authentication server determines whether the quantum key card is registered or not based on the authentication key of the quantum key card sending the network access authentication request and the basic information, and if the quantum key card is registered, the network access authentication is passed, and a network access authentication key is updated for the quantum key card; the quantum key card obtains true random data as a shared key for encryption communication; according to the encryption communication method and device, the network resource consumption of the quantum key cards for obtaining the shared key for encryption communication is reduced, and the identity authentication process when the quantum key cards obtain the shared key for encryption communication is simplified.

Description

technical field [0001] The present disclosure belongs to the technical field of encrypted communication networks, and relates to a quantum cryptographic network encrypted communication method based on a quantum key card. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and do not necessarily constitute prior art. [0003] Quantum communication is a new interdisciplinary subject developed in the past two decades, and it is a new research field combining quantum theory and information theory. Recently, this discipline has gradually moved from theory to experiment and to practical development. Efficient and secure information transmission has attracted more and more people's attention. [0004] In physics, quantum communication can be understood as high-performance communication using quantum effects under the physical limit. In informatics, we think that quantum communication is the use of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/40
CPCH04L9/0852H04L9/085H04L63/0853H04L63/0876
Inventor 不公告发明人
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products