CN114095167A - Quantum key filling method of communication terminal - Google Patents

Quantum key filling method of communication terminal Download PDF

Info

Publication number
CN114095167A
CN114095167A CN202111407543.1A CN202111407543A CN114095167A CN 114095167 A CN114095167 A CN 114095167A CN 202111407543 A CN202111407543 A CN 202111407543A CN 114095167 A CN114095167 A CN 114095167A
Authority
CN
China
Prior art keywords
key
charging
terminal
ciphertext
service platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111407543.1A
Other languages
Chinese (zh)
Inventor
陈丹
张如通
陈尊耀
刘露露
杨红军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Guodun Quantum Cloud Data Technology Co ltd
Original Assignee
Anhui Guodun Quantum Cloud Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Guodun Quantum Cloud Data Technology Co ltd filed Critical Anhui Guodun Quantum Cloud Data Technology Co ltd
Priority to CN202111407543.1A priority Critical patent/CN114095167A/en
Publication of CN114095167A publication Critical patent/CN114095167A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to communication encryption, in particular to a quantum key charging method of a communication terminal, which comprises the steps of establishing a connection relation among a charging terminal, a quantum random number generator, an exchange cipher machine and a cipher service platform, initializing a safety medium in the communication terminal through the exchange cipher machine and the charging terminal by the cipher service platform, generating a charging key by the quantum random number generator, encrypting the charging key by the exchange cipher machine generating an encryption key, acquiring the charging key by the charging terminal based on a key acquisition token, encrypting the encryption key through a card public key by the exchange cipher machine, returning a charging key ciphertext and an encryption key ciphertext to the charging terminal, leading the charging key ciphertext and the encryption key ciphertext into the safety medium by the charging terminal, returning a charging result to the charging terminal by the safety medium, and finishing the charging of the safety medium key; the technical scheme provided by the invention can effectively overcome the defects that the application range is limited and the quantum key is easy to be stolen in the process of filling the quantum key.

Description

Quantum key filling method of communication terminal
Technical Field
The invention relates to communication encryption, in particular to a quantum key charging method of a communication terminal.
Background
At present, an encryption measure for communication between mobile terminals mainly adopts an encryption system based on combination of a public and private key and a symmetric key to perform communication encryption, a working key of the encryption system is distributed on a public network through the public and private key system, a pair of public and private keys is shared between a central site and each mobile terminal, the central site generates the working key, the working key is encrypted by the public key and is sent to the mobile terminals, and the mobile terminals decrypt by the matched private keys to obtain the working key. The link between the mobile terminal and the central station can use the working key as a key of a symmetric encryption algorithm to encrypt and decrypt.
However, with the rapid development of quantum computer technology, especially in combination with a corresponding cracking algorithm (such as shor algorithm), the problem of mathematical difficulty can be solved within polynomial time under a quantum computing model. This means that the public-private key cryptographic algorithm based on the mathematical difficulty problem is no longer secure under the quantum computing model, so that the communication data protected by the public-private key cryptographic algorithm is no longer secure.
The quantum key distribution is based on the fundamental principle of quantum mechanics, so that the eavesdropping can be inevitably discovered in principle without being threatened by continuous improvement of computing capacity and mathematical level, the quantum key distribution has long-term safety, can realize indecipherable safe secret communication in theory, and becomes the development and application trend for guaranteeing the safety of communication data at home and abroad.
During the use process of the quantum key, the quantum key can be filled into the quantum key storage device through the filling terminal for use. In the prior art, the quantum key charging process generally includes that two quantum key distribution devices paired with each other negotiate to generate a quantum key, the two quantum key distribution devices respectively send the same quantum key to a key distribution center and a charging terminal, the key distribution center stores the quantum key in local storage devices, the charging terminal writes the quantum key into quantum key storage devices, and the key distribution center and the quantum key storage devices have the same embedded quantum key, so that quantum key charging is completed.
However, in the existing quantum key filling process, the quantum key distribution device must depend on a special quantum network, so that the quantum key distribution device can only be applied to an area where a quantum private network is laid, the use range is limited, and the situation that the quantum key is stolen easily occurs in the quantum key filling process.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects in the prior art, the invention provides a quantum key filling method of a communication terminal, which can effectively overcome the defects that the application range is limited and the quantum key is easy to be stolen in the quantum key filling process in the prior art.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme:
a quantum key charging method of a communication terminal comprises the following steps:
s1, establishing a connection relation among a filling terminal, a quantum random number generator, an exchange cipher machine and a cipher service platform;
s2, the password service platform initializes the safety medium in the communication terminal through the exchange password machine and the charging terminal;
s3, generating a charging key by the quantum random number generator, and encrypting the charging key by the exchange cipher machine by generating an encryption key;
s4, the charging terminal acquires a charging key based on the key acquisition token, the exchange cipher machine encrypts the encryption key through the card public key, and returns a charging key ciphertext and an encryption key ciphertext to the charging terminal;
and S5, the charging terminal introduces the charging key ciphertext and the encryption key ciphertext into the secure medium, the secure medium returns a charging result to the charging terminal, and the charging terminal finishes the key charging of the secure medium.
Preferably, the step S1 of establishing a connection relationship among the filling terminal, the quantum random number generator, the exchange cryptographic machine and the cryptographic service platform includes:
s11, the exchange cipher machine registers the cipher service platform for network access, the cipher service platform authenticates the network access and returns the network access result to the exchange cipher machine;
s12, the charging terminal inserts Ukey to log in, and the exchange cipher machine sends private key signature authentication data based on Ukey to the cipher service platform;
and S13, the password service platform performs identity authentication by using the Ukey-based private key signature authentication data, and returns an identity authentication result to the filling terminal through the exchange password machine.
Preferably, the cryptographic service platform in S2 initializes the secure medium in the communication terminal by exchanging the cryptographic engine and the charging terminal, including:
s21, the secure media is connected with the charging terminal, the secure media generates a signature public and private key, and sends media information and a signature public key to the charging terminal;
s22, the cryptographic service platform generates an encrypted public and private key pair and a symmetric key, and encrypts the encrypted public and private key pair through the symmetric key, and encrypts the symmetric key through the signature public key;
and S23, the charging terminal imports the encrypted public and private key pair ciphertext and the symmetric key ciphertext into the secure medium, and the secure medium acquires and imports the encrypted public and private key pair.
Preferably, the data transfer between the charging terminal and the cryptographic service platform is performed through an exchange cryptographic machine, including:
the charging terminal uploads medium information and a signature public key to the password service platform through the exchange password machine;
and the password service platform returns the encrypted public and private key pair ciphertext and the symmetric key ciphertext to the charging terminal through the exchange password machine.
Preferably, the acquiring and importing the encrypted public and private key pair by the secure media includes:
the secure medium decrypts the symmetric key ciphertext through the signature private key to obtain a symmetric key, and decrypts the encrypted public and private key ciphertext through the symmetric key to obtain an encrypted public and private key pair.
Preferably, after the exchanging cryptographic engine generates the encryption key to encrypt the charging key in S3, the method includes:
the exchange cipher machine stores the charging key ciphertext and returns a generation result to the cipher service platform, and the cipher service platform returns the charging key application corresponding and key acquisition token to the charging terminal through the exchange cipher machine.
Preferably, after the charging terminal imports the charging key ciphertext and the encryption key ciphertext into the secure media in S5, the method includes:
and the charging terminal decrypts the encrypted key ciphertext through the card private key to obtain an encrypted key, and decrypts the charging key ciphertext through the encrypted key to obtain a charging key.
(III) advantageous effects
Compared with the prior art, the quantum key charging method of the communication terminal provided by the invention has the following beneficial effects:
1) the exchange cipher machine is used for replacing quantum key distribution equipment, the generation of the quantum key does not need to depend on a special quantum network, and the use range is not limited;
2) exchange cipher machine generates the quantum key based on quantum random number to utilize quantum key generation to fill in the key, produce encryption key simultaneously and encrypt filling in the key, exchange cipher machine encrypts the encryption key through the card public key, realized filling in the effective encryption of key and encryption key, and encryption key ciphertext can only decipher through the card private key, the security that the quantum key filled in has fully been guaranteed, the condition that effectively prevents quantum key filling in-process from being stolen takes place.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 is a schematic diagram of the system of the present invention;
FIG. 2 is a schematic flow chart of the connection relationship among the charging terminal, the exchange cipher machine and the cipher service platform;
FIG. 3 is a schematic diagram illustrating a process of initializing an internal security medium of the communication terminal according to the present invention;
fig. 4 is a flow chart of quantum key charging in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
A quantum key charging method of a communication terminal, as shown in FIG. 2, establishes a connection relationship between a charging terminal, a quantum random number generator, an exchange cipher machine and a cipher service platform, and specifically includes:
s11, the exchange cipher machine registers the cipher service platform for network access, the cipher service platform authenticates the network access and returns the network access result to the exchange cipher machine;
s12, the charging terminal inserts Ukey to log in, and the exchange cipher machine sends private key signature authentication data based on Ukey to the cipher service platform;
and S13, the password service platform performs identity authentication by using the Ukey-based private key signature authentication data, and returns an identity authentication result to the filling terminal through the exchange password machine.
As shown in fig. 3, the cryptographic service platform initializes the secure medium in the communication terminal by exchanging the cryptographic engine and the charging terminal, and specifically includes:
s21, the secure media is connected with a filling terminal, the secure media generates a signature public and private key and sends media information and a signature public key to the filling terminal, and the filling terminal uploads the media information and the signature public key to the password service platform through the exchange cipher machine;
s22, the cryptographic service platform generates an encrypted public and private key pair and a symmetric key, encrypts the encrypted public and private key pair through the symmetric key, and simultaneously encrypts the symmetric key through the signature public key, and the cryptographic service platform returns an encrypted public and private key pair ciphertext and a symmetric key ciphertext to the charging terminal through the exchange cipher machine;
and S23, the charging terminal guides the encrypted public and private key pair ciphertext and the symmetric key ciphertext into the secure medium, the secure medium decrypts the symmetric key ciphertext through the signature private key to obtain a symmetric key, and decrypts the encrypted public and private key pair ciphertext through the symmetric key to obtain an encrypted public and private key pair.
Fig. 4 is a schematic flow chart of quantum key charging, which specifically includes:
firstly, a quantum random number generator generates a charging key, and an exchange cipher machine generates an encryption key to encrypt the charging key;
wherein, after the exchange cipher machine generates the encryption key to encrypt the charging key, the method comprises the following steps:
the exchange cipher machine stores the charging key ciphertext and returns a generation result to the cipher service platform, and the cipher service platform returns a charging key application corresponding and key acquisition token to the charging terminal through the exchange cipher machine;
the charging terminal acquires a charging key based on the key acquisition token, the exchange cipher machine encrypts the encryption key through the card public key, and returns a charging key ciphertext and an encryption key ciphertext to the charging terminal;
the charging terminal guides the charging key ciphertext and the encryption key ciphertext into the secure medium, the secure medium returns a charging result to the charging terminal, and the charging terminal finishes the charging of the secure medium key;
wherein, fill and fill after the terminal station will fill in secret key ciphertext, encryption key ciphertext and lead to the secure media, include:
and the charging terminal decrypts the encrypted key ciphertext through the card private key to obtain an encrypted key, and decrypts the charging key ciphertext through the encrypted key to obtain a charging key.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (7)

1. A quantum key filling method of a communication terminal is characterized in that: the method comprises the following steps:
s1, establishing a connection relation among a filling terminal, a quantum random number generator, an exchange cipher machine and a cipher service platform;
s2, the password service platform initializes the safety medium in the communication terminal through the exchange password machine and the charging terminal;
s3, generating a charging key by the quantum random number generator, and encrypting the charging key by the exchange cipher machine by generating an encryption key;
s4, the charging terminal acquires a charging key based on the key acquisition token, the exchange cipher machine encrypts the encryption key through the card public key, and returns a charging key ciphertext and an encryption key ciphertext to the charging terminal;
and S5, the charging terminal introduces the charging key ciphertext and the encryption key ciphertext into the secure medium, the secure medium returns a charging result to the charging terminal, and the charging terminal finishes the key charging of the secure medium.
2. The quantum key charging method of a communication terminal according to claim 1, characterized in that: s1, establishing a connection relationship among the filling terminal, the quantum random number generator, the exchange cipher machine and the cipher service platform, including:
s11, the exchange cipher machine registers the cipher service platform for network access, the cipher service platform authenticates the network access and returns the network access result to the exchange cipher machine;
s12, the charging terminal inserts Ukey to log in, and the exchange cipher machine sends private key signature authentication data based on Ukey to the cipher service platform;
and S13, the password service platform performs identity authentication by using the Ukey-based private key signature authentication data, and returns an identity authentication result to the filling terminal through the exchange password machine.
3. The quantum key charging method of a communication terminal according to claim 1, characterized in that: in S2, the cryptographic service platform initializes the secure medium in the communication terminal by exchanging the cryptographic engine and the charging terminal, including:
s21, the secure media is connected with the charging terminal, the secure media generates a signature public and private key, and sends media information and a signature public key to the charging terminal;
s22, the cryptographic service platform generates an encrypted public and private key pair and a symmetric key, and encrypts the encrypted public and private key pair through the symmetric key, and encrypts the symmetric key through the signature public key;
s23, the charging terminal leads the encrypted public and private key pair ciphertext and the symmetric key ciphertext into the secure medium, and the secure medium acquires and leads the encrypted public and private key pair.
4. A quantum key charging method of a communication terminal according to claim 3, characterized in that: the data transmission between the charging terminal and the password service platform is carried out through the exchange password machine, and the method comprises the following steps:
the charging terminal uploads medium information and a signature public key to the password service platform through the exchange password machine;
and the password service platform returns the encrypted public and private key pair ciphertext and the symmetric key ciphertext to the charging terminal through the exchange password machine.
5. A quantum key charging method of a communication terminal according to claim 3, characterized in that: the secure media acquires and imports an encrypted public and private key pair, and the method comprises the following steps:
the secure medium decrypts the symmetric key ciphertext through the signature private key to obtain a symmetric key, and decrypts the encrypted public and private key ciphertext through the symmetric key to obtain an encrypted public and private key pair.
6. The quantum key charging method of a communication terminal according to claim 1, characterized in that: after the exchanging cipher machine generates the encryption key to encrypt the charging key in S3, the method includes:
the exchange cipher machine stores the charging key ciphertext and returns a generation result to the cipher service platform, and the cipher service platform returns the charging key application corresponding and key acquisition token to the charging terminal through the exchange cipher machine.
7. The quantum key charging method of a communication terminal according to claim 1, characterized in that: after the charging terminal imports the charging key ciphertext and the encryption key ciphertext into the secure media in S5, the method includes:
and the charging terminal decrypts the encrypted key ciphertext through the card private key to obtain an encrypted key, and decrypts the charging key ciphertext through the encrypted key to obtain a charging key.
CN202111407543.1A 2021-11-24 2021-11-24 Quantum key filling method of communication terminal Pending CN114095167A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111407543.1A CN114095167A (en) 2021-11-24 2021-11-24 Quantum key filling method of communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111407543.1A CN114095167A (en) 2021-11-24 2021-11-24 Quantum key filling method of communication terminal

Publications (1)

Publication Number Publication Date
CN114095167A true CN114095167A (en) 2022-02-25

Family

ID=80304325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111407543.1A Pending CN114095167A (en) 2021-11-24 2021-11-24 Quantum key filling method of communication terminal

Country Status (1)

Country Link
CN (1) CN114095167A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531238A (en) * 2022-04-24 2022-05-24 ***量子科技有限公司 Secret key safe filling method and system based on quantum secret key distribution
CN115438358A (en) * 2022-09-05 2022-12-06 长江量子(武汉)科技有限公司 Controlled file encryption method and electronic equipment
CN115694816A (en) * 2023-01-04 2023-02-03 南京中科齐信科技有限公司 Quantum key pair filling method based on UDS protocol
CN116089989A (en) * 2023-04-10 2023-05-09 广东广宇科技发展有限公司 Data iterative encryption processing method for offline data terminal
CN117478762A (en) * 2023-10-31 2024-01-30 长江量子(武汉)科技有限公司 Safe and high-speed transmission method and system for Internet of vehicles data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106685645A (en) * 2016-11-14 2017-05-17 郑州信大捷安信息技术股份有限公司 Key backup and recovery method and system for secure chip service key
CN111865589A (en) * 2020-08-14 2020-10-30 国科量子通信网络有限公司 Quantum communication encryption system and method for realizing mobile communication quantum encryption transmission
CN113285803A (en) * 2021-06-24 2021-08-20 ***量子科技有限公司 Mail transmission system and transmission method based on quantum security key
CN113438074A (en) * 2021-06-24 2021-09-24 ***量子科技有限公司 Decryption method of received mail based on quantum security key
CN113630407A (en) * 2021-08-02 2021-11-09 ***量子科技有限公司 Method and system for enhancing transmission security of MQTT protocol by using symmetric cryptographic technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106685645A (en) * 2016-11-14 2017-05-17 郑州信大捷安信息技术股份有限公司 Key backup and recovery method and system for secure chip service key
CN111865589A (en) * 2020-08-14 2020-10-30 国科量子通信网络有限公司 Quantum communication encryption system and method for realizing mobile communication quantum encryption transmission
CN113285803A (en) * 2021-06-24 2021-08-20 ***量子科技有限公司 Mail transmission system and transmission method based on quantum security key
CN113438074A (en) * 2021-06-24 2021-09-24 ***量子科技有限公司 Decryption method of received mail based on quantum security key
CN113630407A (en) * 2021-08-02 2021-11-09 ***量子科技有限公司 Method and system for enhancing transmission security of MQTT protocol by using symmetric cryptographic technology

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531238A (en) * 2022-04-24 2022-05-24 ***量子科技有限公司 Secret key safe filling method and system based on quantum secret key distribution
CN115438358A (en) * 2022-09-05 2022-12-06 长江量子(武汉)科技有限公司 Controlled file encryption method and electronic equipment
CN115694816A (en) * 2023-01-04 2023-02-03 南京中科齐信科技有限公司 Quantum key pair filling method based on UDS protocol
CN116089989A (en) * 2023-04-10 2023-05-09 广东广宇科技发展有限公司 Data iterative encryption processing method for offline data terminal
CN116089989B (en) * 2023-04-10 2023-08-01 广东广宇科技发展有限公司 Data iterative encryption processing method for offline data terminal
CN117478762A (en) * 2023-10-31 2024-01-30 长江量子(武汉)科技有限公司 Safe and high-speed transmission method and system for Internet of vehicles data
CN117478762B (en) * 2023-10-31 2024-05-31 长江量子(武汉)科技有限公司 Safe and high-speed transmission method and system for Internet of vehicles data

Similar Documents

Publication Publication Date Title
CN114095167A (en) Quantum key filling method of communication terminal
CN106161402B (en) Encryption equipment key injected system, method and device based on cloud environment
CN106656503B (en) Method for storing cipher key, data encryption/decryption method, electric endorsement method and its device
CN108768930A (en) A kind of encrypted transmission method of data
CN101515319B (en) Cipher key processing method, cipher key cryptography service system and cipher key consultation method
CN103957109A (en) Cloud data privacy protection security re-encryption method
CN107769913A (en) A kind of communication means and system based on quantum UKey
CN107154848A (en) A kind of data encryption based on CPK certifications and storage method and device
CN110519046A (en) Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD
CN113037478B (en) Quantum key distribution system and method
CN110138548A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system
CN112020038A (en) Domestic encryption terminal suitable for rail transit mobile application
CN114095168B (en) Communication method based on quantum key and encrypted communication terminal thereof
CN101192927B (en) Authorization based on identity confidentiality and multiple authentication method
CN107707562A (en) A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN114745109B (en) Quantum encryption-based power distribution terminal encryption communication system and method
CN110493177B (en) Method and system for quantum communication service station AKA key negotiation based on asymmetric key pool pair and serial number
CN103944721A (en) Method and device for protecting terminal data security on basis of web
CN110098925A (en) Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system
CN114070579A (en) Industrial control service authentication method and system based on quantum key
CN106257859A (en) A kind of password using method
CN100561913C (en) A kind of method of access code equipment
CN116707778A (en) Data hybrid encryption transmission method and device and electronic equipment
CN106507331A (en) A kind of safety transfer method of card application data, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination