CN109889340A - A kind of adaptive cipher key distribution mechanisms based on QKD network - Google Patents
A kind of adaptive cipher key distribution mechanisms based on QKD network Download PDFInfo
- Publication number
- CN109889340A CN109889340A CN201910210923.2A CN201910210923A CN109889340A CN 109889340 A CN109889340 A CN 109889340A CN 201910210923 A CN201910210923 A CN 201910210923A CN 109889340 A CN109889340 A CN 109889340A
- Authority
- CN
- China
- Prior art keywords
- key
- quantum
- classic
- final
- quantum key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Landscapes
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses a kind of adaptive cipher key distribution mechanisms based on QKD network, including three kinds of key strategies, are respectively: one is used alone classic key;Two are used alone quantum key;Three fusions use quantum key and classic key, avoid quantum key generating rate lower and lead to not meet the conditions of demand to size of key.Video of the present invention for downloading playing-type, audio-frequency information, candidate block encryption algorithm: AES is specified for it, 3DES, IDEA, SM1, SMS4, Twofish, for the video of RTSP streaming, audio-frequency information, guarantee high real-time, for the video/audio information of RTSP streaming, candidate Encryption Algorithm: AES is specified for it, SM1, SMS4, RC4, Rabbit, ChaCha20, Serpent, for text information, such as Email, control information etc., requirement of real-time is lower, this patent is for such application distribution symmetric encipherment algorithm mainly according to the security level required by itself, therefore, it can be its specified candidate Encryption Algorithm: DES, AES, SM1, SMS4, Twofish.
Description
Technical field
The present invention relates to Fiber quantum fields of communication technology, and in particular to a kind of adaptive cipher key based on QKD network point
Hair mechanism.
Background technique
Currently, multimedia file can be divided into discontinuous media and continuous media.Discontinuous media mainly include text, figure
And image, continuous media then mainly include voice, audio, video.In comparison, continuous media needs high real-time and low latency
Property.Wherein, video file needs to guarantee higher transmission rate, and occupies biggish network bandwidth, and video, audio-frequency information have
The features such as data volume is big, correlation is strong, redundancy is high, requirement of real-time is high, since data volume is big, code breaker need to carry out data
A large amount of decoding operate, thus can be bigger compared to the decoding difficulty of text information, video and audio can be divided into downloading playing-type again
With RTSP (Real Time Streaming Protocol) streaming: (1) download playing-type be will be under entire video, audio file
Played out after being downloaded to terminal, can guarantee video integrality and play continuity, but using such mode user need compared with
High latency, and requirement of real-time is lower.(2) RTSP streaming needs less buffer time, can be realized in downloading
Video is played, but the video file that such mode needs network availability bandwidth to be persistently higher than video code rate, especially this mode is logical
Carry out data transmission frequently with insecure udp protocol, the problems such as client is easy to appear frame-skipping, splashette.
Summary of the invention
The technical problem to be solved by the present invention is to overcome problem described above, provide a kind of based on the adaptive of QKD network
Answer key distribution mechanism.
In order to solve the above-mentioned technical problems, the present invention provides the following technical solutions:
The present invention provides a kind of adaptive cipher key distribution mechanisms based on QKD network, including three kinds of key strategies, respectively
Be: one is used alone classic key;Two are used alone quantum key;Three fusions use quantum key and classic key, the amount of avoiding
Sub-key generating rate is lower and leads to not meet the conditions of demand to size of key, when classic key is used alone, uses
Diffie-Hellman agreement establishes classic key session in exchange both sides, continues uninterruptedly to negotiate classic key, and be stored in
Classic key table, and being stored in final key list, when quantum key is used alone, key storage that quantum channel generates in
Quantum key table, and be stored in final key list, when fusion is using quantum key and classic key, in classical channel
Quantum key access and extension mechanism are added in security strategy, thus propose two kinds of classic keys and quantum key convergence strategy,
The shared key of the necessary wildcard of data transmission procedure, the session key of data encryption algorithm, hmac algorithm is generated, and
It is stored in final key list.
As a preferred technical solution of the present invention, the key that the quantum channel generates is passed by the quantum channel
Transport to quantum key server, the output end connection quantum key reservoir and quantum key table of the quantum key, the amount
The output end of sub-key server connects the quantum encryption communication terminal with input terminal, the quantum encryption communication terminal it is defeated
Outlet connection classic key table and classic key reservoir, the quantum reservoir and the classic key reservoir pass through key
Convergence strategy connects the final key list, and the quantum key table and the classic key table pass through the key convergence strategy
Connect the final key list.
As a preferred technical solution of the present invention, the key convergence strategy passes through N number of classic key and M is a
The quantum key that QKD system generates is calculated according to predetermined operation mode, new key is obtained, to extend final cipher key number
Amount.
As a preferred technical solution of the present invention, the classic key table, quantum key storage table and described
Each key in final key list is numbered with N bit, and from 0 to 2N- 1, the key of generation is deposited since the 0th article
Storage, until the last item 2N- 1 and then it is recycled to the 0th article of record, and covers no longer valid key.
As a preferred technical solution of the present invention, when handling high data throughput confidential transactions and low number is being handled
When according to handling capacity confidential transactions, i.e., user's failed call high security level that is, one-time pad is taken, it can only in key lifetimes
Transmit a message.
As a preferred technical solution of the present invention, the data encrypted using key need to carry key in the table
Number, be decrypted so that corresponding key can be found in recipient.
The beneficial effects obtained by the present invention are as follows being: the present invention is specified for video, the audio-frequency information of downloading playing-type for it
Candidate block encryption algorithm: AES, 3DES, IDEA, SM1, SMS4, Twofish, video, audio-frequency information for RTSP streaming,
Guarantee high real-time, therefore the lower Encryption Algorithm of computation complexity can be chosen, to guarantee higher encryption and decryption rate, needle
To the video/audio information of RTSP streaming, for its specified candidate Encryption Algorithm: AES, SM1, SMS4, RC4, Rabbit,
ChaCha20, Serpent compare video, audio-frequency information, data volume for text information, such as Email, control information
It is smaller, requirement of real-time is lower, this patent for such application distribution symmetric encipherment algorithm mainly according to the peace required by itself
Full property rank, therefore, can be for its specified candidate Encryption Algorithm: DES, AES, SM1, SMS4, Twofish, this patent be according to business
Type takes the symmetric encipherment algorithm for data message the mode of preferential recommendation, realizes that the adaptive refinement of application drive is calculated
Method selection proposes the feature for multimedia messages such as video, image, audio, texts and its realizes the requirement of safe transmission, mentions
For corresponding candidate Encryption Algorithm set of strategies, so that communicating pair is held consultation, communicating pair is determining that encryption policy confirms
After selecting the contents such as algorithm and key, the requirement according to user to encryption safe rank determines key convergence strategy, last vector
Quantum key distribution server-side application corresponds to the key of digit, and the data encrypted using key need to carry key in the table
Number, is decrypted to find corresponding key in recipient.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention
It applies example to be used to explain the present invention together, not be construed as limiting the invention.In the accompanying drawings:
Fig. 1 is structural schematic diagram of the invention;
Fig. 2 is side structure schematic view of the invention.
Specific embodiment
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings, it should be understood that preferred reality described herein
Apply example only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Embodiment 1
As shown in Figs. 1-2, the present invention provides a kind of adaptive cipher key distribution mechanisms based on QKD network, including three kinds close
Key strategy is respectively: one is used alone classic key;Two are used alone quantum key;Three fusions use quantum key and classics
Key avoids quantum key generating rate lower and leads to not meet the conditions of demand to size of key, is used alone classical close
When key, using Diffie-Hellman agreement, classic key session is established in exchange both sides, continues uninterruptedly to negotiate classical close
Key, and it is stored in classic key table, and be stored in final key list, when quantum key is used alone, quantum channel is generated
Key storage in quantum key table, and be stored in final key list, when fusion is using quantum key and classic key,
Quantum key access and extension mechanism are added in the security strategy of classical channel, thus propose that two kinds of classic keys and quantum are close
Key convergence strategy generates data transmission procedure necessary wildcard, the session key of data encryption algorithm, hmac algorithm
Shared key, and it is stored in final key list, in high speed business network, quantum key production rate is major influence factors, when
User is specified to be used alone quantum key, but quantum key is at code rate is lower or quantum key production rate takes less than quantum key
It when dosage, needs to be extended quantum key, reaches specified requirement, be used alone close involved in quantum key convergence strategy
The specific method is as follows for key amplification: (such as according to predetermined operation mode by N number of classic key and the quantum key of M QKD system generation
Exclusive or, phase and operation) it is calculated, new key is obtained, to extend final number of keys.
The key throughput subchannel transmission that quantum channel generates to quantum key server, the output end of quantum key connects
Quantum key reservoir and quantum key table are connect, the output end of quantum key server connects quantum encryption communication end with input terminal
End, the output end connection classic key table and classic key reservoir, quantum reservoir and classics of quantum encryption communication terminal are close
Key reservoir connects final key list by key convergence strategy, and quantum key table and classic key table pass through key convergence strategy
Connect final key list.
Key convergence strategy by by N number of classic key and M QKD system generation quantum key according to predetermined operation mould
Formula is calculated, and new key is obtained, and to extend final number of keys, is added according to type of service to for the symmetrical of data message
Close algorithm takes the mode of preferential recommendation, realizes the adaptive refinement algorithms selection of application drive.
Each key in classic key table, quantum key storage table and final key list is compiled with N bit
Number, from 0 to 2N- 1, the key of generation is stored since the 0th article, until the last item 2N- 1 and then it is recycled to the 0th article of record, and
Cover no longer valid key.
When handling high data throughput confidential transactions and when handling low data throughout confidential transactions, i.e., user does not want
It seeks high security level that is, takes one-time pad, a message can only be transmitted in key lifetimes.
The data encrypted using key, need to carry the number of key in the table, to find pair in recipient
The key answered is decrypted.
The device is a kind of adaptive cipher key distribution mechanisms based on QKD network, and the present invention provides a kind of based on QKD first
The adaptive cipher key distribution mechanisms of network, including three kinds of key strategies are respectively: one is used alone classic key;Two individually make
Use quantum key;Three fusions use quantum key and classic key, avoid quantum key generating rate lower and lead to not full
The sufficient conditions of demand to size of key, the key throughput subchannel transmission that wherein quantum channel generates to quantum key server,
Quantum key is stored in quantum key reservoir and quantum key table, and it is whole that quantum key server connects quantum encryption communication
End, quantum encryption communication terminal connect classic key table and classic key reservoir, quantum reservoir and classic key reservoir
Final key list is connected by key convergence strategy, quantum key table and classic key table are stored in most by key convergence strategy
Whole key list, the requirement of feature and its realization safe transmission for multimedia messages such as video, image, audio, texts, provides
Corresponding candidate's Encryption Algorithm set of strategies, so that communicating pair is held consultation, for video, the audio-frequency information of downloading playing-type
(as downloading film, load play voice), for its specified candidate block encryption algorithm: AES, 3DES, IDEA, SM1, SMS4,
Twofish;Video, audio-frequency information for RTSP streaming, it is ensured that high real-time, therefore can choose computation complexity it is lower plus
Close algorithm flows RTSP (Real Time Streaming Protocol) with guaranteeing higher encryption and decryption rate
The video/audio information (such as live streaming, video conference) of formula, for its specified candidate Encryption Algorithm: AES, SM1, SMS4, RC4,
Rabbit, ChaCha20, Serpent compare video, audio-frequency information for text information, such as Email, control information,
Data volume is smaller, requirement of real-time is lower, for such application distribution symmetric encipherment algorithm mainly according to the peace required by itself
Therefore full property rank can be its specified candidate Encryption Algorithm: DES, AES, SM1, SMS4, Twofish etc.;So this patent root
The mode that preferential recommendation is taken the symmetric encipherment algorithm for data message according to type of service, realizes the adaptive of application drive
Encryption Algorithm selection;In some time interval, the data throughout sended and received meets Poisson process for data center.Periodically
The data throughout that statistical data center is handled in set time domestic demand obtains Poisson model relevant parameter.Based on the mathematical modulo
Type, can predict the variation tendency of data throughout of lower a moment by the network data throughput at current time, and according to
Family in the demand and cipher key store of security level size of key dynamic regulation key lifetimes and used Encryption Algorithm,
When handling the general service of high data throughput, according to the quantity of key in cipher key store, dynamic shortens the life cycle of key,
Adaptively choose efficient Encryption Algorithm;When handling the general service of low data throughout, according to key in cipher key store
Quantity, dynamic extend key lifetimes, adaptively selected highly-safe Encryption Algorithm;In processing high data throughput secret
When business, i.e. user's failed call high security level (that is, taking one-time pad) can only transmit a report in key lifetimes
Text.A large amount of keys can be consumed at this time, need the quantum key by generating N number of classic key and M QKD system according to predetermined
Operation mode is calculated, and new key is obtained, and reaches key demand to extend the method for cipher key spreading of final number of keys
Amount;When handling low data throughout confidential transactions, i.e. user's failed call high security level (that is, taking one-time pad), key
A message can only be transmitted in life cycle, and is preferentially encrypted using the strategy of quantum key.It at this time can be relative to 3.4
Less key is consumed, it can be by the quantum key that generates N number of classic key and M QKD system according to predetermined operation mode
It is calculated, obtains new key, reach key demand to extend the method for cipher key spreading of final number of keys, use is close
The data of key encryption, need to carry the number of key in the table, carry out to find corresponding key in recipient.
The beneficial effects obtained by the present invention are as follows being: the present invention is specified for video, the audio-frequency information of downloading playing-type for it
Candidate block encryption algorithm: AES, 3DES, IDEA, SM1, SMS4, Twofish, video, audio-frequency information for RTSP streaming,
Guarantee high real-time, therefore the lower Encryption Algorithm of computation complexity can be chosen, to guarantee higher encryption and decryption rate, needle
To the video/audio information of RTSP streaming, for its specified candidate Encryption Algorithm: AES, SM1, SMS4, RC4, Rabbit,
ChaCha20, Serpent compare video, audio-frequency information, data volume for text information, such as Email, control information
It is smaller, requirement of real-time is lower, this patent for such application distribution symmetric encipherment algorithm mainly according to the peace required by itself
Full property rank, therefore, can be for its specified candidate Encryption Algorithm: DES, AES, SM1, SMS4, Twofish, this patent be according to business
Type takes the symmetric encipherment algorithm for data message the mode of preferential recommendation, realizes that the adaptive refinement of application drive is calculated
Method selection proposes the feature for multimedia messages such as video, image, audio, texts and its realizes the requirement of safe transmission, mentions
For corresponding candidate Encryption Algorithm set of strategies, so that communicating pair is held consultation, communicating pair is determining that encryption policy confirms
After selecting the contents such as algorithm and key, the requirement according to user to encryption safe rank determines key convergence strategy, last vector
Quantum key distribution server-side application corresponds to the key of digit, and the data encrypted using key need to carry key in the table
Number, is decrypted, method and mechanism proposed by the present invention ensure that data to find corresponding key in recipient
The safety of transmission and the renewal frequency for improving session key.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention,
Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features.
All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention
Within protection scope.
Claims (6)
1. a kind of adaptive cipher key distribution mechanisms based on QKD network, which is characterized in that including three kinds of key strategies, be respectively:
One is used alone classic key;Two are used alone quantum key;Three fusions use quantum key and classic key, avoid quantum close
Key generating rate is lower and leads to not meet the conditions of demand to size of key, when classic key is used alone, using Diffie-
Hellman agreement establishes classic key session in exchange both sides, continues uninterruptedly to negotiate classic key, and is stored in classical close
Key table, and be stored in final key list, when quantum key is used alone, the key storage that quantum channel generates is close in quantum
Key table, and be stored in final key list, when fusion is using quantum key and classic key, in the safe plan of classical channel
The access of addition quantum key and extension mechanism, thus propose two kinds of classic keys and quantum key convergence strategy in slightly, generate number
According to the shared key of the necessary wildcard of transmission process, the session key of data encryption algorithm, hmac algorithm, and it is stored in
Final key list.
2. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 1, which is characterized in that described
The key that quantum channel generates is transmitted to quantum key server by the quantum channel, and the output end of the quantum key connects
Quantum key reservoir and quantum key table are connect, the output end of the quantum key server connects the quantum with input terminal and adds
Close communication terminal, the output end connection classic key table and classic key reservoir of the quantum encryption communication terminal, the amount
Sub- reservoir connects the final key list, the quantum key table by key convergence strategy with the classic key reservoir
The final key list is connected by the key convergence strategy with the classic key table.
3. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 2, which is characterized in that described
Key convergence strategy is by counting the quantum key of N number of classic key and the generation of M QKD system according to predetermined operation mode
It calculates, new key is obtained, to extend final number of keys.
4. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 1, which is characterized in that described
Each key in classic key table, the quantum key storage table and the final key list is compiled with N bit
Number, from 0 to 2N- 1, the key of generation is stored since the 0th article, until the last item 2N- 1 and then it is recycled to the 0th article of record, and
Cover no longer valid key.
5. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 1, which is characterized in that locating
When managing high data throughput confidential transactions and when handling low data throughout confidential transactions, i.e. user's failed call high security level
That is, one-time pad is taken, a message can only be transmitted in key lifetimes.
6. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 1, which is characterized in that use
The data of key encryption, need to carry the number of key in the table, carry out to find corresponding key in recipient
Decryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910210923.2A CN109889340A (en) | 2019-03-19 | 2019-03-19 | A kind of adaptive cipher key distribution mechanisms based on QKD network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910210923.2A CN109889340A (en) | 2019-03-19 | 2019-03-19 | A kind of adaptive cipher key distribution mechanisms based on QKD network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109889340A true CN109889340A (en) | 2019-06-14 |
Family
ID=66933090
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910210923.2A Withdrawn CN109889340A (en) | 2019-03-19 | 2019-03-19 | A kind of adaptive cipher key distribution mechanisms based on QKD network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109889340A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110262908A (en) * | 2019-06-21 | 2019-09-20 | 珠海格力电器股份有限公司 | A kind of processing method and processing device of shear plate data |
CN110535634A (en) * | 2019-07-12 | 2019-12-03 | 江苏宇太网智科技有限公司 | Audio-video transmission system based on quantum cryptography |
CN111835997A (en) * | 2020-07-15 | 2020-10-27 | 济南慧云量子科技有限公司 | Cloud video conference system based on quantum key encryption and decryption method thereof |
CN111901553A (en) * | 2020-07-16 | 2020-11-06 | 南京百家云科技有限公司 | Data encryption and decryption method, device, equipment, server and storage medium |
CN113328849A (en) * | 2021-05-24 | 2021-08-31 | 清华大学 | Key obtaining method and device |
CN114499834A (en) * | 2021-12-20 | 2022-05-13 | 北京邮电大学 | Internet of things quantum key distribution method and system, electronic equipment and storage medium |
CN115190217A (en) * | 2022-07-07 | 2022-10-14 | 国家计算机网络与信息安全管理中心 | Data security encryption method and device fusing self-coding network |
CN115314270A (en) * | 2022-07-29 | 2022-11-08 | 国网浙江省电力有限公司宁波供电公司 | Power business hierarchical encryption method and communication method based on quantum key |
CN115567201A (en) * | 2022-09-22 | 2023-01-03 | 矩阵时光数字科技有限公司 | Adaptive terminal quantum encryption and decryption method and system thereof |
-
2019
- 2019-03-19 CN CN201910210923.2A patent/CN109889340A/en not_active Withdrawn
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110262908A (en) * | 2019-06-21 | 2019-09-20 | 珠海格力电器股份有限公司 | A kind of processing method and processing device of shear plate data |
CN110535634A (en) * | 2019-07-12 | 2019-12-03 | 江苏宇太网智科技有限公司 | Audio-video transmission system based on quantum cryptography |
CN110535634B (en) * | 2019-07-12 | 2020-04-14 | 江苏宇太网智科技有限公司 | Audio and video transmission system based on quantum encryption |
CN111835997A (en) * | 2020-07-15 | 2020-10-27 | 济南慧云量子科技有限公司 | Cloud video conference system based on quantum key encryption and decryption method thereof |
CN111901553A (en) * | 2020-07-16 | 2020-11-06 | 南京百家云科技有限公司 | Data encryption and decryption method, device, equipment, server and storage medium |
CN113328849A (en) * | 2021-05-24 | 2021-08-31 | 清华大学 | Key obtaining method and device |
CN114499834A (en) * | 2021-12-20 | 2022-05-13 | 北京邮电大学 | Internet of things quantum key distribution method and system, electronic equipment and storage medium |
CN114499834B (en) * | 2021-12-20 | 2024-05-14 | 北京邮电大学 | Internet of things quantum key distribution method, system, electronic equipment and storage medium |
CN115190217A (en) * | 2022-07-07 | 2022-10-14 | 国家计算机网络与信息安全管理中心 | Data security encryption method and device fusing self-coding network |
CN115190217B (en) * | 2022-07-07 | 2024-03-26 | 国家计算机网络与信息安全管理中心 | Data security encryption method and device integrating self-coding network |
CN115314270A (en) * | 2022-07-29 | 2022-11-08 | 国网浙江省电力有限公司宁波供电公司 | Power business hierarchical encryption method and communication method based on quantum key |
CN115567201A (en) * | 2022-09-22 | 2023-01-03 | 矩阵时光数字科技有限公司 | Adaptive terminal quantum encryption and decryption method and system thereof |
CN115567201B (en) * | 2022-09-22 | 2024-04-19 | 矩阵时光数字科技有限公司 | Self-adaptive terminal quantum encryption and decryption method and system thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109889340A (en) | A kind of adaptive cipher key distribution mechanisms based on QKD network | |
CN108092769B (en) | Quantum cipher network reliable encryption transmission system and method | |
CN101232368B (en) | Method for distributing media stream cryptographic key and multimedia subsystem | |
CN106452741B (en) | The communication system and communication means of the transmission of information encryption and decryption are realized based on quantum network | |
CN109768987A (en) | A kind of storage of data file security privacy and sharing method based on block chain | |
CN110213652B (en) | Audio and video data transmission method and device and storage medium | |
CN108965302A (en) | Media data transmission system, method, apparatus and storage medium | |
KR102368749B1 (en) | System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth | |
EP2426852B1 (en) | Method and system for implementing secure forking calling session in ip multi-media subsystem | |
WO2009143765A1 (en) | Key distributing method, public key of key distribution centre online updating method and device | |
CN100583989C (en) | Media stream transmission method | |
CN101313510A (en) | Media stream key management method, system and application server | |
Wang et al. | A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes | |
CN104618387B (en) | SIP signaling is used for the method for safe quantum communication system, Integrated access quantum gateway and system | |
CN101330379A (en) | Method and apparatus for down distributing cryptographic key | |
US20230208615A1 (en) | Online-Streamer Image Model File Transmission in Co-Hosting During Livestreaming | |
CN108847928A (en) | The communication system and communication means of the transmission of information encryption and decryption are realized based on group's type quantum key card | |
CN101222320B (en) | Method, system and device for media stream safety context negotiation | |
CN108040269A (en) | A kind of method and system of video monitoring system key agreement, computer | |
CN100438614C (en) | Method for realizing distributing asymmetric video conference safety system | |
CN107846567A (en) | A kind of SRTP capability negotiations method and conference terminal | |
JP2005295468A (en) | Communication device and communication system | |
CN101222612A (en) | Method and system for safely transmitting media stream | |
CN115589288A (en) | Method for realizing end-to-end VoIP encrypted communication based on quantum key pre-charging | |
CN101729535B (en) | Implementation method of media on-demand business |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190614 |
|
WW01 | Invention patent application withdrawn after publication |