CN202121593U - Mobile encryption system based on quantum key distribution network - Google Patents

Mobile encryption system based on quantum key distribution network Download PDF

Info

Publication number
CN202121593U
CN202121593U CN201120230944XU CN201120230944U CN202121593U CN 202121593 U CN202121593 U CN 202121593U CN 201120230944X U CN201120230944X U CN 201120230944XU CN 201120230944 U CN201120230944 U CN 201120230944U CN 202121593 U CN202121593 U CN 202121593U
Authority
CN
China
Prior art keywords
quantum
key
terminal
distribution network
key distribution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN201120230944XU
Other languages
Chinese (zh)
Inventor
潘建伟
陈增兵
彭承志
陈腾云
江晓
赵勇
赵梅生
Original Assignee
SHANDONG INSTITUTE OF QUANTUM SCIENCE AND TECHNOLOGY Co Ltd
Anhui Quantum Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG INSTITUTE OF QUANTUM SCIENCE AND TECHNOLOGY Co Ltd, Anhui Quantum Communication Technology Co Ltd filed Critical SHANDONG INSTITUTE OF QUANTUM SCIENCE AND TECHNOLOGY Co Ltd
Priority to CN201120230944XU priority Critical patent/CN202121593U/en
Application granted granted Critical
Publication of CN202121593U publication Critical patent/CN202121593U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The utility model discloses a mobile encryption system based on a quantum key distribution network. The mobile encryption system comprises the quantum key distribution network. The quantum key distribution network comprises a plurality of quantum concentration control stations, wherein each quantum concentration control station is communicated with at least one quantum terminal; and the quantum terminal is communicated with a mobile terminal or a non-mobile user through a key updating interface. The mobile encryption system adopts the quantum key distribution network to distribute and share keys and can be distribute large-volume random keys, so that the encryption algorithm does not need the multiple-matrix multiplication algorithm, and the algorithm quantity of encryption is greatly lightened. In addition, the large data quantity random keys can be provided by the distribution of quantum keys, and highly-safety digital signature can be carried out on the data stream.

Description

Mobile encrypted system based on the quantum-key distribution network
Technical field
The utility model belongs to the mobile communication equipment field of encryption, particularly a kind of mobile encrypted system based on the quantum-key distribution network.
Background technology
Mobile communication is encrypted and is all used symmetric encipherment algorithm to encrypt at present, and encryption key is produced through some randomness algorithms by the random number that takes place in preset key and the communication process.And in communication process, using the current key encrypted new key, the opposing party who sends to communication realizes encryption key distribution and renewal.Cryptographic security quite depends critically upon algorithm, in case and certain ciphering process be decrypted, then all from now on communication of user all will be decrypted.There has been the cryptanalysis expert to claim to crack easily the coded communication of gsm communication standard.The development of novel account form, for example cloud computing makes that it will be more and more littler obtaining high-performance calculation ability cost for domestic consumer, so the cryptographic capabilities of GSM standard seems fragile more.The communication of GSM standard at present still receives widely-used.Though 3G standard mobile phone security performance is higher, still there is defective in theory in its fail safe, and especially, when signal was more weak, the 3G standard mobile phone of compatible GSM can automatically switch to the GSM standard.Therefore, at present general mobile communication cryptographic capabilities is a wretched insufficiency for the higher user of security level required.
The quantum-key distribution technology is emerging in recent years a kind of novel communication encryption means, utilizes the quantum state coded message on the single photon level, and communicating pair can be shared a large amount of random keys.Because single photon is indivisible on physical principle, quantum state can not be cloned, so quantum-key distribution can not eavesdrop on physical principle, has the fail safe of present highest level.Quantum-key distribution is that (one-time pad, OTP) the mode enciphered data has been created possibility to " the One Time Pad " that application can not be decoded in the large scale network.But adopt the communication of single photon quantum state, a little less than the energy level, can't can not satisfy the requirement of mobile communication with the form transmission of broadcasting.Therefore, present quantum-key distribution technology also all can only be applied in the fiber optic network communication.
The utility model content
The advantage of native system binding capacity sub-key distribution network and classical mobile communications network provides a kind of novel mobile encrypted system, makes it to have concurrently the fail safe of quantum cryptography communication and the convenience of mobile communication.
The utility model provides a kind of mobile encrypted system based on the quantum-key distribution network, the unconditional security property guarantee travelling carriage coded communication safety of utilization sub-key subnetwork to the present situation of encryption of communicated data scarce capacity in the present mobile communication; This method can improve the fail safe of mobile encrypted communication effectively.
For realizing above-mentioned purpose, the utility model adopts following technical scheme:
A kind of mobile encrypted system based on the quantum-key distribution network; It comprises the quantum-key distribution network; The quantum-key distribution network comprises several quantum concentrator stations, each quantum concentrator station and at least one quantum terminal communication, and the quantum terminal is through key updating interface and communication of mobile terminal;
Wherein: be provided with storage medium and quantum cryptography module in the said portable terminal, the shared quantum key that storage medium stores is downloaded, the quantum cryptography module is used for data are encrypted; Quantum terminal and quantum concentrator station constitute the nodes at different levels of quantum communications network, and the coupled quantum terminal of quantum concentrator station generates the forwarding capability of sharing key and accomplishing ciphertext.
A kind of communication means of the mobile encrypted system based on the quantum-key distribution network, the performing step of this method is following:
Step1: at first mobile terminal registers is networked, obtain unique quantum ID (QID);
Step2: the portable terminal after the registration connects arbitrary quantum terminal through the key updating interface, and downloads the shared key of a certain size data volume to this quantum terminal to apply;
Step3: behind the mobile terminal downloads key, the quantum terminal passes to portable terminal with concentrator station address QIPT and upgrades, portable terminal with the concentrator station on this QIPT as the caller concentrator station;
Step4: after confirming the caller concentrator station, portable terminal is delivered to the caller concentrator station with ciphertext;
Step5: the caller concentrator station is sent to called concentrator station after ciphertext is encrypted again;
Step6: called concentrator station is sent to the called subscriber after ciphertext is encrypted again;
Step7: after called subscriber's deciphering obtains expressly, sign off;
Among the said step2; When the shared key of a certain size data volume was downloaded in application: authentication was carried out to portable terminal in the quantum terminal; After authentication is legal; If quantum terminal key quantity not sufficient then submits to portable terminal to keep connecting, download key behind the key that generation is enough between wait quantum terminal and the quantum concentrator station.
Among the said step4, ciphertext is carried out XOR calculating acquisition through quantum cryptography module invokes and isometric key and data self bit-by-bit of communication data.
Encrypted process is following again among the said step5: portable terminal is enclosed oneself caller quantum ID QID and called number to ciphertext, gives the caller concentrator station through mobile communications network; According to caller QID; The caller concentrator station calls corresponding secret key decryption; According to caller concentrator station and called concentrator station cipher key shared data decryption is encrypted again simultaneously, encrypted ciphertext sends to called concentrator station through classic network after data recombination again again.
Among the said step6, encrypted process is following again: called concentrator station is received after the ciphertext, with decrypt ciphertext, searches key according to called subscriber QID again, encrypts the line data reorganization back of going forward side by side once more and gives the called subscriber through mobile communications network.
The beneficial effect of the utility model is:
The first, in the method adopt the quantum-key distribution network allocation to share key, can distribute big capacity random key, make AES can adopt the OTP method, in cryptographic calculation, only need carry out an XOR add operation like this.Compare DES, A8 algorithm of using always in AES and the mobile communication or the like AES, this method is encrypted need not carry out the multiple matrix multiplying.Alleviated the operand of encrypting greatly.
The second, quantum-key distribution net distribution key can guarantee the key distribution fail safe of highest level;
Three, portable terminal can be freely on any quantum terminal new key more, kept the convenience of mobile communication to greatest extent.
In addition, the big data quantity random key that utilizes quantum-key distribution to provide can flow to the digital signature of line height safety to data.
Description of drawings
Fig. 1 is the workflow diagram of the utility model;
Fig. 2 is the general structural representation of quantum-key distribution network;
Fig. 3 portable terminal initial registration data encryption transfer process sketch map;
Fig. 4 is the system principle diagram of the utility model;
Fig. 5 is the internal structure sketch map of portable terminal.
Embodiment
Below in conjunction with accompanying drawing and embodiment the utility model is described further:
Mobile encrypted system based on the quantum-key distribution network comprises: portable terminal, the quantum cryptography module, key updating interface, quantum-key distribution network, registration center, the quantum-key distribution network terminal, the quantum-key distribution network concentrator station that are equipped with for portable terminal.The following quantum-key distribution network terminal is called for short the quantum terminal, and quantum-key distribution network concentrator station is called for short the quantum concentrator station.As shown in Figure 4, encryption system comprises the quantum-key distribution network, and the quantum-key distribution network comprises several quantum concentrator stations, each quantum concentrator station and a corresponding quantum terminal communication, and the quantum terminal is through key updating interface and communication of mobile terminal; Wherein: be provided with storage medium in the said portable terminal, the shared quantum key that storage is downloaded; Quantum terminal and quantum concentrator station constitute the nodes at different levels of quantum communications classic network, and the coupled quantum terminal of quantum concentrator station generates the forwarding capability of sharing key and accomplishing ciphertext.
The movable part that portable terminal, the quantum cryptography module that is equipped with for portable terminal and key updating interface constitute this method; Remainder is formed infrastructure portion.Be provided with storage medium in the portable terminal, can store the shared quantum key of download.Quantum terminal and quantum concentrator station constitute the nodes at different levels of quantum-key distribution network; The basic structure of quantum concentrator station is made up of one or several quantum terminals, key storage managing server and encryption devices, can generate the forwarding capability of sharing key and accomplishing ciphertext with coupled quantum terminal.Registration center inserts quantum-key distribution network through certain quantum terminal and obtains key, and the key that critical datas such as the quantum ID of mobile device when registration, identification data all use the quantum key distribution network to distribute is encrypted through classic network with the OTP mode and mail to registration center.
Be example with the process of accomplishing an encrypted short message communication between the portable terminal that uses this method from portable terminal initial registration to two below, the detailed embodiment of the utility model is described.
1. portable terminal initial registration: the portable terminal licence of need at first applying for the registration of, this licence is that length is the random number of 256 bits, the equipment of being authorized by registration center writes the quantum cryptography module of portable terminal.Portable terminal can connect arbitrary quantum terminal through the key updating interface afterwards; The quantum cryptography module of portable terminal is carried out authentication with the identification data that preset of fixed size in licence and the encrypting module to registration center, and the Wegman-Carter scheme is adopted in authentication.Registration center sends to portable terminal with the quantum ID at this terminal of unique sign and the new sub-communication network of identification data throughput after confirming that identity is errorless.And the telephone number of notifying the quantum terminal to read portable terminal returns registration center, registration center's its registration table of renewal.Registration table by quantity variable data cell form, each cell data structure is as shown in table 1,
Table 1. registry data structure
A1 A2 A3
A1: memory mobile terminal telephone number, fixed length 40 bits.
A2: storage quantum ID, fixed length 32 bits;
A3: storage identification data, 256 of regular lengths.
As shown in Figure 3, explain how registration center inserts the quantum-key distribution network through the quantum terminal and obtain key, guarantees the data transmission security of facility registration process.Add the crammed classic network with the OTP mode after critical datas such as the licence of device registration, identification data, telephone number are read by the quantum terminal and be transferred to registration center; The quantum-key distribution network then sends registration center to through the key that internodal shared keys at different levels such as quantum terminal, quantum concentrator station will be encrypted these critical datas, and the acquisition data can be deciphered by registration center.Otherwise the data that registration center issues are submitted portable terminal after delivering to the quantum terminal deciphering with the encryption of OTP cipher mode too.The fail safe of OTP cipher mode and quantum key distribution has guaranteed the safety of data transmission procedure.
Unregistered terminal need be registered through above step, for the terminal of having registered can in order to avoid
Go this step, directly carry out following steps.
2. portable terminal is registered and shared key and download: portable terminal lands quantum network with quantum ID and new identification data; On certain quantum terminal, apply for downloading the shared key of a certain size data volume through the key updating interface; Sharing key is shared by this quantum terminal and certain quantum concentrator station; It is 600 megabits that the data volume size is set in this instance, is equally divided into encryption key storehouse and decruption key storehouse.This size of key can satisfy continuous double-directional speech conversation of encrypting with the OTP mode more than 10 hours, and perhaps the short message of about ten thousand of 15-30 sends and encrypts, and the key of download is stored in the encrypting module.If shared the key greater than 600 megabits through quantum-key distribution between quantum concentrator station and the quantum terminal, then authentication is carried out to portable terminal in the quantum terminal, and the mobile terminal downloads key is agreed in the legal back of identity verification.If quantum terminal key quantity not sufficient is then carried out authentication to portable terminal, after authentication is legal, submit to portable terminal to keep connecting, download key behind the key that generation is enough between wait quantum terminal and the quantum concentrator station.Download and accomplish the identification data that portable terminal is upgraded at the post-registration center once more.The quantum concentrator station is with the corresponding shared key that is downloaded in the portable terminal quantum ID sign concentrator station; That part of shared key of encryption key in the corresponding portable terminal, concentrator station is called decruption key, and it is retained in the continuous address field; That part of shared key of decruption key in the corresponding portable terminal; Concentrator station is called encryption key, and it is retained in another continuous address field, does not allow other-end or communication process to use this part key.And set up registration form the beginning and end address information of key is noted with corresponding quantum ID.Registration form by quantity variable data cell form, each cell data structure is as shown in table 2,
Table 2. registration form data structure
B1 B2 B3 B4 B5
B1: storage quantum ID, fixed length 32 bits;
B2: storage encryption key first address, length is determined by memory;
B3: storage encryption key tail address, length is determined by memory;
B4: store decrypted key first address, length is determined by memory;
B5: store decrypted key tail address, length is determined by memory.
3. the foundation of temporary relation table and renewal: caller quantum concentrator station identifies by the shared key of its download with the quantum ID of portable terminal; This quantum ID is write registration form; And set up the binary array with this quantum ID and self quantum concentrator station address, identify temporary relation between this portable terminal and the concentrator station.Caller quantum concentrator station is submitted registration center with this temporary relation, supplies registration center to upgrade the temporary relation table.When having only in the registration form that after a quantum ID is landing, appears at concentrator stations different when landing with last time, just new temporary relation can occur, at this moment, registration center upgrades the temporary relation table.The temporary relation table by quantity variable data cell form, each cell data structure is as shown in table 3,
Table 3. temporary relation list data structure
C1 C2
C1: storage quantum ID, regular length 32 bits;
C2: memory space subclass control station address, regular length 20 bits.
4. registration is nullified: registration center notifies corresponding concentrator station that the quantum ID that incidence relation is disengaged is deleted from registration form according to the renewal of temporary relation table immediately, and abandons the key of this quantum ID sign.
5. the caller concentrator station is established: behind the mobile terminal downloads key, the quantum terminal is with concentrator station address (QIPT)
Passing to portable terminal upgrades.Portable terminal with the concentrator station on this quantum concentrator station address QIPT as the caller concentrator station.
6. data encryption: the short message data that portable terminal will send is expressly through the quantum cryptography module encrypt; The quantum cryptography module is called in the encryption key storehouse with isometric key and data self bit-by-bit of communication data and is carried out XOR calculating, and the result is ciphertext.Used key is promptly abandoned, and re-uses never.Low level reads to a high position in proper order from the address in the use of key, during sign off, and the record address of reading, the start address that key reads when communicating by letter next time.Used key is promptly abandoned, and re-uses never.
7. data recombination and transmission: portable terminal is enclosed the quantum ID (being called caller quantum ID QID) of oneself and the number (being called called number) of terminal called at the data head of ciphertext, sends to the caller concentrator station through mobile communications network.
8. ciphertext is transmitted: the caller concentrator station can obtain calling terminal number, caller quantum ID and called number after the mobile communications network data sent is changed; According to caller quantum ID; The caller concentrator station can call corresponding secret key decryption in the decruption key storehouse; In registration table, inquire about the corresponding quantum ID of this number according to called number to registration center again, registration center inquires about the temporary relation table again and confirms that there are the quantum concentrator station (being called called concentrator station) of interim incidence relation in current and the corresponding quantum ID of called number.The caller concentrator station is with called concentrator station cipher key shared data decryption being encrypted again; Encryption method is with identical described in the step 6; Again encrypted ciphertext is enclosed rear subscriber number, caller quantum ID, called quantum ID again, sends to called concentrator station through classic network.
9. mobile network's ciphertext is transmitted: called concentrator station is received after the ciphertext, with decrypt ciphertext, searches key according to called subscriber's quantum ID again, encloses caller quantum ID after encrypting again with encryption key and gives the called subscriber through mobile communications network.
As shown in Figure 2, in the quantum distribution network, between quantum terminal and its upper level quantum concentrator station, share key through the method generation of quantum-key distribution at any time between concentrator station and the concentrator station, supply various communication services to use.The encryption and decryption data between concentrator station through ciphertext is transmitted, and can accomplish the classical data encryption communication between any two quantum terminals.
10. data decryption: after called user terminal is received ciphertext, can use the decruption key of storage to solve expressly.The also convertible role of called subscriber initiates step 5-9, can realize two-way communication.
So just accomplish once communication, in order to guarantee that this communication means can repeat, following step after need carrying out.
11. registration form is upgraded: behind the sign off, the first address that concentrator station will remain key accordingly writes registration form.
12. the not enough alarm of key: after each communication, the quantum cryptography module will be checked the residue size of key.In this example, when size of key in certain key store less than 30,000,000 the time, provide the not enough prompting of residue size of key, if size of key is less than 10 megabits, the key in this key store of terminal updating is reminded in then alarm.
13. key freshness alarm: in this instance, the quantum cryptography module lives forever the key of downloading and store up 30 days as encrypting use most.Key memory time since the last time successfully downloads key and calculates, and after key went beyond the time limit in certain key store, encrypting module was reminded the terminal updating key to this key store alarm.
14. key updating: only when alarming, upgrade fully, portable terminal connects the quantum terminal through the key updating interface and lands the new key of quantum network application download.After getting permission, the key of its sign of the concentrator station of registration deletion when the portable terminal last time lands, portable terminal is then abandoned whole old keys in the key store of being alarmed, and writes new key.
Above step is carried out repetitive cycling, can realize the secure communication of high level of security.
Adopt the quantum-key distribution network allocation to share key in this utility model, can distribute big capacity random key, make AES can adopt the OTP method.In cryptographic calculation, only an XOR add operation need be carried out like this, and repeatedly matrix multiplication operation need be do not carried out.Alleviated the operand of encrypting greatly.Simplify the cryptographic calculation algorithm, not only effectively lowered the structural complexity of encrypting module, and when improving fail safe, lowered corresponding cost.
It will be understood by those skilled in the art that top specific descriptions just in order to explain the purpose of the utility model, are not to be used to limit the utility model.The protection range of the utility model is limited claim and equivalent thereof.

Claims (1)

1. mobile encrypted system based on the quantum-key distribution network; It is characterized in that; It comprises the quantum-key distribution network; The quantum-key distribution network comprises several quantum concentrator stations, each quantum concentrator station and at least one quantum terminal communication, and the quantum terminal is through key updating interface and portable terminal or non-moving telex network;
Wherein: be provided with storage medium and quantum cryptography module in the said portable terminal, the shared quantum key that storage medium stores is downloaded, the quantum cryptography module is used for data are encrypted; Quantum terminal and quantum concentrator station constitute the nodes at different levels of quantum communications network, and the coupled quantum terminal of quantum concentrator station generates the forwarding capability of sharing key and accomplishing ciphertext.
CN201120230944XU 2011-07-01 2011-07-01 Mobile encryption system based on quantum key distribution network Expired - Lifetime CN202121593U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201120230944XU CN202121593U (en) 2011-07-01 2011-07-01 Mobile encryption system based on quantum key distribution network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201120230944XU CN202121593U (en) 2011-07-01 2011-07-01 Mobile encryption system based on quantum key distribution network

Publications (1)

Publication Number Publication Date
CN202121593U true CN202121593U (en) 2012-01-18

Family

ID=45462629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201120230944XU Expired - Lifetime CN202121593U (en) 2011-07-01 2011-07-01 Mobile encryption system based on quantum key distribution network

Country Status (1)

Country Link
CN (1) CN202121593U (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196425A (en) * 2011-07-01 2011-09-21 安徽量子通信技术有限公司 Quantum-key-distribution-network-based mobile encryption system and communication method thereof
CN103051444A (en) * 2012-12-31 2013-04-17 安徽问天量子科技股份有限公司 Quantum security digital terminal applied to PSTN (Public Switched Telephone Network)
CN104918243A (en) * 2015-06-15 2015-09-16 上海交通大学 Mobile terminal secrecy system and method based on quantum true random number
US20160127127A1 (en) * 2013-06-08 2016-05-05 Quantumctek Co., Ltd. Mobile secret communications method based on quantum key distribution network
CN106452740A (en) * 2016-09-23 2017-02-22 浙江神州量子网络科技有限公司 Quantum communication service station, quantum key management device, key configuration network, and key configuration method
CN106789052A (en) * 2017-03-28 2017-05-31 浙江神州量子网络科技有限公司 A kind of remote cipher key based on quantum communication network issues system and its application method
CN106953729A (en) * 2017-04-14 2017-07-14 江苏亨通问天量子信息研究院有限公司 Satellite communication encryption system and method based on quantum key
CN107682155A (en) * 2017-11-15 2018-02-09 浙江神州量子通信技术有限公司 The application system of quantum key in power distribution terminal communication access net
CN108462573A (en) * 2018-02-09 2018-08-28 中国电子科技集团公司第三十研究所 A kind of flexible quantum safety moving communication means
CN109961149A (en) * 2019-03-22 2019-07-02 清华大学 A kind of addressing control system
US11513418B2 (en) 2019-03-22 2022-11-29 Tsinghua University Addressing system, addressing apparatus and computing apparatus

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196425A (en) * 2011-07-01 2011-09-21 安徽量子通信技术有限公司 Quantum-key-distribution-network-based mobile encryption system and communication method thereof
CN103051444A (en) * 2012-12-31 2013-04-17 安徽问天量子科技股份有限公司 Quantum security digital terminal applied to PSTN (Public Switched Telephone Network)
US20160127127A1 (en) * 2013-06-08 2016-05-05 Quantumctek Co., Ltd. Mobile secret communications method based on quantum key distribution network
US9654287B2 (en) * 2013-06-08 2017-05-16 Quantumctek Co., Ltd. Mobile secret communications method based on quantum key distribution network
CN104918243B (en) * 2015-06-15 2018-04-10 上海交通大学 Mobile terminal secrecy system and method based on quantum true random number
CN104918243A (en) * 2015-06-15 2015-09-16 上海交通大学 Mobile terminal secrecy system and method based on quantum true random number
CN106452740B (en) * 2016-09-23 2019-11-22 浙江神州量子网络科技有限公司 A kind of quantum communications service station, quantum key managing device and cipher key configuration network and method
CN106452740A (en) * 2016-09-23 2017-02-22 浙江神州量子网络科技有限公司 Quantum communication service station, quantum key management device, key configuration network, and key configuration method
CN106789052A (en) * 2017-03-28 2017-05-31 浙江神州量子网络科技有限公司 A kind of remote cipher key based on quantum communication network issues system and its application method
CN106789052B (en) * 2017-03-28 2020-06-05 浙江神州量子网络科技有限公司 Remote key issuing system based on quantum communication network and use method thereof
CN106953729A (en) * 2017-04-14 2017-07-14 江苏亨通问天量子信息研究院有限公司 Satellite communication encryption system and method based on quantum key
CN107682155A (en) * 2017-11-15 2018-02-09 浙江神州量子通信技术有限公司 The application system of quantum key in power distribution terminal communication access net
CN108462573A (en) * 2018-02-09 2018-08-28 中国电子科技集团公司第三十研究所 A kind of flexible quantum safety moving communication means
CN108462573B (en) * 2018-02-09 2020-10-23 中国电子科技集团公司第三十研究所 Flexible quantum secure mobile communication method
CN109961149A (en) * 2019-03-22 2019-07-02 清华大学 A kind of addressing control system
CN109961149B (en) * 2019-03-22 2021-05-04 清华大学 Addressing control system
US11513418B2 (en) 2019-03-22 2022-11-29 Tsinghua University Addressing system, addressing apparatus and computing apparatus

Similar Documents

Publication Publication Date Title
CN102196425B (en) Quantum-key-distribution-network-based mobile encryption system and communication method thereof
CN202121593U (en) Mobile encryption system based on quantum key distribution network
US9825919B2 (en) Public key encryption algorithms for hard lock file encryption
CN109412794B (en) Quantum key automatic charging method and system suitable for power business
CN103795533B (en) Encryption based on identifier, the method and its performs device of decryption
CN109145568A (en) A kind of full algorithm cipher card and its encryption method based on PCI-E interface
CN102572817B (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN101635924B (en) CDMA port-to-port encryption communication system and key distribution method thereof
CN104780040A (en) Handheld device encryption method and system based on quantum cryptography
CN109525390A (en) Quantum key wireless dispatch method and system for terminal device secret communication
CN101720071A (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN101917710A (en) Method, system and related device for mobile internet encryption communication
CN107454590A (en) A kind of data ciphering method, decryption method and wireless router
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN103533539A (en) Virtual SIM (subscriber identity module) card parameter management method and device
CN104809407A (en) Method and system for encrypting, decrypting and verifying cloud storage front end data
CN102571321A (en) Data encryption transmission method and device
CN109600725A (en) A kind of message encryption method based on SM9 algorithm
CN102223231A (en) Machine-to-machine (M2M) terminal authentication system and M2M terminal authentication method
CN113612608A (en) Method and system for realizing cluster encryption of dual-mode interphone based on public network
CN104602208B (en) A kind of SMS encryption communication means based on mobile network
CN112507296A (en) User login verification method and system based on block chain
CN102958021A (en) Short message encryption and decryption communication system and communication method thereof
CN105119719A (en) Key management method of secure storage system
CN103813272A (en) Cluster group calling downlink transmission method

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP02 Change in the address of a patent holder

Address after: 230088 D3, Hefei Innovation Industrial Park, No. 800 Wangjiang West Road, hi tech Zone, Anhui, China

Patentee after: Anhui Liangzi Communication Technology Co., Ltd.

Patentee after: Shandong Institute of Quantum Science and Technology Co., Ltd.

Address before: 230000, building 2, 3, Hefei Road, Tianyuan Road, hi tech Zone, Anhui, 102

Patentee before: Anhui Liangzi Communication Technology Co., Ltd.

Patentee before: Shandong Institute of Quantum Science and Technology Co., Ltd.

C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 230088 D3, Hefei Innovation Industrial Park, No. 800 Wangjiang West Road, hi tech Zone, Anhui, China

Patentee after: QUANTUM COMMUNICATION TECHNOLOGY CO., LTD.

Patentee after: Shandong Institute of Quantum Science and Technology Co., Ltd.

Address before: 230088 D3, Hefei Innovation Industrial Park, No. 800 Wangjiang West Road, hi tech Zone, Anhui, China

Patentee before: Anhui Liangzi Communication Technology Co., Ltd.

Patentee before: Shandong Institute of Quantum Science and Technology Co., Ltd.

CX01 Expiry of patent term

Granted publication date: 20120118

CX01 Expiry of patent term