CN102812664A - Method and apparatus for establishing an electrical connection and establishing a fiber optic connection - Google Patents

Method and apparatus for establishing an electrical connection and establishing a fiber optic connection Download PDF

Info

Publication number
CN102812664A
CN102812664A CN2010800656839A CN201080065683A CN102812664A CN 102812664 A CN102812664 A CN 102812664A CN 2010800656839 A CN2010800656839 A CN 2010800656839A CN 201080065683 A CN201080065683 A CN 201080065683A CN 102812664 A CN102812664 A CN 102812664A
Authority
CN
China
Prior art keywords
encryption key
equipment
receive
optical fiber
battery
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010800656839A
Other languages
Chinese (zh)
Other versions
CN102812664B (en
Inventor
A·尼斯卡宁
J·基维奥亚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Technologies Oy
Original Assignee
Nokia Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Oyj filed Critical Nokia Oyj
Publication of CN102812664A publication Critical patent/CN102812664A/en
Application granted granted Critical
Publication of CN102812664B publication Critical patent/CN102812664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Optical Communication System (AREA)

Abstract

An apparatus for sending or receiving a cryptographic key through a fiber optic connection may include a fiber optic module (80) for sending or receiving the cryptographic key and converting the cryptographic key from or to electronic data. The cryptographic key may be stored in a memory device (76). A cryptography module (82) may allow the apparatus to securely transmit sensitive data. The apparatus may send or receive the cryptographic key through a fiber optic connection (18) which may include a data cable. The apparatus may include a battery (78) which is charged through an electrical connection (16) such as through a power cable. The apparatus may in some embodiments be embodied in a charger (12) for a user terminal (50a), or in the user terminal (50a) itself.

Description

Be used to set up and be electrically connected and set up the method and apparatus that optical fiber is connected
Technical field
Embodiments of the invention relate generally to connect to send and/or receive encryption key through optical fiber, and be particularly related to a kind of be configured to set up be electrically connected and set up equipment and the method that optical fiber is connected.
Background technology
For providing more simply or message transmission and facility faster, telecommunications industry service provider is just continually developing the improvement to the existing communication network.So radio communication has become reliable day by day in recent years.Along with the expansion and the improvement of cordless communication network, the portable terminal that is used for radio communication is also updated.In this respect, part goes up because the reduction of size and cost at least, along with the raising of battery life and computing capability, portable terminal become ability more, be easier to use and acquisition more at an easy rate.Because the universal essence of present portable terminal, the people of institute's has age and level of education is just using portable terminal and other people or contact person to communicate by letter, receive service and/or shared information, medium and other content.
Because the ability that portable terminal enlarges, portable terminal just are being used to a lot of functions that it also is not used to before now.During these use some relate to the communication of responsive in essence data.For example, online bank, Email, company's communication, health are used, official's government communication is like that possibly all relate to transmission and receive sensitive data.Correspondingly, develop the encryption solution and protected sensitive data.In the solution that has realized some depend on discrete mathematics and scheme, for example Rivest, Shamir and Adleman (RSA) AES.Although can think the at present enough usefulness of said algorithm, cannot think that it is following proof, mean that it possibly not be in the future still safe.For example, one of rsa encryption following the threat is, quantum computer possibly arrive with classical crack can also be developed maybe, although currently do not think that any is known.
The unique encryption method that is considered to provable security is that one-time pad is encrypted.One-time pad is encrypted to relate to and is used the random key of maintaining secrecy that data are carried out encryption and decryption.For the highest possible safe dose, for each necessary position that has corresponding encryption key of data, although some repetition of key can still keep the enough protections to some application.Correspondingly, transmit encryption key and can relate to mass data.Further, encryption key should be by transmission safely.Correspondingly, the optical fiber representative is used for a kind of possibility solution of traffic encryption key.Yet, can bring unrealistic for portable terminal at the optical fiber transmitting data.
Summary of the invention
Therefore provide and to have allowed encryption key to connect the method and apparatus that is sent out or receives through optical fiber.In certain embodiments, when said encryption key was sent out or receives or transmits, battery can be recharged.
In one exemplary embodiment, a kind of improved equipment comprises interface.Said interface is configured to: foundation is electrically connected, and set up optical fiber and connect, and, connect transmission or receive encryption key through said optical fiber, and through said being electrically connected battery is charged simultaneously.
In certain embodiments, said equipment further is configured to, and sends or receive said encryption key via the quantum cryptography distribution.Further, said encryption key can be the one-time pad encryption key.Said equipment can be configured in addition, control or detection quantum mechanics photon attribute.In certain embodiments, said encryption key is configured to, have more than or equal to long position, expection sensitive data position long, thereby battery need not repeat said encryption key before being exhausted.Equally, said equipment can further be configured to, and said storing encryption key is directed to memory devices.
In further exemplary embodiment, a kind of improved equipment also comprises interface.Said equipment is configured to: foundation is electrically connected; Set up optical fiber and connect, connect through said optical fiber and send or receive encryption key, and; Provide to be configured to the output that is electrically connected the electric power that battery is charged through said, and the transmission of said encryption key is provided simultaneously.
In certain embodiments, said equipment further is configured to, and sends or receive said encryption key via the quantum cryptography distribution.Further, said encryption key can be the one-time pad encryption key.Said equipment can be configured in addition, control or detection quantum mechanics photon attribute.In certain embodiments, said encryption key is configured to, have more than or equal to long position, expection sensitive data position long, thereby before said battery is exhausted, need not repeat said encryption key.Equally, said equipment can further be configured to, and said storing encryption key is directed to memory devices.
In an other exemplary embodiment, a kind of method comprises: foundation is electrically connected, and sets up optical fiber and connects, and connect transmission or reception encryption key through said optical fiber, and through said being electrically connected battery is charged simultaneously.
In certain embodiments, sending or receive said encryption key comprises via quantum cryptography distribution and sends or receive said encryption key.Equally, said encryption key can be the one-time pad encryption key.Further, sending or receive said encryption key via the quantum cryptography distribution can comprise control or detect quantum mechanics photon attribute.Said method can also comprise, said encryption key is configured to have more than or equal to long position, expection sensitive data position long, thereby before said running down of battery, need not repeat said encryption key.Equally, said method may further include, and said storing encryption key is directed to memory devices.
In a further exemplary embodiment; A kind of method comprises: foundation is electrically connected; Set up optical fiber and connect, connect through said optical fiber and send or receive encryption key, and; Provide to be configured to the output that is electrically connected the electric power that battery is charged through said, and the transmission of said encryption key is provided simultaneously.
In certain embodiments, sending or receive said encryption key comprises via quantum cryptography distribution and sends or receive said encryption key.Equally, said encryption key can be the one-time pad encryption key.Further, sending or receive said encryption key via the quantum cryptography distribution can comprise control or detect quantum mechanics photon attribute.Said method can also comprise, said encryption key is configured to have more than or equal to long position, expection sensitive data position long, thereby before said running down of battery, need not repeat said encryption key.Equally, said method may further include, and said storing encryption key is navigated to memory devices.
Correspondingly, embodiments of the invention can provide through optical fiber and connect the reception to encryption key.
Description of drawings
Generally described embodiment of the present disclosure thus, referring now to accompanying drawing, wherein accompanying drawing needn't draw in proportion, and wherein:
Fig. 1 shows the schematic block diagram according to the system of one exemplary embodiment of the present invention;
Fig. 2 show the equipment that is used for connect sending or receive encryption key through optical fiber when this device body now according to the user terminal of one exemplary embodiment of the present invention in the time schematic block diagram;
Fig. 3 show the equipment that is used for connect sending or receive encryption key through optical fiber when this device body now according to the charger of one exemplary embodiment of the present invention in the time schematic block diagram; And
Fig. 4 shows the flow chart of illustrative methods that is used to send or receive encryption key according to one exemplary embodiment of the present invention.
Embodiment
To be described in detail with reference to the attached drawings some embodiment of the present invention hereinafter now, wherein, shown in the drawings more of the present invention but be not whole embodiment.In fact, various embodiment of the present invention can embody with many different forms, and not will be understood that it is limited to the embodiment that sets forth here.Carry throughout, like numerals will is meant similar units.When using herein, term " data ", " content ", " information " and similar terms can be used in reference to such data interchangeably, and said data can be transmitted, receive and/or store according to embodiments of the invention.In addition, term " exemplary " not for passing on any qualitative evaluation to provide, and instead only is used to pass on the illustration of example when using herein.Thus, not will be understood that spirit and the scope that the use of any said term is limited embodiments of the invention.
When using herein, term " circuit " refers to (a) only circuit realization (for example using the realization of analog circuit and/or digital circuit) of hardware; (b) combination of circuit and computer program; Said computer program comprises and is stored in one or software and/or the firmware instructions in the multicomputer readable memory more that said circuit and computer program turn round together and cause equipment to implement one or greater functionality described herein; And (c) circuit of the part of microprocessor or microprocessor for example, it needs software or firmware in order to turn round, even said software or firmware physically do not occur.The definition of " circuit " is applicable to the whole uses that are included in any claim this term here.As further example, when with herein the time, term " circuit " also comprises such realization, and said realization comprises one or more multiprocessor and/or its part and software of following and/or firmware.As another example, term " circuit " is when for example also comprising the base band integrated circuit that is used for mobile phone or the similar integrated circuit of application processor integrated circuit or server, cellular network device, other network equipment and/or other computing equipment with herein the time.
Point out that as top embodiments of the invention can embody with method and apparatus, said method and apparatus is configured to connect through optical fiber and sends and/or receive encryption key.In this respect, for example, Fig. 1 shows can be from the block diagram of the system that embodiments of the invention are benefited.Yet should be appreciated that the described system of shown and hereinafter only is can be from the example of the system that embodiments of the invention are benefited, and therefore not will be understood that the scope of restriction embodiments of the invention.
As shown in fig. 1, can comprise user terminal 10 according to the system implementation example of one exemplary embodiment of the present invention.User terminal 10 can be any in fixing or the mobile communication and/or the computing equipment of many types, for example portable digital-assistant (PDA), beep-pager, mobile TV, mobile phone, game station, kneetop computer, personal computer (PC), camera, shooting mobile phone, video tape recorder, audio/video player, broadcast receiver, global positioning system (GPS) equipment or above that mention and other type voice that embodies embodiments of the invention and the combination in any of text communication system.
User terminal 10 can be configured to communicate with one or more equipment.In certain embodiments, user terminal 10 can communicate with sensitive data disseminator 20.Sensitive data disseminator 20 can comprise the equipment that is configured to receive and/or send with user terminal sensitive data.Sensitive data is when referring to herein the time arbitrarily and whole such data, and for said data, said data become can be with possibly being worthless to non-expection recipient.For example, bank data, user name, password, healthcare information, Email, company communicate by letter, government communication is like that can comprise sensitive data in some cases.Further, other communication is in some cases simply because the privacy consideration can comprise sensitive data.Thus, in some cases, sensitive data disseminator 20 can comprise user terminal, server, work station, other computing equipment.
Communicating by letter between user terminal 10 and the sensitive data disseminator 20 can directly or via network 30 take place in certain embodiments.Network 30 can comprise can be via the set of the wired of correspondence and/or various different nodes, equipment or function that wave point communicates with one another.Like this, the example of Fig. 1 be appreciated that system discrete cell general schematic view and nonsystematic or network 30 comprehensively or the example of detailed view.Although it is inessential; But in certain embodiments, network 30 can support to meet any one or more communication in many first generation (1G), the second generation (2G), 2.5G, the third generation (3G), 3.5G, 3.9G, the 4th generation (4G) mobile communication protocol, the Long Term Evolution (LTE) etc.Thus, network 30 can be cellular network, mobile network and/or the data network of Local Area Network, metropolitan area network (MAN) and/or wide area network (WAN) for example, for example is the Internet.Then, for example the miscellaneous equipment of processing unit (for example personal computer, server computer etc.) can be included in the network 30 or be coupled to it.Through directly or indirectly user terminal 10 and miscellaneous equipment being connected to network 30; User terminal and/or miscellaneous equipment can be for example communicated with one another according to the numerous communication protocols that comprise HTTP(Hypertext Transport Protocol) etc., communicate by letter or other function so that realize the various of portable terminal 10 and miscellaneous equipment thus respectively.Like this, user terminal 10 and miscellaneous equipment can and/or be communicated each other through any and network 30 in numerous different access mechanisms.For example; Can support the for example mobile access mechanism of WCDMA (W-CDMA), CDMA2000, global system for mobile communications (GSM), general packet radio service (GPRS) etc.; And the fixedly access mechanism of wireless access mechanism and for example DSL (DSL), cable modem, the Ethernet etc. of WLAN (WLAN), inserting of microwave worldwide interconnection (WiMAX), WiFi, ultra broadband (UWB), Wibree technology etc. for example.Thus, for example, network 30 can be home network or other network that the local connection is provided.
System may further include encryption key distributor 40, and this encryption key distributor 40 can be communicated by letter with sensitive data disseminator 20 with user terminal 10.Encryption key distributor 40 is configured to, and shares to be used for encryption key that sensitive data is encrypted.In one embodiment, encryption key distributor 40 can utilize one-time pad to encrypt and generate the one-time pad encryption key.Correspondingly, encryption key distributor 40 can be created encryption key at random.In one embodiment, the encryption key distributor can comprise the quantum mechanics random number generator.In other embodiments, encryption key distributor 40 can receive encryption key, and then itself and another equipment is shared.
Yet encryption key must be offered the equipment that is just communicating safely, so that safely this communication is encrypted.Correspondingly, system can utilize optical fiber to transmit encryption key.In certain embodiments, optical fiber can provide the safety method that transmits key.For example, can transmit encryption key via the quantum cryptography distribution that is also referred to as quantum key distribution or the quantum cryptography of other type.As further example, can use the for example agreement of BB84 (Bennett Brassard) and E91 (Ekert) or other modification.The particular feature of quantum cryptography distribution is that the equipment of two communications can detect attempts obtaining the third-party appearance to the visit of encryption key.Because, can be possible so visit is detected for the necessary common EVAC of the measuring process to quantized system of access encrypted key.Thus, through using quantum stack or quantum entanglement and transmitting information with quantum state, can realize such communication system, said communication system can detect eavesdropping, and is detecting the transmission that stops encryption key under the situation of eavesdropping.
Correspondingly, can carry out equipment that safe sensitive data transmits therebetween and set up optical fiber and be connected with being desirably in encryption key distributor 40.In this respect, first optical cable 42 can be set up encryption key distributor 40 and is connected with optical fiber between the sensitive data disseminator 20.Further, second optical cable 44 can be set up from the optical fiber of encryption key distributor 40 to user terminal 10 and connect.
Yet as directed, second optical cable 44 cannot directly extend to user terminal 10.But as directed, user terminal 10 can be connected to encryption key distributor 40 via charger 12.Charger 12 is configured to user terminal 10 provides electric power, and can be the battery charge of user terminal 10.Charger 12 can be connected to power supply 14 thus, and power supply 14 can be the industrial power of generator for example.Thus, charger can be connected to power supply 14 through the supply socket on power circuit and the final wall.Through power cable 16 electric power offered user terminal 10 thereafter.Charger 12 further is connected to user terminal 10 through data cable 18.In certain embodiments, data cable 18 can comprise optical fiber, but in other embodiments, data cable can comprise that USB cable maybe can transmit the cable of other type of electronic data.Further, although power cable 16 must be illustrated by vague generalization with data cable 18, and be used as two independent cables and describe, in certain embodiments, power cable 16 and data cable 18 can comprise the part of whole cable.
Thus, use above-described system between user terminal 10 and sensitive data disseminator 20, to set up safety and is connected, this is through the use encryption key encryption and decryption to be carried out in communication therebetween.In the exemplary embodiment, providing can be by the equipment 50a of the equipment of the exemplary embodiment of embodiment of the present invention use, 50b (general designation 50).Equipment 50 can for example be presented as arbitrarily such equipment, said equipment trustship, comprises, controls or otherwise comprise user terminal 10 or charger 12.Yet embodiment can also be embodied on a plurality of miscellaneous equipments, and for example, wherein the instance of equipment 50 can be embodied on the network 30.Like this, Fig. 2 and 3 equipment 50 only are examples, and can comprise than the parts shown in Fig. 2 and 3 and more Duoing or in some cases still less.
About Fig. 2 and 3, equipment 50 is configured to connect transmission and/or receive encryption key through optical fiber further.As shown in Figure 2, equipment 50a is such embodiment, and in this embodiment, said equipment can be trustship, comprise, control or otherwise comprise the equipment of user terminal 10.Thus, equipment 50a can comprise processor 70, user interface 72, communication interface 74 and memory devices 76 or otherwise communicate by letter with it.Memory devices 76 can comprise for example volatibility and/or nonvolatile memory.In certain embodiments, memory devices 76 can comprise solid-state memory equipment.Memory devices 76 can be configured to stored information, data, file, application, instruction etc.For example, memory devices 76 can be configured to buffer memory input data so that handled by processor 70.In addition or replacedly, memory devices 76 can be configured to store instruction so that carried out by processor 70.As another replaceable item again, memory devices 76 can be in a plurality of databases or the memory location of stored information and/or media content.
Processor 70 can embody with many different modes.For example; Processor 70 can be presented as in the various treatment facilities one or more; Said treatment facility for example is coprocessor, microprocessor, controller, digital signal processor (DSP), the treatment circuit that has or do not have the DSP that encloses or various other treatment facility, and said other treatment facility comprises the for example integrated circuit of ASIC (application-specific integrated circuit (ASIC)), FPGA (field programmable gate array), hardware accelerator, dedicated computing machine chip etc.In another embodiment, processor 70 can be configured to execution command, and said instruction storage is in memory devices 76 or otherwise addressable to processor 70.Replacedly or in addition, processor 70 can be configured to carry out the function of hard coded.Like this; No matter dispose through hardware or software approach or through its combination; Processor 70 can be represented such entity (for example physically being embodied in the circuit), and said entity can be implemented to operate according to an embodiment of the invention when having carried out corresponding configuration.Thus, for example when processor 70 is presented as ASIC, FPGA etc., processor 70 can be by special configuration be used to implement the hardware of operation described herein.Replacedly, as another example, when processor 70 was presented as the actuator of software instruction, instruction can be configured to processor 70 specially, when instruction is performed, implements algorithm described herein and/or operation.Yet; In some cases; Processor 70 can be the processor of particular device (for example, the portable terminal or the network equipment of server for example), wherein; Through by the instruction that is used to implement algorithm described herein and/or operation processor 70 further being disposed, it is suitable for utilizing embodiments of the invention.Processor 70 can be particularly including clock, ALU (ALU) and is configured to support the gate of the running of processor 70.
Meanwhile; Communication interface 74 can be any such equipment, said equipment for example be embodied in be configured to from/receive and/or transmit equipment or circuit the combination of hardware, software or hardware and software of data to network and/or any miscellaneous equipment of communicating by letter or module with equipment 50a.Support hardware and/or software that this this respect, communication interface 74 can comprise antenna (for example a plurality of antenna) for example and be used to enable communicate with cordless communication network (for example network 30).In fixed environment, communication interface 74 can be replacedly or is also supported wire communication.Like this, communication interface 74 can comprise communication modem and/or be used for supporting other hardware/software via cable, DSL (DSL), USB (USB), Ethernet, high-definition media interface (HDMI) or other machine-processed communication.In addition; Communication interface 74 can comprise be used for supporting that for example is infrared, the hardware and/or the software of the communication mechanism of UWB, WiFi etc.; Wherein, said communication mechanism just day by day with provide family to be connected solution to combine to be used.
User interface 72 can be communicated by letter with processor 70, so as to be received in user's indication of user interface place input and/or provide to the user can listen, visible, mechanics or other output.Like this, user interface 72 can comprise for example keyboard, mouse, joystick, display, touch-screen, microphone, loud speaker or other I/O mechanism.
In certain embodiments, equipment 50a may further include battery 78.Thus, for example, equipment 50a can use the 16 pairs of batteries 78 of power cable from charger 12 to charge.Further, charger 12 can be connected to equipment 50a through data cable 18.In certain embodiments, data cable 18 can comprise optical cable, and therefore charger 12 can comprise optical fiber connector 12a, and optical fiber connector 12a can for example be used for data cable 18 is connected to second optical cable 44 from Fig. 1.Correspondingly, equipment 50a can comprise optic module 80, and this optic module 80 can comprise the part of communication interface 74 in certain embodiments.Optic module 80 can comprise reflector, detector, optical device and related electric equipment, and said electric equipment is configured to connect via optical fiber and sends and/or receive signal, and to from electric data transaction signal.For example, optic module 80 sends among the embodiment of data therein, and optic module can comprise the reflector that is used for single photon or other low light level signal.As further example, when optic module 80 was configured to receive data, it can comprise single photon detector, avalanche photodide and other photon parts.When optic module 80 sends and receive encryption key, its can comprise in these parts some or all.Thus, for example in certain embodiments, optic module 80 can be configured to emission or detect photon, and controls or detect its polarization, and enables to carry out via transmission or the reception of quantum cryptography distribution to encryption key.Yet, except that control or detect the photon polarization, be to be understood that like those skilled in the art can use the operation of other degree of freedom, the said degree of freedom for example is the phase place that allows to utilize conjugation quantum variable.Thus, in certain embodiments, optic module 80 can be configured to, and controls the quantum mechanics photon attribute of for example photon polarization or phase place.Should be pointed out that in certain embodiments, can make use up or dipped beam single photon or optical fiber in other electromagnetic weak signals.Further, in certain embodiments, what wavelength can be near visible light, and in certain embodiments, wavelength can be in INFRARED SPECTRUM.
When equipment 50a is configured to receive encryption key, can for example receive encryption key from encryption key distributor 40.In case use optic module 80 to receive encryption key through optical fiber, encryption key can be stored in the memory devices 76.After this, encryption key can be used to use 82 pairs of communications of encrypting module to carry out encryption and decryption thus.Encrypting module 82 can be embodied by processor or other computing equipment.In addition or replacedly, encryption key generation module 84 can generate encryption key, and this encryption key is sent to for example encryption key distributor 40, so that be distributed to for example sensitive data disseminator 20 miscellaneous equipment.Encryption key generator module 84 can be embodied by processor 70 or other computing equipment.Thus, even when communication connect not to take place via optical fiber, can use communication interface 74 to take place with secured fashion with communicating by letter of for example sensitive data disseminator 20.For example, the secure communication between equipment 50a and the sensitive data disseminator 20 can take place via network 30, and in certain embodiments, at least a portion of communication can wirelessly take place.Yet owing to the use like above-described encryption key, communication can still keep safety.
In alternative embodiment, as shown in Figure 3, equipment 50b can be trustship, comprise, control or otherwise comprise the equipment of charger 12.Equipment 50b can comprise from the parts of the equipment 50a of Fig. 2 some or all or otherwise communication with it, said parts comprise processor 70, communication interface 74 and memory devices 76.Equipment 50b may further include power converter 86, and this power converter 86 is connected to power supply 14, and therefore can be used for charging through the battery 78 of 16 pairs of user terminals 10 of power cable.Yet in certain embodiments, the charging of battery 78 can wirelessly occur.
In this embodiment, equipment 50b can comprise optic module 80.Thus, reflector, detector, optical device and be configured to be connected the related electric equipment that sends and/or receive data can comprise the charger 12 among this embodiment except that the part of user terminal 10 or as its replacement a part via optical fiber.Further, equipment 50b therein this equipment create among the embodiment of encryption key and can also comprise encryption key generator module 84.Correspondingly, in the present embodiment, can send or receive encryption key to encryption key distributor 40 through second optical cable 44 from it, and, use optic module 80 from/to electric data transaction encryption key.In some cases, after encryption key was received and converts into electric data, encryption key can directly be sent to user terminal 10.Yet in other cases, equipment 50b can be configured to, and connects through optical fiber to receive encryption key, and encryption key is being transferred to user terminal 10 storage encryption key before then.Replacedly, equipment 50b can use encryption key generator module 84 to generate encryption key, and encryption key is being transferred to user terminal 10 storage encryption key before then.For example, equipment 50b can be stored in encryption key in the memory devices 76.Thus, in certain embodiments, equipment 50b can be connected storage encryption key before with user terminal 10.For example, as user during away from equipment 50b, equipment can receive or generate encryption key, and encryption key is stored in the memory devices 76.After this, when the user was connected to charger 12 (as its embodiment device 50b time) with user terminal 10, equipment can be thus charges to the battery 78 of user terminal, and simultaneously encryption key is sent to user terminal.For example therein charge time of cost of battery 78 is less than from encryption key distributor 40 and receives under the situation of time of encryption keys cost, this can be used.
About the encryption key transmission of slave unit 50b to user terminal 10, this can take place through data cable 18.Although data cable 18 here by vague generalization be described as being used for slave unit 50b to user terminal 10 traffic encryption keys, this can need not to be the situation among the whole embodiment in the present charger 12 of device body wherein.For example; Because optic module 80 converts encryption key into electric data in equipment 50b; And encryption key generator module 84 can generate key with electric data mode; Equipment can use the method for other known transmission data to transmit data thus, for example wirelessly encryption key is transferred to user terminal 10 through communication interface 74.Yet, wirelessly transmit data and can reduce the encryption key safety of transmission of slave unit 50b in some cases to user terminal 10.In case encryption key is received by user terminal 10 slave unit 50b, user terminal can use encrypting module 82 to communicate by letter with for example sensitive data disseminator 20 miscellaneous equipment safely thus, and wherein, encrypting module 82 is embodied in the user terminal in this embodiment.
Aspect the method related, can use the embodiment of above-described equipment 50 or other embodiment of equipment with embodiments of the invention.In this respect, Fig. 4 is the flow chart of system, method and program product according to exemplary embodiment of the present invention.Be to be understood that; The combination of each frame of flow chart and the frame in the flow chart can realize by various device, said equipment for example be hardware, firmware, processor, circuit and/or with comprise one or the related miscellaneous equipment of execution of the software of multicomputer program command more.For example, in the above-described process or more can the embodiment by the computer program that comprises computer program instructions.In this respect, the computer program instructions that embodies above-described process can be by the memory device for storing of equipment, and is carried out by the processor of equipment.As will be appreciated that; Any said computer program instructions can be loaded into computer or be used for producing other programmable device of machine (for example hardware), thereby the computer that produces or other programmable device embody the equipment of the function that is used for the appointment of realization flow frame.These computer program instructions can also be stored in the computer-readable memory; Computer-readable memory can vectoring computer or other programmable device turn round with ad hoc fashion; Thereby the instruction that is stored in the computer-readable memory produces product; Wherein, the function of appointment in the execution realization flow frame of this product.Computer program instructions can also be loaded in computer or other programmable device; Produce computer implemented process so that cause sequence of operations on computer or other programmable device, to be implemented, thus the function of appointment in the instruction realization flow frame of on computer or other programmable device, carrying out.
Correspondingly, the frame support of flow chart is used to the combination implementing the equipment of appointed function and be used to implement the program command of appointed function.It is also understood that of flow chart or the combination of more frames or flow chart center can be realized by the special-purpose hardware based computer system of implementing appointed function or the combination of specialized hardware and computer instruction.
In this respect, one embodiment comprises of method is electrically connected in the foundation of operation 100 places, and sets up the optical fiber connection at operation 102 places.Method further comprises, connects transmission or receives encryption key through optical fiber at 104 places.For example when method is undertaken by user terminal 10, send or receive the operation 104 of encryption key and can carry out simultaneously through being electrically connected battery charged with operation 110 places.When using herein, be meant that simultaneously wherein two or more operate the situation that it is overlapping in time that makes.Yet, in certain embodiments, send or receive the operation 104 of encryption key and can locate beginning with the 110 essentially identical times of the operation that battery is charged.Further, in alternative embodiment, for example when method was undertaken by charger 12, operating 104 places provided the electric power output that is configured to battery is charged to provide the transmission of encryption key to carry out simultaneously with operation 116 places.
In certain embodiments, the operation 104 of transmission or reception encryption key can be included in 106 places and send or receive encryption key via the quantum cryptography distribution.As above-described, the quantum cryptography distribution can be used on optical fiber connects, detecting eavesdropping.As operate 108 places and state, in certain embodiments, operate can the comprising control or detect quantum mechanics photon attribute of 106 places via quantum cryptography distribution transmission or reception encryption key.In addition or replacedly, in certain embodiments, encryption key can be an one time key.
In certain embodiments, method may further include, at operation 112 places, encryption key is configured to have more than or equal to long position, expection sensitive data position long, thereby before battery is exhausted, do not need the repetition encryption key.Few long the same long with the position that is transmitted data through the encryption key position is grown to, as above-described, transfer of data can be safer.Thus, for example, encryption key can be configured to be long enough to sensitive data whole of expection between battery 78 each chargings by user terminal 10 transmission are encrypted, and this can confirm through experiment in certain embodiments.In certain embodiments, method may further include, and 114 places are directed to memory devices with storing encryption key in operation.
In one exemplary embodiment, a kind ofly be used to implement the method for Fig. 4 and the equipment of above-described other method can comprise, be configured to implement some or each the processor (for example processor 70) in the above-described operation (100-116).Processor can for example be configured to, through implementing hard-wired logic function, carrying out each the algorithm that instructions stored or execution be used for implementation and operation and come implementation and operation (100-116).Replacedly, equipment can comprise each the assembling that is used for implementing above-described operation.In this respect; According to an exemplary embodiment, the example that is used for the equipment of implementation and operation 100-116 can for example comprise processor 70, user interface 72, communication interface 74, memory devices 76, battery 78, optic module 80, encryption key generator module 84 or power converter 86 and/or be processed device to be carried out and is used to handle the algorithm like above-described information.Yet the part of the equipment of describing about the operation of method shown in Fig. 4 above 50 only is an example, and should be appreciated that various other embodiment can be possible.Further, as will be described below, depend on employed specific embodiment, for example having used the equipment 50a from Fig. 2 still is from the equipment 50b of Fig. 3, and the project equipment that is used for implementation and operation can be different.
In certain embodiments, set up the operation 100 that is electrically connected and can be implemented by the for example equipment of power cable 16, wherein, power cable 16 can be connected to charger 12 with user terminal 10.About setting up the operation 102 that optical fiber connects simultaneously, for example when equipment 50b was embodied in the charger 12, this can be implemented by the for example equipment of second optical cable 44.Yet; When equipment 50a is embodied in the user terminal 10; Data cable is used for setting up the equipment that optical fiber connects and comprises data cable 18, because among the embodiment therein in the present user terminal of device body, can comprise like above-described optical cable at operation 102 places.Further, the operation 104 of transmission or reception encryption key in certain embodiments can be by the equipment of for example optic module 80 and is implemented by communication interface 74 further.In addition; The operation 106,108 of sending or receive encryption key and control or detection photonic quantum mechanical attribute via the quantum cryptography distribution in certain embodiments can be in addition by the equipment of for example optic module 80 and further by communication interface 74 enforcements; And in addition or replacedly, implement by the equipment of for example processor 70.
Can implement by the equipment of for example battery 78 and/or power cable 16 through being electrically connected the operation 110 that battery is charged.When charger 12 is just implementing to provide the operation 110 of the output that is configured to battery is charged, can electrification cable 16 and power converter 86.On the contrary, when operation 110 that user terminal 10 is just being implemented battery is charged, processor 70 can use and be configured to logic that battery 78 is charged.Further, thus encryption key is configured to have more than or equal to long position, expection sensitive data position is long did not need the operation 112 of repetition encryption key to be implemented by the equipment of for example processor 70 and/or encryption key generator module 84 before running down of battery.The operation 114 that storing encryption key is directed to memory devices can be implemented by the equipment of for example memory devices 76.In addition, the transmission that operating 116 places provides encryption key can be implemented by communication interface 74 when equipment 50b is embodied in the charging 12, and is implemented by the equipment of for example processor 70 in addition or replacedly.For example, charger 12 can be sent to user terminal 10 with encryption key.
Many modifications of the invention of here setting forth or other embodiment will be obvious for those skilled in the art in the invention, the benefit of the instruction that appears in having aforementioned specification and scheming.Therefore, should be appreciated that the present invention will be not limited to disclosed specific embodiment, and revise with other embodiment and be intended to be included in the scope of accompanying claims.In addition; Although aforementioned specification and accompanying drawing have been described exemplary embodiment in the context of the particular example combination of unit and/or function; But will be appreciated that, under the situation of the scope that does not break away from accompanying claims, the various combination of unit and/or function can be provided by alternative embodiment.In this respect, for example, also be conceived to, can in some of accompanying claims, be set forth with top those different unit and/or the function combinations of clearly describing.Although particular term is used herein, it only is on general reference and descriptive sense and not owing to the restriction purpose is used.

Claims (24)

1. equipment that comprises interface is configured to:
Foundation is electrically connected;
Setting up optical fiber connects; And
Connect transmission or receive encryption key through said optical fiber, and through said being electrically connected battery is charged simultaneously.
2. according to the equipment of claim 1, further be configured to, sent or receive said encryption key via the quantum cryptography distribution.
3. according to the equipment of claim 2, wherein, said encryption key is the one-time pad encryption key.
4. according to the equipment of claim 2, further be configured to control or detection quantum mechanics photon attribute.
5. according to the equipment of claim 1, wherein, said encryption key is configured to have more than or equal to long position, expection sensitive data position long, thereby before said battery is exhausted, need not repeat said encryption key.
6. according to the equipment of claim 1, further be configured to, said storing encryption key is directed in the memory devices.
7. equipment that comprises interface is configured to:
Foundation is electrically connected;
Setting up optical fiber connects;
Connect transmission or receive encryption key through said optical fiber; And
Provide to be configured to be electrically connected the electric power output that battery is charged, and the transmission of said encryption key is provided simultaneously through said.
8. according to the equipment of claim 7, further be configured to, sent or receive said encryption key via the quantum cryptography distribution.
9. according to Claim 8 equipment, wherein, said encryption key is the one-time pad encryption key.
10. according to Claim 8 equipment further is configured to, control or detect quantum mechanics photon attribute.
11. according to the equipment of claim 7, wherein, said encryption key is configured to have more than or equal to long position, expection sensitive data position long, thereby before said battery is exhausted, need not repeat said encryption key.
12. according to the equipment of claim 7, further be configured to, said storing encryption key be directed in the memory devices.
13. a method comprises:
Foundation is electrically connected;
Setting up optical fiber connects; And
Connect transmission or receive encryption key through said optical fiber, and through said being electrically connected battery is charged simultaneously.
14., wherein, send or receive said encryption key and comprise via quantum cryptography distribution and send or receive said encryption key according to the method for claim 13.
15. according to the method for claim 14, wherein, said encryption key is the one-time pad encryption key.
16., wherein, send or receive said encryption key via the quantum cryptography distribution and comprise control or detect quantum mechanics photon attribute according to the method for claim 14.
17. the method according to claim 13 further comprises, said encryption key is configured to have more than or equal to long position, expection sensitive data position long, thereby before said battery is exhausted, need not repeat said encryption key.
18. the method according to claim 13 further comprises, said storing encryption key is directed in the memory devices.
19. a method comprises:
Foundation is electrically connected;
Setting up optical fiber connects;
Connect transmission or receive encryption key through said optical fiber; And
Provide to be configured to be electrically connected the electric power output that battery is charged, and the transmission of said encryption key is provided simultaneously through said.
20., wherein, send or receive said encryption key and comprise via quantum cryptography distribution and send or receive said encryption key according to the method for claim 19.
21. according to the method for claim 20, wherein, said encryption key is the one-time pad encryption key.
22., wherein, send or receive said encryption key via the quantum cryptography distribution and comprise control or detect quantum mechanics photon attribute according to the method for claim 20.
23. the method according to claim 19 further comprises, said encryption key is configured to have more than or equal to long position, expection sensitive data position long, thereby before said battery is exhausted, need not repeat said encryption key.
24. the method according to claim 19 further comprises, said storing encryption key is directed to memory devices.
CN201080065683.9A 2010-03-24 2010-03-24 For setting up the method and apparatus being electrically connected and setting up Fiber connection Active CN102812664B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2010/000662 WO2011117664A1 (en) 2010-03-24 2010-03-24 Method and apparatus for establishing an electrical connection and establishing a fiber optic connection

Publications (2)

Publication Number Publication Date
CN102812664A true CN102812664A (en) 2012-12-05
CN102812664B CN102812664B (en) 2015-11-25

Family

ID=44672488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201080065683.9A Active CN102812664B (en) 2010-03-24 2010-03-24 For setting up the method and apparatus being electrically connected and setting up Fiber connection

Country Status (3)

Country Link
EP (1) EP2556623A4 (en)
CN (1) CN102812664B (en)
WO (1) WO2011117664A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491531B (en) * 2013-08-23 2016-07-06 中国科学技术大学 Power system WiMAX wireless communication networks uses the method that quantum key improves power information transmission security
CN104518866B (en) * 2013-09-30 2016-06-29 科大国盾量子技术股份有限公司 A kind of quantum key distribution terminal and system
CN105162584B (en) * 2015-07-28 2018-11-27 中国科学技术大学 A kind of quantum key distribution system and method
CN105228114A (en) * 2015-09-07 2016-01-06 山东海兴电力科技有限公司 A kind of Encrypted short message receive-transmit system based on power failure navigation system and method
CN106340222A (en) * 2016-10-18 2017-01-18 浙江神州量子网络科技有限公司 Teaching demonstration apparatus combining quantum cryptography communication with fiber eavesdropping
DE102019200339A1 (en) * 2019-01-14 2020-07-16 Robert Bosch Gmbh Battery and device and method for encrypting data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645825A (en) * 2005-01-11 2005-07-27 东南大学 Terminal to terminal running performance monitoring method based on sampling measurement
JP2005210637A (en) * 2004-01-26 2005-08-04 Ntt Docomo Inc External device for storing update key
EP1833009A1 (en) * 2006-03-09 2007-09-12 First Data Corporation Secure transaction computer network
US7430295B1 (en) * 2003-03-21 2008-09-30 Bbn Technologies Corp. Simple untrusted network for quantum cryptography

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8842839B2 (en) 2005-09-29 2014-09-23 Hewlett-Packard Development Company, L.P. Device with multiple one-time pads and method of managing such a device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7430295B1 (en) * 2003-03-21 2008-09-30 Bbn Technologies Corp. Simple untrusted network for quantum cryptography
JP2005210637A (en) * 2004-01-26 2005-08-04 Ntt Docomo Inc External device for storing update key
CN1645825A (en) * 2005-01-11 2005-07-27 东南大学 Terminal to terminal running performance monitoring method based on sampling measurement
EP1833009A1 (en) * 2006-03-09 2007-09-12 First Data Corporation Secure transaction computer network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴会松: "网络安全讲座第5讲网络数据加密(上)", 《中国数据通信网络》, no. 6, 30 June 2000 (2000-06-30), pages 45 - 49 *

Also Published As

Publication number Publication date
EP2556623A4 (en) 2017-03-08
WO2011117664A1 (en) 2011-09-29
CN102812664B (en) 2015-11-25
EP2556623A1 (en) 2013-02-13

Similar Documents

Publication Publication Date Title
ES2836114T3 (en) Information sending method, information reception method, device and system
Islam et al. BHMUS: Blockchain based secure outdoor health monitoring scheme using UAV in smart city
CN102812664B (en) For setting up the method and apparatus being electrically connected and setting up Fiber connection
JP5818563B2 (en) Charging system for electric mobile object, charging device for electric mobile object, portable communication terminal and server device included therein, and charging method for electric mobile object
US20140325218A1 (en) Wireless Charging System Using Secure Wireless Charging Protocols
JP6272815B2 (en) Method and apparatus for transmitting bulk emergency data while protecting user privacy
JP2009151953A (en) Battery pack, and electronic apparatus
CN106850220A (en) Data ciphering method, data decryption method and device
CN107113162A (en) System and method for the multivalue packing scheme of homomorphic cryptography
CN108964903A (en) password storage method and device
US11354426B2 (en) Cellular phone security pack method and apparatus
WO2011105553A1 (en) Portable wireless terminal, wireless terminal device, and wireless communication system
CN111327605B (en) Method, terminal, server and system for transmitting private information
WO2023051467A1 (en) Charging data sending and receiving method, charging data sending and receiving apparatus, charging pile, and vehicle terminal
CN105631298B (en) A kind of ciphering and deciphering device and method
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
JP5960512B2 (en) Charging system for electric mobile object, charging device for electric mobile object, portable communication terminal and server device included therein, and charging method for electric mobile object
JP2000069568A (en) Method for revising cryptographic key in charging state
KR20220164560A (en) 3-party cryptographic handshake protocol
KR20180136641A (en) How to certify the claude quantum security with transferring technology of one-side quantum random number codes
CN111786955B (en) Method and apparatus for protecting a model
KR20180109651A (en) The claude security system with OTP quantum random numbers
KR101918976B1 (en) The claude security system
Lee et al. Development of electronic locks using gesture password of smartphone base on RSA algorithm
KR20180109653A (en) The quantum security panel by quantum random numbers generator and pseudo random numbers

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20151230

Address after: Espoo, Finland

Patentee after: Technology Co., Ltd. of Nokia

Address before: Espoo, Finland

Patentee before: Nokia Oyj