CN106911474B - Quantum key encryption method and device based on business attributes - Google Patents
Quantum key encryption method and device based on business attributes Download PDFInfo
- Publication number
- CN106911474B CN106911474B CN201710325356.6A CN201710325356A CN106911474B CN 106911474 B CN106911474 B CN 106911474B CN 201710325356 A CN201710325356 A CN 201710325356A CN 106911474 B CN106911474 B CN 106911474B
- Authority
- CN
- China
- Prior art keywords
- service
- quantum key
- quantum
- key
- resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 230000005540 biological transmission Effects 0.000 claims description 36
- 238000012163 sequencing technique Methods 0.000 claims description 15
- 238000004891 communication Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000005610 quantum mechanics Effects 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The application provides a quantum key encryption method and a device based on business attributes, wherein the quantum key encryption method based on the business attributes comprises the following steps: acquiring data to be encrypted of each service; determining total sub-key quantity resources and service attributes of each service; distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service; determining the optimal quantum key updating frequency of each service according to the quantum key quantity resources and the service attributes of each service; and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key. In the application, the security and the confidentiality of the data can be improved through the method.
Description
Technical Field
The present application relates to the field of communication security, and in particular, to a quantum key encryption method and apparatus based on service attributes.
Background
The continuous progress of human civilization and the development of scientific technology are changing day by day, so that the communication mode is continuously developing towards more civilization, more advancement and more intellectualization. Today, with the rapid development of computing technology and communication technology, human society has stepped into an information-oriented era. In the information age, information is a crucial place in each field of human life such as politics, economy, military, science and technology. Meanwhile, with the continuous development of information science and technology, especially the appearance of the internet and wireless networks, the problem of information leakage is increasingly concerned by people. For individuals, information leakage directly causes invasion and loss of privacy, economic benefits, scientific research achievements and the like of the individuals; for the country, this will cause significant losses in the fields of politics, economy, science and technology, military and the like, and especially in the field of military, information leakage will seriously threaten the security of the country.
From the above, a crucial problem in the field of information science and communication is how to further improve the security and confidentiality of information.
Disclosure of Invention
In order to solve the above technical problems, embodiments of the present application provide a quantum key encryption method and device based on business attributes, so as to achieve the purpose of improving the security and confidentiality of data, and the technical solution is as follows:
a quantum key encryption method based on service attributes comprises the following steps:
acquiring data to be encrypted of each service;
determining total sub-key quantity resources and service attributes of the services;
distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service;
determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service;
and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key.
Preferably, determining the total amount of subkey resources includes:
reading a quantum key from quantum key generation equipment to obtain a code rate in real time;
and multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
Preferably, the service attribute of each service includes: a business data asset class and a data transmission rate;
determining the service attribute of each service, including:
inquiring the business data asset grade of each business in a preset business data asset grade library;
and reading the data transmission rate of each service from the virtual private network used by each service.
Preferably, the allocating the total quantum key amount resource to each service to obtain the quantum key amount resource of each service includes:
ranking the business data asset classes of all the businesses in a high-low mode to obtain a ranking result;
determining the key distribution weight of each service by using the sequencing result;
using the relation 1Allocating the total amount of subkey amount resources to eachObtaining quantum key amount resource of each service by each service, SiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
Preferably, determining the optimal quantum key update frequency of each service according to the quantum key amount resource and the service attribute of each service includes:
using the relation of twoCalculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiIs the data transmission threshold of the ith service.
A quantum key encryption device based on business attributes, comprising:
the acquisition module is used for acquiring data to be encrypted of each service;
the first determining module is used for determining the total sub-secret key amount resources and the service attributes of the services;
the distribution module is used for distributing the total quantum key amount resources to each service to obtain the quantum key amount resources of each service;
the second determining module is used for determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service;
and the encryption module is used for updating the quantum key of each service by using the optimal quantum key updating frequency of each service and encrypting the data to be encrypted of each service by using the updated quantum key.
Preferably, the first determining module includes:
the first reading unit is used for reading the quantum key real-time code rate from the quantum key generation equipment;
and the first calculation unit is used for multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
Preferably, the service attribute of each service includes: a business data asset class and a data transmission rate;
the first determining module includes:
the query unit is used for querying the business data asset grade of each business in a preset business data asset grade library;
and a second reading unit, configured to read the data transmission rate of each service from the virtual private network used by each service.
Preferably, the distribution module includes:
the sequencing unit is used for sequencing the business data assets of all the businesses in a high-low mode to obtain a sequencing result;
a determining unit, configured to determine a key assignment weight of each service according to the sorting result;
an allocation unit for utilizing the relation oneDistributing the total quantum key quantum resources to each service to obtain the quantum key quantum resources of each service, SiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
Preferably, the second determining module includes:
a second calculation unit for using the relation of twoComputing an optimal quantum for each of the servicesFrequency of key update, fiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiIs the data transmission threshold of the ith service.
Compared with the prior art, the beneficial effect of this application is:
in the application, data to be encrypted of each service is acquired; determining total sub-key quantity resources and service attributes of the services; distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service; determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service; and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key to realize data encryption. Because the quantum key is a safe key based on quantum state observation of quantum mechanics measurement principle, and has high safety, the unconditional safety of communication can be ensured by encrypting data by adopting the quantum key, and the safety and the confidentiality of the data can be improved.
Furthermore, the optimal quantum key updating frequency of each service is determined according to the quantum key quantity resources and the service attributes of each service, so that the purpose of adaptively adjusting the quantum key updating frequency of each service is achieved, the use efficiency of the quantum key is improved, and the efficient and safe operation of the power quantum secret communication network is ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
FIG. 1 is a flow chart of a quantum key encryption method based on business attributes provided in the present application;
FIG. 2 is a sub-flowchart of a quantum key encryption method based on business attributes provided herein;
FIG. 3 is another sub-flow diagram of a method for quantum key encryption based on business attributes provided herein;
FIG. 4 is a further sub-flowchart of the quantum key encryption method based on business attributes provided herein;
fig. 5 is a schematic logic structure diagram of a quantum key encryption device based on service attributes provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example one
Referring to fig. 1, a flow chart of a quantum key encryption method based on service attributes provided in the present application is shown, which may include the following steps:
step S11: and acquiring data to be encrypted of each service.
Step S12: and determining the total sub-key quantity resources and the service attributes of the services.
Since the execution purpose of each service is different, each service has different service attributes. However, since the service attribute is an attribute of the service itself, the service attribute of the service can be determined when the service is determined.
Step S13: and distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service.
Step S14: and determining the optimal quantum key updating frequency of each service according to the quantum key quantity resources and the service attributes of each service.
Since the key update frequency determines the security degree of data encryption, the quantum key update frequency of each service needs to be adjusted in real time according to the quantum key quantity resources and the service attributes of each service, that is, the optimal quantum key update frequency of each service is determined. Based on this, since the service attribute of each service directly restricts the transmission of the data of the service, it is necessary to determine the optimal quantum key update frequency adapted to the service attribute of each service.
Step S15: and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key.
In this embodiment, since the quantum key used for encryption is obtained by updating according to the optimal quantum key updating frequency, the security degree of data encryption is relatively high, and the security and the encryption performance of the encrypted data are correspondingly improved.
It should be noted that each service has a default key update frequency, after the optimal quantum key update frequency of each service is determined, the default key update frequency of each service may be compared with the optimal quantum key update frequency, when the two are different, the default key update frequency is adjusted to the optimal quantum key update frequency, and when the two are the same, the default key update frequency is directly used.
Of course, after the optimal quantum key update frequency is determined, the operation of comparing the default key update frequency and the optimal quantum key update frequency of each service is not performed, and the default key update frequency is directly replaced by the optimal quantum key update frequency, so that the optimal quantum key update frequency is used.
In the application, data to be encrypted of each service is acquired; determining total sub-key quantity resources and service attributes of the services; distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service; determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service; and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key to realize data encryption. Because the quantum key is a safe key based on quantum state observation of quantum mechanics measurement principle, and has high safety, the unconditional safety of communication can be ensured by encrypting data by adopting the quantum key, and the safety and the confidentiality of the data can be improved.
Furthermore, the optimal quantum key updating frequency of each service is determined according to the quantum key quantity resources and the service attributes of each service, so that the purpose of adaptively adjusting the quantum key updating frequency of each service is achieved, the use efficiency of the quantum key is improved, and the efficient and safe operation of the power quantum secret communication network is ensured.
In this embodiment, the specific process for determining the total amount of subkey amount resource may refer to fig. 2, and may include the following steps:
step S21: and reading the quantum key from the quantum key generation device to obtain the code rate in real time.
Step S22: and multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
In this embodiment, the service attributes of the services may specifically include, but are not limited to, the following: a traffic data asset class and a data transmission rate.
The service attributes of each service specifically include: in the case of service data asset class and data transmission rate, a specific process for determining the service attribute of each service may be as shown in fig. 3, and may include the following steps:
step S31: and inquiring the business data asset grade of each business in a preset business data asset grade library.
Step S32: and reading the data transmission rate of each service from the virtual private network used by each service.
In this embodiment, the allocating the total amount of sub-key resources to each service may adopt an average allocation manner, specifically: and dividing the total quantum key quantity resource by the total number of the services to obtain the quantum key quantity resource of each service.
Of course, the total sub-key amount resource is allocated to each service to obtain the sub-key amount resource of each service, or the total sub-key amount resource may be allocated to each service according to the service attribute by self-use in a manner of being associated with the service attribute, which may specifically refer to fig. 4, and may include the following steps:
step S41: and sequencing the business data asset grades of all the businesses in a high-low mode to obtain a sequencing result.
Step S42: and determining the key distribution weight of each service by using the sequencing result.
Step S43: using the relation 1And distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service.
Wherein S isiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
In this embodiment, since the business data asset class represents the importance of the business data, the quantum key amount resource is allocated by using the business data asset class, so that safer encryption of the important business data can be ensured. The higher the business data asset level is, the larger the key distribution weight of the business is, and correspondingly, the more quantum key amount resources are obtained by business distribution.
Based on the quantum key amount resource allocation method shown in fig. 4, the key update frequency is also higher for the service with high service data asset level. Whereby individual services can be employedInverse of the key quantum resourceAs one of the weight parameters for calculating the key update frequency;
and, updating the key in a time-division manner (i.e., the service is operated by time-division operation), so that the data transmission rate ViDetermines the amount of traffic data transmitted over the line. Suppose that the transmission data amount of a certain service reaches the data transmission threshold QiThe time key is updated, and the key updating period T corresponding to the service is
Based on the above, the specific process of determining the optimal quantum key update frequency of each service according to the quantum key amount resource and the service attribute of each service may be as follows: using the relation of twoCalculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiIs the data transmission threshold of the ith service.
Of course, the service attributes of each service may include, in addition to the service data asset class and the data transmission rate: service priority, data importance, transmission real-time, data block size, data transmission accuracy and the like. Therefore, the present embodiment does not limit determining the optimal quantum key update frequency of each service according to only the quantum key amount resource, the service data asset class, and the data transmission rate of each service, and may also determine the optimal quantum key update frequency of each service according to other service attributes of the quantum key amount resource, the service priority, the data importance, the transmission real-time property, the data block size, the data transmission accuracy, and the like of each service. The specific determination process needs to be determined according to the specific service attribute.
Example two
Corresponding to the foregoing method embodiment, this embodiment provides a quantum key encryption device based on service attributes, please refer to fig. 5, where the quantum key encryption device based on service attributes includes: the device comprises an acquisition module 11, a first determination module 12, a distribution module 13, a second determination module 14 and an encryption module 15.
The obtaining module 11 is configured to obtain data to be encrypted of each service.
A first determining module 12, configured to determine a total sub-secret key amount resource and a service attribute of each service.
And the allocation module 13 is configured to allocate the total quantum key amount resource to each service, so as to obtain a quantum key amount resource of each service.
And a second determining module 14, configured to determine, according to the quantum key amount resource and the service attribute of each service, an optimal quantum key update frequency of each service.
And the encryption module 15 is configured to update the quantum key of each service by using the optimal quantum key update frequency of each service, and encrypt the data to be encrypted of each service by using the updated quantum key.
In this embodiment, the first determining module 12 may specifically include: the device comprises a first reading unit and a first calculating unit.
And the first reading unit is used for reading the quantum key real-time coding rate from the quantum key generation device.
And the first calculation unit is used for multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
In this embodiment, the service attributes of each service may specifically include: a traffic data asset class and a data transmission rate.
The service attribute of each service may specifically include: under the condition of the service data asset class and the data transmission rate, the first determining module 12 specifically includes: an inquiring unit and a second reading unit.
And the query unit is used for querying the business data asset grade of each business in a preset business data asset grade library.
And a second reading unit, configured to read the data transmission rate of each service from the virtual private network used by each service.
In this embodiment, the allocating module 13 may specifically include: the device comprises a sorting unit, a determining unit and an allocating unit.
And the sequencing unit is used for sequencing the service data asset grades of all the services in a high-low mode to obtain a sequencing result.
And the determining unit is used for determining the key distribution weight of each service by using the sequencing result.
An allocation unit for utilizing the relation oneDistributing the total quantum key quantum resources to each service to obtain the quantum key quantum resources of each service, SiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
The second determining module 14 may specifically include: a second calculation unit for using the relation of twoCalculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiFor the ith trafficResource of sub-key amount, QiIs the data transmission threshold of the ith service.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The method and the device for quantum key encryption based on business attributes provided by the application are introduced in detail, specific examples are applied in the method to explain the principle and the implementation of the application, and the description of the above embodiments is only used for helping to understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Claims (8)
1. A quantum key encryption method based on service attributes is characterized by comprising the following steps:
acquiring data to be encrypted of each service;
determining total sub-key quantity resources and service attributes of the services;
distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service;
determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service; the determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service comprises the following steps: using the relation of twoCalculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiA data transmission threshold value of the ith service;
and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key.
2. The method of claim 1, wherein determining a total quantum key quantum resource comprises:
reading a quantum key from quantum key generation equipment to obtain a code rate in real time;
and multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
3. The method according to claim 1 or 2, wherein the service attributes of each service comprise: a business data asset class and a data transmission rate;
determining the service attribute of each service, including:
inquiring the business data asset grade of each business in a preset business data asset grade library;
and reading the data transmission rate of each service from the virtual private network used by each service.
4. The method of claim 3, wherein allocating the total quantum key quantum resource to each of the services to obtain the quantum key quantum resource of each of the services comprises:
ranking the business data asset classes of all the businesses in a high-low mode to obtain a ranking result;
determining the key distribution weight of each service by using the sequencing result;
using the relation 1Distributing the total quantum key quantum resources to each service to obtain the quantum key quantum resources of each service, SiWi assigns weight to the quantum key amount resource of the ith service, wherein i is not less than 1 and is not less than 1N is an integer not greater than n, n is an integer not less than 1, W1+ W2+ W3+. + Wn is the sum of the key assignment weights of the respective services, and S is the total subkey amount resource.
5. A quantum key encryption apparatus based on business attributes, comprising:
the acquisition module is used for acquiring data to be encrypted of each service;
the first determining module is used for determining the total sub-secret key amount resources and the service attributes of the services;
the distribution module is used for distributing the total quantum key amount resources to each service to obtain the quantum key amount resources of each service;
the second determining module is used for determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service; the second determining module includes:
a second calculation unit for using the relation of twoCalculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiA data transmission threshold value of the ith service;
and the encryption module is used for updating the quantum key of each service by using the optimal quantum key updating frequency of each service and encrypting the data to be encrypted of each service by using the updated quantum key.
6. The apparatus of claim 5, wherein the first determining module comprises:
the first reading unit is used for reading the quantum key real-time code rate from the quantum key generation equipment;
and the first calculation unit is used for multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
7. The apparatus according to claim 5 or 6, wherein the service attribute of each service comprises: a business data asset class and a data transmission rate;
the first determining module includes:
the query unit is used for querying the business data asset grade of each business in a preset business data asset grade library;
and a second reading unit, configured to read the data transmission rate of each service from the virtual private network used by each service.
8. The apparatus of claim 7, wherein the assignment module comprises:
the sequencing unit is used for sequencing the business data assets of all the businesses in a high-low mode to obtain a sequencing result;
a determining unit, configured to determine a key assignment weight of each service according to the sorting result;
an allocation unit for utilizing the relation oneDistributing the total quantum key quantum resources to each service to obtain the quantum key quantum resources of each service, SiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710325356.6A CN106911474B (en) | 2017-05-10 | 2017-05-10 | Quantum key encryption method and device based on business attributes |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710325356.6A CN106911474B (en) | 2017-05-10 | 2017-05-10 | Quantum key encryption method and device based on business attributes |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106911474A CN106911474A (en) | 2017-06-30 |
CN106911474B true CN106911474B (en) | 2020-07-03 |
Family
ID=59210528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710325356.6A Active CN106911474B (en) | 2017-05-10 | 2017-05-10 | Quantum key encryption method and device based on business attributes |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106911474B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109067519A (en) * | 2018-07-25 | 2018-12-21 | 厦门科华恒盛股份有限公司 | A kind of method, system and the relevant apparatus of adjustment amount sub-key update frequency |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108134669B (en) * | 2018-01-11 | 2020-12-08 | 北京中电普华信息技术有限公司 | Quantum key dynamic supply method and management system for power dispatching service |
CN110620650A (en) * | 2018-06-20 | 2019-12-27 | 中国电信股份有限公司 | Communication method, system, device and computer readable storage medium |
CN109951452B (en) * | 2019-02-26 | 2021-03-23 | 北京深思数盾科技股份有限公司 | Method and device for processing cryptography task |
CN110061840B (en) * | 2019-03-12 | 2022-10-28 | 平安科技(深圳)有限公司 | Data encryption method and device, computer equipment and storage medium |
CN111211896A (en) * | 2019-12-19 | 2020-05-29 | 南京南瑞国盾量子技术有限公司 | Integrated quantum key encryption method, system and storage medium suitable for power business |
CN113757909B (en) * | 2021-11-08 | 2022-02-08 | 国网浙江省电力有限公司绍兴供电公司 | Air conditioner cluster control method based on quantum encryption technology |
CN116232629B (en) * | 2022-11-15 | 2023-09-26 | 北京连山科技股份有限公司 | Multi-link data particle transmission method based on quantum cryptography protection |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101179377A (en) * | 2006-11-09 | 2008-05-14 | 中兴通讯股份有限公司 | Cipher key distributing and updating system of multimedia broadcasting service |
MY149272A (en) * | 2009-06-24 | 2013-08-15 | Mimos Berhad | Method for use in quantum cryptography |
CN103840936B (en) * | 2014-02-28 | 2018-02-09 | 山东量子科学技术研究院有限公司 | The reliable encryption transmission system of quantum cryptography networks and method |
CN104660602B (en) * | 2015-02-14 | 2017-05-31 | 山东量子科学技术研究院有限公司 | A kind of quantum key transfer control method and system |
-
2017
- 2017-05-10 CN CN201710325356.6A patent/CN106911474B/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109067519A (en) * | 2018-07-25 | 2018-12-21 | 厦门科华恒盛股份有限公司 | A kind of method, system and the relevant apparatus of adjustment amount sub-key update frequency |
Also Published As
Publication number | Publication date |
---|---|
CN106911474A (en) | 2017-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106911474B (en) | Quantum key encryption method and device based on business attributes | |
Lo'Ai et al. | Cloudlet-based mobile cloud computing for healthcare applications | |
Liu et al. | Public auditing for big data storage in cloud computing--a survey | |
CN113449048B (en) | Data label distribution determining method and device, computer equipment and storage medium | |
WO2022116491A1 (en) | Dbscan clustering method based on horizontal federation, and related device therefor | |
CN109583227B (en) | Privacy information protection method, device and system | |
CN111428887A (en) | Model training control method, device and system based on multiple computing nodes | |
Kareem et al. | An approach for enhancing data confidentiality in hadoop | |
WO2020087879A1 (en) | Method, device, and system for protecting private information | |
Ceselli et al. | Optimized assignment patterns in Mobile Edge Cloud networks | |
CN111949998B (en) | Object detection and request method, data processing system, device and storage medium | |
Jayapandian | Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm | |
Saeed et al. | A user-based trust model for cloud computing environment | |
CN107005576B (en) | Generating bridging matching identifiers for linking identifiers from server logs | |
Bakro et al. | Performance analysis of cloud computing encryption algorithms | |
Pan et al. | An efficiency approach for RBAC reconfiguration with minimal roles and perturbation | |
CN113434906A (en) | Data query method and device, computer equipment and storage medium | |
He et al. | Analysis of trust-based access control using game theory | |
Jaithunbi et al. | Preservation of Data Integrity in Public Cloud Using Enhanced Vigenere Cipher Based Obfuscation | |
Fiaz et al. | Prediction of best cloud service provider using the QoS ranking framework | |
Chandramohan et al. | HPPC-hierarchical Petri-net based privacy nominal model approach for cloud | |
US20190004999A1 (en) | Information processing device, information processing system, and information processing method, and program | |
Swami et al. | A new secure data retrieval system based on ECDH and hierarchical clustering with Pearson correlation | |
Han et al. | Fully homomorphic privacy-preserving naive Bayes machine learning and classification | |
Wang et al. | A trust-based evaluation model for data privacy protection in cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |