CN106911718A - Secrecy intercom system and method based on quantum key service station - Google Patents
Secrecy intercom system and method based on quantum key service station Download PDFInfo
- Publication number
- CN106911718A CN106911718A CN201710247256.6A CN201710247256A CN106911718A CN 106911718 A CN106911718 A CN 106911718A CN 201710247256 A CN201710247256 A CN 201710247256A CN 106911718 A CN106911718 A CN 106911718A
- Authority
- CN
- China
- Prior art keywords
- intercom
- service station
- key
- quantum key
- quantum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000004891 communication Methods 0.000 claims description 18
- 238000012544 monitoring process Methods 0.000 claims description 16
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 230000000717 retained effect Effects 0.000 claims 1
- 238000012546 transfer Methods 0.000 abstract description 6
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q5/00—Selecting arrangements wherein two or more subscriber stations are connected by the same line to the exchange
- H04Q5/24—Selecting arrangements wherein two or more subscriber stations are connected by the same line to the exchange for two-party-line systems
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of secrecy intercom system and method based on quantum key service station, system includes quantum key service station and some intercoms, intercom completes information transfer by the transfer of quantum key service station, quantum random number generator is set in quantum key service station, for generating the quantum key with truly random property, quantum key is stored in the cipher key storage block, is downloaded for the intercom.Intercom of the present invention carries out transfer by quantum key service station, and the process of decryption and secondary encryption is completed in service station, realizes remote secrecy intercommunication, it is ensured that safe information transmission.
Description
Technical field
The present invention relates to the communications field, and in particular to a kind of based on the secrecy intercom system in quantum key service station and side
Method.
Background technology
In the current long-distance talkback communications field, the voice transfer of intercom is directly launched and is received, and is not adopted
Use any cryptographic means;Or use simple cryptographic means, the key for such as being obtained using chaotic key equation algorithm, the key
With the danger being decrypted and distort, therefore, there is the risk divulged a secret in message transmitting procedure.
The content of the invention
It is an object of the invention to the problem above for overcoming prior art to exist, there is provided the guarantor based on quantum key service station
Close intercom system and method, intercom of the present invention carry out transfer by quantum key service station, and decryption and two are completed in service station
The process of secondary encryption, realizes remote secrecy intercommunication.
It is close it is an aspect of the invention to provide a kind of secrecy intercom system based on quantum key service station, including quantum
Key service station and some intercoms, communicate to connect, the quantum key between the quantum key service station and some intercoms
Service station and some intercoms include:
Information storage module, for cache information data;
Information encryption/decryption module, is connected with described information memory module, for completing encryption and decryption to information data;
Cipher key storage block, is connected, with described information encryption/decryption module for storing quantum key;
Size of key monitoring modular, is connected with the cipher key storage block, for detecting the cipher key number in the cipher key storage block
Amount;
The quantum key service station also includes governor circuit;
Wireless signal overlay module, is connected with the governor circuit, is realized for the described some intercoms in certain physical extent
Radio communication;
Quantum random number generator, is connected with the cipher key storage block, for generating the quantum key with truly random property, amount
Sub-key is stored in the cipher key storage block, is downloaded for the intercom;
Authentication module, is connected with the governor circuit, for intercom identity information described in certification;
The intercom also includes microprocessor;
Identity information memory module, is connected with the microprocessor, the identity information for storing the intercom;
Loudspeaker, is connected, with described information memory module for exporting voice messaging;
Microphone, is connected, with described information memory module for gathering voice messaging.
Further, the intercom also includes the broadcast button and some push-to-talk buttons that are connected with the microprocessor.
Further, the quantum key service station also includes the key button that is connected with the governor circuit, for
The intercom distributes key.
Further, the quantum key service station also includes the service warning mould being connected with the size of key monitoring modular
Block, the service alarm module and GPS monitoring modules, the GPS monitoring modules are used to monitor the position trend of the intercom.
Further, the intercom also includes the user's alarm module and and body that are connected with the size of key monitoring modular
The GPS module of part information storage module connection.
Another aspect of the present invention is to provide a kind of secrecy intercommunication method based on quantum key service station, methods described bag
Include:
(1)Intercom is registered in quantum key service station, obtains unique quantum identity information, meanwhile, quantum key service
Station retains the quantum identity information;
(2)Intercom downloads user key, and quantum key service station retains service key corresponding with the intercom;
(3)The quantum key service station receives the communication request that calling party initiates, and judges whether calling party's intercommunication identity closes
Method;
(4)If calling party's intercommunication identity is illegal, into step(9)If calling party's intercommunication identity is closed
Communication request is initiated to callee's intercom in method, the quantum key service station;
(5)Callee's intercom agrees to that request, the quantum key service station are responded in communication dyad sub-key service station
Notify that calling party's interphone communication is ready;
(6)The ciphertext a that user key a is encrypted is sent to quantum key service station by calling party's intercom;
(7)The quantum key service station obtains in plain text, using service corresponding with callee's intercom ciphertext a decryption
Password b re-encrypteds are sent to callee's intercom for ciphertext b;
(8)Decryption is obtained in plain text after callee's intercom receives ciphertext b;
(9)Sign off.
Further, the intercom downloads user key, and quantum key service station retains clothes corresponding with the intercom
Business password is specially:Intercom to quantum key service station initiate key download request, quantum key service station using quantum with
Machine number generator generates user key, and the intercom then asked to the initiation distributes the user key, and in quantum key clothes
The cipher key storage block for being engaged in standing retains service key corresponding with the intercom, and the user key is identical with service key.
Further, the quantum key service station is different to the intercom distribution of each initiation key download request
User key.
Further, it is described to judge whether calling party's intercommunication identity is legal specially:Whether judge calling party's intercom
Identity information is registered in quantum key service station.
The beneficial effects of the invention are as follows:
Intercom carries out transfer by quantum key service station, and the process of decryption and secondary encryption is completed in service station, realizes remote
Apart from secrecy intercommunication;Quantum random number generator quantum key of the generation with truly random property is set in quantum key service station to store
In cipher key storage block, downloaded for intercom;Cipher mode uses the cipher system of " one-time pad ", i.e., using information and key
The mode of isometric XOR is encrypted to information, and encryption every time uses different encrypted message transmitting procedure unconditional securities.
Described above is only the general introduction of technical solution of the present invention, in order to better understand technological means of the invention,
And can be practiced according to the content of specification, below with presently preferred embodiments of the present invention and coordinate accompanying drawing describe in detail as after.
Specific embodiment of the invention is shown in detail by following examples and its accompanying drawing.
Brief description of the drawings
Technical scheme in technology in order to illustrate more clearly the embodiments of the present invention, in being described to embodiment technology below
The required accompanying drawing for using is briefly described, it should be apparent that, drawings in the following description are only some realities of the invention
Example is applied, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is quantum key service station of the present invention structural representation;
Fig. 2 is intercom structural representation of the present invention;
Fig. 3 is intercommunication method communication flow diagram of the present invention;
Fig. 4 is intercommunication method information transmission process figure of the present invention;
Fig. 5 is calling party's intercom ciphering process flow chart of the present invention;
Fig. 6 is decryption ciphering process flow chart in quantum key service station of the present invention;
Fig. 7 is callee's intercom decrypting process flow chart of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Shown referring to Figures 1 and 2, the present invention provides a kind of secrecy intercom system based on quantum key service station, including
Quantum key service station and some intercoms, communicate to connect, the amount between the quantum key service station and some intercoms
Sub-key service station and some intercoms include:
Information storage module, for cache information data;
Information encryption/decryption module, is connected with described information memory module, for completing encryption and decryption to information data;
Cipher key storage block, is connected, with described information encryption/decryption module for storing quantum key;
Size of key monitoring modular, is connected with the cipher key storage block, for detecting the cipher key number in the cipher key storage block
Amount;
The quantum key service station also includes governor circuit;
Wireless signal overlay module, is connected with the governor circuit, is realized for the described some intercoms in certain physical extent
Radio communication;
Quantum random number generator, is connected with the cipher key storage block, for generating the quantum key with truly random property, amount
Sub-key is stored in the cipher key storage block, is downloaded for the intercom;Cipher mode uses the password body of " one-time pad "
System, i.e., encrypted by the way of information and the isometric XOR of key to information, and encryption every time is transmitted across using different encrypted messages
Journey unconditional security.
Authentication module, is connected with the governor circuit, for intercom identity information described in certification;
The intercom also includes microprocessor;
Identity information memory module, is connected with the microprocessor, the identity information for storing the intercom;
Loudspeaker, is connected, with described information memory module for exporting voice messaging;
Microphone, is connected, with described information memory module for gathering voice messaging.
Further, the intercom also includes the broadcast button and some push-to-talk buttons that are connected with the microprocessor,
The a certain squad of broadcast button correspondence or crew's intercom are broadcasted.
Further, the quantum key service station also includes the key button that is connected with the governor circuit, for
The intercom distributes key.
Further, the quantum key service station also includes the service warning mould being connected with the size of key monitoring modular
Block, the service alarm module and GPS monitoring modules, the GPS monitoring modules are used to monitor the position trend of the intercom.
Further, the intercom also includes the user's alarm module and and body that are connected with the size of key monitoring modular
The GPS module of part information storage module connection.
The position trend of the intercom is monitored in quantum key service station by the GPS module location information of intercom,
The intercom will be sent to alarm signal during separating signal coverage;Intercom is receiving the police in quantum key service station
After showing information or departing from quantum key service station coverage, start caution system and send the alarm that cannot be communicated.
The size of key monitoring modular in quantum key service station detects registered certain intercom size of key less than 20%, to
The intercom sends warning, points out its key to be finished, and then, it is close that the intercom can send download to quantum key service station
Key is asked.
Shown in reference picture 3 and Fig. 4, the present invention provides a kind of secrecy intercommunication method based on quantum key service station, described
Method includes:
(1)Intercom is registered in quantum key service station, obtains unique quantum identity information, meanwhile, quantum key service
Station retains the quantum identity information;
(2)Intercom downloads user key, and quantum key service station retains service key corresponding with the intercom;
(3)The quantum key service station receives the communication request that calling party initiates, and judges whether calling party's intercommunication identity closes
Method;
(4)If calling party's intercommunication identity is illegal, into step(9)If calling party's intercommunication identity is closed
Communication request is initiated to callee's intercom in method, the quantum key service station;
(5)Callee's intercom agrees to that request, the quantum key service station are responded in communication dyad sub-key service station
Notify that calling party's interphone communication is ready;
(6)The ciphertext a that user key a is encrypted is sent to quantum key service station by calling party's intercom;
(7)The quantum key service station obtains in plain text, using service corresponding with callee's intercom ciphertext a decryption
Password b re-encrypteds are sent to callee's intercom for ciphertext b;
(8)Decryption is obtained in plain text after callee's intercom receives ciphertext b;
(9)Sign off.
The intercom downloads user key, and it is specific that quantum key service station retains service password corresponding with the intercom
For:Intercom initiates key download request to quantum key service station, and quantum key service station utilizes quantum random number generator
Generation user key, the intercom then asked to the initiation distributes the user key, and in the key in quantum key service station
Memory module retains service key corresponding with the intercom, and the user key is identical with service key.
Distribute different user keys to the intercom of each initiation key download request in the quantum key service station.
It is described to judge whether calling party's intercommunication identity is legal specially:Judge calling party's intercom whether in quantum key
Register identity information in service station.
Shown in reference picture 5, calling party's intercom encryption flow is:Collection cleartext information, cleartext information enters information Store
Module, calls user's quantum key to encrypt, and ciphertext sends.
Shown in reference picture 6, quantum key service station decryption encryption flow is:Encryption file is received, ciphertext is deposited into information
Storage module, calls calling party's corresponding with service secret key decryption, obtains cleartext information, and cleartext information enters information storage module, calls
The encryption of callee's corresponding with service quantum key obtains ciphertext, sends ciphertext.
Shown in reference picture 7, callee's intercom decryption flow is:The ciphertext from service station is received, ciphertext enters information
Memory module is cached, and calls user's quantum key to obtain cleartext information.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or uses the present invention.
Various modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The scope most wide for causing.
Claims (9)
1. a kind of secrecy intercom system based on quantum key service station, it is characterised in that, if including quantum key service station and
Dry intercom, communicates to connect, the quantum key service station and some between the quantum key service station and some intercoms
Intercom includes:
Information storage module, for cache information data;
Information encryption/decryption module, is connected with described information memory module, for completing encryption and decryption to information data;
Cipher key storage block, is connected, with described information encryption/decryption module for storing quantum key;
Size of key monitoring modular, is connected with the cipher key storage block, for detecting the cipher key number in the cipher key storage block
Amount;
The quantum key service station also includes governor circuit;
Wireless signal overlay module, is connected with the governor circuit, is realized for the described some intercoms in certain physical extent
Radio communication;
Quantum random number generator, is connected with the cipher key storage block, for generating the quantum key with truly random property, amount
Sub-key is stored in the cipher key storage block, is downloaded for the intercom;
Authentication module, is connected with the governor circuit, for intercom identity information described in certification;
The intercom also includes microprocessor;
Identity information memory module, is connected with the microprocessor, the identity information for storing the intercom;
Loudspeaker, is connected, with described information memory module for exporting voice messaging;
Microphone, is connected, with described information memory module for gathering voice messaging.
2. the secrecy intercom system based on quantum key service station according to claim 1, it is characterised in that the intercommunication
Machine also includes the broadcast button and some push-to-talk buttons that are connected with the microprocessor.
3. the secrecy intercom system based on quantum key service station according to claim 2, it is characterised in that the quantum
Cipher key service station also includes the key button being connected with the governor circuit, for distributing key to the intercom.
4. the secrecy intercom system based on quantum key service station according to claim any one of 1-3, it is characterised in that
The quantum key service station also includes the service alarm module being connected with the size of key monitoring modular, and the service warns mould
Block and GPS monitoring modules, the GPS monitoring modules are used to monitor the position trend of the intercom.
5. the secrecy intercom system based on quantum key service station according to claim 4, it is characterised in that the intercommunication
Machine also includes the user's alarm module being connected with the size of key monitoring modular and the GPS moulds being connected with identity information memory module
Block.
6. a kind of secrecy intercommunication method based on quantum key service station, it is characterised in that methods described includes:
Intercom is registered in quantum key service station, obtains unique quantum identity information, meanwhile, the quantum key service station is deposited
Stay the quantum identity information;
Intercom downloads user key, and quantum key service station retains service key corresponding with the intercom;
The quantum key service station receives the communication request that calling party initiates, and judges whether calling party's intercommunication identity is legal;
If calling party's intercommunication identity is illegal, into step(9)If calling party's intercommunication identity is legal,
Communication request is initiated to callee's intercom in the quantum key service station;
Callee's intercom agrees to that request is responded in communication dyad sub-key service station, and the quantum key service station notifies
Calling party's interphone communication is ready;
The ciphertext a that user key a is encrypted is sent to quantum key service station by calling party's intercom;
The quantum key service station obtains in plain text ciphertext a decryption, close using service corresponding with callee's intercom
Code b re-encrypteds are sent to callee's intercom for ciphertext b;
Decryption is obtained in plain text after callee's intercom receives ciphertext b;
Sign off.
7. the secrecy intercommunication method based on quantum key service station according to claim 6, it is characterised in that the intercommunication
Machine downloads user key, and quantum key service station retains service password corresponding with the intercom and is specially:Intercom is to quantum
Key download request is initiated at cipher key service station, and quantum key service station generates user key using quantum random number generator, so
The intercom of backward initiation request distributes the user key, and cipher key storage block in quantum key service station is retained and this
The corresponding service key of intercom, the user key is identical with service key.
8. the secrecy intercommunication method based on quantum key service station according to claim 7, it is characterised in that the quantum
Distribute different user keys to the intercom of each initiation key download request in cipher key service station.
9. the secrecy intercommunication method based on quantum key service station according to claim 6, it is characterised in that the judgement
Whether calling party's intercommunication identity is legal to be specially:Judge calling party's intercom whether in quantum key service station registration identity letter
Breath.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710247256.6A CN106911718A (en) | 2017-04-17 | 2017-04-17 | Secrecy intercom system and method based on quantum key service station |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710247256.6A CN106911718A (en) | 2017-04-17 | 2017-04-17 | Secrecy intercom system and method based on quantum key service station |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106911718A true CN106911718A (en) | 2017-06-30 |
Family
ID=59210465
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710247256.6A Pending CN106911718A (en) | 2017-04-17 | 2017-04-17 | Secrecy intercom system and method based on quantum key service station |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106911718A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109660488A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of method and device that anti-message is divulged a secret |
CN110188564A (en) * | 2019-07-09 | 2019-08-30 | 江苏亨通问天量子信息研究院有限公司 | Mobile data based on quantum key encryption stores terminal |
CN110896387A (en) * | 2018-09-12 | 2020-03-20 | 宁德时代新能源科技股份有限公司 | Data transmission method, battery management system and storage medium |
CN112152659A (en) * | 2020-08-29 | 2020-12-29 | 福建北峰通信科技股份有限公司 | Digital intercom system based on quantum encryption |
CN113612608A (en) * | 2021-08-13 | 2021-11-05 | 中电信量子科技有限公司 | Method and system for realizing cluster encryption of dual-mode interphone based on public network |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683291A (en) * | 2013-11-27 | 2015-06-03 | 北京大唐高鸿数据网络技术有限公司 | IMS system based session key negotiating method |
CN204392484U (en) * | 2015-02-06 | 2015-06-10 | 长春大学 | A kind of quantum key encryption wireless intercom device |
CN106452740A (en) * | 2016-09-23 | 2017-02-22 | 浙江神州量子网络科技有限公司 | Quantum communication service station, quantum key management device, key configuration network, and key configuration method |
-
2017
- 2017-04-17 CN CN201710247256.6A patent/CN106911718A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683291A (en) * | 2013-11-27 | 2015-06-03 | 北京大唐高鸿数据网络技术有限公司 | IMS system based session key negotiating method |
CN204392484U (en) * | 2015-02-06 | 2015-06-10 | 长春大学 | A kind of quantum key encryption wireless intercom device |
CN106452740A (en) * | 2016-09-23 | 2017-02-22 | 浙江神州量子网络科技有限公司 | Quantum communication service station, quantum key management device, key configuration network, and key configuration method |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109660488A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of method and device that anti-message is divulged a secret |
CN110896387A (en) * | 2018-09-12 | 2020-03-20 | 宁德时代新能源科技股份有限公司 | Data transmission method, battery management system and storage medium |
US11102651B2 (en) | 2018-09-12 | 2021-08-24 | Contemporary Amperex Technology Co., Limited | Method for data transmission, battery management system, and storage medium |
CN110188564A (en) * | 2019-07-09 | 2019-08-30 | 江苏亨通问天量子信息研究院有限公司 | Mobile data based on quantum key encryption stores terminal |
CN110188564B (en) * | 2019-07-09 | 2024-01-26 | 江苏亨通问天量子信息研究院有限公司 | Mobile data storage terminal based on quantum key encryption |
CN112152659A (en) * | 2020-08-29 | 2020-12-29 | 福建北峰通信科技股份有限公司 | Digital intercom system based on quantum encryption |
CN113612608A (en) * | 2021-08-13 | 2021-11-05 | 中电信量子科技有限公司 | Method and system for realizing cluster encryption of dual-mode interphone based on public network |
CN113612608B (en) * | 2021-08-13 | 2024-04-19 | 中电信量子科技有限公司 | Method and system for realizing cluster encryption of dual-mode interphone based on public network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106911718A (en) | Secrecy intercom system and method based on quantum key service station | |
CN101340443B (en) | Session key negotiating method, system and server in communication network | |
CN101420303B (en) | Communication method for audio data and apparatus thereof | |
CN102572817B (en) | Method and intelligent memory card for realizing mobile communication confidentiality | |
CN106603485A (en) | Secret key negotiation method and device | |
EP1976322A1 (en) | An authentication method | |
US20020120844A1 (en) | Authentication and distribution of keys in mobile IP network | |
CN107800539A (en) | Authentication method, authentication device and Verification System | |
CN101222322B (en) | Safety ability negotiation method in super mobile broadband system | |
RU2495532C2 (en) | Method and apparatus for end-to-end encrypted communication | |
CN102394749B (en) | Line protection method, system, information safety equipment and application equipment for data transmission | |
CA2546553A1 (en) | System and method for provisioning and authenticating via a network | |
CN101635924B (en) | CDMA port-to-port encryption communication system and key distribution method thereof | |
CN104683304A (en) | Processing method, equipment and system of secure communication service | |
CN109728913B (en) | Equipment validity verification method, related equipment and system | |
CN102036230A (en) | Method for implementing local route service, base station and system | |
CN101420686A (en) | Industrial wireless network security communication implementation method based on cipher key | |
CN109600725A (en) | A kind of message encryption method based on SM9 algorithm | |
CN107454035A (en) | A kind of identity authentication method and device | |
CN103167494B (en) | Method for sending information and system | |
EP1376924B1 (en) | End-to-end encryption key management in a mobile communications system | |
CN101888626B (en) | Method and terminal equipment for realizing GBA key | |
JP2014050038A (en) | Wireless system and train control system | |
CN106961330A (en) | Quantum key service station | |
CN206932228U (en) | Quantum key service station |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170630 |
|
WD01 | Invention patent application deemed withdrawn after publication |