CN108133370A - A kind of safe payment method and system based on quantum key distribution network - Google Patents

A kind of safe payment method and system based on quantum key distribution network Download PDF

Info

Publication number
CN108133370A
CN108133370A CN201710487579.2A CN201710487579A CN108133370A CN 108133370 A CN108133370 A CN 108133370A CN 201710487579 A CN201710487579 A CN 201710487579A CN 108133370 A CN108133370 A CN 108133370A
Authority
CN
China
Prior art keywords
quantum
order
paid
quantum key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710487579.2A
Other languages
Chinese (zh)
Other versions
CN108133370B (en
Inventor
陈强
朱晓霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Wangjin Holdings Co Ltd
Original Assignee
Guangdong Wangjin Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Wangjin Holdings Co Ltd filed Critical Guangdong Wangjin Holdings Co Ltd
Priority to CN201710487579.2A priority Critical patent/CN108133370B/en
Publication of CN108133370A publication Critical patent/CN108133370A/en
Application granted granted Critical
Publication of CN108133370B publication Critical patent/CN108133370B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Electromagnetism (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention relates to a kind of safe payment method and system based on quantum key distribution network, if wherein method includes receiving permission unlocking request, distribution quantum key K1 is to the first quantum terminal, to be decoded verification to the quantum key K1;If quantum key K1 described in the first quantum terminal-pair solves code check success, when by financial system mandate so as to complete Order creation and when order to be paid being submitted to be audited, transmission is encrypted to the order to be paid, and distribute quantum key K2 and give payment quantum terminal, to be decoded verification to the quantum key K2;If the code check success of quantum key K2 solutions, is decrypted encrypted order to be paid so that financial system is audited by the order to be paid after decryption and delivery operation described in the payment quantum terminal-pair.The present invention can effectively improve safety and the payment efficiency of payment process, realize the quantization upgrading of business transaction safety.

Description

A kind of safe payment method and system based on quantum key distribution network
Technical field
The present invention relates to electronic technology field more particularly to a kind of safe payment methods based on quantum key distribution network And system.
Background technology
In enterprise security payment technical field, currently existing scheme mainly has three security mechanisms:When establish corporate payments list- Review mechanism reduces the risk artificially appropriated public funds for personal use;Second is that enterprise personnel when performing oneself permission, needs to be inserted into entity Ukey carries out authentication and data encryption;Third, storage, the transmission of information are encrypted using popular RSA Algorithm. First of security mechanism is mainly that setting procedure reduces human risks, but second mechanism is numerous with operating using entity Ukey Trivial, easy to be lost, the defects of can stealing, there are the limitations of itself for the RSA Algorithm of third road mechanism:It is encrypted using big prime number product Mode after the quantum computer invention of many magnitudes, is incited somebody to action stronger than present computer computation ability for encrypted big prime number It is traversed decryption within a very short time.Quantum key distribution technology can not be replicated based on Heisenberg's indeterminacy principle and quantum state Characteristic has the advantage that can not be cracked, anti-eavesdrop, can not intercept, key can not be obtained by traversal.And from Technique on Quantum Communication Be developed so far, have been obtained for significant progress, quantum communications can be divided into according to application scenarios and the bit type transmitted " quantum-key distribution " and " quantum state transmission " both direction, wherein " quantum-key distribution " technology has taken the lead in being detached from the experimental stage Into preliminary industrialization, but extensive use is also not implemented.
Invention content
In view of the deficiencies of the prior art, the purpose of the present invention is intended to provide a kind of peace based on quantum key distribution network Full method of payment and system can effectively improve safety and the payment efficiency of payment process.
To achieve the above object, the present invention adopts the following technical scheme that:
A kind of safe payment method based on quantum key distribution network, includes the following steps,
If receiving permission unlocking request, distribution quantum key K1 is to the first quantum terminal, with to the quantum key K1 It is decoded verification;
If described in the first quantum terminal-pair quantum key K1 solve code check success, when by financial system mandate so as to When completing Order creation and submitting the order to be paid to be audited, transmission, and dispensed amount are encrypted to the order to be paid Sub-key K2 gives payment quantum terminal, to be decoded verification to the quantum key K2;
If it is described payment quantum terminal-pair described in quantum key K2 solution code check success, to encrypted order to be paid into Row decryption is so that financial system is audited by the order to be paid after decryption and delivery operation.
The present invention additionally uses a kind of system, including,
Memory, for storing program instruction;
Processor, for running described program instruction, to perform following steps:
If receiving permission unlocking request, distribution quantum key K1 is to the first quantum terminal, with to the quantum key K1 It is decoded verification;
If described in the first quantum terminal-pair quantum key K1 solve code check success, when by financial system mandate so as to When completing Order creation and submitting the order to be paid to be audited, transmission, and dispensed amount are encrypted to the order to be paid Sub-key K2 gives payment quantum terminal, to be decoded verification to the quantum key K2;
If it is described payment quantum terminal-pair described in quantum key K2 solution code check success, to encrypted order to be paid into Row decryption is so that financial system is audited by the order to be paid after decryption and delivery operation.
Beneficial effects of the present invention are as follows:
The present invention can effectively improve safety and the payment efficiency of payment process, realize the quantum of business transaction safety Change upgrading.The setting of especially multiple audit so that payment process is safer, while triggers and cause in succession between auditing layer by layer Payment efficiency is effectively promoted.
Description of the drawings
Fig. 1 is the flow of a kind of safe payment method based on quantum key distribution network that the embodiment of the present invention one provides Schematic diagram;
Fig. 2 is a kind of flow of the safe payment method based on quantum key distribution network provided by Embodiment 2 of the present invention Schematic diagram;
Fig. 3 is the flow of a kind of safe payment method based on quantum key distribution network that the embodiment of the present invention three provides Schematic diagram;
Fig. 4 is the flow of a kind of safe payment method based on quantum key distribution network that the embodiment of the present invention four provides Schematic diagram;
Fig. 5 is the structure diagram of a kind of system that the embodiment of the present invention five provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without making creative work Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, element, component and/or its presence or addition gathered.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
Embodiment one
Fig. 1 is referred to, the embodiment of the present invention one is related to a kind of safe payment method based on quantum key distribution network, institute The method of stating can be used for business account payment transaction, can effectively improve safety and the payment efficiency of corporate payments, preferably Embodiment includes the following steps,
Step S101, if receiving permission unlocking request, distribution quantum key K1 is to the first quantum terminal, with to the amount Sub-key K1 is decoded verification.
Wherein, when receiving permission unlocking request, then show that make single member has issued permission unlock by financial system Request authorizes system single to obtain, and to carry out permission unlock, needs to distribute quantum key K1 to the first quantum terminal, first amount Sub- terminal can make the quantum terminal of single member, and the parameters such as the key digit of the quantum key K1, byte can be according to reality Border situation needs are configured accordingly.
It when the first quantum terminal receives quantum key K1, needs to be decoded quantum key K1, then could incite somebody to action Decoded quantum key K1 with the corresponding another quantum keys of the quantum key K1 with carrying out comparison verification.Because distribution Each pair of quantum key all there are unique application numbers, therefore each quantum key can be verified accordingly.
In addition, it is all same standard that each pair of quantum key is used during distribution, decryption and verification, and There may be multiple standards in whole system.Meanwhile the distribution of the quantum key of long range allows to access Quantum repeater or credible Relay system.
If verification failure is carried out to quantum key K1, then the quantum key K1 with it is close with its corresponding another quantum Key all fails immediately, and it is the mandate that can not obtain financial system to make single member at this time, can not also complete single operation processed accordingly.
Step S102, if described in the first quantum terminal-pair quantum key K1 solve code check success, when pass through finance system System authorizes to complete Order creation and when submitting the order to be paid to be audited, biography is encrypted to the order to be paid It is defeated, and distribute quantum key K2 and give payment quantum terminal, to be decoded verification to the quantum key K2.
Wherein, if quantum key K1 described in the first quantum terminal-pair solves code check success, finance can be obtained by making single member System authorization, and in the case of authorized by financial system in for making single unit module complete Order creation to obtain To an order to be paid, while order to be paid should then be submitted to audit after the completion of Order creation.
It before having submitted order to be paid, needs to carry out corresponding encrypted transmission to the order to be paid, this is to be paid to order Singly needing encrypted transmission, encrypted transmission herein refers to quantum encrypted transmission to the unit module paid in financial system, I.e. with the corresponding encryptions of quantum key K2.As preference, in order to improve payment efficiency, when the order to be paid into After row confidential transmissions, it can directly distribute quantum key K2 and give payment quantum terminal, in order to carry out the decryption of next step verification Operation.If decryption verification failure, then financial system cannot then license to the audit that auditor carries out order, it is ensured that payment The safety of process.
Step S103, if quantum key K2 solutions code check success described in the payment quantum terminal-pair, is treated to encrypted Pay invoice is decrypted so that financial system is audited by the order to be paid after decryption and delivery operation.
Wherein, when quantum key K2 solutions code check success described in payment quantum terminal-pair, then at this time then can be to encryption Order to be paid afterwards is decrypted, and financial system can audit the order to be paid after decryption accordingly at this time, Audit carries out corresponding delivery operation after, not only increases the efficiency of audit and payment, also effectively ensures Safety of payment.
In addition, as preferred embodiment, the step S103 includes,
If it is described payment quantum terminal-pair described in quantum key K2 solution code check success, to encrypted order to be paid into Row decryption is so that payment secret order is audited and inputted to financial system to the order to be paid after decryption.Specifically, in finance System is treated after pay invoice carried out corresponding audit, can be inputted payment secret order and be paid.It is of course also possible to be Carry out delivery operation and then input payment secret order.
Generally speaking, the present invention can effectively improve safety and the payment efficiency of payment process, realize business transaction peace The quantization upgrading of full property.
Embodiment two
Referring to Fig. 2, the embodiment of the present invention two is related to a kind of safe payment method based on quantum key distribution network, this hair With the method for the embodiment of the present invention one, difference lies in the embodiment of the present invention two further includes following step to the method for bright embodiment two Suddenly:
When financial system confirms payment and generates pay invoice, biography is encrypted to the pay invoice in step S104 It is defeated, and distribute quantum key Km to financial quantum terminal, to be decoded verification to the quantum key Km.
Wherein, it when financial system confirms payment and generates pay invoice, needs the pay invoice to be encrypted transmission, The pay invoice needs encrypted transmission, and to financial system, encrypted transmission herein refers to quantum cryptography, i.e., with the quantum key The corresponding encryptions of Km.If financial quantum terminal-pair quantum key Km solutions code check is unsuccessful, then then financial system then without Method completes corresponding payment, i.e., can not handle corresponding pay invoice.
Step S105, if quantum key Km solutions code check success described in the finance quantum terminal-pair, to encrypted branch Order is paid to be decrypted so that financial system performs the pay invoice after decryption.
Wherein, when the financial quantum terminal-pair quantum key Km solutions code check success, then then to encrypted payment Order is decrypted, and financial system at this time then can perform the pay invoice after decryption accordingly, i.e., propped up accordingly It pays, so as to complete the process entirely paid.
The present embodiment is further ensured by being verified to financial quantum terminal quantum key Km so as to fulfill decoding The security performance of corporate payments.
Embodiment three
Referring to Fig. 3, the embodiment of the present invention three is related to a kind of safe payment method based on quantum key distribution network, this hair The method of bright embodiment three with the embodiment of the present invention one method difference lies in increasing the audit number for treating pay invoice, The specific embodiment of the present invention three includes the following steps:
Step S201, if receiving permission unlocking request, distribution quantum key K1 is to the first quantum terminal, with to the amount Sub-key K1 is decoded verification.
Step S202, if described in the first quantum terminal-pair quantum key K1 solve code check success, when pass through finance system System authorizes to complete Order creation and when submitting the order to be paid to be audited, biography is encrypted to the order to be paid It is defeated, and distribute quantum key K2 to the second quantum terminal, to be decoded verification to the quantum key K2.
Wherein, transmission the order to be paid is encrypted to refer to be transferred in financial system for the unit mould of audit Block, encrypted transmission herein refer to quantum encrypted transmission, i.e., with the corresponding encrypted transmissions of quantum key K2.
Step S203 if quantum key K2 described in the second quantum terminal-pair solves code check success, is treated to encrypted Pay invoice is decrypted so that financial system carries out first time review operations to the order to be paid after decryption.Wherein, work as institute It states after order to be paid completes first time review operations, you can carry out corresponding delivery operation, that is, perform step S204.
Step S204, when financial system complete for the first time audit when, to completed for the first time audit order to be paid into Row encrypted transmission, and distribute quantum key K3 and give payment quantum terminal, to be decoded verification to the quantum key K3.
Wherein, after financial system is completed to audit for the first time, the order to be paid to having completed to audit for the first time is needed Transmission is encrypted, encrypted transmission herein then refers to quantum encrypted transmission, i.e., with the corresponding encryptions of quantum key K3.
Step S205, if it is described payment quantum terminal-pair described in quantum key K3 solution code check success, to it is encrypted The order to be paid for completing audit for the first time is decrypted so that financial system after decryption to having completed treating for audit for the first time Pay invoice is audited and delivery operation.
Comparative example one, the present embodiment three is completed in Order creation to be paid and order to be paid is reviewed and pays Between completion, pay invoice can also be treated and once audited, so as to further improve the security performance of payment.Certainly, it examines The number of core can also as needed and actual conditions are adjusted correspondingly, to advantageously promote the safety of payment.
Example IV
Referring to Fig. 4, the embodiment of the present invention four is related to a kind of safe payment method based on quantum key distribution network, this hair Bright example IV is relative to three more than once audit of embodiment, therefore the method involved by example IV can specifically include following step Suddenly:
Step S301, if receiving permission unlocking request, distribution quantum key K1 is to the first quantum terminal, with to the amount Sub-key K1 is decoded verification.
Step S302, if described in the first quantum terminal-pair quantum key K1 solve code check success, when pass through finance system System authorizes to complete Order creation and when submitting the order to be paid to be audited, biography is encrypted to the order to be paid It is defeated, and distribute quantum key K2 to the second quantum terminal, to be decoded verification to the quantum key K2.
Step S303 if quantum key K2 described in the second quantum terminal-pair solves code check success, is treated to encrypted Pay invoice is decrypted so that financial system carries out first time review operations to the order to be paid after decryption.
Step S304, when financial system complete for the first time audit when, to completed for the first time audit order to be paid into Row encrypted transmission, and distribute quantum key K3 and give third quantum terminal, to be decoded verification to the quantum key K3.
Step S305, if described in the third quantum terminal-pair quantum key K3 solve code check success, to it is encrypted The order to be paid for completing audit for the first time is decrypted, so that financial system after decryption to having completed treating for audit for the first time Pay invoice carries out second of review operations.
Step S306, when financial system, which completes second, to be audited, to completed the order to be paid of second of audit into Row encrypted transmission, and distribute quantum key K4 and give payment quantum terminal, to be decoded verification to the quantum key K4.
Step S307, if it is described payment quantum terminal-pair described in quantum key K4 solution code check success, to it is encrypted The order to be paid for completing second of audit is decrypted, so that financial system after decryption to having completed treating for second of audit Pay invoice is audited and delivery operation.
The present embodiment four may be used also between Order creation to be paid is completed and order to be paid is reviewed and pays completion It is audited twice with treating pay invoice, so as to further improve the security performance of payment.Certainly, the number of audit can also As needed and actual conditions are adjusted correspondingly, to advantageously promote the safety of payment.
Embodiment five
Referring to Fig. 5, the embodiment of the present invention five is related to a kind of system, and the system 100 includes,
Memory 101, for storing program instruction;
Processor 102, for running described program instruction, if receiving permission unlocking request to perform, distribution quantum is close Key K1 gives the first quantum terminal, to be decoded verification to the quantum key K1;If amount described in the first quantum terminal-pair Sub-key K1 solution code check success, when by financial system mandate so as to complete Order creation and order to be paid is submitted to be examined During core, transmission is encrypted to the order to be paid, and distributes quantum key K2 and gives payment quantum terminal, with to the quantum Key K2 is decoded verification;If quantum key K2 solutions code check success described in the payment quantum terminal-pair, to encrypted Order to be paid is decrypted so that financial system is audited by the order to be paid after decryption and delivery operation.
As preferred embodiment, the processor also executes the following steps, and branch is paid and generate when financial system confirms When paying order, transmission is encrypted to the pay invoice, and distributes quantum key Km to financial quantum terminal, with to the amount Sub-key Km is decoded verification;If quantum key Km solutions code check success described in the finance quantum terminal-pair, after encryption Pay invoice be decrypted so that financial system performs the pay invoice after decryption.
As preferred embodiment, the processor performs the financial system to being treated after decryption
Payment secret order is audited and inputted to pay invoice.
As preferred embodiment, if the processor also performs the first quantum terminal-pair institute
State quantum key K1 solution code check success, when by financial system mandate so as to complete order
When making and submitting the order to be paid to be audited, transmission, and dispensed amount are encrypted to the order to be paid Sub-key K2 gives the second quantum terminal, to be decoded verification to the quantum key K2;If the second quantum terminal-pair institute Quantum key K2 solution code check successes are stated, encrypted order to be paid are decrypted so that financial system after decryption to treating
Pay invoice carries out first time review operations;
Wherein, when financial system is completed to audit for the first time, the order to be paid for having completed to audit for the first time is added Close transmission, and distribute quantum key K3 and give payment quantum terminal, to be decoded verification to the quantum key K3;If the branch It pays quantum key K3 described in quantum terminal-pair and solves code check success, to the encrypted order to be paid for having completed to audit for the first time It is decrypted so that behaviour is audited and paid to financial system to the order to be paid for having completed to audit for the first time after decryption Make.
As preferred embodiment, the processor is also performed when financial system is completed to audit for the first time, to having completed Transmission is encrypted, and distributes quantum key K3 and give third quantum terminal in the order to be paid of audit for the first time, with to the amount Sub-key K3 is decoded verification;If quantum key K3 described in the third quantum terminal-pair solves code check success, after encryption Completed for the first time audit order to be paid be decrypted so that financial system to after decryption completion for the first time audit Order to be paid carry out second of review operations;
Wherein, when financial system, which completes second, to be audited, the order to be paid for having completed second of audit is added Close transmission, and distribute quantum key K4 and give payment quantum terminal, to be decoded verification to the quantum key K4;If the branch It pays quantum key K4 described in quantum terminal-pair and solves code check success, to the encrypted order to be paid for having completed second of audit It is decrypted, so that behaviour is audited and paid to financial system to the order to be paid for having completed second of audit after decryption Make.
For those skilled in the art, technical solution that can be as described above and design are made other each Kind is corresponding to be changed and deforms, and all these change and deform the protection model that should all belong to the claims in the present invention Within enclosing.

Claims (10)

1. a kind of safe payment method based on quantum key distribution network, which is characterized in that include the following steps,
If receiving permission unlocking request, distribution quantum key K1 is to the first quantum terminal, to be carried out to the quantum key K1 Solve code check;
If described in the first quantum terminal-pair quantum key K1 solve code check success, when by financial system mandate so as to complete Order creation and when submitting the order to be paid to be audited, transmission is encrypted, and it is close to distribute quantum to the order to be paid Key K2 gives payment quantum terminal, to be decoded verification to the quantum key K2;
If the code check success of quantum key K2 solutions, solves encrypted order to be paid described in the payment quantum terminal-pair It is close so that financial system is audited by the order to be paid after decryption and delivery operation.
2. the method as described in claim 1, which is characterized in that the method further includes,
When financial system confirms payment and generates pay invoice, transmission is encrypted, and distribute quantum to the pay invoice Key Km gives financial quantum terminal, to be decoded verification to the quantum key Km;
If the code check success of quantum key Km solutions, is decrypted encrypted pay invoice described in the finance quantum terminal-pair So that financial system performs the pay invoice after decryption.
3. the method as described in claim 1, which is characterized in that the financial system examines the order to be paid after decryption Core and delivery operation include,
Payment secret order is audited and inputted to the financial system to the order to be paid after decryption.
4. the method as described in claim 1, which is characterized in that if quantum key K1 described in the first quantum terminal-pair is decoded Verify successfully, when by financial system mandate so as to complete Order creation and when order to be paid being submitted to be audited, to described Transmission is encrypted in order to be paid, and distributes quantum key K2 to the second quantum terminal, to be carried out to the quantum key K2 Code check is solved, the method further includes,
If quantum key K2 described in the second quantum terminal-pair solves code check success, encrypted order to be paid is solved It is close so that financial system to after decryption order to be paid carry out first time review operations;
Wherein, when financial system is completed to audit for the first time, biography is encrypted to the order to be paid for having completed to audit for the first time It is defeated, and distribute quantum key K3 and give payment quantum terminal, to be decoded verification to the quantum key K3;
If quantum key K3 solutions code check success described in the payment quantum terminal-pair has been completed to audit for the first time to encrypted Order to be paid be decrypted so that financial system to after decryption completed for the first time audit order to be paid examine Core and delivery operation.
5. method as claimed in claim 4, which is characterized in that when financial system is completed to audit for the first time, to having completed the Transmission is encrypted in the order to be paid once audited, and distributes quantum key K3 and give third quantum terminal, with to the quantum Key K3 is decoded verification;The method further includes
If quantum key K3 described in the third quantum terminal-pair solves code check success, complete to audit for the first time to encrypted Order to be paid be decrypted so that financial system carries out the to the order to be paid audited for the first time of having completed after decryption Secondary review operations;
Wherein, when financial system, which completes second, to be audited, biography is encrypted to the order to be paid for having completed second of audit It is defeated, and distribute quantum key K4 and give payment quantum terminal, to be decoded verification to the quantum key K4;
If the code check success of quantum key K4 solutions, second of audit has been completed to encrypted described in the payment quantum terminal-pair Order to be paid be decrypted so that financial system examines the order to be paid for having completed second of audit after decryption Core and delivery operation.
6. a kind of system, which is characterized in that including,
Memory, for storing program instruction;
Processor, for running described program instruction, to perform following steps:
If receiving permission unlocking request, distribution quantum key K1 is to the first quantum terminal, to be carried out to the quantum key K1 Solve code check;
If described in the first quantum terminal-pair quantum key K1 solve code check success, when by financial system mandate so as to complete Order creation and when submitting the order to be paid to be audited, transmission is encrypted, and it is close to distribute quantum to the order to be paid Key K2 gives payment quantum terminal, to be decoded verification to the quantum key K2;
If the code check success of quantum key K2 solutions, solves encrypted order to be paid described in the payment quantum terminal-pair It is close so that financial system is audited by the order to be paid after decryption and delivery operation.
7. system as claimed in claim 6, which is characterized in that the processor also executes the following steps,
When financial system confirms payment and generates pay invoice, transmission is encrypted, and distribute quantum to the pay invoice Key Km gives financial quantum terminal, to be decoded verification to the quantum key Km;
If the code check success of quantum key Km solutions, is decrypted encrypted pay invoice described in the finance quantum terminal-pair So that financial system performs the pay invoice after decryption.
8. system as claimed in claim 6, which is characterized in that the processor performs the financial system to being treated after decryption Pay invoice is audited and delivery operation includes performing following steps,
Payment secret order is audited and inputted to the financial system to the order to be paid after decryption.
9. system as claimed in claim 6, which is characterized in that if the processor is performed described in the first quantum terminal-pair Quantum key K1 solution code check successes, when by financial system mandate so as to complete Order creation and order to be paid is submitted to carry out During audit, transmission is encrypted to the order to be paid, and distributes quantum key K2 to the second quantum terminal, with to the amount Sub-key K2 is decoded verification, and the processor also executes the following steps,
If quantum key K2 described in the second quantum terminal-pair solves code check success, encrypted order to be paid is solved It is close so that financial system to after decryption order to be paid carry out first time review operations;
Wherein, when financial system is completed to audit for the first time, biography is encrypted to the order to be paid for having completed to audit for the first time It is defeated, and distribute quantum key K3 and give payment quantum terminal, to be decoded verification to the quantum key K3;
If quantum key K3 solutions code check success described in the payment quantum terminal-pair has been completed to audit for the first time to encrypted Order to be paid be decrypted so that financial system to after decryption completed for the first time audit order to be paid examine Core and delivery operation.
10. system as claimed in claim 9, which is characterized in that the processor is performed when financial system is completed to examine for the first time During core, transmission is encrypted to the order to be paid for having completed to audit for the first time, and distributes quantum key K3 to third quantum end End, to be decoded verification to the quantum key K3, the processor also executes the following steps,
If quantum key K3 described in the third quantum terminal-pair solves code check success, complete to audit for the first time to encrypted Order to be paid be decrypted so that financial system carries out the to the order to be paid audited for the first time of having completed after decryption Secondary review operations;
Wherein, when financial system, which completes second, to be audited, biography is encrypted to the order to be paid for having completed second of audit It is defeated, and distribute quantum key K4 and give payment quantum terminal, to be decoded verification to the quantum key K4;
If the code check success of quantum key K4 solutions, second of audit has been completed to encrypted described in the payment quantum terminal-pair Order to be paid be decrypted so that financial system examines the order to be paid for having completed second of audit after decryption Core and delivery operation.
CN201710487579.2A 2017-06-23 2017-06-23 Safe payment method and system based on quantum key distribution network Active CN108133370B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710487579.2A CN108133370B (en) 2017-06-23 2017-06-23 Safe payment method and system based on quantum key distribution network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710487579.2A CN108133370B (en) 2017-06-23 2017-06-23 Safe payment method and system based on quantum key distribution network

Publications (2)

Publication Number Publication Date
CN108133370A true CN108133370A (en) 2018-06-08
CN108133370B CN108133370B (en) 2021-07-20

Family

ID=62388489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710487579.2A Active CN108133370B (en) 2017-06-23 2017-06-23 Safe payment method and system based on quantum key distribution network

Country Status (1)

Country Link
CN (1) CN108133370B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4181457A1 (en) * 2021-11-11 2023-05-17 Terra Quantum AG Quantum based method and system for performing cryptocurrency asset transactions

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060062392A1 (en) * 2004-07-08 2006-03-23 Magiq Technologies, Inc. Key manager for QKD networks
US20070014415A1 (en) * 2005-06-16 2007-01-18 Harrison Keith A Quantum key distribution method and apparatus
US20090307121A1 (en) * 2008-06-09 2009-12-10 Lutnick Howard W Trading system products and processes
CN102196425A (en) * 2011-07-01 2011-09-21 安徽量子通信技术有限公司 Quantum-key-distribution-network-based mobile encryption system and communication method thereof
US20130315395A1 (en) * 2012-05-25 2013-11-28 The Johns Hopkins University Embedded Authentication Protocol for Quantum Key Distribution Systems
CN103763099A (en) * 2014-02-13 2014-04-30 国家电网公司 Electric power security communication network based on quantum key distribution technology
CN104821874A (en) * 2015-05-15 2015-08-05 长春大学 Method employing quantum secret key for IOT (Internet of Things) data encryption transmission
KR20160091108A (en) * 2015-01-23 2016-08-02 서울시립대학교 산학협력단 Secure payment and authentification system having enhanced security with quantum crypyography
CN105871538A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 Quantum key distribution system, quantum key distribution method and device
WO2016145037A1 (en) * 2015-03-09 2016-09-15 University Of Houston System Methods and apparatuses for authentication in quantum key distribution and/or quantum data communication
CN106204258A (en) * 2016-07-22 2016-12-07 福建节点信息科技有限公司 A kind of business capital risk moves managing and control system and management-control method
US20170033926A1 (en) * 2015-07-31 2017-02-02 Alibaba Group Holding Limited Authentication method, device and system for quantum key distribution process

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060062392A1 (en) * 2004-07-08 2006-03-23 Magiq Technologies, Inc. Key manager for QKD networks
US20070014415A1 (en) * 2005-06-16 2007-01-18 Harrison Keith A Quantum key distribution method and apparatus
US20090307121A1 (en) * 2008-06-09 2009-12-10 Lutnick Howard W Trading system products and processes
CN102196425A (en) * 2011-07-01 2011-09-21 安徽量子通信技术有限公司 Quantum-key-distribution-network-based mobile encryption system and communication method thereof
US20130315395A1 (en) * 2012-05-25 2013-11-28 The Johns Hopkins University Embedded Authentication Protocol for Quantum Key Distribution Systems
CN103763099A (en) * 2014-02-13 2014-04-30 国家电网公司 Electric power security communication network based on quantum key distribution technology
CN105871538A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 Quantum key distribution system, quantum key distribution method and device
KR20160091108A (en) * 2015-01-23 2016-08-02 서울시립대학교 산학협력단 Secure payment and authentification system having enhanced security with quantum crypyography
WO2016145037A1 (en) * 2015-03-09 2016-09-15 University Of Houston System Methods and apparatuses for authentication in quantum key distribution and/or quantum data communication
CN104821874A (en) * 2015-05-15 2015-08-05 长春大学 Method employing quantum secret key for IOT (Internet of Things) data encryption transmission
US20170033926A1 (en) * 2015-07-31 2017-02-02 Alibaba Group Holding Limited Authentication method, device and system for quantum key distribution process
CN106204258A (en) * 2016-07-22 2016-12-07 福建节点信息科技有限公司 A kind of business capital risk moves managing and control system and management-control method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王婷: "PKI应用于电子商务的安全性分析", 《大众科技》 *

Also Published As

Publication number Publication date
CN108133370B (en) 2021-07-20

Similar Documents

Publication Publication Date Title
WO2021008453A1 (en) Method and system for offline blockchain transaction based on identifier authentication
CN110084602B (en) Method, system, equipment and storage medium for lending protected private information
CN109412812B (en) Data security processing system, method, device and storage medium
CN103944724B (en) A kind of subscriber identification card
CN109922076B (en) Secure communication method and authorization platform in soft lock permission process
CN110070363B (en) Account management method and verification method in block chain network and terminal equipment
CN104899741B (en) A kind of on-line payment method and on-line payment system based on IC bank card
CN104574652B (en) The increase of IC-card blowdown data, the method reduced and IC-card
CN102281143B (en) Remote unlocking system of intelligent card
CN107967605B (en) Rail transit automatic fare collection two-dimensional code credit payment encryption method
CN108763942A (en) Digital license based on block chain licenses device and its application method
CN108011719A (en) A kind of endorsement method, device and digital signature system
CN108846653A (en) Big data secure sharing method and system based on block chain
CN103152732B (en) Cloud password system and operation method thereof
CN102663317A (en) Security strengthening system for business receipts and key data flow process
CN116151827B (en) Digital wallet security system and double off-line transaction method based on security system
CN115147224A (en) Transaction data sharing method and device based on alliance chain
WO2019062511A1 (en) Encryption-based data rights verification method and system
CN101901306A (en) Network transaction encryption method and dynamic password equipment used by same
CN110519222A (en) Outer net access identity authentication method and system based on disposable asymmetric key pair and key card
CN111899082B (en) Hospital pre-paid money supervision system, equipment and medium
CN105933117A (en) Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage
CN108133370A (en) A kind of safe payment method and system based on quantum key distribution network
CN103546295A (en) Dynamic mobile signature system and method
JPH10222468A (en) Ic card processing method for network system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right
PP01 Preservation of patent right

Effective date of registration: 20210922

Granted publication date: 20210720