CN108133370B - Safe payment method and system based on quantum key distribution network - Google Patents

Safe payment method and system based on quantum key distribution network Download PDF

Info

Publication number
CN108133370B
CN108133370B CN201710487579.2A CN201710487579A CN108133370B CN 108133370 B CN108133370 B CN 108133370B CN 201710487579 A CN201710487579 A CN 201710487579A CN 108133370 B CN108133370 B CN 108133370B
Authority
CN
China
Prior art keywords
order
quantum
quantum key
paid
payment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710487579.2A
Other languages
Chinese (zh)
Other versions
CN108133370A (en
Inventor
陈强
朱晓霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Wangjin Holdings Co ltd
Original Assignee
Guangdong Wangjin Holdings Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Wangjin Holdings Co ltd filed Critical Guangdong Wangjin Holdings Co ltd
Priority to CN201710487579.2A priority Critical patent/CN108133370B/en
Publication of CN108133370A publication Critical patent/CN108133370A/en
Application granted granted Critical
Publication of CN108133370B publication Critical patent/CN108133370B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Electromagnetism (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to a secure payment method and a system based on a quantum key distribution network, wherein the method comprises the steps of distributing a quantum key K1 to a first quantum terminal if an authority unlocking request is received so as to decode and check the quantum key K1; if the first quantum terminal successfully decodes and checks the quantum key K1, when order making is completed through financial system authorization and an order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to the payment quantum terminal so as to decode and check the quantum key K2; and if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted order to be paid so that the financial system can verify and pay the decrypted order to be paid. The invention can effectively improve the safety and payment efficiency of the payment process and realize the quantization upgrading of the enterprise transaction safety.

Description

Safe payment method and system based on quantum key distribution network
Technical Field
The invention relates to the technical field of electronics, in particular to a secure payment method and system based on a quantum key distribution network.
Background
In the field of enterprise security payment, the existing scheme mainly has three security mechanisms: firstly, an enterprise payment form-auditing mechanism is established to reduce the risk of artificially appropriating the public money; secondly, when enterprise personnel execute the own right, the Ukey of the entity needs to be inserted for identity authentication and data encryption; thirdly, the storage and transmission of information are encrypted by using a popular RSA algorithm. The first security mechanism is mainly to set up a flow to reduce artificial risks, but the second mechanism using an entity Ukey has the defects of complex operation, easy loss, stealing possibility and the like, and the RSA algorithm of the third mechanism has self limitations: after the quantum computer which is in many orders of magnitude stronger than the computing power of the current computer is invented by using the large prime number product encryption mode, the large prime number used for encryption can be traversed and decrypted in a short time. The quantum key distribution technology is based on the Heisebag inaccuracy-measuring principle and the characteristic that quantum states cannot be copied, and has the advantages of being incapable of being cracked, preventing eavesdropping, being incapable of being intercepted and being incapable of obtaining keys through traversal. However, quantum communication has been developed to date, and quantum communication can be divided into two directions of "quantum key distribution" and "quantum state transmission" according to application scenarios and transmitted bit types, wherein the "quantum key distribution" technology has been first separated from experimental stages and enters preliminary industrialization, but has not yet been widely applied.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a secure payment method and a system based on a quantum key distribution network, which can effectively improve the security and the payment efficiency of a payment process.
In order to achieve the purpose, the invention adopts the following technical scheme:
a secure payment method based on quantum key distribution network comprises the following steps,
if an authority unlocking request is received, a quantum key K1 is distributed to the first quantum terminal, so that decoding verification is carried out on the quantum key K1;
if the first quantum terminal successfully decodes and checks the quantum key K1, when order making is completed through financial system authorization and an order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to the payment quantum terminal so as to decode and check the quantum key K2;
and if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted order to be paid so that the financial system can verify and pay the decrypted order to be paid.
The present invention also contemplates a system comprising,
a memory for storing program instructions;
a processor for executing the program instructions to perform the steps of:
if an authority unlocking request is received, a quantum key K1 is distributed to the first quantum terminal, so that decoding verification is carried out on the quantum key K1;
if the first quantum terminal successfully decodes and checks the quantum key K1, when order making is completed through financial system authorization and an order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to the payment quantum terminal so as to decode and check the quantum key K2;
and if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted order to be paid so that the financial system can verify and pay the decrypted order to be paid.
The invention has the following beneficial effects:
the invention can effectively improve the safety and payment efficiency of the payment process and realize the quantization upgrading of the enterprise transaction safety. Especially, the setting of multiple audits ensures that the payment process is safer, and the payment efficiency is effectively improved by sequentially triggering the audits layer by layer.
Drawings
Fig. 1 is a schematic flowchart of a secure payment method based on a quantum key distribution network according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a secure payment method based on a quantum key distribution network according to a second embodiment of the present invention;
fig. 3 is a schematic flowchart of a secure payment method based on a quantum key distribution network according to a third embodiment of the present invention;
fig. 4 is a schematic flowchart of a secure payment method based on a quantum key distribution network according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a system according to a fifth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
Example one
Referring to fig. 1, an embodiment of the present invention relates to a secure payment method based on a quantum key distribution network, which can be used in an enterprise account payment service, and can effectively improve the security and payment efficiency of enterprise payment, and a preferred embodiment of the method includes the following steps,
and S101, if an authority unlocking request is received, distributing a quantum key K1 to a first quantum terminal so as to perform decoding verification on the quantum key K1.
When receiving the permission unlocking request, the system administrator sends out the permission unlocking request through the financial system to obtain the authorization system order, in order to unlock the permission, the quantum key K1 needs to be distributed to the first quantum terminal, the first quantum terminal can be the quantum terminal of the system administrator, and the parameters such as the key digits and bytes of the quantum key K1 can be configured correspondingly according to the actual situation.
When the first quantum terminal receives the quantum key K1, the quantum key K1 needs to be decoded, and then the decoded quantum key K1 can be compared and checked with another quantum key corresponding to the quantum key K1. Because each pair of distributed quantum keys has a unique application number, each quantum key can be correspondingly verified.
In addition, each pair of quantum keys uses the same standard in the distribution, decryption and verification processes, and multiple standards can exist in the whole system. At the same time, the distribution of quantum keys over long distances allows access to quantum relay or trusted relay systems.
If the quantum key K1 fails to be verified, the quantum key K1 and another corresponding quantum key are both invalid, and at this time, the person making the order cannot obtain the authorization of the financial system and cannot complete the corresponding order making operation.
Step S102, if the first quantum terminal successfully decodes and checks the quantum key K1, when the order is completed through the authorization of the financial system and the order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and the quantum key K2 is distributed to the payment quantum terminal so as to decode and check the quantum key K2.
If the first quantum terminal successfully decodes and verifies the quantum key K1, the order making personnel can obtain the authorization of the financial system, and complete order making through a unit module for making orders in the financial system under the condition of obtaining the authorization to obtain an order to be paid, and the order to be paid should be submitted for auditing after the order making is completed.
Before the order to be paid is submitted, the order to be paid needs to be encrypted and transmitted to a unit module for payment in the financial system, where the encrypted transmission refers to quantum encrypted transmission, that is, encryption corresponding to the quantum key K2. Preferably, in order to improve the payment efficiency, after the order to be paid is subjected to secret transmission, the quantum key K2 may be directly distributed to the payment quantum terminal, so as to facilitate the next decryption verification operation. If the decryption verification fails, the financial system cannot authorize the auditor to audit the order, and the safety of the payment process is ensured.
Step S103, if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, the encrypted order to be paid is decrypted so that the financial system can perform auditing and payment operations on the decrypted order to be paid.
When the quantum key K2 is successfully decoded and verified by the payment quantum terminal, the encrypted order to be paid can be decrypted, and the financial system can correspondingly audit the decrypted order to be paid and perform corresponding payment operation after the audit is passed, so that the efficiency of audit and payment is improved, and the payment safety is effectively ensured.
In addition, as a preferred embodiment, the step S103 includes,
and if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted order to be paid so that the financial system can verify the decrypted order to be paid and input a payment password. Specifically, after the financial system performs corresponding audit on the order to be paid, a payment secret order can be input for payment. Of course, the payment secret may be input after the payment operation is performed.
In general, the invention can effectively improve the safety and payment efficiency of the payment process and realize the quantization upgrade of the enterprise transaction safety.
Example two
Referring to fig. 2, a second embodiment of the present invention relates to a secure payment method based on a quantum key distribution network, and the difference between the method of the second embodiment of the present invention and the method of the first embodiment of the present invention is that the second embodiment of the present invention further includes the following steps:
and step S104, when the financial system confirms payment and generates a payment order, encrypting and transmitting the payment order, and distributing the quantum key Km to the financial quantum terminal so as to decode and check the quantum key Km.
When the financial system confirms payment and generates a payment order, the payment order needs to be encrypted and transmitted to the financial system, wherein the encrypted transmission refers to quantum encryption, namely encryption corresponding to the quantum key Km. If the quantum key Km is not successfully decoded and checked by the financial quantum terminal, the financial system cannot complete corresponding payment, that is, cannot process a corresponding payment order.
And step S105, if the quantum key Km is successfully decoded and verified by the financial quantum terminal, decrypting the encrypted payment order so that the financial system executes the decrypted payment order.
When the financial quantum terminal successfully decodes and checks the quantum key Km, the encrypted payment order is decrypted, and the financial system can correspondingly execute the decrypted payment order, namely, correspondingly pay, so that the whole payment process is completed.
The embodiment further ensures the security performance of enterprise payment by sending the quantum key Km to the financial quantum terminal to realize decoding verification.
EXAMPLE III
Referring to fig. 3, a third embodiment of the present invention relates to a secure payment method based on a quantum key distribution network, and the difference between the method of the third embodiment of the present invention and the method of the first embodiment of the present invention is that the number of audits for an order to be paid is increased, and specifically, the third embodiment of the present invention includes the following steps:
step S201, if an authority unlocking request is received, a quantum key K1 is distributed to a first quantum terminal, so that decoding verification is carried out on the quantum key K1.
Step S202, if the decoding verification of the quantum key K1 by the first quantum terminal is successful, when order making is completed through financial system authorization and an order to be paid is submitted for verification, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to a second quantum terminal so as to perform decoding verification of the quantum key K2.
The encrypted transmission of the order to be paid refers to transmission to a unit module for auditing in a financial system, where the encrypted transmission refers to quantum encrypted transmission, that is, encrypted transmission corresponding to the quantum key K2.
Step S203, if the second quantum terminal successfully decodes and verifies the quantum key K2, the encrypted order to be paid is decrypted so that the financial system performs a first audit operation on the decrypted order to be paid. After the first audit operation of the order to be paid is completed, the corresponding payment operation can be performed, that is, step S204 is executed.
And S204, when the financial system finishes the first audit, carrying out encryption transmission on the order to be paid after the first audit is finished, and distributing the quantum key K3 to the payment quantum terminal so as to carry out decoding verification on the quantum key K3.
After the financial system completes the first audit, encrypted transmission needs to be performed on the order to be paid, which has completed the first audit, where the encrypted transmission refers to quantum encrypted transmission, that is, encryption corresponding to the quantum key K3.
Step S205, if the quantum key K3 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order that has been subjected to the first audit so that the financial system performs audit and payment operations on the decrypted to-be-paid order that has been subjected to the first audit.
Compared with the first embodiment, in the third embodiment, one audit can be performed on the order to be paid between the completion of the order to be paid and the audit and completion of the payment of the order to be paid, so that the safety performance of the payment is further improved. Of course, the number of audits may be adjusted accordingly as needed and as needed to better facilitate payment security.
Example four
Referring to fig. 4, a fourth embodiment of the present invention relates to a secure payment method based on a quantum key distribution network, and compared with a third embodiment, the fourth embodiment of the present invention has more auditing, so that the method according to the fourth embodiment may specifically include the following steps:
step S301, if an authority unlocking request is received, a quantum key K1 is distributed to the first quantum terminal, so that decoding verification is carried out on the quantum key K1.
Step S302, if the decoding verification of the quantum key K1 by the first quantum terminal is successful, when order making is completed through financial system authorization and an order to be paid is submitted for verification, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to a second quantum terminal so as to perform decoding verification of the quantum key K2.
Step S303, if the second quantum terminal successfully decodes and verifies the quantum key K2, the encrypted order to be paid is decrypted, so that the financial system performs a first audit operation on the decrypted order to be paid.
And S304, when the financial system finishes the first audit, carrying out encryption transmission on the order to be paid after the first audit is finished, and distributing the quantum key K3 to a third quantum terminal so as to carry out decoding verification on the quantum key K3.
Step S305, if the third quantum terminal successfully decodes and verifies the quantum key K3, decrypting the encrypted to-be-paid order that has been subjected to the first audit, so that the financial system performs a second audit operation on the decrypted to-be-paid order that has been subjected to the first audit.
And S306, when the financial system finishes the second audit, carrying out encryption transmission on the order to be paid after the second audit is finished, and distributing the quantum key K4 to the payment quantum terminal so as to carry out decoding verification on the quantum key K4.
Step S307, if the quantum key K4 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order that has been subjected to the second audit, so that the financial system performs audit and payment operations on the decrypted to-be-paid order that has been subjected to the second audit.
In the fourth embodiment, two audits can be performed on the order to be paid between the completion of the order to be paid and the audit and completion of the payment of the order to be paid, so that the safety performance of the payment is further improved. Of course, the number of audits may be adjusted accordingly as needed and as needed to better facilitate payment security.
EXAMPLE five
Referring to fig. 5, an embodiment of the present invention relates to a system, the system 100 comprising,
a memory 101 for storing program instructions;
the processor 102 is configured to run the program instruction, so as to execute, if an authority unlocking request is received, distributing a quantum key K1 to the first quantum terminal, so as to perform decoding verification on the quantum key K1; if the first quantum terminal successfully decodes and checks the quantum key K1, when order making is completed through financial system authorization and an order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to the payment quantum terminal so as to decode and check the quantum key K2; and if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted order to be paid so that the financial system can verify and pay the decrypted order to be paid.
In a preferred embodiment, the processor further executes the following steps, when the financial system confirms payment and generates a payment order, performing encrypted transmission on the payment order, and distributing the quantum key Km to the financial quantum terminal so as to perform decoding verification on the quantum key Km; and if the quantum key Km is successfully decoded and verified by the financial quantum terminal, decrypting the encrypted payment order so that the financial system executes the decrypted payment order.
In a preferred embodiment, the processor executes the financial system to decrypt the decrypted data to be used
And checking the payment order and inputting a payment secret order.
As a preferred embodiment, the processor further executes if the first quantum terminal pair is terminated
The quantum key K1 is successfully decoded and verified, and when the order is completed through the authorization of the financial system
When an order to be paid is manufactured and submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to a second quantum terminal so as to perform decoding verification on the quantum key K2; if the second quantum terminal successfully decodes and verifies the quantum key K2, the encrypted order to be paid is decrypted so that the financial system can decrypt the decrypted order to be paid
Carrying out first auditing operation on the payment order;
when the financial system completes the first audit, the order to be paid, which has completed the first audit, is encrypted and transmitted, and a quantum key K3 is distributed to the payment quantum terminal, so that the quantum key K3 is decoded and verified; and if the quantum key K3 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order which is subjected to the first audit so that the financial system can perform audit and payment operation on the decrypted to-be-paid order which is subjected to the first audit.
In a preferred embodiment, when the financial system completes the first audit, the processor further performs encrypted transmission on the order to be paid after the first audit is completed, and distributes the quantum key K3 to a third quantum terminal so as to perform decoding verification on the quantum key K3; if the third quantum terminal successfully decodes and checks the quantum key K3, decrypting the encrypted to-be-paid order which has been subjected to the first audit, so that the financial system performs a second audit operation on the decrypted to-be-paid order which has been subjected to the first audit;
when the financial system completes the second audit, the order to be paid, which has completed the second audit, is encrypted and transmitted, and a quantum key K4 is distributed to the payment quantum terminal, so that the quantum key K4 is decoded and verified; and if the quantum key K4 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order which is subjected to the second audit, so that the financial system can perform audit and payment operation on the decrypted to-be-paid order which is subjected to the second audit.
Various other changes and modifications to the above-described embodiments and concepts will become apparent to those skilled in the art from the above description, and all such changes and modifications are intended to be included within the scope of the present invention as defined in the appended claims.

Claims (6)

1. A secure payment method based on a quantum key distribution network is characterized by comprising the following steps of distributing a quantum key K1 to a first quantum terminal to perform decoding verification on the quantum key K1 if an authority unlocking request is received;
if the first quantum terminal successfully decodes and checks the quantum key K1, when order making is completed through financial system authorization and an order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to the payment quantum terminal so as to decode and check the quantum key K2;
if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, the encrypted order to be paid is decrypted so that the financial system can verify and pay the decrypted order to be paid;
the financial system checks the decrypted order to be paid and carries out payment operation, wherein the financial system checks the decrypted order to be paid and inputs a payment secret order;
if the first quantum terminal successfully decodes and checks the quantum key K1, when order making is completed through financial system authorization and an order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to a second quantum terminal so as to decode and check the quantum key K2, wherein the method further comprises the step of decrypting the encrypted order to be paid so that the financial system performs a first auditing operation on the decrypted order to be paid if the second quantum terminal successfully decodes and checks the quantum key K2;
when the financial system completes the first audit, the order to be paid, which has completed the first audit, is encrypted and transmitted, and a quantum key K3 is distributed to the payment quantum terminal, so that the quantum key K3 is decoded and verified;
and if the quantum key K3 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order which is subjected to the first audit so that the financial system can perform audit and payment operation on the decrypted to-be-paid order which is subjected to the first audit.
2. A secure payment method based on a quantum key distribution network as recited in claim 1, wherein the method further comprises,
when the financial system confirms payment and generates a payment order, carrying out encryption transmission on the payment order, and distributing a quantum key Km to a financial quantum terminal so as to carry out decoding verification on the quantum key Km;
and if the quantum key Km is successfully decoded and verified by the financial quantum terminal, decrypting the encrypted payment order so that the financial system executes the decrypted payment order.
3. The secure payment method based on quantum key distribution network as claimed in claim 1, wherein when the financial system completes the first audit, the order to be paid that has completed the first audit is transmitted in an encrypted manner, and a quantum key K3 is distributed to the third quantum terminal, so as to perform decoding verification on the quantum key K3; if the third quantum terminal successfully decodes and verifies the quantum key K3, decrypting the encrypted to-be-paid order which is subjected to the first audit, so that the financial system performs a second audit operation on the decrypted to-be-paid order which is subjected to the first audit;
when the financial system completes the second audit, the order to be paid, which has completed the second audit, is encrypted and transmitted, and a quantum key K4 is distributed to the payment quantum terminal, so that the quantum key K4 is decoded and verified;
and if the quantum key K4 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order which is subjected to the second audit, so that the financial system can perform audit and payment operation on the decrypted to-be-paid order which is subjected to the second audit.
4. A secure payment system based on a quantum key distribution network is characterized by comprising,
a memory for storing program instructions;
a processor for executing the program instructions to perform the steps of:
if an authority unlocking request is received, a quantum key K1 is distributed to the first quantum terminal, so that decoding verification is carried out on the quantum key K1;
if the first quantum terminal successfully decodes and checks the quantum key K1, when order making is completed through financial system authorization and an order to be paid is submitted for auditing, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to the payment quantum terminal so as to decode and check the quantum key K2;
if the quantum key K2 is successfully decoded and verified by the payment quantum terminal, the encrypted order to be paid is decrypted so that the financial system can verify and pay the decrypted order to be paid;
the processor executes the auditing and payment operations of the financial system on the decrypted order to be paid, and comprises the following steps of executing the auditing and payment operations of the financial system on the decrypted order to be paid and inputting a payment password;
the processor executes the following steps that if the first quantum terminal successfully decodes and checks the quantum key K1, when the financial system authorizes the order to be made and submits the order to be paid for checking, the order to be paid is encrypted and transmitted, and a quantum key K2 is distributed to a second quantum terminal to perform decoding and checking on the quantum key K2, and if the second quantum terminal successfully decodes and checks the quantum key K2, the encrypted order to be paid is decrypted so that the financial system performs first checking operation on the decrypted order to be paid;
when the financial system completes the first audit, the order to be paid, which has completed the first audit, is encrypted and transmitted, and a quantum key K3 is distributed to the payment quantum terminal, so that the quantum key K3 is decoded and verified;
and if the quantum key K3 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order which is subjected to the first audit so that the financial system can perform audit and payment operation on the decrypted to-be-paid order which is subjected to the first audit.
5. The secure payment system based on quantum key distribution network of claim 4, wherein the processor further executes the steps of, when the financial system confirms payment and generates a payment order, making an encrypted transmission of the payment order and distributing the quantum key Km to the financial quantum terminal for decoding and checking the quantum key Km;
and if the quantum key Km is successfully decoded and verified by the financial quantum terminal, decrypting the encrypted payment order so that the financial system executes the decrypted payment order.
6. The secure payment system based on quantum key distribution network of claim 4, wherein the processor performs, when the financial system completes the first audit, the encrypted transmission of the order to be paid that has completed the first audit, and distributes the quantum key K3 to the third quantum terminal to perform decoding check on the quantum key K3, and the processor further performs the following steps, if the decoding check on the quantum key K3 by the third quantum terminal is successful, the encrypted order to be paid that has completed the first audit is decrypted, so that the financial system performs the second audit operation on the decrypted order to be paid that has completed the first audit;
when the financial system completes the second audit, the order to be paid, which has completed the second audit, is encrypted and transmitted, and a quantum key K4 is distributed to the payment quantum terminal, so that the quantum key K4 is decoded and verified;
and if the quantum key K4 is successfully decoded and verified by the payment quantum terminal, decrypting the encrypted to-be-paid order which is subjected to the second audit, so that the financial system can perform audit and payment operation on the decrypted to-be-paid order which is subjected to the second audit.
CN201710487579.2A 2017-06-23 2017-06-23 Safe payment method and system based on quantum key distribution network Active CN108133370B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710487579.2A CN108133370B (en) 2017-06-23 2017-06-23 Safe payment method and system based on quantum key distribution network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710487579.2A CN108133370B (en) 2017-06-23 2017-06-23 Safe payment method and system based on quantum key distribution network

Publications (2)

Publication Number Publication Date
CN108133370A CN108133370A (en) 2018-06-08
CN108133370B true CN108133370B (en) 2021-07-20

Family

ID=62388489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710487579.2A Active CN108133370B (en) 2017-06-23 2017-06-23 Safe payment method and system based on quantum key distribution network

Country Status (1)

Country Link
CN (1) CN108133370B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4181457A1 (en) * 2021-11-11 2023-05-17 Terra Quantum AG Quantum based method and system for performing cryptocurrency asset transactions

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763099A (en) * 2014-02-13 2014-04-30 国家电网公司 Electric power security communication network based on quantum key distribution technology
CN104821874A (en) * 2015-05-15 2015-08-05 长春大学 Method employing quantum secret key for IOT (Internet of Things) data encryption transmission
CN105871538A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 Quantum key distribution system, quantum key distribution method and device
WO2016145037A1 (en) * 2015-03-09 2016-09-15 University Of Houston System Methods and apparatuses for authentication in quantum key distribution and/or quantum data communication
CN106204258A (en) * 2016-07-22 2016-12-07 福建节点信息科技有限公司 A kind of business capital risk moves managing and control system and management-control method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7646873B2 (en) * 2004-07-08 2010-01-12 Magiq Technologies, Inc. Key manager for QKD networks
GB0512229D0 (en) * 2005-06-16 2005-07-27 Hewlett Packard Development Co Quantum key distribution apparatus & method
US20090307121A1 (en) * 2008-06-09 2009-12-10 Lutnick Howard W Trading system products and processes
CN102196425B (en) * 2011-07-01 2013-04-03 安徽量子通信技术有限公司 Quantum-key-distribution-network-based mobile encryption system and communication method thereof
US8693691B2 (en) * 2012-05-25 2014-04-08 The Johns Hopkins University Embedded authentication protocol for quantum key distribution systems
KR101718782B1 (en) * 2015-01-23 2017-03-22 서울시립대학교 산학협력단 Secure payment and authentification system having enhanced security with quantum crypyography
CN106411521B (en) * 2015-07-31 2020-02-18 阿里巴巴集团控股有限公司 Identity authentication method, device and system for quantum key distribution process

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763099A (en) * 2014-02-13 2014-04-30 国家电网公司 Electric power security communication network based on quantum key distribution technology
CN105871538A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 Quantum key distribution system, quantum key distribution method and device
WO2016145037A1 (en) * 2015-03-09 2016-09-15 University Of Houston System Methods and apparatuses for authentication in quantum key distribution and/or quantum data communication
CN104821874A (en) * 2015-05-15 2015-08-05 长春大学 Method employing quantum secret key for IOT (Internet of Things) data encryption transmission
CN106204258A (en) * 2016-07-22 2016-12-07 福建节点信息科技有限公司 A kind of business capital risk moves managing and control system and management-control method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4181457A1 (en) * 2021-11-11 2023-05-17 Terra Quantum AG Quantum based method and system for performing cryptocurrency asset transactions

Also Published As

Publication number Publication date
CN108133370A (en) 2018-06-08

Similar Documents

Publication Publication Date Title
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN109412812B (en) Data security processing system, method, device and storage medium
CN110990827A (en) Identity information verification method, server and storage medium
US11811939B2 (en) Advanced crypto token authentication
CN103944724B (en) A kind of subscriber identification card
CN101841525A (en) Secure access method, system and client
CN101005361A (en) Server and software protection method and system
US20150295714A1 (en) Data security verification method and device
CN102281143B (en) Remote unlocking system of intelligent card
CN103152732B (en) Cloud password system and operation method thereof
WO2022020686A1 (en) Master key escrow process
CN111431840B (en) Security processing method and device, computer equipment and readable storage medium
CN111355591A (en) Block chain account safety management method based on real-name authentication technology
CN108768941B (en) Method and device for remotely unlocking safety equipment
CN111181960A (en) Safety credit granting and signature system based on terminal equipment block chain application
CN113766450A (en) Vehicle virtual key sharing method, mobile terminal, server and vehicle
CN105933117A (en) Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage
CN110519222A (en) Outer net access identity authentication method and system based on disposable asymmetric key pair and key card
CN106156549B (en) application program authorization processing method and device
CN112422280B (en) Man-machine control interaction method, interaction system, computer equipment and storage medium
CN108133370B (en) Safe payment method and system based on quantum key distribution network
CN111291398B (en) Block chain-based authentication method and device, computer equipment and storage medium
CN111625815B (en) Data transaction method and device based on trusted execution environment
CN116455605A (en) Account data interaction method based on trusted execution environment
CN112333173B (en) Data transmission method, system, equipment and storage medium based on data provider

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20210922

Granted publication date: 20210720

PP01 Preservation of patent right