CN108183797A - A kind of quantum cryptography locks implementation method - Google Patents
A kind of quantum cryptography locks implementation method Download PDFInfo
- Publication number
- CN108183797A CN108183797A CN201810012272.1A CN201810012272A CN108183797A CN 108183797 A CN108183797 A CN 108183797A CN 201810012272 A CN201810012272 A CN 201810012272A CN 108183797 A CN108183797 A CN 108183797A
- Authority
- CN
- China
- Prior art keywords
- quantum
- key
- mobile terminal
- method described
- quantum key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00785—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by light
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Optical Communication System (AREA)
Abstract
Present invention is disclosed a kind of quantum cryptographys to lock implementation method, includes the following steps:It matches and connects with mobile terminal;Generate quantum key;With quantum key described in the mobile terminal synchronization;It obtains and matches the quantum key information;Unlock;The mobile terminal unlocks the quantum cryptography by described unique and absolutely random quantum key and locks, and quantum techniques are applied in lockset, further improve the safety of lockset, meets some to a certain extent and requires safety coefficient high place.
Description
【Technical field】
The present invention relates to coded lock fields more particularly to quantum cryptography to lock.
【Background technology】
Lockset is widely used in the miscellaneous scene in life, and different scenes also has lockset different requirements, locks
Tool is also into one of protection personal information or the important tool of property, and with the development of technology, traditional lockset is obviously
The demand of daily life is unsatisfactory for, also the therefore type of lock and derivative to be attached to the function of locking also more and more.
In general, for the convenience for improving the safety of lockset and using, various coded lock, fingerprint are emerged on the market
Lock etc., the occupation mode of abundant lockset also improves the safety of lockset to a certain extent;And with the hair of quantum computer
Exhibition, traditional door lock cipher mode have welcome the challenge in terms of safety, quantum random number generators can generate it is absolute with
Machine number, absolute random number is a kind of most reliable primary key, for existing lockset cipher mode, safety
Higher.
Quantum random number generators can be integrated into common door lock, quantum random number generators can be with for lockset
Quantum key of the absolute random number as door lock is provided(Digital cipher), digital cipher can send mobile phone terminal to, and mobile phone can be with
Optic communication is carried out to verify digital key, to open door lock, so as to improve the safety of door lock with door lock by included flash lamp
Property, what the present invention to be done is exactly to realize such a quantum cryptography lock.
【Invention content】
The present invention provides a kind of quantum cryptographys to lock implementation method, further improves the safety of lockset.
Quantum cryptography according to the present invention locks implementation method, includes the following steps:It matches and connects with mobile terminal;It generates
Quantum key;With quantum key described in the mobile terminal synchronization;It obtains and matches the quantum key information;Unlock.
Further, the quantum key is generated by quantum random number generator.
Further, it is described to include with the mobile terminal synchronization key, send the quantum key of generation to the shifting
Dynamic terminal, the mobile terminal return to confirmation message after receiving quantum key, and final synchronize is determined after obtaining the confirmation message
Key.
Further, described to obtain and match key information and include, obtaining the mobile terminal by optical inductor sends out
Optical signal, and the optical signal is converted into the digital cipher, by the digital cipher with previously described mobile terminal with
The synchronous quantum key of the quantum cryptography lock is compared.
Further, if the digital cipher is identical with the quantum key of the synchronization or amount that be present in the synchronization
In sub-key, then success, the quantum key lock unlock are compared.
Further, after the unlock of quantum cryptography lock with the mobile terminal synchronization key.
Further, the successful key of comparison is abandoned after the quantum cryptography lock unlock.
Further, the quantum cryptography lock is connected by way of NFC with mobile terminal pairing.
Further, the quantum cryptography lock is connected by initial key and mobile terminal pairing.
Further, the quantum key of the generation is stored in register.
It is by the present invention, it can be achieved that by quantum key randomizer generation quantum random number and close in this, as quantum
Key, by the key and mobile terminal synchronization, as the standard trusted each other, mobile terminal passes through described unique and absolutely random
Quantum key unlocks the quantum cryptography lock, and quantum techniques are applied in lockset, further improve the safety of lockset, centainly
Meet some in degree and require safety coefficient high place.
【Description of the drawings】
Fig. 1 is quantum cryptography lock implementation method flow chart of the present invention.
Fig. 2 is quantum cryptography lock construction schematic diagram of the present invention.
【Specific embodiment】
As shown in Figure 1, quantum cryptography lock implementation method of the present invention mainly includes the following steps:
A. it matches and connects with mobile terminal;
B. quantum key is generated;
C. with quantum key described in the mobile terminal synchronization;
D. it obtains and matches the quantum key information;
E. it unlocks.
Wherein, the mobile terminal can be the mobile phone of user oneself or other kinds of equipment, it might even be possible to
It is the other kinds of end product that user is facilitated to carry that the man of quantum cryptography Lock Factory is configured with lockset.
The quantum cryptography lock connect pairing with the mobile terminal, can be that multiple mobile terminals and same quantum are close
Code lock matches, and multiple members in aspect domestic consumer use different mobile terminals.In addition, it is possible in the case that some, it uses
Family can install the software app that producer specifies on mobile phone, and user is facilitated to lock the mobile terminal and the quantum cryptography
Connection is interactive.
In practical applications, the quantum cryptography lock can set a variety of modes with mobile terminal pairing connection,
Such as:The quantum cryptography lock is connected by way of NFC with mobile terminal pairing, and the quantum cryptography lock passes through initial close
Key is connected with mobile terminal pairing.It is of course also possible to by bluetooth, the modes such as WiFi match connection.
The quantum key of the quantum cryptography lock is generated by quantum random number generator, it is ensured that the quantum key
Absolute randomness, this is also that the quantum cryptography locks safe key point.The mobile terminal can be actively to institute
Quantum cryptography lock acquisition request key is stated, the quantum cryptography lock sends the quantum key of generation to described mobile whole
End, the mobile terminal, which receives, returns to confirmation message after quantum key, and the quantum cryptography lock is obtained after the confirmation message really
Fixed finally synchronous key, the number of synchronous quantum key can be multiple or one, can be according to different fields
Scape selects " administrator " that confirms or locked by the quantum cryptography to confirm the quantum cryptography lock that other users can obtain by user
Number.
In the present embodiment, when user will unlock, user sends out information using mobile terminal to quantum cryptography lock, institute
The optical signal that quantum cryptography lock is sent out by optical inductor acquisition from mobile terminal is stated, and by the digital cipher with previous institute
The synchronous quantum key of mobile terminal and the quantum cryptography lock is stated to be compared, if the digital cipher with it is described synchronous
Quantum key is identical or is present in the quantum key of the synchronization, then compares success, the quantum key lock unlock.The amount
The successful key of comparison is abandoned after electronic puzzle lock unlock, it is ensured that key only uses once, increases safety.
After quantum cryptography lock unlock with the mobile terminal synchronization key, after the unlock synchronisation key be in order to
It is used next time for user, under some specific conditions, it is close that " administrator " can determine whether the user can obtain next time
Key.In addition, multiple mobile terminals lock acquisition request key to the quantum cryptography simultaneously for convenience, the quantum cryptography lock is equipped with
The quantum key of generation is stored in the register by register, the quantum cryptography lock, facilitates multiple mobile terminals
Obtain key simultaneously.
It is merely a preferred embodiment of the present invention, is not intended to restrict the invention, for the technology of this field described in upper
For personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, that is made any repaiies
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of quantum cryptography locks implementation method, which is characterized in that includes the following steps:
It matches and connects with mobile terminal;
Generate quantum key;
With quantum key described in the mobile terminal synchronization;
It obtains and matches the quantum key information;
Unlock.
2. according to the method described in claim 1, it is characterized in that, the quantum key is generated by quantum random number generator.
3. according to the method described in claim 1, it is characterized in that, described include with the mobile terminal synchronization key, will produce
Raw quantum key sends the mobile terminal to, and the mobile terminal returns to confirmation message after receiving quantum key, obtains institute
Finally synchronous key is determined after stating confirmation message.
4. according to the method described in claim 1, it is characterized in that, described obtain and match key information and include, pass through light sensation
Device is answered to obtain the optical signal that the mobile terminal is sent out, and the optical signal is converted into the digital cipher, by the number
Key is compared with the previously described mobile terminal quantum key synchronous with quantum cryptography lock.
5. if according to the method described in claim 4, it is characterized in that, the digital cipher and the synchronous quantum key
It is identical or be present in the quantum key of the synchronization, then compare success, the quantum key lock unlock.
6. according to the method described in claim 5, it is characterized in that, the quantum cryptography lock unlock after with the mobile terminal
Synchronisation key.
7. according to the method described in claim 5, it is characterized in that, the quantum cryptography lock unlock after abandon it is described compare into
The key of work(.
8. according to the method described in claim 1, it is characterized in that, the quantum cryptography is locked by way of NFC and the shifting
Dynamic terminal pairing connection.
9. according to the method described in claim 1, it is characterized in that, quantum cryptography lock passes through initial key and the movement
Terminal pairing connection.
10. according to the method described in claim 1, it is characterized in that, the quantum key of the generation is stored in register.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810012272.1A CN108183797A (en) | 2018-01-05 | 2018-01-05 | A kind of quantum cryptography locks implementation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810012272.1A CN108183797A (en) | 2018-01-05 | 2018-01-05 | A kind of quantum cryptography locks implementation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108183797A true CN108183797A (en) | 2018-06-19 |
Family
ID=62550061
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810012272.1A Withdrawn CN108183797A (en) | 2018-01-05 | 2018-01-05 | A kind of quantum cryptography locks implementation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108183797A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108898708A (en) * | 2018-06-21 | 2018-11-27 | 河南理工大学 | Intelligent access control system based on quantum teleportation and WLAN |
CN109448203A (en) * | 2018-12-26 | 2019-03-08 | 江苏亨通问天量子信息研究院有限公司 | Control method, device, system and the smart lock of smart lock |
CN110942537A (en) * | 2019-11-26 | 2020-03-31 | 珠海格力电器股份有限公司 | Intelligent door lock unlocking system, method, device and medium |
-
2018
- 2018-01-05 CN CN201810012272.1A patent/CN108183797A/en not_active Withdrawn
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108898708A (en) * | 2018-06-21 | 2018-11-27 | 河南理工大学 | Intelligent access control system based on quantum teleportation and WLAN |
CN108898708B (en) * | 2018-06-21 | 2020-12-29 | 河南理工大学 | Intelligent access control system based on quantum invisible state transfer and wireless local area network |
CN109448203A (en) * | 2018-12-26 | 2019-03-08 | 江苏亨通问天量子信息研究院有限公司 | Control method, device, system and the smart lock of smart lock |
WO2020134671A1 (en) * | 2018-12-26 | 2020-07-02 | 江苏亨通问天量子信息研究院有限公司 | Control method, apparatus and system for intelligent lock, and intelligent lock |
CN110942537A (en) * | 2019-11-26 | 2020-03-31 | 珠海格力电器股份有限公司 | Intelligent door lock unlocking system, method, device and medium |
CN110942537B (en) * | 2019-11-26 | 2021-10-15 | 珠海格力电器股份有限公司 | Intelligent door lock unlocking system, method, device and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105391778B (en) | Control method based on mobile Internet intelligence community | |
CN109040139B (en) | Identity authentication system and method based on block chain and intelligent contract | |
CN108183797A (en) | A kind of quantum cryptography locks implementation method | |
CN107146307B (en) | A kind of method of securely unlocking of intelligent lock system | |
CN1973569B (en) | Method for securing an authentication and key agreement protocol | |
CN110098923A (en) | A kind of method and apparatus of generation and verifying temporary password | |
CN106971442A (en) | A kind of safe and intelligent lock system | |
HUP0400771A2 (en) | Method for enabling pki functions in a smart card | |
US20100293376A1 (en) | Method for authenticating a clent mobile terminal with a remote server | |
CN101965723A (en) | Image-based man-in-the-middle protection in numeric comparison association models | |
JP6743818B2 (en) | Information processing device, information processing method, program, information processing system, and communication device | |
CN109902462B (en) | Unified identity authentication method for power dispatching control system | |
EP1379052A3 (en) | Cryptographic method using dual encryption keys and a wireless local area network (LAN) system therefore | |
CN105873042A (en) | Lightweight class 5G access authentication method | |
CN112347188A (en) | Authorization and access auditing system and method based on private chain | |
CN109525391A (en) | A kind of method that server is synchronous with lockset information security | |
CN107016756A (en) | It is equipped with the smart lock of remote password key | |
CN105050086A (en) | Method for terminal to log in Wifi hotspot | |
KR101202245B1 (en) | System and Method For Transferring Money Using OTP Generated From Account Number | |
WO2021213039A1 (en) | Optical communication device, optical communication system, and communicational connection establishment method | |
CN206961200U (en) | A kind of safe and intelligent lock system | |
CN110034928A (en) | Energy measurement information transmitting device and method | |
CN106952370B (en) | A kind of blue-tooth intelligence lock secret key composite authentication system | |
CN109979053A (en) | A kind of offline model Internet of Things lock device and cipher key transmission methods based on MULTIPLE DYNAMIC key | |
CN111222858A (en) | Method for realizing block chain fingerprint identification authentication of personal wallet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180619 |
|
WW01 | Invention patent application withdrawn after publication |