CN108377188A - A kind of quantum cryptography system for extraordinary emergent self-organized network communication - Google Patents
A kind of quantum cryptography system for extraordinary emergent self-organized network communication Download PDFInfo
- Publication number
- CN108377188A CN108377188A CN201810257059.7A CN201810257059A CN108377188A CN 108377188 A CN108377188 A CN 108377188A CN 201810257059 A CN201810257059 A CN 201810257059A CN 108377188 A CN108377188 A CN 108377188A
- Authority
- CN
- China
- Prior art keywords
- key
- quantum
- monitoring station
- terminal device
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of quantum cryptography systems for extraordinary emergent self-organized network communication, quantum key distribution technology is applied to extraordinary emergency system MESH self-assembly nets by the system, to promote extraordinary emergency system information transmission safety, the scheme combined with extraordinary two net of emergency system MESH self-assemblies net using quantum key distribution network, the quantum key of unconditional security is applied in extraordinary emergency system MESH self-assembly nets.The data transmitted to needs under the premise of existing MESH communication protocols in not changing WiFi technology are pre-encrypted using quantum key; the encryption technology in WIFI wireless networks encrypts the ciphertext that pre-encrypt generates again simultaneously; play the role of duplicate protection to the information transmission in extraordinary emergency system; while convenient and efficient, the safety of extraordinary emergency system wireless communication is promoted to the maximum extent.
Description
Technical field
The present invention relates to Data Encryption Techniques field, more particularly to a kind of quantum for extraordinary emergent self-organized network communication adds
Close system.
Background technology
With the raising of the extraordinary emergency system level of informatization, application of the wireless communication in extraordinary emergency system is increasingly
Extensively.The prevalence of wireless technology is mainly by the two big factor driving of convenience and low cost.It is different from wire communication, channel radio
Letter need not be strapped in user in fixed place and can easily communicate, and obtain resource.However such facility
Property also results in the appearance of safety issue.Transmission line is no longer needed due to being connected to communication network, on the contrary, communication data packet
It is by Electromagnetic Wave Propagation, anyone is likely to intercept or eavesdrop.
From the point of view of data transmission, the network structure of extraordinary emergency communication system can be divided into three parts:Monitoring
Center, monitoring station and terminal device.Carried out data transmission using office automation network between monitoring center and monitoring station, usually
Using optical fiber as wired communications links, and communication transmission data is used between monitoring station and terminal device more.Using
Link between the monitoring station and terminal device of WIFI ad hoc network wireless transmission methods is the logical of entire extraordinary emergency system network
Where believing bottleneck, and most it is subject to the place of attack.
WiFi technology is high with its transmission rate, networking speed is fast, construction cost is low, area coverage is wide and spectrum efficiency is high etc.
Series of advantages is one of the wireless broad band technology of the current and following most competitiveness.WIFI technologies are as wireless communication technique
One kind, disadvantage be then susceptible to attack and cause data to be ravesdropping and distort.Special type based on WiFi technology is met an urgent need nothing
Line communication system security, which is ensured of, to be realized by Security Sublayer.Security Sublayer mainly has two big effects:First, entire
The guarantee for providing secure communication in cordless communication network to the user passes through the communication number between ciphering terminal equipment and monitoring station
According to realizing;Second is that preventing unauthorized user from illegally using network, realized by authentication.By by force to communicating number
According to being encrypted and being authenticated to user identity, unauthorized user can be effectively prevent to steal network information kimonos
Business.
Monitoring station first has to be authenticated terminal device, and only by certification, monitoring station can just give encryption key distribution to this
A terminal device.Similarly, terminal device also needs to be authenticated monitoring station, only can and be carried out by the monitoring station of certification close
Key exchanges.Certification makes terminal device and monitoring station trust each other, monitoring station by authorization of service to terminal device, while monitoring station
There is shared key data between terminal device, it is root key, for deriving other keys in Security Sublayer.This
Outside, it is unsafe that the same key, which is used for a long time, and effractor may utilize a large amount of bright ciphertext data to crack out key, because
This needs to be updated authentication key and root key, also just need the assigning process of verification process and root key periodically into
Row.Authentication key can be obtained by certificate verification, to calculate key-encrypting key, finally extrapolates session key.It adopts
Data encryption algorithm is often DES, AES encryption method.Here existing security breaches are the High relevancy between key,
And the calculating complexity safety of encryption method.In order to realize information unconditional security transmission, need using more reliable
Encryption key distribution mode distributes more new key.
Quantum key distribution technology can realize the encryption key distribution of the unconditional security of information, its peace between communicating pair
Full property is ensured that listener-in can not obtain possessing unlimited computing capability about safety by quantum-mechanical basic principle
Any information of key.Quantum-mechanical unclonable theorem shows, it is impossible to which the quantum state unknown to one carries out perfect
Replicate, that is to say, that by the eavesdropping means of interception, duplication, repeating transmission come obtain the behavior of information will necessarily be to the quantum of coding
State introduces interference, increases the bit error rate of quantum key dispatching system, can be known by legal communicating pair to eavesdrop behavior.
By further theory analysis it can be proved that any eavesdropping means for attempting to obtain whole key informations all inevitably result in it is logical
Believe that the bit error rate is more than certain specific threshold, communicating pair can whereby judge channel with the presence or absence of listener-in and abandon unreliable close
Key.Quantum key distribution technology is to generally acknowledge the effective means that communicating pair can be made to share unconditional security key at present.By
Development in more than 20 years, quantum key distribution technology are strided forward to practical direction, have nowadays had the ability to set up extensive more
Meshed network.
In conclusion existing special type emergency system MESH self-assembly nets lacking there are cipher key associated in terms of safety
It falls into, and quantum key distribution technology can make up this defect well.Quantum key distribution technology is applied to extraordinary meet an urgent need certainly
In group communication network, the safety of extraordinary emergency system communication will be greatly promoted.
Invention content
It is an object of the present invention to provide a kind of quantum cryptography systems for extraordinary emergent self-organized network communication, using quantum key
The scheme that distribution network is combined with extraordinary two net of emergency system MESH self-assemblies net, will be unconditional in quantum key distribution network
The quantum key of safety is applied in extraordinary emergency system MESH self-assembly nets, in the premise for not changing MESH communication protocols
Under, it proposes double encryption approach, promotes the safety of extraordinary emergency system wireless communication to the maximum extent.
In order to achieve the above objectives, the technical solution adopted by the present invention is:A kind of amount for extraordinary emergent self-organized network communication
Sub- encryption system, including supervision and management center, quantum key server, multiple terminal devices, MESH ad hoc network and quantum key
Net is distributed, the quantum-key distribution net between the supervision and management center and quantum key server is connected by optical fiber, the prison
The ad hoc network controlled between administrative center and multiple terminal devices, between terminal device and terminal device is based on MESH structures
WIFI wireless communication networks.
Preferred embodiment, quantum cryptography process include the following steps:
(1) quantum key server distributes quantum key to supervision and management center;
(2) terminal device downloads quantum key from supervision and management center;
(3) terminal device and the negotiation of supervision and management center message and certification body;
(4) terminal device is to data double-encryption, mutual transmission data;
(5) data transmission success, terminal device, supervision and management center destroy quantum key;
The above process need not change original cryptographic protocol in MESH ad hoc networks, as long as first close to data usage amount
Key is pre-encrypted, and MESH is then used to the ciphertext that pre-encrypt generates again add from the cryptographic protocol in group wireless network
It is close, duplicate protection is played to the information transmission in extraordinary emergency communication system.
Preferred embodiment, the MESH ad hoc network are in Star Network structure;Multiple terminal devices respectively with monitoring management center
Between communicate, terminal device is met an urgent need occasion image data to monitoring management central transmission special type, and monitoring management center is then to end
End equipment sends command scheduling order, and the communication between terminal device in same MESH self-assemblies net both can be by MESH certainly
Group communication network is realized, can also be forwarded by monitoring management center.
Preferred embodiment is integrated with the amount that quantum key is obtained from quantum-key distribution net in the quantum key server
Sub-key distribution terminal and quantum key memory module.
Preferred embodiment, the terminal device include taking module, memory module and microprocessor, wireless using MESH
Communication protocol is communicated with monitoring management center or communication, each terminal device have the identity ID of oneself between each other.
Preferred embodiment, the monitoring management center include monitoring station and monitoring center, wherein monitoring station be responsible for in region
Terminal device carry out extraordinary emergent radio communication the image information that terminal device is sent handled and forwarded or right
Terminal device carries out pass down the line, and there is the identity ID of oneself in each monitoring station, by quantum key server and monitoring
The distribution of the heart channel of Hang-Shaoyin quantum-key distribution net updates quantum key, and the memory module in quantum key server is close for storing quantum
Key is downloaded for terminal device and is used;
Monitoring center collects the emergent occasion information of special type of each monitoring station, is handled and is backed up, sends command scheduling
It orders to monitoring stations at different levels, monitoring center distributes renewal amount by quantum key server and monitoring station through quantum-key distribution net
Sub-key, memory module in quantum key server for storing quantum key, monitoring center need with multiple monitoring stations it
Between carry out quantum-key distribution, when storing quantum key, the identity ID for distinguishing different monitoring stations is needed, when monitoring center and end
When end equipment is communicated, it is forwarded by monitoring station.
Preferred embodiment, implementation method of the quantum key in MESH self-assembly networks mainly include the following steps that:
A, quantum-key distribution process:Safe dose is established between monitoring station and monitoring center using quantum key server
Sub-key, the quantum-key distribution net set up in extraordinary emergency system special optic fibre communication network cover in MESH self-assemblies
The monitoring station being related to and monitoring center, quantum key server is by quantum-key distribution net in long-range monitoring station and monitoring
It is distributed between the heart and updates quantum key, since quantum key server has used key storage technology, starting quantum key
It before assigning process, need to first examine whether the size of key in memory meets the needs of task, if meeting needs, then directly invoke
Otherwise quantum key in memory needs to start quantum-key distribution process;
B, key download procedure:Shared amount is established by quantum key assigning process between monitoring center and monitoring station
Sub-key and after being stored, terminal device in MESH self-assembly nets is from download on the quantum key server of monitoring station
Sub-key, and be temporarily stored in the memory module of terminal device, in case follow-up wireless communication uses the end in MESH self-assembly nets
End equipment downloads the process of key from monitoring station, is carried out in the protective zone of extraordinary emergency system monitoring station, needs to carry out
The certification of terminal device and monitoring station, and the key information of monitoring station record different terminal equipment extraction is needed, it monitors simultaneously
Center also will be that key carries out assignment record according to the relevant information of monitoring station;
C, message negotiations process:Terminal device is first passed through with monitoring station or when being communicated with monitoring center by monitoring station
WiFi technology is established with monitoring station and is connected, and then terminal device carries out message negotiation with monitoring station, including quantum key use is asked
Ask message, quantum key number message and Encryption Algorithm message;
D, Data Encryption Transmission process:After message negotiation, terminal device is with regard to the use of quantum key, Encryption Algorithm
Reach an agreement with monitoring station, the data that the sender of data first transmits needs using quantum key are encrypted, Encryption Algorithm
It is carried out by " one-time pad ", then encrypted data and quantum key number, identity information etc. is sent by being wirelessly connected
To the recipient of data;
E, cipher key destruction process:After data Successful transmissions, the quantum key used encryption is deleted, for safety level
Not lower extraordinary emergent occasion data, only need terminal device to delete quantum key, and the higher data of security level,
After data are successfully monitored center reception, terminal device and monitoring station are required to make to delete by quantum key to destroy.
Preferred embodiment, key download procedure is further divided into following three steps in step B:
B1. key fragmented storage:The quantum key server of monitoring station and monitoring center passes through quantum key assigning process
After completing quantum-key distribution or update, just had shared in the memory module of monitoring station quantum key server and monitoring center one
Quantum key in memory is then carried out segment processing, includes the length and number of key, monitoring station by the security key of cause
With monitoring center by the identical quantum key of quantum-key distribution network share after, key is respectively stored in respective quantum
In key server, its key is divided into the segment key storage as length, every section of key by monitoring station respectively with monitoring center
For K bit, every section of key is recorded as number 1, number 2 ... number N etc. and does not repeat code name respectively, and the key in monitoring center is compiled
Number corresponding monitoring station cipher key number is consistent;
B2. authentication:Before key download, terminal device and monitoring station need to carry out authentication, and carry out related letter
The initial configuration of breath;
B3. key is downloaded:Terminal device downloads quantum key from the quantum key server of monitoring station, and is temporarily stored in terminal
In the memory module of equipment, key download need to carry out in the protective zone of monitoring station, all be by close when downloading key every time
Key section read, while monitoring station record terminal device ID and cipher key number correspondence, and by the information of association key with
The form of ciphertext sends monitoring center to and carries out back-up processing, and terminal device downloads volume from the quantum key server of monitoring station
Number 1 arrives the cipher key sections of number N, and stores it in the memory module of itself, in case follow-up wireless communication use;
Preferred embodiment, in step C message negotiations process be further divided into following two steps:
C1. it establishes and is wirelessly connected:Terminal device is established by MESH agreements with monitoring station and is connected, including is completed identity and recognized
Card, key request and negotiations process;
C2. message is negotiated:After WIFI is wirelessly connected and establishes, message negotiation, packet are carried out between terminal device and monitoring station
Quantum key is included using solicited message, quantum key number information, Encryption Algorithm message, terminal device needs to transmit to monitoring station
The emergent occasion data of special type, terminal device first send messages to monitoring station progress quantum key and use request when message is negotiated,
By the number of quantum key to be used, and using the Encryption Algorithm of " one-time pad ", after monitoring station receives message, pass through
WIFI is wirelessly connected to terminal device to reply message, and includes whether to allow to use quantum key, the quantum key of the number to be
It is no available, if to need to change number, if to allow the Encryption Algorithm etc. for using " one-time pad ", change if needed, then
Further negotiate.
Preferred embodiment, in step D during Data Encryption Transmission, the senders of data be terminal device, monitoring station or
The recipient of monitoring center, data is monitoring station, monitoring center or terminal device, uses MESH self-assembly nets, number
According to sender and a recipient at least side be terminal device, after the emergent occasion data of special type are read by terminal device acquisition,
Encryption data is first transferred to monitoring station by MESH ad hoc network, then monitoring station is again forwarded encryption data by optical fiber private network
To monitoring center, and when command scheduling order is transferred to terminal device by monitoring center, needing to first pass through optical fiber private network will encrypt
Command scheduling order send monitoring station to, then monitoring station is transmitted to terminal device by WIFI ad hoc network again.
Since above-mentioned technical proposal is used, the present invention has following advantages and effect compared with prior art:
The present invention is combined with double nets of quantum key distribution network in the extraordinary emergency system MESH self-assemblies net of progress and is carried
It when high extraordinary emergent occasion data transmission security, need not modify to WIFI wireless communication procedures, need to only connect in WIFI
It connects after establishing before extraordinary meet an urgent need occasion data or command scheduling order transmission, the message negotiation that progress quantum key uses;Amount
Sub-key is stored in the memory module of terminal device, uses the exclusive or Encryption Algorithm of " one-time pad " to the emergent occasion number of special type
According to being encrypted or command scheduling order be decrypted;Introduce quantum key number-of-fragments, terminal device ID and monitoring station
After ID, monitoring center is facilitated to retrieve corresponding quantum key, realizes the command scheduling control of remote terminal equipment, extraordinary emergent field
Close the acquisition and backup of information.The method have the characteristics that having used the security application pattern of double-encryption, WIFI is not being changed
The data transmitted to needs under the premise of existing MESH communication protocols in technology are pre-encrypted using quantum key, while WIFI
Encryption technology in wireless network encrypts the ciphertext that pre-encrypt generates again, is played to the information in extraordinary emergency system
The effect of duplicate protection.The present invention is easy to use, and can improve the safety of information transmission, is highly suitable for extraordinary emergent system
System MESH self-assembly nets.
Description of the drawings
Attached drawing 1 is to share segment processing schematic diagram after quantum key between extraordinary emergency system monitoring station and monitoring center;
Attached drawing 2 is that intelligent bi-directional data complex communication terminal downloads quantum key signal from extraordinary emergency system monitoring station
Figure;
Attached drawing 3 is intelligent bi-directional data complex communication terminal will transmit the message before extraordinary emergent occasion data to monitoring station
Negotiate schematic diagram;
Attached drawing 4 is that intelligent bi-directional data complex communication terminal transmits extraordinary emergent occasion schematic diagram data to monitoring center;
Attached drawing 5 is monitoring center showing by information such as intelligent bi-directional data complex communication terminal collection site image/videos
It is intended to.
Specific implementation mode
The invention will be further described with reference to the accompanying drawings and embodiments:
A kind of quantum cryptography system for extraordinary emergent self-organized network communication of the present invention, needs to be related to two networks, and one
A is quantum key distribution network, and one is extraordinary emergency system MESH self-assembly nets.
Wherein quantum key distribution network is used for realizing the safety distribution of quantum key.Realize what quantum-key distribution executed
Agreement is inveigled with use based on the BB84 agreements of state method.In order to realize the function of quantum key distribution, need communicating pair each
There are one quantum-key distribution terminals, using a quantum channel and a classical channel connection.And in order to realize network function,
Need to use credible relaying, quantum router, switch device to realize the selection of communication path between different geographical node.
The characteristics of in view of extraordinary emergency system communication network, the realization method of quantum channel is based on optical fiber, supplemented by free space.
As shown in Fig. 1, wherein extraordinary emergency system MESH self-assembly nets to be mainly used for WIFI intelligence bi-directional datas comprehensive
Wireless communication between hop communication terminal and extraordinary emergency system monitoring station, which is in Star Network structure, more
It is communicated between a intelligence bi-directional data complex communication terminal and monitoring station, intelligent bi-directional data complex communication terminal is passed to monitoring station
Defeated extraordinary emergent occasion image data, and monitoring station then sends command scheduling order to intelligent bi-directional data complex communication terminal,
The communication between intelligent bi-directional data complex communication terminal in same MESH self-assemblies net can both pass through MESH self-assemblies
Net is realized, can also be forwarded by monitoring station.
In order to use the quantum distributed by quantum key distribution network in extraordinary emergency system MESH self-assembly nets
Key needs two networks being effectively combined.In view of intelligent bi-directional data complex communication terminal is mobile, easily special
Quantum key distribution network is used between monitoring center and monitoring station by point, the present invention, and intelligent bi-directional data integrated communication is whole
End needs to download quantum key from monitoring station, and the spare key as its transmitting data information uses.Include in the converged network
Following several component parts:Quantum key distribution network, quantum key server, the integrated communication of WIFI intelligence bi-directional datas are whole
End, extraordinary emergency system monitoring station and monitoring center, as shown in Fig. 5.
The quantum key distribution network refers to for distributing update between extraordinary emergency system monitoring station and monitoring center
The dedicated network of quantum key, it is supplemented by main free space, as the increase of distance and network are advised that transmission channel, which is with optical fiber,
The expansion of mould should also be included as here the credible relaying and Quantum repeater for extending distance and using, to economize on resources and increasing
Flexibility and use quantum router, switch device etc..
The quantum key server refers to the equipment for accessing quantum key distribution network and obtaining security key, is integrated with
The quantum-key distribution terminal and quantum key memory module of quantum key are obtained from quantum key distribution network.
The WIFI intelligence bi-directional data complex communication terminal is the movement in extraordinary emergency system MESH self-assembly nets
Equipment, the mobile device carry taking module, memory module and microprocessor, use MESH wireless communication protocols and special type
Emergency system monitoring station carries out communication or communication, each mobile device have the identity ID of oneself between each other.
The special type emergency system monitoring station refers to being responsible for receiving extraordinary emergent occasion figure in processing certain area coverage
As the treating stations of data and command scheduling order, it is responsible for answering with the intelligent bi-directional data complex communication terminal progress special type in region
Anxious wireless communication, the image information that terminal device is sent is handled and is forwarded, or ordered mobile terminal device
It enables and conveying, there is the identity ID of oneself in each monitoring station, by quantum key server and monitoring center through quantum-key distribution
Network distribution updates quantum key, and the memory module in quantum key server is for storing quantum key, under mobile terminal
It carries and uses, as shown in attached drawing 2,3.
The special type emergency system monitoring center, the special type for collecting each monitoring station are met an urgent need occasion information, carry out processing and
Backup sends command scheduling order to monitoring stations at different levels, and monitoring center is close through quantum with monitoring station by quantum key server
Key distributes network distribution update quantum key, and the memory module in quantum key server is for storing quantum key, in monitoring
The heart needs to carry out quantum-key distribution between multiple monitoring stations, when storing quantum key, needs to distinguish different monitoring stations
Identity ID is forwarded when extraordinary emergency system monitoring center is communicated with terminal device by monitoring station.
It is an object of the invention to realize use of the quantum key in extraordinary emergency system MESH self-assembly nets, in fact
Existing method includes mainly following procedure:
Quantum-key distribution process:Using quantum key server the monitoring station of extraordinary emergency system and monitoring center it
Between establish secure quantum key, the covering of the quantum key distribution network that is set up in extraordinary emergency system special optic fibre communication network
Monitoring station involved in MESH self-assemblies and monitoring center, quantum key server are existed by the quantum-key distribution network equipment
It is distributed between long-range monitoring station and monitoring center and updates quantum key, since quantum key server has used key storage
Technology crosses Cheng Qian starting quantum-key distribution, need to first examine whether the size of key in memory meets the needs of task, if
Meet needs, then directly invoke the quantum key in memory, otherwise needs to start quantum-key distribution process.
Key download procedure:Pass through quantum key assigning process between the monitoring center and monitoring station of extraordinary emergency system
After establishing shared quantum key and being stored, terminal device in extraordinary emergency system MESH self-assembly nets is from monitoring station
Quantum key server on download sub-key, and be temporarily stored in the memory module of terminal device, in case follow-up wireless communication
It uses, the terminal device in extraordinary emergency system MESH self-assembly nets downloads the process of key from monitoring station, emergent in special type
It is carried out in the protective zone at system monitoring station, needs the certification for carrying out terminal device and monitoring station, and monitoring station is needed to remember
The key information of different terminal equipment extraction is recorded, while monitoring center also will be that key is carried out point according to the relevant information of monitoring station
With record.
Message negotiations process:Terminal device is first passed through with monitoring station or when being communicated with monitoring center by monitoring station
WiFi technology is established with monitoring station and is connected, and then terminal device carries out message negotiation with monitoring station, including quantum key use is asked
Ask message, quantum key number message and Encryption Algorithm message.
Data Encryption Transmission process:Message negotiation after, terminal device with regard to the use of quantum key, Encryption Algorithm with
Monitoring station is reached an agreement, and the data that the sender of data first transmits needs using quantum key are encrypted, and Encryption Algorithm is pressed
" one-time pad " carries out, then encrypted data and quantum key number, identity information etc. are sent to by being wirelessly connected
The recipient of data.
Cipher key destruction process:After data Successful transmissions, the quantum key used encryption is deleted, for security level
Lower extraordinary emergent occasion data, only need terminal device to delete quantum key, and the higher data of security level, when
Data are successfully monitored after the reception of center, and terminal device and monitoring station are required to make to delete by quantum key to destroy.
During above-mentioned realization, process B key download procedures are further divided into following three basic steps:
B1. key fragmented storage:The quantum key server of extraordinary emergency system monitoring station and monitoring center passes through quantum
After key distribution procedure completes quantum-key distribution or update, just had shared in the memory module of monitoring station quantum key server
Quantum key in memory is then carried out segment processing, includes the length of key by the security key consistent with monitoring center
And number deposits key after monitoring station and monitoring center are by the identical quantum key of quantum-key distribution network share respectively
In respective quantum key server, its key is divided into the segment key as length with monitoring center by monitoring station respectively for storage
Storage, every section of key are K bit, and every section of key is recorded as number 1, number 2 ... number N etc. and does not repeat code name respectively, and monitors
The corresponding monitoring station cipher key number of cipher key number in center is consistent, as shown in Fig. 4.
B2. authentication:Before key download, terminal device and monitoring station need to carry out authentication, and carry out related letter
The initial configuration of breath.
B3. key is downloaded:Terminal device downloads quantum key from the quantum key server of monitoring station, and is temporarily stored in terminal
In the memory module of equipment, key download need to carry out in the protective zone of monitoring station, all be by close when downloading key every time
Key section read, while monitoring station record terminal device ID and cipher key number correspondence, and by the information of association key with
The form of ciphertext sends monitoring center to and carries out back-up processing, and terminal device downloads volume from the quantum key server of monitoring station
Number 1 arrives the cipher key sections of number N, and stores it in the memory module of itself, in case follow-up wireless communication use.
During above-mentioned realization, process C message negotiations process is further divided into following two basic steps:
C1. it establishes and is wirelessly connected:Terminal device is established by MESH agreements with monitoring station and is connected, including is completed identity and recognized
Card, key request and negotiations process.It does not make an amendment to these processes in the present invention.
C2. message is negotiated:After WIFI is wirelessly connected and establishes, message negotiation, packet are carried out between terminal device and monitoring station
Quantum key is included using solicited message, quantum key number information, Encryption Algorithm message, terminal device needs to transmit to monitoring station
The emergent occasion data of special type, terminal device first send messages to monitoring station progress quantum key and use request when message is negotiated,
By the number of quantum key to be used, and using the Encryption Algorithm of " one-time pad ", after monitoring station receives message, pass through
WIFI is wirelessly connected to terminal device to reply message, and includes whether to allow to use quantum key, the quantum key of the number to be
It is no available, if to need to change number, if to allow the Encryption Algorithm etc. for using " one-time pad ", change if needed, then
Further negotiate.
During above-mentioned realization, during process D Data Encryption Transmissions, the sender of data is terminal device, monitoring
The recipient for the either monitoring center data of standing is monitoring station, monitoring center or terminal device, uses extraordinary emergency system
MESH self-assembly nets, sender and the recipient at least side of data are terminal devices, and the emergent occasion data of special type are by end
After end equipment acquisition is read, encryption data is first transferred to monitoring station by WIFI ad hoc network, then monitoring station will encrypt number again
It is transmitted to monitoring center according to by optical fiber private network, and when command scheduling order is transferred to terminal device by monitoring center, need elder generation
Encrypted command scheduling order is sent to monitoring station by optical fiber private network, and then monitoring station is transmitted to by WIFI ad hoc network again
Terminal device, here extraordinary emergency system MESH self-assembly nets be mainly used for the data between monitoring station and counterpart terminal equipment
It communicates, the data communication between the terminal device of same monitoring station administration can both be realized between each other, can also pass through monitoring station and turn
Hair carries out, the forwarding that the data communication between the terminal device of different monitoring station administrations passes through respective monitoring station and monitoring center
It carries out.
With intelligent bi-directional data complex communication terminal extraordinary emergent occasion data instance, refer to the attached drawing are transmitted to monitoring center
4 illustrate the specific implementation step of double-encryption.The emergent occasion data of special type are passed through institute by intelligent bi-directional data complex communication terminal
Belong to monitoring station and be transmitted to monitoring center, with reference to attached drawing 4, the data of transmission are indicated as " the emergent occasion data of special type ", use
Quantum key number is " number X ", after the exclusive or Encryption Algorithm encryption of " one-time pad ", obtains " (the emergent fields of special type OTP
Close data) ", the identity information of terminal device is " ID (terminal) ", and extraordinary emergency system monitoring station is sent to by WIFI connections
Information be " WIFI (ID (terminal), number X, OTP (extraordinary meet an urgent need occasion data)) ".Monitoring station receives the letter of terminal device
After breath, first pass through and decrypt for the first time, obtain encrypted data " OTP (special type emergent occasion data) ", if monitoring station need into
Row backup storage decrypts " the emergent occasion data of special type " information using corresponding " number X " quantum key exclusive or, if
Monitoring station need not back up, then be directly forwarded to encrypted data " OTP (the emergent occasion data of special type) " by safe lane
Monitoring center, by taking Virtual Private Network VPN technologies as an example, the information that monitoring station is transmitted to monitoring center is " VPN (ID (monitorings
Stand), ID (terminal), number X, OTP (the emergent occasion data of special type)) ".
For the extraordinary emergent occasion image scene video information of intelligent bi-directional data complex communication terminal acquisition,
It illustrates how to be applied to quantum key to ensure the safe transmission of information in extraordinary emergency system MESH self-assembly nets.With reference to attached
The WIFI wireless communication networks coverage areas of Fig. 5, monitoring station 1 have M terminal device collection site image/video information, monitoring station 2
WIFI wireless communication networks coverage areas have N number of terminal device collection site image/video information, monitoring center is by summarizing, uniting
The image scene video information for counting each terminal device carries out resource allocation to each scene, realizes distribution automation.Dotted line in figure
That is the coverage area of extraordinary emergency system monitoring station MESH self-assembly nets.Monitoring center leads to between monitoring station 1 and monitoring station 2
Distribution and update that fiber quantum key distribution network carries out quantum key are crossed, quantum key is stored in quantum key server
In storage unit, the terminal device for being under the jurisdiction of each monitoring station periodically downloads quantum key to monitoring station, and the quantum after download is close
Key is stored in the cipher key storage block of terminal device, while cipher key number and corresponding terminal device identity letter are carried out in monitoring station
Breath, monitoring center also back up the download situation of different monitoring station quantum keys.To be under the jurisdiction of the terminal device of monitoring station 1
For 1, terminal device 1 downloads quantum key from monitoring station 1, if the amount of storage in 1 quantum key server of monitoring station is insufficient,
It is then again started up quantum-key distribution process to quantum key to meet the requirements, by downloading process, quantum key is transmitted to terminal
In the memory module of equipment 1, while monitoring station 1 and monitoring center are by the quantum key of the identity information of terminal device 1 and download
Information carries out record backup.Monitoring center collect statistics special type meet an urgent need occasion image scene video information when, given by monitoring station 1
Terminal device 1 sends reading order, and the order is first with the quantum key of number 1 after " one-time pad " encryption, by believing safely
Road sends monitoring station 1 to, after monitoring station 1 obtains encrypted reading order, by extraordinary emergency system monitoring station MESH from group
Communication network is established with the terminal device 1 in coverage area and is connected, and after mutual identity authentication, terminal device 1 is told in monitoring station 1
Next encryption data is encrypted through " one-time pad " using 1 quantum key of number as a result, waiting for that terminal device 1 is replied
After quantum key is available, monitoring station 1 is by WIFI connections by encrypted data transmission to terminal device 1,1 double descrambling of terminal device
Obtain reading order.After terminal device 1 is read, image scene video information is carried out to the encryption of " one-time pad ", is used
Be 2 quantum key of number, then established and connected by extraordinary emergency system MESH self-assemblies net and monitoring station 1, by phase
After mutual authentication, terminal device 1 tells 1 next encryption data of monitoring station using 2 quantum key of number through " primary
One is close " it is encrypted as a result, station 1 to be monitored reply quantum key it is available after, terminal device 1 will be encrypted existing by WIFI connections
For field picture video information transmission to monitoring station 1, it is encrypted that " one-time pad " is passed through in monitoring station 1 after the decryption of MESH agreements
Image scene video information ciphertext, then monitoring station 1 is by the identity information of oneself, the identity information of terminal device 1, quantum key
Number, image scene video information ciphertext transfer to monitoring center by safe lane, and scene is obtained after monitoring center decryption
Image/video information.
The above embodiments merely illustrate the technical concept and features of the present invention, and its object is to allow person skilled in the art
Scholar cans understand the content of the present invention and implement it accordingly, and it is not intended to limit the scope of the present invention.It is all according to the present invention
Equivalent change or modification made by Spirit Essence, should be covered by the protection scope of the present invention.
Claims (10)
1. a kind of quantum cryptography system for extraordinary emergent self-organized network communication, it is characterised in that:Including supervision and management center, amount
Sub-key server, multiple terminal devices, MESH ad hoc network and quantum-key distribution net, the supervision and management center and quantum are close
Quantum-key distribution net between key server is connected by optical fiber, between the supervision and management center and multiple terminal devices, eventually
Ad hoc network between end equipment and terminal device is the WIFI wireless communication networks based on MESH structures.
2. the quantum cryptography system according to claim 1 for extraordinary emergent self-organized network communication, it is characterised in that:Quantum
Ciphering process includes the following steps:
(1) quantum key server distributes quantum key to supervision and management center;
(2) terminal device downloads quantum key from supervision and management center;
(3) terminal device and the negotiation of supervision and management center message and certification body;
(4) terminal device is to data double-encryption, mutual transmission data;
(5) data transmission success, terminal device, supervision and management center destroy quantum key;
The above process need not change original cryptographic protocol in MESH ad hoc networks, if first to data usage amount sub-key into
Then row pre-encrypt uses MESH to be encrypted again to the ciphertext that pre-encrypt generates from the cryptographic protocol in group wireless network,
Duplicate protection is played to the information transmission in extraordinary emergency communication system.
3. the quantum cryptography system according to claim 1 for extraordinary emergent self-organized network communication, it is characterised in that:It is described
MESH ad hoc network is in Star Network structure;Multiple terminal devices communicate between monitoring management center respectively, and terminal device is to prison
Test tube manages the emergent occasion image data of central transmission special type, and monitoring management center then sends command scheduling life to terminal device
It enables, the communication between terminal device in same MESH self-assemblies net can both be realized by MESH self-assembly nets, can also be led to
Cross the forwarding of monitoring management center.
4. the quantum cryptography system according to claim 1 for extraordinary emergent self-organized network communication, it is characterised in that:It is described
The quantum-key distribution terminal and quantum that quantum key is obtained from quantum-key distribution net are integrated in quantum key server
Cipher key storage block.
5. the quantum cryptography system according to claim 4 for extraordinary emergent self-organized network communication, it is characterised in that:It is described
Terminal device includes taking module, memory module and microprocessor, uses MESH wireless communication protocols and monitoring management center
It carries out communication or communication, each terminal device has the identity ID of oneself between each other.
6. the quantum cryptography system according to claim 5 for extraordinary emergent self-organized network communication, it is characterised in that:It is described
Monitoring management center includes monitoring station and monitoring center, and wherein monitoring station is responsible for carrying out with the terminal device in region extraordinary emergent
The image information that terminal device is sent is handled and is forwarded by wireless communication, or carries out pass down the line to terminal device,
There is the identity ID of oneself in each monitoring station, is distributed through quantum-key distribution net by quantum key server and monitoring center
Quantum key is updated, the memory module in quantum key server is downloaded for terminal device and used for storing quantum key;
Monitoring center collects the emergent occasion information of special type of each monitoring station, is handled and is backed up, sends command scheduling order
To monitoring stations at different levels, monitoring center is close through quantum-key distribution net distribution update quantum with monitoring station by quantum key server
Key, memory module in quantum key server for storing quantum key, monitoring center need between multiple monitoring stations into
Row quantum-key distribution needs the identity ID for distinguishing different monitoring stations when storing quantum key, when monitoring center and terminal are set
For when being communicated, it is forwarded by monitoring station.
7. the quantum cryptography system according to claim 6 for extraordinary emergent self-organized network communication, it is characterised in that:Quantum
Implementation method of the key in MESH self-assembly networks mainly includes the following steps that:
A, quantum-key distribution process:It is close that secure quantum is established between monitoring station and monitoring center using quantum key server
Key, the quantum-key distribution net set up in extraordinary emergency system special optic fibre communication network cover involved in MESH self-assemblies
Monitoring station and monitoring center, quantum key server is by quantum-key distribution net between long-range monitoring station and monitoring center
Distribution and update quantum key are starting quantum-key distribution mistake since quantum key server has used key storage technology
Cheng Qian, need to first examine whether the size of key in memory meets the needs of task, if meeting needs, then directly invoke memory
In quantum key, otherwise need start quantum-key distribution process;
B, key download procedure:It is close by the shared quantum of quantum key assigning process foundation between monitoring center and monitoring station
Key and after being stored, the terminal device in MESH self-assembly nets is close from download on the quantum key server of monitoring station
Key, and be temporarily stored in the memory module of terminal device, in case follow-up wireless communication is set using the terminal in MESH self-assembly nets
The standby process that key is downloaded from monitoring station, carries out in the protective zone of extraordinary emergency system monitoring station, needs to carry out terminal
The certification of equipment and monitoring station, and the key information of monitoring station record different terminal equipment extraction is needed, while monitoring center
Also to be that key carries out assignment record according to the relevant information of monitoring station;
C, message negotiations process:Terminal device first passes through WIFI with monitoring station or when being communicated with monitoring center by monitoring station
Technology is established with monitoring station and is connected, and then terminal device carries out message negotiation with monitoring station, including quantum key is disappeared using request
Breath, quantum key number message and Encryption Algorithm message;
D, Data Encryption Transmission process:After message negotiation, terminal device is with regard to the use of quantum key, Encryption Algorithm and prison
Survey station is reached an agreement, and the data that the sender of data first transmits needs using quantum key are encrypted, and Encryption Algorithm presses " one
Secondary one is close " it carries out, then encrypted data and quantum key number, identity information etc. are sent to data by being wirelessly connected
Recipient;
E, cipher key destruction process:After data Successful transmissions, the quantum key that uses of encryption is deleted, for security level compared with
The emergent occasion data of low special type, only need terminal device to delete quantum key, and the higher data of security level, work as number
After being received according to the center that is successfully monitored, terminal device and monitoring station are required to make to delete by quantum key to destroy.
8. the quantum cryptography system according to claim 7 for extraordinary emergent self-organized network communication, it is characterised in that:Step
Key download procedure is further divided into following three steps in B:
B1. key fragmented storage:The quantum key server of monitoring station and monitoring center is completed by quantum key assigning process
After quantum-key distribution or update, just had shared in the memory module of monitoring station quantum key server consistent with monitoring center
Quantum key in memory is then carried out segment processing, includes the length and number of key, monitoring station and prison by security key
After control shares identical quantum key centrally through quantum key distribution network, key is respectively stored in respective quantum key
In server, its key is divided into the segment key storage as length by monitoring station respectively with monitoring center, and every section of key is K ratios
Spy, every section of key be recorded as respectively number 1, number 2 ... number N etc. not repeat code name, and the cipher key number in monitoring center with
Its corresponding monitoring station cipher key number is consistent;
B2. authentication:Before key download, terminal device and monitoring station need to carry out authentication, and carry out relevant information
Initial configuration;
B3. key is downloaded:Terminal device downloads quantum key from the quantum key server of monitoring station, and is temporarily stored in terminal device
Memory module in, key download need to be carried out in the protective zone of monitoring station, every time download key when be all by cipher key sections
It reads, while the correspondence of monitoring station record terminal device ID and cipher key number, and by the information of association key with ciphertext
Form send monitoring center to and carry out back-up processing, terminal device downloads number 1 from the quantum key server of monitoring station
It to the cipher key sections of number N, and stores it in the memory module of itself, in case follow-up wireless communication uses.
9. the quantum cryptography system according to claim 7 for extraordinary emergent self-organized network communication, it is characterised in that:Step
Message negotiations process is further divided into following two steps in C:
C1. it establishes and is wirelessly connected:Terminal device and monitoring station are established by MESH agreements and are connected, including complete authentication, close
Key is asked and negotiations process;
C2. message is negotiated:After WIFI is wirelessly connected and establishes, message negotiation, including amount are carried out between terminal device and monitoring station
Using solicited message, quantum key number information, Encryption Algorithm message, terminal device needs to transmit to monitoring station extraordinary sub-key
Emergent occasion data, terminal device first send messages to monitoring station progress quantum key and use request when message is negotiated, will
The number of the quantum key used, and using " one-time pad " Encryption Algorithm, after monitoring station receives message, by WIFI without
Line is connected to terminal device to reply message, and includes whether to allow to use whether quantum key, the quantum key of the number can be used,
Modification whether is needed to number, if to allow the Encryption Algorithm etc. for using " one-time pad ", change if needed, then further assist
Quotient.
10. the quantum cryptography system according to claim 7 for extraordinary emergent self-organized network communication, it is characterised in that:Step
In rapid D during Data Encryption Transmission, the sender of data is terminal device, monitoring station or monitoring center, the reception of data
Side is monitoring station, monitoring center or terminal device, uses MESH self-assembly nets, the sender and recipient of data are extremely
A rare side is terminal device, and after the emergent occasion data of special type are read by terminal device acquisition, encryption data is first passed through MESH
Ad hoc network is transferred to monitoring station, and then encryption data is transmitted to monitoring center by monitoring station by optical fiber private network again, and in monitoring
When command scheduling order is transferred to terminal device by the heart, needs to first pass through optical fiber private network and send encrypted command scheduling order to
Monitoring station, then monitoring station terminal device is transmitted to by WIFI ad hoc network again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810257059.7A CN108377188A (en) | 2018-03-27 | 2018-03-27 | A kind of quantum cryptography system for extraordinary emergent self-organized network communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810257059.7A CN108377188A (en) | 2018-03-27 | 2018-03-27 | A kind of quantum cryptography system for extraordinary emergent self-organized network communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108377188A true CN108377188A (en) | 2018-08-07 |
Family
ID=63019336
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810257059.7A Withdrawn CN108377188A (en) | 2018-03-27 | 2018-03-27 | A kind of quantum cryptography system for extraordinary emergent self-organized network communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108377188A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109618135A (en) * | 2018-12-12 | 2019-04-12 | 苏州新海宜电子技术有限公司 | A kind of quantum cryptography type video monitoring system for intelligent self-organized network communication |
CN110492999A (en) * | 2019-08-29 | 2019-11-22 | 温州黑谷量子信息科技有限公司 | A kind of quantum key generation terminal system |
CN110535637A (en) * | 2019-08-15 | 2019-12-03 | 国网安徽省电力有限公司信息通信分公司 | A kind of the wireless dispatch method, apparatus and system of quantum key |
CN111865566A (en) * | 2019-04-26 | 2020-10-30 | 上海铁路通信有限公司 | Quantum security data network system for railway signal system |
CN112004257A (en) * | 2020-07-31 | 2020-11-27 | 海尔优家智能科技(北京)有限公司 | Network element communication method and communication system |
CN112188465A (en) * | 2020-09-29 | 2021-01-05 | 江苏恒宝智能系统技术有限公司 | Emergency command communication system and working method thereof |
CN113126617A (en) * | 2021-03-15 | 2021-07-16 | 浙江建林电子电气股份有限公司 | Intelligent inspection robot |
CN113596386A (en) * | 2021-08-07 | 2021-11-02 | 施航 | Video monitoring quantum encryption system |
CN117354796A (en) * | 2023-11-07 | 2024-01-05 | 苏州格知量子科技有限公司 | Quantum security wireless ad hoc network system |
-
2018
- 2018-03-27 CN CN201810257059.7A patent/CN108377188A/en not_active Withdrawn
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109618135A (en) * | 2018-12-12 | 2019-04-12 | 苏州新海宜电子技术有限公司 | A kind of quantum cryptography type video monitoring system for intelligent self-organized network communication |
CN109618135B (en) * | 2018-12-12 | 2019-10-29 | 苏州新海宜电子技术有限公司 | A kind of quantum cryptography type video monitoring system for intelligent self-organized network communication |
CN111865566A (en) * | 2019-04-26 | 2020-10-30 | 上海铁路通信有限公司 | Quantum security data network system for railway signal system |
CN110535637A (en) * | 2019-08-15 | 2019-12-03 | 国网安徽省电力有限公司信息通信分公司 | A kind of the wireless dispatch method, apparatus and system of quantum key |
CN110492999A (en) * | 2019-08-29 | 2019-11-22 | 温州黑谷量子信息科技有限公司 | A kind of quantum key generation terminal system |
CN112004257A (en) * | 2020-07-31 | 2020-11-27 | 海尔优家智能科技(北京)有限公司 | Network element communication method and communication system |
CN112188465A (en) * | 2020-09-29 | 2021-01-05 | 江苏恒宝智能系统技术有限公司 | Emergency command communication system and working method thereof |
CN112188465B (en) * | 2020-09-29 | 2021-10-26 | 江苏恒宝智能系统技术有限公司 | Emergency command communication system and working method thereof |
CN113126617A (en) * | 2021-03-15 | 2021-07-16 | 浙江建林电子电气股份有限公司 | Intelligent inspection robot |
CN113596386A (en) * | 2021-08-07 | 2021-11-02 | 施航 | Video monitoring quantum encryption system |
CN117354796A (en) * | 2023-11-07 | 2024-01-05 | 苏州格知量子科技有限公司 | Quantum security wireless ad hoc network system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108377188A (en) | A kind of quantum cryptography system for extraordinary emergent self-organized network communication | |
CN103491531B (en) | Power system WiMAX wireless communication networks uses the method that quantum key improves power information transmission security | |
CN106134152B (en) | For method, equipment and the device of social WI-FI mesh network to be added | |
CN101340443B (en) | Session key negotiating method, system and server in communication network | |
CN100420227C (en) | Information providing method, information providing system and relay equipment | |
CN108510270B (en) | Mobile transfer method with safe quantum | |
CN101741555B (en) | Method and system for identity authentication and key agreement | |
CN104994112A (en) | Method for encrypting communication data chain between unmanned aerial vehicle and ground station | |
CN107094076B (en) | Secret communication method based on quantum true random number and communication system | |
WO2023082599A1 (en) | Blockchain network security communication method based on quantum key | |
CN108540436B (en) | Communication system and communication method for realizing information encryption and decryption transmission based on quantum network | |
CN108599925A (en) | A kind of modified AKA identity authorization systems and method based on quantum communication network | |
CN105323754B (en) | A kind of distributed method for authenticating based on wildcard | |
CN104010297B (en) | Wireless terminal configuration method and device and wireless terminal | |
CN109995511A (en) | A kind of mobile secret communication method based on quantum key distribution network | |
CN108964897B (en) | Identity authentication system and method based on group communication | |
CN109995514A (en) | A kind of safe and efficient quantum key Information Mobile Service method | |
CN101287277B (en) | Method and system for providing service to customer's terminal in wireless personal area network | |
CN1941695B (en) | Method and system for generating and distributing key during initial access network process | |
CN109151823B (en) | eSIM card authentication method and system | |
CN103167494B (en) | Method for sending information and system | |
CN110943835A (en) | Distribution network encryption method and system for sending wireless local area network information | |
CN101635922B (en) | Safety communication method of wireless mesh network | |
CN101741548B (en) | Method and system for establishing safe connection between switching equipment | |
JP6544519B2 (en) | Mobile control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180807 |
|
WW01 | Invention patent application withdrawn after publication |