CN108377188A - A kind of quantum cryptography system for extraordinary emergent self-organized network communication - Google Patents

A kind of quantum cryptography system for extraordinary emergent self-organized network communication Download PDF

Info

Publication number
CN108377188A
CN108377188A CN201810257059.7A CN201810257059A CN108377188A CN 108377188 A CN108377188 A CN 108377188A CN 201810257059 A CN201810257059 A CN 201810257059A CN 108377188 A CN108377188 A CN 108377188A
Authority
CN
China
Prior art keywords
key
quantum
monitoring station
terminal device
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810257059.7A
Other languages
Chinese (zh)
Inventor
邹建康
叶建彪
王余林
朱理军
刁寒
陈敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU XINHAIYI ELECTRONIC TECHNOLOGY Co Ltd
Original Assignee
SUZHOU XINHAIYI ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU XINHAIYI ELECTRONIC TECHNOLOGY Co Ltd filed Critical SUZHOU XINHAIYI ELECTRONIC TECHNOLOGY Co Ltd
Priority to CN201810257059.7A priority Critical patent/CN108377188A/en
Publication of CN108377188A publication Critical patent/CN108377188A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of quantum cryptography systems for extraordinary emergent self-organized network communication, quantum key distribution technology is applied to extraordinary emergency system MESH self-assembly nets by the system, to promote extraordinary emergency system information transmission safety, the scheme combined with extraordinary two net of emergency system MESH self-assemblies net using quantum key distribution network, the quantum key of unconditional security is applied in extraordinary emergency system MESH self-assembly nets.The data transmitted to needs under the premise of existing MESH communication protocols in not changing WiFi technology are pre-encrypted using quantum key; the encryption technology in WIFI wireless networks encrypts the ciphertext that pre-encrypt generates again simultaneously; play the role of duplicate protection to the information transmission in extraordinary emergency system; while convenient and efficient, the safety of extraordinary emergency system wireless communication is promoted to the maximum extent.

Description

A kind of quantum cryptography system for extraordinary emergent self-organized network communication
Technical field
The present invention relates to Data Encryption Techniques field, more particularly to a kind of quantum for extraordinary emergent self-organized network communication adds Close system.
Background technology
With the raising of the extraordinary emergency system level of informatization, application of the wireless communication in extraordinary emergency system is increasingly Extensively.The prevalence of wireless technology is mainly by the two big factor driving of convenience and low cost.It is different from wire communication, channel radio Letter need not be strapped in user in fixed place and can easily communicate, and obtain resource.However such facility Property also results in the appearance of safety issue.Transmission line is no longer needed due to being connected to communication network, on the contrary, communication data packet It is by Electromagnetic Wave Propagation, anyone is likely to intercept or eavesdrop.
From the point of view of data transmission, the network structure of extraordinary emergency communication system can be divided into three parts:Monitoring Center, monitoring station and terminal device.Carried out data transmission using office automation network between monitoring center and monitoring station, usually Using optical fiber as wired communications links, and communication transmission data is used between monitoring station and terminal device more.Using Link between the monitoring station and terminal device of WIFI ad hoc network wireless transmission methods is the logical of entire extraordinary emergency system network Where believing bottleneck, and most it is subject to the place of attack.
WiFi technology is high with its transmission rate, networking speed is fast, construction cost is low, area coverage is wide and spectrum efficiency is high etc. Series of advantages is one of the wireless broad band technology of the current and following most competitiveness.WIFI technologies are as wireless communication technique One kind, disadvantage be then susceptible to attack and cause data to be ravesdropping and distort.Special type based on WiFi technology is met an urgent need nothing Line communication system security, which is ensured of, to be realized by Security Sublayer.Security Sublayer mainly has two big effects:First, entire The guarantee for providing secure communication in cordless communication network to the user passes through the communication number between ciphering terminal equipment and monitoring station According to realizing;Second is that preventing unauthorized user from illegally using network, realized by authentication.By by force to communicating number According to being encrypted and being authenticated to user identity, unauthorized user can be effectively prevent to steal network information kimonos Business.
Monitoring station first has to be authenticated terminal device, and only by certification, monitoring station can just give encryption key distribution to this A terminal device.Similarly, terminal device also needs to be authenticated monitoring station, only can and be carried out by the monitoring station of certification close Key exchanges.Certification makes terminal device and monitoring station trust each other, monitoring station by authorization of service to terminal device, while monitoring station There is shared key data between terminal device, it is root key, for deriving other keys in Security Sublayer.This Outside, it is unsafe that the same key, which is used for a long time, and effractor may utilize a large amount of bright ciphertext data to crack out key, because This needs to be updated authentication key and root key, also just need the assigning process of verification process and root key periodically into Row.Authentication key can be obtained by certificate verification, to calculate key-encrypting key, finally extrapolates session key.It adopts Data encryption algorithm is often DES, AES encryption method.Here existing security breaches are the High relevancy between key, And the calculating complexity safety of encryption method.In order to realize information unconditional security transmission, need using more reliable Encryption key distribution mode distributes more new key.
Quantum key distribution technology can realize the encryption key distribution of the unconditional security of information, its peace between communicating pair Full property is ensured that listener-in can not obtain possessing unlimited computing capability about safety by quantum-mechanical basic principle Any information of key.Quantum-mechanical unclonable theorem shows, it is impossible to which the quantum state unknown to one carries out perfect Replicate, that is to say, that by the eavesdropping means of interception, duplication, repeating transmission come obtain the behavior of information will necessarily be to the quantum of coding State introduces interference, increases the bit error rate of quantum key dispatching system, can be known by legal communicating pair to eavesdrop behavior. By further theory analysis it can be proved that any eavesdropping means for attempting to obtain whole key informations all inevitably result in it is logical Believe that the bit error rate is more than certain specific threshold, communicating pair can whereby judge channel with the presence or absence of listener-in and abandon unreliable close Key.Quantum key distribution technology is to generally acknowledge the effective means that communicating pair can be made to share unconditional security key at present.By Development in more than 20 years, quantum key distribution technology are strided forward to practical direction, have nowadays had the ability to set up extensive more Meshed network.
In conclusion existing special type emergency system MESH self-assembly nets lacking there are cipher key associated in terms of safety It falls into, and quantum key distribution technology can make up this defect well.Quantum key distribution technology is applied to extraordinary meet an urgent need certainly In group communication network, the safety of extraordinary emergency system communication will be greatly promoted.
Invention content
It is an object of the present invention to provide a kind of quantum cryptography systems for extraordinary emergent self-organized network communication, using quantum key The scheme that distribution network is combined with extraordinary two net of emergency system MESH self-assemblies net, will be unconditional in quantum key distribution network The quantum key of safety is applied in extraordinary emergency system MESH self-assembly nets, in the premise for not changing MESH communication protocols Under, it proposes double encryption approach, promotes the safety of extraordinary emergency system wireless communication to the maximum extent.
In order to achieve the above objectives, the technical solution adopted by the present invention is:A kind of amount for extraordinary emergent self-organized network communication Sub- encryption system, including supervision and management center, quantum key server, multiple terminal devices, MESH ad hoc network and quantum key Net is distributed, the quantum-key distribution net between the supervision and management center and quantum key server is connected by optical fiber, the prison The ad hoc network controlled between administrative center and multiple terminal devices, between terminal device and terminal device is based on MESH structures WIFI wireless communication networks.
Preferred embodiment, quantum cryptography process include the following steps:
(1) quantum key server distributes quantum key to supervision and management center;
(2) terminal device downloads quantum key from supervision and management center;
(3) terminal device and the negotiation of supervision and management center message and certification body;
(4) terminal device is to data double-encryption, mutual transmission data;
(5) data transmission success, terminal device, supervision and management center destroy quantum key;
The above process need not change original cryptographic protocol in MESH ad hoc networks, as long as first close to data usage amount Key is pre-encrypted, and MESH is then used to the ciphertext that pre-encrypt generates again add from the cryptographic protocol in group wireless network It is close, duplicate protection is played to the information transmission in extraordinary emergency communication system.
Preferred embodiment, the MESH ad hoc network are in Star Network structure;Multiple terminal devices respectively with monitoring management center Between communicate, terminal device is met an urgent need occasion image data to monitoring management central transmission special type, and monitoring management center is then to end End equipment sends command scheduling order, and the communication between terminal device in same MESH self-assemblies net both can be by MESH certainly Group communication network is realized, can also be forwarded by monitoring management center.
Preferred embodiment is integrated with the amount that quantum key is obtained from quantum-key distribution net in the quantum key server Sub-key distribution terminal and quantum key memory module.
Preferred embodiment, the terminal device include taking module, memory module and microprocessor, wireless using MESH Communication protocol is communicated with monitoring management center or communication, each terminal device have the identity ID of oneself between each other.
Preferred embodiment, the monitoring management center include monitoring station and monitoring center, wherein monitoring station be responsible for in region Terminal device carry out extraordinary emergent radio communication the image information that terminal device is sent handled and forwarded or right Terminal device carries out pass down the line, and there is the identity ID of oneself in each monitoring station, by quantum key server and monitoring The distribution of the heart channel of Hang-Shaoyin quantum-key distribution net updates quantum key, and the memory module in quantum key server is close for storing quantum Key is downloaded for terminal device and is used;
Monitoring center collects the emergent occasion information of special type of each monitoring station, is handled and is backed up, sends command scheduling It orders to monitoring stations at different levels, monitoring center distributes renewal amount by quantum key server and monitoring station through quantum-key distribution net Sub-key, memory module in quantum key server for storing quantum key, monitoring center need with multiple monitoring stations it Between carry out quantum-key distribution, when storing quantum key, the identity ID for distinguishing different monitoring stations is needed, when monitoring center and end When end equipment is communicated, it is forwarded by monitoring station.
Preferred embodiment, implementation method of the quantum key in MESH self-assembly networks mainly include the following steps that:
A, quantum-key distribution process:Safe dose is established between monitoring station and monitoring center using quantum key server Sub-key, the quantum-key distribution net set up in extraordinary emergency system special optic fibre communication network cover in MESH self-assemblies The monitoring station being related to and monitoring center, quantum key server is by quantum-key distribution net in long-range monitoring station and monitoring It is distributed between the heart and updates quantum key, since quantum key server has used key storage technology, starting quantum key It before assigning process, need to first examine whether the size of key in memory meets the needs of task, if meeting needs, then directly invoke Otherwise quantum key in memory needs to start quantum-key distribution process;
B, key download procedure:Shared amount is established by quantum key assigning process between monitoring center and monitoring station Sub-key and after being stored, terminal device in MESH self-assembly nets is from download on the quantum key server of monitoring station Sub-key, and be temporarily stored in the memory module of terminal device, in case follow-up wireless communication uses the end in MESH self-assembly nets End equipment downloads the process of key from monitoring station, is carried out in the protective zone of extraordinary emergency system monitoring station, needs to carry out The certification of terminal device and monitoring station, and the key information of monitoring station record different terminal equipment extraction is needed, it monitors simultaneously Center also will be that key carries out assignment record according to the relevant information of monitoring station;
C, message negotiations process:Terminal device is first passed through with monitoring station or when being communicated with monitoring center by monitoring station WiFi technology is established with monitoring station and is connected, and then terminal device carries out message negotiation with monitoring station, including quantum key use is asked Ask message, quantum key number message and Encryption Algorithm message;
D, Data Encryption Transmission process:After message negotiation, terminal device is with regard to the use of quantum key, Encryption Algorithm Reach an agreement with monitoring station, the data that the sender of data first transmits needs using quantum key are encrypted, Encryption Algorithm It is carried out by " one-time pad ", then encrypted data and quantum key number, identity information etc. is sent by being wirelessly connected To the recipient of data;
E, cipher key destruction process:After data Successful transmissions, the quantum key used encryption is deleted, for safety level Not lower extraordinary emergent occasion data, only need terminal device to delete quantum key, and the higher data of security level, After data are successfully monitored center reception, terminal device and monitoring station are required to make to delete by quantum key to destroy.
Preferred embodiment, key download procedure is further divided into following three steps in step B:
B1. key fragmented storage:The quantum key server of monitoring station and monitoring center passes through quantum key assigning process After completing quantum-key distribution or update, just had shared in the memory module of monitoring station quantum key server and monitoring center one Quantum key in memory is then carried out segment processing, includes the length and number of key, monitoring station by the security key of cause With monitoring center by the identical quantum key of quantum-key distribution network share after, key is respectively stored in respective quantum In key server, its key is divided into the segment key storage as length, every section of key by monitoring station respectively with monitoring center For K bit, every section of key is recorded as number 1, number 2 ... number N etc. and does not repeat code name respectively, and the key in monitoring center is compiled Number corresponding monitoring station cipher key number is consistent;
B2. authentication:Before key download, terminal device and monitoring station need to carry out authentication, and carry out related letter The initial configuration of breath;
B3. key is downloaded:Terminal device downloads quantum key from the quantum key server of monitoring station, and is temporarily stored in terminal In the memory module of equipment, key download need to carry out in the protective zone of monitoring station, all be by close when downloading key every time Key section read, while monitoring station record terminal device ID and cipher key number correspondence, and by the information of association key with The form of ciphertext sends monitoring center to and carries out back-up processing, and terminal device downloads volume from the quantum key server of monitoring station Number 1 arrives the cipher key sections of number N, and stores it in the memory module of itself, in case follow-up wireless communication use;
Preferred embodiment, in step C message negotiations process be further divided into following two steps:
C1. it establishes and is wirelessly connected:Terminal device is established by MESH agreements with monitoring station and is connected, including is completed identity and recognized Card, key request and negotiations process;
C2. message is negotiated:After WIFI is wirelessly connected and establishes, message negotiation, packet are carried out between terminal device and monitoring station Quantum key is included using solicited message, quantum key number information, Encryption Algorithm message, terminal device needs to transmit to monitoring station The emergent occasion data of special type, terminal device first send messages to monitoring station progress quantum key and use request when message is negotiated, By the number of quantum key to be used, and using the Encryption Algorithm of " one-time pad ", after monitoring station receives message, pass through WIFI is wirelessly connected to terminal device to reply message, and includes whether to allow to use quantum key, the quantum key of the number to be It is no available, if to need to change number, if to allow the Encryption Algorithm etc. for using " one-time pad ", change if needed, then Further negotiate.
Preferred embodiment, in step D during Data Encryption Transmission, the senders of data be terminal device, monitoring station or The recipient of monitoring center, data is monitoring station, monitoring center or terminal device, uses MESH self-assembly nets, number According to sender and a recipient at least side be terminal device, after the emergent occasion data of special type are read by terminal device acquisition, Encryption data is first transferred to monitoring station by MESH ad hoc network, then monitoring station is again forwarded encryption data by optical fiber private network To monitoring center, and when command scheduling order is transferred to terminal device by monitoring center, needing to first pass through optical fiber private network will encrypt Command scheduling order send monitoring station to, then monitoring station is transmitted to terminal device by WIFI ad hoc network again.
Since above-mentioned technical proposal is used, the present invention has following advantages and effect compared with prior art:
The present invention is combined with double nets of quantum key distribution network in the extraordinary emergency system MESH self-assemblies net of progress and is carried It when high extraordinary emergent occasion data transmission security, need not modify to WIFI wireless communication procedures, need to only connect in WIFI It connects after establishing before extraordinary meet an urgent need occasion data or command scheduling order transmission, the message negotiation that progress quantum key uses;Amount Sub-key is stored in the memory module of terminal device, uses the exclusive or Encryption Algorithm of " one-time pad " to the emergent occasion number of special type According to being encrypted or command scheduling order be decrypted;Introduce quantum key number-of-fragments, terminal device ID and monitoring station After ID, monitoring center is facilitated to retrieve corresponding quantum key, realizes the command scheduling control of remote terminal equipment, extraordinary emergent field Close the acquisition and backup of information.The method have the characteristics that having used the security application pattern of double-encryption, WIFI is not being changed The data transmitted to needs under the premise of existing MESH communication protocols in technology are pre-encrypted using quantum key, while WIFI Encryption technology in wireless network encrypts the ciphertext that pre-encrypt generates again, is played to the information in extraordinary emergency system The effect of duplicate protection.The present invention is easy to use, and can improve the safety of information transmission, is highly suitable for extraordinary emergent system System MESH self-assembly nets.
Description of the drawings
Attached drawing 1 is to share segment processing schematic diagram after quantum key between extraordinary emergency system monitoring station and monitoring center;
Attached drawing 2 is that intelligent bi-directional data complex communication terminal downloads quantum key signal from extraordinary emergency system monitoring station Figure;
Attached drawing 3 is intelligent bi-directional data complex communication terminal will transmit the message before extraordinary emergent occasion data to monitoring station Negotiate schematic diagram;
Attached drawing 4 is that intelligent bi-directional data complex communication terminal transmits extraordinary emergent occasion schematic diagram data to monitoring center;
Attached drawing 5 is monitoring center showing by information such as intelligent bi-directional data complex communication terminal collection site image/videos It is intended to.
Specific implementation mode
The invention will be further described with reference to the accompanying drawings and embodiments:
A kind of quantum cryptography system for extraordinary emergent self-organized network communication of the present invention, needs to be related to two networks, and one A is quantum key distribution network, and one is extraordinary emergency system MESH self-assembly nets.
Wherein quantum key distribution network is used for realizing the safety distribution of quantum key.Realize what quantum-key distribution executed Agreement is inveigled with use based on the BB84 agreements of state method.In order to realize the function of quantum key distribution, need communicating pair each There are one quantum-key distribution terminals, using a quantum channel and a classical channel connection.And in order to realize network function, Need to use credible relaying, quantum router, switch device to realize the selection of communication path between different geographical node. The characteristics of in view of extraordinary emergency system communication network, the realization method of quantum channel is based on optical fiber, supplemented by free space.
As shown in Fig. 1, wherein extraordinary emergency system MESH self-assembly nets to be mainly used for WIFI intelligence bi-directional datas comprehensive Wireless communication between hop communication terminal and extraordinary emergency system monitoring station, which is in Star Network structure, more It is communicated between a intelligence bi-directional data complex communication terminal and monitoring station, intelligent bi-directional data complex communication terminal is passed to monitoring station Defeated extraordinary emergent occasion image data, and monitoring station then sends command scheduling order to intelligent bi-directional data complex communication terminal, The communication between intelligent bi-directional data complex communication terminal in same MESH self-assemblies net can both pass through MESH self-assemblies Net is realized, can also be forwarded by monitoring station.
In order to use the quantum distributed by quantum key distribution network in extraordinary emergency system MESH self-assembly nets Key needs two networks being effectively combined.In view of intelligent bi-directional data complex communication terminal is mobile, easily special Quantum key distribution network is used between monitoring center and monitoring station by point, the present invention, and intelligent bi-directional data integrated communication is whole End needs to download quantum key from monitoring station, and the spare key as its transmitting data information uses.Include in the converged network Following several component parts:Quantum key distribution network, quantum key server, the integrated communication of WIFI intelligence bi-directional datas are whole End, extraordinary emergency system monitoring station and monitoring center, as shown in Fig. 5.
The quantum key distribution network refers to for distributing update between extraordinary emergency system monitoring station and monitoring center The dedicated network of quantum key, it is supplemented by main free space, as the increase of distance and network are advised that transmission channel, which is with optical fiber, The expansion of mould should also be included as here the credible relaying and Quantum repeater for extending distance and using, to economize on resources and increasing Flexibility and use quantum router, switch device etc..
The quantum key server refers to the equipment for accessing quantum key distribution network and obtaining security key, is integrated with The quantum-key distribution terminal and quantum key memory module of quantum key are obtained from quantum key distribution network.
The WIFI intelligence bi-directional data complex communication terminal is the movement in extraordinary emergency system MESH self-assembly nets Equipment, the mobile device carry taking module, memory module and microprocessor, use MESH wireless communication protocols and special type Emergency system monitoring station carries out communication or communication, each mobile device have the identity ID of oneself between each other.
The special type emergency system monitoring station refers to being responsible for receiving extraordinary emergent occasion figure in processing certain area coverage As the treating stations of data and command scheduling order, it is responsible for answering with the intelligent bi-directional data complex communication terminal progress special type in region Anxious wireless communication, the image information that terminal device is sent is handled and is forwarded, or ordered mobile terminal device It enables and conveying, there is the identity ID of oneself in each monitoring station, by quantum key server and monitoring center through quantum-key distribution Network distribution updates quantum key, and the memory module in quantum key server is for storing quantum key, under mobile terminal It carries and uses, as shown in attached drawing 2,3.
The special type emergency system monitoring center, the special type for collecting each monitoring station are met an urgent need occasion information, carry out processing and Backup sends command scheduling order to monitoring stations at different levels, and monitoring center is close through quantum with monitoring station by quantum key server Key distributes network distribution update quantum key, and the memory module in quantum key server is for storing quantum key, in monitoring The heart needs to carry out quantum-key distribution between multiple monitoring stations, when storing quantum key, needs to distinguish different monitoring stations Identity ID is forwarded when extraordinary emergency system monitoring center is communicated with terminal device by monitoring station.
It is an object of the invention to realize use of the quantum key in extraordinary emergency system MESH self-assembly nets, in fact Existing method includes mainly following procedure:
Quantum-key distribution process:Using quantum key server the monitoring station of extraordinary emergency system and monitoring center it Between establish secure quantum key, the covering of the quantum key distribution network that is set up in extraordinary emergency system special optic fibre communication network Monitoring station involved in MESH self-assemblies and monitoring center, quantum key server are existed by the quantum-key distribution network equipment It is distributed between long-range monitoring station and monitoring center and updates quantum key, since quantum key server has used key storage Technology crosses Cheng Qian starting quantum-key distribution, need to first examine whether the size of key in memory meets the needs of task, if Meet needs, then directly invoke the quantum key in memory, otherwise needs to start quantum-key distribution process.
Key download procedure:Pass through quantum key assigning process between the monitoring center and monitoring station of extraordinary emergency system After establishing shared quantum key and being stored, terminal device in extraordinary emergency system MESH self-assembly nets is from monitoring station Quantum key server on download sub-key, and be temporarily stored in the memory module of terminal device, in case follow-up wireless communication It uses, the terminal device in extraordinary emergency system MESH self-assembly nets downloads the process of key from monitoring station, emergent in special type It is carried out in the protective zone at system monitoring station, needs the certification for carrying out terminal device and monitoring station, and monitoring station is needed to remember The key information of different terminal equipment extraction is recorded, while monitoring center also will be that key is carried out point according to the relevant information of monitoring station With record.
Message negotiations process:Terminal device is first passed through with monitoring station or when being communicated with monitoring center by monitoring station WiFi technology is established with monitoring station and is connected, and then terminal device carries out message negotiation with monitoring station, including quantum key use is asked Ask message, quantum key number message and Encryption Algorithm message.
Data Encryption Transmission process:Message negotiation after, terminal device with regard to the use of quantum key, Encryption Algorithm with Monitoring station is reached an agreement, and the data that the sender of data first transmits needs using quantum key are encrypted, and Encryption Algorithm is pressed " one-time pad " carries out, then encrypted data and quantum key number, identity information etc. are sent to by being wirelessly connected The recipient of data.
Cipher key destruction process:After data Successful transmissions, the quantum key used encryption is deleted, for security level Lower extraordinary emergent occasion data, only need terminal device to delete quantum key, and the higher data of security level, when Data are successfully monitored after the reception of center, and terminal device and monitoring station are required to make to delete by quantum key to destroy.
During above-mentioned realization, process B key download procedures are further divided into following three basic steps:
B1. key fragmented storage:The quantum key server of extraordinary emergency system monitoring station and monitoring center passes through quantum After key distribution procedure completes quantum-key distribution or update, just had shared in the memory module of monitoring station quantum key server Quantum key in memory is then carried out segment processing, includes the length of key by the security key consistent with monitoring center And number deposits key after monitoring station and monitoring center are by the identical quantum key of quantum-key distribution network share respectively In respective quantum key server, its key is divided into the segment key as length with monitoring center by monitoring station respectively for storage Storage, every section of key are K bit, and every section of key is recorded as number 1, number 2 ... number N etc. and does not repeat code name respectively, and monitors The corresponding monitoring station cipher key number of cipher key number in center is consistent, as shown in Fig. 4.
B2. authentication:Before key download, terminal device and monitoring station need to carry out authentication, and carry out related letter The initial configuration of breath.
B3. key is downloaded:Terminal device downloads quantum key from the quantum key server of monitoring station, and is temporarily stored in terminal In the memory module of equipment, key download need to carry out in the protective zone of monitoring station, all be by close when downloading key every time Key section read, while monitoring station record terminal device ID and cipher key number correspondence, and by the information of association key with The form of ciphertext sends monitoring center to and carries out back-up processing, and terminal device downloads volume from the quantum key server of monitoring station Number 1 arrives the cipher key sections of number N, and stores it in the memory module of itself, in case follow-up wireless communication use.
During above-mentioned realization, process C message negotiations process is further divided into following two basic steps:
C1. it establishes and is wirelessly connected:Terminal device is established by MESH agreements with monitoring station and is connected, including is completed identity and recognized Card, key request and negotiations process.It does not make an amendment to these processes in the present invention.
C2. message is negotiated:After WIFI is wirelessly connected and establishes, message negotiation, packet are carried out between terminal device and monitoring station Quantum key is included using solicited message, quantum key number information, Encryption Algorithm message, terminal device needs to transmit to monitoring station The emergent occasion data of special type, terminal device first send messages to monitoring station progress quantum key and use request when message is negotiated, By the number of quantum key to be used, and using the Encryption Algorithm of " one-time pad ", after monitoring station receives message, pass through WIFI is wirelessly connected to terminal device to reply message, and includes whether to allow to use quantum key, the quantum key of the number to be It is no available, if to need to change number, if to allow the Encryption Algorithm etc. for using " one-time pad ", change if needed, then Further negotiate.
During above-mentioned realization, during process D Data Encryption Transmissions, the sender of data is terminal device, monitoring The recipient for the either monitoring center data of standing is monitoring station, monitoring center or terminal device, uses extraordinary emergency system MESH self-assembly nets, sender and the recipient at least side of data are terminal devices, and the emergent occasion data of special type are by end After end equipment acquisition is read, encryption data is first transferred to monitoring station by WIFI ad hoc network, then monitoring station will encrypt number again It is transmitted to monitoring center according to by optical fiber private network, and when command scheduling order is transferred to terminal device by monitoring center, need elder generation Encrypted command scheduling order is sent to monitoring station by optical fiber private network, and then monitoring station is transmitted to by WIFI ad hoc network again Terminal device, here extraordinary emergency system MESH self-assembly nets be mainly used for the data between monitoring station and counterpart terminal equipment It communicates, the data communication between the terminal device of same monitoring station administration can both be realized between each other, can also pass through monitoring station and turn Hair carries out, the forwarding that the data communication between the terminal device of different monitoring station administrations passes through respective monitoring station and monitoring center It carries out.
With intelligent bi-directional data complex communication terminal extraordinary emergent occasion data instance, refer to the attached drawing are transmitted to monitoring center 4 illustrate the specific implementation step of double-encryption.The emergent occasion data of special type are passed through institute by intelligent bi-directional data complex communication terminal Belong to monitoring station and be transmitted to monitoring center, with reference to attached drawing 4, the data of transmission are indicated as " the emergent occasion data of special type ", use Quantum key number is " number X ", after the exclusive or Encryption Algorithm encryption of " one-time pad ", obtains " (the emergent fields of special type OTP Close data) ", the identity information of terminal device is " ID (terminal) ", and extraordinary emergency system monitoring station is sent to by WIFI connections Information be " WIFI (ID (terminal), number X, OTP (extraordinary meet an urgent need occasion data)) ".Monitoring station receives the letter of terminal device After breath, first pass through and decrypt for the first time, obtain encrypted data " OTP (special type emergent occasion data) ", if monitoring station need into Row backup storage decrypts " the emergent occasion data of special type " information using corresponding " number X " quantum key exclusive or, if Monitoring station need not back up, then be directly forwarded to encrypted data " OTP (the emergent occasion data of special type) " by safe lane Monitoring center, by taking Virtual Private Network VPN technologies as an example, the information that monitoring station is transmitted to monitoring center is " VPN (ID (monitorings Stand), ID (terminal), number X, OTP (the emergent occasion data of special type)) ".
For the extraordinary emergent occasion image scene video information of intelligent bi-directional data complex communication terminal acquisition, It illustrates how to be applied to quantum key to ensure the safe transmission of information in extraordinary emergency system MESH self-assembly nets.With reference to attached The WIFI wireless communication networks coverage areas of Fig. 5, monitoring station 1 have M terminal device collection site image/video information, monitoring station 2 WIFI wireless communication networks coverage areas have N number of terminal device collection site image/video information, monitoring center is by summarizing, uniting The image scene video information for counting each terminal device carries out resource allocation to each scene, realizes distribution automation.Dotted line in figure That is the coverage area of extraordinary emergency system monitoring station MESH self-assembly nets.Monitoring center leads to between monitoring station 1 and monitoring station 2 Distribution and update that fiber quantum key distribution network carries out quantum key are crossed, quantum key is stored in quantum key server In storage unit, the terminal device for being under the jurisdiction of each monitoring station periodically downloads quantum key to monitoring station, and the quantum after download is close Key is stored in the cipher key storage block of terminal device, while cipher key number and corresponding terminal device identity letter are carried out in monitoring station Breath, monitoring center also back up the download situation of different monitoring station quantum keys.To be under the jurisdiction of the terminal device of monitoring station 1 For 1, terminal device 1 downloads quantum key from monitoring station 1, if the amount of storage in 1 quantum key server of monitoring station is insufficient, It is then again started up quantum-key distribution process to quantum key to meet the requirements, by downloading process, quantum key is transmitted to terminal In the memory module of equipment 1, while monitoring station 1 and monitoring center are by the quantum key of the identity information of terminal device 1 and download Information carries out record backup.Monitoring center collect statistics special type meet an urgent need occasion image scene video information when, given by monitoring station 1 Terminal device 1 sends reading order, and the order is first with the quantum key of number 1 after " one-time pad " encryption, by believing safely Road sends monitoring station 1 to, after monitoring station 1 obtains encrypted reading order, by extraordinary emergency system monitoring station MESH from group Communication network is established with the terminal device 1 in coverage area and is connected, and after mutual identity authentication, terminal device 1 is told in monitoring station 1 Next encryption data is encrypted through " one-time pad " using 1 quantum key of number as a result, waiting for that terminal device 1 is replied After quantum key is available, monitoring station 1 is by WIFI connections by encrypted data transmission to terminal device 1,1 double descrambling of terminal device Obtain reading order.After terminal device 1 is read, image scene video information is carried out to the encryption of " one-time pad ", is used Be 2 quantum key of number, then established and connected by extraordinary emergency system MESH self-assemblies net and monitoring station 1, by phase After mutual authentication, terminal device 1 tells 1 next encryption data of monitoring station using 2 quantum key of number through " primary One is close " it is encrypted as a result, station 1 to be monitored reply quantum key it is available after, terminal device 1 will be encrypted existing by WIFI connections For field picture video information transmission to monitoring station 1, it is encrypted that " one-time pad " is passed through in monitoring station 1 after the decryption of MESH agreements Image scene video information ciphertext, then monitoring station 1 is by the identity information of oneself, the identity information of terminal device 1, quantum key Number, image scene video information ciphertext transfer to monitoring center by safe lane, and scene is obtained after monitoring center decryption Image/video information.
The above embodiments merely illustrate the technical concept and features of the present invention, and its object is to allow person skilled in the art Scholar cans understand the content of the present invention and implement it accordingly, and it is not intended to limit the scope of the present invention.It is all according to the present invention Equivalent change or modification made by Spirit Essence, should be covered by the protection scope of the present invention.

Claims (10)

1. a kind of quantum cryptography system for extraordinary emergent self-organized network communication, it is characterised in that:Including supervision and management center, amount Sub-key server, multiple terminal devices, MESH ad hoc network and quantum-key distribution net, the supervision and management center and quantum are close Quantum-key distribution net between key server is connected by optical fiber, between the supervision and management center and multiple terminal devices, eventually Ad hoc network between end equipment and terminal device is the WIFI wireless communication networks based on MESH structures.
2. the quantum cryptography system according to claim 1 for extraordinary emergent self-organized network communication, it is characterised in that:Quantum Ciphering process includes the following steps:
(1) quantum key server distributes quantum key to supervision and management center;
(2) terminal device downloads quantum key from supervision and management center;
(3) terminal device and the negotiation of supervision and management center message and certification body;
(4) terminal device is to data double-encryption, mutual transmission data;
(5) data transmission success, terminal device, supervision and management center destroy quantum key;
The above process need not change original cryptographic protocol in MESH ad hoc networks, if first to data usage amount sub-key into Then row pre-encrypt uses MESH to be encrypted again to the ciphertext that pre-encrypt generates from the cryptographic protocol in group wireless network, Duplicate protection is played to the information transmission in extraordinary emergency communication system.
3. the quantum cryptography system according to claim 1 for extraordinary emergent self-organized network communication, it is characterised in that:It is described MESH ad hoc network is in Star Network structure;Multiple terminal devices communicate between monitoring management center respectively, and terminal device is to prison Test tube manages the emergent occasion image data of central transmission special type, and monitoring management center then sends command scheduling life to terminal device It enables, the communication between terminal device in same MESH self-assemblies net can both be realized by MESH self-assembly nets, can also be led to Cross the forwarding of monitoring management center.
4. the quantum cryptography system according to claim 1 for extraordinary emergent self-organized network communication, it is characterised in that:It is described The quantum-key distribution terminal and quantum that quantum key is obtained from quantum-key distribution net are integrated in quantum key server Cipher key storage block.
5. the quantum cryptography system according to claim 4 for extraordinary emergent self-organized network communication, it is characterised in that:It is described Terminal device includes taking module, memory module and microprocessor, uses MESH wireless communication protocols and monitoring management center It carries out communication or communication, each terminal device has the identity ID of oneself between each other.
6. the quantum cryptography system according to claim 5 for extraordinary emergent self-organized network communication, it is characterised in that:It is described Monitoring management center includes monitoring station and monitoring center, and wherein monitoring station is responsible for carrying out with the terminal device in region extraordinary emergent The image information that terminal device is sent is handled and is forwarded by wireless communication, or carries out pass down the line to terminal device, There is the identity ID of oneself in each monitoring station, is distributed through quantum-key distribution net by quantum key server and monitoring center Quantum key is updated, the memory module in quantum key server is downloaded for terminal device and used for storing quantum key;
Monitoring center collects the emergent occasion information of special type of each monitoring station, is handled and is backed up, sends command scheduling order To monitoring stations at different levels, monitoring center is close through quantum-key distribution net distribution update quantum with monitoring station by quantum key server Key, memory module in quantum key server for storing quantum key, monitoring center need between multiple monitoring stations into Row quantum-key distribution needs the identity ID for distinguishing different monitoring stations when storing quantum key, when monitoring center and terminal are set For when being communicated, it is forwarded by monitoring station.
7. the quantum cryptography system according to claim 6 for extraordinary emergent self-organized network communication, it is characterised in that:Quantum Implementation method of the key in MESH self-assembly networks mainly includes the following steps that:
A, quantum-key distribution process:It is close that secure quantum is established between monitoring station and monitoring center using quantum key server Key, the quantum-key distribution net set up in extraordinary emergency system special optic fibre communication network cover involved in MESH self-assemblies Monitoring station and monitoring center, quantum key server is by quantum-key distribution net between long-range monitoring station and monitoring center Distribution and update quantum key are starting quantum-key distribution mistake since quantum key server has used key storage technology Cheng Qian, need to first examine whether the size of key in memory meets the needs of task, if meeting needs, then directly invoke memory In quantum key, otherwise need start quantum-key distribution process;
B, key download procedure:It is close by the shared quantum of quantum key assigning process foundation between monitoring center and monitoring station Key and after being stored, the terminal device in MESH self-assembly nets is close from download on the quantum key server of monitoring station Key, and be temporarily stored in the memory module of terminal device, in case follow-up wireless communication is set using the terminal in MESH self-assembly nets The standby process that key is downloaded from monitoring station, carries out in the protective zone of extraordinary emergency system monitoring station, needs to carry out terminal The certification of equipment and monitoring station, and the key information of monitoring station record different terminal equipment extraction is needed, while monitoring center Also to be that key carries out assignment record according to the relevant information of monitoring station;
C, message negotiations process:Terminal device first passes through WIFI with monitoring station or when being communicated with monitoring center by monitoring station Technology is established with monitoring station and is connected, and then terminal device carries out message negotiation with monitoring station, including quantum key is disappeared using request Breath, quantum key number message and Encryption Algorithm message;
D, Data Encryption Transmission process:After message negotiation, terminal device is with regard to the use of quantum key, Encryption Algorithm and prison Survey station is reached an agreement, and the data that the sender of data first transmits needs using quantum key are encrypted, and Encryption Algorithm presses " one Secondary one is close " it carries out, then encrypted data and quantum key number, identity information etc. are sent to data by being wirelessly connected Recipient;
E, cipher key destruction process:After data Successful transmissions, the quantum key that uses of encryption is deleted, for security level compared with The emergent occasion data of low special type, only need terminal device to delete quantum key, and the higher data of security level, work as number After being received according to the center that is successfully monitored, terminal device and monitoring station are required to make to delete by quantum key to destroy.
8. the quantum cryptography system according to claim 7 for extraordinary emergent self-organized network communication, it is characterised in that:Step Key download procedure is further divided into following three steps in B:
B1. key fragmented storage:The quantum key server of monitoring station and monitoring center is completed by quantum key assigning process After quantum-key distribution or update, just had shared in the memory module of monitoring station quantum key server consistent with monitoring center Quantum key in memory is then carried out segment processing, includes the length and number of key, monitoring station and prison by security key After control shares identical quantum key centrally through quantum key distribution network, key is respectively stored in respective quantum key In server, its key is divided into the segment key storage as length by monitoring station respectively with monitoring center, and every section of key is K ratios Spy, every section of key be recorded as respectively number 1, number 2 ... number N etc. not repeat code name, and the cipher key number in monitoring center with Its corresponding monitoring station cipher key number is consistent;
B2. authentication:Before key download, terminal device and monitoring station need to carry out authentication, and carry out relevant information Initial configuration;
B3. key is downloaded:Terminal device downloads quantum key from the quantum key server of monitoring station, and is temporarily stored in terminal device Memory module in, key download need to be carried out in the protective zone of monitoring station, every time download key when be all by cipher key sections It reads, while the correspondence of monitoring station record terminal device ID and cipher key number, and by the information of association key with ciphertext Form send monitoring center to and carry out back-up processing, terminal device downloads number 1 from the quantum key server of monitoring station It to the cipher key sections of number N, and stores it in the memory module of itself, in case follow-up wireless communication uses.
9. the quantum cryptography system according to claim 7 for extraordinary emergent self-organized network communication, it is characterised in that:Step Message negotiations process is further divided into following two steps in C:
C1. it establishes and is wirelessly connected:Terminal device and monitoring station are established by MESH agreements and are connected, including complete authentication, close Key is asked and negotiations process;
C2. message is negotiated:After WIFI is wirelessly connected and establishes, message negotiation, including amount are carried out between terminal device and monitoring station Using solicited message, quantum key number information, Encryption Algorithm message, terminal device needs to transmit to monitoring station extraordinary sub-key Emergent occasion data, terminal device first send messages to monitoring station progress quantum key and use request when message is negotiated, will The number of the quantum key used, and using " one-time pad " Encryption Algorithm, after monitoring station receives message, by WIFI without Line is connected to terminal device to reply message, and includes whether to allow to use whether quantum key, the quantum key of the number can be used, Modification whether is needed to number, if to allow the Encryption Algorithm etc. for using " one-time pad ", change if needed, then further assist Quotient.
10. the quantum cryptography system according to claim 7 for extraordinary emergent self-organized network communication, it is characterised in that:Step In rapid D during Data Encryption Transmission, the sender of data is terminal device, monitoring station or monitoring center, the reception of data Side is monitoring station, monitoring center or terminal device, uses MESH self-assembly nets, the sender and recipient of data are extremely A rare side is terminal device, and after the emergent occasion data of special type are read by terminal device acquisition, encryption data is first passed through MESH Ad hoc network is transferred to monitoring station, and then encryption data is transmitted to monitoring center by monitoring station by optical fiber private network again, and in monitoring When command scheduling order is transferred to terminal device by the heart, needs to first pass through optical fiber private network and send encrypted command scheduling order to Monitoring station, then monitoring station terminal device is transmitted to by WIFI ad hoc network again.
CN201810257059.7A 2018-03-27 2018-03-27 A kind of quantum cryptography system for extraordinary emergent self-organized network communication Withdrawn CN108377188A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810257059.7A CN108377188A (en) 2018-03-27 2018-03-27 A kind of quantum cryptography system for extraordinary emergent self-organized network communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810257059.7A CN108377188A (en) 2018-03-27 2018-03-27 A kind of quantum cryptography system for extraordinary emergent self-organized network communication

Publications (1)

Publication Number Publication Date
CN108377188A true CN108377188A (en) 2018-08-07

Family

ID=63019336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810257059.7A Withdrawn CN108377188A (en) 2018-03-27 2018-03-27 A kind of quantum cryptography system for extraordinary emergent self-organized network communication

Country Status (1)

Country Link
CN (1) CN108377188A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109618135A (en) * 2018-12-12 2019-04-12 苏州新海宜电子技术有限公司 A kind of quantum cryptography type video monitoring system for intelligent self-organized network communication
CN110492999A (en) * 2019-08-29 2019-11-22 温州黑谷量子信息科技有限公司 A kind of quantum key generation terminal system
CN110535637A (en) * 2019-08-15 2019-12-03 国网安徽省电力有限公司信息通信分公司 A kind of the wireless dispatch method, apparatus and system of quantum key
CN111865566A (en) * 2019-04-26 2020-10-30 上海铁路通信有限公司 Quantum security data network system for railway signal system
CN112004257A (en) * 2020-07-31 2020-11-27 海尔优家智能科技(北京)有限公司 Network element communication method and communication system
CN112188465A (en) * 2020-09-29 2021-01-05 江苏恒宝智能系统技术有限公司 Emergency command communication system and working method thereof
CN113126617A (en) * 2021-03-15 2021-07-16 浙江建林电子电气股份有限公司 Intelligent inspection robot
CN113596386A (en) * 2021-08-07 2021-11-02 施航 Video monitoring quantum encryption system
CN117354796A (en) * 2023-11-07 2024-01-05 苏州格知量子科技有限公司 Quantum security wireless ad hoc network system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109618135A (en) * 2018-12-12 2019-04-12 苏州新海宜电子技术有限公司 A kind of quantum cryptography type video monitoring system for intelligent self-organized network communication
CN109618135B (en) * 2018-12-12 2019-10-29 苏州新海宜电子技术有限公司 A kind of quantum cryptography type video monitoring system for intelligent self-organized network communication
CN111865566A (en) * 2019-04-26 2020-10-30 上海铁路通信有限公司 Quantum security data network system for railway signal system
CN110535637A (en) * 2019-08-15 2019-12-03 国网安徽省电力有限公司信息通信分公司 A kind of the wireless dispatch method, apparatus and system of quantum key
CN110492999A (en) * 2019-08-29 2019-11-22 温州黑谷量子信息科技有限公司 A kind of quantum key generation terminal system
CN112004257A (en) * 2020-07-31 2020-11-27 海尔优家智能科技(北京)有限公司 Network element communication method and communication system
CN112188465A (en) * 2020-09-29 2021-01-05 江苏恒宝智能系统技术有限公司 Emergency command communication system and working method thereof
CN112188465B (en) * 2020-09-29 2021-10-26 江苏恒宝智能系统技术有限公司 Emergency command communication system and working method thereof
CN113126617A (en) * 2021-03-15 2021-07-16 浙江建林电子电气股份有限公司 Intelligent inspection robot
CN113596386A (en) * 2021-08-07 2021-11-02 施航 Video monitoring quantum encryption system
CN117354796A (en) * 2023-11-07 2024-01-05 苏州格知量子科技有限公司 Quantum security wireless ad hoc network system

Similar Documents

Publication Publication Date Title
CN108377188A (en) A kind of quantum cryptography system for extraordinary emergent self-organized network communication
CN103491531B (en) Power system WiMAX wireless communication networks uses the method that quantum key improves power information transmission security
CN106134152B (en) For method, equipment and the device of social WI-FI mesh network to be added
CN101340443B (en) Session key negotiating method, system and server in communication network
CN100420227C (en) Information providing method, information providing system and relay equipment
CN108510270B (en) Mobile transfer method with safe quantum
CN101741555B (en) Method and system for identity authentication and key agreement
CN104994112A (en) Method for encrypting communication data chain between unmanned aerial vehicle and ground station
CN107094076B (en) Secret communication method based on quantum true random number and communication system
WO2023082599A1 (en) Blockchain network security communication method based on quantum key
CN108540436B (en) Communication system and communication method for realizing information encryption and decryption transmission based on quantum network
CN108599925A (en) A kind of modified AKA identity authorization systems and method based on quantum communication network
CN105323754B (en) A kind of distributed method for authenticating based on wildcard
CN104010297B (en) Wireless terminal configuration method and device and wireless terminal
CN109995511A (en) A kind of mobile secret communication method based on quantum key distribution network
CN108964897B (en) Identity authentication system and method based on group communication
CN109995514A (en) A kind of safe and efficient quantum key Information Mobile Service method
CN101287277B (en) Method and system for providing service to customer's terminal in wireless personal area network
CN1941695B (en) Method and system for generating and distributing key during initial access network process
CN109151823B (en) eSIM card authentication method and system
CN103167494B (en) Method for sending information and system
CN110943835A (en) Distribution network encryption method and system for sending wireless local area network information
CN101635922B (en) Safety communication method of wireless mesh network
CN101741548B (en) Method and system for establishing safe connection between switching equipment
JP6544519B2 (en) Mobile control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180807

WW01 Invention patent application withdrawn after publication