CN108810016A - Terminal access authentication method based on quantum cryptography watermark - Google Patents

Terminal access authentication method based on quantum cryptography watermark Download PDF

Info

Publication number
CN108810016A
CN108810016A CN201810754331.2A CN201810754331A CN108810016A CN 108810016 A CN108810016 A CN 108810016A CN 201810754331 A CN201810754331 A CN 201810754331A CN 108810016 A CN108810016 A CN 108810016A
Authority
CN
China
Prior art keywords
authentication
quantum
quantum cryptography
fingerprint image
digital watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810754331.2A
Other languages
Chinese (zh)
Other versions
CN108810016B (en
Inventor
吴佳楠
张迪
田甜
宋立军
朱德新
黄超
刘兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University
Original Assignee
Changchun University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun University filed Critical Changchun University
Priority to CN201810754331.2A priority Critical patent/CN108810016B/en
Publication of CN108810016A publication Critical patent/CN108810016A/en
Application granted granted Critical
Publication of CN108810016B publication Critical patent/CN108810016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Image Processing (AREA)
  • Storage Device Security (AREA)

Abstract

基于量子密码水印的终端接入认证方法,涉及量子保密通信领域,具体方法为认证接入终端检录用户指纹,并生成具有指纹信息的指纹图像;认证接入终端的认证接入模块向Alice发送端量子密码处理网关的量子密码分控管理模块申请量子密码作为量子数字水印,嵌入到指纹图像中,生成认证指纹图像;认证接入模块将认证指纹图像发送至认证终端的认证中心模块,认证中心模块将认证指纹图像分解为量子数字水印与指纹图像;量子数字水印与指纹图像均比对成功,认证中心模块则接受认证接入终端接入请求。比对失败,则拒绝认证接入终端的接入请求。本发明将量子密码与数字水印技术结合,以实现在量子计算机环境下仍安全可靠的身份认证。

The terminal access authentication method based on quantum cryptography watermarking involves the field of quantum secure communication. The specific method is to check the user's fingerprint at the authentication access terminal and generate a fingerprint image with fingerprint information; the authentication access module of the authentication access terminal sends Alice the The quantum cryptography sub-control management module of the quantum cryptography processing gateway applies for quantum cryptography as a quantum digital watermark, embeds it into the fingerprint image, and generates an authentication fingerprint image; the authentication access module sends the authentication fingerprint image to the authentication center module of the authentication terminal, and the authentication center module The authentication fingerprint image is decomposed into quantum digital watermark and fingerprint image; the quantum digital watermark and fingerprint image are compared successfully, and the authentication center module accepts the authentication access terminal access request. If the comparison fails, the access request of the authenticated access terminal is rejected. The invention combines quantum cryptography and digital watermark technology to realize safe and reliable identity authentication under the quantum computer environment.

Description

基于量子密码水印的终端接入认证方法Terminal access authentication method based on quantum cryptography watermark

技术领域technical field

本发明涉及量子保密通信领域,特别是涉及基于量子密码水印的终端接入认证方法。The invention relates to the field of quantum secure communication, in particular to a terminal access authentication method based on a quantum cryptography watermark.

背景技术Background technique

计算机网络技术的迅速发展,以致信息渗透了我们周围的生活环境。保护信息安全也就自然成为了当今时代一个必须解决的关键问题,而身份认证技术则是实现信息安全的核心技术之一。当前通信网络中,身份认证系统通常采用非对称密码体制或对称密码体制两种加密体制。其中,非对称密码体制中的加密密码和解密密码不同,并且从加密密码无法推算出解密密码,这使得解密密码具有较高的安全性,也使得采用非对称密码体制的认证系统可实现可靠的用户身份认证,且加密密码可以公开,因此在认证过程中所需密码数量较少。对称密码体制则由于密码较短、加解密处理简单、加解密速度快,因而采用对称密码体制的认证系统具有认证速度快的优点,可以满足大规模网络应用的基本需求。With the rapid development of computer network technology, information has permeated the living environment around us. Protecting information security has naturally become a key issue that must be solved in today's era, and identity authentication technology is one of the core technologies to achieve information security. In the current communication network, the identity authentication system usually adopts two kinds of encryption schemes: asymmetric cryptosystem or symmetric cryptosystem. Among them, the encryption password and the decryption password in the asymmetric cryptosystem are different, and the decryption password cannot be deduced from the encryption password, which makes the decryption password more secure, and also makes the authentication system using the asymmetric cryptosystem reliable. User identity authentication, and the encrypted password can be disclosed, so the number of passwords required in the authentication process is small. The symmetric cryptosystem has short passwords, simple encryption and decryption processing, and fast encryption and decryption speed. Therefore, the authentication system using the symmetric cryptosystem has the advantage of fast authentication speed and can meet the basic needs of large-scale network applications.

但无论是非对称密码体制或对称密码体制,加密和解密算法主要依赖于计算的复杂度。计算的高度复杂性确保窃听者在没有密钥的情况下,在有限的时间内无法完成破解所需的大量计算,来保证信息安全。量子计算借助高效的计算能力几乎可以破译目前所有传统的加密方法,使传统的加密算法无密可保。量子通信技术的信息安全基于量子密码学,以量子状态作为密钥突破了传统加密方法的束缚,具有不可窃听、不可复制性和理论上的“无条件安全性”。任何截获或测试量子密钥的操作,都会改变量子状态,量子通信能够确保两地之间密钥分配和通信的绝对安全性。But whether it is an asymmetric cryptosystem or a symmetric cryptosystem, the encryption and decryption algorithms mainly depend on the computational complexity. The high complexity of calculations ensures that eavesdroppers cannot complete the large amount of calculations required for cracking within a limited time without the key, so as to ensure information security. Quantum computing can decipher almost all current traditional encryption methods with the help of efficient computing power, making traditional encryption algorithms unsecured. The information security of quantum communication technology is based on quantum cryptography, using the quantum state as the key to break through the shackles of traditional encryption methods, and it is non-eavesdropping, non-replicable and theoretically "unconditional security". Any operation that intercepts or tests quantum keys will change the quantum state, and quantum communication can ensure the absolute security of key distribution and communication between the two places.

发明内容Contents of the invention

无论是非对称密码体制还是对称密码体制,计算机密码学中的经典算法往往利用计算复杂度或不可破解的数学问题来为破解设置障碍。显而易见,此类算法都依赖于复杂的数学算法,即由于破解速率受限于现今计算机的计算能力,无法在密码有效力的时间段内完成破解。而当下具有相同时钟脉冲速度的量子计算机逐渐走入现实,其强大的计算能力与适宜的量子计算机算法进行结合,可使利用计算机密码学中的经典算法作为身份认证安全屏障的系统迅速瓦解。Whether it is an asymmetric cryptosystem or a symmetric cryptosystem, classical algorithms in computer cryptography often use computational complexity or undecipherable mathematical problems to set up obstacles for cracking. Obviously, such algorithms all rely on complex mathematical algorithms, that is, because the cracking rate is limited by the computing power of today's computers, it cannot be cracked within the effective time period of the password. At present, quantum computers with the same clock pulse speed are gradually coming into reality. The combination of their powerful computing power and appropriate quantum computer algorithms can quickly disintegrate systems that use classical algorithms in computer cryptography as security barriers for identity authentication.

鉴于此种隐患,基于量子保密通信的绝对安全性和量子密码的真随机性,本发明提出了一种基于量子密码水印的终端接入认证方法,将量子密码与数字水印技术结合,以实现在量子计算机环境下仍安全可靠的身份认证。In view of this hidden danger, based on the absolute security of quantum secret communication and the true randomness of quantum cryptography, the present invention proposes a terminal access authentication method based on quantum cryptography watermarking, which combines quantum cryptography with digital watermarking technology to achieve Safe and reliable identity authentication in the quantum computer environment.

本发明采用如下技术方案:基于量子密码水印的终端接入认证方法,其特征在于,该方法采用的系统包含:量子密码生成网络、Alice发送端量子密码处理网关、Bob接收端量子密码处理网关、认证接入终端及认证终端,The present invention adopts the following technical solution: a terminal access authentication method based on quantum cryptography watermark, which is characterized in that the system adopted by the method includes: quantum cryptography generation network, quantum cryptography processing gateway at Alice's sending end, quantum cryptography processing gateway at Bob's receiving end, Authentication access terminal and authentication terminal,

所述Alice发送端量子密码处理网关包含量子密码分控管理模块和第一量子密码处理模块,其中量子密码分控管理模块用于向量子密码生成网络申请量子密码,并对获取的量子密码进行保存及管理,同时量子密码分控管理模块还用于响应认证接入终端的申请量子密码请求;第一量子密码处理模块用于将量子密码转换为二值图并置乱生成量子数字水印,同时发送给认证接入终端;The quantum cryptography processing gateway at the Alice sending end includes a quantum cryptography sub-control management module and a first quantum cryptography processing module, wherein the quantum cryptography sub-control management module is used to apply for a quantum cryptography to the quantum cryptography generation network, and save the obtained quantum cryptography At the same time, the quantum cryptography sub-control management module is also used to respond to the application quantum cryptography request of the authentication access terminal; the first quantum cryptography processing module is used to convert the quantum cryptography into a binary image and scramble to generate a quantum digital watermark, and send To authenticate the access terminal;

所述Bob接收端量子密码处理网关包含量子密码主控管理模块、第二量子密码处理模块及量子数字水印认证模块,其中量子密码主控管理模块用于响应各个Alice发送端量子密码处理网关的申请量子密码请求,量子密码主控管理模块还用于保存、管理和分发给量子密码生成网络中对应Alice发送端的量子密码,响应认证终端的申请量子密码请求;第二量子密码处理模块用于将量子密码转换为二值图并置乱生成量子数字水印;量子数字水印认证模块用于向认证终端发送量子数字水印位置信息,量子数字水印认证模块还用于接收由第二量子密码处理模块生成的量子数字水印及接收认证终端发送的量子数字水印,并进行量子数字水印比对,向认证终端发送量子数字水印比对结果;The quantum cryptography processing gateway at the receiving end of Bob includes a quantum cryptography main control management module, a second quantum cryptography processing module and a quantum digital watermark authentication module, wherein the quantum cryptography main control management module is used to respond to the application of each Alice sending end quantum cryptography processing gateway Quantum password request, the quantum password master control management module is also used to save, manage and distribute to the quantum password corresponding to Alice’s sending end in the quantum password generation network, and respond to the application quantum password request of the authentication terminal; the second quantum password processing module is used for quantum password The password is converted into a binary image and scrambled to generate a quantum digital watermark; the quantum digital watermark authentication module is used to send the quantum digital watermark position information to the authentication terminal, and the quantum digital watermark authentication module is also used to receive the quantum digital watermark generated by the second quantum cryptography processing module Digital watermark and receive the quantum digital watermark sent by the authentication terminal, perform quantum digital watermark comparison, and send the quantum digital watermark comparison result to the authentication terminal;

所述认证接入终端包括指纹图像生成模块和认证接入模块,指纹图像生成模块用于检录用户指纹并将其转换成指纹图像;认证接入模块用于向Alice发送端量子密码处理网关申请量子密码、将量子数字水印嵌入到指纹图像生成认证指纹图像、向认证终端发送认证指纹图像、接入请求和认证终端建立数据连接;The authentication access terminal includes a fingerprint image generation module and an authentication access module, and the fingerprint image generation module is used to check and record user fingerprints and convert it into a fingerprint image; the authentication access module is used to apply for a quantum cryptography processing gateway to Alice's sending end. Password, embedding the quantum digital watermark into the fingerprint image to generate the authentication fingerprint image, sending the authentication fingerprint image to the authentication terminal, accessing the request and establishing a data connection with the authentication terminal;

所述认证终端的认证中心模块用于接收认证接入终端的接入请求,接收Bob接收端量子密码处理网关发送的量子数字水印定位信息,将认证指纹图像分解为量子数字水印与指纹图像,调取本地保存的指纹图像并与接收的指纹图像进行比对,向Bob接收端量子密码处理网关发送量子数字水印以及接收Bob接收端量子密码处理网关发送的量子数字水印比对结果,对认证接入终端的接入请求进行决策和回复,The authentication center module of the authentication terminal is used to receive the access request of the authentication access terminal, receive the quantum digital watermark positioning information sent by the quantum cryptography processing gateway at Bob's receiving end, decompose the authentication fingerprint image into quantum digital watermark and fingerprint image, and adjust Take the fingerprint image stored locally and compare it with the received fingerprint image, send the quantum digital watermark to the quantum cryptography processing gateway at the receiving end of Bob and receive the comparison result of the quantum digital watermark sent by the quantum cryptography processing gateway at the receiving end of Bob, and verify the authentication access terminal access request for decision-making and reply,

具体包括如下步骤:Specifically include the following steps:

1)认证接入终端检录用户指纹,并生成具有指纹信息的指纹图像;1) The authentication access terminal checks the user's fingerprint and generates a fingerprint image with fingerprint information;

2)认证接入终端向Alice发送端量子密码处理网关发送申请量子密码请求;2) The authentication access terminal sends a request for applying quantum cryptography to the quantum cryptography processing gateway at the sending end of Alice;

3)Alice发送端量子密码处理网关响应认证接入终端向其发送的申请量子密码请求,同时对量子密码进行二值化转换形成量子数字水印发送给认证接入终端;3) The quantum cryptography processing gateway at the sending end of Alice responds to the application quantum cryptography request sent by the authentication access terminal, and at the same time performs binary conversion on the quantum cryptography to form a quantum digital watermark and sends it to the authentication access terminal;

4)认证接入终端接收Alice发送端量子密码处理网关向其发送的量子数字水印,并将该量子数字水印嵌入到步骤1)中所述指纹图像中生成认证指纹图像;4) The authentication access terminal receives the quantum digital watermark sent to Alice by the quantum cryptography processing gateway, and embeds the quantum digital watermark into the fingerprint image described in step 1) to generate an authentication fingerprint image;

5)认证接入终端将步骤4)中所述的认证指纹图像发送至认证终端,作为认证接入终端接入认证终端的接入请求;5) The authentication access terminal sends the authentication fingerprint image described in step 4) to the authentication terminal as an access request for the authentication access terminal to access the authentication terminal;

6)认证终端接收认证接入终端向其发送的认证指纹图像,并将认证指纹图像分解为量子数字水印与指纹图像,调取本地预先保存的指纹图像与分解认证指纹图像得到的指纹图像进行比对,比对成功后,认证终端向Bob接收端量子密码处理网关发送分解认证指纹图像得到的量子数字水印;6) The authentication terminal receives the authentication fingerprint image sent by the authentication access terminal, and decomposes the authentication fingerprint image into a quantum digital watermark and a fingerprint image, and compares the fingerprint image obtained by calling the local pre-saved fingerprint image with the fingerprint image obtained by decomposing the authentication fingerprint image. Yes, after the comparison is successful, the authentication terminal sends the quantum digital watermark obtained by decomposing the authentication fingerprint image to the quantum cryptography processing gateway at the receiving end of Bob;

7)Bob接收端量子密码处理网关接收认证终端向其发送的量子数字水印,与其内部的量子数字水印进行比对;7) The quantum cryptography processing gateway at the receiving end of Bob receives the quantum digital watermark sent by the authentication terminal, and compares it with the internal quantum digital watermark;

8)Bob接收端量子密码处理网关将量子数字水印比对结果反馈给认证终端,比对成功,认证终端接受认证接入终端接入请求,比对失败,认证终端拒绝接受认证接入终端接入请求。8) The quantum cryptography processing gateway at the receiving end of Bob feeds back the comparison result of the quantum digital watermark to the authentication terminal. If the comparison is successful, the authentication terminal accepts the access request of the authentication access terminal. If the comparison fails, the authentication terminal refuses to accept the access of the authentication access terminal. ask.

所述量子密码生成网络包含一个Bob接收端和至少一个Alice发送端,量子密码生成网络中的Bob接收端与量子密码生成网络中的各个Alice发送端之间按照BB84协议生成量子密码。The quantum cipher generation network includes a Bob receiving end and at least one Alice sending end, and the quantum cipher is generated between the Bob receiving end in the quantum cipher generating network and each Alice sending end in the quantum cipher generating network according to the BB84 protocol.

通过上述设计方案,本发明可以带来如下有益效果:本发明提出了一种基于量子密码水印的终端接入认证方法,基于量子密钥分配机制的量子保密通信系统能够产生具有真随机性的安全密钥,将其应用于数字水印技术中能够有效提高水印算法的安全性和稳健性。另外指纹识别技术亦是信息安全的核心技术之一。用即时检录用户指纹和预先保存的指纹进行比较,以验证真实身份,其原理在于每个人指纹纹路在图像、断点和交叉点上各不相同,具有唯一性和稳定性。将指纹识别技术与基于量子密码的数字水印技术相融合进行身份认证,能够极大的提升身份认证的安全性。Through the above design scheme, the present invention can bring the following beneficial effects: the present invention proposes a terminal access authentication method based on quantum cryptography watermark, and the quantum secret communication system based on the quantum key distribution mechanism can generate a secure Key, which can be used in digital watermarking technology can effectively improve the security and robustness of watermarking algorithm. In addition, fingerprint identification technology is also one of the core technologies of information security. Instantly check the user's fingerprint and compare it with the pre-saved fingerprint to verify the real identity. The principle is that each person's fingerprint pattern is different in images, breakpoints and intersections, and has uniqueness and stability. Combining fingerprint identification technology with digital watermarking technology based on quantum cryptography for identity authentication can greatly improve the security of identity authentication.

附图说明Description of drawings

下面结合附图说明和具体实施方式对本发明作进一步说明:The present invention will be further described below in conjunction with accompanying drawing description and specific embodiment:

图1为本发明基于量子密码水印的终端接入认证方法的实施示意图;Fig. 1 is the implementation schematic diagram of the terminal access authentication method based on the quantum cryptography watermark of the present invention;

图2为本发明基于量子密码水印的终端接入认证方法的工作流程图;Fig. 2 is the work flowchart of the terminal access authentication method based on quantum cryptography watermark of the present invention;

图3为本发明中认证接入终端与认证终端建立连接时序图;FIG. 3 is a sequence diagram of establishing a connection between an authentication access terminal and an authentication terminal in the present invention;

图4为本发明的量子密码结构图。Fig. 4 is a structural diagram of the quantum cryptography of the present invention.

具体实施方式Detailed ways

为使本发明的目的、技术方案和优点更加清楚明白,下面结合具体实施例,并参照附图,对本发明作进一步的详细说明,本发明中使用的“第一”及“第二”并不表示任何顺序、数量或者重要性,而只是用来区分不同的组成部分。In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings. The "first" and "second" used in the present invention are not Indicates any order, quantity, or importance and is used only to distinguish different components.

参照图1所示,本发明提出的基于量子密码水印的终端接入认证方法采用的系统包含:量子密码生成网络、Alice发送端量子密码处理网关、Bob接收端量子密码处理网关、认证接入终端及认证终端,其中图中代表通信关系的虚线连接为量子信道,实线连接为经典信道。Referring to Fig. 1, the system adopted by the terminal access authentication method based on quantum cryptography watermark proposed by the present invention includes: quantum cryptography generation network, quantum cryptography processing gateway at Alice's sending end, quantum cryptography processing gateway at Bob's receiving end, and authentication access terminal And the authentication terminal, where the dotted line connection in the figure representing the communication relationship is a quantum channel, and the solid line connection is a classical channel.

量子密码生成网络:量子密码生成网络组成部分为图1中虚线连接部分,其中一个量子密码生成网络仅有一个Bob接收端,但可有多个Alice发送端。Bob接收端与量子密码生成网络中的每个Alice发送端可按照BB84协议生成无条件可靠的量子密码。Quantum cryptography generation network: The components of the quantum cryptography generation network are the parts connected by dotted lines in Figure 1. A quantum cryptography generation network has only one Bob receiving end, but can have multiple Alice sending ends. Bob's receiver and each Alice sender in the quantum cryptography generation network can generate unconditionally reliable quantum cryptography according to the BB84 protocol.

Alice发送端量子密码处理网关:主要有量子密码分控管理模块和第一量子密码处理模块,其中量子密码分控管理模块的主要作用是向量子密码生成网络申请量子密码、保存管理经由量子密码生成网络生成的量子密码和响应认证接入终端的量子密码请求。第一量子密码处理模块具有将量子密码转换为二值图并置乱生成量子数字水印,同时发送给认证接入终端的功能。Alice sending end quantum cryptography processing gateway: mainly includes quantum cryptography sub-control management module and first quantum cryptography processing module, among which the main function of quantum cryptography sub-control management module is to apply quantum cryptography to quantum cryptography generation network, save and manage via quantum cryptography generation Quantum cryptography generated by the network and responding to quantum cryptography requests for authenticating access terminals. The first quantum cryptography processing module has the function of converting the quantum cryptography into a binary image and scrambling to generate a quantum digital watermark, and sending it to the authentication access terminal at the same time.

Bob接收端量子密码处理网关:主要有量子密码主控管理模块、第二量子密码处理模块和量子数字水印认证模块,量子密码主控管理模块有响应各个Alice发送端量子密码处理网关的申请量子密码请求、分别保存、管理及分发给量子密码生成网络中对应Alice发送端的量子密码和响应认证终端的申请量子密码请求三个功能。第二量子密码处理模块具有将量子密码转换为二值图并置乱生成量子数字水印,量子数字水印认证模块的功能为向认证终端发送量子数字水印位置信息,接收由第二量子密码处理模块生成的量子数字水印,接收认证终端发送的量子数字水印,比对量子数字水印和向认证终端发送量子数字水印比对结果。Quantum cryptography processing gateway at the receiving end of Bob: mainly includes a quantum cryptography main control management module, a second quantum cryptography processing module and a quantum digital watermark authentication module. There are three functions of requesting, storing, managing and distributing to the quantum cryptography corresponding to Alice’s sending end in the quantum cryptography generation network and responding to the application quantum cryptography request of the authentication terminal. The second quantum cryptography processing module has the function of converting the quantum cryptography into a binary image and scrambling to generate a quantum digital watermark. The function of the quantum digital watermark authentication module is to send the position information of the quantum digital watermark to the authentication terminal, and receive the information generated by the second quantum cryptography processing module. Quantum digital watermarking, receiving the quantum digital watermark sent by the authentication terminal, comparing the quantum digital watermark and sending the quantum digital watermark comparison result to the authentication terminal.

认证接入终端:主要有指纹图像生成模块和认证接入模块。其中,指纹图像生成模块可检录用户指纹并将其转换成指纹图像。而认证接入模块具有向Alice发送端量子密码处理网关申请量子密码、将量子数字水印嵌入到指纹图像生成认证指纹图像、向认证终端发送认证指纹图像、接入请求和认证终端建立连接等功能。Authentication access terminal: mainly includes fingerprint image generation module and authentication access module. Wherein, the fingerprint image generation module can check the user's fingerprint and convert it into a fingerprint image. The authentication access module has the functions of applying quantum cryptography to the quantum cryptography processing gateway at Alice's sending end, embedding quantum digital watermarks into fingerprint images to generate authentication fingerprint images, sending authentication fingerprint images to authentication terminals, accessing requests and establishing connections with authentication terminals.

认证终端:认证终端的认证中心模块具有接收认证接入终端的接入请求,接收Bob接收端量子密码处理网关发送的量子数字水印位置信息,将认证指纹图像分解为量子数字水印与指纹图像,调取本地预先保存的指纹图像并与接收的指纹图像进行比对,向Bob接收端量子密码处理网关发送量子数字水印以及接收Bob端量子密码处理网关发送的量子数字水印比对结果,对认证接入终端的接入请求进行决策和回复等功能。Authentication terminal: the authentication center module of the authentication terminal has the ability to receive the access request of the authentication access terminal, receive the quantum digital watermark position information sent by the quantum cryptography processing gateway at Bob's receiving end, decompose the authentication fingerprint image into quantum digital watermark and fingerprint image, and adjust Take the local pre-saved fingerprint image and compare it with the received fingerprint image, send the quantum digital watermark to the quantum cryptography processing gateway at Bob’s receiving end and receive the comparison result of the quantum digital watermark sent by the quantum cryptography processing gateway at Bob’s end, and verify the authentication access The access request of the terminal performs functions such as decision-making and reply.

本发明提出的基于量子密码水印的终端接入认证方法,具体包括如下步骤:The terminal access authentication method based on the quantum cryptography watermark proposed by the present invention specifically includes the following steps:

1)认证接入终端检录用户指纹,并生成具有指纹信息的指纹图像;1) The authentication access terminal checks the user's fingerprint and generates a fingerprint image with fingerprint information;

2)认证接入终端向Alice发送端量子密码处理网关发送申请量子密码请求;2) The authentication access terminal sends a request for applying quantum cryptography to the quantum cryptography processing gateway at the sending end of Alice;

3)Alice发送端量子密码处理网关响应认证接入终端向其发送的申请量子密码请求,同时对量子密码进行二值化转换形成量子数字水印发送给认证接入终端;3) The quantum cryptography processing gateway at the sending end of Alice responds to the application quantum cryptography request sent by the authentication access terminal, and at the same time performs binary conversion on the quantum cryptography to form a quantum digital watermark and sends it to the authentication access terminal;

4)认证接入终端接收Alice发送端量子密码处理网关向其发送的量子数字水印,并将该量子数字水印嵌入到步骤1)中所述指纹图像中生成认证指纹图像;4) The authentication access terminal receives the quantum digital watermark sent to Alice by the quantum cryptography processing gateway, and embeds the quantum digital watermark into the fingerprint image described in step 1) to generate an authentication fingerprint image;

5)认证接入终端将步骤4)中所述的认证指纹图像发送至认证终端,作为认证接入终端接入认证终端的接入请求;5) The authentication access terminal sends the authentication fingerprint image described in step 4) to the authentication terminal as an access request for the authentication access terminal to access the authentication terminal;

6)认证终端接收认证接入终端向其发送的认证指纹图像,并将认证指纹图像分解为量子数字水印与指纹图像,调取本地预先保存的指纹图像与分解认证指纹图像得到的指纹图像进行比对,比对成功后,认证终端向Bob接收端量子密码处理网关发送分解认证指纹图像得到的量子数字水印;6) The authentication terminal receives the authentication fingerprint image sent by the authentication access terminal, and decomposes the authentication fingerprint image into a quantum digital watermark and a fingerprint image, and compares the fingerprint image obtained by calling the local pre-saved fingerprint image with the fingerprint image obtained by decomposing the authentication fingerprint image. Yes, after the comparison is successful, the authentication terminal sends the quantum digital watermark obtained by decomposing the authentication fingerprint image to the quantum cryptography processing gateway at the receiving end of Bob;

7)Bob接收端量子密码处理网关接收认证终端向其发送的量子数字水印,与其内部的量子数字水印进行比对;7) The quantum cryptography processing gateway at the receiving end of Bob receives the quantum digital watermark sent by the authentication terminal, and compares it with the internal quantum digital watermark;

8)Bob接收端量子密码处理网关将量子数字水印比对结果反馈给认证终端,比对成功,认证终端接受认证接入终端接入请求,比对失败,认证终端拒绝接受认证接入终端接入请求。8) The quantum cryptography processing gateway at the receiving end of Bob feeds back the comparison result of the quantum digital watermark to the authentication terminal. If the comparison is successful, the authentication terminal accepts the access request of the authentication access terminal. If the comparison fails, the authentication terminal refuses to accept the access of the authentication access terminal. ask.

本发明基于量子密码水印的终端接入认证方法的工作流程图,如图2所示,具体流程步骤如下:The working flow chart of the terminal access authentication method based on the quantum cryptography watermark of the present invention is shown in Figure 2, and the specific process steps are as follows:

1)认证接入终端检录用户指纹,通过指纹图像生成模块生成具有指纹信息的指纹图像,并唤醒认证接入模块;1) The authentication access terminal checks the user's fingerprint, generates a fingerprint image with fingerprint information through the fingerprint image generation module, and wakes up the authentication access module;

2)认证接入终端的认证接入模块向Alice发送端量子密码处理网关的量子密码分控管理模块申请量子密码作为量子数字水印,嵌入到指纹图像中,生成认证指纹图像;2) The authentication access module of the authentication access terminal applies for the quantum cryptography as a quantum digital watermark to the quantum cryptography sub-control management module of the quantum cryptography processing gateway at the sending end of Alice, and embeds it in the fingerprint image to generate the authentication fingerprint image;

3)认证接入模块将认证指纹图像通过经典信道发送至认证终端的认证中心模块,认证中心模块将认证指纹图像分解为量子数字水印与指纹图像;3) The authentication access module sends the authentication fingerprint image to the authentication center module of the authentication terminal through the classic channel, and the authentication center module decomposes the authentication fingerprint image into quantum digital watermark and fingerprint image;

4)量子数字水印与指纹图像均比对成功,认证中心模块则接受认证接入终端接入请求。比对失败,则拒绝认证接入终端的接入请求。4) The comparison between the quantum digital watermark and the fingerprint image is successful, and the authentication center module accepts the access request of the authentication access terminal. If the comparison fails, the access request of the authenticated access terminal is rejected.

图3示出认证接入终端与认证终端建立连接时序图,具体流程步骤如下:Figure 3 shows a sequence diagram of establishing a connection between an authentication access terminal and an authentication terminal, and the specific process steps are as follows:

1)指纹图像唤醒认证接入终端的认证接入模块;1) The fingerprint image wakes up the authentication access module of the authentication access terminal;

2)认证接入终端的认证接入模块向Alice发送端量子密码处理网关的量子密码分控管理模块发送量子密码申请;2) The authentication access module of the authentication access terminal sends a quantum cryptography application to the quantum cryptography sub-control management module of the Alice sending end quantum cryptography processing gateway;

3)Alice发送端量子密码处理网关的量子密码分控管理模块将量子密码作为量子数字水印置乱后与量子数字水印嵌入位置信息一起发送给认证接入终端;3) The quantum cryptography sub-control management module of the quantum cryptography processing gateway at the sending end of Alice scrambles the quantum cryptography as a quantum digital watermark and sends it to the authentication access terminal together with the embedding position information of the quantum digital watermark;

4)认证接入终端将量子数字水印嵌入到指纹图像后,生成认证指纹图像;4) After the authentication access terminal embeds the quantum digital watermark into the fingerprint image, an authentication fingerprint image is generated;

5)认证接入终端发送认证指纹图像,向认证终端提交建立连接申请;5) The authentication access terminal sends the authentication fingerprint image, and submits an application for establishing a connection to the authentication terminal;

6)认证终端接收到认证指纹图像后,利用Bob接收端量子密码处理网关发送的量子密码嵌入位置信息将认证指纹图像分解为指纹图像与量子数字水印;6) After the authentication terminal receives the authentication fingerprint image, it decomposes the authentication fingerprint image into a fingerprint image and a quantum digital watermark by using the quantum cryptography embedding position information sent by the quantum cryptography processing gateway at Bob's receiving end;

7)认证终端对指纹图像进行比对成功后,将量子数字水印发送给Bob接收端量子密码处理网关;7) After the authentication terminal successfully compares the fingerprint image, it sends the quantum digital watermark to the quantum cryptography processing gateway at the receiving end of Bob;

8)Bob接收端量子密码处理网关的量子密码主控管理模块将量子数字水印比对结果信息反馈给认证终端;8) The quantum cryptography main control management module of the quantum cryptography processing gateway at Bob's receiving end feeds back the quantum digital watermark comparison result information to the authentication terminal;

9)若量子数字水印比对结果信息为成功,则建立连接;若结果为失败,则拒绝建立连接请求。9) If the quantum digital watermark comparison result information is successful, establish a connection; if the result is failure, reject the connection establishment request.

基于量子密码水印的终端接入认证方法的量子密码结构图,如图4所示,具体说明如下:The quantum cryptography structure diagram of the terminal access authentication method based on the quantum cryptography watermark is shown in Figure 4, and the specific description is as follows:

1)一份被用于验证的量子密码应有n×(m+1)位字符,共分为n个部分,每部分(m+1)位字符;1) A quantum cipher used for verification should have n×(m+1) characters, divided into n parts, each part (m+1) characters;

2)每部分的前m位字符作为量子数字水印嵌入位置信息,第(m+1)位字符作为生成量子数字水印的像素值;2) The first m characters of each part are used as quantum digital watermark embedding position information, and the (m+1)th character is used as the pixel value for generating quantum digital watermark;

3)综上,一份(n×m+n)位字符的量子密码可生成一张具有n个像素点的量子数字水印,且每个像素点都有其对应的m位字符量子密码作为其嵌入指纹图像的位置信息。3) To sum up, a quantum cipher of (n×m+n) characters can generate a quantum digital watermark with n pixels, and each pixel has its corresponding m-character quantum cipher as its The location information embedded in the fingerprint image.

Claims (2)

1.基于量子密码水印的终端接入认证方法,其特征在于,该方法采用的系统包含:量子密码生成网络、Alice发送端量子密码处理网关、Bob接收端量子密码处理网关、认证接入终端及认证终端,1. A terminal access authentication method based on quantum cryptography watermarking, characterized in that the system used in the method includes: quantum cryptography generation network, quantum cryptography processing gateway at Alice’s sending end, quantum cryptography processing gateway at Bob’s receiving end, authentication access terminal and authentication terminal, 所述Alice发送端量子密码处理网关包含量子密码分控管理模块和第一量子密码处理模块,其中量子密码分控管理模块用于向量子密码生成网络申请量子密码,并对获取的量子密码进行保存及管理,同时量子密码分控管理模块还用于响应认证接入终端的申请量子密码请求;第一量子密码处理模块用于将量子密码转换为二值图并置乱生成量子数字水印,同时发送给认证接入终端;The quantum cryptography processing gateway at the Alice sending end includes a quantum cryptography sub-control management module and a first quantum cryptography processing module, wherein the quantum cryptography sub-control management module is used to apply for a quantum cryptography to the quantum cryptography generation network, and save the obtained quantum cryptography At the same time, the quantum cryptography sub-control management module is also used to respond to the application quantum cryptography request of the authentication access terminal; the first quantum cryptography processing module is used to convert the quantum cryptography into a binary image and scramble to generate a quantum digital watermark, and send To authenticate the access terminal; 所述Bob接收端量子密码处理网关包含量子密码主控管理模块、第二量子密码处理模块及量子数字水印认证模块,其中量子密码主控管理模块用于响应各个Alice发送端量子密码处理网关的申请量子密码请求,量子密码主控管理模块还用于保存、管理和分发给量子密码生成网络中对应Alice发送端的量子密码,响应认证终端的申请量子密码请求;第二量子密码处理模块用于将量子密码转换为二值图并置乱生成量子数字水印;量子数字水印认证模块用于向认证终端发送量子数字水印位置信息,量子数字水印认证模块还用于接收由第二量子密码处理模块生成的量子数字水印及接收认证终端发送的量子数字水印,并进行量子数字水印比对,向认证终端发送量子数字水印比对结果;The quantum cryptography processing gateway at the receiving end of Bob includes a quantum cryptography main control management module, a second quantum cryptography processing module and a quantum digital watermark authentication module, wherein the quantum cryptography main control management module is used to respond to the application of each Alice sending end quantum cryptography processing gateway Quantum password request, the quantum password master control management module is also used to save, manage and distribute to the quantum password corresponding to Alice’s sending end in the quantum password generation network, and respond to the application quantum password request of the authentication terminal; the second quantum password processing module is used for quantum password The password is converted into a binary image and scrambled to generate a quantum digital watermark; the quantum digital watermark authentication module is used to send the quantum digital watermark position information to the authentication terminal, and the quantum digital watermark authentication module is also used to receive the quantum digital watermark generated by the second quantum cryptography processing module Digital watermark and receive the quantum digital watermark sent by the authentication terminal, perform quantum digital watermark comparison, and send the quantum digital watermark comparison result to the authentication terminal; 所述认证接入终端包括指纹图像生成模块和认证接入模块,指纹图像生成模块用于检录用户指纹并将其转换成指纹图像;认证接入模块用于向Alice发送端量子密码处理网关申请量子密码、将量子数字水印嵌入到指纹图像生成认证指纹图像、向认证终端发送认证指纹图像、接入请求和认证终端建立数据连接;The authentication access terminal includes a fingerprint image generation module and an authentication access module, and the fingerprint image generation module is used to check and record user fingerprints and convert it into a fingerprint image; the authentication access module is used to apply for a quantum cryptography processing gateway to Alice's sending end. Password, embedding the quantum digital watermark into the fingerprint image to generate the authentication fingerprint image, sending the authentication fingerprint image to the authentication terminal, accessing the request and establishing a data connection with the authentication terminal; 所述认证终端的认证中心模块用于接收认证接入终端的接入请求,接收Bob接收端量子密码处理网关发送的量子数字水印定位信息,将认证指纹图像分解为量子数字水印与指纹图像,调取本地保存的指纹图像并与接收的指纹图像进行比对,向Bob接收端量子密码处理网关发送量子数字水印以及接收Bob接收端量子密码处理网关发送的量子数字水印比对结果,对认证接入终端的接入请求进行决策和回复,The authentication center module of the authentication terminal is used to receive the access request of the authentication access terminal, receive the quantum digital watermark positioning information sent by the quantum cryptography processing gateway at Bob's receiving end, decompose the authentication fingerprint image into quantum digital watermark and fingerprint image, and adjust Take the fingerprint image stored locally and compare it with the received fingerprint image, send the quantum digital watermark to the quantum cryptography processing gateway at the receiving end of Bob and receive the comparison result of the quantum digital watermark sent by the quantum cryptography processing gateway at the receiving end of Bob, and verify the authentication access terminal access request for decision-making and reply, 具体包括如下步骤:Specifically include the following steps: 1)认证接入终端检录用户指纹,并生成具有指纹信息的指纹图像;1) The authentication access terminal checks the user's fingerprint and generates a fingerprint image with fingerprint information; 2)认证接入终端向Alice发送端量子密码处理网关发送申请量子密码请求;2) The authentication access terminal sends a request for applying quantum cryptography to the quantum cryptography processing gateway at the sending end of Alice; 3)Alice发送端量子密码处理网关响应认证接入终端向其发送的申请量子密码请求,同时对量子密码进行二值化转换形成量子数字水印发送给认证接入终端;3) The quantum cryptography processing gateway at the sending end of Alice responds to the application quantum cryptography request sent by the authentication access terminal, and at the same time performs binary conversion on the quantum cryptography to form a quantum digital watermark and sends it to the authentication access terminal; 4)认证接入终端接收Alice发送端量子密码处理网关向其发送的量子数字水印,并将该量子数字水印嵌入到步骤1)中所述指纹图像中生成认证指纹图像;4) The authentication access terminal receives the quantum digital watermark sent to Alice by the quantum cryptography processing gateway, and embeds the quantum digital watermark into the fingerprint image described in step 1) to generate an authentication fingerprint image; 5)认证接入终端将步骤4)中所述的认证指纹图像发送至认证终端,作为认证接入终端接入认证终端的接入请求;5) The authentication access terminal sends the authentication fingerprint image described in step 4) to the authentication terminal as an access request for the authentication access terminal to access the authentication terminal; 6)认证终端接收认证接入终端向其发送的认证指纹图像,并将认证指纹图像分解为量子数字水印与指纹图像,调取本地预先保存的指纹图像与分解认证指纹图像得到的指纹图像进行比对,比对成功后,认证终端向Bob接收端量子密码处理网关发送分解认证指纹图像得到的量子数字水印;6) The authentication terminal receives the authentication fingerprint image sent by the authentication access terminal, and decomposes the authentication fingerprint image into a quantum digital watermark and a fingerprint image, and compares the fingerprint image obtained by calling the local pre-saved fingerprint image with the fingerprint image obtained by decomposing the authentication fingerprint image. Yes, after the comparison is successful, the authentication terminal sends the quantum digital watermark obtained by decomposing the authentication fingerprint image to the quantum cryptography processing gateway at the receiving end of Bob; 7)Bob接收端量子密码处理网关接收认证终端向其发送的量子数字水印,与其内部的量子数字水印进行比对;7) The quantum cryptography processing gateway at the receiving end of Bob receives the quantum digital watermark sent by the authentication terminal, and compares it with the internal quantum digital watermark; 8)Bob接收端量子密码处理网关将量子数字水印比对结果反馈给认证终端,比对成功,认证终端接受认证接入终端接入请求,比对失败,认证终端拒绝接受认证接入终端接入请求。8) The quantum cryptography processing gateway at the receiving end of Bob feeds back the comparison result of the quantum digital watermark to the authentication terminal. If the comparison is successful, the authentication terminal accepts the access request of the authentication access terminal. If the comparison fails, the authentication terminal refuses to accept the access of the authentication access terminal. ask. 2.根据权利要求1所述的基于量子密码水印的终端接入认证方法,其特征在于:所述量子密码生成网络包含一个Bob接收端和至少一个Alice发送端,量子密码生成网络中的Bob接收端与量子密码生成网络中的各个Alice发送端之间按照BB84协议生成量子密码。2. The terminal access authentication method based on quantum cryptography watermark according to claim 1, characterized in that: said quantum cryptography generation network comprises a Bob receiving end and at least one Alice sending end, and Bob in the quantum cryptography generation network receives Quantum cryptography is generated according to the BB84 protocol between the end and each Alice sending end in the quantum cryptography generation network.
CN201810754331.2A 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark Active CN108810016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810754331.2A CN108810016B (en) 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810754331.2A CN108810016B (en) 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark

Publications (2)

Publication Number Publication Date
CN108810016A true CN108810016A (en) 2018-11-13
CN108810016B CN108810016B (en) 2020-08-28

Family

ID=64074827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810754331.2A Active CN108810016B (en) 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark

Country Status (1)

Country Link
CN (1) CN108810016B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995785A (en) * 2019-04-04 2019-07-09 长春大学 File security unlocking method in local area network based on quantum cryptography

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009047833A1 (en) * 2007-10-09 2009-04-16 C4 Technology, Inc. Electronic watermark embedding method, electronic watermark embedding apparatus, program, and computer-readable recording medium
CN102750529A (en) * 2012-07-24 2012-10-24 南京邮电大学 Biometric fingerprint authentication method based on quantum fuzzy commitment
CN103366334A (en) * 2013-07-10 2013-10-23 北京工业大学 Quantum watermark authentication method based on quantum discrete cosine transform (QDCT)
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for adding real-time file dynamic tags and encryption online
CN107257283A (en) * 2017-04-26 2017-10-17 中南大学 Fingerprint verification method based on quantum figure state

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009047833A1 (en) * 2007-10-09 2009-04-16 C4 Technology, Inc. Electronic watermark embedding method, electronic watermark embedding apparatus, program, and computer-readable recording medium
CN102750529A (en) * 2012-07-24 2012-10-24 南京邮电大学 Biometric fingerprint authentication method based on quantum fuzzy commitment
CN103366334A (en) * 2013-07-10 2013-10-23 北京工业大学 Quantum watermark authentication method based on quantum discrete cosine transform (QDCT)
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for adding real-time file dynamic tags and encryption online
CN107257283A (en) * 2017-04-26 2017-10-17 中南大学 Fingerprint verification method based on quantum figure state

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995785A (en) * 2019-04-04 2019-07-09 长春大学 File security unlocking method in local area network based on quantum cryptography
CN109995785B (en) * 2019-04-04 2021-02-09 长春大学 Quantum password-based method for safely unlocking files in local area network

Also Published As

Publication number Publication date
CN108810016B (en) 2020-08-28

Similar Documents

Publication Publication Date Title
JP2011125020A (en) System and method for designing secure client-server communication based on certificateless public key infrastructure
CN109547198B (en) System for network transmission video file
US10887110B2 (en) Method for digital signing with multiple devices operating multiparty computation with a split key
Bi et al. Internet of things assisted public security management platform for urban transportation using hybridised cryptographic‐integrated steganography
Malik et al. Novel authentication system using visual cryptography
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN110505055B (en) External network access identity authentication method and system based on asymmetric key pool pair and key fob
CN113826096A (en) User authentication and signature device and method using user biometric identification data
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
CN110535626A (en) The quantum communications service station secret communication method and system of identity-based
CN114760047A (en) Quantum key management method, device and system
TWI476629B (en) Data security and security systems and methods
CN111541652B (en) System for improving security of secret information keeping and transmission
CN112243233A (en) A CTID verification method and device based on Bluetooth low energy protocol
CN110519222B (en) External network access identity authentication method and system based on disposable asymmetric key pair and key fob
CN114401087B (en) Passive lock identity authentication and key agreement system based on state cryptographic algorithm
CN108810016B (en) Terminal access authentication method based on quantum cipher watermark
CN116743713B (en) Remote online paperless conference method and device based on Internet of things
CN115580415B (en) Data interaction authentication method, device and system in block chain
CN106375327A (en) A Proxy Key Confusion Electronic Voting System and Method Against Malicious Attacks
CN114186998B (en) Block chain-based privacy communication method
CN110266483A (en) Based on unsymmetrical key pond to and the quantum communications service station cryptographic key negotiation method of QKD, system, equipment
CN115412236A (en) Method for key management and password calculation, encryption method and device
Abduljabbar et al. Robust scheme to protect authentication code of message/image documents in cloud computing
CN114244509A (en) Method for carrying out SM2 one-time pad bidirectional authentication unlocking by using mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant