CN108898708B - Intelligent access control system based on quantum invisible state transfer and wireless local area network - Google Patents

Intelligent access control system based on quantum invisible state transfer and wireless local area network Download PDF

Info

Publication number
CN108898708B
CN108898708B CN201810639944.1A CN201810639944A CN108898708B CN 108898708 B CN108898708 B CN 108898708B CN 201810639944 A CN201810639944 A CN 201810639944A CN 108898708 B CN108898708 B CN 108898708B
Authority
CN
China
Prior art keywords
intelligent
access control
terminal
message
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810639944.1A
Other languages
Chinese (zh)
Other versions
CN108898708A (en
Inventor
蔡小琳
张利伟
余伟阳
李晓华
刘玉金
王平
杨晨
王可
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University of Technology
Original Assignee
Henan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Technology filed Critical Henan University of Technology
Priority to CN201810639944.1A priority Critical patent/CN108898708B/en
Publication of CN108898708A publication Critical patent/CN108898708A/en
Application granted granted Critical
Publication of CN108898708B publication Critical patent/CN108898708B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information

Abstract

The invention discloses an intelligent access control system based on quantum invisible state transfer and a wireless local area network. The intelligent key terminal obtains equipment number information corresponding to an intelligent access control terminal which can be controlled by the intelligent key terminal in a wireless local area network by finding a secret key, and stores all the obtained equipment number information in an online intelligent access control terminal equipment list of the intelligent key terminal; then, on the basis of obtaining the controllable intelligent access control terminal list, access control state setting is further carried out through a quantum key, the fact that the transmitted key cannot be stolen by other people is guaranteed based on a quantum communication mode, and the safety performance of the wireless local area network intelligent access control system is improved.

Description

Intelligent access control system based on quantum invisible state transfer and wireless local area network
Technical Field
The invention discloses an intelligent access control system based on quantum invisible state transfer and a wireless local area network, and belongs to the field of intelligent control of the Internet of things.
Background
In a wireless intelligent access control system, a certain potential safety hazard exists when the access control state is modified by a classical secret key; the encryption algorithm adopted by the method mainly depends on the secret key to realize data protection, and once the secret key is intercepted and captured in the distribution process, the safety of the wireless intelligent access control system cannot be guaranteed. In order to further improve the safety of the intelligent access control system based on the wireless local area network, the invention provides the intelligent access control system based on the quantum invisible transmission state and the wireless local area network, the transmitted secret key cannot be stolen by other people based on a quantum communication mode, and the safety performance of the intelligent access control system based on the wireless local area network is improved.
Disclosure of Invention
The intelligent access control system based on the quantum invisible state transfer and the wireless local area network comprises an intelligent key terminal, a WIFI wireless router and an intelligent access control terminal, wherein the intelligent key terminal realizes intelligent control on the intelligent access control terminal through the WIFI wireless router, the intelligent key terminal and the WIFI wireless router are connected in a bidirectional mode, the WIFI wireless router and the intelligent access control terminal are connected in a bidirectional mode, and the intelligent access control terminal can control the opening and closing of a door lock according to an obtained instruction of the intelligent key terminal; as shown in figure 1 in detail; preferably, the WIFI wireless router uses a TP-LINK wireless router; the intelligent key terminal comprises a memory, a quantum memory, a memory management module and a control module, wherein the memory in the intelligent key terminal is divided into a classical memory and a quantum memory; the classical memory stores classical bit data, and the quantum memory stores particles obtained through preparation.
The WIFI wireless router establishes a wireless local area network of the WIFI wireless router, and sets a corresponding access password which is expressed by PS; the intelligent key terminal is added into a wireless local area network established by the WIFI wireless router; the intelligent access control terminal uses the password PS to join the wireless local area network established by the WIFI wireless router. Each intelligent access control terminal has a unique equipment number.
The message types used in the communication of all the components of the intelligent access control system based on the quantum invisible state and the wireless local area network are as follows: the access control terminal finds the message, responds to the message, sets up the response message of the entrance guard state, the message format is seen in table 1, table 2, table 3 and table 4; the access control terminal discovery message is composed of a message type field and a discovery secret key field, the access control terminal response message is composed of a message type field, an equipment number field and a discovery secret key field, the access control state setting message is composed of a message type field, an equipment number field, a quantum number field, an encryption quantum key field and an access control state field, and the access control state setting response message is composed of a message type field, an equipment number field, a quantum number field and an encryption quantum key field.
Figure 100002_DEST_PATH_IMAGE001
Figure 100002_DEST_PATH_IMAGE002
Figure 100002_DEST_PATH_IMAGE003
Figure 100002_DEST_PATH_IMAGE004
Figure 100002_DEST_PATH_IMAGE005
The online intelligent access control terminal device table is shown in table 5, and comprises 1 field of device number, which is stored in the classic memory of the intelligent key terminal; the intelligent key terminal obtains equipment number information corresponding to an intelligent access control terminal which can be controlled by the intelligent key terminal in a wireless local area network by finding a secret key, and stores all the obtained equipment number information in an online intelligent access control terminal equipment list of the intelligent key terminal; then, on the basis of obtaining the controllable intelligent access control terminal list, further setting the access control state through a quantum key; the first-level authorization authentication completed by the key is found to provide the device list information of the controllable intelligent access control terminal for people, if the intelligent key terminal finds that the access control device needing to be set in a state is not in the list, the authentication of the second step is not needed to be carried out by using the quantum key, so that the consumption of entangled particles can be effectively saved, and the specific steps are as follows:
step 1, pre-storing a same discovery key CKEY in a classic memory of an intelligent key terminal and all intelligent access control terminals controlled by the intelligent key terminal, and emptying an online intelligent access control terminal equipment list of the intelligent key terminal;
step 2, the intelligent key terminal takes out the found key from the classic memory and uses CKEY1 to represent the found key; the intelligent key terminal sends an access control terminal discovery message to a wireless local area network where the intelligent key terminal is located in a broadcasting mode, the numerical value of the message type in the message is 0x01, and the numerical value of a discovery key field is set to be CKEY 1;
step 3, after receiving the broadcast message, the intelligent access control terminal analyzes the received message according to the message format to analyze the content of each field of the message;
step 4, if the value of the message type obtained by analyzing the message by the intelligent access control terminal is 0x01, the message is a message discovered by the access control terminal; assuming that the value of the discovery key field obtained by analysis is represented by CKEY2, taking the discovery key stored in advance from the classic memory of the intelligent access control terminal, and representing the discovery key by CKEY 3; if the CKEY2 is not equal to CKEY3, the intelligent access control terminal directly discards the message and does not perform subsequent processing; if CKEY2 is equal to CKEY3, then step 5 is performed;
step 5, the intelligent entrance guard terminal generates an entrance guard control terminal response message and sends the entrance guard control terminal response message to the intelligent key terminal; in the generated access control terminal response message, the value of the message type is 0X02, the value of the equipment number is the equipment number corresponding to the intelligent access control terminal, and the value of the found secret key is CEKY 3;
step 6, after receiving the message, the intelligent key terminal analyzes the message; if the message type field value obtained by the intelligent key terminal through analysis is 0x02, the message is represented as an access control terminal response message, the intelligent key terminal analyzes the message according to the access control terminal response message format aiming at the received response message, the device number field obtained through analysis is represented by DN, the discovered key field obtained through analysis is represented by CKEY4, and if CKEY4 is equal to CKEY1, the device number DN is added into an online intelligent access control terminal device table of the intelligent key terminal; if CKEY4 is not equal to CKEY1, then the message is discarded.
If the intelligent key terminal needs to set the entrance guard state of the intelligent entrance guard terminal with the equipment number S, searching whether a record with the equipment number S exists in an online intelligent entrance guard terminal equipment table of the intelligent key terminal, and if the record does not exist, the intelligent key terminal cannot set the intelligent entrance guard terminal; if the intelligent entrance guard terminal S has the entrance guard state setting function, the entrance guard state setting is completed on the intelligent entrance guard terminal S through the entrance guard state setting message and the entrance guard state setting response message, and the specific steps of completing the entrance guard state setting on the intelligent entrance guard terminal S are as follows:
step 1, the intelligent key terminal prepares M quantum pairs in an entangled state for a certain intelligent entrance guard terminal S in advance, wherein the entangled state of the ith quantum pair is
Figure 100002_DEST_PATH_IMAGE006
And is and
Figure 100002_DEST_PATH_IMAGE007
(ii) a The first particle of each quantum pair is stored in a quantum storage space QS pre-allocated to the intelligent access control terminal S by the intelligent key terminal, each particle stored in the quantum storage space QS corresponds to a quantum serial number, the second particle of each quantum pair is allocated to the intelligent access control terminal S by the intelligent key terminal through an optical fiber, and the second particle of each quantum pair is stored in a quantum memory of the intelligent access control terminal S; assuming that a quantum KEY corresponding to the intelligent access control terminal S is set as KEY1, the quantum KEY KEY1 is pre-stored in a classic memory of the intelligent KEY terminal and the intelligent access control terminal S; assume that the quantum KEY1 is L1 bytes in length, and L1 equals 4;
step 2, the intelligent KEY terminal respectively prepares 8L1 corresponding particles aiming at 8L1 bits of data in total of the quantum KEY KEY1, and if the ith bit is 0, the quantum state of the prepared particles is
Figure 100002_DEST_PATH_IMAGE008
(ii) a If the ith bit is 1, the quantum state of the prepared particle is
Figure 100002_DEST_PATH_IMAGE009
(ii) a For preparing the obtained particles
Figure 100002_DEST_PATH_IMAGE010
It is shown that,
Figure 100002_DEST_PATH_IMAGE011
Figure 100002_DEST_PATH_IMAGE012
(ii) a Then
Figure 100002_DEST_PATH_IMAGE013
And is and
Figure 100002_DEST_PATH_IMAGE014
Figure 100002_DEST_PATH_IMAGE015
Figure 100002_DEST_PATH_IMAGE016
step 3, when the intelligent key terminal needs to set the entrance guard state of the intelligent entrance guard terminal S, assuming that the corresponding minimum available particle serial number of the intelligent entrance guard terminal S in the intelligent key terminal quantum storage space QS is N; the intelligent key terminal executes Bell measurement on 8L1 prepared particles and 8L1 particles with the corresponding serial numbers of N to N +8L1-1 of an intelligent access control terminal S in an intelligent key terminal quantum storage space QS, the measured result is packaged into an access control state setting message as the numerical value of an encrypted quantum key field and is sent to the wireless local area network in a broadcasting mode, the numerical value of a message type field in the message is set to be 0X03, the numerical value of an equipment number field is set to be S, the numerical value of a quantum sequence number field is N, and the access control state field is set according to the actual situation (the numerical value of the access control state field is 1 to indicate unlocking, the numerical value of the access control state field is 0 to indicate locking); deleting the particles with the quantum sequence numbers from N to N +8L1-1 in the QS; setting a timer T for the sent entrance guard state setting message, and starting the timer; if the intelligent key terminal does not receive the entrance guard state setting response message of the intelligent entrance guard terminal S before the timer T is overtime, executing the step 2 (the overtime of the timer T can be caused by the loss and late arrival of the entrance guard state setting message or the loss and late arrival of the entrance guard state setting response message); if the intelligent key terminal receives the entrance guard state setting response message of the intelligent entrance guard terminal S before the timer T is overtime, executing the step 4;
step 4, after receiving the broadcast message, the intelligent access control terminal S analyzes the message, if the message type field of the message is 0X03, the message is set for the access control state, a quantum sequence number field and an encrypted quantum key field are analyzed from the message, and the quantum sequence number field obtained by analysis is represented by N1; inquiring the minimum quantum serial number currently available for the intelligent access control terminal S, and expressing the minimum quantum serial number by using N2; if N1 is more than N2, the message received by the intelligent access control terminal S is a retransmitted access control state setting message, and then the step 5 is executed; if N1< N2, it indicates that the message is a late message and the message can be directly discarded without performing subsequent processing; if N1= N2, performing step 7;
step 5, deleting the Nth 2 th particle in a quantum memory of the intelligent access control terminal S, and executing step 6;
step 6, adding 1 to the value of N2, and if N2 is less than N1, repeatedly executing the step 5; if N2= N1, perform step 7;
step 7, dividing the 16L1 bits into 8L1 pairs in sequence by taking two bits as a unit for the encrypted quantum key field obtained by the analysis of the intelligent access control terminal S, wherein each pair comprises two bits; suppose that
Figure 691500DEST_PATH_IMAGE012
Step 8 is performed for each pair of bits;
step 8, if the value of the ith pair of bits is 00Then, corresponding unitary transformation is executed on N2+ i-1 particles stored in the intelligent entrance guard terminal S
Figure 100002_DEST_PATH_IMAGE017
Figure 100002_DEST_PATH_IMAGE018
(ii) a If the value of the N2+ i-1 pair bit is 01, corresponding unitary transformation is carried out on the N2+ i-1 particle stored in the intelligent access control terminal S
Figure 100002_DEST_PATH_IMAGE019
Figure DEST_PATH_IMAGE020
(ii) a If the value of the N2+ i-1 paired bit is 10, performing corresponding unitary transformation on the N2+ i-1 particles stored in the intelligent access control terminal S
Figure DEST_PATH_IMAGE021
Figure DEST_PATH_IMAGE022
(ii) a If the value of the ith pair of bits is 11, performing corresponding unitary transformation on the N2+ i-1 th particle stored in the intelligent access control terminal S
Figure DEST_PATH_IMAGE023
Figure DEST_PATH_IMAGE024
(ii) a In an intelligent access control terminal S, deleting the N2+ i-1 th particle;
step 9, sequentially following the basis vectors to each particle after transformation
Figure 419851DEST_PATH_IMAGE008
And
Figure 45391DEST_PATH_IMAGE009
carrying out the measurement with the result of
Figure 941672DEST_PATH_IMAGE008
Indicating that the corresponding bit is 0; the result of the measurement is
Figure 892311DEST_PATH_IMAGE009
Indicates that the corresponding bit is 1; finally, quantum KEY KEY2 with the length of L1 bytes can be obtained;
step 10, the intelligent access control terminal S takes out the quantum KEY KEY3 saved in advance from the classical memory, if KEY2= KEY3, the access control state is modified, and an access control state setting response message is returned to the intelligent KEY terminal and is used for reporting the access control state modification condition to the intelligent KEY terminal; the intelligent access control terminal S prepares 8L1 particles according to the data of the quantum KEY KEY3, and the preparation method is the same as the step 2; then, Bell measurement is carried out on the prepared 8L1 particles and 8L1 particles with the corresponding serial numbers of N2+8L1 to N2+16L1-1 in a quantum memory of the particle-based access control device, the measurement result is used as an encrypted quantum key field of an access control state setting response message, in the access control state setting response message, the message type field is 0X04, the equipment number field is S, and the quantum sequence number field is N2+8L 1;
step 11, after receiving the message, the intelligent key terminal analyzes the message, if the message type field of the message is 0X04, the message sets a response message for the access control state, an encrypted quantum key field and a quantum sequence number field are analyzed from the message, and the quantum sequence number field obtained by analysis is represented by N3; inquiring the minimum quantum serial number currently available for the intelligent key terminal, wherein the minimum quantum serial number is represented by N4; if N3< N4, it indicates that the acknowledgment message received by the key fob terminal is a late acknowledgment message, and the message can be directly discarded without performing subsequent processing; if N3= N4, performing step 12;
step 12, dividing the 16L1 bits into 8L1 pairs in sequence by taking two bits as a unit according to the encrypted quantum key field data obtained by the intelligent key terminal analysis, wherein each pair comprises two bits; suppose that
Figure 899450DEST_PATH_IMAGE012
Step 13 is performed for each pair of bits;
step 13, if the value of the ith pair of bits is 00, executing corresponding unitary transformation on N4+ i-1 particles stored in a quantum storage space QS of the intelligent key terminal
Figure 251934DEST_PATH_IMAGE017
Figure 319116DEST_PATH_IMAGE018
(ii) a If the value of the N4+ i-1 th pair of bits is 01, a corresponding unitary transformation is performed on the N4+ i-1 th particle held in the quantum storage space QS of the key fob terminal
Figure 884614DEST_PATH_IMAGE019
Figure 305231DEST_PATH_IMAGE020
(ii) a If the value of the N4+ i-1 th pair of bits is 10, a corresponding unitary transformation is performed on the N4+ i-1 th particle held in the quantum storage space QS of the key fob terminal
Figure 902434DEST_PATH_IMAGE021
Figure 140518DEST_PATH_IMAGE022
(ii) a If the value of the ith pair of bits is 11, a corresponding unitary transformation is performed on the (N4 + i-1) th particle held in the quantum storage space QS of the key fob terminal
Figure 65748DEST_PATH_IMAGE023
Figure 414690DEST_PATH_IMAGE024
(ii) a Deleting the (N4 + i-1) th particle in a quantum storage space QS of the intelligent key terminal;
step 14, sequentially following the basis vectors to each particle after transformation
Figure 603750DEST_PATH_IMAGE008
And
Figure 888101DEST_PATH_IMAGE009
carrying out the measurement with the result of
Figure 425262DEST_PATH_IMAGE008
Indicating that the corresponding bit is 0; the result of the measurement is
Figure 577894DEST_PATH_IMAGE009
Indicates that the corresponding bit is 1; finally, quantum KEY KEY5 with the length of L1 bytes can be obtained;
step 15, if the KEY5 is equal to the KEY1, the received quantum KEY is correct, and the intelligent KEY terminal successfully modifies the access state of the intelligent access terminal S; if the KEY5 is not equal to the KEY1, the received quantum KEY is incorrect, the message is directly discarded, and the access control state modification fails.
Drawings
Fig. 1 is a structure diagram of an intelligent access control system based on quantum invisible state and wireless local area network.
Detailed Description
The intelligent key terminal obtains equipment number information corresponding to an intelligent access control terminal which can be controlled by the intelligent key terminal in a wireless local area network by finding a secret key, and stores all the obtained equipment number information in an online intelligent access control terminal equipment list of the intelligent key terminal; then, on the basis of obtaining the controllable intelligent access control terminal list, further setting the access control state through a quantum key; the first-level authorization authentication completed by the found key can provide the device list information of the controllable intelligent access control terminal for people, and if the intelligent key terminal finds that the access control device needing state setting is not in the list, the quantum key is not needed to be used for the second-step authentication, so that the consumption of entangled particles can be effectively reduced.
If the intelligent key terminal needs to set the entrance guard state of the intelligent entrance guard terminal with the equipment number S, searching whether a record with the equipment number S exists in an online intelligent entrance guard terminal equipment table of the intelligent key terminal, and if the record does not exist, the intelligent key terminal cannot set the intelligent entrance guard terminal; and if so, completing entrance guard state setting on the intelligent entrance guard terminal S through the entrance guard state setting message and the entrance guard state setting response message.

Claims (3)

1. The intelligent access control system based on quantum invisible state transfer and the wireless local area network comprises an intelligent key terminal, a WIFI wireless router and an intelligent access control terminal, wherein the intelligent key terminal realizes intelligent control on the intelligent access control terminal through the WIFI wireless router, the intelligent key terminal and the WIFI wireless router are connected in a bidirectional mode, and the WIFI wireless router and the intelligent access control terminal are connected in a bidirectional mode; the intelligent key terminal comprises a memory, a quantum memory, a memory management module and a control module, wherein the memory in the intelligent key terminal is divided into a classical memory and a quantum memory; the classical memory stores classical bit data, and the quantum memory stores particles obtained through preparation; the message types used in the communication of all the components of the intelligent access control system based on the quantum invisible state and the wireless local area network are as follows: the access control terminal finds the message, the access control terminal responds the message, the access control state setting message and the access control state setting response message; the access control terminal discovery message is composed of a message type and a discovery secret key, the access control terminal response message is composed of a message type, an equipment number and a discovery secret key, the access control state setting message is composed of a message type, an equipment number, a quantum number, an encrypted quantum key and an access control state, and the access control state setting response message is composed of a message type, an equipment number, a quantum number and an encrypted quantum key; the intelligent access control system based on the quantum invisible state and the wireless local area network is characterized by comprising the following steps:
step 11, the WIFI wireless router establishes a wireless local area network of the WIFI wireless router, and sets a corresponding access password, wherein the password is represented by PS; the intelligent key terminal is added into a wireless local area network established by the WIFI wireless router; the intelligent access control terminal uses the password PS to add into a wireless local area network established by the WIFI wireless router; each intelligent access control terminal has a unique equipment number;
step 12, the intelligent key terminal obtains the equipment number information corresponding to the intelligent access control terminal which can be controlled by the intelligent key terminal in the wireless local area network by finding the secret key, and stores all the obtained equipment number information in an online intelligent access control terminal equipment list of the intelligent key terminal;
step 13, if the intelligent key terminal needs to set the entrance guard state of the intelligent entrance guard terminal with the equipment number S, searching whether a record with the equipment number S exists in an online intelligent entrance guard terminal equipment table of the intelligent key terminal, and if the record does not exist, the intelligent key terminal cannot set the intelligent entrance guard terminal; and if so, completing entrance guard state setting on the intelligent entrance guard terminal S through the entrance guard state setting message and the entrance guard state setting response message.
2. The intelligent access control system based on quantum invisible state and wireless local area network of claim 1, characterized in that in step 12, the following steps are mainly performed:
step 21, pre-storing a same discovery key CKEY in the intelligent key terminal and the classical memories of all intelligent access control terminals controlled by the intelligent key terminal, and emptying an online intelligent access control terminal equipment list of the intelligent key terminal;
step 22, the smart key terminal takes out the found key from its classic memory, represented by CKEY 1; the intelligent key terminal sends an access control terminal discovery message to a wireless local area network where the intelligent key terminal is located in a broadcasting mode, the numerical value of the message type in the message is 0x01, and the numerical value of a discovery key field is set to be CKEY 1;
step 23, after receiving the broadcast message, the intelligent access control terminal analyzes the received message according to the message format to analyze the content of each field of the message;
step 24, if the value of the message type obtained by analyzing the message by the intelligent access control terminal is 0x01, the message is a message discovered by the access control terminal; assuming that the value of the discovery key field obtained by analysis is represented by CKEY2, taking the discovery key stored in advance from the classic memory of the intelligent access control terminal, and representing the discovery key by CKEY 3; if the CKEY2 is not equal to CKEY3, the intelligent access control terminal directly discards the message and does not perform subsequent processing; if CKEY2 is equal to CKEY3, then step 25 is performed;
step 25, the intelligent access control terminal generates an access control terminal response message and sends the access control terminal response message to the intelligent key terminal; in the generated access control terminal response message, the value of the message type is 0X02, the value of the equipment number is the equipment number corresponding to the intelligent access control terminal, and the value of the found secret key is CEKY 3;
step 26, after receiving the message, the intelligent key terminal analyzes the message; if the message type field value obtained by the intelligent key terminal through analysis is 0x02, the message is represented as an access control terminal response message, the intelligent key terminal analyzes the message according to the access control terminal response message format aiming at the received response message, the device number field obtained through analysis is represented by DN, the discovered key field obtained through analysis is represented by CKEY4, and if CKEY4 is equal to CKEY1, the device number DN is added into an online intelligent access control terminal device table of the intelligent key terminal; if CKEY4 is not equal to CKEY1, then the message is discarded.
3. The intelligent access control system based on quantum invisible state and wireless local area network of claim 1, characterized in that in step 13, the following steps are mainly performed:
step 3A, the intelligent key terminal prepares M quantum pairs in an entangled state for a certain intelligent access control terminal S in advance, wherein the entangled state of the ith quantum pair is
Figure DEST_PATH_IMAGE001
And is and
Figure DEST_PATH_IMAGE002
(ii) a Wherein the first particle of each quantum pair is stored by the smart key terminal in a quantum storage space QS pre-allocated to the smart gate control terminal S, and the quantum storage space QS is stored inEach stored particle corresponds to a quantum serial number, the second particle of each quantum pair is distributed to the intelligent access control terminal S by the intelligent key terminal through optical fibers, and the intelligent access control terminal S stores the second particle in a quantum memory of the intelligent access control terminal S; assuming that a quantum KEY corresponding to the intelligent access control terminal S is set as KEY1, the quantum KEY KEY1 is pre-stored in a classic memory of the intelligent KEY terminal and the intelligent access control terminal S; assume that the quantum KEY1 is L1 bytes in length, and L1 equals 4;
step 3B, the intelligent KEY terminal respectively prepares 8L1 corresponding particles aiming at 8L1 bits of data in total of the quantum KEY KEY1, and if the ith bit is 0, the quantum state of the prepared particles is
Figure DEST_PATH_IMAGE003
(ii) a If the ith bit is 1, the quantum state of the prepared particle is
Figure DEST_PATH_IMAGE004
(ii) a For preparing the obtained particles
Figure DEST_PATH_IMAGE005
It is shown that,
Figure DEST_PATH_IMAGE006
Figure DEST_PATH_IMAGE007
(ii) a Then
Figure DEST_PATH_IMAGE008
And is and
Figure DEST_PATH_IMAGE009
Figure DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE011
step 3C, when the intelligent key terminal needs to set the entrance guard state of the intelligent entrance guard terminal S, assuming that the corresponding minimum available particle serial number of the intelligent entrance guard terminal S in the intelligent key terminal quantum storage space QS is N; the intelligent key terminal executes Bell measurement on 8L1 prepared particles and 8L1 particles with the corresponding serial numbers of N to N +8L1-1 of an intelligent access control terminal S in an intelligent key terminal quantum storage space QS, the measured result is packaged into an access control state setting message as the numerical value of an encrypted quantum key field and is sent to the wireless local area network in a broadcasting mode, the numerical value of a message type field in the message is set to be 0X03, the numerical value of an equipment number field is set to be S, the numerical value of a quantum sequence number field is N, and the access control state field is set according to actual conditions; deleting the particles with the quantum sequence numbers from N to N +8L1-1 in the QS; setting a timer T for the sent entrance guard state setting message, and starting the timer; if the intelligent key terminal does not receive the entrance guard state setting response message of the intelligent entrance guard terminal S before the timer T is overtime, executing the step 3B; if the intelligent key terminal receives the entrance guard state setting response message of the intelligent entrance guard terminal S before the timer T is overtime, executing the step 3D;
step 3D, after receiving the broadcast message, the intelligent access control terminal S analyzes the message, if the message type field of the message is 0X03, the message is set in an access control state, a quantum sequence number field and an encrypted quantum key field are analyzed from the message, and the quantum sequence number field obtained by analysis is represented by N1; inquiring the minimum quantum serial number currently available for the intelligent access control terminal S, and expressing the minimum quantum serial number by using N2; if N1 is more than N2, the message received by the intelligent access control terminal S is a retransmitted access control state setting message, and then the step 3E is executed; if N1< N2, it indicates that the message is a late message and the message can be directly discarded without performing subsequent processing; if N1= N2, performing step 3G;
step 3E, deleting the Nth 2 th particle in a quantum memory of the intelligent access control terminal S, and executing the step 3F;
step 3F, adding 1 to the value of N2, and if N2 is less than N1, repeatedly executing the step 3E; if N2= N1, performing step 3G;
step 3G, dividing the 16L1 bits into 8L1 pairs in sequence by taking two bits as a unit for the encrypted quantum key field obtained by the analysis of the intelligent access control terminal S, wherein each pair comprises two bits; suppose that
Figure 735760DEST_PATH_IMAGE007
Performing step 3H for each pair of bits;
and 3H, if the value of the ith pair bit is 00, performing corresponding unitary transformation on N2+ i-1 particles stored in the intelligent access control terminal S
Figure DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE013
(ii) a If the value of the N2+ i-1 pair bit is 01, corresponding unitary transformation is carried out on the N2+ i-1 particle stored in the intelligent access control terminal S
Figure DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE015
(ii) a If the value of the N2+ i-1 paired bit is 10, performing corresponding unitary transformation on the N2+ i-1 particles stored in the intelligent access control terminal S
Figure DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE017
(ii) a If the value of the ith pair of bits is 11, performing corresponding unitary transformation on the N2+ i-1 th particle stored in the intelligent access control terminal S
Figure DEST_PATH_IMAGE018
Figure DEST_PATH_IMAGE019
(ii) a In an intelligent access control terminal S, deleting the N2+ i-1 th particle;
step 3I, sequentially carrying out basal vectors on each particle after transformation
Figure 278999DEST_PATH_IMAGE003
And
Figure 183370DEST_PATH_IMAGE004
carrying out the measurement with the result of
Figure 578579DEST_PATH_IMAGE003
Indicating that the corresponding bit is 0; the result of the measurement is
Figure 520515DEST_PATH_IMAGE004
Indicates that the corresponding bit is 1; finally, quantum KEY KEY2 with the length of L1 bytes can be obtained;
step 3J, the intelligent access control terminal S takes out the quantum KEY KEY3 which is saved in advance from the classical memory, if the KEY2= KEY3, the access control state is modified, and an access control state setting response message is returned to the intelligent KEY terminal and is used for reporting the access control state modification condition to the intelligent KEY terminal; the intelligent access control terminal S prepares 8L1 particles according to the data of the quantum KEY KEY3, and the preparation method is the same as the step 3B; then, Bell measurement is carried out on the prepared 8L1 particles and 8L1 particles with the corresponding serial numbers of N2+8L1 to N2+16L1-1 in a quantum memory of the particle-based access control device, the measurement result is used as an encrypted quantum key field of an access control state setting response message, in the access control state setting response message, the message type field is 0X04, the equipment number field is S, and the quantum sequence number field is N2+8L 1;
step 3K, after receiving the message, the intelligent key terminal analyzes the message, if the message type field of the message is 0X04, the message sets a response message for the entrance guard state, the encrypted quantum key field and the quantum sequence number field are analyzed from the message, and the quantum sequence number field obtained by analysis is represented by N3; inquiring the minimum quantum serial number currently available for the intelligent key terminal, wherein the minimum quantum serial number is represented by N4; if N3< N4, it indicates that the acknowledgment message received by the key fob terminal is a late acknowledgment message, and the message can be directly discarded without performing subsequent processing; if N3= N4, perform step 3L;
3L, dividing 16L1 bits into 8L1 pairs in sequence by taking two bits as a unit according to the encrypted quantum key field data obtained by the intelligent key terminal analysis, wherein each pair comprises two bits; suppose that
Figure 467611DEST_PATH_IMAGE007
Performing step 3M for each pair of bits;
and 3M, if the value of the ith pair of bits is 00, performing corresponding unitary transformation on N4+ i-1 particles stored in a quantum storage space QS of the intelligent key terminal
Figure 734644DEST_PATH_IMAGE012
Figure 58178DEST_PATH_IMAGE013
(ii) a If the value of the N4+ i-1 th pair of bits is 01, a corresponding unitary transformation is performed on the N4+ i-1 th particle held in the quantum storage space QS of the key fob terminal
Figure 851691DEST_PATH_IMAGE014
Figure 845055DEST_PATH_IMAGE015
(ii) a If the value of the N4+ i-1 th pair of bits is 10, a corresponding unitary transformation is performed on the N4+ i-1 th particle held in the quantum storage space QS of the key fob terminal
Figure 726948DEST_PATH_IMAGE016
Figure 588593DEST_PATH_IMAGE017
(ii) a If it is firsti is 11, the corresponding unitary transformation is executed to the N4+ i-1 particle stored in the quantum storage space QS of the intelligent key terminal
Figure 111978DEST_PATH_IMAGE018
Figure 666457DEST_PATH_IMAGE019
(ii) a Deleting the (N4 + i-1) th particle in a quantum storage space QS of the intelligent key terminal;
step 3N, sequentially carrying out basis vector treatment on each particle after transformation
Figure 32716DEST_PATH_IMAGE003
And
Figure 307839DEST_PATH_IMAGE004
carrying out the measurement with the result of
Figure 55436DEST_PATH_IMAGE003
Indicating that the corresponding bit is 0; the result of the measurement is
Figure 515236DEST_PATH_IMAGE004
Indicates that the corresponding bit is 1; finally, quantum KEY KEY5 with the length of L1 bytes can be obtained;
step 3O, if the KEY5 is equal to the KEY1, the received quantum KEY is correct, and the intelligent KEY terminal successfully modifies the entrance guard state of the intelligent entrance guard terminal S; if the KEY5 is not equal to the KEY1, the received quantum KEY is incorrect, the message is directly discarded, and the access control state modification fails.
CN201810639944.1A 2018-06-21 2018-06-21 Intelligent access control system based on quantum invisible state transfer and wireless local area network Expired - Fee Related CN108898708B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810639944.1A CN108898708B (en) 2018-06-21 2018-06-21 Intelligent access control system based on quantum invisible state transfer and wireless local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810639944.1A CN108898708B (en) 2018-06-21 2018-06-21 Intelligent access control system based on quantum invisible state transfer and wireless local area network

Publications (2)

Publication Number Publication Date
CN108898708A CN108898708A (en) 2018-11-27
CN108898708B true CN108898708B (en) 2020-12-29

Family

ID=64345263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810639944.1A Expired - Fee Related CN108898708B (en) 2018-06-21 2018-06-21 Intelligent access control system based on quantum invisible state transfer and wireless local area network

Country Status (1)

Country Link
CN (1) CN108898708B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2430850B (en) * 2005-09-29 2010-12-01 Hewlett Packard Development Co Method and system using one-time pad data to evidence the possession of a particular attribute
CN106686866A (en) * 2017-02-20 2017-05-17 河南理工大学 Multimedia classroom intelligent light control system based on WIFI and smart phone
CN107070796A (en) * 2017-02-20 2017-08-18 河南理工大学 A kind of adaptive RIP routing protocols based on quantum teleportation
CN107483189A (en) * 2017-08-08 2017-12-15 河南理工大学 A kind of quantum cryptography lock system based on quantum entanglement
CN107689866A (en) * 2017-08-28 2018-02-13 河南理工大学 It is a kind of based on the quantum cryptography lock system tangled particle and compensated automatically
CN107911211A (en) * 2017-10-23 2018-04-13 浙江神州量子网络科技有限公司 Quick Response Code Verification System based on quantum communication network
CN108183797A (en) * 2018-01-05 2018-06-19 浙江科易理想量子信息技术有限公司 A kind of quantum cryptography locks implementation method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2430850B (en) * 2005-09-29 2010-12-01 Hewlett Packard Development Co Method and system using one-time pad data to evidence the possession of a particular attribute
CN106686866A (en) * 2017-02-20 2017-05-17 河南理工大学 Multimedia classroom intelligent light control system based on WIFI and smart phone
CN107070796A (en) * 2017-02-20 2017-08-18 河南理工大学 A kind of adaptive RIP routing protocols based on quantum teleportation
CN107483189A (en) * 2017-08-08 2017-12-15 河南理工大学 A kind of quantum cryptography lock system based on quantum entanglement
CN107689866A (en) * 2017-08-28 2018-02-13 河南理工大学 It is a kind of based on the quantum cryptography lock system tangled particle and compensated automatically
CN107911211A (en) * 2017-10-23 2018-04-13 浙江神州量子网络科技有限公司 Quick Response Code Verification System based on quantum communication network
CN108183797A (en) * 2018-01-05 2018-06-19 浙江科易理想量子信息技术有限公司 A kind of quantum cryptography locks implementation method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
连续变量量子保密通信实验研究;代文超;《中国优秀硕士学位论文全文数据库信息科技辑》;20120731;全文 *

Also Published As

Publication number Publication date
CN108898708A (en) 2018-11-27

Similar Documents

Publication Publication Date Title
CN107770182B (en) Data storage method of home gateway and home gateway
CN108347331B (en) Method and device for safe communication between T _ Box device and ECU device in Internet of vehicles system
CN110377002B (en) Self-adaptive in-vehicle CAN bus safety control method and system
KR101361161B1 (en) System and method for reinforcing authentication using context information for mobile cloud
CN106504391B (en) Control method, device and system of intelligent access control
CN107968781A (en) The security processing of vehicle shared service
CN111181912B (en) Browser identifier processing method and device, electronic equipment and storage medium
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
CN105261100A (en) Entrance guard unlocking method and system
CN111565389B (en) Node management method, device, equipment and storage medium
CN107770137A (en) A kind of information processing method and device
CN114024744A (en) Information protection method and artificial intelligence platform based on cloud computing and block chain service
CN110830985B (en) 5G lightweight terminal access authentication method based on trust mechanism
CN105847009A (en) RFID bidirectional authentication method meeting requirement on backward security
CN115810232A (en) Passage control method based on offline two-dimensional code and face characteristic value
CN103152326A (en) Distributed authentication method and authentication system
CN109889532A (en) Internet of things equipment safety certification and cryptographic key negotiation method based on environmental context
CN108898708B (en) Intelligent access control system based on quantum invisible state transfer and wireless local area network
KR102321405B1 (en) System and method for providing security service using blockchain and biometric information
CN114124512B (en) WeChat small program supervision method, system and equipment based on flow behavior analysis
CN111243137A (en) Intelligent door lock safety management system based on open architecture
CN116170806A (en) Smart power grid LWM2M protocol security access control method and system
WO2022078058A1 (en) Decryption method, server and storage medium
US11461478B2 (en) Mobile network core component for managing security keys
CN108696865A (en) A kind of radio sensing network node safety certifying method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201229

Termination date: 20210621