CN109787763A - A kind of Mobile Authentication method, system, terminal and storage medium based on quantum key - Google Patents
A kind of Mobile Authentication method, system, terminal and storage medium based on quantum key Download PDFInfo
- Publication number
- CN109787763A CN109787763A CN201910163309.5A CN201910163309A CN109787763A CN 109787763 A CN109787763 A CN 109787763A CN 201910163309 A CN201910163309 A CN 201910163309A CN 109787763 A CN109787763 A CN 109787763A
- Authority
- CN
- China
- Prior art keywords
- quantum
- key
- user
- session
- distribution center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The present invention provides a kind of Mobile Authentication method, system, terminal and storage medium based on quantum key, which comprises quantum-key distribution center carries out safety certification to the first user, second user respectively using pre-stored first quantum key and the first user equipment identification, the second quantum key and second user EIC equipment identification code;If quantum-key distribution center authenticates successfully the first user, second user, creates session between two users and generate quantum session key;Quantum-key distribution center is utilized respectively the first quantum key, the second quantum key encrypts quantum session key, and the quantum session key of encryption is sent respectively to the first user, second user.The present invention carries out authentication using the quantum key uniqueness and equipment unique identifier planted in advance, introduces quantum true random number and carries out secure distribution by planting quantum key encryption in advance, solves the problems, such as session key agreement between any two users.
Description
Technical field
The invention belongs to Technique on Quantum Communication fields, and in particular to a kind of Mobile Authentication side based on quantum key
Method, system, terminal and storage medium.
Background technique
Quantum communications are in such a way that quantum state and entangled quantum effect carry out the Novel Communication of information or cipher key delivery.Base
The absolute safety that can not be eavesdropped can be provided in theoretical and protocol level in principle of quantum mechanics to guarantee.The quantum communications of broad sense
Including quantum key distribution, quantum teleportation, quantum dense coding, Quantum Secure Direct Communication etc..Amount in quantum communications
The branches such as sub- Teleportation, Quantum Secure Direct Communication and quantum secret sharing are always forward position fundamental research field and section
The hot spot in terms of experimental exploring is learned, but is limited to practical development level, still has certain distance apart from industry application.
Quantum communications described in row at present, refer to the Technique on Quantum Communication of narrow sense, commonly referred to as quantum key distribution
(Quantum Key Distribution, QKD) or quantum secret communication.Quantum key distribution using quantum state as information carrier,
Based on quantum-mechanical Heisenberg uncertainty principle and quantum non-clone principle, transceiver communication both sides are shared by quantum channel
Key is the product that quantum mechanics is combined with cryptography.QKD technology does not transmit ciphertext in the communications, just with quantum
Key is distributed to communicating pair by transmission key.Pass through the preparation of single photon quantum state, transmission, measurement and classical communication
Agreement post-processing realizes that the quantum key between communicating pair is shared, (i.e. logical in conjunction with the asymmetric encryption mechanisms of " one-time pad "
Letter both sides, which use, operate by the encryption and decryption of bit with the isometric password of information), it can theoretically realize the amount being perfectly safe
Son communication.1984, Bennet C.H. and Brassard G. proposed first quantum key distribution agreement (BB84 agreement), took off
The prelude of quantum key distribution technical research is opened, after decades of development., Technique on Quantum Communication from theory to experiment, then
It breaks through, develops very fast to functionization.
Quantum key is symmetric key, and QKD system is the point-to-point communication mode between two users, can not solve net
Network communication there are problems that carrying out authentication and negotiation public keys between any two user, therefore needs one kind and pass through quantum
The method that authentication center establishes any two mobile subscriber's safety chain.
Summary of the invention
In view of the deficiencies of the prior art, the present invention provide a kind of Mobile Authentication method based on quantum key, system,
Terminal and storage medium, to solve the above technical problems.
In a first aspect, the embodiment of the present application provides a kind of mobile communication phase authentication method based on quantum key, the side
Method includes:
Quantum-key distribution center utilizes pre-stored first quantum key and the first user equipment identification, the second amount
Sub-key and second user EIC equipment identification code carry out safety certification to the first user, second user respectively;
If quantum-key distribution center authenticates successfully the first user, second user, session and life between two users are created
At quantum session key;
Quantum-key distribution center is utilized respectively the first quantum key, the second quantum key adds quantum session key
It is close, and the quantum session key of encryption is sent respectively to the first user, second user;
The quantum session key of encryption, which is decrypted, in first user, second user obtains quantum session key, then sharp
With quantum Session key establishment secure communication.
With reference to first aspect, in the first embodiment of first aspect, the quantum-key distribution center is using in advance
The first quantum key first stored and the first user equipment identification, the second quantum key and second user EIC equipment identification code difference
Safety certification is carried out to the first user, second user, comprising:
First user vector sub-key distributing center sends the first user authentication request and asks with the communication of second user
It asks;
Quantum-key distribution center using pre-stored first quantum key to the first user carry out safety certification, and to
Second user sends session request;
Second user sends second user certification request to quantum key distributing center;
Quantum-key distribution center carries out safety certification to second user using pre-stored second quantum key.
With reference to first aspect, in second of embodiment of first aspect, the quantum-key distribution center is sharp respectively
Quantum session key is encrypted with the first quantum key, the second quantum key, and the quantum session key of encryption is distinguished
It is sent to the first user, second user, comprising:
Quantum-key distribution center carries out encryption point to quantum session key using the first quantum key, the second quantum key
Not Sheng Cheng first encryption quantum session key, second encryption quantum session key, and be sent respectively to the first user, second use
Family.
With reference to first aspect, in the third embodiment of first aspect, the user authentication request is by quantum key
The Unique Device identification code and quantum key sequence number of encryption are constituted.
Second aspect, the embodiment of the present application provide a kind of Mobile Authentication system based on quantum key, the system
Include:
Quantum-key distribution center, the safety that the quantum-key distribution center configuration is used to complete any two users are recognized
Card, the session between creation amount user, and generate quantum session key between two users and by prestore quantum key encrypt into
Row secure distribution.
Several quantum key mobile devices, the quantum key mobile device are configured to carry out quantum key mobile deposit
Storage and quantum encryption and decryption.
In conjunction with second aspect, in the first embodiment of second aspect, the quantum-key distribution center is specifically wrapped
It includes:
Quantum authentication center, the quantum authentication center configuration are used to pass through pre-stored quantum key, user equipment
Identification code carries out safety certification to user;
Session manager, the session manager is configured to the session between creation any two user, and controls quantum
Random number produces device and generates quantum session key;
Quantum random number produces device, and the quantum random number production device is configured to generate true random number as any dual-purpose
The quantum session key communicated between family, and the quantum key by storing in advance encrypts quantum session key, safety point
Issue user.
In conjunction with second aspect, in second of embodiment of second aspect, the quantum authentication center is specifically used for:
Quantum authentication center is using pre-stored first quantum key, the second quantum key respectively to the first user, the
Two users carry out safety certification.
In conjunction with second aspect, in the third embodiment of second aspect, the session manager is specifically used for:
If quantum authentication center authenticates successfully the first user, second user, session manager is created between two users
Session simultaneously controls quantum random number production device generation quantum session key.
In conjunction with second aspect, in the 4th kind of embodiment of second aspect, the quantum random number production implement body is used
In:
Quantum random number produces device and generates true random number as the quantum session key communicated between any two users, and utilizes
Pre-stored first quantum key, the second quantum key respectively encrypt quantum session key, and by the quantum of encryption
Session key is sent respectively to the first user, second user.
In conjunction with second aspect, in the 5th kind of embodiment of second aspect, the quantum key mobile device is specifically used
In:
First user, second user quantum key mobile device be utilized respectively the first quantum key of storage, the second amount
The quantum session key of encryption is decrypted in sub-key, obtains quantum session key.
In conjunction with second aspect, in the 5th kind of embodiment of second aspect, the quantum key mobile device is specifically wrapped
It includes:
Quantum UKEY, quantum TF card, quantum SD card, and other mobile devices with safety chip.
The third aspect provides a kind of terminal, comprising:
Processor, memory, wherein
The memory is used to store computer program,
The processor from memory for calling and running the computer program, so that terminal executes above-mentioned terminal
Method.
Fourth aspect provides a kind of computer storage medium, instruction is stored in the computer readable storage medium,
When run on a computer, so that computer executes method described in above-mentioned various aspects.
5th aspect, provides a kind of computer program product comprising instruction, when run on a computer, so that
Computer executes method described in above-mentioned various aspects.
The beneficial effects of the present invention are,
Mobile Authentication method, system, terminal and storage medium provided by the invention based on quantum key, by drawing
Enter quantum-key distribution center, carries out authentication using the quantum key uniqueness and equipment unique identifier planted in advance, introduce
Quantum true random number simultaneously carries out secure distribution by planting quantum key encryption in advance, solves session key agreement between any two users
The problem of.
The present invention has many advantages, such as that structure is simple, complexity is small, highly-safe.In addition, the system structure is simple, solve
The authentication question of mutual quantum secret communication is carried out between a large amount of mobile subscribers, at present for answering extensively for Technique on Quantum Communication low cost
With creating condition.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without creative efforts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the schematic flow chart of the method for the application one embodiment.
Fig. 2 is that any two users are based on quantum key certification link schematic diagram in the present invention.
Fig. 3 is any verification process figure of the two users based on quantum key of the invention.
Fig. 4 is the schematic block diagram of the system of the application one embodiment.
Fig. 5 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, below in conjunction with of the invention real
The attached drawing in example is applied, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementation
Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common
Technical staff's every other embodiment obtained without making creative work, all should belong to protection of the present invention
Range.
Fig. 1 is the schematic flow chart of the method for the application one embodiment.Wherein, Fig. 1 executing subject can be one kind
Mobile Authentication system based on quantum key.
As shown in Figure 1, this method 100 includes:
Step 110, quantum-key distribution center is identified using pre-stored first quantum key and the first user equipment
Code, the second quantum key and second user EIC equipment identification code carry out safety certification to the first user, second user respectively;
If step 120 quantum-key distribution center authenticates successfully the first user, second user, meeting between two users is created
It talks about and generates quantum session key;
Step 130, it is close to quantum session to be utilized respectively the first quantum key, the second quantum key for quantum-key distribution center
Key is encrypted, and the quantum session key of encryption is sent respectively to the first user, second user;
Step 140, it is close that acquisition quantum session is decrypted to the quantum session key of encryption in the first user, second user
Then key utilizes the secure communication of quantum Session key establishment.
In order to facilitate the understanding of the present invention, below with the present invention is based on the originals of the Mobile Authentication method of quantum key
Reason, in conjunction with the embodiments in the process of the Mobile Authentication method based on quantum key, be based on quantum to provided by the invention
The Mobile Authentication method of key is further described.
Fig. 2 is certification link schematic diagram of any two users based on quantum key in the present invention.As shown in Fig. 2, any two
A quantum key mobile device QMD, storage and quantum for user's quantum key is respectively configured in user such as user A and user B
Encryption and decryption.Before user A and user B is communicated, all by respective quantum key and quantum-key distribution center QKDC into
Row quantum identification safety authentication (link 1 and link 2), quantum-key distribution center QKDC, which is established, if two users' certification passes through uses
Session between family A and user B, and generate the quantum session key difference safe transmission user A and user B of user A and user B;
User A and user B utilizes quantum Session key establishment secure communication (link 3).
Fig. 3 is any verification process figure of the two users based on quantum key of the invention.As shown in figure 3, user A and user B
Verification process specifically comprise the following steps:
Itself quantum key serial number, quantum key and EIC equipment identification code are stored in advance respectively by S1, user A and user B
In the quantum key mobile device QMD of user, the quantum key filling of quantum key mobile device QMD is completed;
Specifically, quantum key serial number K_Ai_ID, quantum key is stored in advance in the quantum key mobile device QMD of user A
Quantum key serial number is stored in advance in the quantum key mobile device QMD of K_Ai and itself Unique Device identification code ID_A, user B
K_Bi_ID, quantum key K_Bi and the Unique Device identification code ID_B of itself.
The quantum key mobile device QMD of S2, user A and user B carry out with quantum-key distribution center QKDC close respectively
Key is synchronous, and the quantum key and Unique Device identification code of user A and user B is stored in advance in quantum-key distribution center QKDC;
Specifically, the quantum key mobile device QMD and quantum-key distribution center QKDC of user A carry out key synchronization,
The quantum key K_Ai and Unique Device identification code ID_A of user A, the amount of user B is stored in advance in quantum-key distribution center QKDC
Sub-key mobile device QMD and quantum-key distribution center QKDC carries out key synchronization, and quantum-key distribution center QKDC is preparatory
Store the quantum key K_Bi and Unique Device identification code ID_B of user B.
S3, user A send the first user authentication request M1 to quantum key distributing center QKDC first and with user B's
Communication request, wherein the first user authentication request M1 by quantum key K_Ai encrypted Unique Device identification code ID_A and
Quantum key sequence number K_Ai_ID is constituted;
S4, quantum-key distribution center QKDC utilization subcertification authority QCA, according to quantum key sequence number K_Ai_ID,
The first user authentication request M1 is decrypted using corresponding quantum key K_Ai, to the Unique Device identification code ID_ of user A
A is verified, and is verified rear quantum-key distribution center QKDC to user B and is sent session request request;
S5, user B send second user certification request M2 to quantum key distributing center QKDC, wherein second user is recognized
Card request M2 is made of quantum key K_Bi encrypted Unique Device identification code ID_B and quantum key sequence number K_Bi_ID;
S6, quantum-key distribution center QKDC utilization subcertification authority QCA, according to quantum key sequence number K_Bi_ID,
Second user certification request M2 is decrypted using corresponding quantum key K_Bi, to the Unique Device identification code ID_ of user B
B is verified;
After S7, second user authentication verification pass through, quantum-key distribution center QKDC creates user A using session manager
Session between B, while quantum-key distribution center QKDC generates quantum session key K using quantum random number generators, and
Be utilized respectively quantum key K_Ai, K_Bi to quantum key K carry out quantum cryptography generate first encryption quantum session key M3 and
Second encryption quantum session key M4, is then sent respectively to user A and user B for M3 and M4, wherein the first encryption quantum meeting
Words key M3 is made of quantum key K_Ai encrypted quantum session key K and quantum key sequence number K_Ai_ID, and second adds
Close quantum session key M4 is by quantum key K_Bi encrypted quantum session key K and quantum key sequence number K_Bi_ID structure
At;
The quantum key mobile device QMD of S8, user A and user B are utilized respectively quantum key K_Ai, K_Bi to message
M3, M4 are decrypted, and obtain quantum session key K, user A and user B using quantum key K and establish secure communication.
Fig. 4 is the schematic block diagram of the system of the application one embodiment.If Fig. 4 shows, which includes:
Quantum-key distribution center 410, the quantum-key distribution center 410 are configured to complete the peace of any two users
Complete to authenticate, between creation amount user session, and generate the quantum session key between two users and added by prestoring quantum key
Close carry out secure distribution.
Several quantum key mobile devices 420, the quantum key mobile device 420 are configured to carry out quantum key
Mobile storage and quantum encryption and decryption.
Optionally, as the application one embodiment, the quantum-key distribution center 410 includes:
Quantum authentication center 4101, the quantum authentication center 4101 be configured to pre-stored quantum key,
User equipment identification carries out safety certification to user;
Session manager 4102, the session manager 4102 are configured to the session between creation any two user, and
It controls quantum random number production device and generates quantum session key;
Quantum random number produces device 4103, and the quantum random number production device 4103 is configured to generate true random number conduct
The quantum session key communicated between any two users, and the quantum key by storing in advance adds quantum session key
Close, secure distribution is to user.
Optionally, as the application one embodiment, the quantum authentication center 4101 is specifically used for:
It is used respectively first using pre-stored first quantum key, the second quantum key at quantum authentication center 4101
Family, second user carry out safety certification.
Optionally, as the application one embodiment, the session manager 4102 is specifically used for:
If quantum authentication center 4101 authenticates successfully the first user, second user, the creation of session manager 4,102 two
Session between user simultaneously controls quantum random number production device 4103 and generates quantum session key.
Optionally, as the application one embodiment, the quantum random number production device 4103 is specifically used for:
Quantum random number produces device 4103 and generates true random number as the quantum session key communicated between any two users, and
Quantum session key is encrypted respectively using pre-stored first quantum key, the second quantum key, and by encryption
Quantum session key is sent respectively to the first user, second user
Optionally, as the application one embodiment, the quantum key mobile device 420 is specifically used for:
First user, second user quantum key mobile device be utilized respectively the first quantum key of storage, the second amount
The quantum session key of encryption is decrypted in sub-key, obtains quantum session key.
Optionally, as the application one embodiment, the quantum key mobile device 420 is specifically included:
Quantum UKEY, quantum TF card, quantum SD card, and other mobile devices with safety chip.
Fig. 5 is a kind of structural schematic diagram of terminal installation 500 provided in an embodiment of the present invention, which can be with
Method for executing the Mobile Authentication provided by the embodiments of the present application based on quantum key.
Wherein, which may include: processor 510, memory 520 and communication unit 530.These components
It is communicated by one or more bus, it will be understood by those skilled in the art that the structure of server shown in figure is not
The restriction to the application is constituted, it is also possible to hub-and-spoke configuration either busbar network, can also include more than illustrating
Or less component, perhaps combine certain components or different component layouts.
Wherein, which can be used for executing instruction for storage processor 510, and memory 520 can be by any class
The volatibility or non-volatile memories terminal or their combination of type are realized, such as static random access memory (SRAM), electricity
Erasable Programmable Read Only Memory EPROM (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory
(PROM), read-only memory (ROM), magnetic memory, flash memory, disk or CD.When executing instruction in memory 520
When being executed by processor 510, so that terminal 500 some or all of is able to carry out in following above method embodiment step.
Processor 510 is the control centre for storing terminal, utilizes each of various interfaces and the entire electric terminal of connection
A part by running or execute the software program and/or module that are stored in memory 520, and calls and is stored in storage
Data in device, to execute the various functions and/or processing data of electric terminal.The processor can be by integrated circuit
(Integrated Circuit, abbreviation IC) composition, such as the IC that can be encapsulated by single are formed, can also be by more of connection
The encapsulation IC of identical function or different function and form.For example, processor 510 can only include central processing unit
(Central Processing Unit, abbreviation CPU).In the application embodiment, CPU can be single operation core, can also
To include multioperation core.
Communication unit 530, for establishing communication channel, so that the storage terminal be allow to be led to other terminals
Letter.It receives the user data of other terminals transmission or sends user data to other terminals.
The application also provides a kind of computer storage medium, wherein the computer storage medium can be stored with program, the journey
Sequence may include step some or all of in each embodiment provided by the present application when executing.The storage medium can for magnetic disk,
CD, read-only memory (English: read-only memory, referred to as: ROM) or random access memory (English:
Random access memory, referred to as: RAM) etc..
Therefore, the application is by introducing quantum key distributing center, only using the quantum key uniqueness and equipment planted in advance
One identification code carries out authentication, introduces quantum true random number and carries out secure distribution by planting quantum key encryption in advance, solves
Between any two users the problem of session key agreement.In addition, the system structure is simple, solve between a large amount of mobile subscribers at present
The authentication question of mutual quantum secret communication is carried out, is created condition for the extensive use of Technique on Quantum Communication low cost.This reality
Applying the attainable technical effect of example institute may refer to described above, and details are not described herein again.
It is required that those skilled in the art can be understood that the technology in the embodiment of the present application can add by software
The mode of general hardware platform realize.Based on this understanding, the technical solution in the embodiment of the present application substantially or
Say that the part that contributes to existing technology can be embodied in the form of software products, which is stored in
Such as USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory in one storage medium
The various media that can store program code such as (RAM, Random Access Memory), magnetic or disk, including it is several
Instruction is used so that a terminal (can be personal computer, server or second terminal, the network terminal etc.) is held
Row all or part of the steps of the method according to each embodiment of the present invention.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
Although by reference to attached drawing and combining the mode of preferred embodiment to the present invention have been described in detail, the present invention
It is not limited to this.Without departing from the spirit and substance of the premise in the present invention, those of ordinary skill in the art can be to the present invention
Embodiment carry out various equivalent modifications or substitutions, and these modifications or substitutions all should in covering scope of the invention/appoint
What those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, answer
It is included within the scope of the present invention.Therefore, protection scope of the present invention is answered described is with scope of protection of the claims
It is quasi-.
Claims (9)
1. a kind of Mobile Authentication method based on quantum key, which is characterized in that the described method includes:
Quantum-key distribution center is close using pre-stored first quantum key and the first user equipment identification, the second quantum
Key and second user EIC equipment identification code carry out safety certification to the first user, second user respectively;
If quantum-key distribution center authenticates successfully the first user, second user, session and production quantity between two users are created
Sub- session key;
Quantum-key distribution center is utilized respectively the first quantum key, the second quantum key encrypts quantum session key,
And the quantum session key of encryption is sent respectively to the first user, second user;
The quantum session key of encryption, which is decrypted, in first user, second user obtains quantum session key, then utilization
Sub- Session key establishment secure communication.
2. the method according to claim 1, wherein the quantum-key distribution center utilizes pre-stored the
One quantum key and the first user equipment identification, the second quantum key and second user EIC equipment identification code are used first respectively
Family, second user carry out safety certification, comprising:
First user vector sub-key distributing center sends the first user authentication request and the communication request with second user;
Quantum-key distribution center carries out safety certification to the first user using pre-stored first quantum key, and to second
User sends session request;
Second user sends second user certification request to quantum key distributing center;
Quantum-key distribution center carries out safety certification to second user using pre-stored second quantum key.
3. the method according to claim 1, wherein the quantum-key distribution center is utilized respectively the first quantum
Key, the second quantum key encrypt quantum session key, and the quantum session key of encryption is sent respectively to first
User, second user, comprising:
Quantum-key distribution center encrypts quantum session key and is given birth to respectively using the first quantum key, the second quantum key
At the first encryption quantum session key, the second encryption quantum session key, and it is sent respectively to the first user, second user.
4. the method according to claim 1, wherein the user authentication request encrypted by quantum key it is unique
EIC equipment identification code and quantum key sequence number are constituted.
5. a kind of Mobile Authentication system based on quantum key, which is characterized in that the system comprises:
Quantum-key distribution center, the quantum-key distribution center configuration are used to complete the safety certification of any two users, wound
Session between the amount of building user, and generate the quantum session key between two users and carry out safety by prestoring quantum key encryption
Distribution.
Several quantum key mobile devices, the quantum key mobile device be configured to carry out quantum key mobile storage,
And quantum encryption and decryption.
6. system according to claim 5, which is characterized in that the quantum-key distribution center specifically includes:
Quantum authentication center, the quantum authentication center configuration are used to identify by pre-stored quantum key, user equipment
Code carries out safety certification to user;
Session manager, the session manager is configured to the session between creation any two user, and it is random to control quantum
Number production device generates quantum session key;
Quantum random number produces device, and the quantum random number production device is configured to generate true random number as between any two users
The quantum session key of communication, and the quantum key by storing in advance encrypts quantum session key, secure distribution is given
User.
7. system according to claim 5, which is characterized in that the quantum key mobile device specifically includes:
Quantum UKEY, quantum TF card, quantum SD card, and other mobile devices with safety chip.
8. a kind of terminal characterized by comprising
Processor;
The memory executed instruction for storage processor;
Wherein, the processor is configured to perform claim requires the described in any item methods of 1-4.
9. a kind of computer readable storage medium for being stored with computer program, which is characterized in that the program is executed by processor
Shi Shixian method for example of any of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910163309.5A CN109787763A (en) | 2019-03-05 | 2019-03-05 | A kind of Mobile Authentication method, system, terminal and storage medium based on quantum key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910163309.5A CN109787763A (en) | 2019-03-05 | 2019-03-05 | A kind of Mobile Authentication method, system, terminal and storage medium based on quantum key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109787763A true CN109787763A (en) | 2019-05-21 |
Family
ID=66486603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910163309.5A Pending CN109787763A (en) | 2019-03-05 | 2019-03-05 | A kind of Mobile Authentication method, system, terminal and storage medium based on quantum key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109787763A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110289953A (en) * | 2019-06-25 | 2019-09-27 | 湖北凯乐量子通信光电科技有限公司 | A kind of quantum secret communication system |
CN110489987A (en) * | 2019-08-23 | 2019-11-22 | 湖北凯乐量子通信光电科技有限公司 | A kind of quantum secure storage system |
CN112580061A (en) * | 2019-09-27 | 2021-03-30 | 科大国盾量子技术股份有限公司 | Calling method of quantum encryption and decryption application interface and related equipment |
CN113810187A (en) * | 2021-10-13 | 2021-12-17 | 国科量子通信网络有限公司 | High-speed quantum key distribution system and method |
CN113890732A (en) * | 2021-10-14 | 2022-01-04 | 成都信息工程大学 | Block chain-based secret communication method and tracing method of security event thereof |
CN114531238A (en) * | 2022-04-24 | 2022-05-24 | 中电信量子科技有限公司 | Secret key safe filling method and system based on quantum secret key distribution |
CN115348085A (en) * | 2022-08-12 | 2022-11-15 | 长江量子(武汉)科技有限公司 | Epidemic prevention management method based on quantum encryption and epidemic prevention terminal |
GB2616048A (en) * | 2022-02-25 | 2023-08-30 | Toshiba Kk | A quantum network and authentication method |
GB2616047A (en) * | 2022-02-25 | 2023-08-30 | Toshiba Kk | A quantum network and a quantum authentication server |
CN117098123A (en) * | 2023-10-17 | 2023-11-21 | 西北大学 | Quantum key-based Beidou short message encryption communication system |
WO2024012529A1 (en) * | 2022-07-15 | 2024-01-18 | 中国移动通信有限公司研究院 | Key management method and apparatus, and device and storage medium |
CN117544308A (en) * | 2024-01-09 | 2024-02-09 | 广东广宇科技发展有限公司 | Quantum key-based data transmission verification method |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475464A (en) * | 2013-08-20 | 2013-12-25 | 国家电网公司 | Power special quantum encryption gateway system |
CN105763563A (en) * | 2016-04-19 | 2016-07-13 | 浙江神州量子网络科技有限公司 | Identity authentication method during quantum secret key application process |
CN106411525A (en) * | 2016-09-23 | 2017-02-15 | 浙江神州量子网络科技有限公司 | Message authentication method and system |
CN106789052A (en) * | 2017-03-28 | 2017-05-31 | 浙江神州量子网络科技有限公司 | A kind of remote cipher key based on quantum communication network issues system and its application method |
CN107317676A (en) * | 2017-04-26 | 2017-11-03 | 中南大学 | Method for distributing key based on quantum figure state |
CN108173649A (en) * | 2018-01-10 | 2018-06-15 | 如般量子科技有限公司 | A kind of message authentication method and system based on quantum key card |
CN108540436A (en) * | 2018-01-10 | 2018-09-14 | 如般量子科技有限公司 | The communication system and communication means of the transmission of information encryption and decryption are realized based on quantum network |
CN108574569A (en) * | 2017-03-08 | 2018-09-25 | 中国移动通信有限公司研究院 | A kind of authentication method and authentication device based on quantum key |
CN108600152A (en) * | 2018-03-01 | 2018-09-28 | 如般量子科技有限公司 | Modified Kerberos identity authorization systems based on quantum communication network and method |
CN108683501A (en) * | 2018-03-01 | 2018-10-19 | 如般量子科技有限公司 | Based on quantum communication network using timestamp as the multiple identity authorization system and method for random number |
CN108809636A (en) * | 2018-04-26 | 2018-11-13 | 如般量子科技有限公司 | The communication system and communication means of message authentication between member are realized based on group's type quantum key card |
CN108964897A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | Identity authorization system and method based on group communication |
CN108965266A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | A kind of User-to-User identity authorization system and method based on group key pond and Kerberos |
CN108964895A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | User-to-User identity authorization system and method based on group key pond and improvement Kerberos |
CN108964896A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | A kind of Kerberos identity authorization system and method based on group key pond |
CN109067705A (en) * | 2018-06-28 | 2018-12-21 | 如般量子科技有限公司 | Modified Kerberos identity authorization system and method based on group communication |
-
2019
- 2019-03-05 CN CN201910163309.5A patent/CN109787763A/en active Pending
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475464A (en) * | 2013-08-20 | 2013-12-25 | 国家电网公司 | Power special quantum encryption gateway system |
CN105763563A (en) * | 2016-04-19 | 2016-07-13 | 浙江神州量子网络科技有限公司 | Identity authentication method during quantum secret key application process |
CN106411525A (en) * | 2016-09-23 | 2017-02-15 | 浙江神州量子网络科技有限公司 | Message authentication method and system |
CN108574569A (en) * | 2017-03-08 | 2018-09-25 | 中国移动通信有限公司研究院 | A kind of authentication method and authentication device based on quantum key |
CN106789052A (en) * | 2017-03-28 | 2017-05-31 | 浙江神州量子网络科技有限公司 | A kind of remote cipher key based on quantum communication network issues system and its application method |
CN107317676A (en) * | 2017-04-26 | 2017-11-03 | 中南大学 | Method for distributing key based on quantum figure state |
CN108173649A (en) * | 2018-01-10 | 2018-06-15 | 如般量子科技有限公司 | A kind of message authentication method and system based on quantum key card |
CN108540436A (en) * | 2018-01-10 | 2018-09-14 | 如般量子科技有限公司 | The communication system and communication means of the transmission of information encryption and decryption are realized based on quantum network |
CN108600152A (en) * | 2018-03-01 | 2018-09-28 | 如般量子科技有限公司 | Modified Kerberos identity authorization systems based on quantum communication network and method |
CN108683501A (en) * | 2018-03-01 | 2018-10-19 | 如般量子科技有限公司 | Based on quantum communication network using timestamp as the multiple identity authorization system and method for random number |
CN108809636A (en) * | 2018-04-26 | 2018-11-13 | 如般量子科技有限公司 | The communication system and communication means of message authentication between member are realized based on group's type quantum key card |
CN108964897A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | Identity authorization system and method based on group communication |
CN108965266A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | A kind of User-to-User identity authorization system and method based on group key pond and Kerberos |
CN108964895A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | User-to-User identity authorization system and method based on group key pond and improvement Kerberos |
CN108964896A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | A kind of Kerberos identity authorization system and method based on group key pond |
CN109067705A (en) * | 2018-06-28 | 2018-12-21 | 如般量子科技有限公司 | Modified Kerberos identity authorization system and method based on group communication |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110289953A (en) * | 2019-06-25 | 2019-09-27 | 湖北凯乐量子通信光电科技有限公司 | A kind of quantum secret communication system |
CN110489987A (en) * | 2019-08-23 | 2019-11-22 | 湖北凯乐量子通信光电科技有限公司 | A kind of quantum secure storage system |
CN112580061B (en) * | 2019-09-27 | 2023-04-07 | 科大国盾量子技术股份有限公司 | Calling method of quantum encryption and decryption application interface and related equipment |
CN112580061A (en) * | 2019-09-27 | 2021-03-30 | 科大国盾量子技术股份有限公司 | Calling method of quantum encryption and decryption application interface and related equipment |
CN113810187A (en) * | 2021-10-13 | 2021-12-17 | 国科量子通信网络有限公司 | High-speed quantum key distribution system and method |
CN113810187B (en) * | 2021-10-13 | 2023-12-01 | 国科量子通信网络有限公司 | High-speed quantum key distribution system and method |
CN113890732A (en) * | 2021-10-14 | 2022-01-04 | 成都信息工程大学 | Block chain-based secret communication method and tracing method of security event thereof |
GB2616048A (en) * | 2022-02-25 | 2023-08-30 | Toshiba Kk | A quantum network and authentication method |
GB2616047A (en) * | 2022-02-25 | 2023-08-30 | Toshiba Kk | A quantum network and a quantum authentication server |
JP7392065B2 (en) | 2022-02-25 | 2023-12-05 | 株式会社東芝 | Quantum networks and authentication methods |
CN114531238A (en) * | 2022-04-24 | 2022-05-24 | 中电信量子科技有限公司 | Secret key safe filling method and system based on quantum secret key distribution |
WO2024012529A1 (en) * | 2022-07-15 | 2024-01-18 | 中国移动通信有限公司研究院 | Key management method and apparatus, and device and storage medium |
CN115348085A (en) * | 2022-08-12 | 2022-11-15 | 长江量子(武汉)科技有限公司 | Epidemic prevention management method based on quantum encryption and epidemic prevention terminal |
CN117098123A (en) * | 2023-10-17 | 2023-11-21 | 西北大学 | Quantum key-based Beidou short message encryption communication system |
CN117098123B (en) * | 2023-10-17 | 2024-02-02 | 西北大学 | Quantum key-based Beidou short message encryption communication system |
CN117544308A (en) * | 2024-01-09 | 2024-02-09 | 广东广宇科技发展有限公司 | Quantum key-based data transmission verification method |
CN117544308B (en) * | 2024-01-09 | 2024-04-19 | 广东广宇科技发展有限公司 | Quantum key-based data transmission verification method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109787763A (en) | A kind of Mobile Authentication method, system, terminal and storage medium based on quantum key | |
CN105684344B (en) | A kind of cipher key configuration method and apparatus | |
CN107317674A (en) | Key distribution, authentication method, apparatus and system | |
CN107317789A (en) | Key distribution, authentication method, apparatus and system | |
CN106452739A (en) | Quantum network service station and quantum communication network | |
CN108683501B (en) | Multiple identity authentication system and method with timestamp as random number based on quantum communication network | |
CN108462573B (en) | Flexible quantum secure mobile communication method | |
CN107800539A (en) | Authentication method, authentication device and Verification System | |
JP2009534923A (en) | User authentication and key management for quantum cryptography networks | |
CN104660602A (en) | Quantum key transmission control method and system | |
CN103763099A (en) | Electric power security communication network based on quantum key distribution technology | |
CN109714166A (en) | A kind of mobile distribution method, system, terminal and storage medium based on quantum key | |
CN108650028B (en) | Multiple identity authentication system and method based on quantum communication network and true random number | |
CN111865590B (en) | Working key distribution system based on quantum secret communication technology in financial field and application method thereof | |
CN108964897B (en) | Identity authentication system and method based on group communication | |
CN109088810A (en) | Communication means, device, relevant device, system and the storage medium of group message | |
CN109150897A (en) | A kind of communication encrypting method and device end to end | |
CN101964805B (en) | Method, equipment and system for safely sending and receiving data | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN110300108A (en) | A kind of power distribution automation message encryption transmission method, system, terminal and storage medium | |
CN106878015A (en) | Encryption satellite communication system and method | |
CN108880799B (en) | Multi-time identity authentication system and method based on group key pool | |
CN108600152A (en) | Modified Kerberos identity authorization systems based on quantum communication network and method | |
CN106941403A (en) | Secrecy GSM and method based on quantum key | |
CN111756530B (en) | Quantum service mobile engine system, network architecture and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190521 |
|
RJ01 | Rejection of invention patent application after publication |