CN110188564B - Mobile data storage terminal based on quantum key encryption - Google Patents

Mobile data storage terminal based on quantum key encryption Download PDF

Info

Publication number
CN110188564B
CN110188564B CN201910614089.3A CN201910614089A CN110188564B CN 110188564 B CN110188564 B CN 110188564B CN 201910614089 A CN201910614089 A CN 201910614089A CN 110188564 B CN110188564 B CN 110188564B
Authority
CN
China
Prior art keywords
module
encryption
quantum key
quantum
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910614089.3A
Other languages
Chinese (zh)
Other versions
CN110188564A (en
Inventor
陈姗姗
赵良圆
金华
胡峰
邱红康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd
Original Assignee
Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd filed Critical Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd
Priority to CN201910614089.3A priority Critical patent/CN110188564B/en
Publication of CN110188564A publication Critical patent/CN110188564A/en
Application granted granted Critical
Publication of CN110188564B publication Critical patent/CN110188564B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Electromagnetism (AREA)
  • Databases & Information Systems (AREA)
  • Optics & Photonics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a mobile data storage terminal based on quantum key encryption, which comprises a main controller module, an interface module, a memory, an encryption and decryption module and a power supply module, and is characterized in that: the system also comprises a quantum key generation module, wherein the quantum key generation module is electrically connected to the main controller module and the memory and is used for generating a quantum key, and the encryption and decryption module is used for encrypting and decrypting all files under a single file or a folder based on the quantum key. The mobile data memory uses the quantum key with quantum true randomness to encrypt, can effectively prevent the mobile data memory from being deciphered by a computer with super-strong computing capability, and has higher data encryption security.

Description

Mobile data storage terminal based on quantum key encryption
Technical Field
The invention belongs to the technical field of mobile storage equipment, and particularly relates to a mobile data storage terminal based on quantum key encryption
Background
With the wide application of the internet, the popularization of various digital consumer electronic products and the continuous development of mobile concepts in various fields from business offices to personal entertainment and leisure, the storage requirement of personal data, especially the requirement for mobile storage, is growing faster and faster. In the social situation where information is constantly revealed and confidentiality is constantly stolen, users need more secure mobile storage media. Especially in the important departments such as party, administration, army, enterprise, etc., the safe storage of data is especially important.
Existing encrypted mobile hard disks are mostly based on classical encryption systems such as the asymmetric encryption algorithm RSA, except for basic hardware protection, however these encryption algorithms rely on large integer prime factorization complexity to provide security. With the advent of quantum computers, classical encryption systems are becoming increasingly insecure; in addition, the mobile hard disk on the market at present belongs to independent storage equipment, and once the hard disk is stored poorly, the hard disk is lost or stolen, even if the other party cannot decipher the data in the hard disk, the loss of the data is headache.
Disclosure of Invention
The technical problem to be solved by the invention is to provide the mobile data storage terminal based on quantum key encryption, which can effectively prevent the mobile data storage terminal from being deciphered by a computer with super-strong computing capability.
In order to solve the technical problems, the invention provides a mobile data storage terminal based on quantum key encryption, which comprises a main controller module, an interface module, a memory, an encryption and decryption module, a power module and a quantum key generation module, wherein the quantum key generation module is electrically connected to the main controller module and the memory and is used for generating a quantum key, and the encryption and decryption module is used for encrypting and decrypting all files under a single file or a folder based on the quantum key.
In a preferred embodiment of the present invention, the method further includes that a part of the quantum key generated by the quantum key generation module is used as a seed key to encrypt the remaining quantum key, and the quantum key encrypted by the seed key is stored in a key storage unit of the memory.
In a preferred embodiment of the present invention, the present invention further includes a positioning module, where the positioning module is electrically connected to the master controller module, and is used for positioning the current location information of the local machine.
In a preferred embodiment of the present invention, the positioning module is a GPS positioning module.
In a preferred embodiment of the present invention, the present invention further includes a GPRS/GSM module, where the GPRS/GSM module is electrically connected to the main controller module, and is configured to receive a status instruction of the external terminal device, and the main controller module performs a storage operation according to the status instruction.
In a preferred embodiment of the present invention, the system further includes a built-in power module, wherein the built-in power module is electrically connected to the main controller module and is used for autonomous power supply, and when the storage terminal is not connected to an external device, the energy consumption requirement of a user for remote management, monitoring and positioning of the storage terminal is maintained.
In a preferred embodiment of the present invention, the encryption and decryption module further includes but is not limited to AES encryption algorithm, DES encryption algorithm, SM2 encryption algorithm, SM4 encryption algorithm.
In a preferred embodiment of the present invention, the memory configuration further includes a file storage module and a key storage module, where the file storage module and the key storage module are respectively used to store encrypted ciphertext information and encrypted quantum keys.
In a preferred embodiment of the present invention, the interface module further includes a USB interface and an RJ45 interface.
In a preferred embodiment of the present invention, the method further comprises
Which is used in the case of the storage of data,
(1) The user connects with the external terminal equipment through the interface module, installs and activates the application program; triggering a quantum key generation module to generate a quantum key when an application program is activated, encrypting the rest quantum keys by using part of the quantum keys as seed keys, obtaining encrypted quantum keys and storing the encrypted quantum keys into a key storage module;
(2) The user imports the data to be stored and starts the encryption instruction;
(3) The main controller module receives an encryption instruction of a user, calls a quantum key of the key storage module to perform decryption, triggers the encryption and decryption module to symmetrically encrypt data imported by the user by using the decryption quantum key, and stores the encrypted data in the file storage module;
(4) The encrypted data is stored to cover the original data.
The invention has the beneficial effects that:
the mobile data memory of the invention uses the quantum key with quantum true randomness to encrypt, can effectively prevent the encryption by the computer with super-strong computing power, has higher level data encryption security, and has the following technical advantages:
1. the data memory is internally provided with the quantum key generation module, so that the quantum key can be generated at any time to supply the key requirement of encrypting and decrypting the file, the quantum key is not required to be transmitted through a quantum trunk line and a wireless distribution mode, and the data encryption and decryption using requirement of a larger scale number can be supported.
2. A symmetric encryption algorithm is adopted instead of an asymmetric key, because the public key and the private key of the asymmetric key are fixed, the security depends on mathematical complexity, and the risk of key leakage or algorithm hacking exists. The built-in quantum key generation module can continuously generate the quantum key, realizes a one-time encryption and decryption mode, effectively solves the technical problems of the asymmetric key, and has higher-level data encryption security.
Drawings
FIG. 1 is a block diagram of a mobile data storage device in accordance with a preferred embodiment of the present invention;
fig. 2 is a flow chart of storing data and reading data in the mobile data storage device shown in fig. 1.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and specific examples, which are not intended to be limiting, so that those skilled in the art will better understand the invention and practice it.
Examples
Referring to fig. 1, the embodiment discloses a mobile data storage terminal based on quantum key encryption, which comprises a main controller module, an interface module, a memory, a built-in quantum key generation module, an encryption and decryption module, a positioning module, a GPRS/GSM module, a power module and a built-in power module. The following only describes the structure and functions of each part one by one:
1. interface module
The interface module is connected with the mobile data storage terminal (hereinafter referred to as the local machine) and the external terminal or the data host machine in a wired connection mode in a machine connection state, so that the data communication between the local machine and the external terminal or the data host machine is realized; the interface module is also connected with the peripheral charging equipment in a wired connection mode to charge the power supply module. The interface module can be configured as a universal USB interface, a serial data interface or a parallel data interface, such as a USB3.0 interface, an RJ45 interface RS-485 interface or an RS-422 interface, according to requirements; the user-customized dedicated data interface can also be configured according to the use needs of the user.
2. Power supply module
The power module provides power for each load of the local machine when the local machine operates. The power module can be configured as a storage battery and is connected with the peripheral charging equipment through the interface module for charging.
3. Built-in power supply module
The built-in power supply module is used for supplying power autonomously, and when the built-in power supply module is not connected with external equipment, the energy consumption requirements of a user on remote management, monitoring and positioning of the storage terminal are maintained. The built-in power supply module can be configured as a storage battery and is connected with the peripheral charging equipment through the interface module for charging.
4. Memory device
The memory may be configured as a FLASH memory array, RAM, FIFO, RAM, FIFO, or in the form of a memory bank, TF card, preferably as a FLASH memory array. The device comprises a file storage module and a key storage module, wherein the key storage module is used for storing an encrypted quantum key, and the file storage module is used for storing data encrypted by using the quantum key.
5. Quantum key generation module
The quantum key for encrypting the source data is generated by a quantum key generation module which is built in the device, the quantum key generation module can be configured into a quantum true random number generator chip, the quantum key generated by the quantum true random number generator chip is a key with true randomness, and the unconditional security of the data can be ensured by encrypting the data through the true random key. In order to improve the security of the quantum key in a storage stage after generation, a part of the quantum key is selected from the quantum keys generated by the quantum true random number generator chip as a seed key to encrypt the rest of the quantum keys, and the encrypted quantum key is stored in a key storage module for standby (or standby). Encryption and decryption of the quantum key supports, but is not limited to, AES encryption algorithm, DES encryption algorithm, SM2 encryption algorithm, SM4 encryption algorithm.
6. Encryption and decryption module
The encryption and decryption module is used for implementing encryption and decryption actions, including encryption and decryption of the quantum key and encryption and decryption of source data, and encryption data comprises encryption and decryption operations on all files under a single file or a folder. The encryption and decryption module supports, but is not limited to, an AES encryption algorithm, a DES encryption algorithm, an SM2 encryption algorithm, and an SM4 encryption algorithm.
7. Positioning module
The positioning module is used for positioning the current position information of the local machine and can be configured as a GPS positioning module which is already mature at present. The method is convenient for a user to locate the position of the local machine under the condition that the local machine is lost or stolen, and provides a basis for subsequent finding back of the local machine.
8. GPRS/GSM module
The GPRS/GSM module is used for receiving the state instruction of the external terminal equipment and ensuring that the state of the local machine is in the control range of the user.
9. Main controller module
The main controller module is provided with an FPGA chip, takes the FPGA chip as a control core, is configured as a programmable micro data processor built in the host, and executes a preset data processing program:
the FPGA chip is provided with a radio frequency signal receiving end and is used for receiving the local position information sent by the positioning module;
the FPGA chip is provided with a communication interface end and is used for connecting and communicating with the interface module;
the FPGA chip is provided with a communication interface end and is used for connecting and communicating with the GPRS/GSM module;
the FPGA chip is provided with a control interface end and is used for controlling the connection of the quantum key generation module and triggering the quantum key generation module to generate a quantum key;
the FPGA chip is provided with a control interface end and is used for controlling and connecting with the encryption and decryption module;
the FPGA chip is provided with a data interface end and is used for communicating with the memory;
the FPGA chip is provided with a power interface and is used for being electrically connected with the power module and receiving power supply of the power module.
As shown in fig. 1, the mobile data storage terminal of the above design is used for storing data:
(1) The user connects with external terminal equipment (such as a computer or a mobile phone terminal) through an interface module, autonomously installs an application program, enters the application program through the APP to activate the primary use equipment, and completes account registration and mobile phone number binding. Triggering a quantum key generation module to generate a quantum key when an application program is activated, encrypting the rest quantum keys by using part of the quantum keys as seed keys, obtaining the encrypted quantum keys, and storing the encrypted quantum keys into a key storage module for calling at any time.
(2) The user imports the data to be stored and initiates the encryption instruction. The files to be stored can be directly dragged to the local machine through the computer, or uploaded to the local machine through the mobile phone APP.
(3) The main controller module receives an encryption instruction of a user, calls the quantum key of the key storage module to perform decryption, triggers the encryption and decryption module to symmetrically encrypt data imported by the user by using the decryption quantum key, and stores the encrypted data in the file storage module. When a file is selected, encryption operation can be carried out on a single file or a folder; the encryption operation can also be selected to be performed on all files under the folder. When the encryption and decryption module performs encryption operation on a plurality of files, the thread number setting can be improved, and the greater the thread number setting is, the faster the encryption and decryption speed is. When the quantum key quantity of the key storage module is lower than a set threshold value, a request is sent to the main controller module, the main controller module sends an instruction to the quantum key generation module, a quantum key is generated, and the quantum key is encrypted and stored in the key storage module.
(4) The encrypted data is stored to cover the original data.
For reading data:
the read data can be read after the application program is opened through the computer terminal or the mobile phone terminal and the password is input.
S1) if the user only views the file and does not need to change the file to save the file again, the original file is not covered by default, and the original key is unchanged after the file is normally closed. If the user wants to modify the file, a new key needs to be input for encryption during storage, and the original file is covered for storage.
S2) if the user tries to read the file through other unauthorized users, a short message prompt is sent to the mobile phone of the user, and whether the file is allowed to be checked is requested. If the user agrees to view, the dynamic verification code is sent to the unauthenticated user, the unauthenticated user accesses the hard disk through the dynamic verification code, and the authority of the unauthenticated user is in a read-only mode.
S3) if the hard disk is lost, the user can search for positioning through a GPS module arranged in the mobile hard disk to retrieve.
The above-described embodiments are merely preferred embodiments for fully explaining the present invention, and the scope of the present invention is not limited thereto. Equivalent substitutions and modifications will occur to those skilled in the art based on the present invention, and are intended to be within the scope of the present invention. The protection scope of the invention is subject to the claims.

Claims (8)

1. The utility model provides a mobile data storage terminal based on quantum key encryption, includes master controller module, interface module, memory, encryption decryption module and power module, its characterized in that: the system comprises a main controller module, a storage, a quantum key generation module, an encryption and decryption module and a storage, wherein the main controller module is electrically connected with the storage, the storage is used for storing a single file or all files under a folder, and the encryption and decryption module is used for encrypting and decrypting the single file or all files under the folder based on the quantum key;
among the quantum keys generated by the quantum key generation module, part of the quantum keys are used as seed keys to encrypt the rest quantum keys, and the quantum keys encrypted by the seed keys are stored in a key storage unit of the memory;
when the mobile data storage terminal is used for storing data:
(1) The user connects with the external terminal equipment through the interface module, installs and activates the application program; triggering a quantum key generation module to generate a quantum key when an application program is activated, encrypting the rest quantum keys by using part of the quantum keys as seed keys, obtaining encrypted quantum keys and storing the encrypted quantum keys into a key storage module;
(2) The user imports the data to be stored and starts the encryption instruction;
(3) The main controller module receives an encryption instruction of a user, calls a quantum key of the key storage module to perform decryption, triggers the encryption and decryption module to symmetrically encrypt data imported by the user by using the decryption quantum key, and stores the encrypted data in the file storage module;
(4) The encrypted data is stored to cover the original data.
2. The mobile data storage terminal based on quantum key encryption as claimed in claim 1, wherein: the system also comprises a positioning module, wherein the positioning module is electrically connected to the main controller module and is used for positioning the current position information of the local machine.
3. The mobile data storage terminal based on quantum key encryption as claimed in claim 2, wherein: the positioning module is a GPS positioning module.
4. The mobile data storage terminal based on quantum key encryption as claimed in claim 1, wherein: the GPRS/GSM module is electrically connected to the main controller module and is used for receiving a state instruction of external terminal equipment, and the main controller module executes storage operation according to the state instruction.
5. The mobile data storage terminal based on quantum key encryption as claimed in claim 1, wherein: the system also comprises a built-in power supply module which is electrically connected to the main controller module and is used for supplying power autonomously, and when the storage terminal is not connected with external equipment, the energy consumption requirements of a user on remote management, monitoring and positioning of the storage terminal are maintained.
6. The mobile data storage terminal based on quantum key encryption as claimed in claim 1, wherein: the encryption and decryption module supports, but is not limited to, an AES encryption algorithm, a DES encryption algorithm, an SM2 encryption algorithm, and an SM4 encryption algorithm.
7. The mobile data storage terminal based on quantum key encryption as claimed in claim 1, wherein: the memory configuration comprises a file storage module and a key storage module, wherein the file storage module and the key storage module are respectively used for storing encrypted ciphertext information and encrypted quantum keys.
8. The mobile data storage terminal based on quantum key encryption as claimed in claim 7, wherein: the interface module comprises a USB interface and an RJ45 interface.
CN201910614089.3A 2019-07-09 2019-07-09 Mobile data storage terminal based on quantum key encryption Active CN110188564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910614089.3A CN110188564B (en) 2019-07-09 2019-07-09 Mobile data storage terminal based on quantum key encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910614089.3A CN110188564B (en) 2019-07-09 2019-07-09 Mobile data storage terminal based on quantum key encryption

Publications (2)

Publication Number Publication Date
CN110188564A CN110188564A (en) 2019-08-30
CN110188564B true CN110188564B (en) 2024-01-26

Family

ID=67725340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910614089.3A Active CN110188564B (en) 2019-07-09 2019-07-09 Mobile data storage terminal based on quantum key encryption

Country Status (1)

Country Link
CN (1) CN110188564B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650011A (en) * 2019-10-29 2020-01-03 江苏亨通问天量子信息研究院有限公司 Encryption storage method and encryption storage card based on quantum key
CN112528302A (en) * 2020-12-11 2021-03-19 山东极光智能科技有限公司 Quantum mobile storage device and working method thereof
CN112865967A (en) * 2021-02-05 2021-05-28 安徽华典大数据科技有限公司 Mobile data memory based on quantum key encryption
CN112926519A (en) * 2021-03-29 2021-06-08 安徽华典大数据科技有限公司 Identity recognition system based on quantum secret data
CN113255923B (en) * 2021-05-31 2021-09-14 湖北大学 Quantum realization circuit of SM4 algorithm
CN115348233A (en) * 2022-08-25 2022-11-15 浙江启明量子信息技术有限公司 Standard mail system transparent encryption method, medium and computer equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355422A (en) * 2008-07-16 2009-01-28 冯振周 Novel authentication mechanism for encrypting vector
CN103152171A (en) * 2013-03-26 2013-06-12 桂林电子科技大学 Inner wheel displacement flow password encryption method with variable key
KR20160024504A (en) * 2014-08-26 2016-03-07 삼성에스디에스 주식회사 Apparatus and Method for Generating Encryption Key, and Apparatus and Method for Generating Decryption Key
CN106911718A (en) * 2017-04-17 2017-06-30 江苏亨通问天量子信息研究院有限公司 Secrecy intercom system and method based on quantum key service station
CN106961330A (en) * 2017-04-17 2017-07-18 江苏亨通问天量子信息研究院有限公司 Quantum key service station
CN206805521U (en) * 2017-04-14 2017-12-26 江苏亨通问天量子信息研究院有限公司 A kind of mobile data memory unit based on quantum key encryption
CN107769912A (en) * 2016-08-16 2018-03-06 广东国盾量子科技有限公司 A kind of quantum key chip and the encipher-decipher method based on quantum key chip
WO2018161538A1 (en) * 2017-03-08 2018-09-13 广东欧珀移动通信有限公司 Encryption key writing method and mobile terminal
CN209803799U (en) * 2019-07-09 2019-12-17 江苏亨通问天量子信息研究院有限公司 Mobile data storage terminal based on quantum key encryption

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090245516A1 (en) * 2008-02-26 2009-10-01 Pasupuleti Sureshbabu Ravikiran Method and system for high entropy encryption using an unpredictable seed based on user regisration time

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355422A (en) * 2008-07-16 2009-01-28 冯振周 Novel authentication mechanism for encrypting vector
CN103152171A (en) * 2013-03-26 2013-06-12 桂林电子科技大学 Inner wheel displacement flow password encryption method with variable key
KR20160024504A (en) * 2014-08-26 2016-03-07 삼성에스디에스 주식회사 Apparatus and Method for Generating Encryption Key, and Apparatus and Method for Generating Decryption Key
CN107769912A (en) * 2016-08-16 2018-03-06 广东国盾量子科技有限公司 A kind of quantum key chip and the encipher-decipher method based on quantum key chip
WO2018161538A1 (en) * 2017-03-08 2018-09-13 广东欧珀移动通信有限公司 Encryption key writing method and mobile terminal
CN206805521U (en) * 2017-04-14 2017-12-26 江苏亨通问天量子信息研究院有限公司 A kind of mobile data memory unit based on quantum key encryption
CN106911718A (en) * 2017-04-17 2017-06-30 江苏亨通问天量子信息研究院有限公司 Secrecy intercom system and method based on quantum key service station
CN106961330A (en) * 2017-04-17 2017-07-18 江苏亨通问天量子信息研究院有限公司 Quantum key service station
CN209803799U (en) * 2019-07-09 2019-12-17 江苏亨通问天量子信息研究院有限公司 Mobile data storage terminal based on quantum key encryption

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Yi Liu 等.An Efficient Method to Enhance Bitcoin Wallet Security.2017 11th IEEE International Conference on Anti-counterfeiting,Security,and Identification(ASID).2018,第26-29页. *
基于混沌的"一组一密"分组密码;宣蕾;闫纪宁;;通信学报(S2);第111-116页 *
量子噪声随机流密码中密钥扩展模块的研究;史海勤;蒲涛;郑吉林;谭业腾;陈毓锴;;量子电子学报(02);第72-77页 *

Also Published As

Publication number Publication date
CN110188564A (en) 2019-08-30

Similar Documents

Publication Publication Date Title
CN110188564B (en) Mobile data storage terminal based on quantum key encryption
US9503433B2 (en) Method and apparatus for cloud-assisted cryptography
US8407759B1 (en) Device, method, and system for secure mobile data storage
EP2874151B1 (en) Method and apparatus for controlling access to encrypted data
CN101196855A (en) Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
CN101122942A (en) Data safe reading method and its safe storage device
CN106911476B (en) Encryption and decryption device and method
CN101159754A (en) Internet application management system operating on intelligent mobile terminal
US20210091945A1 (en) Key Processing Method and Apparatus
CN107609410A (en) Android system data guard method, terminal device and storage medium based on HOOK
CN109905233A (en) A kind of device data processing method and system
WO2011130970A1 (en) Device and method for protecting data of mobile terminal
US11775652B2 (en) Platform security mechanism
CN114764512A (en) Encryption key management
CN209803799U (en) Mobile data storage terminal based on quantum key encryption
CN102118745B (en) Method and device for secure encryption for mobile payment data, and mobile phone
CN106612247A (en) A data processing method and a storage gateway
CN106845254A (en) A kind of encrypted data transmission line for computer
CN103699853B (en) A kind of intelligent SD card and control system thereof and method
CN114340051B (en) Portable gateway based on high-speed transmission interface
CN102831360A (en) Personal electronic document safety management system and management method thereof
CN110147677A (en) The safe encrypted electronic signature mouse of quantum, computer and its encryption method
CN205193805U (en) Black USB connecting device , data transmission device , storage device and TV
CN117834137B (en) Password card switching method, device, computer equipment and storage medium
CN206741525U (en) A kind of safe U disc close based on state

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant