CN112822010B - Removable storage medium management method based on quantum key and block chain - Google Patents

Removable storage medium management method based on quantum key and block chain Download PDF

Info

Publication number
CN112822010B
CN112822010B CN202110121363.0A CN202110121363A CN112822010B CN 112822010 B CN112822010 B CN 112822010B CN 202110121363 A CN202110121363 A CN 202110121363A CN 112822010 B CN112822010 B CN 112822010B
Authority
CN
China
Prior art keywords
storage medium
removable storage
quantum key
credit granting
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110121363.0A
Other languages
Chinese (zh)
Other versions
CN112822010A (en
Inventor
张仕斌
王程
张瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Cree Fox Talent Consulting Co.,Ltd.
Shenzhen Lizhuan Technology Transfer Center Co ltd
Original Assignee
Chengdu University of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu University of Information Technology filed Critical Chengdu University of Information Technology
Priority to CN202110121363.0A priority Critical patent/CN112822010B/en
Publication of CN112822010A publication Critical patent/CN112822010A/en
Application granted granted Critical
Publication of CN112822010B publication Critical patent/CN112822010B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention provides a movable storage medium management method based on a quantum key and a block chain, which comprises the following steps: the authorization end and the management end complete the distribution of the quantum key and the index value thereof; after the participant terminal passes the identity verification of the credit granting terminal, a first quantum key index value and a credit granting certificate are obtained; the participation end initiates a movable storage medium use application to the management end and sends a first quantum key index value and a credit granting certificate; and the management terminal searches a corresponding first quantum key according to the first quantum key index value, initializes the movable storage medium by using the credit granting voucher and the first quantum key and delivers the participation terminal. The invention combines the quantum key technology and the block chain technology with the use of the secret-related movable storage medium, effectively improves the safety and traceability of the secret-related movable storage medium in the use process, avoids the illegal use problem of the movable storage medium, and provides reliable basis for the management, responsibility division and traceability of secret information.

Description

Removable storage medium management method based on quantum key and block chain
Technical Field
The invention relates to the field of computer security, in particular to a removable storage medium management method based on quantum keys and block chains.
Background
With the rapid development and update of computer network information technology, the big data era comes, and the openness, the shareability and the like of the internet bring great convenience to users, but greater information security risks also exist. In the units or enterprises with higher security requirements, such as national defense science and technology units and military enterprises, most of the security-related computers are off-line for security, so that the information is mostly transmitted through the internet or a removable storage medium. However, the existing mobile storage medium is low in confidentiality degree in use and management methods and cannot meet the increasing confidentiality requirement, so that the business secrets of a certain enterprise are heard when the business secrets are copied and carried out by internal personnel and then are spread.
Quantum cryptography is a product combining quantum mechanics and classical cryptography, and is a new and expensive research and application hotspot in the field of information security. The basic principle of quantum mechanics ensures the safety of the quantum machinery, and can provide unconditional safety theoretically. The QKD protocol is proposed to enable two communicating parties to generate and share a random, secure key for encrypting and decrypting messages. Quantum cryptography is thus increasingly applied to the field of information security. The quantum key is generated through a series of operations of the two parties after the two parties establish communication. The generation process is the transmission process, and by using the characteristics of quantum mechanics, two parties can simultaneously generate a string of random numbers in respective hands, and the random number sequences of the two parties can be ensured to be completely identical without looking at the data of the other party. This sequence of random numbers is the key. However, in the prior art, quantum keys are mostly used for instant information transfer, and the research on the aspect of storage and use of the quantum keys for secret-related information is less.
The block chain technology can provide faster and safer equipment access, and the authentication cost is lower, so that congestion caused by large-scale equipment access is avoided. The decentralized authentication mechanism also provides a better choice for multi-party supervision.
The technical problem to be solved in the field is to provide a safe, reliable, efficient and convenient removable storage medium management method by fusing the contents of the three aspects.
Disclosure of Invention
The invention aims to provide a removable storage medium management method based on a quantum key and a block chain, which improves the safety of information transmission by combining computer encryption information and the quantum key; by combining the supervision flow and the block chain technology, the transparency and traceability of supervision are improved.
In order to achieve the purpose of the invention, the technical scheme adopted by the invention is as follows:
a method for removable storage media management based on quantum keys and blockchains, comprising:
s1, a credit granting end and a management end complete distribution of a quantum key and an index value thereof;
s2, after the participant terminal passes the identity verification of the credit granting terminal, a first quantum key index value and a credit granting certificate are obtained;
s3, the participating end initiates a movable storage medium use application to the management end and sends the first quantum key index value and the credit granting certificate;
and S4, the management terminal searches a corresponding first quantum key according to the first quantum key index value, initializes the movable storage medium by using the credit certificate and the first quantum key, and delivers the movable storage medium to a participation terminal.
In some preferred embodiments, in step s5, the trust authority and the management authority respectively package and store the quantum key index value and the trust voucher in the block chain.
In some preferred embodiments, the method further comprises: and S6, the movable storage medium acquires the used process information of the movable storage medium, and the process information is packaged and stored in a block chain.
In some preferred embodiments, the trust credential comprises: identity information, credit granting time information and credit granting authority information of the participating end.
In some preferred embodiments, the method of initializing a removable storage medium comprises:
setting a starting password of the removable storage medium according to the identity information of the participating end;
setting a time range within which the removable storage medium can be used according to the credit granting time information;
and setting the mode and range of the removable storage medium which can be used according to the credit granting authority information.
In some preferred embodiments, the method of initializing a removable storage medium comprises: and setting the first quantum key as a data read-write key of the removable storage medium.
In some preferred embodiments, the removable storage media may be used in a manner that includes:
reading, copying and/or deleting the data information stored on the removable storage medium;
writing new data information on the removable storage medium;
reading a first quantum key stored on the removable storage media.
In some preferred embodiments, the range in which the removable storage media can be used includes:
an address range of a physical operation side where the removable storage medium can be used;
a range of data types that the removable storage media may be used with.
Compared with the prior art, the invention has the beneficial characteristics that:
the quantum key technology and the block chain technology are combined with the use of the secret-related movable storage medium, so that the safety and the traceability of the secret-related movable storage medium in the use process are effectively improved, the illegal use problem of the movable storage medium is avoided, and a reliable basis is provided for the management, responsibility division and traceability of secret information.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of the present disclosure;
FIG. 2 is a flow chart of another preferred embodiment of the present disclosure;
FIG. 3 is a flow chart of another preferred embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described with reference to the accompanying drawings. In the description of the present invention, it is to be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer", and the like, are used in the orientations and positional relationships indicated in the drawings, which are based on the orientations and positional relationships indicated in the drawings, and are used for convenience of description and simplicity of description, but do not indicate or imply that the devices or elements referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, are not to be construed as limiting the present invention.
Example 1
As shown in fig. 1, a removable storage medium management method based on quantum key and block chain includes the following steps:
and S1, the authorization end and the management end complete the distribution of the quantum key and the index value thereof.
The distribution of the quantum key and the index value thereof can be realized by QKD equipment. The quantum key distribution protocols used by the QKD device are many, such as the BB84 protocol, B92 protocol, or E91 protocol, and the invention is not limited in this respect. In some preferred cases, the number of the quantum keys and the index values thereof may be set as required, and when the number is large, management may be performed by setting up a key pool, but it should be understood that the key pool is not public, but a private key pool is established and stored locally by the trusted side and the management side according to the circumstances of the trusted side and the management side.
And S2, after the participant terminal passes the identity verification of the credit granting terminal, obtaining a first quantum key index value and a credit granting certificate.
The purpose of verifying the identity of the participating end by the credit granting end is to confirm the identity of the participating end and avoid the occurrence of counterfeiting and tampering, and the implementation mode of the identity verification is not limited too much. After the verification is passed, the participating end obtains the index value of the first quantum key instead of the first quantum key, so that the leakage of the quantum key is avoided, and the safety of the key using process is improved. On the other hand, the credit voucher has the functions of: and providing basis for the management end to initialize the removable storage medium and the participation end to use the removable storage medium in the subsequent steps. The details of the credit voucher can be set by those skilled in the art according to the actual situation.
And S3, the participating end initiates a movable storage medium use application to the management end and sends the first quantum key index value and the credit granting certificate.
In the invention, the management terminal is subordinate to the credit granting terminal and the number of the management terminals is not necessarily unique, a plurality of physical operation terminals are arranged below the management terminal, and the physical operation terminals comprise an electronic computer, a mobile portable computer or other equipment with a logic operation function, wherein the electronic computer, the mobile portable computer or other equipment can use a removable storage medium. The management side has a plurality of removable storage media. The participating end comprises an individual, entity or organization having removable storage media usage requirements.
And S4, the management terminal searches a corresponding first quantum key according to the first quantum key index value, initializes the movable storage medium by using the credit certificate and the first quantum key, and delivers the movable storage medium to a participation terminal.
It should be understood that the initialization refers to: a plurality of programs for realizing the functions described later are built in the removable storage medium, and initial preparation works such as conditions and ranges for which the removable storage medium can be used are set according to the credit information in the credit voucher. The initial limit information such as the built-in program, the use condition, the range and the like exists in the life cycle of the whole removable storage medium and can only be operated, modified or deleted by the management terminal. Therefore, the above process can also be understood as a management side making several removable storage media.
The initialization method of the removable storage medium needs to be determined according to the specific content of the credit granting voucher, and when the credit granting contents are different, the initialization mode does not need to be the same. Therefore, the present embodiment is not further limited.
Example 2
This embodiment is developed on the basis of embodiment 1 described above.
In order to strengthen the supervision and traceability of the authorization and use processes of the removable storage medium, in this embodiment, the method further includes step s5. the trust granting end and the management end respectively pack and store the quantum key index value and the trust granting certificate in the block chain.
It should be understood that there are two information blocks stored in the block chain in this embodiment, namely, a first information block produced by the trusted side and a second information block produced by the management side, and the contents of the two information blocks are the same. When either party generates repudiation on the result or a third party needs to trace source and supervise, the two information blocks can be searched from the block chain and compared. The present embodiment does not limit the nature of the block chain, and it may be a public chain or a private chain. When the block chain is a private chain, the embodiment may further optimize as follows: the credit granting terminal packs the quantum key index value and the credit granting certificate and then stores the packed value and the credit granting certificate in the first private block chain; and the management terminal packs the quantum key index value and the credit granting certificate and then stores the quantum key index value and the credit granting certificate in the second private block chain.
Example 3
This embodiment is developed on the basis of embodiment 2 described above.
In order to further enhance the supervision and tracing of the authorization and the use process of the removable storage medium, in this embodiment, a step s6 is further included.
The above steps can be realized by a built-in program. When the participant terminal connects the removable storage medium to the operation terminal, the removable storage medium starts to acquire the process information used by itself, including but not limited to: the data type and data amount read, deleted and/or stored in the using process, the ID of the operation end, the address information and other using process information. After the use process information is obtained, the use process information is packaged by using a built-in related program and is uploaded and stored in a block chain. Up to this point, the usage information about the removable storage medium is recorded in the blockchain automatically and uncontrollably by the participating end, preventing the participating end from illegally using the removable storage medium, and facilitating the tracing and supervision of a third party supervision authority. As will be appreciated by those skilled in the art, the term illicit use as used herein refers to: the removable storage medium is used by some unauthorized party and/or used in an unauthorized manner and/or used in a manner different from the authorized manner.
Example 4
This embodiment is developed on the basis of embodiment 1 described above.
The embodiment provides specific contents of the credit granting voucher, including identity information, credit granting time information, and credit granting authority information of a participating end.
Wherein, if the participating end is the equipment end, the identity information includes: information which can express the identity of the equipment, such as equipment ID, equipment physical address, equipment network address and the like; if the participant is a person, the identity information includes: descriptive identity information such as name, sex, birthday and the like, and physiological identity information such as fingerprints, pupils, gene sequences and the like. It should be understood that the selection of the identity information is not limited to a single item, and may also be a combination of multiple items, and the embodiment is not further limited.
The credit granting time information comprises: the authentication passes timestamp information, start time information of authorized use, end time information of authorized use, and the like.
The credit granting authority information is a specific mode that the credit granting end can grant the credit granting end to use the removable storage medium according to the identity information of the participating end. For example, which one or more of the three basic operation permissions of reading, writing and deleting is granted to the participant side, and for example, whether the participant side is allowed to copy or use the first quantum key itself or only allowed to encrypt and decrypt data by using the first quantum key. These problems regarding the manner of use of removable storage media need to be determined by those skilled in the art based on the specific trust method of the trust end, and the present invention does not make a uniform requirement.
Example 5
This embodiment is developed on the basis of embodiment 4 described above.
The present embodiment presents another preferred method of initializing a removable storage medium, comprising:
and setting a starting password of the removable storage medium according to the identity information of the participating end. The password is authentication information used for authenticating the identity of the participant terminal, and when the authentication information is consistent with the identity information of the participant terminal contained in the credit authorization certificate, the removable storage medium is allowed to be started to execute further operation. It should be understood that there are many authentication methods, and those skilled in the art are required to set the authentication method according to the specific content of the identity information. In this embodiment, a further explanation is given in conjunction with the related identity information example in the foregoing embodiment 4. It should be understood that such an explanation is for the convenience of better understanding of the logical contents of the present application by those skilled in the art, and is not intended to limit the scope of the present application. If the participating end is the device end and the identity information thereof is the device ID, the start password in this embodiment is set as the device ID, and when the portable storage medium is used, the device ID of the participating end is first read by the portable storage medium, and if the device ID is the same as the device ID preset by the start password, the portable storage medium is allowed to be started to perform the next operation. If the participating end is a person and the identity information of the participating end is name and birthday, the start password in the embodiment is set as a character string containing name and birthday, which is input according to a certain format requirement, for example, a character string in a pinyin plus digital format. There are many similar authentication methods, and the description of this embodiment is omitted.
Setting a time range within which the removable storage medium can be used according to the credit granting time information; wherein the time range refers to a specific start time and end time when the removable storage medium is authorized to be used, it should be understood that the range needs to be determined according to the specific content of the credit time information. It may be a period of time starting from the time of authorization or a period of time with a definite start time and end time. At times when the time horizon is unexpected, the removable storage media cannot be booted.
And setting the mode and range of the removable storage medium which can be used according to the credit granting authority information. It should be understood by those skilled in the art that, since the present invention relates to reading and writing of secret information, the usage manner and the setting of the range cannot be determined according to the manner similar to the ordinary hierarchical authorization in the conventional means, but the technical personnel is required to determine according to the specific authorization rule of the authorization end.
Example 6
This embodiment is developed on the basis of embodiment 4 described above.
The present embodiment presents a preferred method of initializing a removable storage medium, comprising: and setting the first quantum key as a data read-write key of the removable storage medium. Those skilled in the art will appreciate that, among programs built in the removable storage medium, programs implementing underlying encryption may be included, with the purpose of: an encryption program encrypted by a specified key is attached, and data processed by the mobile storage medium, whether stored or read, needs to be encrypted and decrypted by the encryption program to be obtained. Thereby improving the security of data reading and writing and the confidentiality of secret information. In this embodiment, the key of the encryption program is designated as the first quantum key.
Example 7
This embodiment is developed on the basis of embodiment 6 described above.
The present embodiment provides a better way for a removable storage medium to be used, including:
reading, copying and/or deleting the data information stored on the removable storage medium;
writing new data information on the removable storage medium;
reading a first quantum key stored on the removable storage media.
It should be understood that the above-described modes of use may be authorized for use alone or in combination.
Example 8
This embodiment is developed on the basis of embodiment 6 described above.
The present embodiment provides a preferred range in which the removable storage medium can be used, including:
the physical operating side address range in which the removable storage medium can be used. The physical operation end is subordinate to the management end and has a physical address or a network IP address, and the physical operation end capable of using the removable storage medium can be limited within a certain range by specifying the address range, such as the range of the unit or the department. Thereby preventing the participating end from using the removable storage medium on the illegal physical manipulation end.
A range of data types that the removable storage media can be used with. The data type refers to a data type allowing the participating end to read and write and delete on the removable storage medium, and if the participating end is limited to read and write the data of the picture type, the participating end can only read and write the data of the picture type on the removable storage medium, but other types of data stored on the removable storage medium, such as documents, PDFs, programs and other types of data, are not readable and writable. Thereby preventing the participating end from illegally using the data on the removable storage medium.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, the operations of processes described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described herein (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be implemented in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated onto a computing platform, such as a hard disk, optically read and/or write storage media, RAM, ROM, etc., so that it is readable by a programmable computer, which when read by the computer can be used to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described herein includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein.
A computer program can be applied to input data to perform the functions described herein to transform the input data to generate output data that is stored to non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.

Claims (6)

1. A removable storage medium management method based on quantum keys and block chains is characterized by comprising the following steps:
s1, a credit granting end and a management end complete distribution of a quantum key and an index value thereof;
s2, after the participant terminal passes the identity verification of the credit granting terminal, a first quantum key index value and a credit granting certificate are obtained;
s3, the participating end initiates a movable storage medium use application to the management end and sends the first quantum key index value and the credit granting certificate;
s4, the management end searches a corresponding first quantum key according to the first quantum key index value, initializes the movable storage medium by using the credit granting certificate and the first quantum key, and delivers a participation end;
s5, the credit granting end and the management end respectively pack the quantum key index value and the credit granting voucher and then store the packed values in a block chain;
and S6, the movable storage medium acquires the used process information, and the process information is packaged and stored in the block chain.
2. The removable storage media management method of claim 1, wherein the trust credential comprises: identity information, credit granting time information and credit granting authority information of the participating end.
3. The removable storage media management method of claim 2, wherein the method of initializing the removable storage media comprises:
setting a starting password of the removable storage medium according to the identity information of the participating end;
setting a time range within which the removable storage medium can be used according to the credit granting time information;
and setting the usable mode and range of the removable storage medium according to the credit authorization information.
4. The removable storage media management method of claim 3, wherein the method of initializing the removable storage media comprises: and setting the first quantum key as a data read-write key of the removable storage medium.
5. The removable storage media management method of claim 3 or 4, wherein the removable storage media is usable in a manner comprising:
reading, copying and/or deleting the data information stored on the removable storage medium;
writing new data information on the removable storage medium;
reading a first quantum key stored on the removable storage media.
6. The removable storage medium management method according to claim 3 or 4, wherein the range in which the removable storage medium can be used includes:
an address range of a physical operation side where the removable storage medium can be used;
the removable storage media may be of a data type range that can be used.
CN202110121363.0A 2021-01-28 2021-01-28 Removable storage medium management method based on quantum key and block chain Active CN112822010B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110121363.0A CN112822010B (en) 2021-01-28 2021-01-28 Removable storage medium management method based on quantum key and block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110121363.0A CN112822010B (en) 2021-01-28 2021-01-28 Removable storage medium management method based on quantum key and block chain

Publications (2)

Publication Number Publication Date
CN112822010A CN112822010A (en) 2021-05-18
CN112822010B true CN112822010B (en) 2022-08-26

Family

ID=75859994

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110121363.0A Active CN112822010B (en) 2021-01-28 2021-01-28 Removable storage medium management method based on quantum key and block chain

Country Status (1)

Country Link
CN (1) CN112822010B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113472534A (en) * 2021-07-23 2021-10-01 厦门潭宏信息科技有限公司 Block chain data encryption method, equipment and storage medium
CN114285551B (en) * 2021-12-08 2023-06-16 中国联合网络通信集团有限公司 Quantum key distribution method, quantum key distribution device, readable storage medium and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9313180B1 (en) * 2015-03-31 2016-04-12 Corning Incorporated Systems and methods for quantum key generation
CN107453868A (en) * 2017-09-01 2017-12-08 中国电子科技集团公司第三十研究所 A kind of safe and efficient quantum key method of servicing
CN107959566A (en) * 2016-10-14 2018-04-24 阿里巴巴集团控股有限公司 Quantal data key agreement system and quantal data cryptographic key negotiation method
CN108616357A (en) * 2018-05-04 2018-10-02 北京邮电大学 A method of being suitable for key management and the Fast synchronization of quantum key distribution system
CN109714166A (en) * 2019-03-07 2019-05-03 山东鲁能软件技术有限公司 A kind of mobile distribution method, system, terminal and storage medium based on quantum key
CN111431893A (en) * 2020-03-20 2020-07-17 清华大学 Bottom line type information interaction management system
CN111490875A (en) * 2020-04-23 2020-08-04 成都信息工程大学 Cloud data semi-quantum secure sharing method and system based on proxy re-encryption
CN111680325A (en) * 2020-06-05 2020-09-18 深圳前海微众银行股份有限公司 Data escorting method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018432B (en) * 2017-03-28 2020-02-14 华为技术有限公司 Media content licensing method and device
CN110609772A (en) * 2018-06-15 2019-12-24 翟红鹰 Block chain-based device hosting method, system, device and storage medium
GB2581528B (en) * 2019-02-22 2022-05-18 Toshiba Kk A method, a communication network and a node for exchanging a cryptographic key
CN111164594B (en) * 2019-07-02 2023-08-25 创新先进技术有限公司 System and method for mapping a de-centralized identity to a real entity
CN111428254A (en) * 2020-03-24 2020-07-17 财付通支付科技有限公司 Key storage method, device, equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9313180B1 (en) * 2015-03-31 2016-04-12 Corning Incorporated Systems and methods for quantum key generation
CN107959566A (en) * 2016-10-14 2018-04-24 阿里巴巴集团控股有限公司 Quantal data key agreement system and quantal data cryptographic key negotiation method
CN107453868A (en) * 2017-09-01 2017-12-08 中国电子科技集团公司第三十研究所 A kind of safe and efficient quantum key method of servicing
CN108616357A (en) * 2018-05-04 2018-10-02 北京邮电大学 A method of being suitable for key management and the Fast synchronization of quantum key distribution system
CN109714166A (en) * 2019-03-07 2019-05-03 山东鲁能软件技术有限公司 A kind of mobile distribution method, system, terminal and storage medium based on quantum key
CN111431893A (en) * 2020-03-20 2020-07-17 清华大学 Bottom line type information interaction management system
CN111490875A (en) * 2020-04-23 2020-08-04 成都信息工程大学 Cloud data semi-quantum secure sharing method and system based on proxy re-encryption
CN111680325A (en) * 2020-06-05 2020-09-18 深圳前海微众银行股份有限公司 Data escorting method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks";Fernandez-Carames;《IEEE Access》;20200123;全文 *
北京邮电大学学报 2005年 第28卷 第1~6期 总目次;《北京邮电大学学报》;20051230(第06期);全文 *

Also Published As

Publication number Publication date
CN112822010A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
US9049010B2 (en) Portable data encryption device with configurable security functionality and method for file encryption
CN101819612B (en) Versatile content control with partitioning
CN106980794A (en) TrustZone-based file encryption and decryption method and device and terminal equipment
CN105117635B (en) A kind of safety system and method for local data
Hazay et al. Constructions of truly practical secure protocols using standardsmartcards
KR20210040078A (en) Systems and methods for safe storage services
CN101908106A (en) Memory system with versatile content control
CN104662870A (en) Data security management system
CN102906755A (en) Content control method using certificate revocation lists
CN103310169A (en) SD (Secure Digital) card data protection method and protection system thereof
US11329817B2 (en) Protecting data using controlled corruption in computer networks
US10154015B1 (en) Executable coded cipher keys
CN112822010B (en) Removable storage medium management method based on quantum key and block chain
CN106992851A (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
CN106101150A (en) The method and system of AES
CN103378971A (en) Data encryption system and method
CN105468940A (en) Software protection method and apparatus
CN109815747A (en) Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
WO2019199813A2 (en) Managed high integrity blockchain and blockchain communications that utilize containers
CN109005196A (en) Data transmission method, data decryption method, device and electronic equipment
Soman et al. Secure storage and sharing of visitor images generated by smart entrance on public cloud
CN108985079A (en) Data verification method and verifying system
Lopes Implementation of practical and secure methods for storage of cryptographic keys in applications
WO2023052845A2 (en) Protecting data using controlled corruption in computer networks
WO2024026428A1 (en) Digital identity allocation, assignment, and management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230412

Address after: No. 1758 Jiazhu Road, Jiading District, Shanghai, 201800

Patentee after: Shanghai Cree Fox Talent Consulting Co.,Ltd.

Address before: 518000 room 321, building 2, Nanke Chuangyuan Valley, Taoyuan community, Dalang street, Longhua District, Shenzhen City, Guangdong Province

Patentee before: Shenzhen lizhuan Technology Transfer Center Co.,Ltd.

Effective date of registration: 20230412

Address after: 518000 room 321, building 2, Nanke Chuangyuan Valley, Taoyuan community, Dalang street, Longhua District, Shenzhen City, Guangdong Province

Patentee after: Shenzhen lizhuan Technology Transfer Center Co.,Ltd.

Address before: 610225, No. 24, Section 1, Xuefu Road, Southwest Economic Development Zone, Chengdu, Sichuan

Patentee before: CHENGDU University OF INFORMATION TECHNOLOGY

TR01 Transfer of patent right