CN113132090B - System for sharing quantum key and secret communication method based on system - Google Patents
System for sharing quantum key and secret communication method based on system Download PDFInfo
- Publication number
- CN113132090B CN113132090B CN201911414925.XA CN201911414925A CN113132090B CN 113132090 B CN113132090 B CN 113132090B CN 201911414925 A CN201911414925 A CN 201911414925A CN 113132090 B CN113132090 B CN 113132090B
- Authority
- CN
- China
- Prior art keywords
- quantum
- key
- communication
- service
- cipher device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a system for sharing a quantum key and a secret communication method based on the system. The method is characterized in that a shared secret key is generated between a quantum secret key supply service network and a secret key distribution terminal arranged in a public place, the shared secret key is stored in each quantum cipher device built in the secret key distribution terminal, and the quantum cipher device can be taken away by a user for use; when the quantum cipher is connected with civil communication terminal, the latter can use quantum key to make secret communication. The quantum key device for sharing use is put in, so that the problems of difficulty in use, high cost, low use efficiency and the like in daily life in the centralized small-scale operation of the traditional quantum secret system are solved.
Description
Technical Field
The invention belongs to the technical field of secret communication, and particularly relates to a system for sharing a quantum key and a secret communication method based on the system.
Background
At present, some quantum secret communication networks using quantum keys exist, which can cover one city or several cities and can provide secret telephone, fax, file transmission and other services for users. However, such quantum secret communication networks are generally built for specific clients and most of them are enterprises of institutions, and users are limited to the limited geographical coverage range of the quantum secret communication networks, for example, the quantum secret communication networks are accessed to a telephone inside a unit, and users can only use the quantum secret communication networks in the office inside the unit. When the quantum secret key protection is not needed, the equipment connected to the quantum secret communication network is idle, so that the resource waste is caused.
In daily life, the communication in most occasions does not need to be strictly secret, but there is also a demand for secret communication, if a user uses a home computer or a personal mobile phone, the user wants to support a quantum key for some application occasions, the existing technical scheme cannot be satisfied, and for the personal user, if the user accesses a quantum secret communication network only for the secret demands of a few occasions, the cost is high.
Therefore, there is an urgent need for a key sharing method that can achieve key protection on demand, with low cost and easy use for the parents.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a system for sharing a quantum key and a secret communication method based on the system, and a scheme for secret communication by using the quantum key in a social low cost manner is realized by putting in a quantum key device for sharing use, so that the problems of difficult use, high cost, low use efficiency and the like in the centralized small-scale operation of the conventional quantum secret system are solved.
In order to achieve the above purpose, the invention adopts the following technical scheme:
a system for sharing quantum key includes a quantum key supply service network, one or more key distribution terminals placed in public place, one or more available quantum ciphers are set in each key distribution terminal, the user takes one or more quantum ciphers from the key distribution terminal to use by using personal identity information, or using a form of paying rent and deposit or using a third party social credit tool as a basis, and returns the one or more quantum ciphers to the key distribution terminal after use.
Further, the quantum key supply service network is connected with the key distribution terminal in a wired mode, and the key distribution terminal is electrically connected with each quantum cipher device in the key distribution terminal.
Further, a shared key is generated between the quantum key supply service network and the key distribution terminal, and the shared key is filled into a plurality of quantum ciphers corresponding to the inside by the key distribution terminal.
Further, after the quantum cipher device is returned to the key distribution terminal after the quantum cipher device is used, the key distribution terminal judges whether the quantum key in the quantum cipher device is used, if so, a message is sent to the quantum key supply service network, the quantum key supply service network and the key distribution terminal generate a section of new shared key, and the new shared key is stored in the quantum cipher device to replace the original shared key between the quantum key supply service network and the quantum key supply service network.
According to a second object of the present invention, there is also provided a secret communication method based on the system, each communication terminal being connected to a quantum cipher device, the method comprising the steps of:
the quantum cipher device connected with each communication terminal acquires the service key of the communication from the quantum key supply service network, and the information and the service key transmitted between the quantum key supply service network and the quantum cipher device are protected by the shared key between the quantum key supply service network and the quantum cipher device;
The communication terminals use the service keys in the respective quantum ciphers for secret communication.
Further, the implementation manner of obtaining the service key by the two quantum ciphers is as follows:
the two communication parties respectively supply the service network with the vector subkeys through the respective quantum ciphers to request the service keys required by the communication;
the quantum key supplying service network receives the request, generates a service key, sends the service key to the two quantum ciphers, and then transmits the service key to the corresponding two communication terminals.
Other ways may also be used: the first communication terminal is bound with a first quantum cipher device, the second communication terminal is bound with a second quantum cipher device, and the binding information is stored in a quantum key supply service network, and the method comprises the following steps:
the first communication terminal sends a message for initiating a communication request to the second communication terminal to the first quantum cipher device, and the first quantum cipher device sends the message to the quantum key supply service network;
the quantum key supply service network searches a second quantum cipher device bound by a second communication terminal according to the message, generates a service key of the communication, and sends the service key to the first quantum cipher device and the second quantum cipher device;
And based on the service key, the first communication terminal performs secret communication with the second communication terminal.
Further, the quantum key supply service network sends the service key to the first quantum cipher device and the second quantum cipher device;
detecting whether the second quantum cipher device receives the service key, if so, sending a completion signal to the first quantum cipher device;
when the first quantum cipher device successfully receives the service key and receives a completion signal sent by the second quantum cipher device, sending a start communication message to the first communication terminal;
and after receiving the starting communication message, the first communication terminal initiates communication to the second communication terminal.
The second communication terminal may also be a service server.
The secret communication method further comprises the following implementation modes that the first communication terminal is bound with the first quantum cipher device, the second communication terminal is bound with the second quantum cipher device, the service server for providing service is bound with the third quantum cipher device, and the binding information is stored in the quantum key supply service network, and the method comprises the following steps:
the first communication terminal sends a communication request message to the first quantum cipher device, and the first quantum cipher device sends the message to the quantum key supply service network; the message comprises information of a service server and a target communication terminal;
The quantum key supply service network searches a second quantum cipher device bound with the second communication terminal and a third quantum cipher device bound with the service server according to the message;
the quantum key supply service network generates a first service key and sends the first service key to the first quantum cipher device and the third quantum cipher device, and generates a second service key and sends the second service key to the second quantum cipher device and the third quantum cipher device;
based on the first service key and the second service key, the first communication terminal and the second communication terminal communicate via the service server.
Further, during secret communication, the quantum sharing key and the service key of each byte in the quantum cipher device are used once, and the used part of the key is destroyed immediately and is not reused.
Further, the binding relationship between the quantum cryptography device and the communication terminal is dynamic.
According to a third object of the present invention, there is also provided a key distribution terminal, which is placed in a public place, provided with one or more quantum cryptography units placed therein, and electrically connected with available quantum cryptography units placed therein.
A shared key is generated between the key distribution terminal and the quantum key provisioning service network and stored in the quantum cryptography.
The user takes the personal information as the basis, or takes the form of paying rents and deposit, or takes the third party social credit tool as the basis, takes one or more quantum ciphers from the key distribution terminal, and returns the quantum ciphers to the key distribution terminal after the use.
Further, when the used quantum cipher device is returned to the key distribution terminal, the key distribution terminal judges whether the quantum key in the quantum cipher device is used, if so, the vector sub-key supply service network sends a message to apply a section of new shared key for the quantum cipher device to replace the original shared key stored in the quantum cipher device.
According to a fourth object of the present invention, there is also provided a quantum cipher,
the system comprises a communication module, a quantum key management module and a quantum key management module, wherein the communication module performs data interaction with a quantum key supply service network in a wireless mode;
the universal data interface is provided, and the universal data interface is connected with the communication terminal in a wired mode for data interaction:
a storage module stores quantum keys received from a quantum key provisioning service network.
The quantum key comprises a shared quantum key between the quantum cipher and the quantum key provisioning service network, and a service key for secure communication between the communication terminals.
Further, the quantum cipher device is also provided with an encryption and decryption module, the communication terminal transmits the data to be encrypted and decrypted to the quantum cipher device, the quantum cipher device calls the encryption and decryption module, the encryption and decryption module uses the secret key in the storage module to encrypt and decrypt, and then the encrypted and decrypted data is sent back to the communication terminal.
The beneficial effects of the invention are that
1. The invention adopts the quantum cipher to store the quantum key, and is arranged in the cipher distributing device in public places, so that users can take the quantum key according to needs, the restrictions of using objects and using regions of the quantum key are solved, and the users can use the quantum key to add high-strength protection for own communication data in daily life.
2. The secret communication method has lower cost, consumers and enterprises do not need to purchase complex quantum cipher generation equipment, when secret communication is needed, nearby key distribution terminals can be taken as required, and the protection of the quantum key can be obtained by connecting the general communication terminal with the quantum cipher device, so that the use cost of the traditional quantum key is reduced.
3. The quantum cipher device can be recycled, and the quantum cipher device can be put back after being used by a user and used by other users, so that the use efficiency of the quantum cipher key device is improved, and the waste of resources is avoided.
4. The quantum cipher device can be used for secret communication in various occasions, and has good usability, such as communication between two user terminals, communication between a user terminal and a service server, and the like.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application.
FIG. 1 is a schematic diagram of one implementation of quantum key sharing;
FIG. 2 is a schematic diagram of another implementation of quantum key sharing;
FIG. 3 is a schematic diagram of two communication terminals performing secure communications;
FIG. 4 is a schematic diagram of a communication terminal in secure communication with a service server;
fig. 5 is a schematic diagram of two communication terminals performing secure communication via a service server.
Detailed Description
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments in accordance with the present application. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
Embodiments and features of embodiments in this application may be combined with each other without conflict.
Example 1
The embodiment discloses a system for sharing a quantum key, as shown in fig. 2, which comprises a quantum key supply service network S, one or more key distribution terminals k, and quantum ciphers T1-Tn.
The quantum key supply service network is used for generating and distributing quantum keys and managing the distribution condition of the quantum keys, and comprises identity information, use states, quantum key storage histories, placed key distribution terminals, key distribution terminal identity information and the like of all quantum ciphers.
Each key distribution terminal is placed in a public place, and one or more spaces matched with the quantum ciphers are arranged in the key distribution terminal and are used for storing a plurality of quantum ciphers for availability. The quantum cipher device has the functions of storage and communication, is used for storing the quantum key distributed by the quantum key supply service network, transmits the quantum key stored by the quantum cipher device to a communication terminal (personal computer, fixed telephone, mobile terminal and the like) for use in a wired or wireless mode, and simultaneously has a wifi or 2G/3G/4G/5G communication module and the like, and can interact data with the quantum key supply service network through the wireless network in a free moving state.
As an alternative implementation manner, an encryption and decryption module may be set in the quantum cipher, the communication terminal transmits information to be encrypted to the quantum cipher, the quantum cipher encrypts by using the key stored in the quantum cipher, and sends the encrypted information back to the communication terminal, and the decryption operation is vice versa.
As an alternative implementation, as shown in fig. 1, the quantum cipher device performs information and data interaction with the quantum key supply service network to directly obtain the quantum key. Specifically, the quantum cipher devices T1-Tn are first connected to the quantum key supply service network S in a wired manner, and respectively obtain shared key keys (S-T1) … to … key (S-Tn) with S, after the obtaining is completed, the quantum cipher devices T1-Tn are disconnected from the quantum key supply service network S, transported and placed in the key distribution terminal k, and at this time, the key distribution terminal k mainly plays a role of a storage container. The technical requirement on the key distribution terminal is greatly reduced, the investment of a single key distribution terminal is not very high, but the transportation cost in daily maintenance is increased, and the leakage risk of the quantum cipher device in the transportation process is also improved.
The user can take the personal identity information as the basis, pay the form of rent and deposit, or take the third party social credit tool as the basis, take one or more quantum ciphers in the key distribution terminal to use, return the quantum ciphers to the key distribution terminal after the use is finished, the used quantum ciphers are re-connected to the quantum key supply service network, acquire and store new keys and send the new keys back to the key distribution terminal, and the original remaining unused keys are destroyed and are not reused.
As an alternative implementation, information and data interactions between the quantum cryptography and the quantum key provisioning service network are via a key distribution terminal. Specifically, the quantum key supply service network S is connected to the key distribution terminal k in a wired manner, and the key distribution terminal k is electrically connected to each of the quantum ciphers T1 to Tn inside itself.
As an alternative implementation, the wired connection between the quantum key provisioning service network S and the key distribution terminal k also includes a quantum channel connection.
A plurality of shared keys are generated between the quantum key supply service network S and the key distribution terminal k, and then the plurality of shared keys are charged into the internal corresponding quantum ciphers T1-Tn by the key distribution terminal k, so that the quantum ciphers T1-Tn store shared key (S-T1) … to … key (S-Tn) respectively between each and the quantum key supply service network S.
Preferably, a shared quantum key (S-k) is generated between the quantum key provisioning service network S and the key distribution terminal k. The key distribution terminal k then splits the key (S-k) into keys (S-T1) … to … keys (S-Tn) and sends them to the respective quantum ciphers inside it, respectively, so that the quantum ciphers T1-Tn inside the key distribution terminal k store the shared keys (S-T1) … to … keys (S-Tn), respectively, between each and the quantum key provisioning service network S.
After the used quantum cipher device T1 is returned to the key distribution terminal k, the key distribution terminal k judges whether the quantum key in the quantum cipher device is used, if so, the vector subkey supply service network S sends a message, the quantum key supply service network S generates a new key (S-T1), sends the new key to the key distribution terminal, and stores the new key in the quantum cipher device T1 to replace the original shared key between the quantum cipher device T1 and S.
According to the technical scheme, the quantum cipher is used as a medium for transmitting the quantum key, so that a user can take the quantum key as required. The quantum cipher stores therein a shared key with a quantum key provisioning service network.
Example two
An object of the present embodiment is to provide a method for using a shared key according to the first embodiment.
When secret communication is carried out in an end-to-end encryption mode between communication terminals, if the information is based on the existing traditional communication channel, the information is easily intercepted in the middle by an attacker. In order to solve the above-mentioned problem, this embodiment provides a method for performing secure communication based on the quantum key, where two communication terminals are respectively connected to a quantum cipher device, and the method includes the following steps:
Step 1: the quantum ciphers connected with the two communication terminals acquire a service key of the communication from a quantum key supply service network;
one implementation manner of obtaining the service key by the two quantum ciphers in the step 1 is as follows:
step 1.1: the two communication parties respectively supply the service network with the vector subkeys through the respective quantum ciphers to request the service keys required by the communication;
step 1.2: the quantum key supplying service network receives the request, generates a service key, sends the service key to the two quantum ciphers, and then transmits the service key to the corresponding two communication terminals.
Step 2: and based on the service key, the two communication parties perform normal communication.
Wherein the transmission of the service key is protected by a shared key between the quantum cipher and the quantum key provisioning service network due to the shared key stored in the quantum cipher.
To more clearly illustrate this embodiment, in conjunction with fig. 3, the method specifically includes:
(1) The quantum cipher T1 is connected with the mobile terminal M1 in a wired or wireless mode, and the quantum cipher T2 is connected with the mobile terminal M2 in a wired or wireless mode;
(2) Before the start of communication, the quantum ciphers T1, T2 apply for a service key (T1-T2) necessary for communication with the counterpart to the sub-key provisioning service network S.
(3) After receiving the application, the quantum key supply service network S generates a key (T1-T2), encrypts the key (T1-T2) with a shared key (S-T1) and a key (S-T2) between the key and T1, T2, and transmits the encrypted key (T1-T2) (S-T1) and key (T1-T2) (S-T2) to the quantum cipher T1 and the quantum cipher T2, respectively.
(4) After receiving the key (T1-T2) (S-T1), the quantum cipher device T1 decrypts the key (S-T1) by using the key (S-T1) stored by itself to obtain a service key (T1-T2) for communication with T2; similarly, the quantum cipher T2 will also obtain the traffic key (T1-T2).
(5) Because the mobile terminal is connected with the quantum cipher, the mobile terminals M1 and M2 actually share the service key (T1-T2), and both sides can use the key (T1-T2) to encrypt the communication plaintext and then send the communication plaintext to the opposite side through the existing traditional communication channel, and the opposite side decrypts the communication plaintext by using the same service key after receiving the communication plaintext, thereby obtaining the plaintext.
The method of presetting the key before communication is adopted in the embodiment, so that the T1/M1 combination and the T2/M2 combination have shared service keys before communication, and the key is not required to be downloaded after the real-time communication is initiated, thereby having certain advantages in the quality of the real-time communication (such as voice and video call).
However, the disadvantage of this method is that it requires the parties to communicate in advance, agree that a secure communication is to be initiated, and the respective vector subkeys are provided to the service network to apply for the service keys.
Example III
In order to solve the problem that needs to be agreed in advance, the embodiment also provides another preferred implementation manner for the method for acquiring the service key by aiming at the two quantum ciphers, when the communication terminal is connected with the quantum ciphers, the binding relationship between the two quantum ciphers is established, and the quantum ciphers upload the binding relationship to the quantum key supply service network. The communication terminal may be a personal computer, a fixed telephone, a mobile terminal, a service server, etc. The content of the communication includes, but is not limited to, voice, text, pictures, etc.
For clarity and conciseness, the communication terminal corresponding to the communication initiator is hereinafter referred to as a first communication terminal, the bound quantum cipher device is referred to as a first quantum cipher device, and the shared key between the first quantum cipher device and the quantum key supply service network is referred to as a first quantum shared key; and the communication terminal corresponding to the communication receiver is marked as a second communication terminal, the bound quantum cipher device is marked as a second quantum cipher device, and the shared key between the second quantum cipher device and the quantum key supply service network is marked as a second quantum shared key.
Based on this, the secret communication method provided in this embodiment specifically includes:
(1) After the first quantum cipher device is connected with the first communication terminal, a binding relation is established, the first quantum cipher device uploads the binding relation to the quantum key supply service network, and the binding relation between the second quantum cipher device and the second communication terminal is uploaded to the quantum key supply service network in the same way.
(2) The first communication terminal sends a signal to a first quantum cipher device connected with the first communication terminal, which indicates that the secret communication with the second communication terminal is hoped;
(3) The first quantum cipher device encrypts the signal and reports the signal to the quantum key supply service network, the quantum key supply service network decrypts the signal to obtain the signal, and the second quantum cipher device is searched to obtain the binding of the second communication terminal;
(4) The quantum key supply service network generates a service key required by the communication, encrypts the service key by using a shared key between the quantum key supply service network and the first quantum cipher device and the second quantum cipher device, and sends the encrypted service key to the first quantum cipher device and the second quantum cipher device respectively;
(5) The first quantum cipher device and the second quantum cipher device receive and decrypt the shared key between each quantum cipher device and the quantum key supply service network to obtain a service key;
(6) After the quantum key supply service network detects that the second quantum cipher device bound by the second communication terminal has received the completion service key, the quantum key supply service network sends a completion signal to the first quantum cipher device;
(7) After receiving the completion signal, the first quantum cipher device sends out a start communication signal to the first communication terminal if the first quantum cipher device also receives the completion service key, and after receiving the start communication signal, the first communication terminal initiates communication to the second communication terminal through the existing traditional communication channel;
(8) The first quantum cipher/first communication terminal combination and the second quantum cipher/second communication terminal combination use a shared traffic key for secure communication.
In order to further ensure the safety of the communication process, the quantum key supply service network only sends partial service keys to the first quantum cipher device and the second quantum cipher device, wherein the partial service keys can meet the secret communication for a certain time; accordingly, in the secret communication process, the quantum key is supplied to the service network to issue a service key of the next time period every set time. That is, the same service key only protects communications within a range of duration, and when the duration of the communications exceeds the range, the service key is changed.
To more clearly illustrate this embodiment, in conjunction with fig. 3, the method specifically includes:
(1) After the quantum cipher device T1 is connected with the mobile terminal M1, a binding relationship is established, the quantum cipher device T1 uploads the binding relationship to the quantum key supply service network S, and the binding relationship between T2 and M2 is uploaded to S in the same way.
(2) The mobile terminal M1 sends a signal to the quantum cipher T1 connected with the mobile terminal M1, which indicates that the mobile terminal M2 is expected to carry out secret communication;
(3) The quantum cipher device T1 encrypts the signal and reports the signal to the quantum key supply service network S, the quantum key supply service network S decrypts the signal to obtain the signal, and the bound quantum cipher device T2 of the called mobile terminal M2 is obtained by searching;
(4) The quantum key supply service network S generates a service key (T1-T2) required by the communication, encrypts the key (T1-T2) by using a shared key (S-T1) and a key (S-T2) between S and T1 and T2, and sends the encrypted key (T1-T2) (S-T1) and key (T1-T2) (S-T2) to the quantum cipher T1 and the quantum cipher T2 respectively;
(5) The quantum ciphers T1 and T2 receive and decrypt the service key (T1-T2) by using the shared key between each quantum cipherer and S;
(6) After the quantum key supply service network S detects that the quantum cipher device T2 bound by the called mobile terminal T2 has received the completion service key (T1-T2), the quantum cipher device T1 sends a completion signal;
(7) After receiving the completion signal, T1 sends out a start communication signal to mobile terminal M1 if it has also received the completion service key (T1-T2), M1 initiates communication to M2 through the existing traditional communication channel after receiving the start communication signal;
(8) The T1/M1 combination and the T2/M2 combination use a shared traffic key (T1-T2) for secure communications.
In the embodiment, the calling terminal can directly initiate a real-time communication request without the prior communication of the two communication parties, the system automatically issues a secret key to the quantum ciphers of the two parties, and the communication is established after the secret key is issued; the disadvantage is that there is a delay from the request to initiate the real-time communication to the establishment of the communication, since the service key is acquired in real-time.
The secret communication method of the present embodiment may be applied to a case where a communication terminal accesses a service server, where the second communication terminal is the service server.
As shown in FIG. 4, various communication terminals, such as mobile terminals M1-Mn, computer terminals C1-Cx, all have a need to access the service server A. In order to ensure the data security when various communication terminals access the service server, and not be intercepted in the middle, taking the case that the computer terminal Cx accesses the service server a, the quantum cipher device TA may be used to connect to the service server a, and the quantum cipher device Tx may be connected to the computer terminal Cx. The quantum encryptor TA has a shared key (S-TA) with the quantum key provision service network S; the quantum cryptography Tx has a shared key (S-Tx) with the quantum key provisioning service network S. The method specifically comprises the following steps:
(1) After the quantum cipher Tx is connected with the computer terminal Cx, a binding relation between the two is established, and the quantum cipher Tx uploads the binding relation to the quantum key supply service network S;
after the quantum cipher TA is connected with the service server A, a binding relationship between the quantum cipher TA and the service server A is established, and the quantum cipher TA uploads the binding relationship to the quantum key supply service network S;
(2) Before a computer terminal Cx sends information or data to a service server A, a vector sub-cipher device Tx applies for a service key required by communication with the service server A, the Tx encrypts and forwards the applied information to a quantum key supply service network S, the information is obtained after decryption of the quantum key supply service network S, and a quantum cipher device TA bound with a communication target service server A is searched and obtained;
(3) The quantum key supply service network S generates a service key (A-Cx) required by the communication, encrypts the service key (A-Cx) by using a shared key (S-TA) between the S and the quantum cipher TA to obtain the key (A-Cx) (S-TA), and sends the key (A-Cx) to the quantum cipher TA; encrypting the key (S-Tx) by using a shared key (S-Tx) between the S and the quantum cipher Tx to obtain a key (A-Cx) (S-Tx), and transmitting the key (A-Cx) to the quantum cipher Tx;
(4) After the quantum ciphers TA and Tx respectively receive the data, decrypting the data by using a shared key between the quantum ciphers TA and Tx and the quantum key supply service network S to obtain a service key (A-Cx) required by communication between the TA and the Tx;
(5) After the quantum cipher Tx obtains the service key, the computer terminals Cx and Cx are informed to encrypt plaintext information or data by using the service key (A-Cx) and then send the encrypted plaintext information or data to the service server A; after receiving the data, the service server A decrypts the data by using a service key (A-Cx) in the quantum cipher TA bound with the service server A to obtain a plaintext;
similarly, when the service server a feeds back information or data to the computer terminal Cx, the information or data is encrypted using the service key (a-Cx) and then transmitted. Thus, the encryption protection of the communication terminal when accessing the service server is realized.
Example IV
In the third embodiment, the communication terminals directly communicate end to end, and in some cases, the communication terminals may perform information or data interaction through the service server, and the devices on the existing conventional communication channels can only see the ciphertext and cannot contact the plaintext, which is not suitable in some situations, such as mail transmission, as the mail server on the "existing conventional communication channels", and it is sometimes necessary to leave the plaintext of the mail. In order to solve the above-mentioned problem, on the basis of the third embodiment, the service server of this embodiment also binds the quantum cipher device, and applies for the service key to the two-party communication terminal and the service server respectively.
For clarity and brevity, the following are provided:
the communication terminal corresponding to the communication initiator is marked as a first communication terminal, the bound quantum cipher device is marked as a first quantum cipher device, the shared key between the first quantum cipher device and the quantum key supply service network is marked as a first quantum shared key, and the service key between the first communication terminal and the service server is marked as a first service key;
the communication terminal corresponding to the communication receiver is marked as a second communication terminal, the bound quantum cipher device is marked as a second quantum cipher device, the shared key between the second quantum cipher device and the quantum key supply service network is marked as a second quantum shared key, and the service key between the second communication terminal and the service server is marked as a second service key;
the quantum cipher device bound with the service server is marked as a third quantum cipher device, and the shared key between the third quantum cipher device and the quantum key supply service network is marked as a third quantum shared key.
The quantum key supply service network stores the binding relation.
Based on this, the secret communication method specifically includes:
step 1: the first communication terminal sends the message of the communication request to the first quantum cipher device and then to the quantum key supply service network; the message comprises identity information of the service server and the second communication terminal;
Step 2: the quantum key supply service network searches a second quantum cipher device bound with the second communication terminal and a third quantum cipher device bound with the service server according to the information respectively;
if the first service key is found, generating a first service key and sending the first service key to the first quantum cipher device and the third quantum cipher device, and generating a second service key and sending the second service key to the second quantum cipher device and the third quantum cipher device;
step 3: the first communication terminal communicates with the second communication terminal via the service server.
The step 1 specifically includes:
step 1.1: the message of the communication request of the first communication terminal is sent to the first quantum cipher; the message comprises identity information of the service server and the second communication terminal;
step 1.2: the first quantum cipher encrypts and transmits the message with a first quantum shared key to a quantum key provisioning service network.
The step 2 specifically includes:
step 2.1: the quantum key supply service network decrypts and acquires the message, and searches a second quantum cipher device bound with the second communication terminal and a third quantum cipher device bound with the service server according to the message respectively;
step 2.2: generating a first service key, encrypting by adopting a first quantum shared key, and sending the first service key to a first quantum cipher; encrypting by adopting a third quantum shared secret key, and sending to a third quantum cipher device; and
Generating a second service key, encrypting by adopting a second quantum shared key, and sending to a second quantum cipher; and encrypting by adopting the third quantum shared secret key, and sending to a third quantum cipher.
Step 2.3:
the first quantum cipher device decrypts the first quantum shared cipher to obtain a first service key;
the third quantum cipher device decrypts the first service key by using the third quantum shared key;
the second quantum cipher device decrypts the second service key by using the second quantum shared key;
the third quantum cipher device decrypts the second service key by using the third quantum shared key;
thus, it is achieved that:
the first quantum cipher device and the third quantum cipher device share a first service key;
the second quantum cipher shares the second traffic key with the third quantum cipher.
The step 3 specifically includes:
the first communication terminal encrypts the communication content to be sent by the user through a first quantum cipher by adopting a first service key and sends the encrypted communication content to a service server, the service server decrypts and obtains the communication content through a third quantum cipher, then encrypts and sends the communication content through the third quantum cipher by adopting a second service key to a second communication terminal, and the second communication terminal decrypts and obtains the communication content through the second quantum cipher. The reverse process is the process that the communication message of the second communication terminal is sent to the first communication terminal through the service server.
As shown in fig. 5, both the mobile terminal M1 and the computer terminal Cx access the service server a, and when the mobile terminal M1 and the computer terminal Cx communicate using the service provided by the service server a, the service server a is connected using the quantum cryptography device TA, the computer terminal Cx is connected to the quantum cryptography device Tx, and the mobile terminal M1 is connected to the quantum cryptography device T1. The quantum encryptor TA has a shared key (S-TA) with the quantum key provision service network S; the quantum cryptography Tx has a shared key (S-Tx) with the quantum key provisioning service network S; the quantum cryptography T1 has a shared key (S-T1) with the quantum key provisioning service network S. The method specifically comprises the following steps:
(1) After the quantum cipher Tx is connected with the computer terminal Cx, a binding relation between the two is established, and the quantum cipher Tx uploads the binding relation to the quantum key supply service network S;
after the quantum cipher TA is connected with the service server A, a binding relationship between the quantum cipher TA and the service server A is established, and the quantum cipher TA uploads the binding relationship to the quantum key supply service network S;
after the quantum cipher device T1 is connected with the mobile terminal M1, a binding relationship between the mobile terminal M1 and the mobile terminal M1 is established, and the quantum cipher device T1 uploads the binding relationship to the quantum key supply service network S;
(2) Before the computer terminal Cx uses the service provided by the service server A to send information or data to the mobile terminal M1, the information of the service server A and the target mobile terminal M1 is sent to the quantum cipher Tx bound by the computer terminal Cx, and the service key required by the communication is applied; the quantum cipher Tx encrypts the information and transmits the encrypted information to the quantum key supply service network S;
(3) The quantum key supply service network S searches and obtains a quantum cipher TA bound by the service server A and a quantum cipher T1 bound by the target mobile terminal M1 according to the decrypted information;
(4) The quantum key supply service network S generates a service key (A-Cx) required by the communication between the service server A and the computer terminal Cx, encrypts the service key by using a shared key (S-TA) between the S and the quantum cipher TA to obtain the key (A-Cx) (S-TA), and sends the key (A-Cx) to the quantum cipher TA; encrypting the service key by using a shared key (S-Tx) between the S and the quantum cipher Tx to obtain a key (A-Cx) (S-Tx), and transmitting the key (A-Cx) to the quantum cipher Tx;
after the quantum ciphers TA and Tx respectively receive the data, decrypting the data by using a shared key between the quantum ciphers TA and Tx and the quantum key supply service network S, and obtaining a service key (A-Cx) required by communication between the A/TA combination and the Cx/Tx combination;
The quantum key supply service network S generates a service key (A-M1) required by the communication between the service server A and the mobile terminal M1, encrypts the service key by using a shared key (S-TA) between the S and the quantum cipher TA to obtain a key (A-M1) (S-TA), and sends the key to the quantum cipher TA; encrypting the service key by using a shared key (S-T1) between the S and the quantum cipher T1 to obtain a key (A-M1) (S-T1), and sending the key to the quantum cipher T1;
after the quantum ciphers TA and T1 respectively receive the data, decrypting the data by using a shared key between the quantum ciphers TA and the quantum key supply service network S, and obtaining a service key (A-M1) required by communication between the A/TA combination and the M1/T1 combination;
(5) After the quantum cipher device Tx obtains the service key, the computer terminal Cx is informed, the computer terminal Cx uses the service key (A-Cx) to encrypt information or data, and sends the information or data to the service server A, and after the service server A receives the information or data, the information or data is decrypted by using the service key (A-Cx) in the bound quantum cipher device TA to obtain a plaintext; the service server A encrypts the obtained plaintext by using a key (A-M1), sends the encrypted plaintext to the mobile terminal M1, and after the received plaintext is received by the mobile terminal M1, decrypts the encrypted plaintext by using a service key (A-M1) in the bound quantum cipher T1 to obtain the plaintext.
For example, the service server a may be a mail server or an instant messaging server, where the sender sends a mail or a message on the computer terminal Cx, and the recipient reads the mail or the message on the mobile terminal M1 via the mail server or the instant messaging server a.
Example five
Based on the system for sharing a quantum key in the first embodiment, an object of the present embodiment is to provide a key distribution terminal disposed in a public place, in which one or more quantum cryptography units are disposed, for disposing available quantum cryptography units, and electrically connected to the quantum cryptography units disposed therein, including:
the communication module is in communication connection with the quantum key supply service network and is used for receiving the quantum key generated and issued by the quantum key supply service network;
and the key distribution module stores the received quantum key into a quantum cipher device arranged in the key distribution module.
The quantum key supply service network is connected with the key distribution terminal in a wired mode, and the key distribution terminal is electrically connected with each quantum cipher device in the key distribution terminal.
As an alternative implementation, the wired connection between the quantum key provisioning service network and the key distribution terminal also includes a quantum channel connection.
The key distribution terminal receives a plurality of quantum keys from the quantum key supply service network and stores them respectively in an equal number of quantum ciphers placed in the key distribution terminal.
As an alternative implementation, when a quantum key is received from the quantum key provisioning service network, the key distribution module further splits it into a corresponding number of quantum keys and stores them in the plurality of quantum ciphers, respectively.
The user can take one or more quantum ciphers from the key distribution terminal by taking the personal identity information as a basis, or taking a form of paying rents and deposit or taking a third-party social credit tool as a basis, and return the quantum ciphers to the key distribution terminal after the use is finished.
When the used quantum cipher device is returned to the key distribution terminal, the key distribution terminal judges whether the quantum key in the quantum cipher device is used or not, if so, a vector sub-key supply service network sends a message to apply a section of new shared key for the quantum cipher device to replace the original shared key stored in the quantum cipher device.
Example six
Based on the system for sharing a quantum key in the first embodiment, an object of this embodiment is to provide a quantum cryptography device, including:
The communication module is used for establishing communication connection with the quantum key supply service network, acquiring the quantum key from the quantum key supply service network and performing data interaction with the quantum key supply service network;
and a storage module for storing the quantum key received from the quantum key supply service network.
The communication connection modes include, but are not limited to, wired, wifi or 2G/3G/4G/5G communication modes.
The communication module is also used for being in communication connection with the universal communication terminal, transmitting the quantum key stored by the quantum cipher device to the universal communication terminal, and being used as a bridge for communication between the universal communication terminal and the quantum key supply service network.
The quantum key comprises: the quantum cipher and the quantum key supply service network share the quantum key, and the service key can be used for secret communication between the universal communication terminals.
The quantum cipher device is placed at the key distribution terminal for a user to take; the key distribution terminals are arranged in public places, and each key distribution terminal is provided with one or more quantum cipher device placement bits for storing one or more quantum cipher devices.
As an optional implementation manner, an encryption and decryption module may be set in the quantum cryptography, and when the communication terminal in the second, third and fourth embodiments uses the key in the quantum cryptography to perform encryption and decryption operations, the encryption and decryption operations may be completed by the communication terminal without transmitting the key to the communication terminal. The communication terminal transmits the information to be encrypted and decrypted to the quantum cipher device, the quantum cipher device uses the secret key stored in the quantum cipher device to encrypt and decrypt, and then the encrypted and decrypted information is sent back to the communication terminal.
In the first to sixth embodiments, the quantum shared key and the service key of each byte in the quantum cipher are used only once, and the used part of the key is destroyed immediately and is not reused.
In the first to sixth embodiments, the binding relationship between the quantum cryptography device and the general communication terminal is dynamic and can be released. After the release, the quantum cipher device can be connected with other general communication terminals again and establish binding relation.
The beneficial effects of the invention are that
1. The invention adopts the quantum cipher to store the quantum key, and is arranged in the cipher distributing device in public places, so that users can take the quantum key according to needs, the restrictions of using objects and using regions of the quantum key are solved, and the users can use the quantum key to add high-strength protection for own communication data in daily life.
2. The secret communication method has lower cost, consumers and enterprises do not need to purchase complex quantum cipher generation equipment, when secret communication is needed, nearby key distribution terminals can be taken as required, and the protection of the quantum key can be obtained by connecting the general communication terminal with the quantum cipher device, so that the use cost of the traditional quantum key is reduced.
3. The quantum cipher device can be recycled, and the quantum cipher device can be put back after being used by a user and used by other users, so that the use efficiency of the quantum cipher key device is improved, and the waste of resources is avoided.
4. The quantum cipher device can be used for secret communication in various occasions, and has good usability, such as communication between two user terminals, communication between a user terminal and a service server, and the like.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the same, but rather, various modifications and variations may be made by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application.
While the foregoing description of the embodiments of the present invention has been presented in conjunction with the drawings, it should be understood that it is not intended to limit the scope of the invention, but rather, it is intended to cover all modifications or variations within the scope of the invention as defined by the claims of the present invention.
Claims (15)
1. The system is characterized by comprising a quantum key supply service network and one or more key distribution terminals arranged in public places, wherein one or more available quantum ciphers are arranged in each key distribution terminal, and a user takes one or more quantum ciphers in the key distribution terminal for use by using personal identity information, or using a form of paying rents and deposit or using a third-party social credit tool as a basis, and returns the one or more quantum ciphers to the key distribution terminal after the use is finished;
The quantum key supply service network and the key distribution terminal generate a shared key, and the key distribution terminal charges the shared key into a plurality of quantum ciphers corresponding to the inside.
2. A system for sharing a quantum key according to claim 1, wherein the quantum key supply service network is connected in a wired manner to a key distribution terminal, the key distribution terminal being electrically connected to each quantum cipher within itself.
3. The system for sharing a quantum key of claim 1, wherein after the quantum cipher device is returned to the key distribution terminal after the use, the key distribution terminal judges whether the quantum key in the quantum cipher device is used, and if so, sends a message to the quantum key supply service network, and the quantum key supply service network and the key distribution terminal generate a new section of shared key and store the new section of shared key in the quantum cipher device instead of the original shared key with the quantum key supply service network.
4. A method of secure communication based on a system according to any of claims 1-3, wherein each communication terminal is connected to a quantum cipher, the method comprising the steps of:
The quantum cipher device connected with each communication terminal acquires the service key of the communication from the quantum key supply service network, and the information and the service key transmitted between the quantum key supply service network and the quantum cipher device are protected by the shared key between the quantum key supply service network and the quantum cipher device;
the communication terminals use the service keys in the respective quantum ciphers for secret communication.
5. The secure communication method of claim 4, wherein the two quantum ciphers are implemented to obtain the service key by:
the two communication parties respectively supply the service network with the vector subkeys through the respective quantum ciphers to request the service keys required by the communication;
the quantum key supply service network receives the request, generates a service key and sends the service key to the two quantum ciphers.
6. The secret communication method of the system of claim 4, wherein the first communication terminal is bound to a first quantum cipher device, the second communication terminal is bound to a second quantum cipher device, and binding information is stored in a quantum key providing service network, the method comprising the steps of:
the first communication terminal sends a message for initiating a communication request to the second communication terminal to the first quantum cipher device, and the first quantum cipher device sends the message to the quantum key supply service network;
The quantum key supply service network searches a second quantum cipher device bound by a second communication terminal according to the message, generates a service key of the communication, and sends the service key to the first quantum cipher device and the second quantum cipher device;
and based on the service key, the first communication terminal performs secret communication with the second communication terminal.
7. The secure communication method of claim 6, wherein the quantum key provisioning service network transmits the service key after the first quantum cipher and the second quantum cipher;
detecting whether the second quantum cipher device receives the service key, if so, sending a completion signal to the first quantum cipher device;
when the first quantum cipher device successfully receives the service key and receives a completion signal sent by the second quantum cipher device, sending a start communication message to the first communication terminal;
and after receiving the starting communication message, the first communication terminal initiates communication to the second communication terminal.
8. A secure communication method according to claim 6 or 7, wherein the second communication terminal is a service server.
9. The secret communication method of claim 4, wherein the first communication terminal is bound to a first quantum cipher device, the second communication terminal is bound to a second quantum cipher device, the service server providing the service is bound to a third quantum cipher device, and the binding information is stored in a quantum key providing service network, the method comprising the steps of:
The first communication terminal sends a communication request message to the first quantum cipher device, and the first quantum cipher device sends the message to the quantum key supply service network; the message comprises information of a service server and a target communication terminal;
the quantum key supply service network searches a second quantum cipher device bound with the second communication terminal and a third quantum cipher device bound with the service server according to the message;
the quantum key supply service network generates a first service key and sends the first service key to the first quantum cipher device and the third quantum cipher device, and generates a second service key and sends the second service key to the second quantum cipher device and the third quantum cipher device;
based on the first service key and the second service key, the first communication terminal and the second communication terminal communicate via the service server.
10. A method of secure communication as claimed in any one of claims 5, 6, 7, 9, wherein the quantum shared key and the traffic key for each byte in the quantum cipher are used only once, and the used portion of the key is destroyed immediately and is not reused.
11. A method of secure communications according to any one of claims 6, 7 and 9, wherein the binding relationship between the quantum cryptography device and the communications terminal is dynamic.
12. The key distribution terminal is characterized in that one or more quantum cipher device placement bits are arranged in a public place and are electrically connected with the available quantum cipher devices placed in the key distribution terminal;
generating a shared key between a key distribution terminal and a quantum key supply service network, and storing the shared key into the quantum cipher;
the user takes the personal information as the basis, or takes the form of paying rents and deposit, or takes the third party social credit tool as the basis, takes one or more quantum ciphers from the key distribution terminal, and returns the quantum ciphers to the key distribution terminal after the use.
13. The key distribution terminal of claim 12, wherein when the used quantum cipher is returned to the key distribution terminal, the key distribution terminal judges whether the quantum key in the quantum cipher is used, and if so, the vector sub-key providing service network transmits a message to apply a new shared key for the quantum cipher instead of the original shared key stored in the quantum cipher.
14. A quantum cryptography device, characterized by a system for sharing a quantum key according to any of claims 1-3;
The system comprises a communication module, a quantum key management module and a quantum key management module, wherein the communication module performs data interaction with a quantum key supply service network in a wireless mode;
the universal data interface is provided, and the universal data interface is connected with the communication terminal in a wired mode for data interaction:
a storage module storing a quantum key received from a quantum key provisioning service network;
the quantum key comprises a shared quantum key between the quantum cipher and the quantum key provisioning service network, and a service key for secure communication between the communication terminals.
15. The quantum cipher device of claim 14, further comprising an encryption and decryption module, wherein the communication terminal transmits the data to be encrypted and decrypted to the quantum cipher device, and the quantum cipher device invokes the encryption and decryption module to encrypt and decrypt the data by using the key in the storage module, and then sends the encrypted and decrypted data back to the communication terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911414925.XA CN113132090B (en) | 2019-12-31 | 2019-12-31 | System for sharing quantum key and secret communication method based on system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911414925.XA CN113132090B (en) | 2019-12-31 | 2019-12-31 | System for sharing quantum key and secret communication method based on system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113132090A CN113132090A (en) | 2021-07-16 |
CN113132090B true CN113132090B (en) | 2023-05-09 |
Family
ID=76770485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911414925.XA Active CN113132090B (en) | 2019-12-31 | 2019-12-31 | System for sharing quantum key and secret communication method based on system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113132090B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115085920B (en) * | 2022-07-15 | 2024-01-16 | 矩阵时光数字科技有限公司 | Key management method, device, equipment, system and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113407A (en) * | 2014-06-26 | 2014-10-22 | 北京邮电大学 | Multi-user quantum key distribution network apparatus |
JP2015177535A (en) * | 2014-03-18 | 2015-10-05 | 株式会社東芝 | Receiver, transmitter, communication system, and communication method |
CN106452739A (en) * | 2016-09-23 | 2017-02-22 | 浙江神州量子网络科技有限公司 | Quantum network service station and quantum communication network |
CN206042014U (en) * | 2016-09-23 | 2017-03-22 | 浙江神州量子网络科技有限公司 | Quantum network service station and quantum communication network |
CN109995513A (en) * | 2017-12-29 | 2019-07-09 | 成都零光量子科技有限公司 | A kind of quantum key Information Mobile Service method of low latency |
-
2019
- 2019-12-31 CN CN201911414925.XA patent/CN113132090B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015177535A (en) * | 2014-03-18 | 2015-10-05 | 株式会社東芝 | Receiver, transmitter, communication system, and communication method |
CN104113407A (en) * | 2014-06-26 | 2014-10-22 | 北京邮电大学 | Multi-user quantum key distribution network apparatus |
CN106452739A (en) * | 2016-09-23 | 2017-02-22 | 浙江神州量子网络科技有限公司 | Quantum network service station and quantum communication network |
CN206042014U (en) * | 2016-09-23 | 2017-03-22 | 浙江神州量子网络科技有限公司 | Quantum network service station and quantum communication network |
CN109995513A (en) * | 2017-12-29 | 2019-07-09 | 成都零光量子科技有限公司 | A kind of quantum key Information Mobile Service method of low latency |
Also Published As
Publication number | Publication date |
---|---|
CN113132090A (en) | 2021-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5986341B2 (en) | Mobile confidential communication method based on quantum key distribution network | |
US8423773B2 (en) | Method for receiving/sending multimedia messages | |
RU2495532C2 (en) | Method and apparatus for end-to-end encrypted communication | |
CN114553422B (en) | VoLTE voice encryption communication method, terminal and system | |
CN106982419B (en) | Single call end-to-end encryption method and system for broadband cluster system | |
CN101340443A (en) | Session key negotiating method, system and server in communication network | |
WO2017063438A1 (en) | Voice encryption method, system and apparatus | |
US8693686B2 (en) | Secure telephone devices, systems and methods | |
CN113612608A (en) | Method and system for realizing cluster encryption of dual-mode interphone based on public network | |
CN104125071A (en) | Communication method, communication system and communication terminal | |
CN113132090B (en) | System for sharing quantum key and secret communication method based on system | |
US20100128875A1 (en) | Secure voicemail system and method | |
CN101656583B (en) | Key management system and key management method | |
CN113098872B (en) | Encryption communication system and method based on quantum network and convergence gateway | |
CN105025476B (en) | A kind of mobile encrypted communication mechanism of space-time separation | |
US8971534B2 (en) | Mobile communication terminal and method | |
CN101729535B (en) | Implementation method of media on-demand business | |
WO2023221856A1 (en) | Quantum secure communication method and device, quantum password service network, and communication system | |
US20050228997A1 (en) | Methods and devices for providing secure communication sessions | |
CN101714904B (en) | Key management system and method | |
CN101132274A (en) | System, method and device for implementing communication encryption | |
CN117955641A (en) | Method for realizing quantum key distribution by bidirectional key pool and quantum cipher system | |
CN109155913A (en) | The determination method and device of method for connecting network, security node | |
JP3455038B2 (en) | Secret key distribution method and secret key distribution system | |
CN117375816A (en) | Method and system for encrypting and interworking of communication systems with different codes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |