CN113612608B - Method and system for realizing cluster encryption of dual-mode interphone based on public network - Google Patents
Method and system for realizing cluster encryption of dual-mode interphone based on public network Download PDFInfo
- Publication number
- CN113612608B CN113612608B CN202110929301.2A CN202110929301A CN113612608B CN 113612608 B CN113612608 B CN 113612608B CN 202110929301 A CN202110929301 A CN 202110929301A CN 113612608 B CN113612608 B CN 113612608B
- Authority
- CN
- China
- Prior art keywords
- key
- quantum
- interphone
- public network
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000008569 process Effects 0.000 claims abstract description 24
- 238000003860 storage Methods 0.000 claims description 10
- 238000004891 communication Methods 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 claims description 5
- 230000008901 benefit Effects 0.000 abstract description 4
- 238000009826 distribution Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/08—User group management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3827—Portable transceivers
Abstract
The invention discloses a method and a system for realizing cluster encryption of dual-mode interphones based on a public network, wherein the system comprises a quantum cipher machine, a key filling machine, a quantum key management platform, a plurality of interphones, a public network channel and a cluster channel, and a quantum security chip is arranged in each interphone; the quantum cipher machine provides quantum cipher key for the quantum cipher key management platform and the cipher key filling machine; the quantum key management platform distributes service keys to interphones through public network channels; the key filling machine fills the quantum key generated in the quantum cipher machine into the quantum security chip to realize that the quantum security chip and the quantum key management platform have symmetric ciphers; each interphone encrypts talkback based on a service key under a trunking channel; the invention has the advantages that: the key is safely distributed, the key flows between the interphone and the quantum key management platform, is irrelevant to the interphone platform and the trunking channel, is prevented from being decrypted at the platform side, and the reliability of the interphone process is provided.
Description
Technical Field
The invention relates to the technical field of quantum key application in information encryption, in particular to a method and a system for realizing cluster encryption of a dual-mode interphone based on a public network.
Background
The interphone is a bidirectional mobile communication tool, can communicate without any network support, has no telephone charge, and is suitable for occasions with relatively fixed and frequent communication. Interphones are of three general categories: analog interphone, digital interphone, IP interphone.
The conventional interphone has the following problems:
1. the interphone encryption algorithm is simple, even the private network communication is not encrypted, and the interphone communication is transmitted in a plaintext form;
2. The encryption device or the key module built in the interphone lacks an updating means for the key, and the key is reused for a long time;
3. the key security distribution process of the traditional interphone (particularly the trunked interphone) is difficult to realize due to the lack of a data communication channel.
4. The existing encryption interphone equipment has decryption processes on the platform side, and data is clear for the background, so that the protection aspect is incomplete.
Filing date: 2017.04.17 application number: 201720396024.2 discloses a secret intercom system based on a quantum key service station, which comprises the quantum key service station and a plurality of interphones, wherein the interphones complete information transmission through transfer of the quantum key service station, a quantum random number generator is arranged in the quantum key service station and used for generating a quantum key with true randomness, and the quantum key is stored in a key storage module and is downloaded by the interphones. The interphone disclosed by the utility model is transferred through the quantum key service station, and the decryption and secondary encryption processes are completed in the service station, so that the long-distance secret interphone is realized, and the information safety transmission is ensured.
Filing date: 2020.06.05 application number: the utility model relates to the technical field of secure communication, in particular to an encryption interphone based on quantum key filling, which comprises quantum key filling equipment, an interphone and an external storage medium, wherein the encryption interphone based on quantum key filling is characterized in that: 1. the random numbers used as the secret keys or seeds of the encryption algorithm are all generated by the quantum true random number generator, and have the characteristics of being truly unpredictable and random, so that the effectiveness of the used encryption algorithm is ensured. 2. The quantum true random number is filled into the secret storage medium in advance, so that the adverse conditions such as large volume, large mass, high energy consumption and the like which are common when the quantum true random number generator is applied to the field of radio mobile communication are broken through. And one quantum key filling device can meet the number requirement of a large number of secret storage media by only needing one quantum true random number generator. This advantage also compensates for the cost problem of the quantum true random number generator being expensive.
However, the above patent still does not solve the problem that the key security distribution process in the conventional interphone encryption process is difficult to realize, the decryption process is provided on the platform side, and the background data plaintext is processed, so that the reliability is not high.
Disclosure of Invention
The invention aims to solve the technical problems that in the prior art, the secret key security distribution process is difficult to realize in the encryption interphone process, and the background data plaintext is processed in the decryption process on the platform side, so that the security is insufficient.
The invention solves the technical problems by the following technical means: a method for realizing cluster encryption of a dual-mode interphone based on a public network comprises the following steps:
Step one: the interphone is on line under a public network channel and completes identity authentication;
Step two: the interphone applies for a service key of a trunking talkback group by a vector subkey management platform under a public network channel and distributes the service key to all panelists;
Step three: the interphone in the trunking talkback group uses the service key to carry out encryption communication;
Step four: the trunking talkback group initiates a key updating flow and service key updating;
step five: after the trunking talkback group finishes talkback, the trunking talkback group is disassembled, and the service key is logged off.
According to the invention, the quantum key management platform receives the application of the interphones, distributes service keys to the interphones through the public network channel, and the interphones are talked based on the encryption of the service keys under the trunking channel.
Further, the first step includes: each interphone is based on an entity authentication technology, a symmetric key pair Ka (i) and Ka (i)', which are filled in a quantum security chip respectively, are formed between the quantum key and a quantum key management platform by calling the quantum key Ka (i) filled in the quantum security chip, and the identity authentication of the interphone is completed based on the symmetric key pair; and when the interphone performs identity authentication, calling the charged quantum key Ka (i+n) in the quantum security chip, comparing the quantum key Ka (i+n) with the key in the quantum key management platform, and completing the identity authentication process if the key Ka (i+n)' exists.
Further, the second step includes: setting interphone A as an creator of a trunking talkback group in all interphones, informing a quantum key management platform that other interphones participating in talkback join the trunking talkback group, generating a new service key K (i) by the quantum key management platform, wherein i represents the ith update, the quantum key management platform calls a quantum key Ka (i+m) 'in a quantum security chip corresponding to each interphone in the trunking talkback group, encrypts the service key K (i) through the quantum key Ka (i+m)' respectively, sends the encrypted ciphertext to each interphone, calls the quantum key Ka (i+m) in the quantum security chip to decrypt after the interphone receives the ciphertext, and obtaining the service key K (i), so that the trunking talkback group obtains the same service key K (i) based on a public network channel, and stores the service key K (i) in a quantum security chip or other security storage space in the interphone.
Further, the key Ka (i+m) in the second step is different from the keys Ka (i) and Ka (i+n) in the first step, and the keys Ka (i), ka (i+m) and Ka (i+n) in each interphone are different.
Furthermore, the service key K (i) is set to be a 128-bit key, and the key filling machine is used for filling the 128-bit quantum key when filling the quantum security chip internal key.
Furthermore, the key encryption issuing process encrypts the key service key K (i) by using the quantum key in the quantum security chip and the service key K (i) in a 1:1 exclusive OR mode, or encrypts the key service key K (i) by using the quantum key in the quantum security chip based on an SM4 algorithm.
Still further, the third step includes: and after the trunking talkback function is started, the trunking talkback group established by the interphone A calls a service key K (i) from the safe storage space of the service key K (i), and encrypts talkback by adopting the same symmetric encryption algorithm based on the service key K (i).
Still further, the symmetric encryption algorithm includes SM4, 3DES, or ZUC.
Still further, the fourth step includes: and (3) presetting an updating period by the trunking talkback group, repeatedly executing the second step and the third step under the condition of a public network channel after the updating period, and logging out the original service key K (i) after the interphone in the trunking talkback group acquires the new service key K (i+1) in each updating process.
Further, in the first step, if the identity authentication of the interphone is not completed or the identity authentication is not passed, the second step and the third step are not executed.
The invention also provides a system for realizing the method of cluster encryption based on the public network for the dual-mode interphone, which comprises a quantum cipher machine, a key filling machine, a quantum key management platform, a plurality of interphones, a public network channel and a cluster channel, wherein a quantum security chip is arranged in each interphone;
The quantum cipher machine provides quantum cipher key for the quantum cipher key management platform and the cipher key filling machine;
The quantum key management platform receives the application of the interphone and distributes service keys to the interphone through a public network channel;
the key filling machine fills the quantum key generated in the quantum cipher machine into the quantum security chip to realize that the quantum security chip and the quantum key management platform are internally provided with symmetric keys;
each interphone encrypts the intercom information based on the service key under the trunking channel.
The invention has the advantages that:
(1) According to the invention, the quantum key management platform receives the application of the interphones, distributes service keys to the interphones through the public network channel, and the interphones are talked under the trunked channel based on the encryption of the service keys.
(2) The talkback system and the talkback system apply for the service keys of the trunked talkback group by the vector subkey management platform under the public network channel, distribute the service keys to all members, initiate a key update flow through the trunked talkback group, realize service key update and reduce the difficulty and workload of replacing the keys of the traditional talkback system.
(3) The invention initiates a key update flow through the trunking talkback group, realizes service key update, and solves the problem of security degradation under the condition of long-time use of the same key.
(4) The invention improves the convenience and feasibility of adding a new user (namely interphone) into the trunked intercom group, and the user independently performs identity authentication, and can add the encrypted intercom only by adding the user into the group by an creator of the trunked intercom group, and the new user does not need to manually input an intercom service key.
Drawings
Fig. 1 is a schematic structural diagram of a system for implementing cluster encryption of a dual-mode interphone based on a public network according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for implementing cluster encryption of a dual-mode interphone based on a public network according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions in the embodiments of the present invention will be clearly and completely described in the following in conjunction with the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, a system for implementing cluster encryption by a dual-mode interphone based on a public network comprises a quantum cryptography machine 1, a quantum key management platform 2, a key charging machine 3, a plurality of interphones 4, a public network channel 6 and a cluster channel 7, wherein a quantum security chip 5 is arranged in each interphone 4;
quantum cryptography machine 1: the system has the quantum password generation and management functions, and provides a quantum key for a quantum password management platform and the key filling machine 3.
Quantum key management platform 2: the interphone 4 can apply for the service key through the public network channel 6 vector sub-password management platform.
Key charger 3: the quantum secret key generated in the quantum cryptography machine 1 is filled into the quantum security chip 5, so that a large number of symmetric secret keys are arranged in the quantum security chip 5 and the quantum secret key management platform 2.
Interphone 4: the built-in quantum security chip 5 supports the public network channel 6 and the trunking channel 7, and the manner of the built-in quantum security chip 5 of the interphone 4 can be that a clamping groove is arranged inside the interphone 4, the quantum security chip 5 is embedded into the clamping groove, or the quantum security chip 5 and the interphone 4 are integrated in the production stage of the interphone 4.
Quantum security chip 5: the key charger 3 is arranged in the interphone 4, can store the quantum key charged by the key charger 3, and provides the identity authentication and data encryption functions based on the quantum key for the interphone 4.
As shown in fig. 2, the invention further provides a method for implementing a system for encrypting a cluster by the dual-mode interphone based on a public network, which comprises the following steps:
S1: the interphone 4 is connected to the line under the public network channel 6 and completes identity authentication; the specific process is as follows: each interphone 4 authenticates part 2 based on "GB/T15843.2-2017 information technology security technology entity: by adopting an entity authentication technology in a mechanism of a symmetric encryption algorithm, a symmetric key pair is formed between a quantum key Ka (i) filled in each built-in quantum security chip 5 and a key Ka (i)' of a quantum key management platform 2 (or a quantum cipher machine 1) by calling the quantum key Ka (i), and the identity authentication of the interphone 4 is completed based on the symmetric key pair; and when the interphone 4 performs identity authentication, calling the charged quantum key Ka (i+n) in the quantum security chip, comparing the quantum key Ka with the key in the quantum key management platform, and completing the identity authentication process if the key Ka (i+n)' exists.
S2: the interphone 4 applies for the service key of the trunking talkback group by the vector subkey management platform 2 under the public network channel 6 and distributes the service key to all panelists; the specific process is as follows: setting interphone A as an creator of a trunking talkback group in all interphones 4, informing the quantum key management platform 2 that other interphones 4 participating in talkback join the trunking talkback group, generating a new service key K (i) by the quantum key management platform 1, wherein i represents the ith update, the quantum key management platform 2 calls a quantum key Ka (i+m) 'in each interphone 4 corresponding to the quantum security chip 5 in the trunking talkback group, encrypts the service key K (i) through the quantum key Ka (i+m)' to form a ciphertext, respectively transmits the ciphertext to each interphone 4, decrypts the ciphertext by using the quantum key Ka (i+m) in the quantum security chip after the interphone 4 receives the ciphertext, and obtains the service key K (i) by the interphone 4 in the trunking talkback group based on the public network channel 6, and stores the service key K (i) in the quantum security chip 5 or other security storage spaces in the interphone 4.
Since the algorithm such as SM4 preferably uses a 128-bit key, the service key K (i) is set to be a 128-bit key, and the key charger 3 charges a 128-bit quantum key when charging the key in the quantum security chip 5. The key encryption issuing process encrypts the key service key K (i) by using the quantum key in the quantum security chip 5 and the service key K (i) in an exclusive OR mode of 1:1, or encrypts the key service key K (i) by using the quantum key in the quantum security chip 5 based on an SM4 algorithm.
S3: the interphone 4 in the trunking talkback group uses the service key to carry out encryption communication; the specific process is as follows: and after the trunking talkback function is started, the trunking talkback group established by the interphone A calls a service key K (i) from the safe storage space of the service key K (i), and encrypts talkback by adopting the same symmetric encryption algorithm based on the service key K (i). The symmetric encryption algorithm includes SM4, 3DES, or ZUC.
S4: the trunking talkback group initiates a key updating flow and service key updating; the specific process is as follows: the method comprises the steps that after a cluster talkback group is preset with an updating period, step S2 and step S3 are repeatedly executed under the condition of a public network channel, so that all interphones 4 in the cluster talkback group acquire a service key K (2), a service key K (3) and a service key K (4) in the updating process, the interphone 4 logs out an original service key K (1) after acquiring the service key K (2), and the like, and the interphone 4 logs out the original service key K (2) after acquiring the service key K (3), namely, the interphone 4 logs out the original service key after acquiring a new service key in each updating process.
S5: after the trunking talkback group finishes talkback, the trunking talkback group is disassembled, and all service keys are logged off.
In step S1, if the identity authentication of the interphone 4 is not completed or the identity authentication is not passed, step S2 and step S3 are not performed.
In addition, it should be noted that, the interphone 4 performs identity authentication and key issuing through the public network channel 6, and uses the key for trunking intercom, so that the method can be moved to other application scenarios, for example, the interphone 4 has a plurality of data channels, the interphone 4 has a private network channel and a private network channel, and the like, and the invention does not particularly limit the channel of the interphone 4 and the type of the interphone 4.
According to the technical scheme, the quantum key management platform 2 receives the application of the interphone 4, distributes service keys to the interphone 4 through the public network channel 6, the interphone 4 performs talkback based on service key encryption under the trunking channel 7, the key is safely distributed, the keys are circulated between the interphone 4 and the quantum key management platform 2, the keys are irrelevant to the talkback platform and the trunking channel 7, plaintext data processing on the platform side is avoided, and the security of talkback service is provided.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (9)
1. A method for realizing cluster encryption of a dual-mode interphone based on a public network is characterized by comprising the following steps:
Step one: the interphone is on line under a public network channel and completes identity authentication;
Each interphone is based on an entity authentication technology, a symmetric key pair Ka (i) and Ka (i)', which are filled in a quantum security chip respectively, are formed between the quantum key and a quantum key management platform by calling the quantum key Ka (i) filled in the quantum security chip, and the identity authentication of the interphone is completed based on the symmetric key pair; when the interphone performs identity authentication, a quantum key Ka (i+n) filled in the quantum security chip is called, the quantum key Ka (i+n) is compared with a key in the quantum key management platform, and if the key Ka (i+n)' exists, the identity authentication process is completed;
Step two: the interphone applies for a service key of a trunking talkback group by a vector subkey management platform under a public network channel and distributes the service key to all panelists;
Step three: the interphone in the trunking talkback group uses the service key to carry out encryption communication;
Step four: the trunking talkback group initiates a key updating flow and service key updating;
step five: after the trunking talkback group finishes talkback, the trunking talkback group is disassembled, and the service key is logged off.
2. The method for implementing cluster encryption by the dual-mode interphone based on the public network according to claim 1, wherein the step two comprises: setting interphone A as an creator of a trunking talkback group in all interphones, informing a quantum key management platform that other interphones participating in talkback join the trunking talkback group, generating a new service key K (i) by the quantum key management platform, wherein i represents the ith update, the quantum key management platform calls a quantum key Ka (i+m) 'in a quantum security chip corresponding to each interphone in the trunking talkback group, encrypts the service key K (i) through the quantum key Ka (i+m)' respectively, sends the encrypted ciphertext to each interphone, calls the quantum key Ka (i+m) in the quantum security chip to decrypt after the interphone receives the ciphertext, and obtaining the service key K (i), so that the trunking talkback group obtains the same service key K (i) based on a public network channel, and stores the service key K (i) in a quantum security chip or other security storage space in the interphone.
3. The method for implementing cluster encryption based on public network for dual-mode interphone according to claim 2, wherein the service key K (i) is set to be a 128-bit key, and the key filling machine is used for filling the quantum key of one 128bit when filling the key in the quantum security chip.
4. The method for realizing cluster encryption based on public network of the dual-mode interphone according to claim 2, wherein the key encryption issuing process encrypts the key service key K (i) by using the quantum key in the quantum security chip and the service key K (i) in an exclusive-or mode of 1:1 or encrypts the key service key K (i) by using the quantum key in the quantum security chip based on an SM4 algorithm.
5. The method for implementing cluster encryption by the dual-mode interphone based on the public network according to claim 2, wherein the step three comprises: and after the trunking talkback function is started, the trunking talkback group established by the interphone A calls a service key K (i) from the safe storage space of the service key K (i), and encrypts talkback by adopting the same symmetric encryption algorithm based on the service key K (i).
6. The method for implementing cluster encryption based on public network for dual-mode interphone according to claim 5, wherein the symmetric encryption algorithm comprises SM4, 3DES or ZUC.
7. The method for implementing cluster encryption based on public network for dual-mode interphone according to claim 5, wherein the fourth step comprises: and (3) presetting an updating period by the trunking talkback group, repeatedly executing the second step and the third step under the condition of a public network channel after the updating period, and logging out the original service key K (i) after the interphone in the trunking talkback group acquires the new service key K (i+1) in each updating process.
8. The method for implementing trunking encryption by a dual-mode interphone based on public network according to claim 1, wherein in the first step, if the identity authentication of the interphone is not completed or is not passed, the second step and the third step are not executed.
9. The system for implementing the method for trunking encryption by the dual-mode interphone based on the public network according to any one of claims 1 to 8, comprising a quantum cryptography machine, a key charger, a quantum key management platform, a plurality of interphones, a public network channel and a trunking channel, wherein each interphone is internally provided with a quantum security chip;
The quantum cipher machine provides quantum cipher key for the quantum cipher key management platform and the cipher key filling machine;
The quantum key management platform receives the application of the interphone and distributes service keys to the interphone through a public network channel;
the key filling machine fills the quantum key generated in the quantum cipher machine into the quantum security chip to realize that the quantum security chip and the quantum key management platform are internally provided with symmetric keys;
each interphone encrypts the intercom information based on the service key under the trunking channel.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110929301.2A CN113612608B (en) | 2021-08-13 | 2021-08-13 | Method and system for realizing cluster encryption of dual-mode interphone based on public network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110929301.2A CN113612608B (en) | 2021-08-13 | 2021-08-13 | Method and system for realizing cluster encryption of dual-mode interphone based on public network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113612608A CN113612608A (en) | 2021-11-05 |
CN113612608B true CN113612608B (en) | 2024-04-19 |
Family
ID=78340648
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110929301.2A Active CN113612608B (en) | 2021-08-13 | 2021-08-13 | Method and system for realizing cluster encryption of dual-mode interphone based on public network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113612608B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114095168B (en) * | 2021-11-24 | 2024-02-23 | 安徽国盾量子云数据技术有限公司 | Communication method based on quantum key and encrypted communication terminal thereof |
CN114531238B (en) * | 2022-04-24 | 2022-07-19 | 中电信量子科技有限公司 | Secret key safe filling method and system based on quantum secret key distribution |
CN116233767B (en) * | 2023-03-20 | 2024-04-30 | 中国联合网络通信集团有限公司 | Cluster intercom communication method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014194858A1 (en) * | 2013-06-08 | 2014-12-11 | 安徽量子通信技术有限公司 | Mobile secret communications method based on quantum key distribution network |
CN106911718A (en) * | 2017-04-17 | 2017-06-30 | 江苏亨通问天量子信息研究院有限公司 | Secrecy intercom system and method based on quantum key service station |
CN108234501A (en) * | 2018-01-11 | 2018-06-29 | 北京国电通网络技术有限公司 | A kind of virtual plant safety communicating method based on quantum key fusion |
CN111093060A (en) * | 2019-12-20 | 2020-05-01 | 安徽问天量子科技股份有限公司 | Protection device and protection method for video data acquisition and transmission safety |
CN111865589A (en) * | 2020-08-14 | 2020-10-30 | 国科量子通信网络有限公司 | Quantum communication encryption system and method for realizing mobile communication quantum encryption transmission |
CN112260832A (en) * | 2020-12-17 | 2021-01-22 | 南京易科腾信息技术有限公司 | Information encryption, decryption and control method and device and electronic equipment |
-
2021
- 2021-08-13 CN CN202110929301.2A patent/CN113612608B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014194858A1 (en) * | 2013-06-08 | 2014-12-11 | 安徽量子通信技术有限公司 | Mobile secret communications method based on quantum key distribution network |
CN106911718A (en) * | 2017-04-17 | 2017-06-30 | 江苏亨通问天量子信息研究院有限公司 | Secrecy intercom system and method based on quantum key service station |
CN108234501A (en) * | 2018-01-11 | 2018-06-29 | 北京国电通网络技术有限公司 | A kind of virtual plant safety communicating method based on quantum key fusion |
CN111093060A (en) * | 2019-12-20 | 2020-05-01 | 安徽问天量子科技股份有限公司 | Protection device and protection method for video data acquisition and transmission safety |
CN111865589A (en) * | 2020-08-14 | 2020-10-30 | 国科量子通信网络有限公司 | Quantum communication encryption system and method for realizing mobile communication quantum encryption transmission |
CN112260832A (en) * | 2020-12-17 | 2021-01-22 | 南京易科腾信息技术有限公司 | Information encryption, decryption and control method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN113612608A (en) | 2021-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113612608B (en) | Method and system for realizing cluster encryption of dual-mode interphone based on public network | |
EP3422629B1 (en) | Method, apparatus and system for encryption key distribution and authentication | |
CN102257842B (en) | Enhanced security for direct link communications | |
EP3432532A1 (en) | Key distribution and authentication method, apparatus and system | |
CN102196425B (en) | Quantum-key-distribution-network-based mobile encryption system and communication method thereof | |
CN110224821B (en) | Communication encryption method for unmanned mobile platform | |
US20100135491A1 (en) | Authentication method | |
CN101340443A (en) | Session key negotiating method, system and server in communication network | |
WO2023082599A1 (en) | Blockchain network security communication method based on quantum key | |
CN106982419B (en) | Single call end-to-end encryption method and system for broadband cluster system | |
WO2009135444A1 (en) | Key distribution method, terminal device and key distribution center | |
CN101707767B (en) | Data transmission method and devices | |
CN111865589A (en) | Quantum communication encryption system and method for realizing mobile communication quantum encryption transmission | |
JP2020025311A (en) | Group gateway and communication method | |
CN111385088B (en) | Efficient satellite quantum key pairing generation method | |
CN111835997B (en) | Cloud video conference system based on quantum key encryption and decryption method thereof | |
CN101789863A (en) | Safe data information transmission method | |
CN114095168B (en) | Communication method based on quantum key and encrypted communication terminal thereof | |
CN101420687B (en) | Identity verification method based on mobile terminal payment | |
CN101431409B (en) | Method for implementing secret communication in different wireless local area network | |
CN107659405A (en) | The encrypting and decrypting method that data communicate between a kind of transformer station boss station | |
WO2012165901A2 (en) | Method for inter-terminal security channelization | |
CN106961330A (en) | Quantum key service station | |
WO2017080142A1 (en) | Key distribution, generation and reception method, and related apparatus | |
CN114553418A (en) | Service method, device, system and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |