CN113612608B - Method and system for realizing cluster encryption of dual-mode interphone based on public network - Google Patents

Method and system for realizing cluster encryption of dual-mode interphone based on public network Download PDF

Info

Publication number
CN113612608B
CN113612608B CN202110929301.2A CN202110929301A CN113612608B CN 113612608 B CN113612608 B CN 113612608B CN 202110929301 A CN202110929301 A CN 202110929301A CN 113612608 B CN113612608 B CN 113612608B
Authority
CN
China
Prior art keywords
key
quantum
interphone
public network
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110929301.2A
Other languages
Chinese (zh)
Other versions
CN113612608A (en
Inventor
刘驰
何良杰
李杏桃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Quantum Technology Co ltd
Original Assignee
China Telecom Quantum Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Quantum Technology Co ltd filed Critical China Telecom Quantum Technology Co ltd
Priority to CN202110929301.2A priority Critical patent/CN113612608B/en
Publication of CN113612608A publication Critical patent/CN113612608A/en
Application granted granted Critical
Publication of CN113612608B publication Critical patent/CN113612608B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • H04W4/08User group management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers

Abstract

The invention discloses a method and a system for realizing cluster encryption of dual-mode interphones based on a public network, wherein the system comprises a quantum cipher machine, a key filling machine, a quantum key management platform, a plurality of interphones, a public network channel and a cluster channel, and a quantum security chip is arranged in each interphone; the quantum cipher machine provides quantum cipher key for the quantum cipher key management platform and the cipher key filling machine; the quantum key management platform distributes service keys to interphones through public network channels; the key filling machine fills the quantum key generated in the quantum cipher machine into the quantum security chip to realize that the quantum security chip and the quantum key management platform have symmetric ciphers; each interphone encrypts talkback based on a service key under a trunking channel; the invention has the advantages that: the key is safely distributed, the key flows between the interphone and the quantum key management platform, is irrelevant to the interphone platform and the trunking channel, is prevented from being decrypted at the platform side, and the reliability of the interphone process is provided.

Description

Method and system for realizing cluster encryption of dual-mode interphone based on public network
Technical Field
The invention relates to the technical field of quantum key application in information encryption, in particular to a method and a system for realizing cluster encryption of a dual-mode interphone based on a public network.
Background
The interphone is a bidirectional mobile communication tool, can communicate without any network support, has no telephone charge, and is suitable for occasions with relatively fixed and frequent communication. Interphones are of three general categories: analog interphone, digital interphone, IP interphone.
The conventional interphone has the following problems:
1. the interphone encryption algorithm is simple, even the private network communication is not encrypted, and the interphone communication is transmitted in a plaintext form;
2. The encryption device or the key module built in the interphone lacks an updating means for the key, and the key is reused for a long time;
3. the key security distribution process of the traditional interphone (particularly the trunked interphone) is difficult to realize due to the lack of a data communication channel.
4. The existing encryption interphone equipment has decryption processes on the platform side, and data is clear for the background, so that the protection aspect is incomplete.
Filing date: 2017.04.17 application number: 201720396024.2 discloses a secret intercom system based on a quantum key service station, which comprises the quantum key service station and a plurality of interphones, wherein the interphones complete information transmission through transfer of the quantum key service station, a quantum random number generator is arranged in the quantum key service station and used for generating a quantum key with true randomness, and the quantum key is stored in a key storage module and is downloaded by the interphones. The interphone disclosed by the utility model is transferred through the quantum key service station, and the decryption and secondary encryption processes are completed in the service station, so that the long-distance secret interphone is realized, and the information safety transmission is ensured.
Filing date: 2020.06.05 application number: the utility model relates to the technical field of secure communication, in particular to an encryption interphone based on quantum key filling, which comprises quantum key filling equipment, an interphone and an external storage medium, wherein the encryption interphone based on quantum key filling is characterized in that: 1. the random numbers used as the secret keys or seeds of the encryption algorithm are all generated by the quantum true random number generator, and have the characteristics of being truly unpredictable and random, so that the effectiveness of the used encryption algorithm is ensured. 2. The quantum true random number is filled into the secret storage medium in advance, so that the adverse conditions such as large volume, large mass, high energy consumption and the like which are common when the quantum true random number generator is applied to the field of radio mobile communication are broken through. And one quantum key filling device can meet the number requirement of a large number of secret storage media by only needing one quantum true random number generator. This advantage also compensates for the cost problem of the quantum true random number generator being expensive.
However, the above patent still does not solve the problem that the key security distribution process in the conventional interphone encryption process is difficult to realize, the decryption process is provided on the platform side, and the background data plaintext is processed, so that the reliability is not high.
Disclosure of Invention
The invention aims to solve the technical problems that in the prior art, the secret key security distribution process is difficult to realize in the encryption interphone process, and the background data plaintext is processed in the decryption process on the platform side, so that the security is insufficient.
The invention solves the technical problems by the following technical means: a method for realizing cluster encryption of a dual-mode interphone based on a public network comprises the following steps:
Step one: the interphone is on line under a public network channel and completes identity authentication;
Step two: the interphone applies for a service key of a trunking talkback group by a vector subkey management platform under a public network channel and distributes the service key to all panelists;
Step three: the interphone in the trunking talkback group uses the service key to carry out encryption communication;
Step four: the trunking talkback group initiates a key updating flow and service key updating;
step five: after the trunking talkback group finishes talkback, the trunking talkback group is disassembled, and the service key is logged off.
According to the invention, the quantum key management platform receives the application of the interphones, distributes service keys to the interphones through the public network channel, and the interphones are talked based on the encryption of the service keys under the trunking channel.
Further, the first step includes: each interphone is based on an entity authentication technology, a symmetric key pair Ka (i) and Ka (i)', which are filled in a quantum security chip respectively, are formed between the quantum key and a quantum key management platform by calling the quantum key Ka (i) filled in the quantum security chip, and the identity authentication of the interphone is completed based on the symmetric key pair; and when the interphone performs identity authentication, calling the charged quantum key Ka (i+n) in the quantum security chip, comparing the quantum key Ka (i+n) with the key in the quantum key management platform, and completing the identity authentication process if the key Ka (i+n)' exists.
Further, the second step includes: setting interphone A as an creator of a trunking talkback group in all interphones, informing a quantum key management platform that other interphones participating in talkback join the trunking talkback group, generating a new service key K (i) by the quantum key management platform, wherein i represents the ith update, the quantum key management platform calls a quantum key Ka (i+m) 'in a quantum security chip corresponding to each interphone in the trunking talkback group, encrypts the service key K (i) through the quantum key Ka (i+m)' respectively, sends the encrypted ciphertext to each interphone, calls the quantum key Ka (i+m) in the quantum security chip to decrypt after the interphone receives the ciphertext, and obtaining the service key K (i), so that the trunking talkback group obtains the same service key K (i) based on a public network channel, and stores the service key K (i) in a quantum security chip or other security storage space in the interphone.
Further, the key Ka (i+m) in the second step is different from the keys Ka (i) and Ka (i+n) in the first step, and the keys Ka (i), ka (i+m) and Ka (i+n) in each interphone are different.
Furthermore, the service key K (i) is set to be a 128-bit key, and the key filling machine is used for filling the 128-bit quantum key when filling the quantum security chip internal key.
Furthermore, the key encryption issuing process encrypts the key service key K (i) by using the quantum key in the quantum security chip and the service key K (i) in a 1:1 exclusive OR mode, or encrypts the key service key K (i) by using the quantum key in the quantum security chip based on an SM4 algorithm.
Still further, the third step includes: and after the trunking talkback function is started, the trunking talkback group established by the interphone A calls a service key K (i) from the safe storage space of the service key K (i), and encrypts talkback by adopting the same symmetric encryption algorithm based on the service key K (i).
Still further, the symmetric encryption algorithm includes SM4, 3DES, or ZUC.
Still further, the fourth step includes: and (3) presetting an updating period by the trunking talkback group, repeatedly executing the second step and the third step under the condition of a public network channel after the updating period, and logging out the original service key K (i) after the interphone in the trunking talkback group acquires the new service key K (i+1) in each updating process.
Further, in the first step, if the identity authentication of the interphone is not completed or the identity authentication is not passed, the second step and the third step are not executed.
The invention also provides a system for realizing the method of cluster encryption based on the public network for the dual-mode interphone, which comprises a quantum cipher machine, a key filling machine, a quantum key management platform, a plurality of interphones, a public network channel and a cluster channel, wherein a quantum security chip is arranged in each interphone;
The quantum cipher machine provides quantum cipher key for the quantum cipher key management platform and the cipher key filling machine;
The quantum key management platform receives the application of the interphone and distributes service keys to the interphone through a public network channel;
the key filling machine fills the quantum key generated in the quantum cipher machine into the quantum security chip to realize that the quantum security chip and the quantum key management platform are internally provided with symmetric keys;
each interphone encrypts the intercom information based on the service key under the trunking channel.
The invention has the advantages that:
(1) According to the invention, the quantum key management platform receives the application of the interphones, distributes service keys to the interphones through the public network channel, and the interphones are talked under the trunked channel based on the encryption of the service keys.
(2) The talkback system and the talkback system apply for the service keys of the trunked talkback group by the vector subkey management platform under the public network channel, distribute the service keys to all members, initiate a key update flow through the trunked talkback group, realize service key update and reduce the difficulty and workload of replacing the keys of the traditional talkback system.
(3) The invention initiates a key update flow through the trunking talkback group, realizes service key update, and solves the problem of security degradation under the condition of long-time use of the same key.
(4) The invention improves the convenience and feasibility of adding a new user (namely interphone) into the trunked intercom group, and the user independently performs identity authentication, and can add the encrypted intercom only by adding the user into the group by an creator of the trunked intercom group, and the new user does not need to manually input an intercom service key.
Drawings
Fig. 1 is a schematic structural diagram of a system for implementing cluster encryption of a dual-mode interphone based on a public network according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for implementing cluster encryption of a dual-mode interphone based on a public network according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions in the embodiments of the present invention will be clearly and completely described in the following in conjunction with the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, a system for implementing cluster encryption by a dual-mode interphone based on a public network comprises a quantum cryptography machine 1, a quantum key management platform 2, a key charging machine 3, a plurality of interphones 4, a public network channel 6 and a cluster channel 7, wherein a quantum security chip 5 is arranged in each interphone 4;
quantum cryptography machine 1: the system has the quantum password generation and management functions, and provides a quantum key for a quantum password management platform and the key filling machine 3.
Quantum key management platform 2: the interphone 4 can apply for the service key through the public network channel 6 vector sub-password management platform.
Key charger 3: the quantum secret key generated in the quantum cryptography machine 1 is filled into the quantum security chip 5, so that a large number of symmetric secret keys are arranged in the quantum security chip 5 and the quantum secret key management platform 2.
Interphone 4: the built-in quantum security chip 5 supports the public network channel 6 and the trunking channel 7, and the manner of the built-in quantum security chip 5 of the interphone 4 can be that a clamping groove is arranged inside the interphone 4, the quantum security chip 5 is embedded into the clamping groove, or the quantum security chip 5 and the interphone 4 are integrated in the production stage of the interphone 4.
Quantum security chip 5: the key charger 3 is arranged in the interphone 4, can store the quantum key charged by the key charger 3, and provides the identity authentication and data encryption functions based on the quantum key for the interphone 4.
As shown in fig. 2, the invention further provides a method for implementing a system for encrypting a cluster by the dual-mode interphone based on a public network, which comprises the following steps:
S1: the interphone 4 is connected to the line under the public network channel 6 and completes identity authentication; the specific process is as follows: each interphone 4 authenticates part 2 based on "GB/T15843.2-2017 information technology security technology entity: by adopting an entity authentication technology in a mechanism of a symmetric encryption algorithm, a symmetric key pair is formed between a quantum key Ka (i) filled in each built-in quantum security chip 5 and a key Ka (i)' of a quantum key management platform 2 (or a quantum cipher machine 1) by calling the quantum key Ka (i), and the identity authentication of the interphone 4 is completed based on the symmetric key pair; and when the interphone 4 performs identity authentication, calling the charged quantum key Ka (i+n) in the quantum security chip, comparing the quantum key Ka with the key in the quantum key management platform, and completing the identity authentication process if the key Ka (i+n)' exists.
S2: the interphone 4 applies for the service key of the trunking talkback group by the vector subkey management platform 2 under the public network channel 6 and distributes the service key to all panelists; the specific process is as follows: setting interphone A as an creator of a trunking talkback group in all interphones 4, informing the quantum key management platform 2 that other interphones 4 participating in talkback join the trunking talkback group, generating a new service key K (i) by the quantum key management platform 1, wherein i represents the ith update, the quantum key management platform 2 calls a quantum key Ka (i+m) 'in each interphone 4 corresponding to the quantum security chip 5 in the trunking talkback group, encrypts the service key K (i) through the quantum key Ka (i+m)' to form a ciphertext, respectively transmits the ciphertext to each interphone 4, decrypts the ciphertext by using the quantum key Ka (i+m) in the quantum security chip after the interphone 4 receives the ciphertext, and obtains the service key K (i) by the interphone 4 in the trunking talkback group based on the public network channel 6, and stores the service key K (i) in the quantum security chip 5 or other security storage spaces in the interphone 4.
Since the algorithm such as SM4 preferably uses a 128-bit key, the service key K (i) is set to be a 128-bit key, and the key charger 3 charges a 128-bit quantum key when charging the key in the quantum security chip 5. The key encryption issuing process encrypts the key service key K (i) by using the quantum key in the quantum security chip 5 and the service key K (i) in an exclusive OR mode of 1:1, or encrypts the key service key K (i) by using the quantum key in the quantum security chip 5 based on an SM4 algorithm.
S3: the interphone 4 in the trunking talkback group uses the service key to carry out encryption communication; the specific process is as follows: and after the trunking talkback function is started, the trunking talkback group established by the interphone A calls a service key K (i) from the safe storage space of the service key K (i), and encrypts talkback by adopting the same symmetric encryption algorithm based on the service key K (i). The symmetric encryption algorithm includes SM4, 3DES, or ZUC.
S4: the trunking talkback group initiates a key updating flow and service key updating; the specific process is as follows: the method comprises the steps that after a cluster talkback group is preset with an updating period, step S2 and step S3 are repeatedly executed under the condition of a public network channel, so that all interphones 4 in the cluster talkback group acquire a service key K (2), a service key K (3) and a service key K (4) in the updating process, the interphone 4 logs out an original service key K (1) after acquiring the service key K (2), and the like, and the interphone 4 logs out the original service key K (2) after acquiring the service key K (3), namely, the interphone 4 logs out the original service key after acquiring a new service key in each updating process.
S5: after the trunking talkback group finishes talkback, the trunking talkback group is disassembled, and all service keys are logged off.
In step S1, if the identity authentication of the interphone 4 is not completed or the identity authentication is not passed, step S2 and step S3 are not performed.
In addition, it should be noted that, the interphone 4 performs identity authentication and key issuing through the public network channel 6, and uses the key for trunking intercom, so that the method can be moved to other application scenarios, for example, the interphone 4 has a plurality of data channels, the interphone 4 has a private network channel and a private network channel, and the like, and the invention does not particularly limit the channel of the interphone 4 and the type of the interphone 4.
According to the technical scheme, the quantum key management platform 2 receives the application of the interphone 4, distributes service keys to the interphone 4 through the public network channel 6, the interphone 4 performs talkback based on service key encryption under the trunking channel 7, the key is safely distributed, the keys are circulated between the interphone 4 and the quantum key management platform 2, the keys are irrelevant to the talkback platform and the trunking channel 7, plaintext data processing on the platform side is avoided, and the security of talkback service is provided.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (9)

1. A method for realizing cluster encryption of a dual-mode interphone based on a public network is characterized by comprising the following steps:
Step one: the interphone is on line under a public network channel and completes identity authentication;
Each interphone is based on an entity authentication technology, a symmetric key pair Ka (i) and Ka (i)', which are filled in a quantum security chip respectively, are formed between the quantum key and a quantum key management platform by calling the quantum key Ka (i) filled in the quantum security chip, and the identity authentication of the interphone is completed based on the symmetric key pair; when the interphone performs identity authentication, a quantum key Ka (i+n) filled in the quantum security chip is called, the quantum key Ka (i+n) is compared with a key in the quantum key management platform, and if the key Ka (i+n)' exists, the identity authentication process is completed;
Step two: the interphone applies for a service key of a trunking talkback group by a vector subkey management platform under a public network channel and distributes the service key to all panelists;
Step three: the interphone in the trunking talkback group uses the service key to carry out encryption communication;
Step four: the trunking talkback group initiates a key updating flow and service key updating;
step five: after the trunking talkback group finishes talkback, the trunking talkback group is disassembled, and the service key is logged off.
2. The method for implementing cluster encryption by the dual-mode interphone based on the public network according to claim 1, wherein the step two comprises: setting interphone A as an creator of a trunking talkback group in all interphones, informing a quantum key management platform that other interphones participating in talkback join the trunking talkback group, generating a new service key K (i) by the quantum key management platform, wherein i represents the ith update, the quantum key management platform calls a quantum key Ka (i+m) 'in a quantum security chip corresponding to each interphone in the trunking talkback group, encrypts the service key K (i) through the quantum key Ka (i+m)' respectively, sends the encrypted ciphertext to each interphone, calls the quantum key Ka (i+m) in the quantum security chip to decrypt after the interphone receives the ciphertext, and obtaining the service key K (i), so that the trunking talkback group obtains the same service key K (i) based on a public network channel, and stores the service key K (i) in a quantum security chip or other security storage space in the interphone.
3. The method for implementing cluster encryption based on public network for dual-mode interphone according to claim 2, wherein the service key K (i) is set to be a 128-bit key, and the key filling machine is used for filling the quantum key of one 128bit when filling the key in the quantum security chip.
4. The method for realizing cluster encryption based on public network of the dual-mode interphone according to claim 2, wherein the key encryption issuing process encrypts the key service key K (i) by using the quantum key in the quantum security chip and the service key K (i) in an exclusive-or mode of 1:1 or encrypts the key service key K (i) by using the quantum key in the quantum security chip based on an SM4 algorithm.
5. The method for implementing cluster encryption by the dual-mode interphone based on the public network according to claim 2, wherein the step three comprises: and after the trunking talkback function is started, the trunking talkback group established by the interphone A calls a service key K (i) from the safe storage space of the service key K (i), and encrypts talkback by adopting the same symmetric encryption algorithm based on the service key K (i).
6. The method for implementing cluster encryption based on public network for dual-mode interphone according to claim 5, wherein the symmetric encryption algorithm comprises SM4, 3DES or ZUC.
7. The method for implementing cluster encryption based on public network for dual-mode interphone according to claim 5, wherein the fourth step comprises: and (3) presetting an updating period by the trunking talkback group, repeatedly executing the second step and the third step under the condition of a public network channel after the updating period, and logging out the original service key K (i) after the interphone in the trunking talkback group acquires the new service key K (i+1) in each updating process.
8. The method for implementing trunking encryption by a dual-mode interphone based on public network according to claim 1, wherein in the first step, if the identity authentication of the interphone is not completed or is not passed, the second step and the third step are not executed.
9. The system for implementing the method for trunking encryption by the dual-mode interphone based on the public network according to any one of claims 1 to 8, comprising a quantum cryptography machine, a key charger, a quantum key management platform, a plurality of interphones, a public network channel and a trunking channel, wherein each interphone is internally provided with a quantum security chip;
The quantum cipher machine provides quantum cipher key for the quantum cipher key management platform and the cipher key filling machine;
The quantum key management platform receives the application of the interphone and distributes service keys to the interphone through a public network channel;
the key filling machine fills the quantum key generated in the quantum cipher machine into the quantum security chip to realize that the quantum security chip and the quantum key management platform are internally provided with symmetric keys;
each interphone encrypts the intercom information based on the service key under the trunking channel.
CN202110929301.2A 2021-08-13 2021-08-13 Method and system for realizing cluster encryption of dual-mode interphone based on public network Active CN113612608B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110929301.2A CN113612608B (en) 2021-08-13 2021-08-13 Method and system for realizing cluster encryption of dual-mode interphone based on public network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110929301.2A CN113612608B (en) 2021-08-13 2021-08-13 Method and system for realizing cluster encryption of dual-mode interphone based on public network

Publications (2)

Publication Number Publication Date
CN113612608A CN113612608A (en) 2021-11-05
CN113612608B true CN113612608B (en) 2024-04-19

Family

ID=78340648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110929301.2A Active CN113612608B (en) 2021-08-13 2021-08-13 Method and system for realizing cluster encryption of dual-mode interphone based on public network

Country Status (1)

Country Link
CN (1) CN113612608B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114095168B (en) * 2021-11-24 2024-02-23 安徽国盾量子云数据技术有限公司 Communication method based on quantum key and encrypted communication terminal thereof
CN114531238B (en) * 2022-04-24 2022-07-19 中电信量子科技有限公司 Secret key safe filling method and system based on quantum secret key distribution
CN116233767B (en) * 2023-03-20 2024-04-30 中国联合网络通信集团有限公司 Cluster intercom communication method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014194858A1 (en) * 2013-06-08 2014-12-11 安徽量子通信技术有限公司 Mobile secret communications method based on quantum key distribution network
CN106911718A (en) * 2017-04-17 2017-06-30 江苏亨通问天量子信息研究院有限公司 Secrecy intercom system and method based on quantum key service station
CN108234501A (en) * 2018-01-11 2018-06-29 北京国电通网络技术有限公司 A kind of virtual plant safety communicating method based on quantum key fusion
CN111093060A (en) * 2019-12-20 2020-05-01 安徽问天量子科技股份有限公司 Protection device and protection method for video data acquisition and transmission safety
CN111865589A (en) * 2020-08-14 2020-10-30 国科量子通信网络有限公司 Quantum communication encryption system and method for realizing mobile communication quantum encryption transmission
CN112260832A (en) * 2020-12-17 2021-01-22 南京易科腾信息技术有限公司 Information encryption, decryption and control method and device and electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014194858A1 (en) * 2013-06-08 2014-12-11 安徽量子通信技术有限公司 Mobile secret communications method based on quantum key distribution network
CN106911718A (en) * 2017-04-17 2017-06-30 江苏亨通问天量子信息研究院有限公司 Secrecy intercom system and method based on quantum key service station
CN108234501A (en) * 2018-01-11 2018-06-29 北京国电通网络技术有限公司 A kind of virtual plant safety communicating method based on quantum key fusion
CN111093060A (en) * 2019-12-20 2020-05-01 安徽问天量子科技股份有限公司 Protection device and protection method for video data acquisition and transmission safety
CN111865589A (en) * 2020-08-14 2020-10-30 国科量子通信网络有限公司 Quantum communication encryption system and method for realizing mobile communication quantum encryption transmission
CN112260832A (en) * 2020-12-17 2021-01-22 南京易科腾信息技术有限公司 Information encryption, decryption and control method and device and electronic equipment

Also Published As

Publication number Publication date
CN113612608A (en) 2021-11-05

Similar Documents

Publication Publication Date Title
CN113612608B (en) Method and system for realizing cluster encryption of dual-mode interphone based on public network
EP3422629B1 (en) Method, apparatus and system for encryption key distribution and authentication
CN102257842B (en) Enhanced security for direct link communications
EP3432532A1 (en) Key distribution and authentication method, apparatus and system
CN102196425B (en) Quantum-key-distribution-network-based mobile encryption system and communication method thereof
CN110224821B (en) Communication encryption method for unmanned mobile platform
US20100135491A1 (en) Authentication method
CN101340443A (en) Session key negotiating method, system and server in communication network
WO2023082599A1 (en) Blockchain network security communication method based on quantum key
CN106982419B (en) Single call end-to-end encryption method and system for broadband cluster system
WO2009135444A1 (en) Key distribution method, terminal device and key distribution center
CN101707767B (en) Data transmission method and devices
CN111865589A (en) Quantum communication encryption system and method for realizing mobile communication quantum encryption transmission
JP2020025311A (en) Group gateway and communication method
CN111385088B (en) Efficient satellite quantum key pairing generation method
CN111835997B (en) Cloud video conference system based on quantum key encryption and decryption method thereof
CN101789863A (en) Safe data information transmission method
CN114095168B (en) Communication method based on quantum key and encrypted communication terminal thereof
CN101420687B (en) Identity verification method based on mobile terminal payment
CN101431409B (en) Method for implementing secret communication in different wireless local area network
CN107659405A (en) The encrypting and decrypting method that data communicate between a kind of transformer station boss station
WO2012165901A2 (en) Method for inter-terminal security channelization
CN106961330A (en) Quantum key service station
WO2017080142A1 (en) Key distribution, generation and reception method, and related apparatus
CN114553418A (en) Service method, device, system and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant