CN114024671B - Method and device for generating secret key, and computer readable storage medium - Google Patents

Method and device for generating secret key, and computer readable storage medium Download PDF

Info

Publication number
CN114024671B
CN114024671B CN202111307409.4A CN202111307409A CN114024671B CN 114024671 B CN114024671 B CN 114024671B CN 202111307409 A CN202111307409 A CN 202111307409A CN 114024671 B CN114024671 B CN 114024671B
Authority
CN
China
Prior art keywords
optical fiber
section
fiber cross
key
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111307409.4A
Other languages
Chinese (zh)
Other versions
CN114024671A (en
Inventor
杨璨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lianzhou International Technology Co Ltd
Original Assignee
Shenzhen Lianzhou International Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lianzhou International Technology Co Ltd filed Critical Shenzhen Lianzhou International Technology Co Ltd
Priority to CN202111307409.4A priority Critical patent/CN114024671B/en
Publication of CN114024671A publication Critical patent/CN114024671A/en
Application granted granted Critical
Publication of CN114024671B publication Critical patent/CN114024671B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/07Arrangements for monitoring or testing transmission systems; Arrangements for fault measurement of transmission systems
    • H04B10/075Arrangements for monitoring or testing transmission systems; Arrangements for fault measurement of transmission systems using an in-service signal
    • H04B10/079Arrangements for monitoring or testing transmission systems; Arrangements for fault measurement of transmission systems using an in-service signal using measurements of the data signal
    • H04B10/0795Performance monitoring; Measurement of transmission parameters
    • H04B10/07955Monitoring or measuring power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/40Transceivers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Optical Communication System (AREA)
  • Optical Couplings Of Light Guides (AREA)

Abstract

The invention discloses a method and a device for generating a secret key and a computer readable storage medium. Wherein the method comprises the following steps: dividing the cross section of the optical fiber to obtain a plurality of sub-optical fiber cross sections; acquiring illumination intensity of cross sections of a plurality of sub-optical fibers; the illumination intensity is processed using a predetermined algorithm to generate a target key. The invention solves the technical problem that the security of the user information is reduced because the traditional encryption method is easy to be deciphered in the related technology.

Description

Method and device for generating secret key, and computer readable storage medium
Technical Field
The present invention relates to the field of intelligent encryption, and in particular, to a method and apparatus for generating a key, and a computer readable storage medium.
Background
The conventional device generally generates a key based on a pseudo-random generator, and then stores the encryption key in Flash or writes the encryption key in software in the form of a character string, which has a relatively large disadvantage:
a) The experienced hacker can decompil the software, judge the encryption algorithm and key position actually used by combining the names and parameter positions of each function, then read the key from the decompiled software or Flash, and realize the decryption operation of the configuration file through limited trial and error.
b) In addition to obtaining the user's private information by decryption, the method of preparing the new profile by the decrypted key can even directly control existing devices with immeasurable serious consequences.
c) If the same key is used by the same scheme device, cracking one device means that all devices sink.
Aiming at the problem that the traditional encryption method is easy to be deciphered in the related technology, so that the security of the user information is reduced, no effective solution is proposed at present.
Disclosure of Invention
The embodiment of the invention provides a key generation method, a device thereof and a computer readable storage medium, which at least solve the technical problem that the security of user information is reduced because the traditional encryption method is easy to be deciphered in the related technology.
According to an aspect of an embodiment of the present invention, there is provided a method for generating a key, including: dividing the cross section of the optical fiber to obtain a plurality of sub-optical fiber cross sections; acquiring illumination intensities of cross sections of a plurality of sub-optical fibers; the illumination intensity is processed with a predetermined algorithm to generate a target key.
Optionally, before dividing the fiber cross section to obtain a plurality of sub-fiber cross sections, the method further includes: and intercepting the target optical fiber to obtain the cross section of the optical fiber.
Optionally, acquiring the illumination intensities of the plurality of sub-optical fiber cross sections includes: triggering a predetermined light source to activate to emit a light beam toward the fiber cross-section; and receiving the emergent light beams of the plurality of sub-optical fiber cross sections by using a light receiving device to obtain the illumination intensity, wherein the light receiving device is positioned on the light output side of the optical fiber cross section, the distance between the light receiving device and the optical fiber cross section is a preset distance, and the preset light source is positioned on the side, away from the light receiving device, of the optical fiber cross section.
Optionally, processing the illumination intensity with a predetermined algorithm to generate a target key, including: arranging the illumination intensities according to a preset strategy to obtain an array corresponding to the illumination intensities; and processing the array by utilizing the preset algorithm to obtain the target key.
Optionally, the predetermined algorithm includes at least one of: hash algorithm, digital encryption RSA algorithm.
Optionally, after processing the illumination intensity by using a predetermined algorithm to generate a target key, the method for generating a key further includes: and packaging the light receiving equipment and the cross section of the optical fiber in a mode of being separated by the preset distance.
Optionally, after processing the illumination intensity by using a predetermined algorithm to generate a target key, the method for generating a key further includes: and encrypting the target configuration file by using the target key, wherein the target configuration file is a configuration file corresponding to equipment where the target optical fiber corresponding to the optical fiber cross section is located.
According to another aspect of the embodiment of the present invention, there is also provided a key generating apparatus, including: the dividing module is used for dividing the optical fiber cross sections to obtain a plurality of sub-optical fiber cross sections; the acquisition module is used for acquiring illumination intensities of the cross sections of the plurality of sub-optical fibers; and the generation module is used for processing the illumination intensity by utilizing a preset algorithm to generate a target key.
Optionally, the apparatus further comprises: and the intercepting module is used for intercepting the target optical fiber before dividing the optical fiber cross sections to obtain a plurality of sub-optical fiber cross sections so as to obtain the optical fiber cross sections.
Optionally, the acquiring module includes: a triggering unit for triggering the start of a predetermined light source to emit a light beam to the optical fiber cross section; and the receiving unit is used for receiving the emergent light beams of the plurality of sub-optical fiber cross sections by utilizing light receiving equipment so as to obtain the illumination intensity, wherein the light receiving equipment is positioned on the light output side of the optical fiber cross section, the distance between the light receiving equipment and the optical fiber cross section is a preset distance, and the preset light source is positioned on one side of the optical fiber cross section away from the light receiving equipment.
Optionally, the generating module includes: the arrangement unit is used for arranging the illumination intensity according to a preset strategy so as to obtain an array corresponding to the illumination intensity; and the acquisition unit is used for processing the array by utilizing the preset algorithm so as to obtain the target key.
Optionally, the predetermined algorithm includes at least one of: hash algorithm, digital encryption RSA algorithm.
Optionally, the key generating device further includes: and the packaging module is used for packaging the light receiving equipment and the optical fiber cross section in a mode of being separated by the preset distance after processing the illumination intensity by utilizing a preset algorithm to generate a target key.
Optionally, the key generating device further includes: and the encryption module is used for encrypting the target configuration file by using the target key after processing the illumination intensity by using a preset algorithm to generate the target key, wherein the target configuration file is a configuration file corresponding to equipment where the target optical fiber corresponding to the optical fiber cross section is located.
According to another aspect of the embodiments of the present invention, there is provided a computer readable storage medium, including a stored computer program, where the computer program, when executed by a processor, controls a device in which the computer readable storage medium is located to perform the method for generating a key according to any one of the above.
According to another aspect of the embodiments of the present invention, there is also provided a processor for executing a computer program, where the computer program executes the method for generating a key according to any one of the above.
In the embodiment of the invention, the cross sections of the optical fibers are divided to obtain a plurality of sub-optical fiber cross sections; acquiring illumination intensity of cross sections of a plurality of sub-optical fibers; the illumination intensity is processed using a predetermined algorithm to generate a target key. The key generation method provided by the embodiment of the invention achieves the purpose of generating the key by utilizing the randomness principle of the light intensity of the light reflected by the cross section of the optical fiber, thereby realizing the technical effect of improving the information security of the user account, and further solving the technical problem that the user information security is reduced because the traditional encryption method is easy to be deciphered in the related technology.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiments of the invention and together with the description serve to explain the invention and do not constitute a limitation on the invention. In the drawings:
FIG. 1 is a flow chart of a method of generating a key according to an embodiment of the present invention;
FIG. 2 is a split view of a fiber cross-section according to an embodiment of the invention;
FIG. 3 is a schematic illustration of an irregular fiber cross-section in accordance with an embodiment of the present invention;
FIG. 4 is a schematic view of an apparatus for acquiring illumination intensity according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a key generation apparatus according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
According to an embodiment of the present invention, there is provided a method embodiment of a key generation method, it should be noted that the steps shown in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order different from that shown or described herein.
Fig. 1 is a flowchart of a key generation method according to an embodiment of the present invention, as shown in fig. 1, the key generation method including the steps of:
step S102, dividing the fiber cross sections to obtain a plurality of sub-fiber cross sections.
In the above steps, as shown in fig. 2, the optical fiber cross section is uniformly divided into more than one area, and the optical fiber cross section may be divided into nine parts by using a well-shaped dividing method (as shown in fig. 2), or may be divided into nine parts by using a common dividing method such as a ring-shaped dividing method and a cross-shaped dividing method.
It should be noted that, the optical fiber cross section may be split unevenly by a predetermined method, so as to obtain illumination intensity data of multiple sub-optical fiber cross sections that are more convenient to process.
And step S104, acquiring the illumination intensity of the cross sections of the plurality of sub-optical fibers.
Optionally, in the above steps, the illumination intensities of the multiple areas (i.e., the sub-fiber cross sections) separated in each of the foregoing steps are obtained separately, so as to obtain an array of the illumination intensities refracted by one fiber cross section.
Step S106, the illumination intensity is processed by a predetermined algorithm to generate a target key.
It can be seen from the above that, in the embodiment of the present invention, the fiber cross sections may be divided to obtain a plurality of sub-fiber cross sections; then the illumination intensity of the cross sections of a plurality of sub-optical fibers can be obtained; finally, the illumination intensity may be processed using a predetermined algorithm to generate the target key. The key generation method provided by the embodiment of the invention achieves the purpose of generating the key by utilizing the randomness principle of the light intensities of the multiple sub-cross sections obtained by dividing the optical fiber cross section, thereby realizing the technical effect of improving the information security of the user account, and further solving the technical problem of reduced user information security caused by easy interpretation of the traditional encryption method in the related technology.
As an alternative embodiment, before dividing the fiber cross-section into a plurality of sub-fiber cross-sections, the method further comprises: and intercepting the target optical fiber to obtain the cross section of the optical fiber.
For example, the whole optical fiber may be physically cut by conventional means, and the cross section of the optical fiber may be obtained, where the cross section of the optical fiber may be irregular and uneven by the cutting by conventional means, so that the intensity of the light that is refracted out may have strong randomness.
In addition, the optical fiber section corresponding to the optical fiber cross section can be directly used as the optical fiber cross section near one end of the optical power meter.
FIG. 3 is a schematic illustration of an irregular cross-section of an optical fiber according to an embodiment of the present invention, as shown in FIG. 3, the cross-section of the optical fiber taken by conventional means is generally irregular, and its shape has a strong randomness, so that the key generated by subsequent processing is extremely difficult to crack.
As an alternative embodiment, obtaining illumination intensities of a plurality of sub-fiber cross-sections includes: triggering a predetermined light source to activate to emit a light beam toward the fiber cross-section; the method comprises the steps of receiving outgoing light beams of a plurality of sub-optical fiber cross sections by utilizing a light receiving device to obtain illumination intensity, wherein the light receiving device is positioned on the light output side of the optical fiber cross sections, the distance between the light receiving device and the optical fiber cross sections is a preset distance, and a preset light source is positioned on one side of the optical fiber cross sections away from the light receiving device.
Fig. 4 is a schematic view of an apparatus for acquiring illumination intensity according to an embodiment of the present invention, as shown in fig. 4, the other side of the cross section of the optical fiber to be refracted of the cut-out optical fiber section may be first irradiated with a light source at a fixed light intensity, and then an optical power meter (i.e., a light receiving device) is placed at a predetermined distance from the cross section of the optical fiber to receive the illumination intensity.
As an alternative embodiment, processing the illumination intensity with a predetermined algorithm to generate a target key includes: arranging the illumination intensities according to a preset strategy to obtain an array corresponding to the illumination intensities; the array is processed using a predetermined algorithm to obtain the target key.
In the above alternative embodiment, the obtained illumination intensities of the respective areas in the cross section of the optical fiber are first formed into an array, and then arranged according to the encryption requirement in a predetermined manner, where it should be noted that the predetermined manner may be a conventional arrangement method such as arrangement according to a preset area number, an ascending order of light intensity, or an arrangement according to a specific algorithm, and then the arranged array is processed by using the predetermined algorithm to generate the target key.
As an alternative embodiment, the predetermined algorithm comprises at least one of: hash algorithm, digital encryption RSA algorithm.
It should be noted that, the hash algorithm in the above embodiment may transform an input of any length (i.e., an array, a sequence, etc.) into an output of a fixed length (i.e., a target key) through the hash algorithm; the digital encryption RSA algorithm is an asymmetric encryption algorithm, and a target key can be generated through calculation by an array.
As an alternative embodiment, after processing the illumination intensity with a predetermined algorithm to generate the target key, the key generation method further includes: the light receiving device and the optical fiber cross section are subjected to a packaging process in a manner of being spaced apart by a predetermined distance.
In the above alternative embodiment, after the target key is generated, in order to save the target key, the fiber cross section of the outgoing light needs to be opposite to the optical power meter and placed in a manner of keeping a predetermined distance, then fixed and packaged, so that an accurate array is obtained again to generate and obtain the key.
It should be noted that, the predetermined distance is the same as the predetermined distance between the cross section of the optical fiber and the optical power meter when the illumination intensity is obtained, because the light intensity of the light refracted by the light attenuates with the distance in the air, if the distance changes, the illumination intensity changes, the initial array cannot be obtained, and the key cannot be generated, and because of this principle, the key generation method provided by the embodiment of the present invention has the advantages of being unable to copy and unable to crack.
As an alternative embodiment, after processing the illumination intensity with a predetermined algorithm to generate the target key, the key generation method further includes: and encrypting the target configuration file by using the target key, wherein the target configuration file is the configuration file corresponding to the equipment where the target optical fiber corresponding to the optical fiber cross section is located.
It can be known from the above that, in the embodiment of the invention, firstly, the hardware characteristics and the software functions are combined, the key is generated by utilizing the randomness of a plurality of factors such as the cross section of the optical fiber, the illumination intensity, the distance, the angle and the like, so that the uniqueness of each model machine key is ensured, the key cannot be obtained in a software decompiling mode, the distance between the cross section and the optical power meter, the rotation angle of the cross section in the catheter and the like are changed after the shell is disassembled (i.e. after the shell is contacted and packaged), and the original value of the key cannot be obtained, therefore, even if a single device key is cracked, the key has no universality, the security of other devices is not influenced, and the account information security of a user is improved.
Example 2
According to another aspect of the embodiment of the present invention, there is provided a key generating apparatus, and fig. 5 is a schematic diagram of the key generating apparatus according to the embodiment of the present invention, as shown in fig. 5, including: a dividing module 51, an obtaining module 53 and a generating module 55. The key generation device will be described below.
The dividing module 51 is configured to divide the fiber cross section to obtain a plurality of sub-fiber cross sections.
And the acquisition module 53 is used for acquiring the illumination intensities of the cross sections of the plurality of sub-optical fibers.
A generation module 55 for processing the illumination intensity with a predetermined algorithm to generate a target key.
Here, the above-mentioned dividing module 51, obtaining module 53 and generating module 55 correspond to steps S102 to S106 in embodiment 1, and the above-mentioned modules are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to those disclosed in embodiment 1. It should be noted that the modules described above may be implemented as part of an apparatus in a computer system, such as a set of computer-executable instructions.
As can be seen from the above, in the embodiment of the present invention, the dividing module 51 may be used to divide the cross section of the optical fiber to obtain a plurality of sub-optical fiber cross sections; the acquisition module 53 may then be utilized to acquire the illumination intensities of the plurality of sub-fiber cross-sections; finally, the illumination intensity may be processed by means of the generation module 55 with a predetermined algorithm to generate the target key. The key generation device provided by the embodiment of the invention achieves the purpose of generating the key by utilizing the randomness principle of the light intensity of the light reflected by the cross section of the optical fiber, thereby realizing the technical effect of improving the information security of the user account, and further solving the technical problem that the information security of the user is reduced because the traditional encryption method is easy to be deciphered in the related technology.
Optionally, the apparatus further comprises: and the intercepting module is used for intercepting the target optical fiber before dividing the optical fiber cross sections to obtain a plurality of sub-optical fiber cross sections so as to obtain the optical fiber cross sections.
Optionally, the acquiring module includes: a triggering unit for triggering the start of a predetermined light source to emit a light beam to the cross section of the optical fiber; and the receiving unit is used for receiving the emergent light beams of the plurality of sub-optical fiber cross sections by using the light receiving device so as to obtain illumination intensity, wherein the light receiving device is positioned on the light output side of the optical fiber cross section, the distance between the light receiving device and the optical fiber cross section is a preset distance, and the preset light source is positioned on one side of the optical fiber cross section away from the light receiving device.
Optionally, the generating module includes: the arrangement unit is used for arranging the illumination intensity according to a preset strategy so as to obtain an array corresponding to the illumination intensity; and the acquisition unit is used for processing the array by utilizing a preset algorithm to obtain the target key.
Optionally, the predetermined algorithm comprises at least one of: hash algorithm, digital encryption RSA algorithm.
Optionally, the key generating device further includes: and the packaging module is used for packaging the light receiving equipment and the optical fiber cross section in a mode of being separated by a preset distance after processing the illumination intensity by utilizing a preset algorithm to generate a target key.
Optionally, the key generating device further includes: and the encryption module is used for encrypting the target configuration file by using the target key after processing the illumination intensity by using a preset algorithm to generate the target key, wherein the target configuration file is the configuration file corresponding to the equipment where the target optical fiber corresponding to the optical fiber cross section is located.
Example 3
According to another aspect of the embodiments of the present invention, there is provided a computer-readable storage medium including a stored computer program, wherein the computer program when executed by a processor controls a device in which the computer-readable storage medium is located to perform the method of generating a key according to any one of the above.
Example 4
According to another aspect of the embodiments of the present invention, there is also provided a processor for executing a computer program, where the computer program executes the method for generating a key according to any one of the above.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology content may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (7)

1. A method of generating a key, comprising:
dividing the cross section of the optical fiber to obtain a plurality of sub-optical fiber cross sections;
acquiring illumination intensities of cross sections of a plurality of sub-optical fibers;
processing the illumination intensity by using a predetermined algorithm to generate a target key;
the method for obtaining the illumination intensity of the cross sections of the sub-optical fibers comprises the following steps: triggering a predetermined light source to activate to emit a light beam toward the fiber cross-section; receiving outgoing light beams of a plurality of sub-optical fiber cross sections by using a light receiving device to obtain the illumination intensity, wherein the light receiving device is positioned on the light output side of the optical fiber cross section, and the distance between the light receiving device and the optical fiber cross section is a preset distance, and the preset light source is positioned on one side of the optical fiber cross section away from the light receiving device;
wherein after processing the illumination intensity with a predetermined algorithm to generate a target key, the method further comprises: and encrypting the target configuration file by using the target key, wherein the target configuration file is a configuration file corresponding to equipment where the target optical fiber corresponding to the optical fiber cross section is located.
2. The method of claim 1, wherein prior to dividing the fiber cross-section to obtain a plurality of sub-fiber cross-sections, the method further comprises:
and intercepting the target optical fiber to obtain the cross section of the optical fiber.
3. The method of claim 1, wherein processing the illumination intensity with a predetermined algorithm to generate a target key comprises:
arranging the illumination intensities according to a preset strategy to obtain an array corresponding to the illumination intensities;
and processing the array by utilizing the preset algorithm to obtain the target key.
4. The method of claim 1, wherein the predetermined algorithm comprises at least one of: hash algorithm, digital encryption RSA algorithm.
5. The method according to any one of claims 1 to 4, wherein after processing the illumination intensity with a predetermined algorithm to generate a target key, the method further comprises: storing the target key;
wherein storing the target key comprises: and (3) the light cross section of the emergent light beam is opposite to the light power meter, and is fixed and packaged after being placed in a mode of keeping a preset distance.
6. A key generation apparatus, comprising:
the dividing module is used for dividing the optical fiber cross sections to obtain a plurality of sub-optical fiber cross sections;
the acquisition module is used for acquiring illumination intensities of the cross sections of the plurality of sub-optical fibers;
the generation module is used for processing the illumination intensity by utilizing a preset algorithm to generate a target key;
wherein, the acquisition module includes: a triggering unit for triggering the start of a predetermined light source to emit a light beam to the optical fiber cross section; a receiving unit, configured to receive outgoing light beams of the plurality of sub-optical fiber cross sections by using a light receiving device, so as to obtain the illumination intensity, where the light receiving device is located on a light output side of the optical fiber cross section, and a distance between the light receiving device and the optical fiber cross section is a predetermined distance, and the predetermined light source is located on a side of the optical fiber cross section away from the light receiving device;
wherein the key generation device further comprises: and the encryption module is used for encrypting the target configuration file by using the target key after processing the illumination intensity by using a preset algorithm to generate the target key, wherein the target configuration file is a configuration file corresponding to equipment where the target optical fiber corresponding to the optical fiber cross section is located.
7. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored computer program, wherein the computer program, when run by a processor, controls a device in which the computer readable storage medium is located to perform the method of generating a key according to any of the preceding claims 1 to 5.
CN202111307409.4A 2021-11-05 2021-11-05 Method and device for generating secret key, and computer readable storage medium Active CN114024671B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111307409.4A CN114024671B (en) 2021-11-05 2021-11-05 Method and device for generating secret key, and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111307409.4A CN114024671B (en) 2021-11-05 2021-11-05 Method and device for generating secret key, and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN114024671A CN114024671A (en) 2022-02-08
CN114024671B true CN114024671B (en) 2024-03-29

Family

ID=80061760

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111307409.4A Active CN114024671B (en) 2021-11-05 2021-11-05 Method and device for generating secret key, and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114024671B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019037411A1 (en) * 2017-08-22 2019-02-28 深圳光启智能光子技术有限公司 Data transmission method, device, storage medium, and processor
CN109412791A (en) * 2018-11-29 2019-03-01 北京三快在线科技有限公司 Key information processing method, device, electronic equipment and computer-readable medium
EP3503457A1 (en) * 2017-12-22 2019-06-26 ID Quantique S.A. Method and device for recognizing blinding attacks in a quantum encrypted channel
CN110719128A (en) * 2019-09-30 2020-01-21 安徽问天量子科技股份有限公司 Device and method for detecting sensible positioning of optical fiber eavesdropping
CN111490825A (en) * 2020-05-15 2020-08-04 暨南大学 Method for transmitting data and simultaneously distributing quantum keys based on anti-resonance hollow-core optical fiber
CN112166464A (en) * 2018-05-29 2021-01-01 微软技术许可有限责任公司 Cryptographic key creation using optical parameters

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9998255B2 (en) * 2016-05-11 2018-06-12 International Business Machines Corporation Fiber optic light intensity encryption
US10903992B2 (en) * 2018-07-13 2021-01-26 The Regents Of The University Of California Systems and methods for encrypting communication over a fiber optic line

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019037411A1 (en) * 2017-08-22 2019-02-28 深圳光启智能光子技术有限公司 Data transmission method, device, storage medium, and processor
EP3503457A1 (en) * 2017-12-22 2019-06-26 ID Quantique S.A. Method and device for recognizing blinding attacks in a quantum encrypted channel
CN112166464A (en) * 2018-05-29 2021-01-01 微软技术许可有限责任公司 Cryptographic key creation using optical parameters
CN109412791A (en) * 2018-11-29 2019-03-01 北京三快在线科技有限公司 Key information processing method, device, electronic equipment and computer-readable medium
CN110719128A (en) * 2019-09-30 2020-01-21 安徽问天量子科技股份有限公司 Device and method for detecting sensible positioning of optical fiber eavesdropping
CN111490825A (en) * 2020-05-15 2020-08-04 暨南大学 Method for transmitting data and simultaneously distributing quantum keys based on anti-resonance hollow-core optical fiber

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Guowu Tang,et.al.Single-Mode Large Mode-Field-Area Tm3+-Doped Lead-Silicate Glass Photonic Crystal Fibers.IEEE PHOTONICS TECHNOLOGY LETTERS.2017,全文. *
水下无线光通信的安全性研究_邓欢--参考文献32;邓欢等;海洋网络信息体系;20211231;全文 *

Also Published As

Publication number Publication date
CN114024671A (en) 2022-02-08

Similar Documents

Publication Publication Date Title
EP3356988B1 (en) Method and system for verifiable searchable symmetric encryption
CN109886040B (en) Data processing method, data processing device, storage medium and processor
DE112005001666B4 (en) A method for providing private direct proof keys in signed groups to devices using a distribution CD
CN104932902B (en) A kind of method and terminal generating APK file
CN110110551B (en) Data storage method and device
CN106302606B (en) Across the application access method and device of one kind
CN113497709A (en) Trusted data source management method based on block chain, signature device and verification device
KR20140104040A (en) File packing and unpacking method, and device thereof
CN108111622B (en) Method, device and system for downloading white box library file
CN108134673B (en) Method and device for generating white box library file
CN112528236B (en) Application software authorization method based on virtual machine
CN111177693B (en) Method, device, equipment and medium for verifying terminal root certificate
EP3908940A1 (en) A client-server computer system
CN113395406B (en) Encryption authentication method and system based on power equipment fingerprint
CN113472521A (en) Block chain-based real-name digital identity management method, signature device and verification device
CN111884986A (en) Data encryption processing method and device
CN111404896A (en) Non-central identity authentication method based on SGX
CN110191467B (en) Authentication method, equipment, device and storage medium for Internet of things equipment
CN102270285B (en) Key authorization information management method and device
CN114024671B (en) Method and device for generating secret key, and computer readable storage medium
CN109286501B (en) Authentication method for encryption device and encryption device
CN113326518B (en) Data processing method and device
CN108846671B (en) Online secure transaction method and system based on block chain
KR101425456B1 (en) Information generation system and method therefor
CN110555303A (en) Method and device for preventing machine script from being maliciously accessed

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant