CN114071461B - 5G communication module based on quantum key encryption - Google Patents
5G communication module based on quantum key encryption Download PDFInfo
- Publication number
- CN114071461B CN114071461B CN202111342028.XA CN202111342028A CN114071461B CN 114071461 B CN114071461 B CN 114071461B CN 202111342028 A CN202111342028 A CN 202111342028A CN 114071461 B CN114071461 B CN 114071461B
- Authority
- CN
- China
- Prior art keywords
- module
- quantum key
- quantum
- internet
- control module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000006854 communication Effects 0.000 title claims abstract description 63
- 238000004891 communication Methods 0.000 title claims abstract description 62
- 238000003860 storage Methods 0.000 claims abstract description 54
- 238000009826 distribution Methods 0.000 claims abstract description 22
- 230000005540 biological transmission Effects 0.000 claims abstract description 10
- 238000000034 method Methods 0.000 claims description 20
- 238000012423 maintenance Methods 0.000 abstract description 4
- 238000007726 management method Methods 0.000 description 66
- 238000005516 engineering process Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000010295 mobile communication Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 230000001737 promoting effect Effects 0.000 description 3
- 230000002457 bidirectional effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 230000005610 quantum mechanics Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The application relates to a 5G communication module based on quantum key encryption, which comprises a 5G module, a secure storage module and a quantum key management and control module, wherein the 5G module is provided with the secure storage module and the quantum key management and control module, the secure storage module is communicated with the quantum key management and control module and is used for completing identity authentication and quantum key distribution of the 5G module by utilizing a quantum certificate, and the distributed quantum key is used for completing 5G service data encryption transmission. According to the application, the secure storage module and the quantum key management and control module are added on the 5G module, the problems of identity authentication and transmission encryption of 5G module equipment are solved by utilizing the quantum key, so that the risk of key leakage can be prevented, the key maintenance cost can be reduced, the attack of quantum computation and quantum algorithm can be resisted, and the secure wireless network communication can be provided for the Internet of things using 5G.
Description
Technical Field
The application relates to the technical field of 5G communication, in particular to a 5G communication module based on quantum key encryption.
Background
The 5G is a new generation mobile communication system developed towards the mobile communication demand after 2020, the 5G has ultrahigh frequency spectrum utilization rate and energy efficiency, the transmission rate and the frequency spectrum resource utilization rate are improved by one order of magnitude or higher than those of the 4G mobile communication, and the wireless coverage performance, the transmission delay, the system safety and the user experience are also obviously improved. The 5G mobile communication is closely combined with other wireless mobile communication technologies to form a new generation ubiquitous mobile information network, and the development requirement of 1000 times of mobile internet traffic increase in the next 10 years is met. The application field of the 5G mobile communication system will be further expanded, and the supporting capability for mass sensing equipment and machine-to-machine (M2M) communication will become one of the important indexes of system design. Future 5G systems also need to have sufficient flexibility and intelligent capabilities such as network self-awareness and self-tuning to cope with the rapid changes that are difficult to predict in future mobile information society. The 5G era not only can bring users with ultra-high bandwidth, ultra-low time delay and ultra-large scale connection to the users, but also can bring more diversified service demands to the mobile network by the abundant vertical industry application, especially the application of two innovative functions of network slicing and capability opening, change the traditional service operation mode and operation mode, create customized 'industry private network' service for each industry user, better meet the service differentiation demands, and further promote the autonomous controllability and operation efficiency of the enterprise to own service.
The 5G application has higher development difficulty, overlong development period and diversified industry requirements, and restricts the application development of the 5G in the industry scale. The generation of 5G modules accelerates the popularization of industrial Internet and is helpful for promoting the high-quality development of manufacturing industry. The 5G module can adapt to various application scenes, simplifies the design of terminal products, has key significance for the uncertainty of the existing technical level and the diversity of terminal requirements, and has key effect for promoting the acceleration of the maturation of industry and promoting the 5G floor business.
As performance and security requirements of communication networks continue to increase, 5G communication technology has evolved rapidly and has received unprecedented attention. However, the 5G still faces some security challenges, when the 5G wireless network communicates, the huge data flow contains a large amount of privacy and sensitive information in the network, in order to ensure that the privacy is not leaked, it is necessary to combine the 5G with the cryptography knowledge, and in terms of security research, 3GPP, 5GPPP, NGMN, ITU-2020 advance groups, ericsson, nokia and Hua to also issue respective 5G security requirements white papers, but the currently proposed security scheme is based on the traditional digital certificate authentication and key negotiation algorithm, and the security of the key exchange process and the security of the encryption and decryption algorithm are dependent, wherein the key distribution process mainly depends on public key cryptography, and the security is mainly based on the computational complexity of mathematical difficulty problems such as prime number decomposition, discrete logarithm, elliptic curve and the like, and mainly has the following problems: 1) The main problem of the symmetric key cryptosystem is that the same key is used by both encryption and decryption, so that the problem of unilateral key leakage of a sender or a receiver is easy to occur; 2) In the communication with n parties, if the n parties all adopt the same symmetric key, once the key is cracked, the whole cipher system is crashed; if different symmetric keys are adopted, n (n-1) keys are needed, the number of the keys is in direct proportion to the square number of the number of people participating in communication, and the management of the keys is almost impossible; 3) Key distribution is the weakest link in the encryption system, and if the period of key update is prolonged, opportunities are provided for others to decipher the key.
The quantum secret communication is a communication technology for transmitting information by using quantum bits as information carriers, and is an advanced communication technology for transmitting information and transmitting data by using quantum mechanics basic principles and quantum entanglement phenomena. The quantum secret communication technology provides a unique high-safety communication secret mode so far, and breaks through the safety secret and information capacity limit of the traditional information technology. If the quantum secret communication technology is combined with the 5G wireless communication technology, the method can ensure that the safety of transmitted data is not stolen by a destructor while enjoying the 5G high bandwidth and low delay, thereby ensuring the normal operation of the Internet of things equipment and an application system, and therefore, the combination of the quantum secret communication technology and the 5G wireless communication technology has important significance.
Disclosure of Invention
Therefore, the technical problem to be solved by the application is to overcome the problems existing in the prior art, and a 5G communication module based on quantum key encryption is provided, a safe storage module and a quantum key management and control module are added on the 5G module, the identity authentication of 5G module equipment is completed by utilizing quantum key encryption, the quantum key is distributed to the 5G module equipment and the communication Internet of things server equipment which are mutually communicated through key distribution service, the problems of the identity authentication and transmission encryption of the 5G module equipment are solved by utilizing the quantum key, the key leakage risk can be prevented, the key maintenance cost can be reduced, and the attack of quantum computation and quantum algorithm can be resisted, so that the data security of 5G communication is ensured, and the safe wireless network communication can be provided for the Internet of things using 5G.
In order to solve the technical problems, the application provides a 5G communication module based on quantum key encryption, which comprises a 5G module, a secure storage module and a quantum key management and control module, wherein the 5G module is provided with the secure storage module and the quantum key management and control module, the secure storage module is communicated with the quantum key management and control module and is used for completing identity authentication and quantum key distribution of the 5G module by utilizing a quantum certificate, and 5G service data encryption transmission is completed by using the distributed quantum key.
In one embodiment of the present application, the secure storage module includes a quantum key storage unit, where the quantum key storage unit is connected to the quantum key management module, and the quantum key storage unit is configured to receive and store a quantum key generated by the quantum key management module.
In one embodiment of the present application, the secure storage module includes a quantum certificate storage unit, which is connected to the quantum key management module, and the quantum certificate storage unit is configured to receive and store a quantum certificate generated by the quantum key management module.
In one embodiment of the present application, the communication method for completing the identity authentication of the 5G module by using the secure storage module and the quantum key management module includes:
storing a quantum key by using the quantum key management and control module; generating a quantum certificate of the 5G module and a quantum certificate of the Internet of things server based on the quantum key, and respectively importing the quantum certificate and the quantum certificate to the 5G module and the Internet of things server; the Internet of things server and the 5G module respectively obtain an Internet of things server identifier and a 5G module identifier by utilizing key encryption information of a quantum certificate of the Internet of things server and the 5G module, and respectively complete identity authentication of the Internet of things server and the 5G module by utilizing the Internet of things server identifier and the 5G module identifier.
In one embodiment of the present application, after the identity authentication of the internet of things server and the 5G module is completed, the identity authentication of the quantum key management and control module needs to be completed.
In one embodiment of the present application, the step of completing the identity authentication of the internet of things server by using the internet of things server identifier includes:
the method comprises the steps that an Internet of things server sends an Internet of things server identifier to a quantum key management and control module, the quantum key management and control module decrypts the Internet of things server identifier to obtain decryption information, the decryption information is compared with registration information of the Internet of things server in content, and if the content is consistent, the Internet of things server is successfully authenticated.
In one embodiment of the present application, the step of completing the identity authentication of the 5G module using the 5G module identifier includes:
the 5G module sends the 5G module identification to the quantum key management and control module, the quantum key management and control module decrypts the quantum key management and control module to obtain decryption information, the decryption information is compared with registration information of the 5G module in content, and if the content is consistent, the 5G module authentication is successful.
In one embodiment of the present application, the method for completing quantum key distribution of the 5G module using quantum certificates includes:
the 5G module negotiates a first session key for quantum key distribution with the quantum key management and control module, and simultaneously the Internet of things server negotiates a second session key for quantum key distribution with the quantum key management and control module; the 5G module and the Internet of things server are communicated with the quantum key management and control module by using a corresponding first session key and a corresponding second session key respectively, and are used for acquiring the quantum keys symmetrical at two ends of the communication and distributing the quantum keys to the two ends of the communication respectively; and the Internet of things server communicates with the Internet of things terminal through the 5G module encrypted by the quantum key.
In one embodiment of the present application, the quantum key distribution method of the 5G module includes:
the method comprises the steps that the 5G module generates encryption request information and sends the encryption request information to the quantum key management and control module, the quantum key management and control module judges whether the 5G module is effective after decrypting the encryption request information, if not, the encryption request is ended, if yes, whether the information of the Internet of things server corresponding to the 5G module can be queried is continuously judged, if not, the encryption request is ended, if yes, the quantum key management and control module determines a quantum key and encrypts the quantum key, then the quantum key is sent to the Internet of things server, and the Internet of things server receives the quantum key and sends the quantum key to the 5G module.
In an embodiment of the present application, a correspondence between the 5G module and the internet of things server is stored in the quantum key management module in advance.
Compared with the prior art, the technical scheme of the application has the following advantages:
according to the application, the secure storage module and the quantum key management and control module are added on the 5G module, the identity authentication of the 5G module equipment is completed by utilizing the quantum key encryption, the quantum key is distributed to the 5G module equipment and the communication Internet of things server equipment which are mutually communicated through the key distribution service, the problems of the identity authentication and the transmission encryption of the 5G module equipment are solved by utilizing the quantum key, the key leakage risk can be prevented, the key maintenance cost can be reduced, and the attack of quantum computation and quantum algorithm can be resisted, so that the data security of the 5G communication is ensured, and the secure wireless network communication can be provided for the Internet of things using the 5G.
Drawings
In order that the application may be more readily understood, a more particular description of the application will be rendered by reference to specific embodiments thereof that are illustrated in the appended drawings.
Fig. 1 is a schematic hardware structure of a 5G communication module according to the present application based on quantum key encryption.
Fig. 2 is a schematic hardware structure of a secure memory module in the 5G communication module based on quantum key encryption according to the present application.
Fig. 3 is a flow chart of a communication method for implementing 5G module identity authentication according to the present application.
Fig. 4 is a flow chart of a method for completing quantum key distribution of the 5G module by using quantum certificate according to the present application.
Wherein reference numerals are as follows: 10. a 5G module; 20. a secure storage module; 21. a quantum key storage unit; 22. a quantum certificate storage unit; 30. and the quantum key management and control module.
Detailed Description
The present application will be further described with reference to the accompanying drawings and specific examples, which are not intended to be limiting, so that those skilled in the art will better understand the application and practice it.
Referring to fig. 1 to 4, an embodiment of the present application provides a 5G communication module based on quantum key encryption, which includes a 5G module 10, a secure storage module 20 and a quantum key management module 30, wherein the 5G module 10 is provided with the secure storage module 20 and the quantum key management module 30, the secure storage module 20 communicates with the quantum key management module 30, and is configured to utilize a quantum certificate to complete identity authentication and quantum key distribution of the 5G module 10, and use the distributed quantum key to complete encrypted transmission of 5G service data.
The 5G module 10 described in the disclosure of the present application may be a 5G module 10 in the prior art, and the 5G module 10 has all functions of itself.
In the 5G communication module based on quantum key encryption disclosed by the application, a secure storage module 20 and a quantum key management module 30 are added in the 5G module 10, wherein the secure storage module 20 is communicated with the quantum key management module 30, and hardware-level secure data storage is provided through the secure storage module 20.
In the disclosed 5G communication module based on quantum key encryption, a quantum certificate is introduced into the secure storage module 20 when the 5G module 10 is initialized, a key distribution program is implanted into the quantum key management module 30, the key distribution program is started after the 5G module 10 is powered on, the key distribution program acquires the quantum certificate from the secure storage module 20, and is connected with the quantum key management module 30 through a network module, and authentication is completed by utilizing the key of the quantum certificate and the quantum key management module 30, so that the quantum key is acquired and stored in the secure storage module 20.
In the 5G communication module based on quantum key encryption disclosed in the present application, when the 5G module 10 communicates, the key distribution program encrypts data sent in the communication process by using the quantum key of the secure storage module 20, and on the other hand, when receiving the data, the key distribution program finds out the corresponding quantum key in the secure storage module 20 to complete the decryption work of the received data.
In the disclosed 5G communication module based on quantum key encryption, the secure storage module 20 includes a quantum key storage unit 21, the quantum key storage unit 21 is connected to the quantum key management module 30, and the quantum key storage unit 21 is configured to receive and store a quantum key generated by the quantum key management module 30.
In the disclosed 5G communication module based on quantum key encryption, the secure storage module 20 includes a quantum certificate storage unit 22, the quantum certificate storage unit 22 is connected to the quantum key management module 30, and the quantum certificate storage unit 22 is configured to receive and store a quantum certificate generated by the quantum key management module 30.
In the disclosed 5G communication module based on quantum key encryption, referring to fig. 3, the communication method for completing the identity authentication of the 5G module 10 by the secure storage module 20 and the quantum key management and control module 30 includes the following steps:
s101: storing a quantum key with the quantum key management module 30;
s102: generating a quantum certificate of the 5G module 10 and a quantum certificate of an Internet of things server based on the quantum key, and respectively importing the quantum certificate and the quantum certificate to the 5G module 10 and the Internet of things server;
s103: the internet of things server and the 5G module 10 respectively obtain an internet of things server identifier and a 5G module 10 identifier by utilizing key encryption information of a quantum certificate of the internet of things server and the 5G module 10, and respectively complete identity authentication of the internet of things server and the 5G module 10 by utilizing the internet of things server identifier and the 5G module 10 identifier.
In the disclosed 5G communication module based on quantum key encryption, in step S101, storing the quantum key by using the quantum key management module 30 includes: the quantum key management module 30 may be connected to a quantum random number generator or a quantum chip, where the quantum random number generator or the quantum chip generates a quantum key and sends the quantum key to the quantum key management module 30, and the quantum key management module 30 receives the quantum key and stores the quantum key, for example, the quantum key management module 30 includes a key pool, and the quantum key may be stored using the key pool.
In the step S102, the quantum certificate includes an initial quantum key, and the generated quantum certificate of the 5G module 10 and the quantum certificate of the internet of things server are respectively imported into the 5G module 10 and the internet of things server, and are used for identity authentication and identification and replacement of a new quantum key through the quantum digital certificate.
In the 5G communication module based on quantum key encryption disclosed in the present application, in step S103, the step of completing the identity authentication of the internet of things server by using the internet of things server identifier includes: the internet of things server sends the internet of things server identifier to the quantum key management and control module 30, the quantum key management and control module 30 decrypts the internet of things server identifier to obtain decryption information, the decryption information is compared with registration information of the internet of things server in content, and if the content is consistent, the internet of things server is successfully authenticated.
In the disclosed 5G communication module based on quantum key encryption, in step S103, the step of completing the identity authentication of the 5G module 10 by using the 5G module 10 identifier includes: the 5G module 10 sends the identifier of the 5G module 10 to the quantum key management and control module 30, the quantum key management and control module 30 decrypts the identifier to obtain decryption information, and compares the decryption information with registration information of the 5G module 10, and if the content is consistent, the authentication of the 5G module 10 is successful.
In the 5G communication module based on quantum key encryption disclosed in the present application, in step S103, after the identity authentication of the internet of things server and the 5G module 10 is completed, the identity authentication of the quantum key management and control module 30 needs to be completed. Specifically, the quantum key management and control module 30 encrypts self information by using a key to obtain a quantum key management and control module 30 identifier, the quantum key management and control module 30 identifier is sent to an internet of things server, and the internet of things server decrypts and compares the information of the quantum key management and control module 30 by using the key of a quantum certificate, and the comparison is successful in completing the bidirectional identity authentication; and the quantum key management and control module 30 encrypts self information by using a key to obtain a quantum key management and control module 30 identifier, the quantum key management and control module 30 identifier is sent to the 5G module 10, the 5G module 10 decrypts and compares the information of the quantum key management and control module 30 by using the key of the quantum certificate, and the comparison is successful in completing the bidirectional identity authentication.
In the disclosed 5G communication module based on quantum key encryption, referring to fig. 4, the method for completing quantum key distribution of the 5G module 10 by using quantum certificate includes the following steps:
s201: the 5G module 10 negotiates a first session key for quantum key distribution with the quantum key management and control module 30, and simultaneously the internet of things server negotiates a second session key for quantum key distribution with the quantum key management and control module 30;
s202: the 5G module 10 and the internet of things server communicate with the quantum key management and control module 30 by using the corresponding first session key and second session key, respectively, and are configured to obtain quantum keys symmetric at two communication ends and respectively distribute the quantum keys to the two communication ends;
s203: the internet of things server communicates with the internet of things terminal through the 5G module 10 encrypted by the quantum key.
In the disclosed 5G communication module based on quantum key encryption, in step S202, the quantum key distribution method of the 5G module 10 includes the following steps:
s301: the 5G module 10 generates encryption request information and sends the encryption request information to the quantum key management and control module 30;
s302: the quantum key management and control module 30 decrypts the encryption request information and then judges whether the 5G module 10 is valid, if not, the encryption request is ended, if yes, whether the internet of things server information corresponding to the 5G module 10 can be queried is continuously judged, if no, the encryption request is ended, and if yes, the quantum key management and control module 30 determines a quantum key and encrypts;
s303: and sending the quantum key to the Internet of things server, wherein the Internet of things server receives the quantum key and sends the quantum key to the 5G module 10.
In the quantum key encryption-based 5G communication module disclosed in the present application, the correspondence between the 5G module 10 and the internet of things server is stored in the quantum key management and control module 30 in advance.
In the 5G communication module based on quantum key encryption disclosed by the application, the secure storage module 20 and the quantum key management and control module 30 are added on the 5G module 10, the quantum key is used for completing the identity authentication of 5G module 10 equipment, the quantum key is distributed to the 5G module 10 equipment and the communication Internet of things server equipment which are mutually communicated through the key distribution service, the problems of the identity authentication and the transmission encryption of the 5G module 10 equipment are solved by using the quantum key, the risk of key leakage can be prevented, the key maintenance cost can be reduced, and the attacks of quantum computation and quantum algorithm can be resisted, so that the data security of 5G communication is ensured, and the secure wireless network communication can be provided for the Internet of things using 5G.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It is apparent that the above examples are given by way of illustration only and are not limiting of the embodiments. Other variations and modifications of the present application will be apparent to those of ordinary skill in the art in light of the foregoing description. It is not necessary here nor is it exhaustive of all embodiments. And obvious variations or modifications thereof are contemplated as falling within the scope of the present application.
Claims (4)
1. The 5G communication module based on quantum key encryption is characterized by comprising a 5G module, a secure storage module and a quantum key management and control module, wherein the 5G module is provided with the secure storage module and the quantum key management and control module, the secure storage module is communicated with the quantum key management and control module and is used for completing identity authentication and quantum key distribution of the 5G module by utilizing a quantum certificate, and 5G service data encryption transmission is completed by using the distributed quantum key;
the communication method for completing the identity authentication of the 5G module by the secure storage module and the quantum key management and control module comprises the following steps:
storing a quantum key by using the quantum key management and control module; generating a quantum certificate of the 5G module and a quantum certificate of the Internet of things server based on the quantum key, and respectively importing the quantum certificate and the quantum certificate to the 5G module and the Internet of things server; the Internet of things server and the 5G module respectively obtain an Internet of things server identifier and a 5G module identifier by utilizing key encryption information of a quantum certificate of the Internet of things server and the 5G module, and respectively complete identity authentication of the Internet of things server and the 5G module by utilizing the Internet of things server identifier and the 5G module identifier;
after the identity authentication of the Internet of things server and the 5G module is completed, the identity authentication of the quantum key management and control module is required to be completed;
the step of completing the identity authentication of the Internet of things server by using the Internet of things server identifier comprises the following steps:
the Internet of things server sends the Internet of things server identifier to the quantum key management and control module, the quantum key management and control module decrypts the Internet of things server identifier to obtain decryption information, the decryption information is compared with registration information of the Internet of things server in content, and if the content is consistent, the authentication of the Internet of things server is successful;
the step of completing the identity authentication of the 5G module by using the 5G module identifier comprises the following steps:
the 5G module sends the 5G module identification to the quantum key management and control module, the quantum key management and control module decrypts the quantum key management and control module to obtain decryption information, the decryption information is compared with registration information of the 5G module in content, and if the content is consistent, the 5G module authentication is successful;
the method for completing quantum key distribution of the 5G module by using the quantum certificate comprises the following steps:
the 5G module negotiates a first session key for quantum key distribution with the quantum key management and control module, and simultaneously the Internet of things server negotiates a second session key for quantum key distribution with the quantum key management and control module; the 5G module and the Internet of things server are communicated with the quantum key management and control module by using a corresponding first session key and a corresponding second session key respectively, and are used for acquiring the quantum keys symmetrical at two ends of the communication and distributing the quantum keys to the two ends of the communication respectively; the 5G module after being encrypted by the quantum key communicates with an Internet of things terminal;
the quantum key distribution method of the 5G module comprises the following steps:
the method comprises the steps that the 5G module generates encryption request information and sends the encryption request information to the quantum key management and control module, the quantum key management and control module judges whether the 5G module is effective after decrypting the encryption request information, if not, the encryption request is ended, if yes, whether the information of the Internet of things server corresponding to the 5G module can be queried is continuously judged, if not, the encryption request is ended, if yes, the quantum key management and control module determines a quantum key and encrypts the quantum key, then the quantum key is sent to the Internet of things server, and the Internet of things server receives the quantum key and sends the quantum key to the 5G module.
2. The quantum key encryption-based 5G communication module of claim 1, wherein: the secure storage module comprises a quantum key storage unit, wherein the quantum key storage unit is connected with the quantum key management and control module and is used for receiving and storing the quantum key generated by the quantum key management and control module.
3. The quantum key encryption-based 5G communication module of claim 1, wherein: the secure storage module comprises a quantum certificate storage unit, wherein the quantum certificate storage unit is connected with the quantum key management and control module and is used for receiving and storing the quantum certificate generated by the quantum key management and control module.
4. The quantum key encryption-based 5G communication module of claim 1, wherein: and the corresponding relation between the 5G module and the Internet of things server is prestored in the quantum key management and control module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111342028.XA CN114071461B (en) | 2021-11-12 | 2021-11-12 | 5G communication module based on quantum key encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111342028.XA CN114071461B (en) | 2021-11-12 | 2021-11-12 | 5G communication module based on quantum key encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114071461A CN114071461A (en) | 2022-02-18 |
CN114071461B true CN114071461B (en) | 2023-11-03 |
Family
ID=80271977
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111342028.XA Active CN114071461B (en) | 2021-11-12 | 2021-11-12 | 5G communication module based on quantum key encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114071461B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105471584A (en) * | 2015-12-04 | 2016-04-06 | 长春大学 | Identity authentication method based on quantum key encryption |
CN109756877A (en) * | 2018-12-05 | 2019-05-14 | 西安电子科技大学 | A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment |
CN110557253A (en) * | 2019-10-14 | 2019-12-10 | 成都量安区块链科技有限公司 | Relay route acquisition method, device and application system |
CN110572265A (en) * | 2019-10-24 | 2019-12-13 | 国网山东省电力公司信息通信公司 | terminal security access gateway method, device and system based on quantum communication |
CN110650009A (en) * | 2019-09-23 | 2020-01-03 | 中国联合网络通信集团有限公司 | Mobile network and communication method |
CN110690962A (en) * | 2019-09-01 | 2020-01-14 | 成都量安区块链科技有限公司 | Application method and device of service node |
CN110808834A (en) * | 2019-11-15 | 2020-02-18 | 中国联合网络通信集团有限公司 | Quantum key distribution method and quantum key distribution system |
WO2020223319A1 (en) * | 2019-05-01 | 2020-11-05 | Nix John A | Distributed eap-tls authentication for wireless networks with concealed subscriber identities |
WO2020260751A1 (en) * | 2019-06-27 | 2020-12-30 | Nokia Technologies Oy | Encrypted communication based on quantum key |
CN112367124A (en) * | 2019-09-01 | 2021-02-12 | 成都量安区块链科技有限公司 | Quantum relay node virtualization method and device |
WO2021090027A1 (en) * | 2019-11-08 | 2021-05-14 | Arqit Limited | Quantum-safe networking |
CN112865966A (en) * | 2021-02-05 | 2021-05-28 | 安徽华典大数据科技有限公司 | Identity authentication method based on quantum key encryption |
WO2021104448A1 (en) * | 2019-11-30 | 2021-06-03 | 华为技术有限公司 | Method for synchronizing key information, system and device |
WO2021147660A1 (en) * | 2020-01-21 | 2021-07-29 | 华为技术有限公司 | Data transmission method, and device |
CN113596062A (en) * | 2021-09-01 | 2021-11-02 | 江西雕视信息技术股份有限公司 | Intelligent desktop cloud terminal based on quantum security |
-
2021
- 2021-11-12 CN CN202111342028.XA patent/CN114071461B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105471584A (en) * | 2015-12-04 | 2016-04-06 | 长春大学 | Identity authentication method based on quantum key encryption |
CN109756877A (en) * | 2018-12-05 | 2019-05-14 | 西安电子科技大学 | A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment |
WO2020223319A1 (en) * | 2019-05-01 | 2020-11-05 | Nix John A | Distributed eap-tls authentication for wireless networks with concealed subscriber identities |
WO2020260751A1 (en) * | 2019-06-27 | 2020-12-30 | Nokia Technologies Oy | Encrypted communication based on quantum key |
CN112367124A (en) * | 2019-09-01 | 2021-02-12 | 成都量安区块链科技有限公司 | Quantum relay node virtualization method and device |
CN110690962A (en) * | 2019-09-01 | 2020-01-14 | 成都量安区块链科技有限公司 | Application method and device of service node |
CN110650009A (en) * | 2019-09-23 | 2020-01-03 | 中国联合网络通信集团有限公司 | Mobile network and communication method |
CN110557253A (en) * | 2019-10-14 | 2019-12-10 | 成都量安区块链科技有限公司 | Relay route acquisition method, device and application system |
CN110572265A (en) * | 2019-10-24 | 2019-12-13 | 国网山东省电力公司信息通信公司 | terminal security access gateway method, device and system based on quantum communication |
WO2021090027A1 (en) * | 2019-11-08 | 2021-05-14 | Arqit Limited | Quantum-safe networking |
CN110808834A (en) * | 2019-11-15 | 2020-02-18 | 中国联合网络通信集团有限公司 | Quantum key distribution method and quantum key distribution system |
WO2021104448A1 (en) * | 2019-11-30 | 2021-06-03 | 华为技术有限公司 | Method for synchronizing key information, system and device |
CN112995990A (en) * | 2019-11-30 | 2021-06-18 | 华为技术有限公司 | Method, system and equipment for synchronizing key information |
WO2021147660A1 (en) * | 2020-01-21 | 2021-07-29 | 华为技术有限公司 | Data transmission method, and device |
CN112865966A (en) * | 2021-02-05 | 2021-05-28 | 安徽华典大数据科技有限公司 | Identity authentication method based on quantum key encryption |
CN113596062A (en) * | 2021-09-01 | 2021-11-02 | 江西雕视信息技术股份有限公司 | Intelligent desktop cloud terminal based on quantum security |
Non-Patent Citations (3)
Title |
---|
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System;Jin Cao;IEEE Internet of Things Journal;全文 * |
基于设备与信道特征的物理层安全方法;李古月;俞佳宝;胡爱群;;密码学报(第02期);全文 * |
量子保密通信网络架构及移动化应用方案;王健全;马彰超;李新中;孙雷;胡昌玮;;电信科学(第09期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114071461A (en) | 2022-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3432532B1 (en) | Key distribution and authentication method, apparatus and system | |
CN109412794B (en) | Quantum key automatic charging method and system suitable for power business | |
US8600063B2 (en) | Key distribution system | |
CN101651539A (en) | updating and distributing encryption keys | |
CN101159639B (en) | One-way access authentication method | |
US20100235638A1 (en) | Identification and authentication of devices in a network | |
CN108173644A (en) | Data transfer encryption method, device, storage medium, equipment and server | |
CN101286849A (en) | Authentication system and method of a third party based on engagement arithmetic | |
CN114124388B (en) | Gossip protocol synchronization method based on quantum key | |
WO2014131356A1 (en) | Method, system, and terminal for hierarchical management of group keys of broadband cluster system | |
CN115632779B (en) | Quantum encryption communication method and system based on power distribution network | |
US20020199102A1 (en) | Method and apparatus for establishing a shared cryptographic key between energy-limited nodes in a network | |
CN110224816A (en) | Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
JP2014530553A (en) | Group secret management by group members | |
CN114362944B (en) | D2D secure mobile communication method and system based on quantum key | |
CN111478911A (en) | Instant messaging encryption method adopting lightweight key exchange algorithm | |
WO2015139370A1 (en) | Method of establishing small data secure transmission connection for mtc device group, and hss and system | |
CN101431409B (en) | Method for implementing secret communication in different wireless local area network | |
CN113193958A (en) | High-safety high-efficiency quantum key service method and system | |
CN103856938A (en) | Encryption and decryption method, system and device | |
CN114071461B (en) | 5G communication module based on quantum key encryption | |
CN104065479A (en) | Key generation method and system and key distribution method and system based on group | |
CN108260125B (en) | Secret key distribution method of content distribution application based on D2D communication | |
CN107276755B (en) | Security association method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |