CN114765537A - Quantum key user terminal access method based on private protocol and user terminal control method - Google Patents

Quantum key user terminal access method based on private protocol and user terminal control method Download PDF

Info

Publication number
CN114765537A
CN114765537A CN202011628924.8A CN202011628924A CN114765537A CN 114765537 A CN114765537 A CN 114765537A CN 202011628924 A CN202011628924 A CN 202011628924A CN 114765537 A CN114765537 A CN 114765537A
Authority
CN
China
Prior art keywords
user terminal
quantum key
management machine
central control
key management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011628924.8A
Other languages
Chinese (zh)
Inventor
于林
王学富
姜胜广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Institute Of Quantum Science And Technology Co ltd
Quantumctek Co Ltd
Original Assignee
Shandong Institute Of Quantum Science And Technology Co ltd
Quantumctek Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Institute Of Quantum Science And Technology Co ltd, Quantumctek Co Ltd filed Critical Shandong Institute Of Quantum Science And Technology Co ltd
Priority to CN202011628924.8A priority Critical patent/CN114765537A/en
Publication of CN114765537A publication Critical patent/CN114765537A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a quantum key user terminal access method based on a private protocol and a control method of a user terminal of a quantum communication network. The user terminal access method comprises the steps of constructing a quantum communication network by utilizing a central control layer, an access layer and a user layer, respectively deploying a central control server, a quantum key management machine and a user terminal on the central control layer, the access layer and the user layer, respectively, directly connecting the user terminal with the quantum key management machine, and directly connecting the quantum key management machine with the central control server so as to access the user terminal into the quantum communication network. Therefore, the hierarchical structure of the quantum communication network with clear hierarchy and a convenient user terminal access mode are provided, the quantum communication network with larger scale is allowed to be conveniently established, and meanwhile, the fault tolerance of the quantum communication network is improved.

Description

Quantum key user terminal access method based on private protocol and user terminal control method
Technical Field
The invention relates to the field of quantum communication, in particular to a quantum key user terminal access method based on a private protocol and a control method of the quantum key user terminal accessed by the quantum key user terminal access method.
Background
With the development of network information, networks affect various aspects of people's life, and the requirements for information security are higher and higher, and information security is more and more emphasized.
At present, quantum communication networks are built more and more, and the scale is larger and larger, and more manufacturers begin to participate in research and development of quantum key user terminal equipment. User terminal equipment developers and equipment models are infinite, a user terminal is communicated with quantum communication network access station equipment through a TCP/IP protocol and is accessed into a quantum communication network, and a typical networking and accessing mode is as follows:
in the prior art, all quantum key managers and user terminal devices are directly connected with a management and control center device (or called center control server) of a center control layer, for example, as shown in fig. 1, the hierarchical distinction of a quantum communication network metropolitan area network is not clear enough, so that the following main disadvantages exist:
the hierarchical difference of the quantum communication network is not clear enough, a central control server (KMS) directly communicates with all devices in the network, the complexity of network communication is increased, the convenient access of a user terminal is not facilitated, a large amount of bandwidth is occupied by issuing a routing table, and the expansion of the networking scale of the metropolitan area network is severely limited.
The access protocol formats of the user terminals of all manufacturers are not uniform, and the access flows are also different.
The central control server directly controls all devices in the network, and the phenomenon that the whole network fails due to the single-point device failure of the central control server is easily caused.
Disclosure of Invention
Aiming at the problem, the invention provides a quantum key user terminal access method based on a private protocol and a control method of the quantum key user terminal accessed by the quantum key user terminal access method.
The first aspect of the invention relates to a quantum key user terminal access method based on a private protocol, wherein a quantum communication network is constructed by utilizing a central control layer, an access layer and a user layer;
deploying a central control server at the central control layer;
deploying a quantum key manager at the access stratum;
deploying a user terminal in the user layer; and the number of the first and second groups,
and directly connecting the user terminal of the user layer with the quantum key management machine of the access layer, and directly connecting the quantum key management machine of the access layer with the central control server of the central control layer, so that the user terminal is accessed to the quantum communication network.
Furthermore, the quantum key user terminal access method of the invention can also comprise a device handshake step, a device network access/network disconnection step, a link detection step and an exception reporting step;
the equipment handshake step is used for performing equipment handshake with the central control server after the user terminal is powered on or reset;
the equipment network accessing/network leaving step is used for reporting the equipment identity information and the equipment state of the user terminal to the central control server;
the link detection step is used for detecting that a communication link is unblocked;
and the exception reporting step is used for reporting the work exception to the central control server.
Still further, the device handshaking step may be arranged to: the user terminal sends a device handshake request to the quantum key management machine; the quantum key management machine forwards the equipment handshake request to the central control server; the central control server analyzes and obtains the equipment handshake request and returns an equipment handshake response; the quantum key management machine forwards the equipment handshake response to the user terminal and records handshake state and information; and the user terminal analyzes and obtains the equipment handshake result.
The device handshake request may include a device version number, a device model, and a management domain supported by the user terminal, where the management domain is used to identify a quantum key manager to which the user terminal belongs.
Optionally, the device version number includes a first data segment and a second data segment, the first data segment is used for representing a large version number, and the second data segment is used for representing a small version number; and/or the device model comprises a first data segment, a second data segment and a third data segment which are respectively used for representing a product type, a digital model and an extended model.
Further, the device identity information includes a device ID, a device network access user name and a device network access password, and the device status includes ready and failure. Optionally, the device ID includes first to fourth data segments for identifying a subnet number, a device type, a relay number, and a device number, respectively.
Further, the device networking step is configured to: the user terminal sends a terminal network access request to the quantum key management machine; the quantum key management machine forwards the terminal network access request to the central control server; the central control server analyzes and obtains the terminal network access request, records the network access of the user terminal and returns a terminal network access request response; the quantum key management machine forwards the terminal network access request response to the user terminal and records the network access state of the user terminal; and the user terminal analyzes and obtains a terminal network access request response result.
Further, the link detection step is configured to: the central control server sends a link detection request at regular time; the quantum key management machine forwards the link detection request to the user terminal; the user terminal analyzes and obtains the link detection request and returns a link detection response; the quantum key management machine forwards the link detection response to the central control server; and the central control server analyzes and obtains a link detection response result.
When the central control server does not receive the link detection response returned by the user terminal after overtime or the user terminal does not receive the link detection request sent by the central control server within preset time, the user terminal is set to be in an off-network state.
Still further, the exception reporting step is configured to: the user terminal sends equipment abnormal reporting information; the quantum key management machine forwards the abnormal report information to the central control server; the central control server analyzes the obtained abnormal reporting information, returns an abnormal reporting response and processes the working abnormality according to the abnormal code; the quantum key management machine forwards the abnormal reporting response to the user terminal; and the user terminal analyzes and obtains an abnormal reporting response result.
The abnormal reporting information may include the ID of the local device, the ID of the peer device, and the abnormal code. Preferably, the exception code is a one-hot code.
A second aspect of the present invention relates to a control method for a user terminal of a quantum communication network implemented according to the above quantum key user terminal access method, wherein, after detecting that a central control server fails, a quantum key manager and its administered user terminals form an independent control area; and in the independent control area, the quantum key management machine is set as an area control server and used for controlling the user terminal under the control of the quantum key management machine.
Further, the control method may further include an information synchronization step of causing the quantum key manager in the independent control area to send broadcast information to the quantum key manager in the adjacent independent control area in a broadcast manner at predetermined time intervals, so as to grasp the affiliation relationship between the user terminal and the quantum key manager in the adjacent independent control area.
Furthermore, the broadcast information includes the ID list of the user terminals hooked down by the quantum key management machine, and the list information of the user terminals hooked down by other quantum key management machines grasped by the quantum key management machine.
Further, when a first user terminal in a first independent control area communicates with a second user terminal in a second independent control area, the first user terminal sends data to a quantum key management machine in the first independent control area, wherein the data comprises a device ID of the second user terminal; the quantum key management machine of the first independent control area searches the quantum key management machine of the second independent control area according to the equipment ID of the second user terminal, and forwards the data to the quantum key management machine of the second independent control area; and the quantum key management machine of the second independent control area forwards the data to the second user terminal.
Wherein the data may include key consistency comparison information, key volume information, and device status.
Drawings
The following describes embodiments of the present invention in further detail with reference to the accompanying drawings.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 shows a prior art quantum communication network and its user terminal access schematic;
fig. 2 shows an example of a private protocol based quantum key user terminal access method according to the present invention;
FIG. 3 shows one example of a device handshake step according to the invention;
FIG. 4 shows an example of a device networking step according to the present invention;
FIG. 5 shows an example of a link detection step according to the present invention;
fig. 6 shows an example of an exception reporting step according to the present invention.
Detailed Description
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. The following examples are provided by way of illustration in order to fully convey the spirit of the invention to those skilled in the art to which the invention pertains. Accordingly, the present invention is not limited to the embodiments disclosed herein.
Fig. 2 shows an example of a quantum key user terminal access method based on a private protocol according to the present invention.
As shown in fig. 2, a quantum communication network according to the present invention may include a central control layer, an access layer, and a user layer.
The central control server KMS is deployed at a central control layer, the access layer is deployed with one or more quantum key managers KMT, and the user layer is deployed with one or more user terminals. The user terminal has both Quantum Key Distribution (QKD) and quantum key management functions, serves as the end of a quantum communication network, faces more end users, and outputs quantum keys to application layer equipment.
According to the user terminal access method, the user terminal of the user layer can only be connected with the central control server KMS through the quantum key management machine KMT of the access layer, so that the user terminal can be accessed into the quantum communication network, namely, the user terminal can only be directly connected with the quantum key management machine KMT and cannot be directly connected with the central control server KMS.
For example, in the example of fig. 2, the access stratum is deployed with three quantum key managers KMT-A, KMT-B and KMT-C, which are directly connected to the central control server KMS of the central control layer; and a plurality of user terminals deployed in the user layer are respectively and directly connected with the corresponding quantum key management machines KMT of the access layer, namely 4 user terminals in the user layer are directly connected with the quantum key management machine KMT-A, 2 user terminals are directly connected with the quantum key management machine KMT-B, and 3 user terminals are directly connected with the quantum key management machine KMT-C.
The private protocol-based quantum key user terminal access method according to the present invention will be described in detail below based on the example of fig. 2.
Specifically, the quantum key user terminal access method based on the private protocol may include an equipment handshake step, an equipment network access/network disconnection step, a link detection step, and an exception reporting step.
Fig. 3 shows an example of a device handshake step according to the invention.
As shown in fig. 3, when the user terminal is to access the quantum communication network after power-on/reset, a network link is first actively established with the quantum key manager KMT, and a secure channel is formed between the two.
Subsequently, the user terminal actively sends a device handshake request to the quantum key manager KMT via the secure channel.
In the present invention, the device handshake request may be used to confirm a subsequent communication protocol version.
As an example, the device handshake request may contain information of a device version number, a device model, an administrative domain, and the like, which are supported by the present device.
In a preferred example, the device version number may include a first data segment for indicating a large version number and a second data segment for indicating a small version number.
The device model number may include a first data segment, a second data segment, and a third data segment, which are used to represent a product type, a digital model number, and an extended model number, respectively.
In the present invention, in order to improve the service capability of the user terminal, a user terminal is allowed to access the quantum communication network through one or more quantum key managers KMT, and therefore, management domain information is set to indicate the quantum key manager KMT (i.e., the main home subnet) to which the user terminal belongs when the user terminal connects multiple quantum key managers KMT (i.e., belongs to multiple subnets).
The quantum key manager KMT then forwards the device handshake request to the central control server KMS.
The central control server KMS obtains the device handshake request by parsing and returns a device handshake response.
And the quantum key management machine KMT forwards the equipment handshake response to the user terminal and records the handshake state and information.
And the user terminal obtains the equipment handshake result through analysis.
Fig. 4 shows an example of a device networking step according to the present invention. It should be noted that, since the user terminal offline step is substantially the same as the network accessing step shown in fig. 4, it is not described herein again.
As shown in fig. 4, after the handshake between the user terminal and the central control server KMS is successful, the device network-on/network-off procedure is performed.
In the invention, the device network-accessing/network-leaving step is used for reporting the device identity information and the device state of the user terminal to the central control server KMS, so that the central control server KMS realizes the whole network device management and control.
As an example, the device identity information may include key information such as a device ID, a device access username, a device access password, and the like. Device status may include ready and failed.
The device ID is used to identify the user terminal, which may be uniformly assigned by the operator of the quantum communication network, for example. In a preferred example, the device ID may include first to fourth data segments for identifying a subnet number, a device type, a relay number, and a device number, respectively.
The device access user name is used for ensuring the identity validity of the user terminal, and can be distributed by a quantum communication network operator in an off-line mode before the user terminal is accessed, so that the user terminal can carry the user name to indicate the identity of the user terminal when accessing the network.
The device access password is used for being matched with the device access user name, and can be uniformly distributed by a quantum communication network operator, so that the user terminal carries the password to verify the device identity when accessing the network.
As shown in fig. 4, in the device network access step, the user terminal first sends a terminal network access request to the quantum key manager KMT.
Then, the quantum key management machine KMT forwards the terminal network access request to the central control server KMS.
The central control server KMS obtains the terminal network access request through analysis, records the network access of the user terminal, and returns the terminal network access request response.
And the quantum key management machine KMT forwards a terminal network access request response to the user terminal and records the network access/disconnection state of the user terminal.
And the user terminal obtains a terminal network access request response result through analysis, and continuously repeats the equipment network access steps when the network access fails.
Fig. 5 shows an example of a link detection procedure according to the present invention.
As shown in fig. 5, after the ue accesses the network, a link detection step is performed to detect/ensure that the communication link between the devices is clear.
Specifically, in the link detection step, the central control server KMS sends the link detection request at regular time.
The quantum key management machine KMT forwards the link detection request to the user terminal.
The user terminal obtains the link detection request through analysis and returns a link detection response.
The quantum key manager KMT forwards the link detection response to the central control server KMS.
The central control server KMS obtains the link detection response result through parsing.
In the invention, if the KMS does not receive a link detection response returned by the user terminal after overtime, the user terminal is set to be off-network; if the user terminal does not receive the link detection request sent by the central control server KMS within the preset time, the user terminal is set to be off-network.
Fig. 6 shows an example of an exception reporting step according to the present invention.
As shown in fig. 6, when the user terminal detects a work abnormality, an abnormality reporting step is performed to process the work abnormality by the KMS.
Specifically, in the exception reporting step, the user terminal sends the equipment exception reporting information.
And the quantum key management machine KMT forwards the abnormal report information to the central control server KMS.
And the KMS obtains the abnormal reporting information through analysis, returns an abnormal reporting response and processes the working abnormality according to the abnormal code. For example, when the KMS receives a key generation type exception reported by the user terminal, it needs to return a terminal exception report response and stop the key generation process.
And the quantum key management machine KMT forwards the exception report response to the user terminal.
And the user terminal obtains an abnormal reporting response result through analysis.
As an example, the exception reporting information may include key information such as a local device ID, an opposite device ID, and an exception code.
In a preferred example, the home device ID may be a home device ID uniformly assigned by the operator of the quantum communication network.
The peer device ID may be a peer device ID involved in a service process.
The exception code is used to indicate the type of exception, which may be set in advance. For example, Ox 0001: no key output is abnormal; ox 0002: quantum channel anomalies; ox 0004: the key negotiation network is abnormal; ox 0008: the photoelectric sending module is abnormal; ox 0010: the photoelectric receiving module is abnormal; ox 0020: QKD front end exception; ox 0040: QKD data handling exceptions; ox 0080: the authentication key quantity is insufficient and abnormal; ox 0100: the attack is abnormal.
Preferably, the exception code may be a one-hot code, so that multiple exception states can be reported simultaneously.
With continued reference to fig. 2, a control method of a user terminal in a quantum communication network implemented by the user terminal access method of the present invention will be described.
In the control method according to the present invention, the quantum key management machine KMT may be automatically set as the zone control server after the quantum key management machine KMT detects that the central control server KMS has failed, so that each quantum key management machine KMT and the user terminals under its jurisdiction form an independent control zone together. For mutexample, in fig. 2, KMT-a and its connected 4 ues form an independent control area a, KMT-B and its connected 2 ues form an independent control area B, and KMT-C and its connected 3 ues form an independent control area C.
In each independent control area, a quantum key management machine KMT controls the user terminal to complete services such as quantum key generation, storage and the like.
In particular, the control method according to the present invention may further include an information synchronization step of causing the quantum key management machine KMT of a certain area to transmit broadcast information to the adjacent quantum key management machine KMT in the form of broadcast at predetermined time intervals (for example, 10 seconds) to grasp the affiliation (mounting relationship) of the user terminal and the quantum key management machine KMT in the adjacent area.
As an example, the broadcast information may contain a list of user terminal IDs that the present quantum key management machine KMT hangs down, and list information of user terminals that other quantum key management machines KMT that it grasps hang down.
By means of the information synchronization step, the affiliation relationship between the user terminal and the quantum key management machine KMT in the adjacent area is mastered, and therefore the situation that when cross-area communication is needed (for example, the user terminal in the area a needs to perform data interaction with the user terminal in the area C), the control area to which the destination user terminal belongs cannot be accurately known, and the communication requirement cannot be met can be avoided.
As an example, when communication is to be performed between two user terminals across an area, the sending user terminal may first send data to its home quantum key manager KMT. Wherein the data may contain the device ID of the destination user terminal.
The quantum key management machine KMT may search the quantum key management machine KMT to which the destination terminal belongs according to the device ID of the user terminal at the destination terminal, and forward the data to the quantum key management machine KMT at the destination terminal.
And the KMT equipment of the destination terminal quantum key management machine forwards the data to a destination terminal user terminal.
Alternatively, the data may include key consistency ratio information, key amount information, device state information, and the like.
By means of the quantum key user terminal access method based on the private protocol and the corresponding user terminal control method, a quantum communication network hierarchical structure with clearer hierarchy and a user terminal access mode which is convenient and easy to manage can be provided, convenient access of the user terminal is facilitated, and a larger-scale quantum communication network is allowed to be conveniently established; meanwhile, the fault tolerance of the quantum communication network to the faults of the central control server is greatly improved, the stable operation of the quantum communication network is facilitated, and the industrial application prospect of the quantum communication network can be greatly expanded.
Although the present invention has been described in connection with the embodiments illustrated in the accompanying drawings, it will be understood by those skilled in the art that the embodiments described above are merely exemplary for illustrating the principles of the present invention and are not intended to limit the scope of the present invention, and that various combinations, modifications and equivalents of the above-described embodiments may be made by those skilled in the art without departing from the spirit and scope of the present invention.

Claims (18)

1. A quantum key user terminal access method based on private protocol, wherein, a quantum communication network is constructed by using a central control layer, an access layer and a user layer;
deploying a central control server at the central control layer;
deploying a quantum key manager at the access stratum;
deploying a user terminal at the user layer; and the number of the first and second groups,
and directly connecting the user terminal of the user layer with the quantum key management machine of the access layer, and directly connecting the quantum key management machine of the access layer with the central control server of the central control layer, so that the user terminal is accessed into the quantum communication network.
2. The quantum key user terminal access method of claim 1, further comprising a device handshake step, a device network access/network disconnection step, a link detection step, and an exception reporting step;
the equipment handshake step is used for performing equipment handshake with the central control server after the user terminal is powered on or reset;
the equipment network accessing/network leaving step is used for reporting the equipment identity information and the equipment state of the user terminal to the central control server;
the link detection step is used for detecting that a communication link is unblocked;
and the exception reporting step is used for reporting the work exception to the central control server.
3. A quantum key user terminal access method according to claim 2, wherein the device handshaking step is arranged to:
the user terminal sends a device handshake request to the quantum key management machine;
the quantum key management machine forwards the equipment handshake request to the central control server;
the central control server analyzes and obtains the equipment handshake request and returns an equipment handshake response;
the quantum key management machine forwards the equipment handshake response to the user terminal and records handshake state and information;
and the user terminal analyzes and obtains the equipment handshake result.
4. The quantum key user terminal access method according to claim 3, wherein the device handshake request includes a device version number, a device model number, and a management domain supported by the user terminal, and the management domain is used for identifying a quantum key manager to which the user terminal is primarily attributed.
5. The quantum key user terminal access method of claim 4, wherein the device version number comprises a first data segment to represent a large version number and a second data segment to represent a small version number; and/or the like, and/or,
the device model includes a first data segment, a second data segment, and a third data segment, which are used to represent a product type, a digital model, and an extended model, respectively.
6. The quantum key user terminal access method according to claim 2, wherein the device identity information includes a device ID, a device network access username and a device network access password, and the device status includes ready and fault.
7. The quantum key user terminal access method of claim 6, wherein the device ID includes first to fourth data segments for identifying a subnet number, a device type, a relay number, and a device number, respectively.
8. The quantum key user terminal access method of claim 2, wherein the device networking step is configured to:
the user terminal sends a terminal network access request to the quantum key management machine;
the quantum key management machine forwards the terminal network access request to the central control server;
the central control server analyzes and obtains the terminal network access request, records the network access of the user terminal and returns a terminal network access request response;
the quantum key management machine forwards the terminal network access request response to the user terminal and records the network access state of the user terminal;
and the user terminal analyzes and obtains a terminal network access request response result.
9. A quantum key user terminal access method according to claim 2, wherein the link detection step is arranged to:
the central control server sends a link detection request at regular time;
the quantum key management machine forwards the link detection request to the user terminal;
the user terminal analyzes and obtains the link detection request and returns a link detection response;
the quantum key management machine forwards the link detection response to the central control server;
and the central control server analyzes and obtains a link detection response result.
10. The quantum key user terminal access method according to claim 9, wherein when the central control server does not receive the link detection response returned by the user terminal after timeout or the user terminal does not receive the link detection request sent by the central control server within a preset time, the user terminal is set to an off-network state.
11. The quantum key user terminal access method of claim 2, wherein the exception reporting step is configured to:
the user terminal sends equipment abnormal reporting information;
the quantum key management machine forwards the abnormal report information to the central control server;
the central control server analyzes and obtains the abnormal reporting information, returns an abnormal reporting response and processes the working abnormality according to the abnormal code;
the quantum key management machine forwards the abnormal reporting response to the user terminal;
and the user terminal analyzes and obtains an abnormal reporting response result.
12. The quantum key user terminal access method according to claim 11, wherein the exception report information includes a home device ID, an opposite device ID, and an exception code.
13. The quantum key user terminal access method of claim 12, wherein the exception code is a one-hot code.
14. A control method for a user terminal of a quantum communication network implemented based on the quantum key user terminal access method of any one of claims 1-13,
after detecting that the central control server fails, forming an independent control area by the quantum key management machine and the user terminals administered by the quantum key management machine; and the number of the first and second electrodes,
in the independent control area, the quantum key management machine is set as an area control server and used for controlling the user terminals administered by the quantum key management machine.
15. The control method according to claim 14, further comprising an information synchronization step of causing the quantum key management machine in the independent control area to transmit broadcast information to the quantum key management machine in the adjacent independent control area in a broadcast form at predetermined time intervals to grasp an affiliation of the user terminal and the quantum key management machine in the adjacent independent control area.
16. The control method according to claim 15, wherein the broadcast information includes a list of user terminal IDs to be dropped by the present quantum key manager and list information of user terminals to be dropped by other quantum key managers which are grasped by the present quantum key manager.
17. The control method of claim 14, wherein when a first user terminal of a first independent control area communicates with a second user terminal of a second independent control area, transmitting, by the first user terminal, data to a quantum key manager of the first independent control area, the data including a device ID of the second user terminal;
the quantum key management machine of the first independent control area searches the quantum key management machine of the second independent control area according to the equipment ID of the second user terminal and forwards the data to the quantum key management machine of the second independent control area;
and the quantum key management machine of the second independent control area forwards the data to the second user terminal.
18. The control method of claim 17, wherein the data includes key consistency ratio information, key amount information, and device status.
CN202011628924.8A 2020-12-30 2020-12-30 Quantum key user terminal access method based on private protocol and user terminal control method Pending CN114765537A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011628924.8A CN114765537A (en) 2020-12-30 2020-12-30 Quantum key user terminal access method based on private protocol and user terminal control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011628924.8A CN114765537A (en) 2020-12-30 2020-12-30 Quantum key user terminal access method based on private protocol and user terminal control method

Publications (1)

Publication Number Publication Date
CN114765537A true CN114765537A (en) 2022-07-19

Family

ID=82364287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011628924.8A Pending CN114765537A (en) 2020-12-30 2020-12-30 Quantum key user terminal access method based on private protocol and user terminal control method

Country Status (1)

Country Link
CN (1) CN114765537A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106452740A (en) * 2016-09-23 2017-02-22 浙江神州量子网络科技有限公司 Quantum communication service station, quantum key management device, key configuration network, and key configuration method
CN110635894A (en) * 2018-06-21 2019-12-31 山东量子科学技术研究院有限公司 Quantum key output method and system based on frame protocol format

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106452740A (en) * 2016-09-23 2017-02-22 浙江神州量子网络科技有限公司 Quantum communication service station, quantum key management device, key configuration network, and key configuration method
CN110635894A (en) * 2018-06-21 2019-12-31 山东量子科学技术研究院有限公司 Quantum key output method and system based on frame protocol format

Similar Documents

Publication Publication Date Title
CN102315975B (en) Fault processing method based on intelligent resilient framework (IRF) system and equipment thereof
US7760695B2 (en) Methods and systems for centralized cluster management in wireless switch architecture
US7639605B2 (en) System and method for detecting and recovering from virtual switch link failures
CN101897151B (en) IP network and performance monitoring using Ethernet OAM
US8984150B2 (en) Electronic supply chain management
CN103117876B (en) The synchronous method and device of user state information
CN101652959A (en) Arrangement and method relating to network management
CN101217482A (en) A method traversing NAT sending down strategy and a communication device
CN103916275A (en) BFD detection device and method
WO2007121666A1 (en) A management method for passive optical network terminal and system thereof
CN101730094A (en) Method for accessing terminal equipment to service platform of security system and transmitting information
CN103378979A (en) Passive optical network management method, device and system
WO2011116598A1 (en) Method and system for achieving management of gateway
CN110445657B (en) Distributed networking management system based on block chain
EP3917086B1 (en) Network topology discovery method, device, and system
CA2799514A1 (en) Encryption system, method, and network devices
CN112134744B (en) Management method of nodes in distributed management system
CN106209552B (en) Plug and play network-building method, apparatus and system
CN114765537A (en) Quantum key user terminal access method based on private protocol and user terminal control method
CN101562616B (en) User residence gateway management system and method
CN1996880A (en) Method and network device of the self-adapted management network device
CN102340511A (en) Safety control method and device
CN113194119B (en) Configuration file acquisition method and device
CN110233713B (en) Multi-link communication method and system based on LLDP message
Wang et al. A SDN-based heterogeneous networking scheme for profinet and Modbus Networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination