CN206865470U - Secrecy intercom system based on quantum cryptography - Google Patents
Secrecy intercom system based on quantum cryptography Download PDFInfo
- Publication number
- CN206865470U CN206865470U CN201720396125.XU CN201720396125U CN206865470U CN 206865470 U CN206865470 U CN 206865470U CN 201720396125 U CN201720396125 U CN 201720396125U CN 206865470 U CN206865470 U CN 206865470U
- Authority
- CN
- China
- Prior art keywords
- intercom
- intercoms
- quantum
- key
- main
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The utility model discloses the secrecy intercom system based on quantum cryptography, including main intercom, some group leader's intercoms and some group member's intercoms, the main intercom also includes quantum random number generator, for generating the quantum key with truly random property, quantum key is stored in the cipher key storage block, is downloaded for other intercoms.The utility model use quantum key as caused by quantum random number generator, the key have truly random property, using quantum key with being encrypted by the way of the isometric XOR of information, message transmitting procedure unconditional security.
Description
Technical field
It the utility model is related to the communications field, and in particular to the secrecy intercom system based on quantum cryptography.
Background technology
In current intercom field, the voice transfer of intercom is directly launched and received, and is not added using any
Close means;Part intercom prevents invalid user stealing channel from networking using modes such as CTCSS, DTCSS, in general, when right
After the machine of saying sets these privacy functions, dialog context can not be heard by not knowing about private line code used, but it is really to anticipate that this, which is not,
Speech security in justice.It is only useful to being not intended to listener-in because its function of keeping secret is very limited, and be nothing to intentional listener-in
, function of keeping secret is very limited.User for needing security requirements cannot rely on " secret " line to maintain secrecy.
Different squads is in different communication frequency range in current intercom system, and scheduling needs switching channels, it has not been convenient to crew
Broadcast.
Utility model content
The purpose of this utility model is to overcome problem above existing for prior art, there is provided the secrecy based on quantum cryptography
Intercom system, the utility model use quantum key as caused by quantum random number generator, the key have truly random property, adopted
Encrypted with the mode of quantum key and the isometric XOR of information, message transmitting procedure unconditional security.
The utility model provides the secrecy intercom system based on quantum cryptography, including main intercom, some group leader's intercoms
With some group member's intercoms, communicated to connect between the main intercom, some group leader's intercoms and some group member's intercoms, it is described
Every intercom in main intercom, some group leader's intercoms and some group member's intercoms includes core control circuit;
Microphone, it is connected with the core control circuit, for gathering voice messaging;
Analog-to-digital conversion module, it is connected with the microphone, the voice messaging of collection is converted into data signal;
Information storage module, it is connected with the analog-to-digital conversion module, for caching data signal;
Quantum cryptography encryption/decryption module, be connected with described information memory module, for complete encryption to data signal and
Task of decryption;
Cipher key storage block, it is connected with the quantum cryptography encryption/decryption module, for storing quantum key;
Loudspeaker, it is connected with described information memory module, for playing voice messaging;
The main intercom also includes quantum random number generator, is connected with the cipher key storage block, has for generating
There is the quantum key of truly random property, downloaded for other intercoms.
Further, every intercom in the main intercom, some group leader's intercoms and some group member's intercoms is also
Including some push-to-talk buttons, it is connected with the core control circuit, different push-to-talk buttons correspond to different conversation objects.
Further, the main intercom also includes:
Pbs layer quantum key button, is connected with the core control circuit, for all some group leader's intercoms and
Some group member's intercoms download identical pbs layer quantum key;
Management level quantum key button, is connected with the core control circuit, under all some group leader's intercoms
Carry identical management level quantum key;
Some squad's quantum key buttons, are connected with the core control circuit, for certain group leader's intercom and its corresponding
Some group member's intercoms download identical squad quantum key.
Further, the main intercom, some group leader's intercoms and some group member's intercoms also include size of key detection
Module, it is connected with the cipher key storage block, for detecting the number of keys in the cipher key storage block.
Further, the main intercom, some group leader's intercoms and some group member's intercoms also include siren, with institute
Core control circuit connection is stated, corresponds to any size of key of variant conversation object in the cipher key storage block for warning not
Foot.
Secrecy intercommunication method of the present utility model, applied to main intercom, some group leader's intercoms and some group member's intercommunications
Communication between machine, comprise the following steps when sending message:
1)Push-to-talk button corresponding to a certain conversation object is pinned, microphone gathers voice messaging,
2)The voice messaging of collection is converted to data signal by analog-to-digital conversion module,
3)Data signal caches into information storage module,
4)Call quantum key corresponding with the push-to-talk button that data signal is encrypted,
5)The data signal of encryption is sent;
Comprise the following steps when receiving message:
1)The data signal of encryption is received,
2)Data signal caches into information storage module,
3)Corresponding quantum key is extracted from cipher key storage block, such as without corresponding secret key, caching ciphertext is deleted, is directly entered step
Rapid 5)If there is corresponding secret key to complete decryption, into step 4),
4)Ciphertext is voice messaging through loudspeaker output,
5)Task terminates.
Further, it is described to pin push-to-talk button corresponding to a certain conversation object, before microphone gathers voice messaging, also
Including eligible task before call, eligible task is respectively to distribute key with before the call of the main intercom and other intercoms
Carry key.
Further, after the ciphertext is voice messaging through loudspeaker output, in addition to all intercoms return to main pair
Say at machine and delete the quantum key in cipher key storage block.
The beneficial effects of the utility model are:
Quantum key of the quantum random number generator generation with truly random property is set in main intercom and is stored in key storage
Module, other intercoms download quantum key by main intercom, share symmetric key with main intercom;Cipher mode uses
The cipher system of " one-time pad ", i.e., information is encrypted by the way of information and the isometric XOR of key, encryption every time uses
Different encrypted message transmitting procedure unconditional securities;It can not lead between the intercom for not having to share identical quantum key in the system
Letter, therefore squad's communication will not interfere, therefore different squads do not have to be in different frequency range, facilitate main frame to be scheduled and issue
Crew broadcasts.
Described above is only the general introduction of technical solutions of the utility model, in order to better understand skill of the present utility model
Art means, and being practiced according to the content of specification, with preferred embodiment of the present utility model and coordinate accompanying drawing detailed below
Describe in detail bright as after.Specific embodiment of the present utility model is shown in detail by following examples and its accompanying drawing.
Brief description of the drawings
In order to illustrate more clearly of the technical scheme in the utility model embodiment technology, embodiment technology will be retouched below
The required accompanying drawing used is briefly described in stating, it should be apparent that, drawings in the following description are only the utility model
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
Fig. 1 is the main intercom structural representation of the utility model;
Fig. 2 is the utility model group leader/group member's intercom structural representation;
Fig. 3 is the utility model secrecy intercommunication Base communication flow chart;
Fig. 4 is that the utility model sends message and receives message particular flow sheet;
Fig. 5 is that the main intercom of the utility model sends message flow chart;
Fig. 6 is that the utility model group leader intercom sends message flow chart;
Fig. 7 is that the utility model group member intercom sends message flow chart;
Fig. 8 is that the main intercom of the utility model receives message flow chart;
Fig. 9 is that the utility model group leader intercom/group member's intercom receives message flow chart.
Embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the embodiment of the utility model is carried out
Clearly and completely describing, it is clear that described embodiment is only the utility model part of the embodiment, rather than whole
Embodiment.Based on the embodiment in the utility model, those of ordinary skill in the art are not under the premise of creative work is made
The every other embodiment obtained, belong to the scope of the utility model protection.
Shown referring to Figures 1 and 2, the utility model provides the secrecy intercom system based on quantum cryptography, including main intercommunication
Machine, some group leader's intercoms and some group member's intercoms, the main intercom, some group leader's intercoms and some group member's intercoms
Between communicate to connect, every intercom in the main intercom, some group leader's intercoms and some group member's intercoms includes
Core control circuit;
Microphone, it is connected with the core control circuit, for gathering voice messaging;
Analog-to-digital conversion module, it is connected with the microphone, the voice messaging of collection is converted into data signal;
Information storage module, it is connected with the analog-to-digital conversion module, for caching data signal;
Quantum cryptography encryption/decryption module, be connected with described information memory module, for complete encryption to data signal and
Task of decryption;
Cipher key storage block, it is connected with the quantum cryptography encryption/decryption module, for storing quantum key;
Loudspeaker, it is connected with described information memory module, for playing voice messaging;
The main intercom also includes quantum random number generator, is connected with the cipher key storage block, has for generating
There is the quantum key of truly random property, downloaded for other intercoms.
Every intercom in the main intercom, some group leader's intercoms and some group member's intercoms also includes some logical
Button is talked about, is connected with the core control circuit, different push-to-talk buttons correspond to different conversation objects.
The main intercom also includes:
Pbs layer quantum key button, is connected with the core control circuit, for all some group leader's intercoms and
Some group member's intercoms download identical pbs layer quantum key;
Management level quantum key button, is connected with the core control circuit, under all some group leader's intercoms
Carry identical management level quantum key;
Some squad's quantum key buttons, are connected with the core control circuit, for certain group leader's intercom and its corresponding
Some group member's intercoms download identical squad quantum key.
The main intercom, some group leader's intercoms and some group member's intercoms also include size of key detection module, with institute
Cipher key storage block connection is stated, for detecting the number of keys in the cipher key storage block.
The main intercom, some group leader's intercoms and some group member's intercoms also include siren, with the core control
Circuit connection processed, any size of key deficiency of variant conversation object is corresponded in the cipher key storage block for warning, works as institute
When stating size of key detection module and detecting any size of key for corresponding to variant conversation object in cipher key storage block less than 15%,
The siren sends warning and reminded, to download quantum key from main intercom.
Shown in reference picture 3 and Fig. 4, the utility model provides a kind of secrecy intercommunication method based on quantum cryptography, is applied to
Communication between main intercom, some group leader's intercoms and some group member's intercoms, Base communication flow are that calling party sends letter
Cease and corresponding quantum key is extracted from cipher key storage block to recipient, recipient's intercom, such as without corresponding secret key, call is eventually
Only, if there is corresponding secret key to complete decryption, start to communicate, recipient receives transmission information, and provides information and receive feedback, transmission knot
Ceased communication after beam.
It can not be communicated between the intercom for not having to share identical quantum key in the system, therefore squad's communication will not be mutual
Interference, therefore different squads do not have to be in different frequency range, facilitate main frame to be scheduled and issue crew's broadcast.
Comprise the following steps when sending message in specific communication process:
1)Push-to-talk button corresponding to a certain conversation object is pinned, microphone gathers voice messaging,
2)The voice messaging of collection is converted to data signal by analog-to-digital conversion module,
3)Data signal caches into information storage module,
4)Call quantum key corresponding with the push-to-talk button that data signal is encrypted,
5)The data signal of encryption is sent;
Comprise the following steps when receiving message:
1)The data signal of encryption is received,
2)Data signal caches into information storage module,
3)Corresponding quantum key is extracted from cipher key storage block, such as without corresponding secret key, caching ciphertext is deleted, is directly entered step
Rapid 5)If there is corresponding secret key to complete decryption, into step 4),
4)Ciphertext is voice messaging through loudspeaker output,
5)Task terminates.
It is described to pin push-to-talk button corresponding to a certain conversation object, before microphone gathers voice messaging, in addition to call
Preceding eligible task, eligible task is respectively to distribute key and download key before the call of the main intercom and other intercoms.
After the ciphertext is voice messaging through loudspeaker output, in addition to all intercoms are returned at main intercom and deleted
Except the quantum key in cipher key storage block.Cipher mode uses the cipher system of " one-time pad ", i.e., using information and key
The mode of isometric XOR is encrypted to information, and encryption every time uses different encrypted message transmitting procedure unconditional securities.
Main intercom includes management level push-to-talk button, broadcast button and some squad's push-to-talk buttons, as shown in figure 5, main pair
Say that the flow that machine sends message is:After main intercom completes distribution key task, conversation object is selected, when being conversed with group leader, is pressed
Lower management level push-to-talk button, management level quantum key is consumed, send encryption file;When being conversed with squad, press corresponding squad and lead to
Button is talked about, consumes corresponding squad's quantum key, sends encryption file;When being conversed with crew, broadcast button is pressed, consumes pbs layer
Quantum key.
As shown in figure 8, the flow that main intercom receives message is:Main intercom receives encryption file, and main frame has all
Key, call corresponding quantum key to decrypt, obtain cleartext information, end of conversation.
Group leader's intercom includes management level push-to-talk button and group member's broadcast button, disappears as shown in fig. 6, group leader's intercom is sent
The flow of breath is:Group leader's intercom is completed after downloading key task, conversation object is selected, when being conversed with main intercom, by down tube
Layer push-to-talk button is managed, consumes management level quantum key, encryption file is sent, when being conversed with group member, presses group member's broadcast button, disappear
Squad's quantum key is consumed, sends encryption file.
As shown in fig. 7, the flow that group member's intercom sends message is, group member's intercom is completed after downloading key task, is pressed
Lower push-to-talk button, consumption squad quantum key, sends encryption file.
As shown in figure 9, the flow that group leader's intercom and group member's intercom receive message is:Intercom receives encryption file,
Corresponding quantum key is called, such as without corresponding secret key, encryption file, end of conversation is deleted, if there is corresponding secret key to complete decryption, obtains
Cleartext information, end of conversation.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or new using this practicality
Type.A variety of modifications to these embodiments will be apparent for those skilled in the art, determine herein
The General Principle of justice can be realized in other embodiments in the case where not departing from spirit or scope of the present utility model.Cause
This, the utility model is not intended to be limited to the embodiments shown herein, and is to fit to and principles disclosed herein
The most wide scope consistent with features of novelty.
Claims (5)
1. the secrecy intercom system based on quantum cryptography, including main intercom, some group leader's intercoms and some group member's intercoms,
Communicated to connect between the main intercom, some group leader's intercoms and some group member's intercoms, it is characterised in that, the main intercommunication
Every intercom in machine, some group leader's intercoms and some group member's intercoms includes core control circuit;
Microphone, it is connected with the core control circuit, for gathering voice messaging;
Analog-to-digital conversion module, it is connected with the microphone, the voice messaging of collection is converted into data signal;
Information storage module, it is connected with the analog-to-digital conversion module, for caching data signal;
Quantum cryptography encryption/decryption module, it is connected with described information memory module, for completing encryption and decryption to data signal
Task;
Cipher key storage block, it is connected with the quantum cryptography encryption/decryption module, for storing quantum key;
Loudspeaker, it is connected with described information memory module, for playing voice messaging;
The main intercom also includes quantum random number generator, is connected with the cipher key storage block, has very for generating
The quantum key of randomness, downloaded for other intercoms.
2. the secrecy intercom system based on quantum cryptography according to claim 1, it is characterised in that if the main intercom,
Every intercom in dry group leader's intercom and some group member's intercoms also includes some push-to-talk buttons, and electricity is controlled with the core
Road connects, and different push-to-talk buttons correspond to different conversation objects.
3. the secrecy intercom system based on quantum cryptography according to claim 2, it is characterised in that the main intercom also wraps
Include:
Pbs layer quantum key button, is connected with the core control circuit, for all some group leader's intercoms and some
Group member's intercom downloads identical pbs layer quantum key;
Management level quantum key button, is connected with the core control circuit, and phase is downloaded for all some group leader's intercoms
Same management level quantum key;
Some squad's quantum key buttons, are connected with the core control circuit, for certain group leader's intercom and its corresponding some
Group member's intercom downloads identical squad quantum key.
4. the secrecy intercom system based on quantum cryptography according to claim 3, it is characterised in that if the main intercom,
Dry group leader's intercom and some group member's intercoms also include size of key detection module, are connected, are used for the cipher key storage block
Detect the number of keys in the cipher key storage block.
5. the secrecy intercom system based on quantum cryptography according to claim 4, it is characterised in that if the main intercom,
Dry group leader's intercom and some group member's intercoms also include siren, are connected with the core control circuit, described for warning
Any size of key deficiency of variant conversation object is corresponded in cipher key storage block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720396125.XU CN206865470U (en) | 2017-04-17 | 2017-04-17 | Secrecy intercom system based on quantum cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720396125.XU CN206865470U (en) | 2017-04-17 | 2017-04-17 | Secrecy intercom system based on quantum cryptography |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206865470U true CN206865470U (en) | 2018-01-09 |
Family
ID=60817609
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720396125.XU Active CN206865470U (en) | 2017-04-17 | 2017-04-17 | Secrecy intercom system based on quantum cryptography |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206865470U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107046464A (en) * | 2017-04-17 | 2017-08-15 | 江苏亨通问天量子信息研究院有限公司 | Secrecy intercom system and method based on quantum cryptography |
-
2017
- 2017-04-17 CN CN201720396125.XU patent/CN206865470U/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107046464A (en) * | 2017-04-17 | 2017-08-15 | 江苏亨通问天量子信息研究院有限公司 | Secrecy intercom system and method based on quantum cryptography |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106712932B (en) | Key management method, apparatus and system | |
CN104243143B (en) | A kind of mobile secret communication method based on quantum key distribution network | |
CN105337726A (en) | End-to-end hand-held device encryption method based on quantum cryptography and system | |
CN203279187U (en) | Voice encryption bluetooth earphone with fingerprint identification function | |
CN106982419B (en) | Single call end-to-end encryption method and system for broadband cluster system | |
CN206865447U (en) | Secrecy intercom based on quantum cryptography | |
CN111698794B (en) | Wireless audio sharing method | |
CN115348579B (en) | Voice encryption method applied to wireless earphone and encryption type wireless earphone | |
TW200843427A (en) | Media broadcasts from wireless access point | |
CN109923884A (en) | Mission-critical push to speak | |
CN103051444A (en) | Quantum security digital terminal applied to PSTN (Public Switched Telephone Network) | |
US10601586B2 (en) | Method and apparatus for key management of end encrypted transmission | |
CN206865470U (en) | Secrecy intercom system based on quantum cryptography | |
CN107046464A (en) | Secrecy intercom system and method based on quantum cryptography | |
CN105049201A (en) | Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography | |
CN102137394A (en) | Encrypted mobile communication terminal system and method under network access | |
CN101500231A (en) | Mobile terminal, audio data processing method and system | |
CN206932228U (en) | Quantum key service station | |
CN106961330A (en) | Quantum key service station | |
CN111866642A (en) | System and method for transmitting TWS earphone health data based on BNEP | |
CN203537408U (en) | End-to-end voice communication privacy device with assignable secret key | |
CN106961287A (en) | Secrecy intercom based on quantum cryptography | |
CN206932340U (en) | Secrecy intercom based on quantum key service station transfer communication | |
JP2002341761A (en) | Method and device for security of communication information in cdma radio communication system | |
CN105045368A (en) | Mobile terminal and secure communication device thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |