CN206865470U - Secrecy intercom system based on quantum cryptography - Google Patents

Secrecy intercom system based on quantum cryptography Download PDF

Info

Publication number
CN206865470U
CN206865470U CN201720396125.XU CN201720396125U CN206865470U CN 206865470 U CN206865470 U CN 206865470U CN 201720396125 U CN201720396125 U CN 201720396125U CN 206865470 U CN206865470 U CN 206865470U
Authority
CN
China
Prior art keywords
intercom
intercoms
quantum
key
main
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201720396125.XU
Other languages
Chinese (zh)
Inventor
杨光
刘云
刘英伟
郭光灿
韩正甫
刘选斌
倪文强
张信华
李志�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengtong Optic Electric Co Ltd
Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd
Original Assignee
Jiangsu Hengtong Optic Electric Co Ltd
Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengtong Optic Electric Co Ltd, Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd filed Critical Jiangsu Hengtong Optic Electric Co Ltd
Priority to CN201720396125.XU priority Critical patent/CN206865470U/en
Application granted granted Critical
Publication of CN206865470U publication Critical patent/CN206865470U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The utility model discloses the secrecy intercom system based on quantum cryptography, including main intercom, some group leader's intercoms and some group member's intercoms, the main intercom also includes quantum random number generator, for generating the quantum key with truly random property, quantum key is stored in the cipher key storage block, is downloaded for other intercoms.The utility model use quantum key as caused by quantum random number generator, the key have truly random property, using quantum key with being encrypted by the way of the isometric XOR of information, message transmitting procedure unconditional security.

Description

Secrecy intercom system based on quantum cryptography
Technical field
It the utility model is related to the communications field, and in particular to the secrecy intercom system based on quantum cryptography.
Background technology
In current intercom field, the voice transfer of intercom is directly launched and received, and is not added using any Close means;Part intercom prevents invalid user stealing channel from networking using modes such as CTCSS, DTCSS, in general, when right After the machine of saying sets these privacy functions, dialog context can not be heard by not knowing about private line code used, but it is really to anticipate that this, which is not, Speech security in justice.It is only useful to being not intended to listener-in because its function of keeping secret is very limited, and be nothing to intentional listener-in , function of keeping secret is very limited.User for needing security requirements cannot rely on " secret " line to maintain secrecy.
Different squads is in different communication frequency range in current intercom system, and scheduling needs switching channels, it has not been convenient to crew Broadcast.
Utility model content
The purpose of this utility model is to overcome problem above existing for prior art, there is provided the secrecy based on quantum cryptography Intercom system, the utility model use quantum key as caused by quantum random number generator, the key have truly random property, adopted Encrypted with the mode of quantum key and the isometric XOR of information, message transmitting procedure unconditional security.
The utility model provides the secrecy intercom system based on quantum cryptography, including main intercom, some group leader's intercoms With some group member's intercoms, communicated to connect between the main intercom, some group leader's intercoms and some group member's intercoms, it is described Every intercom in main intercom, some group leader's intercoms and some group member's intercoms includes core control circuit;
Microphone, it is connected with the core control circuit, for gathering voice messaging;
Analog-to-digital conversion module, it is connected with the microphone, the voice messaging of collection is converted into data signal;
Information storage module, it is connected with the analog-to-digital conversion module, for caching data signal;
Quantum cryptography encryption/decryption module, be connected with described information memory module, for complete encryption to data signal and Task of decryption;
Cipher key storage block, it is connected with the quantum cryptography encryption/decryption module, for storing quantum key;
Loudspeaker, it is connected with described information memory module, for playing voice messaging;
The main intercom also includes quantum random number generator, is connected with the cipher key storage block, has for generating There is the quantum key of truly random property, downloaded for other intercoms.
Further, every intercom in the main intercom, some group leader's intercoms and some group member's intercoms is also Including some push-to-talk buttons, it is connected with the core control circuit, different push-to-talk buttons correspond to different conversation objects.
Further, the main intercom also includes:
Pbs layer quantum key button, is connected with the core control circuit, for all some group leader's intercoms and Some group member's intercoms download identical pbs layer quantum key;
Management level quantum key button, is connected with the core control circuit, under all some group leader's intercoms Carry identical management level quantum key;
Some squad's quantum key buttons, are connected with the core control circuit, for certain group leader's intercom and its corresponding Some group member's intercoms download identical squad quantum key.
Further, the main intercom, some group leader's intercoms and some group member's intercoms also include size of key detection Module, it is connected with the cipher key storage block, for detecting the number of keys in the cipher key storage block.
Further, the main intercom, some group leader's intercoms and some group member's intercoms also include siren, with institute Core control circuit connection is stated, corresponds to any size of key of variant conversation object in the cipher key storage block for warning not Foot.
Secrecy intercommunication method of the present utility model, applied to main intercom, some group leader's intercoms and some group member's intercommunications Communication between machine, comprise the following steps when sending message:
1)Push-to-talk button corresponding to a certain conversation object is pinned, microphone gathers voice messaging,
2)The voice messaging of collection is converted to data signal by analog-to-digital conversion module,
3)Data signal caches into information storage module,
4)Call quantum key corresponding with the push-to-talk button that data signal is encrypted,
5)The data signal of encryption is sent;
Comprise the following steps when receiving message:
1)The data signal of encryption is received,
2)Data signal caches into information storage module,
3)Corresponding quantum key is extracted from cipher key storage block, such as without corresponding secret key, caching ciphertext is deleted, is directly entered step Rapid 5)If there is corresponding secret key to complete decryption, into step 4),
4)Ciphertext is voice messaging through loudspeaker output,
5)Task terminates.
Further, it is described to pin push-to-talk button corresponding to a certain conversation object, before microphone gathers voice messaging, also Including eligible task before call, eligible task is respectively to distribute key with before the call of the main intercom and other intercoms Carry key.
Further, after the ciphertext is voice messaging through loudspeaker output, in addition to all intercoms return to main pair Say at machine and delete the quantum key in cipher key storage block.
The beneficial effects of the utility model are:
Quantum key of the quantum random number generator generation with truly random property is set in main intercom and is stored in key storage Module, other intercoms download quantum key by main intercom, share symmetric key with main intercom;Cipher mode uses The cipher system of " one-time pad ", i.e., information is encrypted by the way of information and the isometric XOR of key, encryption every time uses Different encrypted message transmitting procedure unconditional securities;It can not lead between the intercom for not having to share identical quantum key in the system Letter, therefore squad's communication will not interfere, therefore different squads do not have to be in different frequency range, facilitate main frame to be scheduled and issue Crew broadcasts.
Described above is only the general introduction of technical solutions of the utility model, in order to better understand skill of the present utility model Art means, and being practiced according to the content of specification, with preferred embodiment of the present utility model and coordinate accompanying drawing detailed below Describe in detail bright as after.Specific embodiment of the present utility model is shown in detail by following examples and its accompanying drawing.
Brief description of the drawings
In order to illustrate more clearly of the technical scheme in the utility model embodiment technology, embodiment technology will be retouched below The required accompanying drawing used is briefly described in stating, it should be apparent that, drawings in the following description are only the utility model Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is the main intercom structural representation of the utility model;
Fig. 2 is the utility model group leader/group member's intercom structural representation;
Fig. 3 is the utility model secrecy intercommunication Base communication flow chart;
Fig. 4 is that the utility model sends message and receives message particular flow sheet;
Fig. 5 is that the main intercom of the utility model sends message flow chart;
Fig. 6 is that the utility model group leader intercom sends message flow chart;
Fig. 7 is that the utility model group member intercom sends message flow chart;
Fig. 8 is that the main intercom of the utility model receives message flow chart;
Fig. 9 is that the utility model group leader intercom/group member's intercom receives message flow chart.
Embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the embodiment of the utility model is carried out Clearly and completely describing, it is clear that described embodiment is only the utility model part of the embodiment, rather than whole Embodiment.Based on the embodiment in the utility model, those of ordinary skill in the art are not under the premise of creative work is made The every other embodiment obtained, belong to the scope of the utility model protection.
Shown referring to Figures 1 and 2, the utility model provides the secrecy intercom system based on quantum cryptography, including main intercommunication Machine, some group leader's intercoms and some group member's intercoms, the main intercom, some group leader's intercoms and some group member's intercoms Between communicate to connect, every intercom in the main intercom, some group leader's intercoms and some group member's intercoms includes Core control circuit;
Microphone, it is connected with the core control circuit, for gathering voice messaging;
Analog-to-digital conversion module, it is connected with the microphone, the voice messaging of collection is converted into data signal;
Information storage module, it is connected with the analog-to-digital conversion module, for caching data signal;
Quantum cryptography encryption/decryption module, be connected with described information memory module, for complete encryption to data signal and Task of decryption;
Cipher key storage block, it is connected with the quantum cryptography encryption/decryption module, for storing quantum key;
Loudspeaker, it is connected with described information memory module, for playing voice messaging;
The main intercom also includes quantum random number generator, is connected with the cipher key storage block, has for generating There is the quantum key of truly random property, downloaded for other intercoms.
Every intercom in the main intercom, some group leader's intercoms and some group member's intercoms also includes some logical Button is talked about, is connected with the core control circuit, different push-to-talk buttons correspond to different conversation objects.
The main intercom also includes:
Pbs layer quantum key button, is connected with the core control circuit, for all some group leader's intercoms and Some group member's intercoms download identical pbs layer quantum key;
Management level quantum key button, is connected with the core control circuit, under all some group leader's intercoms Carry identical management level quantum key;
Some squad's quantum key buttons, are connected with the core control circuit, for certain group leader's intercom and its corresponding Some group member's intercoms download identical squad quantum key.
The main intercom, some group leader's intercoms and some group member's intercoms also include size of key detection module, with institute Cipher key storage block connection is stated, for detecting the number of keys in the cipher key storage block.
The main intercom, some group leader's intercoms and some group member's intercoms also include siren, with the core control Circuit connection processed, any size of key deficiency of variant conversation object is corresponded in the cipher key storage block for warning, works as institute When stating size of key detection module and detecting any size of key for corresponding to variant conversation object in cipher key storage block less than 15%, The siren sends warning and reminded, to download quantum key from main intercom.
Shown in reference picture 3 and Fig. 4, the utility model provides a kind of secrecy intercommunication method based on quantum cryptography, is applied to Communication between main intercom, some group leader's intercoms and some group member's intercoms, Base communication flow are that calling party sends letter Cease and corresponding quantum key is extracted from cipher key storage block to recipient, recipient's intercom, such as without corresponding secret key, call is eventually Only, if there is corresponding secret key to complete decryption, start to communicate, recipient receives transmission information, and provides information and receive feedback, transmission knot Ceased communication after beam.
It can not be communicated between the intercom for not having to share identical quantum key in the system, therefore squad's communication will not be mutual Interference, therefore different squads do not have to be in different frequency range, facilitate main frame to be scheduled and issue crew's broadcast.
Comprise the following steps when sending message in specific communication process:
1)Push-to-talk button corresponding to a certain conversation object is pinned, microphone gathers voice messaging,
2)The voice messaging of collection is converted to data signal by analog-to-digital conversion module,
3)Data signal caches into information storage module,
4)Call quantum key corresponding with the push-to-talk button that data signal is encrypted,
5)The data signal of encryption is sent;
Comprise the following steps when receiving message:
1)The data signal of encryption is received,
2)Data signal caches into information storage module,
3)Corresponding quantum key is extracted from cipher key storage block, such as without corresponding secret key, caching ciphertext is deleted, is directly entered step Rapid 5)If there is corresponding secret key to complete decryption, into step 4),
4)Ciphertext is voice messaging through loudspeaker output,
5)Task terminates.
It is described to pin push-to-talk button corresponding to a certain conversation object, before microphone gathers voice messaging, in addition to call Preceding eligible task, eligible task is respectively to distribute key and download key before the call of the main intercom and other intercoms.
After the ciphertext is voice messaging through loudspeaker output, in addition to all intercoms are returned at main intercom and deleted Except the quantum key in cipher key storage block.Cipher mode uses the cipher system of " one-time pad ", i.e., using information and key The mode of isometric XOR is encrypted to information, and encryption every time uses different encrypted message transmitting procedure unconditional securities.
Main intercom includes management level push-to-talk button, broadcast button and some squad's push-to-talk buttons, as shown in figure 5, main pair Say that the flow that machine sends message is:After main intercom completes distribution key task, conversation object is selected, when being conversed with group leader, is pressed Lower management level push-to-talk button, management level quantum key is consumed, send encryption file;When being conversed with squad, press corresponding squad and lead to Button is talked about, consumes corresponding squad's quantum key, sends encryption file;When being conversed with crew, broadcast button is pressed, consumes pbs layer Quantum key.
As shown in figure 8, the flow that main intercom receives message is:Main intercom receives encryption file, and main frame has all Key, call corresponding quantum key to decrypt, obtain cleartext information, end of conversation.
Group leader's intercom includes management level push-to-talk button and group member's broadcast button, disappears as shown in fig. 6, group leader's intercom is sent The flow of breath is:Group leader's intercom is completed after downloading key task, conversation object is selected, when being conversed with main intercom, by down tube Layer push-to-talk button is managed, consumes management level quantum key, encryption file is sent, when being conversed with group member, presses group member's broadcast button, disappear Squad's quantum key is consumed, sends encryption file.
As shown in fig. 7, the flow that group member's intercom sends message is, group member's intercom is completed after downloading key task, is pressed Lower push-to-talk button, consumption squad quantum key, sends encryption file.
As shown in figure 9, the flow that group leader's intercom and group member's intercom receive message is:Intercom receives encryption file, Corresponding quantum key is called, such as without corresponding secret key, encryption file, end of conversation is deleted, if there is corresponding secret key to complete decryption, obtains Cleartext information, end of conversation.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or new using this practicality Type.A variety of modifications to these embodiments will be apparent for those skilled in the art, determine herein The General Principle of justice can be realized in other embodiments in the case where not departing from spirit or scope of the present utility model.Cause This, the utility model is not intended to be limited to the embodiments shown herein, and is to fit to and principles disclosed herein The most wide scope consistent with features of novelty.

Claims (5)

1. the secrecy intercom system based on quantum cryptography, including main intercom, some group leader's intercoms and some group member's intercoms, Communicated to connect between the main intercom, some group leader's intercoms and some group member's intercoms, it is characterised in that, the main intercommunication Every intercom in machine, some group leader's intercoms and some group member's intercoms includes core control circuit;
Microphone, it is connected with the core control circuit, for gathering voice messaging;
Analog-to-digital conversion module, it is connected with the microphone, the voice messaging of collection is converted into data signal;
Information storage module, it is connected with the analog-to-digital conversion module, for caching data signal;
Quantum cryptography encryption/decryption module, it is connected with described information memory module, for completing encryption and decryption to data signal Task;
Cipher key storage block, it is connected with the quantum cryptography encryption/decryption module, for storing quantum key;
Loudspeaker, it is connected with described information memory module, for playing voice messaging;
The main intercom also includes quantum random number generator, is connected with the cipher key storage block, has very for generating The quantum key of randomness, downloaded for other intercoms.
2. the secrecy intercom system based on quantum cryptography according to claim 1, it is characterised in that if the main intercom, Every intercom in dry group leader's intercom and some group member's intercoms also includes some push-to-talk buttons, and electricity is controlled with the core Road connects, and different push-to-talk buttons correspond to different conversation objects.
3. the secrecy intercom system based on quantum cryptography according to claim 2, it is characterised in that the main intercom also wraps Include:
Pbs layer quantum key button, is connected with the core control circuit, for all some group leader's intercoms and some Group member's intercom downloads identical pbs layer quantum key;
Management level quantum key button, is connected with the core control circuit, and phase is downloaded for all some group leader's intercoms Same management level quantum key;
Some squad's quantum key buttons, are connected with the core control circuit, for certain group leader's intercom and its corresponding some Group member's intercom downloads identical squad quantum key.
4. the secrecy intercom system based on quantum cryptography according to claim 3, it is characterised in that if the main intercom, Dry group leader's intercom and some group member's intercoms also include size of key detection module, are connected, are used for the cipher key storage block Detect the number of keys in the cipher key storage block.
5. the secrecy intercom system based on quantum cryptography according to claim 4, it is characterised in that if the main intercom, Dry group leader's intercom and some group member's intercoms also include siren, are connected with the core control circuit, described for warning Any size of key deficiency of variant conversation object is corresponded in cipher key storage block.
CN201720396125.XU 2017-04-17 2017-04-17 Secrecy intercom system based on quantum cryptography Active CN206865470U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201720396125.XU CN206865470U (en) 2017-04-17 2017-04-17 Secrecy intercom system based on quantum cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201720396125.XU CN206865470U (en) 2017-04-17 2017-04-17 Secrecy intercom system based on quantum cryptography

Publications (1)

Publication Number Publication Date
CN206865470U true CN206865470U (en) 2018-01-09

Family

ID=60817609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201720396125.XU Active CN206865470U (en) 2017-04-17 2017-04-17 Secrecy intercom system based on quantum cryptography

Country Status (1)

Country Link
CN (1) CN206865470U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107046464A (en) * 2017-04-17 2017-08-15 江苏亨通问天量子信息研究院有限公司 Secrecy intercom system and method based on quantum cryptography

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107046464A (en) * 2017-04-17 2017-08-15 江苏亨通问天量子信息研究院有限公司 Secrecy intercom system and method based on quantum cryptography

Similar Documents

Publication Publication Date Title
CN104243143B (en) A kind of mobile secret communication method based on quantum key distribution network
CN203279187U (en) Voice encryption bluetooth earphone with fingerprint identification function
CN106982419B (en) Single call end-to-end encryption method and system for broadband cluster system
CN206865447U (en) Secrecy intercom based on quantum cryptography
CN111698794B (en) Wireless audio sharing method
CN115348579B (en) Voice encryption method applied to wireless earphone and encryption type wireless earphone
TW200843427A (en) Media broadcasts from wireless access point
CN109923884A (en) Mission-critical push to speak
CN103051444A (en) Quantum security digital terminal applied to PSTN (Public Switched Telephone Network)
US10601586B2 (en) Method and apparatus for key management of end encrypted transmission
CN106604268A (en) Voice encryption method and system and terminal
CN103096304A (en) Method for encryption and decryption of secure voice tendencies of internet protocol (IP) network communication terminal
CN103561023A (en) Method and device for sending and receiving communication information
CN206865470U (en) Secrecy intercom system based on quantum cryptography
CN107046464A (en) Secrecy intercom system and method based on quantum cryptography
CN105049201A (en) Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography
CN102137394A (en) Encrypted mobile communication terminal system and method under network access
CN101500231A (en) Mobile terminal, audio data processing method and system
CN206932228U (en) Quantum key service station
CN106961330A (en) Quantum key service station
CN111866642A (en) System and method for transmitting TWS earphone health data based on BNEP
CN203537408U (en) End-to-end voice communication privacy device with assignable secret key
CN106961287A (en) Secrecy intercom based on quantum cryptography
CN206932340U (en) Secrecy intercom based on quantum key service station transfer communication
JP2002341761A (en) Method and device for security of communication information in cdma radio communication system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant