WO2022199186A1 - Système de communication de l'internet des objets basé sur la technologie quantique - Google Patents

Système de communication de l'internet des objets basé sur la technologie quantique Download PDF

Info

Publication number
WO2022199186A1
WO2022199186A1 PCT/CN2021/142718 CN2021142718W WO2022199186A1 WO 2022199186 A1 WO2022199186 A1 WO 2022199186A1 CN 2021142718 W CN2021142718 W CN 2021142718W WO 2022199186 A1 WO2022199186 A1 WO 2022199186A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
secret key
iot
serial number
cloud platform
Prior art date
Application number
PCT/CN2021/142718
Other languages
English (en)
Chinese (zh)
Inventor
王振宇
徐征
Original Assignee
嘉兴企树网络科技有限公司
上海企树网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 嘉兴企树网络科技有限公司, 上海企树网络科技有限公司 filed Critical 嘉兴企树网络科技有限公司
Publication of WO2022199186A1 publication Critical patent/WO2022199186A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB

Definitions

  • the present application relates to the field of communication technologies, and in particular, to an Internet of Things communication system based on quantum technology.
  • the encrypted transmission of data between the IoT terminal and the IoT platform usually adopts the following methods: First, the IoT terminal and the IoT platform negotiate a key in advance, and the key is preset into the IoT terminal and the IoT platform at the same time. , using the preset key to realize the encrypted transmission of data between the IoT terminal and the IoT platform; the second is that the key is distributed by the IoT platform and sent to the IoT terminal through a short message, and the distributed key is used to realize Encrypted transmission of data between IoT terminals and IoT platforms.
  • the methods of presetting the key and issuing the key through a short message can easily leak the key, resulting in poor security.
  • the embodiments of the present application provide an IoT communication system based on quantum technology, so as to solve the encrypted transmission of data between the IoT terminal and the IoT platform in the prior art by using a preset key and The method of sending the key by short message will cause the key to be easily leaked, which is a technical problem of poor security.
  • Embodiments of the present application provide an IoT communication system based on quantum technology, including: an IoT terminal, a U-key (a storage device with a USB interface with a chip inside), and a cloud platform, where the cloud platform includes an encryption center, The secret key generated by the quantum random number generator is pre-stored in the U-key and the encryption center, and the U-key is used to obtain the message to be encrypted through the U-key interface of the Internet of Things terminal.
  • the stored secret key encrypts the message to be encrypted, and sends the encrypted message and the serial number of the secret key to the IoT terminal through the U-key interface; the IoT terminal receives the encrypted message and the secret key serial number, send the encrypted message and the secret key serial number to the cloud platform; the cloud platform takes out the secret key pair pre-stored in the encryption center according to the secret key serial number The encrypted message is decrypted to obtain a plaintext message.
  • the U-key is also used to obtain parameter information of the IoT terminal through the U-key interface before obtaining the message to be encrypted, and encrypt the parameter information by using a pre-stored secret key, Send the encrypted parameters, the serial number of the secret key and the U-key number to the Internet of Things terminal through the U-key interface; the terminal of the Internet of Things receives the encrypted parameters, the serial number of the secret key and the U-key number , send the encrypted parameters, the secret key serial number and the U-key number to the cloud platform; the cloud platform takes out the secret key pre-stored in the encryption center according to the secret key serial number to the encrypted Decrypt the parameters of the device, bind the plaintext parameters and the U-key number, obtain the binding information and save it, and send the binding information to the Internet of Things terminal.
  • the IoT terminal when the IoT terminal sends the encrypted message and the key serial number to the cloud platform, it also sends the binding information to the cloud platform; the cloud platform receives For the binding information, verify the binding information and the saved binding information, and after the verification is passed, take out the secret key pre-stored in the encryption center according to the secret key serial number to encrypt the message. Decrypt to get the plaintext message.
  • the quantum technology-based IoT communication system further includes: an IoT subsystem gateway, the IoT subsystem gateway connects the IoT terminal and the cloud platform respectively, and the IoT subsystem gateway connects the The encrypted message and the key serial number output by the IoT terminal are forwarded to the cloud platform.
  • the quantum technology-based Internet of Things communication system further includes: a gateway U-key, in which a secret key generated by a quantum random number generator is pre-stored, and the gateway U-key passes the The U-key interface of the IoT subsystem gateway is connected to the IoT subsystem gateway, and the IoT subsystem gateway receives the encrypted message and the secret key serial number output by the IoT terminal, according to The secret key serial number is extracted from the secret key pre-stored in the gateway U-key to decrypt the encrypted message to obtain a plaintext message.
  • a gateway U-key in which a secret key generated by a quantum random number generator is pre-stored, and the gateway U-key passes the The U-key interface of the IoT subsystem gateway is connected to the IoT subsystem gateway, and the IoT subsystem gateway receives the encrypted message and the secret key serial number output by the IoT terminal, according to The secret key serial number is extracted from the secret key pre-stored in the gateway U-key to decrypt the encrypted message to obtain
  • the quantum technology-based IoT communication system further includes: an edge server, where the edge server is connected to the IoT terminal and the cloud platform, respectively, and the edge server outputs the The encrypted message and the key serial number are forwarded to the cloud platform.
  • the quantum technology-based IoT communication system further includes: an edge U-key, wherein the edge U-key is pre-stored with a secret key generated by a quantum random number generator, and the edge U-key passes the The U-key interface of the edge server is connected to the edge server, the edge server receives the encrypted message and the secret key serial number output by the IoT terminal, and retrieves the edge according to the secret key serial number The encrypted message is decrypted by the secret key pre-stored in the U-key to obtain a plaintext message.
  • an edge U-key wherein the edge U-key is pre-stored with a secret key generated by a quantum random number generator, and the edge U-key passes the The U-key interface of the edge server is connected to the edge server, the edge server receives the encrypted message and the secret key serial number output by the IoT terminal, and retrieves the edge according to the secret key serial number The encrypted message is decrypted by the secret key pre-stored in the U-key to obtain a plaintext message.
  • the encryption center includes: a secret key generation unit and a secret key storage unit, the quantum random number generator is set in the secret key generation unit, and the U-key and the secret key storage unit are connected to the The secret key generation unit obtains and stores the secret key generated by the quantum random number generator, and the U-key and the secret key stored in the secret key storage unit are in the same order.
  • the encryption center further includes: a secret key management unit, the secret key management unit is configured to manage the secret key in the gateway U-key, so that the secret key in the gateway U-key and the The secret keys in the U-key connected to the IoT terminal are the same.
  • the key management unit in the encryption center is further configured to manage the key in the edge U-key, so that the key in the edge U-key is the same as the one connected to the IoT terminal.
  • the secret key in the U-key is the same.
  • the IoT platform can be connected to the U-key, and use the secret key stored in the U-key for data encryption.
  • the secret key is also pre-stored in the cloud platform, the data sent to the cloud platform can be decrypted to obtain plaintext.
  • the random code generated based on quantum is a true random code, and using this random code as the secret key is theoretically unbreakable.
  • the technological Internet of Things communication system uses the secret key generated by the quantum random number generator for encryption and decryption, which can further ensure the security of transmitted data, and solves the problem of encryption and decryption security by presetting keys and issuing keys through short messages. Poor technical issues.
  • FIG. 1 is a structural block diagram of a quantum technology-based Internet of Things communication system according to an embodiment of the present application
  • FIG. 2 is a structural block diagram of a quantum technology-based IoT communication system according to another embodiment of the present application.
  • FIG. 3 is a structural block diagram of an IoT communication system based on quantum technology according to another embodiment of the present application.
  • the terms “installed”, “connected” and “connected” should be understood in a broad sense, for example, it may be a fixed connection or a detachable connection connection, or integral connection; it can be a mechanical connection or an electrical connection; it can be a direct connection or an indirect connection through an intermediate medium, or it can be the internal connection of two components, which can be a wireless connection or a wired connection connect.
  • installed should be understood in a broad sense, for example, it may be a fixed connection or a detachable connection connection, or integral connection; it can be a mechanical connection or an electrical connection; it can be a direct connection or an indirect connection through an intermediate medium, or it can be the internal connection of two components, which can be a wireless connection or a wired connection connect.
  • the IoT communication system based on quantum technology includes: an IoT terminal 10, a U-key 20 and a cloud platform 30.
  • the cloud platform 30 includes The encryption center, U-key20 and the encryption center are pre-stored with the secret key generated by the quantum random number generator, and the U-key20 is used to obtain the message to be encrypted through the U-key20 interface of the Internet of Things terminal 10.
  • the secret key encrypts the message to be encrypted, and sends the encrypted message and the secret key serial number to the IoT terminal 10 through the U-key20 interface; the IoT terminal 10 receives the encrypted message and the secret key serial number, The encrypted message and the key serial number are sent to the cloud platform 30; the cloud platform 30 takes out the pre-stored key in the encryption center according to the key serial number and decrypts the encrypted message to obtain a plaintext message.
  • the U-key20 interface may be a USB type interface, or may be other types of interfaces, which are not limited in this application.
  • the IoT communication system based on quantum technology provided by the embodiments of the present application
  • data is performed on the IoT terminal 10 and the cloud platform 30.
  • the IoT platform can be connected to U-key20, and use the secret key stored in U-key20 for data encryption.
  • the secret key is also pre-stored in cloud platform 30, the data sent to cloud platform 30 It can be decrypted to get the plaintext.
  • the random code generated based on quantum is a true random code, and using this random code as the secret key is theoretically unbreakable.
  • the technological Internet of Things communication system uses the secret key generated by the quantum random number generator for encryption and decryption, which can further ensure the security of transmitted data, and solves the problem of encryption and decryption security by presetting keys and issuing keys through short messages. Poor technical issues.
  • the cloud platform 30 when the cloud platform 30 sends data to the IoT terminal 10, the above method can also be used, that is, the cloud platform 30 first uses the secret key pre-stored by the encryption center to perform the data transmission. Encrypt, and then send the encrypted data and the corresponding secret key serial number to the IoT terminal 10, and the IoT terminal 10 extracts the corresponding secret key from the U-key 20 according to the secret key serial number to decrypt to obtain plaintext.
  • the U-key 20 and the IoT terminal 10 may be bound by the following process. Specifically, the U-key 20 is also used to obtain the parameter information of the IoT terminal 10 through the U-key interface before obtaining the message to be encrypted, encrypt the parameter information by using the pre-stored secret key, and encrypt the encrypted parameters and secret keys.
  • the serial number and the U-key number are sent to the IoT terminal 10 through the U-key interface; the IoT terminal 10 receives the encrypted parameters, the secret key serial number and the U-key number, and sends the encrypted parameters, the secret key serial number and the U-key number.
  • the cloud platform 30 takes out the pre-stored secret key in the encryption center according to the secret key serial number, decrypts the encrypted parameters, binds the plaintext parameters and the U-key number, obtains the binding information and saves it.
  • the binding information is sent to the IoT terminal 10 .
  • the parameter information includes information such as the unique hardware number and user number of the IoT terminal 10 .
  • the IoT terminal 10 can perform data transmission by means of the bound U-key 20 and the cloud platform 30 .
  • the IoT terminal 10 first encrypts the data through the secret key in the U-key 20, and when sending the encrypted message and the secret key serial number to the cloud platform 30, it also sends the binding information to the cloud platform 30; the cloud platform 30 Receive the binding information, verify the binding information and the saved binding information, and after the verification is passed, extract the secret key pre-stored in the encryption center according to the secret key serial number to decrypt the encrypted message to obtain a plaintext message.
  • the encryption center includes: a secret key generation unit and a secret key storage unit, the quantum random number generator is arranged in the secret key generation unit, and the U-key20 and the secret key storage unit are connected to the secret key generation unit to obtain the quantum random number.
  • the secret key generated by the number generator is stored, and the sequence of U-key20 and the secret key stored in the secret key storage unit is consistent.
  • the U-key 20 can be keyed in the encryption center, that is, the secret key is stored in the U-key 20, specifically , the secret keys added to the U-key 20 bound to different IoT terminals 10 may be different.
  • the keys in order to ensure the flexibility of the system and the requirements of the encryption level, when encrypting in the U-key20, the keys can be obtained in order, or the keys can be obtained randomly, as long as the U-key20 and the key storage unit are guaranteed.
  • the order of the keys saved in the data is consistent, and the key serial number can be transmitted at the same time during data transmission to obtain the accurate key; at the same time, in the scenario with strict encryption requirements, it can support one key at a time, that is, the use of one key It is discarded after one time, and the next time it is encrypted with another key.
  • the keys in the key pool will be consumed. Therefore, the key group of the encryption center can be updated online to U-key20 every preset time.
  • the IoT communication system based on quantum technology further includes: the IoT subsystem gateway 40, and the IoT subsystem gateway 40 is respectively connected to the IoT terminal 10 and the cloud platform 30, The IoT subsystem gateway 40 forwards the encrypted message and the secret key serial number output by the IoT terminal 10 to the cloud platform 30 .
  • the IoT communication system based on quantum technology further includes: an edge server 50, the edge server 50 is respectively connected to the IoT terminal 10 and the cloud platform 30, and the edge server 50 forwards the encrypted message and the key serial number output by the IoT terminal 10 to the cloud platform 30 .
  • the IoT subsystem gateway 40 and the edge server 50 can be set in the communication system according to actual needs. At this time, during data transmission, the data output by the IoT terminal 10 can first pass through the IoT subsystem. The gateway 40 forwards it, and then forwards it to the cloud platform 30 through the edge server 50 . In addition, only the IoT subsystem gateway 40 or the edge server 50 may be set according to actual needs. It should be further noted that, when the IoT subsystem gateway 40 or the edge server 50 is performing data transmission, it can only forward the data and does not have the function of decrypting the data.
  • the IoT communication system based on quantum technology further includes: a gateway U-key41, a gateway U-key
  • the secret key generated by the quantum random number generator is pre-stored in the key41
  • the gateway U-key41 is connected to the IoT subsystem gateway 40 through the U-key interface of the IoT subsystem gateway 40
  • the IoT subsystem gateway 40 receives the IoT terminal 10.
  • the encrypted message and the key serial number are output, and according to the key serial number, the key pre-stored in the gateway U-key 41 is taken out, and the encrypted message is decrypted to obtain a plaintext message.
  • different IoT terminals 10 may communicate with the cloud platform 30 through different IoT subsystem gateways 40. Therefore, when the gateway U-key 41 adds the secret key in the encryption center, it can only save the It corresponds to the secret key saved in the U-key bound to the connected IoT terminal 10 .
  • a secret key management unit may be set in the encryption center, and the secret key management unit is used to manage the secret key in the gateway U-key41, so that the secret key in the gateway U-key41 and the U-key connected to the IoT terminal 10 The keys are the same.
  • the IoT communication system based on quantum technology further includes: edge U-key51, edge U-key51
  • edge U-key51 The secret key generated by the quantum random number generator is stored in advance, and the edge U-key 51 is connected to the edge server 50 through the U-key interface of the edge server 50, and the edge server 50 receives the encrypted message and secret output from the IoT terminal 10.
  • the key sequence number according to the key sequence number, take out the pre-stored key in the edge U-key51 to decrypt the encrypted message, and obtain the plaintext message.
  • the key management unit in the encryption center can also manage the secret key in the edge U-key51, so that the secret key in the edge U-key51 and the U-key connected to the IoT terminal 10
  • the keys are the same.
  • the key management unit can make the gateway U-key 41 only save the key saved in the U-key bound to the corresponding connected IoT terminal 10 when the gateway U-key 41 performs key addition in the encryption center.
  • the gateway U-key 41 and the edge U-key 51 are set, the secure dialogue between the IoT terminal 10 and the IoT subsystem gateway or the IoT terminal 10 and the edge server 50 does not need to go through the encryption center.
  • the communication mode in the communication system provided in the embodiment of the present application may be used for transmission.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components shown as units may or may not be physical units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a computer-readable storage medium.
  • the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Electromagnetism (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande concerne un système de communication de l'internet des objets basé sur la technologie quantique. Le système comprend : un terminal de l'internet des objets, une U-KEY et une plateforme en nuage, la plateforme en nuage comprenant un centre de chiffrement ; des clés sont pré-stockées dans la U-KEY et le centre de chiffrement ; la U-KEY acquiert un message à chiffrer du terminal de l'internet des objets, puis le chiffre et envoie le message chiffré et un numéro de série de clé au terminal de l'internet des objets au moyen d'une interface U-KEY ; le terminal de l'internet des objets reçoit le message chiffré et le numéro de série de la clé, puis envoie le message chiffré et le numéro de série de la clé à la plateforme en nuage ; et la plateforme en nuage extrait la clé pré-stockée du centre de chiffrement selon le numéro de série de la clé, puis déchiffre le message chiffré afin d'obtenir un message en clair. Grâce à la mise en œuvre de la présente demande, une clé est stockée dans une U-KEY, et lorsqu'un terminal de l'internet des objets procède à un échange de données avec une plateforme en nuage, un chiffrement de données est effectué à l'aide de la clé dans la U-KEY afin de réaliser une transmission en texte chiffré. Le problème technique, selon lequel la sécurité d'émission d'une clé à l'aide d'une clé prédéfinie et au moyen d'un message court est relativement faible, est donc résolu.
PCT/CN2021/142718 2021-03-24 2021-12-29 Système de communication de l'internet des objets basé sur la technologie quantique WO2022199186A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110317558.2A CN112804059A (zh) 2021-03-24 2021-03-24 一种基于量子技术的物联网通信系统
CN202110317558.2 2021-03-24

Publications (1)

Publication Number Publication Date
WO2022199186A1 true WO2022199186A1 (fr) 2022-09-29

Family

ID=75815770

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/142718 WO2022199186A1 (fr) 2021-03-24 2021-12-29 Système de communication de l'internet des objets basé sur la technologie quantique

Country Status (2)

Country Link
CN (1) CN112804059A (fr)
WO (1) WO2022199186A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117119449A (zh) * 2023-10-20 2023-11-24 长江量子(武汉)科技有限公司 车云安全通信方法及系统
CN117544308A (zh) * 2024-01-09 2024-02-09 广东广宇科技发展有限公司 一种基于量子密钥的数据传输验证方法

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112804059A (zh) * 2021-03-24 2021-05-14 上海企树网络科技有限公司 一种基于量子技术的物联网通信系统
CN113708929B (zh) * 2021-08-26 2022-07-01 东南大学 一种物联网边缘网关定时推送量子密钥的方法
CN113922956A (zh) * 2021-10-09 2022-01-11 天翼物联科技有限公司 基于量子密钥的物联网数据交互方法、系统、设备及介质
CN114448629A (zh) * 2022-03-25 2022-05-06 中国电信股份有限公司 身份验证方法及装置、存储介质及电子设备
CN116318689B (zh) * 2023-05-25 2023-07-28 天津市城市规划设计研究总院有限公司 利用量子密钥提升物联网设备信息传输安全的方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2695487C1 (ru) * 2018-09-26 2019-07-23 Олег Дмитриевич Гурин Способ и система обеспечения взаимодействия устройств интернета вещей (iot)
CN110190952A (zh) * 2019-05-09 2019-08-30 浙江神州量子通信技术有限公司 一种基于量子随机数对物联网安全的加密传输方法
US20200259647A1 (en) * 2019-02-12 2020-08-13 Nxm Labs Canada Inc. Quantum-augmentable hybrid encryption system and method
CN112543189A (zh) * 2020-11-27 2021-03-23 北京中电飞华通信有限公司 数据安全传输方法和系统
CN112804059A (zh) * 2021-03-24 2021-05-14 上海企树网络科技有限公司 一种基于量子技术的物联网通信系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150835B (zh) * 2018-07-20 2021-05-04 国科量子通信网络有限公司 云端数据存取的方法、装置、设备及计算机可读存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2695487C1 (ru) * 2018-09-26 2019-07-23 Олег Дмитриевич Гурин Способ и система обеспечения взаимодействия устройств интернета вещей (iot)
US20200259647A1 (en) * 2019-02-12 2020-08-13 Nxm Labs Canada Inc. Quantum-augmentable hybrid encryption system and method
CN110190952A (zh) * 2019-05-09 2019-08-30 浙江神州量子通信技术有限公司 一种基于量子随机数对物联网安全的加密传输方法
CN112543189A (zh) * 2020-11-27 2021-03-23 北京中电飞华通信有限公司 数据安全传输方法和系统
CN112804059A (zh) * 2021-03-24 2021-05-14 上海企树网络科技有限公司 一种基于量子技术的物联网通信系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117119449A (zh) * 2023-10-20 2023-11-24 长江量子(武汉)科技有限公司 车云安全通信方法及系统
CN117119449B (zh) * 2023-10-20 2024-01-19 长江量子(武汉)科技有限公司 车云安全通信方法及系统
CN117544308A (zh) * 2024-01-09 2024-02-09 广东广宇科技发展有限公司 一种基于量子密钥的数据传输验证方法
CN117544308B (zh) * 2024-01-09 2024-04-19 广东广宇科技发展有限公司 一种基于量子密钥的数据传输验证方法

Also Published As

Publication number Publication date
CN112804059A (zh) 2021-05-14

Similar Documents

Publication Publication Date Title
WO2022199186A1 (fr) Système de communication de l'internet des objets basé sur la technologie quantique
CN107005413B (zh) 安全连接及相关服务的高效启动
US8761401B2 (en) System and method for secure key distribution to manufactured products
CN101340443B (zh) 一种通信网络中会话密钥协商方法、系统和服务器
US11736304B2 (en) Secure authentication of remote equipment
CN102916869B (zh) 即时通信方法和系统
EP3065334A1 (fr) Procédé, système, et appareil de configuration de clé
CN106790037B (zh) 一种用户态加密的即时通讯方法与系统
CN105993146A (zh) 不访问私钥而使用公钥密码的安全会话能力
CN112400299B (zh) 一种数据交互方法及相关设备
CA3178204A1 (fr) Messagerie securisee entre des modules materiels cryptographiques
CN110635901B (zh) 用于物联网设备的本地蓝牙动态认证方法和系统
CN111756528B (zh) 一种量子会话密钥分发方法、装置及通信架构
CN109309910A (zh) 通信数据传输方法、系统、设备及计算机可读存储介质
CN104767766A (zh) 一种Web Service接口验证方法、Web Service服务器、客户端
CN105634720A (zh) 加密安全配置文件
CN109962924B (zh) 群聊构建方法、群消息发送方法、群消息接收方法及系统
EP4068683A1 (fr) Procédé de communication et produit associé
CN109981271A (zh) 一种网络多媒体安全防护加密方法
TW202231014A (zh) 訊息傳輸系統以及應用其中之使用者裝置與資訊安全硬體模組
CN110166460B (zh) 业务帐号的注册方法和装置、存储介质、电子装置
WO2020151010A1 (fr) Procédé, dispositif et système de communication de plateforme déplaçable, et support de stockage
CN109474667B (zh) 一种基于tcp和udp的无人机通信方法
CN111489462B (zh) 一种个人用蓝牙钥匙系统
WO2013163861A1 (fr) Procédé, dispositif et système permettant une transformation de serveur mandataire

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21932793

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21932793

Country of ref document: EP

Kind code of ref document: A1