主权项 |
1. A mobile secure communication method based on a quantum key distribution network, comprising:
(1) registering mobile terminals to access the network and obtain unique quantum identity numbers; (2) establishing a binding relationship and sharing keys between each mobile terminal and a centralized control station in the quantum key distribution network; (3) after a communication service is initiated, sending respectively, by a calling mobile terminal and a called mobile terminal, a service information packet and a called-party response information packet to a quantum network management server in the quantum key distribution network, to apply for service keys for the communication; (4) obtaining, by the quantum key distribution network, addresses of a calling centralized control station, a called centralized control station, and centralized control stations participating in relaying the service keys in the communication; (5) collecting, by the quantum key distribution network, current state indicators of centralized control stations participating in distributing the service keys in the communication to designate a centralized control station for service key generation in the communication, send the service information packet to the centralized control station for service key generation, and command the centralized control station for service key generation to generate the service keys required by the communication; (6) generating and encrypting, by the centralized control station for service key generation, the service keys required by the communication, and distributing, by the centralized control station for service key generation, the encrypted service keys to the mobile terminals participating in the communication; (7) obtaining and decrypting, by the mobile terminals, the encrypted service keys distributed by a centralized control station(s) bound to the mobile terminals, wherein the mobile terminals decrypt the encrypted service keys through the keys shared with the centralized control station(s) bound to the mobile terminals, to obtain the service keys for the communication; (8) performing, by the mobile terminals participating in the communication, secure communication with the service keys through an original data link of the communication service. |