会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明公开
    • QUANTUM STREAMING
    • US20230299948A1
    • 2023-09-21
    • US18017060
    • 2021-07-20
    • ARQIT LIMITED
    • David WILLIAMSBarry CHILDE
    • H04L9/08G06N10/80H04L9/14H04L9/40
    • H04L9/0852G06N10/80H04L9/085H04L9/14H04L63/0457
    • Method(s), system(s), apparatus are provided for quantum safe quantum streaming between a first endpoint device and second endpoint device via a server of a quantum cloud platform. Splitting, at the first endpoint device, a data item into a plurality of data shards that allow reconstruction of the data item. Encrypting, at the first endpoint device, each of the data shards separately using a first cryptographic key shared between the first endpoint device and the second endpoint device. Establishing, between the first endpoint device and the server, a first plurality of secure channels with the server of the quantum cloud platform using a second cryptographic key, the second cryptographic key shared between the endpoint and the server. Transmitting, from the first endpoint device to the server, the plurality of encrypted shards towards the second endpoint device via the server over the plurality of secure channels. Receiving, at the server, the plurality of encrypted data shards of the data item transmitted from the first endpoint device over the first plurality of secure channels, each data shard encrypted using the first cryptographic key known only to the first endpoint device and the second endpoint device. Securely storing, by the server, the encrypted data shards of the data item in a secure storage of the quantum cloud platform. In response to the second endpoint logging onto the quantum cloud platform, establishing a second plurality of secure channels with the second endpoint using a third cryptographic key, the third cryptographic key shared between the second endpoint device and the server. Retrieving the encrypted data shards of the data item from secure storage. Transmitting the encrypted data shards over the second plurality of secure channels to the second endpoint device. Receiving, at the second endpoint, a plurality of encrypted data shards of the encrypted data item from the server over the second plurality. Decrypting the encrypted data shards using the first cryptographic key to reconstruct the data item transferred from the first endpoint device to the second endpoint device.
    • 9. 发明申请
    • A METHOD OF MANAGEMENT OF REMOTE OPERATIONS
    • US20220393866A1
    • 2022-12-08
    • US17775214
    • 2020-11-06
    • ARQIT LIMITED
    • David WilliamsBarry ChildeDavid BestwickAndrew James Victor Yeomans
    • H04L9/08H04B10/70H04B7/185
    • A method of scheduling encryption key delivery communication sessions in a satellite quantum key distribution system comprising a constellation of one or more satellites and a plurality of user ground stations comprises producing a list of user ground stations requiring encryption keys. For each satellite of the constellation of satellites, determining a region of the earths surface within which the satellite can carry out encryption key delivery communication sessions to user ground stations using a quantum optical communications link during a scheduling period. Obtaining a cloud cover map. Comparing the locations of the listed user ground stations, the determined regions of the earths surface for the constellation of satellites, and the cloud cover map, to identify listed user ground stations to which encryption key delivery can be carried out by the constellation of satellites during the scheduling period. Determining which of the identified user ground stations each satellite of the constellation of satellites will carry out encryption key delivery communication sessions with at different times in the scheduling period based upon one or more of: an amount of unused encryption keys at each identified user ground station; and an expected time duration before each identified user ground station runs out of encryption keys.