Identification authentication method between peer-to-peer user nodes in P2P network
A P2P network and peer-to-peer user technology, applied in the field of identity authentication between user nodes, can solve problems such as huge loads, reduce pressure, simplify the process, and achieve simple effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0035] The present invention will be further described below in conjunction with the drawings and specific embodiments.
[0036] In order to facilitate understanding, in an embodiment of the present invention, a simple P2P network is taken as an example to illustrate how to implement the method of the present invention. Such as figure 2 As shown, in this P2P network, there are two user nodes, user node A and user node B, user nodes A and B are connected through the network, and there is another user node on the network. Point A and B are connected to the authentication server. There are asymmetric encryption algorithms on user node A, user node B, and authentication server. The user nodes in the P2P network will get their own certificates during the login process, which can be used to achieve mutual identity authentication. reference image 3 , First, the process of obtaining the user node certificate is explained.
[0037] A user node, suppose it is user node A, enter the user n...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap