Authentication system and method based on peer-to-peer computing network

A computing network and authentication system technology, applied in the field of computing network authentication systems, can solve problems such as single point failure, and achieve the effect of improving resource utilization

Inactive Publication Date: 2013-08-07
ZTE CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide an authentication system and method based on a peer-to-peer computing network, to at least solve the problem that each user node needs to verify its identity in the authentication server when logging in to the network, which will cause a lot of trouble to the authentication server. The pressure is also prone to the problem of single point failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method based on peer-to-peer computing network
  • Authentication system and method based on peer-to-peer computing network
  • Authentication system and method based on peer-to-peer computing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0028] System embodiment

[0029] According to an embodiment of the present invention, an authentication system based on a peer-to-peer computing network is provided. figure 1 is a structural block diagram of an authentication system based on a peer-to-peer computing network according to an embodiment of the present invention, such as figure 1 As shown, the system includes: a super node 4, the structure of which is described below.

[0030] The super node 4 is configured to receive the authentication request from the user node, and authenticate the user corresponding to the user node according to the locally stored authentication information.

[0031] Preferably, the system also includes: a regist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses authentication system and method based on a peer-to-peer computing network. The authentication system comprises a super node, and the super node is used for receiving an authentication request of a user node and authenticating a user which corresponds to the user node according to locally stored authentication information. The invention achieves the effect of enhancing resource utilization rate.

Description

technical field [0001] The present invention relates to the communication field, in particular to an authentication system and method based on a peer-to-peer computing network. Background technique [0002] Peer-to-Peer Computing (P2P for short) changes the original C / S computing (client / server, Client / Server Computing) or B / S computing (browser / server, Brower / Server Computing) such an asymmetric computing model, each node is equal in status and can simultaneously become a service user and provider, which provides a flexible and scalable computing platform for large-scale information sharing, direct communication and collaborative work . At present, P2P technology has a wide range of applications in the network, and the most important applications include the following areas: P2P networks that provide file and other content sharing, collaborative processing and service sharing platforms based on P2P methods, instant messaging and voice communication software, video sharing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 王治平王汝传李致远支萌萌
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products