Credible authentication system between ground network operation control center and satellite under environment of interconnection of mobile grids
A network operation and control center technology, applied in wireless communications, electrical components, security devices, etc., can solve problems such as lack of trusted authentication systems, and achieve the effect of resisting denial of service attacks, reducing resource consumption, and reducing the amount of calculation.
Inactive Publication Date: 2013-07-03
WUXI NANLIGONG TECH DEV
0 Cites 2 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
Provided is a credible authentication system between a ground network operation control center and a satellite under the environment of interconnection of mobile grids. Whether a node requesting authentication is within a legitimate node area is judged in a Compressed Bloom Filter method, and only when the node passes the judgment can a certificate be verified. If the judgment is not firstly carried out, an illegal node may constantly send false certificates to the legitimate node, the legitimate node constantly carries out a large-number exponent arithmetic, and in terms of a satellite node with limited resources, paralysis of the satellite node is caused. Therefore, the credible authentication system can effectively defend attacks of denial of service in authentication.
Application Domain
Security arrangement
Technology Topic
Authentication systemSatellite +5
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Constructing method and terminal of iOS application
Owner:FUJIAN TIANQUAN EDUCATION TECH LTD
Differential relay protection communication device based on 5G communication, system and method
Owner:JINING POWER SUPPLY CO OF STATE GRID SHANDONG ELECTRIC POWER CO +1
Video on demand service device and method
Owner:HITACHI LTD
Data processing method and device, computer equipment and storage medium
Owner:ANHUI CAMBRICON INFORMATION TECH CO LTD
Classification and recommendation of technical efficacy words
- Reduce resource consumption
General purpose Portland cement based ultra-light physical foamed concrete
Owner:SOUTHWEAT UNIV OF SCI & TECH
Method and system for freezing/thawing procedures
Owner:GUANGZHOU JIUBANG DIGITAL TECH
Log recording method and log recording system
Owner:ADVANCED NEW TECH CO LTD
Method and device for processing resource allocation as well as network service system
Owner:HUAWEI TECH CO LTD
Animation playing method and device, storage medium, electronic device
Owner:TENCENT TECH (SHENZHEN) CO LTD