Blockchain Adaptive Consensus Method Based on Dynamic Authorization and Network Environment Perception
A network environment and dynamic authorization technology, applied in the field of information security identification, can solve problems such as low efficiency, low throughput, and high delay
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.
[0039] Such as figure 1 As shown, at present, each edge cloud forms a data island, which cannot effectively realize cross-bank cross-network cross-border integration. Therefore, in order to improve user experience and enhance network service capabilities, it is necessary to study a trusted collaboration mechanism for data sharing between edge clouds to realize P2P data sharing at the edge of the network without transmitting it to the business system in the cloud center. Therefore, how to establish a decentralized trusted mechanism at the edge of the network and ensure end-to-end data transmission security and privacy protection during data forwarding in a cross-domain heterogeneous networking e...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


