Unlock instant, AI-driven research and patent intelligence for your innovation.

Authenticated Network

A network and authentication device technology, applied in the field of authentication network, can solve the problems of small individual differences, not easy to resist wrong attacks, etc., and achieve the effect of information communication security

Active Publication Date: 2018-10-09
夏桂根 +1
View PDF16 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is, individual differences are small, and it is not easy to resist false attacks utilizing changes in environmental factors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticated Network
  • Authenticated Network
  • Authenticated Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0185] In order to make the above-mentioned and other objects, features and advantages of the present invention more comprehensible, the preferred embodiments of the present invention are specifically cited below, together with the accompanying drawings, and are described in detail as follows:

[0186] As mentioned above, this application provides an authentication device, which realizes an unrewritable physical address by means of software technology, network technology, hardware technology or intentional combination of these technologies.

[0187] With a composition precisely designed to take advantage of these features, the excellent performance of the open ledger that works in a network of logical nodes (logical network) can be applied to a network of physical nodes (physical network). It will be described in detail below with reference to the drawings.

[0188] (first embodiment) Figure 15 It is a diagram explaining the relationship between a physical network including ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authenticated network which solves the problem that a physical address of a machine connected to a network as a physical node is easily tampered by using a public book technology. The authenticated network having a plurality of nodes is disclosed. Each node includes a transaction unit and an identification core. The identification core includes a key generator. The key generators of the identification cores generate a plurality of unique pairs of secret and public keys. The public key serves as a logical address of the transaction unit. Another authenticated network having a plurality of nodes is also disclosed, in which the identification core further includes a private key. Each node includes a transaction unit and an identification core. The key generators of the identification cores generate a plurality of public keys from the private keys of the identification cores. Each public key serves as a logical address of the transaction unit of a corresponding node. One of the public keys and one of the private keys form a unique pair. Thus, the transaction unit manages the information communication among the plurality of nodes. The identification core manages an authentication of the nodes.

Description

technical field [0001] The present invention relates to techniques for authenticating devices existing on a network. Background technique [0002] The number of devices connected to the continuously evolving Internet is increasing every year, and its network structure is also complicated and diverse. However, basically, it can be roughly divided into master-slave (clientserver, CS) and peer-to-peer (P2P), master-slave uses a server with a special There is such a backbone node, but all nodes are basically connected in a peer-to-peer fashion. However, regardless of whether it is a network of any kind, there are such figure 1 The smallest unit shown exists. [0003] As such, a network generally includes nodes (nodes) and links (links). figure 1 In this example, the first node 2001 and the second node 2002 are connected by a link, that is, a signal transmission path 1000 . For example, the first node 2001 and the second node 2002 exchange PDUs via the signal transmission p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0822H04L9/0861H04L9/30H04L63/06H04L63/083H04L9/3297H04L69/323H04L9/3236H04L69/22H04L9/50G06F21/602G06F21/73H04L9/3278
Inventor 渡边浩志木下敦宽
Owner 夏桂根