Authenticated Network
A network and authentication device technology, applied in the field of authentication network, can solve the problems of small individual differences, not easy to resist wrong attacks, etc., and achieve the effect of information communication security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0185] In order to make the above-mentioned and other objects, features and advantages of the present invention more comprehensible, the preferred embodiments of the present invention are specifically cited below, together with the accompanying drawings, and are described in detail as follows:
[0186] As mentioned above, this application provides an authentication device, which realizes an unrewritable physical address by means of software technology, network technology, hardware technology or intentional combination of these technologies.
[0187] With a composition precisely designed to take advantage of these features, the excellent performance of the open ledger that works in a network of logical nodes (logical network) can be applied to a network of physical nodes (physical network). It will be described in detail below with reference to the drawings.
[0188] (first embodiment) Figure 15 It is a diagram explaining the relationship between a physical network including ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


