Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A node access and node authentication method based on edge computing

An edge computing and access method technology, applied to public keys for secure communication, user identity/authority verification, and key distribution, can solve problems such as user data and privacy threats, achieve enhanced security and reliability, and improve verification Efficiency, the effect of avoiding leakage

Active Publication Date: 2019-06-07
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +3
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention provides a node access and node authentication method based on edge computing to solve the technical problem in the prior art that user data and privacy are threatened due to the lack of identity verification services on edge devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A node access and node authentication method based on edge computing
  • A node access and node authentication method based on edge computing
  • A node access and node authentication method based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0033] An embodiment of the present invention provides a node access and node authentication method based on edge computing, such as figure 1Shown is a schematic diagram of an application scenario of an embodiment of the present invention. The key generation server generates the authentication master key and public parameters according to the security p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a node access and node authentication method based on edge computing. The access method comprises the following steps: receiving an authentication master key and a public parameter sent by a key generation server; Sending identity identification information to the main edge computing node and the key generation server; Receiving part of private key information generated bythe key generation server according to the authentication master key, the public parameters and the identity information; Calculating a first public and private key according to the public parameter,the identity identification information and part of private key information, and sending the first public and private key to the main edge computing node; And receiving a secret share signed by the main edge computing node according to the first public and private key, and taking the secret share as a certificate of access authentication. The access method solves the technical problem that user data and privacy are threatened due to the fact that edge equipment lacks identity authentication service in the prior art, meanwhile, the secret share of the generated signature is generated, the reliability of the secret share in the transmission process is guaranteed, and the safety and reliability of a whole edge computing system are enhanced.

Description

technical field [0001] The invention relates to the technical field of edge computing information security, in particular to a node access and node authentication method based on edge computing. Background technique [0002] With the rapid development of technologies such as the Internet of Things and 5G, the trend of the Internet of Everything is deepening. The Internet of Things technology and smart devices have increasingly penetrated into people's daily lives. New business models such as smart grids, smart cities, and autonomous driving continue to emerge. , the number of network edge devices will grow explosively, followed by the demand for high real-time performance brought by the "massive" data processing generated by network edge devices. [0003] As a new computing model centered on network edge devices, edge computing brings great convenience to solve the problem of delay and network bandwidth load, supports the migration of cloud center tasks to the edge of the ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08
Inventor 陈璐陈牧马媛媛邵志鹏汪自翔李尼格戴造建李勇方文高席泽生
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products