A double-agent cross-domain authentication method based on identification password and alliance chain
A technology for identifying passwords and authentication methods, applied in the field of Internet of Things information security, can solve problems such as application restrictions, and achieve the effect of solving revocation and updating, simple maintenance, and easy expansion.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] This embodiment sets forth the interaction process of the double-agent authentication method based on identification password and consortium chain.
[0058] The double-agent authentication method based on identification password and consortium chain can be applied to cross-domain application scenarios of the Internet of Things. This embodiment takes an application scenario of a smart manufacturing factory as an example. To simplify the description, two smart manufacturing factories are taken as examples. There are two smart manufacturing factories: smart manufacturing factory A and smart manufacturing factory B, their management is independent of each other, but they have a business cooperation relationship. Several smart manufacturing devices are deployed in each smart manufacturing factory, which have the capabilities of perception, storage, processing and execution, which is equivalent to an IoT device. These smart manufacturing devices are controlled by a central m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
