Blockchain-based authentication method and system
A blockchain and block technology, applied in the field of security, can solve problems such as difficult to establish a trusted network, unable to solve problems, difficult to solve problems, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] figure 1 is a representation of a network 10 with connected devices 11 implementing blockchain technology. The network 10 may be a Wifi, 3G, LTE, Bluetooth, RFID / NFC, wired connection network or any type of network that supports a protocol for exchanging messages between connected devices over the connection 13 . The messages exchanged can belong to one or more blockchain applications at different levels, e.g. HTTP / FTP based applications (to track network traffic), SSH / Telnet / RDP / VNC / VPN based applications (to track remote access) , RFID / NFC-based applications (tracking physical interactions), Wi-Fi applications, Bluetooth applications, etc. Every application or protocol to be monitored is associated with at least one blockchain. Different blockchains can be associated with the same application or protocol.
[0049] Each connected device 11 maintains a ledger (i.e. blockchain) of all it has access to and is shared between connected devices.
[0050] Each connected d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


