Data transmission security authentication method and system based on edge computing and vector projection
A technology for data transmission security and edge computing, which is applied in the field of security certification and protection of data transmission, can solve problems such as large computational complexity, difficulty in adopting energy and computing power terminal nodes, and data security and privacy protection that cannot meet practical needs, etc., to achieve The effects of low computational complexity, improved security, and high accuracy of data authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.
[0037] Such as Figure 1~2 As shown, the data transmission security authentication method based on edge computing and vector projection includes the following steps:
[0038] S1. Initial authentication: When the terminal node and the edge computing server perform data transmission, the edge computing server performs upper-layer authentication on the initial data packet, and extracts the corresponding channel information vector as a reference vector for data packet authentication;
[0039] S101. When the terminal node and the edge computing server perform data transmission, the edge computing server performs upper-layer authentication on the first frame data packet:
[0040] If the authentication fails, directly discard the data packet, retur...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



