A blockchain interface configuration method based on communication security authentication

A configuration method and communication security technology, applied in the field of communication authentication, can solve problems such as inability to ensure structural configuration, affect communication security, and affect communication efficiency, and achieve benefits in use and promotion, avoid configuration confusion, and improve communication security. Effect

Active Publication Date: 2022-07-05
山东公链信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, most of the current communication methods are directly configured and interacted between users, which not only cannot ensure efficient structural configuration and affects communication efficiency, but also tends to cause configuration disorder and affect communication security. Therefore, a new configuration needs to be proposed. Way

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain interface configuration method based on communication security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to specific embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0024] A block chain interface configuration method based on communication security authentication is applied to a user system 1, the user system 1 is connected with a security authentication device 2, the security authentication device 2 is connected with a configuration module 3, and the user system 1 includes The requesting user 11 and the communication user 12, the security authentication device 2 includes a controller 21, a storage module 22, a signature module 23 and a verification module 24, and the controller 21, the storage module 22, the signature module 23 and the verification module 24 are connected...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain interface configuration method based on communication security authentication. Communication user, the security authentication device includes a controller, a storage module, a signature module and a verification module, the controller, storage module, signature module and verification module are connected in parallel with the controller, and the configuration module includes a block chain and a block chain The blockchain node is connected to the blockchain in parallel. By connecting the user system to the security authentication device, the communication request can be signed and authenticated. At the same time, the blockchain node is generated through the blockchain to connect the two users separately. , thereby avoiding configuration disorder, ensuring the stability of communication, and effectively improving communication security, effectively improving communication efficiency and information security, and facilitating use and promotion.

Description

technical field [0001] The invention relates to the field of communication authentication, in particular to a block chain interface configuration method based on communication security authentication. Background technique [0002] Under the current conditions of scientific and technological development, the importance of information is becoming more and more prominent, and the demand for information interaction is also increasing day by day. Therefore, attention is paid to communication security, and the requirements for information confidentiality are getting higher and higher. [0003] However, most of the current communication methods are directly configured and interacted between users, which not only cannot ensure efficient structural configuration, but also affects communication efficiency, and is prone to configuration disorder and affects communication security. Therefore, a new configuration needs to be proposed. Way. SUMMARY OF THE INVENTION [0004] The purpose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/0803H04L41/0894H04L41/0866H04L9/32
CPCH04L41/0803H04L41/0893H04L41/0866H04L9/3247
Inventor 李宝次
Owner 山东公链信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products