Communication device and communication method for processing authentication information
A technology for communication devices and authentication information, which is applied to secure communication devices, user identity/authority verification, and key distribution, and can solve problems such as not being able to provide sufficient network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 3 approach
[0112] Although in Figure 13 to Figure 20C In the example shown, one representative node is implemented in each network, but the invention is not limited to this configuration. Multiple representative nodes can operate in parallel in each network to increase gateway processing capacity and network scalability.
[0113] Figure 21 An example of a configuration capable of realizing a plurality of representative nodes in a network is illustrated. In this example, multiple representative nodes are implemented in network A.
[0114] A communication device capable of operating on behalf of a node owns the token. Multiple tokens can be generated in the network. A single communication device can possess multiple tokens.
[0115] The token dynamically indicates whether the communication device is operating as a representative node. For example, the value of the token may be zero when the communication device is not operating as a representative node, and may be updated to 1 when...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


