Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cross-domain identity authentication method based on edge computing network architecture

A network architecture and edge computing technology, applied in the field of communications, can solve the problems of limited edge computing authentication resources, low network security and efficiency, and exposure of user identity privacy.

Active Publication Date: 2020-06-30
XIDIAN UNIV
View PDF10 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to address the shortcomings of the above-mentioned existing technologies, and propose a cross-domain identity authentication method based on the edge computing network architecture, which solves the difficulties in key management and distribution in the prior art, and the limited resources of edge computing authentication lead to network security. and low efficiency. The method of the present invention solves the technical problems of exposure of user identity privacy, easy session tracking, and difficult protection of user privacy by means of anonymous identity authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain identity authentication method based on edge computing network architecture
  • Cross-domain identity authentication method based on edge computing network architecture
  • Cross-domain identity authentication method based on edge computing network architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Below in conjunction with accompanying drawing and specific embodiment, the present invention is described in further detail:

[0068] refer to figure 1 , a schematic structural diagram of a security authentication system applicable to the present invention. The security authentication system applicable to the present invention includes at least a home authentication server, a user and a local authentication server of an edge node, wherein the user is used to make an authentication request to the local authentication server of the edge node, and the home authentication server is used to To verify the legitimacy of the user's identity and return the information to the local authentication server of the edge node, the local authentication server of the edge node is used to generate the user's temporary identity, manage and maintain the user list, and verify the legitimacy of the user.

[0069] refer to figure 2 , a cross-domain identity authentication method based on an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-domain identity authentication method based on an edge computing network architecture, and mainly solves the technical problems that in the prior art, key management and distribution are difficult, and user privacy is difficult to protect. The method comprises the following steps: 1) an edge node local authentication server and a home authentication server calculaterespective public and private keys; 2) the home authentication server generates a private key constructed by the user by using the pseudo identity; 3) the user applies for cross-domain access to theedge node local authentication server; 4) the edge node local authentication server sends information to a home authentication server of the user to verify the identity of the user; 5) the home authentication server authenticates the user information and returns a session key; 6) the local authentication server of the edge node calculates the session key and returns the authentication information;7) the user confirms the information to generate the session key. According to the method, the bidirectional verification security of the edge node equipment and the user can be effectively improved,the problems that the identity privacy of the user is exposed and the session is tracked are solved, and the method can be used for modern Internet of Things equipment.

Description

technical field [0001] The invention belongs to the field of communication technology, relates to information security technology, and further relates to a cross-domain identity authentication method based on an edge computing network architecture. It can be used to securely authenticate edge device users in resource-constrained and complex edge networks, including mobile phones, Bluetooth watches, smart home and smart car devices. Background technique [0002] The edge in edge computing refers to any computing resource and network resource between the data source and the data path of the cloud computing center. The basic idea of ​​edge computing is to run computing tasks on computing resources close to the data source. For the current rapid development of the Internet of Things and 4G / 5G wireless networks, edge computing data processing at edge locations solves the explosive data growth processing load and reduces the congestion caused by the sharp increase in network tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L9/32
CPCH04L9/0643H04L9/0838H04L9/0861H04L9/0869H04L9/3252H04L9/3297H04L63/0414H04L63/062H04L63/083H04L63/0869H04L63/0876H04L63/12
Inventor 董庆宽姚雪陈原丁文静王蕾
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products