A method for node access management and authentication in a mobile environment

A technology of access management and environment, applied in the direction of electrical digital data processing, encryption device with shift register/memory, instrument, etc., can solve problems such as synchronization and interference, and achieve the effect of ensuring reliability

Active Publication Date: 2022-07-15
中科边缘智慧信息科技(苏州)有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, after the authentication service is switched to the edge or the aggregation and separation of the edge service node set occurs, it is necessary to synchronize the meta information of the access node, which will cause competition with the business application for network bandwidth. Therefore, it is necessary to study the lightweight communication protocol based Access authentication information synchronization technology to achieve access information synchronization with the minimum communication cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for node access management and authentication in a mobile environment
  • A method for node access management and authentication in a mobile environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0021] The method for node access management and authentication under the mobile environment of the present invention comprises the following steps:

[0022] (a) Create an authentication service based on the serverless architecture in the cloud authentication center (ie, the cloud), push and update the authentication service to the edge service node set according to the event trigger policy, and make the edge service node set subscribe to the cloud authentication center for authentication services.

[0023] In the cloud-edge fusion information service system, in order to deal with the risk that the set of edge service nodes may be disconnected from the cloud at any time and cannot provide authentication services, an efficient and available event-triggered edge authentication service creation and destruction architecture can be designed, such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for node access management and authentication in a mobile environment, which includes the following steps: (a) creating an authentication service based on a serverless architecture in a cloud authentication center, and pushing the authentication service to a set of edge service nodes according to an event triggering policy; update, and make the edge service node set subscribe to the cloud authentication center for authentication services; (b) use the cloud authentication center to detect the link quality between it and the edge service node set in real time, when the edge service node set and the cloud authentication center link When the connection is disconnected, the selected edge service node is used as the virtual master node to take over the work of the cloud authentication center; (c) the virtual master node is used to perform the authentication service of newly registered end user information. Thereby, the reliability of the authentication service can be guaranteed.

Description

technical field [0001] The invention belongs to the technical field of network authentication, and relates to a method for node access management and authentication, in particular to a method for node access management and authentication in a mobile environment. Background technique [0002] The prerequisite for user equipment to obtain cloud (fixed cloud) edge (edge ​​node or edge service node) converged information services is to reliably access the system and pass identity authentication. The deployment method of authentication service based on cloud center (that is, fixed cloud center) cannot meet the requirements of node access management and authentication in mobile environment. When the edge service node set is disconnected from the cloud, an authentication service needs to be created in the edge service node set. In order to ensure the reliability of the authentication service, in addition to finding the edge service nodes that can actually run the authentication se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/51H04L41/0668H04L9/40H04L9/06G06F9/455
CPCH04L41/0668G06F9/45558H04L9/0643H04L63/08G06F2009/4557H04L67/51
Inventor 李新明刘斌
Owner 中科边缘智慧信息科技(苏州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products