A method for security authentication of Internet of things node group identity
A security authentication and node group technology, which is applied to user identity/authority authentication, secure communication devices, and key distribution, can solve the problems of group aggregation authentication applications and server reply information with a huge amount of computation, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] The invention will now be described in further detail with reference to the drawings.
[0045] It should be noted that the use of "upper", "", "," left "," left "," right "," front "," ",", ",", ",", "," The scope of the present invention can be embodied, and the relative relationship is changed or adjusted, and it is also considered to be the scope of the embodiments of the present invention without substantial change.
[0046] Combine figure 1 The present invention proposes an identity safety authentication method of an Internet of-connected node group, which includes the following steps:
[0047] S1, initialization phase: The server is generated by the various parameters required when the authentication is generated according to the selection security level, and its own key.
[0048] S2, registration phase: Group members register, get key, and group related information to the server.
[0049] S3, Group Aggregation Certification Request: All groups All groups use Schnorr ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


