Trusted authentication method, network equipment, system and storage medium
An authentication method and equipment technology, applied to systems and storage media, the trusted authentication method can solve problems such as information leakage, the inability of trusted network devices to complete trusted authentication, and the inability of service networks to ensure security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0104] Embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.
[0105] Blockchain can be used to solve the trust and security issues of transactions, which mainly has the following characteristics:
[0106] 1. Decentralized distributed ledger.
[0107] The data records in the blockchain are jointly completed by multiple nodes distributed in different locations, and each node records complete data. Therefore, these nodes can participate in supervising the legality of data, and can also serve as a trusted source of operation records.
[0108] There are two main differences from traditional distributed storage:
[0109] Data structure: In the blockchain, each block node stores complete data according to the block chain, while traditional distributed storage is divided into multiple storages according to certain specifications. Therefore, the blockchain can avoid the situation where a single node ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


