Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted authentication method, network equipment, system and storage medium

An authentication method and equipment technology, applied to systems and storage media, the trusted authentication method can solve problems such as information leakage, the inability of trusted network devices to complete trusted authentication, and the inability of service networks to ensure security.

Active Publication Date: 2021-11-19
HUAWEI TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above trusted authentication schemes rely too much on the central node. Once the central node is abnormal, hijacked, or information is leaked, it will cause trusted network devices to fail to complete trusted authentication, and the service network cannot guarantee security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted authentication method, network equipment, system and storage medium
  • Trusted authentication method, network equipment, system and storage medium
  • Trusted authentication method, network equipment, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] Embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.

[0105] Blockchain can be used to solve the trust and security issues of transactions, which mainly has the following characteristics:

[0106] 1. Decentralized distributed ledger.

[0107] The data records in the blockchain are jointly completed by multiple nodes distributed in different locations, and each node records complete data. Therefore, these nodes can participate in supervising the legality of data, and can also serve as a trusted source of operation records.

[0108] There are two main differences from traditional distributed storage:

[0109] Data structure: In the blockchain, each block node stores complete data according to the block chain, while traditional distributed storage is divided into multiple storages according to certain specifications. Therefore, the blockchain can avoid the situation where a single node ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A trusted authentication method, network equipment, system and storage medium. The method includes: the authentication initiating device generates a transaction plan, the transaction plan includes the authentication information of the trusted authentication object; the authentication initiating device sends the transaction plan to the nodes in the block chain; the authentication initiating device receives After the transaction returned by the nodes in the block chain is effectively confirmed, it is confirmed that the credible authentication is successful. In this embodiment, trusted authentication is implemented as a blockchain transaction, which reduces the dependence of trusted authentication on the central node and ensures the security and stability of the service network.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a trusted authentication method, network equipment, a system and a storage medium. Background technique [0002] In the blockchain (blockchain), the trusted authentication of network equipment belongs to the content that has attracted much attention in the field of computer security. How does the blockchain service network confirm whether the newly connected network device is legal and trustworthy, how the running network device confirms whether the received instruction is legal and trustworthy, and how to confirm whether the operation log is legal and trustworthy (that is, whether it has not been tampered with) Delete), etc., these contents are related to the security and availability of the entire service network. Therefore, trusted authentication of network devices has attracted much attention. [0003] The server network of the blockchain has the characteristics of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06Q40/04
CPCH04L63/0823H04L9/3263G06Q40/04H04L9/50H04L9/32H04L9/40
Inventor 吴超
Owner HUAWEI TECH CO LTD