An ntru secure access method for power internet of things network terminals based on edge computing
An IoT network and edge computing technology, applied in the field of communications, can solve problems such as low point multiplication operation efficiency, Shor algorithm cracking, and poor resistance to quantum attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The present invention will be further described below in conjunction with the accompanying drawings. However, it should be noted that these implementations are not
[0050] FIG. 2 is a specific flow of the safe access of terminal equipment in the power Internet of Things network. NB‑IoT and eMTC devices via mobile
[0051] FIG. 3 is a network security access protocol for the power Internet of Things using edge computing. In this agreement, the system HSS service
[0055] This protocol is used in the terminal equipment D of the power Internet of Things network.
[0056] A method for secure access to a network terminal NTRU based on edge computing, comprising the steps of:
[0057] Step 1: initialization. The main architecture of the system is: power IoT network terminal equipment D
[0058]
[0059]
[0060]
[0061]
[0063] The NTRU algorithm works on ring R:
[0065] The multiplication operation on the ring R is represented by *. For example, the polynomial H=F*G can b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com