Equipment authentication method based on block side chain structure in fog network
A device authentication and side chain technology, applied in structured data retrieval, public key for secure communication, user identity/authority verification, etc., can solve the problems of wasting device authentication time, consuming computing resources, and spending large storage resources. , to achieve the effect of large consumption of storage resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] The embodiments of the present invention will be described below with reference to the specific examples of the present invention, and those skilled in the art can easily understand other advantages and efficacy of the present invention. The present invention can also be implemented or applied by other embodiments, and various details in this specification may also be based on different viewpoints and applications without departing from the spirit of the invention. It should be noted that the illustrations provided in the following examples will be described only by way of illustration, and in the case of unlamating, the following embodiments and embodiments may be combined with each other.
[0037] The drawings are for exemplary description, which is intended to be schematic diagrams, rather than experiencing, is not understood to limit the invention; in order to better illustrate an embodiment of the invention, there will be omitted, To zoom in, it does not represent the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


