Multi-party authentication method based on time division and space division and computer readable storage medium
An authentication method and multi-party technology, applied to key distribution, can solve the problems of large leak risk, space, time limitation, low reliability, etc., and achieve the effect of reducing the risk of leak and ensuring reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0049] The invention relates to a multi-party authentication method based on time division and space division, which comprises the steps of selecting an access path from the visited node to the access node and generating an encrypted access path to send to the access node; share, and encrypt different values according to different time periods; the access node decrypts the encrypted access path to obtain the access path; the nodes passed by the access path share decryption to obtain the secret. In the present invention, on the premise that each node is connected with each other and issues certifi...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com