Node authentication method, system and device
An authentication method and node technology, applied in the field of data processing, can solve problems such as low security and data leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] Below the attachment in the embodiments of the invention will be clearly and fully described in the technical solutions in the embodiments of the present invention. Obviously, the embodiment described is only a part of the embodiments of the invention, not all the embodiments. Based on the embodiments in the present invention, all other embodiments obtained by ordinary technical personnel in the art under the premise of not creating creative labor belong to the protection of the present invention.
[0057] In order to certify the safety of nodes in the node group, the embodiments of the present invention provide a node certification method, system and device.
[0058] Examples of the present invention provide a node certification method, which is applied to the first node. The above methods include:
[0059] In the case of receiving the certification request sent by the above second node, the first reputation value of the above -mentioned second node, the first social inten...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com