Node authentication method, system and device

An authentication method and node technology, applied in the field of data processing, can solve problems such as low security and data leakage

Pending Publication Date: 2022-08-05
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, if there are nodes with lower security among the nodes contained in the node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node authentication method, system and device
  • Node authentication method, system and device
  • Node authentication method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Below the attachment in the embodiments of the invention will be clearly and fully described in the technical solutions in the embodiments of the present invention. Obviously, the embodiment described is only a part of the embodiments of the invention, not all the embodiments. Based on the embodiments in the present invention, all other embodiments obtained by ordinary technical personnel in the art under the premise of not creating creative labor belong to the protection of the present invention.

[0057] In order to certify the safety of nodes in the node group, the embodiments of the present invention provide a node certification method, system and device.

[0058] Examples of the present invention provide a node certification method, which is applied to the first node. The above methods include:

[0059] In the case of receiving the certification request sent by the above second node, the first reputation value of the above -mentioned second node, the first social inten...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a node authentication method, system and device, relates to the technical field of data processing, and is applied to a first node. A first reputation value of the second node, a first social strength between the second node and the first node, and a first physical distance between the second node and the first node are obtained. And calculating a security value of the second node according to the first reputation value, the first social strength and the first physical distance. And under the condition that the security value meets the preset security requirement, first information representing that the second node passes the authentication is sent to the second node, so that the second node determines that the second node passes the authentication. And under the condition that the security value does not meet the preset security requirement, second information representing that the second node does not pass the authentication is sent to the second node, so that the second node determines that the second node does not pass the authentication. By applying the scheme provided by the embodiment of the invention, the security authentication of the node can be realized.

Description

Technical field [0001] The invention involves the field of data processing technology, especially a node certification method, system and device. Background technique [0002] In some application scenarios, different devices can be used as nodes, each node forms a node group, and data sharing with each other and jointly processing. For example, in the field of transportation, different vehicles can be used as nodes to form a vehicle node group, and data sharing can be performed between each vehicle. For example, the shared data can be used for data for the vehicle location and vehicle speed. Treatment can increase the safety of vehicles. In the field of user credit, the servers of different institutions can be used as nodes, such as banks' servers, shopping platform servers, etc., and each node forms a user credit data processing node group. Data sharing can be performed between servers of each institution. For example, shared data can be: user consumption information, user payme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04L9/40H04L9/32H04L67/1097
CPCH04W12/06H04L63/08H04L9/3247H04L67/1097
Inventor 朱孔林吴天昊庄思远应拓张琳
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products