Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Node authentication method for avoiding authentication congestion

An authentication method and node technology, which is applied in the computer field, can solve problems such as the system not working normally, and achieve the effects of fast cluster head failure recovery, fast authentication speed, and high efficiency

Active Publication Date: 2014-09-17
西安电子科技大学青岛计算技术研究院
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The present invention can avoid authentication blocking through passive authentication, active authentication, fast re-authentication and fast cross-domain authentication, so as to ensure the normal operation of the authentication center and effectively solve the problem that the system cannot work normally due to authentication blocking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node authentication method for avoiding authentication congestion
  • Node authentication method for avoiding authentication congestion
  • Node authentication method for avoiding authentication congestion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Below in conjunction with accompanying drawing, the present invention will be further described:

[0043] Applicable environment of the present invention: an overall network is divided into several network areas, and each network area is called a domain; each domain has many nodes and a cluster head node, and nodes in a domain authenticate to the cluster head node, and the cluster head node Then exchange data with the outside world; when the network is established, the node ID will be registered with the cluster head as a registered node, and the cluster head will store all registered nodes in the legal node table. In addition to the legal node table, the cluster head also has a command node table and an authenticated node table.

[0044] Attached below figure 1 Concrete steps of the present invention are further described as follows:

[0045] Step 1, the cluster head and nodes are started, and the legal node table, command node table and authenticated node table are ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a node authentication method for avoiding authentication congestion. The authentication method comprises the following steps of: 1, passive authentication; 2, active authentication; 3, fast re-authentication; and 4, fast cross-domain authentication. According to the authentication method, the passive authentication is carried out during initialization, and authentication of other three steps is allowed after the initialization; the active authentication is spontaneous authentication of nodes; the fast re-authentication is used for fast recovering authentication connection of an authentication center after a cluster head is crashed; and the fast cross-domain authentication eliminates inconvenience of node migration domain transfer. By the method, the authentication congestion of the nodes in a network environment is effectively avoided, the problems of slow recovery of the crashed cluster head and incompatible authentication of the nodes are solved, and normal work of an authentication system is ensured.

Description

technical field [0001] The invention belongs to the field of computer technology, and further relates to a node authentication method for avoiding authentication blocking in the field of network technology. The invention can realize node authentication in order and ensure safe operation of the system in the authentication between the user and the host and between the host and the host, thereby avoiding the problem of easily causing authentication block in the network environment. Background technique [0002] Identity authentication is the process of confirming the identity of the operator in the information system. Identity authentication can be divided into the authentication between the user and the host and the authentication between the host and the host. With the improvement of people's security awareness and the enhancement of information system security requirements, as the first line of protection for information systems, identity authentication technology has been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 沈玉龙张志为宗旋姜晓鸿裴庆祺陈晨舒敏党晓伟刘灵通张元玉
Owner 西安电子科技大学青岛计算技术研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products