Computer network safe input authentication system and method
A computer network and secure input technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as inconvenience in use, and achieve the effect of avoiding theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The computer network security input system and method of the present invention will be further described in detail below in conjunction with accompanying drawings 1-5.
[0049] The core point of the present invention is to embed a security encryption unit in the terminal computer, which can be activated according to needs. When the security unit is activated, the validity of the communication is first verified by the time stamp, and then all transmitted input data are passed through this The security encryption unit encrypts. At this time, the data (character string) input by the user through the input device, including character information such as user and password, is in an encrypted state inside the personal computer of the terminal and during network transmission. Only when it reaches the application server of the network, such as the server of the network bank, because the network server has the decryption key, through the decryption operation, the original informa...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com