A secure protection method and system with dual identity authentication
A technology of identity authentication and security protection, applied in the field of identity authentication, can solve problems such as illegal intrusion by others, and achieve the effect of increasing the probability of arresting criminal suspects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The method and system of the present invention will be further described below.
[0027] The method of the invention sets two authentication relationships for the local machine: a companion authentication relationship and a local authentication relationship, so as to perform peer verification and local verification respectively. The method of the present invention enables the machine operated by the master to establish a communication link with the peer, and establishes peer verification information to form a peer authentication relationship. The peer verification information includes the agreement between the machine and the peer, called a peer agreement, based on the peer authentication The verification is peer verification, and the peer agreement includes the identification information of the peer to the machine, the agreement on the specific communication between the peer and the machine; the method of the present invention sets the verification information of the ma...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 