Encryption technique method based on digital signature in data communication transmission
A digital signature and data exchange technology, applied in the usage of multiple keys/algorithms, user identity/authority verification, etc., can solve problems such as unreliability, and achieve the effect of improving security, ensuring confidentiality, and improving service quality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0138] ①Encrypt Simple Object Access Protocol SOAP (SIMPLEOBJECT ACCESS PROTOCOL) information through the signature function on the client side;
[0139] ② When encrypting, first obtain the private key and related certificates, then sign the Simple Object Access Protocol SOAP (SIMPLE OBJECT ACCESS PROTOCOL) message, and finally send the signed file to the server through the transmission protocol HTTP (HYPERTEXT TRANSPORTPROTOCOL);
[0140] ③The server verifies the signed Simple Object Access Protocol (SOAP, fully written as SIMPLE OBJECT ACCESS PROTOCOL) message through the data verification function;
[0141] ④ After verification, the document is decrypted according to the private key and related certificates.
[0142] Please refer to the attached Figure 4 As shown, the network service filtering based on the digital signature encryption technology method in the data exchange transmission includes: the agent end 31 and the server end B 32, and the request 33 and the response...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 