Data authentication method and system using same
A data authentication and authentication device technology, applied in the field of information security, can solve problems such as loss or embezzlement of certificates, potential safety hazards, transaction tampering, etc., and achieve the effects of ensuring non-tampering, improving security, and ensuring confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0042] In order to further illustrate the technical means adopted by the present invention and its effects, the following describes in detail the preferred embodiments of the present invention and the accompanying drawings.
[0043] Such as figure 1 As shown, the present invention provides a data authentication method, which includes the following steps:
[0044] Step 1. The authentication device is electrically connected to the networked computer and the smart card through the USB interface and the smart card interface respectively, and the networked computer is electrically connected to the server that needs to realize the service request, and then the relevant information is input in the networked computer to send the service to the server. Request, the smart card stores user information and private keys, and the authentication device is provided with a keyboard and a display screen.
[0045] Step 2. The server side processes and generates data information according to the receive...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap