Method and equipment for implementing application operation safety certificate
A technology for application operation and security authentication, applied in digital data authentication, data processing applications, instruments, etc., can solve problems such as application operation failure, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] Embodiments of the present invention provide a method and device for implementing security authentication of application operations, so as to improve the security of application operations using a USB Key and increase the success rate of application operations. The method for implementing application operation security authentication includes: receiving a request sent by an application for applying for a transmission label corresponding to this application operation; randomly generating and storing a corresponding transmission label for this application operation, and sending the generated transmission label to To the application; receiving the operation instruction sent by the application for implementing the operation of the application, the operation instruction carries the transmission label corresponding to the operation instruction, and the transmission label corresponding to the operation instruction is based on the Generate a transmission label corresponding to t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 