Method for realizing data security transmission, system, server and terminal
A data security and server technology, applied in the field of data security, can solve the problems of increasing user waiting time, long time, etc., and achieve the effect of reducing waiting time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0036] The present invention provides a method for realizing data secure transmission, such as figure 1 It is a flowchart of the first method proposed by the present invention, including:
[0037] Step 101: Divide the data into multiple segments, save some of the segments directly, and save the rest of the segments after being encrypted;
[0038] Step 102: The server receives the download request of the terminal, and sends the unencrypted data to the terminal in segments;
[0039] Step 103: The server receives the identity verification request sent by the terminal, performs identity verification on the terminal, and after the verification is passed, sends the encrypted data to the terminal in segments.
[0040] In the foregoing step 103, the terminal may send an identity verification request to the server while playing the unencrypted data segment.
[0041] If the server fails the authentication of the terminal, it can send an authentication failure message to the terminal.
[0042] In o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap