Network authentication method and system based on data link encryption transmission
An encrypted transmission and data link technology, applied in the information field, can solve the problems of being stolen, easily cracked and copied, and insecure in the storage and use of serial numbers or registration files. The effect of increasing the cost of cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and accompanying drawings.
[0036] The network authentication scheme adopted by the present invention is composed of a device end (or called a device terminal, client) and a server (or called an authentication server). The communication link between the device side and the server side uses an asymmetric encryption algorithm for encrypted transmission, the device side uses public-key encrypted transmission, and the server side uses private-key encrypted transmission. The device side and the server side should have the files shown in Table 1 below:
[0037] Table 1. Device-side and server-side files
[0038] Device side
public-key, identification information, 100 sets of keys, 100 sets of random numbers
Service-Terminal
private-key, identification ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com