Network authentication method and system based on data link encryption transmission
An encrypted transmission and data link technology, applied in the information field, can solve the problems of being stolen, easily cracked and copied, and insecure in the storage and use of serial numbers or registration files. The effect of increasing the cost of cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0035] In order to make the above-mentioned objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described through specific embodiments and drawings below.
[0036] The network authentication scheme adopted by the present invention is composed of a device end (or called a device terminal, a client) and a server end (or called an authentication server). The communication link between the device side and the server side adopts asymmetric encryption algorithm for encrypted transmission, the device side uses public-key encrypted transmission, and the server side uses private-key encrypted transmission. The device side and server side should have the files shown in Table 1 below:
[0037] Table 1. Files on the device side and server side
[0038] Device side
[0039] Related terms are explained as follows:
[0040] Identification information: It is composed of system information on the device side (including ha...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap