Data processing method

A data processing and data technology, which is applied in the field of network information security, can solve the problems of confidential data hacking and other problems, and achieve the effect of preventing man-in-the-middle attacks, ensuring security, and preventing counterfeit attacks

Active Publication Date: 2014-12-24
SHANGHAI PEOPLENET SECURITY TECH
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are many insecure factors in data exchange on the Inter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. Those skilled in the art can also obtain other drawings based on these drawings without creative work.

[0046] As a specific embodiment of the present invention, figure 1 It is a schematic diagram of the steps of the embodiment of the data processing method provided by the present invention. The invention provides a data processing method, comprising the steps of:

[0047] S1 The user enters the user ID and password to register with the server; the client generates first information according to the user ID and the password;

[0048] S2 The client encrypts the first time to generate second informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data processing method. The data processing method includes that a user inputs a user identity and a password to register in a server; a client side generates first information according to the user identity and the password; the client side encrypts first time to generate second information, encrypts the second information and the first information to generate third information and sends the third information to the server; the server decrypts the third information to acquire the first time and completes authentication of the client side by the server by comparing the first time with second time; the server encrypts the second time to generate fourth information and sends the fourth information to the client side. The data processing method realizes network identity authentication, data encrypting transmission and data completeness checking and has better technical background.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a data processing method. Background technique [0002] With the continuous development of the Internet, more and more people have begun to try online transactions. However, malicious threats such as viruses, hackers, phishing and phishing scams have brought great challenges to the security of online transactions. The endless emergence of cybercrimes has caused people's trust crisis in online identities. How to authenticate real identities in online transactions, prevent fraudulent use of identities, and keep information transmitted in the network confidential has once again become the focus of attention. [0003] There are many insecure factors in data exchange on the Internet, especially some confidential data are more vulnerable to hackers. Therefore, data needs to be authenticated before being transmitted over the network to prevent impersonation. When data is t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L9/14H04L9/32H04L9/40
Inventor 谈剑锋郑建华
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products