SSL-based authentication method and electronic devices
A technology of an electronic device and an authentication method, applied in the field of image processing, can solve the problems of inconvenient portability of a key storage USBKEY and the like
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] figure 1 It is a schematic flowchart of the SSL-based authentication method provided in Embodiment 1 of the present application.
[0062] refer to figure 1 As shown, the SSL-based authentication method provided by the embodiment of the present application is applied to the second electronic device, and the authentication card is pre-stored in the second electronic device, and the client certificate is stored in the authentication card. The method includes:
[0063] Step S11: receiving the second request information sent by the first electronic device according to the user's first request information;
[0064] In this embodiment of the present application, the first electronic device may be a computer or a server, and the second electronic device may be a user's portable mobile terminal, such as a mobile phone.
[0065] When the user sends the first request information through the first electronic device, the first electronic device will convert the first request infor...
Embodiment 2
[0071] figure 2 It is a schematic flowchart of the SSL-based authentication method provided in Embodiment 2 of the present application.
[0072] refer to figure 2 As shown, the SSL-based authentication method provided by the embodiment of the present application is applied to the second electronic device, and the authentication card is pre-stored in the second electronic device, and the client certificate and the client key are stored in the authentication card. The method then includes:
[0073] Step S21: receiving the second request information sent by the first electronic device according to the user's first request information;
[0074] In this embodiment of the present application, the first electronic device may be a computer or a server, and the second electronic device may be a user's portable mobile terminal, such as a mobile phone.
[0075] When the user sends the first request information through the first electronic device, the first electronic device will con...
Embodiment 3
[0093] Figure 4 It is a schematic flowchart of the SSL-based authentication method provided in Embodiment 3 of the present application.
[0094] refer to Figure 4 As shown, the SSL-based authentication method provided in the embodiment of the present application is applied to the first electronic device, and the method includes:
[0095] Step S31: receiving the first request information from the user, and judging whether the first request information is login request information;
[0096] Step S32: If the first request information is login request information, convert the first request information into second request information according to a predetermined communication protocol with the second electronic device, and send the second request information to the second electronic device. second request information, so that the second electronic device extracts the client certificate from the pre-stored authentication card;
[0097] Step S33: Receive the client certificate s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 