Safety communication secret key negotiation interaction scheme
A technology of key agreement and secure communication, which is applied in the field of information-based mobile office, which can solve the problems of SSL usage restrictions, being attacked, and the lack of safe storage of private keys in mobile terminals, so as to achieve the effect of ensuring security and authenticity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The present invention is described in further detail below in conjunction with accompanying drawing:
[0025] 1. According to figure 1 As described, the user and terminal registration process is as follows:
[0026] 1.1 The user first installs the application software on the smart mobile terminal. After the application software is started, it first checks whether there is a certificate of the network server. If there is no certificate, it will automatically download the certificate from the preset website. The user first registers, and when registering, enter: user name, login password, user mobile phone number, and then request a mobile phone verification code;
[0027] 1.2 After receiving the user's mobile phone verification code request, the server compares the user name and mobile phone number with the registered information according to the user name entered by the user. If the user name already exists, it means that the user has already registered. At this time, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com