A security authentication method and system
A technology of security authentication and authentication device, applied in the field of control system security in the heating industry, can solve the problems of data transmission without encryption, inability to effectively prevent non-compliance with security requirements, inability to achieve two-way identity authentication, etc., to achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 4
[0115] The present invention provides an embodiment 4 of a security authentication system suitable for the security authentication method described in embodiments 1 and 2, and the system may include:
[0116] an application server, an acquisition device and an authentication device,
[0117] The application server is used to send data instructions to the authentication device for encryption, receive the encrypted data instructions from the authentication device and send the encrypted data instructions to the acquisition device, and receive the encrypted data instructions from the authentication device. The encrypted execution result of the data instruction returned by the acquisition device, and sending the encrypted execution result of the data instruction to the authentication device for decryption, receiving the decrypted execution result of the data instruction by the authentication device,
[0118] The acquisition device is used to receive and decrypt the data instruction...
Embodiment 5
[0123] For the security authentication method described in Embodiment 3, the present invention also provides Embodiment 5 of a security authentication system applied to the security authentication method. The system may include:
[0124] an application server, an acquisition device and an authentication device,
[0125] The application server is used to receive the encrypted data command sent by the collection device and send it to the authentication device, receive the decrypted data command from the authentication device and execute the data command and return the data command for execution The result is decrypted by the authentication device, and is also used to receive the encrypted data instruction execution result sent by the authentication device and send it to the collection device,
[0126] The acquisition device is used to send the encrypted data instruction to the application server, and is also used to receive the encrypted data instruction execution result of the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



