An authentication negotiation method and device
A technology of authentication results and initiators, which is applied in the field of network communication and can solve problems such as negotiation shocks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the embodiments of the present invention more obvious and understandable, the following describes the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings For further detailed explanation.
[0031] See figure 1 , figure 1 A schematic flowchart of an authentication negotiation method provided by an embodiment of the present invention, as shown in figure 1 As shown, the authentication negotiation method may include the following steps:
[0032] It should be noted that the execution subject of steps 101 to 102 may be the initiator device of the authentication negotiation or a processor in the initiator device, such as a CPU (Center Process Unit, central processing unit). For the convenience of description, step 101 ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


