Timestamp authentication system and method
A technology of authentication system and authentication method, which is applied in the field of time stamp authentication system to achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] For ease of understanding, the terms involved in the present invention are briefly described below:
[0014] Encryption and decryption in asymmetric encryption need to be processed with two different keys, the two keys are: public key and private key. If encrypted with one of the keys, it needs to be decrypted with the other key. For example, if you encrypt with a public key, you need to decrypt with a private key. Conversely, to encrypt with the private key, you need to decrypt with the public key.
[0015] Dynamic Host Configuration Protocol (DHCP) is a LAN network protocol. Configured on the client and server, when the client connects to the server, the server automatically assigns an IP address to the client. Network administrators can manage the internal network through the server.
[0016] When the DHCP configuration on the server is changed, the client connected to the server needs to obtain information such as an IP address again. The process is as follows:...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

