Data safe interaction method and device
A technology of data security and interaction method, applied in the field of data encryption processing, can solve the problems of increasing the risk of loss of passwords, trouble in use, etc., and achieve the effect of solving the burden and improving the security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0066] The invention provides a data security interaction method.
[0067] refer to figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the data security interaction method of the present invention.
[0068] In the first embodiment, the data security interaction method includes:
[0069] Step S10, sending to the server a request message encrypted with a preset secret key requesting the server to issue an RSA public key;
[0070] In this embodiment, communication is established between the terminal and the server, and the terminal needs to connect to the server before it can realize information interaction with the server. refer to figure 2 , the specific process for the terminal to connect to the server is:
[0071] Step S11, sending the connection information encrypted with the preset ke...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


