A method and device for safety protection
A technology for security protection and security information, applied in the computer field, can solve problems such as cumbersome operation steps and large differences in digital signatures
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present application.
[0056] In order to reduce the difference in digital signature operations and simplify the cumbersome steps of digital signature operations when performing security protection on information, in the embodiment of this application, a method of security protection is designed, which allows any browser application to pass The specified protocol sends a digital signature command containing the information to be processed to the security protection a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


