Two-way authentication method and system
A two-way authentication and authenticated technology, applied in the field of communication, can solve problems such as hidden safety hazards and imperfect authentication methods, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061] Preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, wherein the accompanying drawings constitute a part of the application and together with the embodiments of the present invention are used to explain the principle of the present invention and are not intended to limit the scope of the present invention.
[0062] figure 1 A schematic diagram of a two-way authentication method provided by an embodiment of this application, such as figure 1 shown, including the following steps:
[0063] Step S11, the authenticating device generates a first digital signature; sends the first digital signature and the temporary public key of the authenticating device to the authenticated device, and is verified by the authenticated device;
[0064] Step S12, receiving the second digital signature and the temporary public key of the certified device generated after the certified device passes the verification of th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com