An encryption check processing method
A processing method and encryption verification technology, applied in the field of data processing, can solve problems such as symmetric key leakage, reduce data transmission security, etc., and achieve the effect of reducing security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0075] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.
[0076] An encryption verification processing method provided by an embodiment of the present invention is executed between multiple servers, and the encryption verification of data transmitted between servers is realized through the fusion of various encryption algorithms, thereby realizing the secure transmission of data between servers .
[0077] figure 1 A flowchart of an encryption verification processing method provided by an embodiment of the present invention, such as figure 1 shown, including:
[0078] Step 101, the first server receives the service request information input by the user according to the service interface data;
[0079] The first server can be understood as an online shopping mall server, such as Taobao Mall and Duocai Duoyi Mall, which are specifically implemented in the online shopping mall...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com