A data interaction method, device, and electronic device
A data interaction and data technology, applied in the field of devices, electronic equipment, and data interaction methods, can solve the problems of poor confidentiality of data interaction and achieve high confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] An analysis of the existing technology found that in the process of data interaction, it is easy for thieves to steal data because the data interaction process is essentially carried out in an unclosed environment, which allows the thieves to intervene in the data interaction process or through Interaction traces look for interaction data. In the prior art, a secret key is usually used to encrypt the data to be sent, so as to improve the confidentiality of data interaction. This method needs to send the secret key to the terminal so that the terminal can decrypt the encrypted data, which makes it possible for the stealer to analyze and then decrypt the encrypted data and secret key transmitted during the interaction process. Therefore, the industry hopes to propose a new data interaction method to improve confidentiality.
[0057] The embodiment of this specification proposes a data interaction method, which receives a data acquisition request sent by a browser, querie...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


