Data requesting and sending method, device and system
A data sending method and data request technology, applied in the field of data security, can solve problems such as the inability to guarantee the security of data assets, and achieve the effects of improving complexity and security level, improving security, and reducing the possibility of
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] Such as figure 1 as well as figure 2 As shown, the embodiment of this specification provides a data request method applied to a client device, including:
[0027] S101. Send an identity verification request to a server.
[0028] Specifically, step S101 further includes: in response to the login command input by the user, sending the user name and password input by the user to the server. For example, after the user enters the user name and password on the client and clicks the login button, the client sends the user name and password to the server. to the server.
[0029] S102. Receive the encrypted server_key and server_time sent by the server, where the server_key is the key of the server, and server_time is the time stamp generated when the server verifies the identity of the client device.
[0030] S103. Decrypt the encrypted server_key and server_time to obtain plaintext server_key and server_time.
[0031] S104. Perform variable calculation on client_key, pla...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


