Unlock instant, AI-driven research and patent intelligence for your innovation.

Bidirectional authentication method, device and equipment based on GDPR specification and medium

A two-way authentication and standardized technology, applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as malicious tampering, data and password cracking, user data leakage, etc., to improve security, prevent malicious reading or tampering effect

Pending Publication Date: 2022-06-24
深圳市同为数码科技股份有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in the complex environment of the network, during data communication between the host and the client, data on the host (for example, a camera) is easily read illegally, or even maliciously tampered with, because the client logs in to the device for authentication or During the transmission of video data, if the password or data is not encrypted, or the encryption method is simple, or only one-way authentication is used, the data and password are easily cracked by the listener, resulting in user data leakage and host-side data security threats.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication method, device and equipment based on GDPR specification and medium
  • Bidirectional authentication method, device and equipment based on GDPR specification and medium
  • Bidirectional authentication method, device and equipment based on GDPR specification and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to more fully understand the technical content of the present invention, the technical solutions of the present invention are further introduced and described below with reference to specific embodiments, but are not limited thereto.

[0048] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0049] It is to be understood that, when used in this specification and the appended claims, the terms "comprising" and "comprising" indicate the presence of the described features, integers, st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a bidirectional authentication method and device based on a GDPR specification, equipment and a medium. The method comprises the steps that a client side sends a first request packet for applying for connection establishment to a host side corresponding to the client side; the client side receives a first response packet sent by the host side, and the client side sends a second request packet to the host side; the client side receives a second response packet sent after the host side successfully verifies the second request packet; the client verifies the second response packet; the client side verifies the second response packet and then sends an encrypted communication content request to the host side; after receiving response information of the host side for the encrypted communication content request, the client releases connection to the host side; and the client receives the connection response released by the host. According to the invention, a mode of bidirectional authentication of the client side and the host side is adopted, so that the security of user data can be improved, and the server side data is prevented from being maliciously read or tampered.

Description

technical field [0001] The invention relates to the technical field of data transmission security, and more particularly to a method, device, device and medium for bidirectional authentication based on GDPR specification. Background technique [0002] At present, in the complex environment of the network, during data communication between the host and the client, the data on the host (for example, the camera) is easily read illegally or even maliciously tampered with, because the client logs in to the device for authentication or In the process of transmitting video data, the password or data is not encrypted, or the encryption method is simple, or only one-way authentication method is used. SUMMARY OF THE INVENTION [0003] The purpose of the present invention is to overcome the deficiencies of the prior art and provide a method, device, device and medium for bidirectional authentication based on the GDPR specification. [0004] To achieve the above object, the present i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/08H04L67/141
CPCH04L63/083H04L63/0869H04L9/0869H04L67/141
Inventor 晏冬陈忠华卓伟邓拥军
Owner 深圳市同为数码科技股份有限公司