Data communication method and system based on secondary authentication of adjacent nodes
A secondary authentication and adjacent node technology, applied in the field of communication security, can solve the problems of not being able to guarantee the security of data transmission and single authentication method
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The embodiments of the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that, the specific embodiments described herein are only used to explain the embodiments of the present invention, but are not intended to limit the embodiments of the present invention. In addition, it should be noted that, for the convenience of description, the drawings only show some but not all structures related to the embodiments of the present invention.
[0044] figure 1 A flowchart of a data communication method based on secondary authentication of adjacent nodes provided by an embodiment of the present invention, an embodiment of the present application specifically includes the following steps:
[0045] Step S101: During the data transmission process between the terminal device and the server, if the terminal device determines that the transmission data is secondary authentication data, it se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


