Two-way-security-authentication-based data downloading method and system
A two-way security authentication and data download technology, applied in the field of information security, can solve the problems of imperfect security authentication mechanism and data security download mechanism, and achieve the effect of protecting security and integrity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.
[0025] figure 1 It is a schematic structural diagram of a data download system based on two-way security authentication according to an embodiment of the present invention. Such as figure 1 As shown, the data download system based on two-way security authentication includes: a first terminal, which sends a data download request; a second terminal, which receives a data download request, and after verifying that the first terminal and the second terminal are legal terminals, will pass The data encrypted and processed by the digital signature algorithm is downloaded to the first terminal; wherein, the first terminal verifies the second terminal through the symmetric key algorithm to obtain the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com