Method and system for authorizing acquisition of attack alarm information log of terminal
摘要:
A method and a system for authorizing acquisition of an attack alarm information log of a terminal, belonging to the field of communication technology, the method includes: after obtaining the authentication account with an authority to obtain the attack alarm information log, a server authenticates the legality of a client tool; after the legality passes the authentication, the terminal sends a second to-be-authenticated data to the client tool, and the client tool sends the second to-be-authenticated data to the server; after the second to-be-authenticated data passes the authentication, the server encrypts the second to-be-authenticated data to generate a second authentication data, and sends the second authentication data to the terminal; if the second authentication data passes the authentication, the terminal obtains and encrypts the attack alarm information log, and then sends it to the client tool after encryption.
信息查询
0/0