摘要 |
<p>A method for securing transmission data is to be implemented by a security system (10, 20, 30) including first and second security modules (1, 2). The first security module (1) provides a first public key to the second security module (2). The second security module (2) encrypts a second public key and second verification data associated therewith using the first public key, and provides the encrypted second public key and the encrypted second verification data to the first security module (1) . The first security module (1) decrypts the encrypted second public key using a first private key, encrypts first verification data associated therewith using the second public key, and provides the encrypted first verification data to the second security module (2) . The first and second securitymodules (1, 2) verify each other using the encrypted second and first verification data, respectively. The security system (10, 20, 30) allows data transmission through the first and second security modules (1, 2) when verification is successfully completed.</p> |