Introduction - If you have any usage issues, please Google them yourself
This paper introduces the ECC algorithm and authentication-related justifications for an ECC-based identity authentication system algorithm programs, its application in Intranet Intranet, and the use of mixed-code system and the hardware and software and working to provide high-speed, secure and reliable identity Certification Services