Unlock instant, AI-driven research and patent intelligence for your innovation.

A data processing method and mobile phone based on negotiated key

A data processing and key technology, which is applied in the field of information security, can solve the problem that mobile terminals cannot safely perform online banking business confidential information transmission, etc.

Active Publication Date: 2017-07-25
TENDYRON CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention aims to solve the problem that mobile phone terminals cannot safely perform online banking and / or transmit confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method and mobile phone based on negotiated key
  • A data processing method and mobile phone based on negotiated key
  • A data processing method and mobile phone based on negotiated key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 It shows the flow chart of the data processing method based on the negotiated key provided by Embodiment 1 of the present invention, see figure 1 , the data processing method based on the negotiated key of the present invention, comprising:

[0042] Step S101, the user identification card sends the first authentication information to the security module of the mobile phone, wherein the first authentication information at least includes: a first random factor and a user identification card certificate;

[0043] Specifically, the user identification card generates a first random factor in advance, and sends the generated random factor together with the certificate issued by the CA to the user identification card to the mobile phone security module. The first random factor is sent to ensure that the information sent each time is different, preventing replay attacks and improving security. The first random factor may be a random number generated by the user ident...

Embodiment 2

[0321] The difference between this embodiment 2 and embodiment 1 is that the authentication process between the mobile phone security module and the user identification card and the key generation process are the opposite processes, so I won't go into details one by one here, only the information provided by this embodiment 2 based on The data processing method for negotiating keys and the mobile phone provided in Embodiment 2 will be briefly described.

[0322] image 3 Show the flow chart of the data processing method based on the negotiated key provided by Embodiment 2 of the present invention, see figure 2 , the data processing method based on the negotiated key according to Embodiment 2 of the present invention, including:

[0323] Step S201, the mobile phone security module sends the first authentication information to the user identification card, wherein the first authentication information includes at least: a first random factor and a mobile phone security module c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a data processing method based on a negotiation key, and a mobile phone, the method comprising: a mobile phone security module verifies the validity of a user identification card certification, legally encrypts at least a first random factor and a second random factor and signs, and sends to the user identification card; the user identification card verifies the validity of the user identification card certification and the signature, correctly decodes to obtain the first random factor and the second random factor, verifies the first random factor, correctly generates a third random factor, generates a negotiation key for the user identification card end, and encrypts the second random factor and the third random factor and sends to the mobile phone security module; the mobile phone security module decodes to generate a negotiation key for the mobile phone security module end; the mobile phone security module and the user identification card conduct secure transmission of information through a negotiation key. Thus, the mobile phone can securely conduct online banking service and / or confidential information transmission.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data processing method based on a negotiated key and a mobile phone. Background technique [0002] With the great convenience brought to people by the rapid development of the network, people rely more and more on the network for various activities, such as the transmission of network files and online banking transactions, which have gradually become an indispensable part of people's life and work. Since the network is a virtual environment after all, there are too many unsafe factors, and in the network environment, data interaction network activities are bound to be carried out, especially network activities such as online banking and confidential information transmission. Therefore, people began to vigorously develop network information security technology. [0003] However, with the rapid development of mobile phone technology, mobile terminals are increasingl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06G06Q20/32
CPCH04L9/0869H04L9/3228H04L9/3263H04L63/0823H04L63/0853H04L2209/127H04L2209/80H04W12/069
Inventor 李东声
Owner TENDYRON CORP