A Data Processing Method Based on Negotiated Key
A data processing and key technology, which is applied in the field of information security and can solve the problem that mobile phone terminals cannot safely perform the transmission of confidential information of online banking business.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0105] figure 1 It shows the flow chart of the data processing method based on the negotiated key provided by Embodiment 1 of the present invention, see figure 1 , the data processing method based on the negotiated key of the present invention, comprising:
[0106] Step S101, the user identification card sends the first authentication information to the security module of the mobile phone, wherein the first authentication information includes at least: a first random factor and the user identification card certificate;
[0107] Specifically, the user identification card generates a first random factor in advance, and sends the generated random factor together with the certificate issued by the CA to the user identification card to the mobile phone security module. The first random factor is sent to ensure that the information sent each time is different, preventing replay attacks and improving security. The first random factor may be one or a string of random numbers generated...
Embodiment 2
[0285] The difference between this embodiment 2 and embodiment 1 is that the authentication process between the mobile phone security module and the user identification card and the key generation process are the opposite processes, so I won't go into details one by one here, only the information provided by this embodiment 2 based on The data processing method of the negotiated key will be briefly described.
[0286] figure 2 Show the flow chart of the data processing method based on the negotiated key provided by Embodiment 2 of the present invention, see figure 2 , the data processing method based on the negotiated key according to Embodiment 2 of the present invention, comprising:
[0287] Step S201, the mobile phone security module sends the first authentication information to the user identification card, wherein the first authentication information includes at least: a first random factor and a mobile phone security module certificate;
[0288] Step S202, after rece...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

