Unlock instant, AI-driven research and patent intelligence for your innovation.

A Data Processing Method Based on Negotiated Key

A data processing and key technology, which is applied in the field of information security and can solve the problem that mobile phone terminals cannot safely perform the transmission of confidential information of online banking business.

Active Publication Date: 2017-12-19
TENDYRON CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention aims to solve the problem that mobile phone terminals cannot safely perform online banking and / or transmit confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Data Processing Method Based on Negotiated Key
  • A Data Processing Method Based on Negotiated Key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0105] figure 1 It shows the flow chart of the data processing method based on the negotiated key provided by Embodiment 1 of the present invention, see figure 1 , the data processing method based on the negotiated key of the present invention, comprising:

[0106] Step S101, the user identification card sends the first authentication information to the security module of the mobile phone, wherein the first authentication information includes at least: a first random factor and the user identification card certificate;

[0107] Specifically, the user identification card generates a first random factor in advance, and sends the generated random factor together with the certificate issued by the CA to the user identification card to the mobile phone security module. The first random factor is sent to ensure that the information sent each time is different, preventing replay attacks and improving security. The first random factor may be one or a string of random numbers generated...

Embodiment 2

[0285] The difference between this embodiment 2 and embodiment 1 is that the authentication process between the mobile phone security module and the user identification card and the key generation process are the opposite processes, so I won't go into details one by one here, only the information provided by this embodiment 2 based on The data processing method of the negotiated key will be briefly described.

[0286] figure 2 Show the flow chart of the data processing method based on the negotiated key provided by Embodiment 2 of the present invention, see figure 2 , the data processing method based on the negotiated key according to Embodiment 2 of the present invention, comprising:

[0287] Step S201, the mobile phone security module sends the first authentication information to the user identification card, wherein the first authentication information includes at least: a first random factor and a mobile phone security module certificate;

[0288] Step S202, after rece...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data processing method based on a negotiated key, comprising: the mobile phone security module verifies that the certificate of the user identification card is legal, generates a second random factor, and generates a negotiated key at the mobile phone security module side; The random factor and the second random factor are encrypted, the first ciphertext information is signed, and the second authentication information is sent to the user identification card. The user identification card verifies that the mobile phone security module certificate is legal, verifies that the first signature information is correct, and decrypts Obtain the first random factor and the second random factor, verify that the first random factor is correct, and generate a negotiation key at the user identification card side according to the first random factor and the second random factor; the two perform secure transmission of information through the negotiated key. Thereby, the mobile phone can be enabled to securely perform online banking and / or transfer of confidential information.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data processing method based on a negotiated key. Background technique [0002] With the great convenience brought to people by the rapid development of the network, people rely more and more on the network for various activities, such as the transmission of network files and online banking transactions, which have gradually become an indispensable part of people's life and work. Since the network is a virtual environment after all, there are too many unsafe factors, and in the network environment, data interaction network activities are bound to be carried out, especially network activities such as online banking and confidential information transmission. Therefore, people began to vigorously develop network information security technology. [0003] However, with the rapid development of mobile phone technology, mobile terminals are increasingly used to replace c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32
Inventor 李东声
Owner TENDYRON CORP