A Data Processing Method Based on Negotiated Key
A data processing and key technology, which is applied in the field of information security, can solve the problem that mobile terminals cannot safely perform online banking business confidential information transmission, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0091] figure 1 It shows the flow chart of the data processing method based on the negotiated key provided by Embodiment 1 of the present invention, see figure 1 , the data processing method based on the negotiated key of the present invention, comprising:
[0092] Step S101, the mobile phone security module obtains the first random factor;
[0093] Specifically, the first random factor can be directly generated by the security module of the mobile phone, or the first random factor can be obtained by generating the user identity card and sending it to the security module of the mobile phone. The first random factor may be one or a string of random numbers, or may be one or a string of random characters, or any combination of a string of random numbers and a random combination.
[0094] The first random factor is acquired so that the first random factor can be used subsequently to generate a negotiation key.
[0095] Step S102, after obtaining the first random factor, the se...
Embodiment 2
[0293] The difference between this embodiment 2 and embodiment 1 is that the authentication process between the mobile phone security module and the user identification card and the key generation process are the opposite processes, so I won't go into details one by one here, only the information provided by this embodiment 2 based on The data processing method of the negotiated key will be briefly described.
[0294] figure 2 Show the flow chart of the data processing method based on the negotiated key provided by Embodiment 2 of the present invention, see figure 2 , the data processing method based on the negotiated key according to Embodiment 2 of the present invention, comprising:
[0295] Step S201, the user identification card acquires a first random factor;
[0296] Step S202, after obtaining the first random factor, the user identification card performs verification calculation on the first random factor according to the preset first key, and obtains first random f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

