Unlock instant, AI-driven research and patent intelligence for your innovation.

A Data Processing Method Based on Negotiated Key

A data processing and key technology, which is applied in the field of information security, can solve the problem that mobile terminals cannot safely perform online banking business confidential information transmission, etc.

Active Publication Date: 2018-02-16
TENDYRON CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention aims to solve the problem that mobile phone terminals cannot safely perform online banking and / or transmit confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Data Processing Method Based on Negotiated Key
  • A Data Processing Method Based on Negotiated Key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] figure 1 It shows the flow chart of the data processing method based on the negotiated key provided by Embodiment 1 of the present invention, see figure 1 , the data processing method based on the negotiated key of the present invention, comprising:

[0092] Step S101, the mobile phone security module obtains the first random factor;

[0093] Specifically, the first random factor can be directly generated by the security module of the mobile phone, or the first random factor can be obtained by generating the user identity card and sending it to the security module of the mobile phone. The first random factor may be one or a string of random numbers, or may be one or a string of random characters, or any combination of a string of random numbers and a random combination.

[0094] The first random factor is acquired so that the first random factor can be used subsequently to generate a negotiation key.

[0095] Step S102, after obtaining the first random factor, the se...

Embodiment 2

[0293] The difference between this embodiment 2 and embodiment 1 is that the authentication process between the mobile phone security module and the user identification card and the key generation process are the opposite processes, so I won't go into details one by one here, only the information provided by this embodiment 2 based on The data processing method of the negotiated key will be briefly described.

[0294] figure 2 Show the flow chart of the data processing method based on the negotiated key provided by Embodiment 2 of the present invention, see figure 2 , the data processing method based on the negotiated key according to Embodiment 2 of the present invention, comprising:

[0295] Step S201, the user identification card acquires a first random factor;

[0296] Step S202, after obtaining the first random factor, the user identification card performs verification calculation on the first random factor according to the preset first key, and obtains first random f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a negotiation key based data processing method, comprising: a mobile phone security module obtains a first random factor, and sends check information of the first random factor to a subscriber identity module; the subscriber identity module verifies whether the check information of the first random factor is the same as the first check verification information, if yes, then obtaining a second random factor, generating a negotiation key of the subscriber identity module end, and sending check information of the second random factor to the mobile phone security module; the mobile phone security module verifies whether the check information of the second random factor is the same as the second check verification information, if yes, then generating a negotiation key of the mobile phone security module end, and conducting secure transmission of information according to the negotiation key. The negotiation key based data processing method enables a mobile phone to securely conduct online banking service and / or confidential information transmission.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data processing method based on a negotiated key. Background technique [0002] With the great convenience brought to people by the rapid development of the network, people rely more and more on the network for various activities, such as the transmission of network files and online banking transactions, which have gradually become an indispensable part of people's life and work. Since the network is a virtual environment after all, there are too many unsafe factors, and in the network environment, data interaction network activities are bound to be carried out, especially network activities such as online banking and confidential information transmission. Therefore, people began to vigorously develop network information security technology. [0003] However, with the rapid development of mobile phone technology, mobile terminals are increasingly used to replace c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/0838H04L63/06H04L2209/56H04L2209/80
Inventor 李东声
Owner TENDYRON CORP