A data processing method based on negotiated key
A data processing and key technology, applied in the field of information security, can solve the problem that mobile terminals cannot safely perform online banking business confidential information transmission, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0090] figure 1 It shows the flow chart of the data processing method based on the negotiated key provided by Embodiment 1 of the present invention, see figure 1 , the data processing method based on the negotiated key of the present invention, comprising:
[0091] Step S101, the mobile phone security module obtains the identification information of the user identification card;
[0092] Specifically, the identification information of the user identification card is unique identification information, including but not limited to: serial number of the user identification card, user number, MAC address, etc. The identification information of the user identification card may be pre-stored by the mobile phone security module, or may be sent to the mobile phone security module by the user identification card.
[0093] The security module of the mobile phone obtains the identification information of the user identification card, and can use the unique identification information to...
Embodiment 2
[0275] The difference between this embodiment 2 and embodiment 1 is that the authentication process between the mobile phone security module and the user identification card and the key generation process are the opposite processes, so I won't go into details one by one here, only the information provided by this embodiment 2 based on The data processing method of the negotiated key will be briefly described.
[0276] figure 2 Show the flow chart of the data processing method based on the negotiated key provided by Embodiment 2 of the present invention, see figure 2 , the data processing method based on the negotiated key according to Embodiment 2 of the present invention, comprising:
[0277] Step S201, the user identification card obtains the identification information of the security module of the mobile phone;
[0278] Step S202, after the user identification card obtains the identification information of the security module of the mobile phone, calculate the first enc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


