Check patentability & draft patents in minutes with Patsnap Eureka AI!

A data processing method based on negotiated key

A data processing and key technology, applied in the field of information security, can solve the problem that mobile terminals cannot safely perform online banking business confidential information transmission, etc.

Active Publication Date: 2017-04-19
TENDYRON CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention aims to solve the problem that mobile phone terminals cannot safely perform online banking and / or transmit confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method based on negotiated key
  • A data processing method based on negotiated key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] figure 1 It shows the flow chart of the data processing method based on the negotiated key provided by Embodiment 1 of the present invention, see figure 1 , the data processing method based on the negotiated key of the present invention, comprising:

[0091] Step S101, the mobile phone security module obtains the identification information of the user identification card;

[0092] Specifically, the identification information of the user identification card is unique identification information, including but not limited to: serial number of the user identification card, user number, MAC address, etc. The identification information of the user identification card may be pre-stored by the mobile phone security module, or may be sent to the mobile phone security module by the user identification card.

[0093] The security module of the mobile phone obtains the identification information of the user identification card, and can use the unique identification information to...

Embodiment 2

[0275] The difference between this embodiment 2 and embodiment 1 is that the authentication process between the mobile phone security module and the user identification card and the key generation process are the opposite processes, so I won't go into details one by one here, only the information provided by this embodiment 2 based on The data processing method of the negotiated key will be briefly described.

[0276] figure 2 Show the flow chart of the data processing method based on the negotiated key provided by Embodiment 2 of the present invention, see figure 2 , the data processing method based on the negotiated key according to Embodiment 2 of the present invention, comprising:

[0277] Step S201, the user identification card obtains the identification information of the security module of the mobile phone;

[0278] Step S202, after the user identification card obtains the identification information of the security module of the mobile phone, calculate the first enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data processing method based on negotiation secret keys. The data processing method includes the steps that a first secret key is obtained through calculation according to a first secret key calculation algorithm of a mobile phone safety module and identification information of a user identification card, a first random factor is encrypted according to the first secret key, first cryptograph information is sent to the user identification card, and the user identification card is decrypted to obtain the first random factor; the mobile phone safety module identification information is obtained, a second secret key is obtained through calculation according to a second secret key calculation algorithm and identification information of the mobile phone safety module, the negotiation secret key on the user identification card side is generated, a second random factor is encrypted according to the second secret key, second cryptograph information is sent to the mobile phone safety module and decrypted through the mobile phone safety module to obtain the second random factor, the negotiation secret key on the mobile phone safety module side is generated, and information is safely transmitted between the user identification card side and the mobile phone safety module side through the negotiation secret keys. Through the data processing method based on the negotiation secret keys, a mobile can safely execute Internet-based banking services or confidential information transmission.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data processing method based on a negotiated key. Background technique [0002] With the great convenience brought to people by the rapid development of the network, people rely more and more on the network for various activities, such as the transmission of network files and online banking transactions, which have gradually become an indispensable part of people's life and work. Since the network is a virtual environment after all, there are too many unsafe factors, and in the network environment, data interaction network activities are bound to be carried out, especially network activities such as online banking and confidential information transmission. Therefore, people began to vigorously develop network information security technology. [0003] However, with the rapid development of mobile phone technology, mobile terminals are increasingly used to replace c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04
Inventor 李东声
Owner TENDYRON CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More