Unlock instant, AI-driven research and patent intelligence for your innovation.

A Data Processing Method Based on Negotiated Key

A data processing and key technology, applied in the field of information security, can solve the problem that mobile terminals cannot safely perform online banking business confidential information transmission, etc.

Active Publication Date: 2017-09-19
TENDYRON CORP
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention aims to solve the problem that mobile phone terminals cannot safely perform online banking and / or transmit confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Data Processing Method Based on Negotiated Key
  • A Data Processing Method Based on Negotiated Key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] figure 1 Shows the flow chart of the data processing method based on negotiated key provided by Embodiment 1 of the present invention, see figure 1 , The data processing method based on negotiated key of the present invention includes:

[0087] Step S101, the mobile phone security module obtains the identification information of the user identification card;

[0088] Specifically, the identification information of the user identification card is unique identification information, including but not limited to: the user identification card serial number, user number, MAC address, etc. The identification information of the user identification card may be pre-stored by the mobile phone security module, or may be sent by the user identification card to the mobile phone security module.

[0089] The mobile phone security module obtains the identification information of the user identification card, and can use the unique identification information to generate the key.

[0090] Step S...

Embodiment 2

[0264] The difference between this embodiment 2 and embodiment 1 is that the authentication process and the key generation process between the mobile phone security module and the user identification card are the opposite processes, which will not be repeated here. The data processing method of the negotiated key is briefly explained.

[0265] figure 2 Show the flowchart of the data processing method based on the negotiated key provided by the second embodiment of the present invention, see figure 2 , The data processing method based on the negotiated key in the second embodiment of the present invention includes:

[0266] Step S201, the user identification card obtains the identification information of the mobile phone security module;

[0267] Step S202: After obtaining the identification information of the mobile phone security module, the user identification card calculates the public key of the mobile phone security module according to the preset first public key calculation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a data processing method based on a negotiation key, comprising: a mobile phone security module obtains identification information of a user identification card, calculates a public key of the user identification card and obtains a first random factor, and according to the first random factor, generates a negotiation key for the mobile phone security module end, conducts encryption calculation on the first random factor, and sends to the user identification card after signing; the user identification card obtains identification information of the mobile phone security module, and calculates to obtain a public key of the mobile phone security module, checks first signature information, decrypts first cipher text information, and obtains a first random factor, and according to the first random factor, generates a negotiation key for the user identification card end; and the mobile phone security module and user identification card securely transmit information therebetween via the negotiation key of the mobile phone security module end and the negotiation key of the user identification card end . The present invention enables the mobile phone to perform Internet banking service and / or confidential information transmission.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to a data processing method based on a negotiated key. Background technique [0002] With the great convenience brought to people by the rapid development of the Internet, people increasingly rely on the Internet for various activities, such as the transmission of Internet files and Internet banking transactions, which have gradually become an indispensable part of people's lives and work. Since the network is a virtual environment after all, there are too many insecure factors. In the network environment, network activities such as data exchange will inevitably occur, especially network activities such as online banking and the transmission of confidential information. The security put forward very high requirements, so people began to vigorously develop network information security technology. [0003] However, with the rapid development of today's mobile phone technology, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32G06Q20/32
CPCH04L9/08
Inventor 李东声
Owner TENDYRON CORP