A Data Processing Method Based on Negotiated Key
A data processing and key technology, applied in the field of information security, can solve the problem that mobile terminals cannot safely perform online banking business confidential information transmission, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0086] figure 1 Shows the flow chart of the data processing method based on negotiated key provided by Embodiment 1 of the present invention, see figure 1 , The data processing method based on negotiated key of the present invention includes:
[0087] Step S101, the mobile phone security module obtains the identification information of the user identification card;
[0088] Specifically, the identification information of the user identification card is unique identification information, including but not limited to: the user identification card serial number, user number, MAC address, etc. The identification information of the user identification card may be pre-stored by the mobile phone security module, or may be sent by the user identification card to the mobile phone security module.
[0089] The mobile phone security module obtains the identification information of the user identification card, and can use the unique identification information to generate the key.
[0090] Step S...
Embodiment 2
[0264] The difference between this embodiment 2 and embodiment 1 is that the authentication process and the key generation process between the mobile phone security module and the user identification card are the opposite processes, which will not be repeated here. The data processing method of the negotiated key is briefly explained.
[0265] figure 2 Show the flowchart of the data processing method based on the negotiated key provided by the second embodiment of the present invention, see figure 2 , The data processing method based on the negotiated key in the second embodiment of the present invention includes:
[0266] Step S201, the user identification card obtains the identification information of the mobile phone security module;
[0267] Step S202: After obtaining the identification information of the mobile phone security module, the user identification card calculates the public key of the mobile phone security module according to the preset first public key calculation...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

