Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing, identity authentication method and system and terminal

A data processing system and terminal technology, applied in the field of authentication, can solve the problem of inability to take into account cost and high security, and achieve the effect of solving cost and high security, ensuring security, and enhancing security

Active Publication Date: 2019-03-26
ALIBABA GRP HLDG LTD
View PDF13 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a data processing and identity authentication method, system, and terminal, so as to at least solve the technical problem that the security authentication scheme in the related art cannot take into account the requirements of cost and high security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing, identity authentication method and system and terminal
  • Data processing, identity authentication method and system and terminal
  • Data processing, identity authentication method and system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] In the related technology, when storing the key, it is often stored through a security carrier or using an MCU. However, the external security carrier needs to change the design of the device, which will increase the cost. The key is stored in the MCU and is easy to be cracked. The storage environment is not safe.

[0044] In order to meet the manufacturer's demand for low-cost, easy-to-deploy, and high-security key services, the embodiment of this application combines the key with the SIM card, and securely prefabricates the key on the SIM card production line whose security standard meets EAL4+, and realizes The secure storage of the non-tamperable key on the device side. At the same time, the management server securely stores keys on the cloud platform and provides online key usage services for devices.

[0045] In order to achieve the above purpose, an embodiment of the present application provides a data processing system, such as figure 1 As shown, the system in...

Embodiment 2

[0089] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Image 6 A block diagram of a hardware structure of a computer terminal (or mobile device) for realizing the data processing method is shown. Such as Image 6 As shown, the computer terminal 60 may include one or more (602a, 602b, ..., 602n are used to show in the figure) processors 602 (the processors 602 may include but not limited to microprocessor MCU or programmable logic device FPGA etc.), a memory 604 for storing data, and a transmission module 606 for communication functions. In addition, it can also include: a display, an input / output interface (I / O interface), a universal serial bus (USB) port (which can be included as one of the ports of the I / O interface), a network interface, a power supply and / or camera. Those of ordinary skill in the art can understand that, Image 6 The shown structure is ...

Embodiment 3

[0109] Based on the above-mentioned system or terminal, according to the embodiment of this application, an embodiment of an identity authentication method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer such as a set of computer-executable instructions. system, and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0110] The embodiment of the present application provides a data processing method, such as Figure 8 As shown, the method includes:

[0111] Step S802, the terminal generates authentication information according to the first key in the SIM card.

[0112] Optionally, the first key is a random value generated by the management server and delivered to the terminal.

[0113] It should be noted that the above authentication information may be: authenticatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a data processing, an identity authentication method and system and terminal. The data processing method comprising the following steps of: obtaining a authentication ciphertext by the terminal , wherein the authentication ciphertext is a ciphertext generated based on the first key stored in the SIM card in the terminal; applying to the service server to update sensitivedata by the terminal and sending the authentication ciphertext to the management server via the service server; receiving the encrypted data sent by the management server via the service server by theterminal, wherein the encrypted data is obtained by encrypting sensitive data provided by the service server by using the second key corresponding to the first key by the management server; decrypting the encrypted data using the first key stored in the SIM card and storing the decrypted sensitive data by the terminal.

Description

technical field [0001] This application relates to the field of authentication, in particular, to a method and system for data processing and identity authentication, and a terminal. Background technique [0002] The traditional method of Internet of Things (Internet of Things, IoT) device security is to store keys by plugging in a security carrier or directly using a micro control unit (Miro Controller Unit, referred to as MCU). However, the external security carrier requires the manufacturer to change the hardware design and increase the cost; the key is directly stored in the MCU, which lacks the protection of a secure storage environment and is easily stolen by attackers. [0003] Moreover, if complex network security protocols or private lines of operators are used to solve security problems, it will bring certain challenges to product cost and deployment. [0004] For the above problems, no effective solution has been proposed yet. Contents of the invention [0005...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/02H04W8/18H04W12/033H04W12/40
CPCH04W8/183H04W12/02H04W12/06H04L9/08H04W8/18
Inventor 杨涛姜金龙董侃
Owner ALIBABA GRP HLDG LTD