Data processing, identity authentication method and system and terminal
A data processing system and terminal technology, applied in the field of authentication, can solve the problem of inability to take into account cost and high security, and achieve the effect of solving cost and high security, ensuring security, and enhancing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] In the related technology, when storing the key, it is often stored through a security carrier or using an MCU. However, the external security carrier needs to change the design of the device, which will increase the cost. The key is stored in the MCU and is easy to be cracked. The storage environment is not safe.
[0044] In order to meet the manufacturer's demand for low-cost, easy-to-deploy, and high-security key services, the embodiment of this application combines the key with the SIM card, and securely prefabricates the key on the SIM card production line whose security standard meets EAL4+, and realizes The secure storage of the non-tamperable key on the device side. At the same time, the management server securely stores keys on the cloud platform and provides online key usage services for devices.
[0045] In order to achieve the above purpose, an embodiment of the present application provides a data processing system, such as figure 1 As shown, the system in...
Embodiment 2
[0089] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Image 6 A block diagram of a hardware structure of a computer terminal (or mobile device) for realizing the data processing method is shown. Such as Image 6 As shown, the computer terminal 60 may include one or more (602a, 602b, ..., 602n are used to show in the figure) processors 602 (the processors 602 may include but not limited to microprocessor MCU or programmable logic device FPGA etc.), a memory 604 for storing data, and a transmission module 606 for communication functions. In addition, it can also include: a display, an input / output interface (I / O interface), a universal serial bus (USB) port (which can be included as one of the ports of the I / O interface), a network interface, a power supply and / or camera. Those of ordinary skill in the art can understand that, Image 6 The shown structure is ...
Embodiment 3
[0109] Based on the above-mentioned system or terminal, according to the embodiment of this application, an embodiment of an identity authentication method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer such as a set of computer-executable instructions. system, and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0110] The embodiment of the present application provides a data processing method, such as Figure 8 As shown, the method includes:
[0111] Step S802, the terminal generates authentication information according to the first key in the SIM card.
[0112] Optionally, the first key is a random value generated by the management server and delivered to the terminal.
[0113] It should be noted that the above authentication information may be: authenticatio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


