Unlock instant, AI-driven research and patent intelligence for your innovation.

Key data writing method, device and system, electronic equipment and storage medium

A technology of key data and electronic equipment, applied in the field of communication, can solve the problems of insufficient security, no authentication of the legality of the mobile terminal, no authentication of the legality of the security device, etc.

Pending Publication Date: 2020-05-01
爱讯智联科技(北京)有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The security device for sending key data does not authenticate the legitimacy of the mobile terminal, and the security is insufficient;
[0007] (2) The mobile terminal does not have the legitimacy of the authentication security device, and the security is also insufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key data writing method, device and system, electronic equipment and storage medium
  • Key data writing method, device and system, electronic equipment and storage medium
  • Key data writing method, device and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0047] Such as figure 2 As shown, it is a method for writing key data to a virtual subscriber identity card SIM according to the present invention, including:

[0048] Step 11, performing mutual authentication between the mobile terminal and the security device;

[0049] Wherein, step 11 specifically includes:

[0050]The mobile terminal receives the first security factor R1 sent by the security device; the mobile terminal encrypts the first security factor R1 to calculate the first authentication data D1; simultaneously generates a second security factor R2, and sending the first authentication data D1 and the second security factor R2 to a security device, so that the security device performs decryption operation on the first authentication data D1 to obtain a third security factor R1', and compares the The first security factor R1 and the third ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a key data writing method, device and system, electronic equipment and a storage medium, relates to the field of communication, and can improve the safety ofwriting the key data into a mobile terminal by safety equipment. The method for writing the key data into the virtual subscriber identity module SIM comprises the following steps: performing bidirectional authentication between a mobile terminal and a safety device; and when the bidirectional authentication between the mobile terminal and the security device is passed, allowing the security deviceto write IMEI and SIM key data into the mobile terminal.

Description

technical field [0001] The invention relates to the communication field, in particular to a method, device, system, electronic equipment and storage medium for writing key data into a virtual subscriber identity card SIM. Background technique [0002] A SIM card (Subscriber Identity Module, Subscriber Identity Module) is also called a Subscriber Identity Module. Users must use a SIM card to access the operator's mobile cellular network. With the development of technology, the form of SIM (International Mobile Equipment Identity number) card has gradually changed, and eSIM, which is designed together with the terminal circuit, appears, that is, a chip is used to replace the original SIM card. Cards and card slots. Later, SOFTSIM appeared, also called virtual SIM card, soft SIM card, that is to say, the functions of the SIM card are completely simulated and realized through the program, which does not require chips, cards and card slots, so as to simplify the terminal hardwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/02G06F21/44H04W12/37H04W12/42
CPCH04W12/02G06F21/445H04W12/30H04W12/40H04W12/03
Inventor 刘宏伟薛慧霞计进波
Owner 爱讯智联科技(北京)有限公司