In some examples, when the first device desires to share the SIM card information of the second device, share authentication for the SIM card information must be performed first. For example, the first device may establish a share authentication negotiation with the second device in advance, and after the negotiation, both the first device and the second device can store the authentication information about the share authentication. When the first device requests the second device for the SIM card information of the second device, the authentication information about the share authentication may be carried. After receiving the share request information of the SIM card information, the second device authenticates the authentication information about the share authentication first. If the authentication is passed, the SIM card information of the second device will be shared with the first device, so as to ensure the security of the SIM card information of the second device.
In some examples, the authentication information about the share authentication may include at least one of the following: