Secure interaction system and communication display device
A display device, mobile computing device technology, applied in the direction of safety communication device, safety device, transmission system, etc., can solve the problem of not being able to identify more than one person, and achieve the effect of safe interaction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0078] Example 1 - Electronic person registration
[0079] During the registration process, the cyborg will create an account on the server or screen device 3 and "remember" (store in WD2) information for future logins (login information). The crucial step is to "remember" the login information. There are several ways to configure and store login information on WD 2. The user can set the information as currently and then save all the information to WD2 in the final step, that is, when the user clicks on the "Create Account" DEGE to save all the information. We only focus on the information needed for those subsequent user logins, namely username and password. Other information including addresses etc. also apply the same treatment. All user actions, except the last one, are traditional UDI or in-device transfers via ARC. Since UD is only used as a screen device, we can use the position of GE to represent DEGE (encode DEGE as position), just like the current UDI mechanism. ...
Embodiment 2
[0085] Example 2 - Electronic person login
[0086] In the login phase, when the user decides to log into the registered account, the screen device 3 can extract data from the WD based on a similar process. Such as Figure 9 As shown, you can create a "login" DEGE on the screen, use the command "GET(Bob,Alice,USERNAME,PASSWORD)" as UD, and retrieve the stored records from WD. When the user selects this DEGE, WD 2 will receive the UD, search for the record (Alice,USERNAME,X,PASSWORD,Y) in its memory, and output the record.
[0087] These embodiments can be applied to the account that the electronic person registers and logs in on a server connected with the screen device 3 . By substituting the server name ServN for the name Alice 31 of the screen device 3 in the command, the WD 2 will remember the login information for the account on the server. This is through the same conversation mode as the screen device 3 to store and obtain data. In these sign-on and log-in embodimen...
Embodiment 3
[0090] Example 3 - Label Authentication
[0091] No need for username / password to authenticate cyborg. A long character string (tag) can be used as proof of identity for authentication and increased protection. Rather than using individual usernames and passwords, the screen device / server can use a single identifier string (tag) as proof of identity to identify the account owner and require the cyborg to provide a tag for authentication. Tags are temporary (because they can be changed frequently as mentioned above) and localized (only specific screen devices / servers can recognize them). The volume label can be regarded as a chain of user name and password, because the cyborg can use the LR character string as the user name and after combining the password, it is equivalent to a longer LR character string. Therefore, the tag can be used to authenticate the electronic person to access the account, that is, as a way to log in to the account. The process of tag authentication i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


