Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure interaction system and communication display device

A display device, mobile computing device technology, applied in the direction of safety communication device, safety device, transmission system, etc., can solve the problem of not being able to identify more than one person, and achieve the effect of safe interaction

Pending Publication Date: 2021-01-12
SOFT HAPTIC TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, there can only be one authenticated person
In other words, current devices can only be personal devices because the mechanism cannot identify more than one person
This limits the application of the device to a wider range of scenarios, such as multiple users operating a device together

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure interaction system and communication display device
  • Secure interaction system and communication display device
  • Secure interaction system and communication display device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] Example 1 - Electronic person registration

[0079] During the registration process, the cyborg will create an account on the server or screen device 3 and "remember" (store in WD2) information for future logins (login information). The crucial step is to "remember" the login information. There are several ways to configure and store login information on WD 2. The user can set the information as currently and then save all the information to WD2 in the final step, that is, when the user clicks on the "Create Account" DEGE to save all the information. We only focus on the information needed for those subsequent user logins, namely username and password. Other information including addresses etc. also apply the same treatment. All user actions, except the last one, are traditional UDI or in-device transfers via ARC. Since UD is only used as a screen device, we can use the position of GE to represent DEGE (encode DEGE as position), just like the current UDI mechanism. ...

Embodiment 2

[0085] Example 2 - Electronic person login

[0086] In the login phase, when the user decides to log into the registered account, the screen device 3 can extract data from the WD based on a similar process. Such as Figure 9 As shown, you can create a "login" DEGE on the screen, use the command "GET(Bob,Alice,USERNAME,PASSWORD)" as UD, and retrieve the stored records from WD. When the user selects this DEGE, WD 2 will receive the UD, search for the record (Alice,USERNAME,X,PASSWORD,Y) in its memory, and output the record.

[0087] These embodiments can be applied to the account that the electronic person registers and logs in on a server connected with the screen device 3 . By substituting the server name ServN for the name Alice 31 of the screen device 3 in the command, the WD 2 will remember the login information for the account on the server. This is through the same conversation mode as the screen device 3 to store and obtain data. In these sign-on and log-in embodimen...

Embodiment 3

[0090] Example 3 - Label Authentication

[0091] No need for username / password to authenticate cyborg. A long character string (tag) can be used as proof of identity for authentication and increased protection. Rather than using individual usernames and passwords, the screen device / server can use a single identifier string (tag) as proof of identity to identify the account owner and require the cyborg to provide a tag for authentication. Tags are temporary (because they can be changed frequently as mentioned above) and localized (only specific screen devices / servers can recognize them). The volume label can be regarded as a chain of user name and password, because the cyborg can use the LR character string as the user name and after combining the password, it is equivalent to a longer LR character string. Therefore, the tag can be used to authenticate the electronic person to access the account, that is, as a way to log in to the account. The process of tag authentication i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a secure interaction system and a communication display device. The system includes a communication display device with a communication display device identifier, and a mobile computing device with a mobile computing device identifier. The mobile computing device includes a first transceiver. The communication display device includes an ARC module which including a display matrix and a second receiver. At least one portion of the display matrix is configured to wirelessly transmit an invisible string and to form a user-visible indication which the invisible string isrelevant to. When the user-visible indication is selected, a channel is formed to connect the portion of the display matrix forming the user-visible indication, the first transceiver and the second receiver. The invisible string is coupled wirelessly to the first transceiver and the second receiver from the portion of the display matrix forming the user-visible indication, and the mobile computingdevice executes a task according to the invisible string.

Description

technical field [0001] The invention relates to a safety interactive system and a communication display device. Background technique [0002] The current mechanism of user-device interaction (hereinafter referred to as UDI) treats the user as an independent individual to receive and provide information to the electronic device for interaction. There are two main information paths in this UDI: images, from device to user; and actions, from user to device. From the device point of view, these also present components, displays, and user inputs that convert data into optical images and motion into data ( figure 1 ). [0003] This mechanism virtually limits the information to the information that the applicable party can provide. The user must remember the information and provide it by means of multiple actions, i.e. character by character. In cryptographic applications, for example, it is well known that cryptographic size and randomness affect the effectiveness of protectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/01G06F9/451
CPCG06F3/011G06F9/451H04B1/385H04W12/37H04W12/04H04W12/03H04L63/068H04W12/06H04L9/3247G06F21/35G06F21/46G06F3/04842G06F3/0488H04L63/0876H04L9/3236H04L9/0825H04L67/04H04L63/0428H04L9/3263H04W12/50H04W12/033
Inventor 蔡熊光
Owner SOFT HAPTIC TECH