Data processing method and device, security system and electronic equipment
A data processing and data technology, applied in the field of data security, can solve the problems of difficult to detect data theft and low security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0033] In view of the defects existing in the existing data security methods, the embodiment of the present application provides a security system, which builds a security system based on the dual data sources of the keystroke data generated by the user's keyboard stroke and the user input data generated by normal business access. A security system based on keystroke data that cannot be forged. It is very difficult for an attacker to simulate the operation mechanism of dual data sources. For example, to generate keystroke data, physical keystroke behavior is required, which makes remote operation impossible and greatly improves the security of the entire system. like figure 1 As shown, the security system includes a first server, a second server and a user terminal. It should be noted that, in an implementation manner, the security system may not include a user terminal, but only include the first server and the second server. The user terminal communicates with the first se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


