Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security interaction system and method, electronic equipment and storage medium

An interactive system and interactive method technology, applied in the field of electronic equipment, storage media, and secure interactive systems, can solve the problems that users cannot change and participate freely, and the amount of information is limited, so as to achieve the effect of unlimited interaction time and information.

Pending Publication Date: 2022-05-24
浙江智贝信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Even security authentication modes such as authentication codes and one-time tokens are only passive for users, the information is fixed and the amount of information is limited, and users cannot change and freely participate in it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security interaction system and method, electronic equipment and storage medium
  • Security interaction system and method, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Please refer to figure 1 As shown, the first embodiment of the security interaction method of the present invention, taking the human-computer security interaction system of the telephone as an example, includes the following steps:

[0067] Step 11. After the user or administrator starts the first component at the same time or successively and logs in, picks up the phone of the fourth component and dials and connects to the telephone service of the fifth component, this time is generated in the first component or the fifth component. Mipin and / or Miyin for human-computer interaction, if Mipin and / or Miyin are generated by the fifth component, the first component downloads or receives the corresponding Mipin and / or Miyin from the fifth component Pin, the first component gets the Mi Pin and / or Mi Yin Pin to be used.

[0068] Step 12: The first component outputs the Mipin to be used this time to the second component, or outputs the Miyin Pin to be used this time to the t...

Embodiment 2

[0075] Please refer to figure 2 As shown, the second embodiment of the security interaction method of the present invention, taking the security interaction system of the ATM machine as an example, includes the following steps:

[0076] Step 21. The user or administrator starts the first component at the same time or successively and logs in. After the ATM machine of the fourth component is connected to the ATM machine service of the fifth component, the human-computer interaction is generated in the first component or the fifth component. Mi Pin and / or Mi Yin Pin, if Mi Pin and / or Mi Yin Pin are generated by the fifth component, the first component downloads or receives the corresponding Mi Pin and / or Mi Yin Pin from the fifth component, the first The component gets the Mipin and / or Miyin to use.

[0077] Step 22: The first component outputs the cipher to be used this time to the second component, or outputs the cipher to be used this time to the third component.

[0078] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety interaction system, which comprises a man-machine interaction system and a man-machine interaction device, the man-machine interaction system comprises a safety application and a safety service, and the safety application generates or receives corresponding secret spelling and / or secret sound spelling between one-time plaintext and ciphertext generated by the safety service. The method comprises the following steps: displaying and / or playing to a user or an administrator, and enabling the user or the administrator to carry out autonomous, unlimited and unlimited man-machine security interaction in a contact or non-contact manner through a standard keyboard, mouse, voice or gesture manner under the condition that the existing man-machine interaction equipment and application software and a security mechanism thereof are not changed at all; and the security of the interacted plaintext information is protected. The invention further discloses a secure interaction method, electronic equipment and a storage medium. According to the invention, through one-time man-machine security interaction, no plaintext appears in the whole process, and the leakage risk that sensitive information is secretly shot, eavesdropped, screenshot, secretly recorded, intercepted and the like in the man-machine interaction process is effectively avoided.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to smart terminals, smart homes, Internet of Things, voice control devices, gesture control devices, remote controls, telephones, automatic driving vehicles and other contactless devices, and in particular to a safety interaction system and a method thereof, Electronic equipment and storage media. Background technique [0002] With the popularity of smart devices, smart homes, Internet of Things, voice-activated devices, gesture-controlled devices, remote controls, telephones, automatic driving and other contactless control devices, how to ensure the security and control of the login and control methods of users and managers of these devices Avoiding the leakage, secret photography, secret recording and interception of relevant sensitive information has become a big security issue. [0003] At present, standard hardware such as keyboard, hardware mouse, standard pronunci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/64
Inventor 曹耀和
Owner 浙江智贝信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products