CN106101128A - Safety information interaction method - Google Patents

Safety information interaction method Download PDF

Info

Publication number
CN106101128A
CN106101128A CN201610524679.3A CN201610524679A CN106101128A CN 106101128 A CN106101128 A CN 106101128A CN 201610524679 A CN201610524679 A CN 201610524679A CN 106101128 A CN106101128 A CN 106101128A
Authority
CN
China
Prior art keywords
safety information
communication equipment
information interaction
implementer
gesture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610524679.3A
Other languages
Chinese (zh)
Other versions
CN106101128B (en
Inventor
才华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201610524679.3A priority Critical patent/CN106101128B/en
Publication of CN106101128A publication Critical patent/CN106101128A/en
Application granted granted Critical
Publication of CN106101128B publication Critical patent/CN106101128B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention proposes safety information interaction method, described method includes: when self implementing safety information interaction, and the mutual promoter of safety information is by running on the client on the first communication equipment to being positioned at long-range sending for implementing request for implementer;Receive generation enforcement request for implementer by running on the client on the second communication equipment, and receiving for execution authentication operation after implementing request;After the result of authentication operation is " being proved to be successful ", promoter is replaced to implement its safety information interaction asked for implementer.Safety information interaction method disclosed in this invention has high safety.

Description

Safety information interaction method
Technical field
The present invention relates to information interacting method, more particularly, to safety information interaction method.
Background technology
At present, along with the becoming increasingly abundant of class of business of the increasingly extensive and different field of cyber-net application, (i.e. higher to security requirement information interactive process, such as in financial field with management security information interactive process in enforcement Payment transaction) become more and more important.
In existing technical scheme, self cannot implement safety information the promoter that safety information is mutual mutual During the practical operation of process, it needs to ask interested third party (such as household, kith and kin etc. by phone or other advice methods Deng) replace performing this safety information interaction.
But, there are the following problems for above-mentioned existing technical scheme: owing to lacking relevant long-distance identity-certifying mechanism, therefore There are the potential risks replacing request (such as payment request) imitated forgery.
Accordingly, there exist following demand: provide and there is implementing for safety information interaction generation of high safety Safety information interaction method.
Summary of the invention
In order to solve the problem existing for above-mentioned prior art, the present invention propose have high safety for The safety information interaction method that safety information interaction generation implements.
It is an object of the invention to be achieved through the following technical solutions:
A kind of safety information interaction method, described safety information interaction method comprises the following steps:
(A1) when self implementing safety information interaction, the mutual promoter of safety information is by running on first Client on communication equipment is to being positioned at long-range sending for implementing request for implementer;
(A2) described generation implementer implements to ask by running on the client reception described generation on the second communication equipment, and Authentication operation is performed after receiving the enforcement request of described generation;
(A3), after the result operated in described authentication is " being proved to be successful ", described generation implementer replaces described promoter to implement The safety information interaction that it is asked.
In scheme disclosed above, it is preferable that described generation implements request and includes that asked safety information is mutual Managing detailed catalogue needed for process.
In scheme disclosed above, it is preferable that described step (A1) farther includes: please sending the enforcement of described generation When asking, the client on described first communication equipment automatically turns on the photographic head of this first communication equipment, and by described photographic head The video image of the described promoter of shooting sends continuously and in real time to described second communication equipment.
In scheme disclosed above, it is preferable that described step (A2) farther includes: receiving the enforcement of described generation After request, the client on described second communication equipment automatically turns on the photographic head of this second communication equipment, and by described shooting The video image of the described generation implementer of head shooting sends continuously and in real time to described first communication equipment.
In scheme disclosed above, it is preferable that described authentication operation includes: described generation implementer is by described The video image identification of the promoter that the first communication equipment transmits and the identity of confirmation promoter.
In scheme disclosed above, it is preferable that described authentication operation farther includes: initiator sells Gesture, the client on described first communication equipment catches and identifies the information of described gesture the gesture information that will be identified therewith Push to described second communication equipment, described second communication equipment therewith based on described gesture information formed suspended frame, and via The gesture of described promoter is shown to described generation implementer by described suspended frame in real time.
In scheme disclosed above, it is preferable that described authentication operation farther includes: described second communication sets Standby upper client displays it to described generation implementer after receiving described suspended frame, and described generation implementer imitates therewith and sends out Rise side gesture, and according to information by the gesture of described generation implementer by alignment by the way of realize with in described suspended frame The matching operation of gesture.
In scheme disclosed above, it is preferable that described authentication operation farther includes: described second communication sets Standby upper client analysis also determines that whether the gesture of described generation implementer is directed at the gesture in described suspended frame and mates.
In scheme disclosed above, it is preferable that in the case of following two conditions are satisfied by, described authentication The result of operation is " being proved to be successful ": the video of the promoter that (1) described generation implementer is transmitted by described first communication equipment The identity of image identification and confirmation promoter is true;(2) gesture of described generation implementer is directed at the gesture in described suspended frame And coupling.
In scheme disclosed above, it is preferable that described first communication equipment and described second communication equipment are mobile Terminal or personal computer.
Disclosed in this invention for safety information interaction generation implement safety information interaction method have with Lower advantage: (1) is owing to utilizing real-time video to confirm the identity of initiator, therefore can occasionally avoid the imitation of malice to forge;(2) owing to needing The gesture of initiator's dynamic formation to be imitated, thus considerably improve processing safety and be able to verify that for implementer true Wish.
Accompanying drawing explanation
Will be more fully understood that by those skilled in the art, wherein in conjunction with accompanying drawing, the technical characteristic of the present invention and advantage:
Fig. 1 is the flow chart of safety information interaction method according to an embodiment of the invention.
Detailed description of the invention
Fig. 1 is the flow chart of safety information interaction method according to an embodiment of the invention.As it is shown in figure 1, the present invention Disclosed safety information interaction method comprises the following steps: that (A1) self cannot implement safety information interaction Time (such as payment transaction), the mutual promoter of safety information is remote to being positioned at by running on the client on the first communication equipment Sending for implementing request for implementer (such as household, kith and kin etc.) of journey;(A2) described generation implementer is by running on second Client on communication equipment receives the enforcement request of described generation, and performs authentication after receiving the enforcement request of described generation Operation;(A3), after the result operated in described authentication is " being proved to be successful ", described generation implementer replaces described promoter real Execute its safety information interaction asked.
Preferably, in safety information interaction method disclosed in this invention, in described generation, implements request and includes being asked Safety information interaction needed for managing detailed catalogue (such as, sequence information, such as payment, pay recipient's account Etc.).
Preferably, in safety information interaction method disclosed in this invention, described step (A1) farther includes: When sending the enforcement request of described generation, the client on described first communication equipment automatically turns on the shooting of this first communication equipment Head, and the video image of the described promoter shot by described photographic head communicates set with sending in real time to described second continuously Standby.
Preferably, in safety information interaction method disclosed in this invention, described step (A2) farther includes: After receiving the enforcement request of described generation, the client on described second communication equipment automatically turns on the shooting of this second communication equipment Head, and the video image of the described generation implementer shot by described photographic head communicates with sending to described first in real time continuously Equipment.
Preferably, in safety information interaction method disclosed in this invention, described authentication operation includes: described Identity for implementer's video image identification by the promoter of described first communication equipment transmission with confirmation promoter.
Preferably, in safety information interaction method disclosed in this invention, described authentication operation bag further Include: initiator makes gesture (such as shears hands, fist etc.), and the client on described first communication equipment catches therewith and knows The gesture information identified also is pushed to described second communication equipment by the information of the most described gesture, described second communication equipment with Form suspended frame based on described gesture information, and via described suspended frame, the gesture of described promoter is shown to institute in real time State for implementer.
Preferably, in safety information interaction method disclosed in this invention, described authentication operation bag further Include: the client on described second communication equipment displays it to described generation implementer after receiving described suspended frame, described Imitate the gesture of initiator therewith for implementer, and according to information by the gesture of described generation implementer by the way of alignment Realize and the matching operation of the gesture in described suspended frame.
Preferably, in safety information interaction method disclosed in this invention, described authentication operation bag further Include: client analysis on described second communication equipment and determine the gesture of described generation implementer whether with in described suspended frame Gesture alignment and coupling (the most consistent both i.e.).
Preferably, in safety information interaction method disclosed in this invention, in the feelings that following two conditions are satisfied by Under condition, the result of described authentication operation is " being proved to be successful ": (1) described generation implementer passes through described first communication equipment The video image identification of the promoter transmitted and the identity of confirmation promoter are true;(2) gesture of described generation implementer is with described Gesture alignment in suspended frame and coupling.
Preferably, in safety information interaction method disclosed in this invention, described first communication equipment and described Two communication equipments be mobile terminal (such as smart phone etc.) or personal computer (such as desk computer, notebook computer, Panel computer etc.).
Therefore, safety information interaction method disclosed in this invention has the advantage that (1) is owing to utilizing in real time Video confirms the identity of initiator, therefore it can be avoided that the imitation of malice is forged;(2) owing to needing imitation initiator's dynamic formation Gesture, therefore considerably improve processing safety and be able to verify that the actual wishes for implementer.
Although the present invention is to be described by above-mentioned preferred implementation, but its way of realization is not limited to Above-mentioned embodiment.It will be appreciated that in the case of without departing from spirit and scope of the present invention, those skilled in the art are permissible The present invention is made different changing and modifications.

Claims (10)

1. a safety information interaction method, described safety information interaction method comprises the following steps:
(A1) when self implementing safety information interaction, the mutual promoter of safety information is by running on first Client on communication equipment is to being positioned at long-range sending for implementing request for implementer;
(A2) described generation implementer implements to ask by running on the client reception described generation on the second communication equipment, and Authentication operation is performed after receiving the enforcement request of described generation;
(A3), after the result operated in described authentication is " being proved to be successful ", described generation implementer replaces described promoter to implement The safety information interaction that it is asked.
Safety information interaction method the most according to claim 1, it is characterised in that described generation implements request and includes being asked Managing detailed catalogue needed for the safety information interaction asked.
Safety information interaction method the most according to claim 2, it is characterised in that described step (A1) is wrapped further Include: when sending the enforcement request of described generation, the client on described first communication equipment automatically turns on this first communication equipment Photographic head, and the video image of the described promoter shot by described photographic head leads to sending to described second in real time continuously Letter equipment.
Safety information interaction method the most according to claim 3, it is characterised in that described step (A2) is wrapped further Include: after receiving the enforcement request of described generation, the client on described second communication equipment automatically turns on this second communication equipment Photographic head, and the video image of the described generation implementer shot by described photographic head sends continuously and in real time to the most described the One communication equipment.
Safety information interaction method the most according to claim 4, it is characterised in that described authentication operation includes: The video image identification of the promoter that described generation implementer is transmitted by described first communication equipment and the identity of confirmation promoter.
Safety information interaction method the most according to claim 5, it is characterised in that described authentication operation is further Including: initiator makes gesture, and the client on described first communication equipment catches and identify the information of described gesture therewith, and The gesture information identified pushes to described second communication equipment, and described second communication equipment is therewith based on described gesture information Form suspended frame, and via described suspended frame, the gesture of described promoter is shown to described generation implementer in real time.
Safety information interaction method the most according to claim 6, it is characterised in that described authentication operation is further Including: the client on described second communication equipment displays it to described generation implementer, institute after receiving described suspended frame State the gesture imitating initiator for implementer therewith, and according to information, the gesture of described generation implementer is passed through the side of alignment Formula realizes and the matching operation of the gesture in described suspended frame.
Safety information interaction method the most according to claim 7, it is characterised in that described authentication operation is further Including: client analysis on described second communication equipment and determine the gesture of described generation implementer whether with in described suspended frame Gesture alignment and coupling.
Safety information interaction method the most according to claim 8, it is characterised in that be satisfied by following two conditions In the case of, the result of described authentication operation is " being proved to be successful ": (1) described generation implementer is set by described first communication The video image identification of the standby promoter transmitted and the identity of confirmation promoter are true;(2) gesture of described generation implementer and institute State the gesture alignment in suspended frame and coupling.
Safety information interaction method the most according to claim 9, it is characterised in that described first communication equipment and institute Stating the second communication equipment is mobile terminal or personal computer.
CN201610524679.3A 2016-07-06 2016-07-06 Safety information interaction method Active CN106101128B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610524679.3A CN106101128B (en) 2016-07-06 2016-07-06 Safety information interaction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610524679.3A CN106101128B (en) 2016-07-06 2016-07-06 Safety information interaction method

Publications (2)

Publication Number Publication Date
CN106101128A true CN106101128A (en) 2016-11-09
CN106101128B CN106101128B (en) 2019-08-13

Family

ID=57212220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610524679.3A Active CN106101128B (en) 2016-07-06 2016-07-06 Safety information interaction method

Country Status (1)

Country Link
CN (1) CN106101128B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645794A (en) * 2004-01-19 2005-07-27 日立通讯技术株式会社 Access user management system and access user management apparatus
CN101051905A (en) * 2007-05-15 2007-10-10 谢川 Agent identity certificiation method
CN101355557A (en) * 2008-09-05 2009-01-28 杭州华三通信技术有限公司 Method and system for implementing network access control in MPLS/VPN network
CN102006296A (en) * 2010-11-26 2011-04-06 杭州华三通信技术有限公司 Security certification method and equipment
CN103036774A (en) * 2013-01-08 2013-04-10 北京融动科技有限公司 Information interaction system and information interaction method
CN103036902A (en) * 2012-12-26 2013-04-10 百度在线网络技术(北京)有限公司 Login control method and login control system based on two-dimension code
CN104519058A (en) * 2014-12-15 2015-04-15 北京联龙博通电子商务技术有限公司 Video interaction authentication method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645794A (en) * 2004-01-19 2005-07-27 日立通讯技术株式会社 Access user management system and access user management apparatus
CN101051905A (en) * 2007-05-15 2007-10-10 谢川 Agent identity certificiation method
CN101355557A (en) * 2008-09-05 2009-01-28 杭州华三通信技术有限公司 Method and system for implementing network access control in MPLS/VPN network
CN102006296A (en) * 2010-11-26 2011-04-06 杭州华三通信技术有限公司 Security certification method and equipment
CN103036902A (en) * 2012-12-26 2013-04-10 百度在线网络技术(北京)有限公司 Login control method and login control system based on two-dimension code
CN103036774A (en) * 2013-01-08 2013-04-10 北京融动科技有限公司 Information interaction system and information interaction method
CN104519058A (en) * 2014-12-15 2015-04-15 北京联龙博通电子商务技术有限公司 Video interaction authentication method and system

Also Published As

Publication number Publication date
CN106101128B (en) 2019-08-13

Similar Documents

Publication Publication Date Title
CN104063644B (en) The method of fingerprint recognition, terminal and server
CN102521927B (en) Self-aided terminal, system and transaction service method
CN104836780B (en) Data interactive method, checking terminal, server and system
CN105761139A (en) Account checking system and method
CN102469081B (en) Method, equipment and system for operating smart card
CN104361493A (en) Electronic payment method on basis of biological characteristics
CN105898418A (en) Intelligent terminal, remote controller, and intelligent terminal payment method
US10977623B2 (en) Chat session communication for transactions between chat bot applications
CN104618101A (en) Data processing method, intermediate server and data processing system
CN104092653B (en) Data processing method and system
CN103606082A (en) A television payment system based on fingerprint identification and a method
CN105701692A (en) Electronic transaction writing-off method, electronic transaction writing-off client, electronic transaction writing-off server and electronic transaction writing-off system
CN105046540A (en) Automated remote transaction assistance
CN106779640A (en) Face-to-face electronic payment controlling method and its device
CN105096106A (en) Internet based tuition fee paying system
CN104270253A (en) Method, devices and system for user identity authentication
CN102467708A (en) Payment method, transaction origination terminal and transaction execution terminal
CN104618322B (en) Data processing method and device based on immediate communication tool
KR102270774B1 (en) Two-way verification mobile payment method and system
CN104123647A (en) Payment method and system
CN105224071B (en) A kind of method of data interaction, equipment and system
CN106470200A (en) A kind of auth method and relevant apparatus
CN106101128B (en) Safety information interaction method
CN102195943B (en) Safety information interaction method and system
CN109858580A (en) A kind of exchange method of graphic code, electronic equipment and storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant