CN106101128A - Safety information interaction method - Google Patents
Safety information interaction method Download PDFInfo
- Publication number
- CN106101128A CN106101128A CN201610524679.3A CN201610524679A CN106101128A CN 106101128 A CN106101128 A CN 106101128A CN 201610524679 A CN201610524679 A CN 201610524679A CN 106101128 A CN106101128 A CN 106101128A
- Authority
- CN
- China
- Prior art keywords
- safety information
- communication equipment
- information interaction
- implementer
- gesture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The present invention proposes safety information interaction method, described method includes: when self implementing safety information interaction, and the mutual promoter of safety information is by running on the client on the first communication equipment to being positioned at long-range sending for implementing request for implementer;Receive generation enforcement request for implementer by running on the client on the second communication equipment, and receiving for execution authentication operation after implementing request;After the result of authentication operation is " being proved to be successful ", promoter is replaced to implement its safety information interaction asked for implementer.Safety information interaction method disclosed in this invention has high safety.
Description
Technical field
The present invention relates to information interacting method, more particularly, to safety information interaction method.
Background technology
At present, along with the becoming increasingly abundant of class of business of the increasingly extensive and different field of cyber-net application,
(i.e. higher to security requirement information interactive process, such as in financial field with management security information interactive process in enforcement
Payment transaction) become more and more important.
In existing technical scheme, self cannot implement safety information the promoter that safety information is mutual mutual
During the practical operation of process, it needs to ask interested third party (such as household, kith and kin etc. by phone or other advice methods
Deng) replace performing this safety information interaction.
But, there are the following problems for above-mentioned existing technical scheme: owing to lacking relevant long-distance identity-certifying mechanism, therefore
There are the potential risks replacing request (such as payment request) imitated forgery.
Accordingly, there exist following demand: provide and there is implementing for safety information interaction generation of high safety
Safety information interaction method.
Summary of the invention
In order to solve the problem existing for above-mentioned prior art, the present invention propose have high safety for
The safety information interaction method that safety information interaction generation implements.
It is an object of the invention to be achieved through the following technical solutions:
A kind of safety information interaction method, described safety information interaction method comprises the following steps:
(A1) when self implementing safety information interaction, the mutual promoter of safety information is by running on first
Client on communication equipment is to being positioned at long-range sending for implementing request for implementer;
(A2) described generation implementer implements to ask by running on the client reception described generation on the second communication equipment, and
Authentication operation is performed after receiving the enforcement request of described generation;
(A3), after the result operated in described authentication is " being proved to be successful ", described generation implementer replaces described promoter to implement
The safety information interaction that it is asked.
In scheme disclosed above, it is preferable that described generation implements request and includes that asked safety information is mutual
Managing detailed catalogue needed for process.
In scheme disclosed above, it is preferable that described step (A1) farther includes: please sending the enforcement of described generation
When asking, the client on described first communication equipment automatically turns on the photographic head of this first communication equipment, and by described photographic head
The video image of the described promoter of shooting sends continuously and in real time to described second communication equipment.
In scheme disclosed above, it is preferable that described step (A2) farther includes: receiving the enforcement of described generation
After request, the client on described second communication equipment automatically turns on the photographic head of this second communication equipment, and by described shooting
The video image of the described generation implementer of head shooting sends continuously and in real time to described first communication equipment.
In scheme disclosed above, it is preferable that described authentication operation includes: described generation implementer is by described
The video image identification of the promoter that the first communication equipment transmits and the identity of confirmation promoter.
In scheme disclosed above, it is preferable that described authentication operation farther includes: initiator sells
Gesture, the client on described first communication equipment catches and identifies the information of described gesture the gesture information that will be identified therewith
Push to described second communication equipment, described second communication equipment therewith based on described gesture information formed suspended frame, and via
The gesture of described promoter is shown to described generation implementer by described suspended frame in real time.
In scheme disclosed above, it is preferable that described authentication operation farther includes: described second communication sets
Standby upper client displays it to described generation implementer after receiving described suspended frame, and described generation implementer imitates therewith and sends out
Rise side gesture, and according to information by the gesture of described generation implementer by alignment by the way of realize with in described suspended frame
The matching operation of gesture.
In scheme disclosed above, it is preferable that described authentication operation farther includes: described second communication sets
Standby upper client analysis also determines that whether the gesture of described generation implementer is directed at the gesture in described suspended frame and mates.
In scheme disclosed above, it is preferable that in the case of following two conditions are satisfied by, described authentication
The result of operation is " being proved to be successful ": the video of the promoter that (1) described generation implementer is transmitted by described first communication equipment
The identity of image identification and confirmation promoter is true;(2) gesture of described generation implementer is directed at the gesture in described suspended frame
And coupling.
In scheme disclosed above, it is preferable that described first communication equipment and described second communication equipment are mobile
Terminal or personal computer.
Disclosed in this invention for safety information interaction generation implement safety information interaction method have with
Lower advantage: (1) is owing to utilizing real-time video to confirm the identity of initiator, therefore can occasionally avoid the imitation of malice to forge;(2) owing to needing
The gesture of initiator's dynamic formation to be imitated, thus considerably improve processing safety and be able to verify that for implementer true
Wish.
Accompanying drawing explanation
Will be more fully understood that by those skilled in the art, wherein in conjunction with accompanying drawing, the technical characteristic of the present invention and advantage:
Fig. 1 is the flow chart of safety information interaction method according to an embodiment of the invention.
Detailed description of the invention
Fig. 1 is the flow chart of safety information interaction method according to an embodiment of the invention.As it is shown in figure 1, the present invention
Disclosed safety information interaction method comprises the following steps: that (A1) self cannot implement safety information interaction
Time (such as payment transaction), the mutual promoter of safety information is remote to being positioned at by running on the client on the first communication equipment
Sending for implementing request for implementer (such as household, kith and kin etc.) of journey;(A2) described generation implementer is by running on second
Client on communication equipment receives the enforcement request of described generation, and performs authentication after receiving the enforcement request of described generation
Operation;(A3), after the result operated in described authentication is " being proved to be successful ", described generation implementer replaces described promoter real
Execute its safety information interaction asked.
Preferably, in safety information interaction method disclosed in this invention, in described generation, implements request and includes being asked
Safety information interaction needed for managing detailed catalogue (such as, sequence information, such as payment, pay recipient's account
Etc.).
Preferably, in safety information interaction method disclosed in this invention, described step (A1) farther includes:
When sending the enforcement request of described generation, the client on described first communication equipment automatically turns on the shooting of this first communication equipment
Head, and the video image of the described promoter shot by described photographic head communicates set with sending in real time to described second continuously
Standby.
Preferably, in safety information interaction method disclosed in this invention, described step (A2) farther includes:
After receiving the enforcement request of described generation, the client on described second communication equipment automatically turns on the shooting of this second communication equipment
Head, and the video image of the described generation implementer shot by described photographic head communicates with sending to described first in real time continuously
Equipment.
Preferably, in safety information interaction method disclosed in this invention, described authentication operation includes: described
Identity for implementer's video image identification by the promoter of described first communication equipment transmission with confirmation promoter.
Preferably, in safety information interaction method disclosed in this invention, described authentication operation bag further
Include: initiator makes gesture (such as shears hands, fist etc.), and the client on described first communication equipment catches therewith and knows
The gesture information identified also is pushed to described second communication equipment by the information of the most described gesture, described second communication equipment with
Form suspended frame based on described gesture information, and via described suspended frame, the gesture of described promoter is shown to institute in real time
State for implementer.
Preferably, in safety information interaction method disclosed in this invention, described authentication operation bag further
Include: the client on described second communication equipment displays it to described generation implementer after receiving described suspended frame, described
Imitate the gesture of initiator therewith for implementer, and according to information by the gesture of described generation implementer by the way of alignment
Realize and the matching operation of the gesture in described suspended frame.
Preferably, in safety information interaction method disclosed in this invention, described authentication operation bag further
Include: client analysis on described second communication equipment and determine the gesture of described generation implementer whether with in described suspended frame
Gesture alignment and coupling (the most consistent both i.e.).
Preferably, in safety information interaction method disclosed in this invention, in the feelings that following two conditions are satisfied by
Under condition, the result of described authentication operation is " being proved to be successful ": (1) described generation implementer passes through described first communication equipment
The video image identification of the promoter transmitted and the identity of confirmation promoter are true;(2) gesture of described generation implementer is with described
Gesture alignment in suspended frame and coupling.
Preferably, in safety information interaction method disclosed in this invention, described first communication equipment and described
Two communication equipments be mobile terminal (such as smart phone etc.) or personal computer (such as desk computer, notebook computer,
Panel computer etc.).
Therefore, safety information interaction method disclosed in this invention has the advantage that (1) is owing to utilizing in real time
Video confirms the identity of initiator, therefore it can be avoided that the imitation of malice is forged;(2) owing to needing imitation initiator's dynamic formation
Gesture, therefore considerably improve processing safety and be able to verify that the actual wishes for implementer.
Although the present invention is to be described by above-mentioned preferred implementation, but its way of realization is not limited to
Above-mentioned embodiment.It will be appreciated that in the case of without departing from spirit and scope of the present invention, those skilled in the art are permissible
The present invention is made different changing and modifications.
Claims (10)
1. a safety information interaction method, described safety information interaction method comprises the following steps:
(A1) when self implementing safety information interaction, the mutual promoter of safety information is by running on first
Client on communication equipment is to being positioned at long-range sending for implementing request for implementer;
(A2) described generation implementer implements to ask by running on the client reception described generation on the second communication equipment, and
Authentication operation is performed after receiving the enforcement request of described generation;
(A3), after the result operated in described authentication is " being proved to be successful ", described generation implementer replaces described promoter to implement
The safety information interaction that it is asked.
Safety information interaction method the most according to claim 1, it is characterised in that described generation implements request and includes being asked
Managing detailed catalogue needed for the safety information interaction asked.
Safety information interaction method the most according to claim 2, it is characterised in that described step (A1) is wrapped further
Include: when sending the enforcement request of described generation, the client on described first communication equipment automatically turns on this first communication equipment
Photographic head, and the video image of the described promoter shot by described photographic head leads to sending to described second in real time continuously
Letter equipment.
Safety information interaction method the most according to claim 3, it is characterised in that described step (A2) is wrapped further
Include: after receiving the enforcement request of described generation, the client on described second communication equipment automatically turns on this second communication equipment
Photographic head, and the video image of the described generation implementer shot by described photographic head sends continuously and in real time to the most described the
One communication equipment.
Safety information interaction method the most according to claim 4, it is characterised in that described authentication operation includes:
The video image identification of the promoter that described generation implementer is transmitted by described first communication equipment and the identity of confirmation promoter.
Safety information interaction method the most according to claim 5, it is characterised in that described authentication operation is further
Including: initiator makes gesture, and the client on described first communication equipment catches and identify the information of described gesture therewith, and
The gesture information identified pushes to described second communication equipment, and described second communication equipment is therewith based on described gesture information
Form suspended frame, and via described suspended frame, the gesture of described promoter is shown to described generation implementer in real time.
Safety information interaction method the most according to claim 6, it is characterised in that described authentication operation is further
Including: the client on described second communication equipment displays it to described generation implementer, institute after receiving described suspended frame
State the gesture imitating initiator for implementer therewith, and according to information, the gesture of described generation implementer is passed through the side of alignment
Formula realizes and the matching operation of the gesture in described suspended frame.
Safety information interaction method the most according to claim 7, it is characterised in that described authentication operation is further
Including: client analysis on described second communication equipment and determine the gesture of described generation implementer whether with in described suspended frame
Gesture alignment and coupling.
Safety information interaction method the most according to claim 8, it is characterised in that be satisfied by following two conditions
In the case of, the result of described authentication operation is " being proved to be successful ": (1) described generation implementer is set by described first communication
The video image identification of the standby promoter transmitted and the identity of confirmation promoter are true;(2) gesture of described generation implementer and institute
State the gesture alignment in suspended frame and coupling.
Safety information interaction method the most according to claim 9, it is characterised in that described first communication equipment and institute
Stating the second communication equipment is mobile terminal or personal computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610524679.3A CN106101128B (en) | 2016-07-06 | 2016-07-06 | Safety information interaction method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610524679.3A CN106101128B (en) | 2016-07-06 | 2016-07-06 | Safety information interaction method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106101128A true CN106101128A (en) | 2016-11-09 |
CN106101128B CN106101128B (en) | 2019-08-13 |
Family
ID=57212220
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610524679.3A Active CN106101128B (en) | 2016-07-06 | 2016-07-06 | Safety information interaction method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106101128B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1645794A (en) * | 2004-01-19 | 2005-07-27 | 日立通讯技术株式会社 | Access user management system and access user management apparatus |
CN101051905A (en) * | 2007-05-15 | 2007-10-10 | 谢川 | Agent identity certificiation method |
CN101355557A (en) * | 2008-09-05 | 2009-01-28 | 杭州华三通信技术有限公司 | Method and system for implementing network access control in MPLS/VPN network |
CN102006296A (en) * | 2010-11-26 | 2011-04-06 | 杭州华三通信技术有限公司 | Security certification method and equipment |
CN103036774A (en) * | 2013-01-08 | 2013-04-10 | 北京融动科技有限公司 | Information interaction system and information interaction method |
CN103036902A (en) * | 2012-12-26 | 2013-04-10 | 百度在线网络技术(北京)有限公司 | Login control method and login control system based on two-dimension code |
CN104519058A (en) * | 2014-12-15 | 2015-04-15 | 北京联龙博通电子商务技术有限公司 | Video interaction authentication method and system |
-
2016
- 2016-07-06 CN CN201610524679.3A patent/CN106101128B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1645794A (en) * | 2004-01-19 | 2005-07-27 | 日立通讯技术株式会社 | Access user management system and access user management apparatus |
CN101051905A (en) * | 2007-05-15 | 2007-10-10 | 谢川 | Agent identity certificiation method |
CN101355557A (en) * | 2008-09-05 | 2009-01-28 | 杭州华三通信技术有限公司 | Method and system for implementing network access control in MPLS/VPN network |
CN102006296A (en) * | 2010-11-26 | 2011-04-06 | 杭州华三通信技术有限公司 | Security certification method and equipment |
CN103036902A (en) * | 2012-12-26 | 2013-04-10 | 百度在线网络技术(北京)有限公司 | Login control method and login control system based on two-dimension code |
CN103036774A (en) * | 2013-01-08 | 2013-04-10 | 北京融动科技有限公司 | Information interaction system and information interaction method |
CN104519058A (en) * | 2014-12-15 | 2015-04-15 | 北京联龙博通电子商务技术有限公司 | Video interaction authentication method and system |
Also Published As
Publication number | Publication date |
---|---|
CN106101128B (en) | 2019-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104063644B (en) | The method of fingerprint recognition, terminal and server | |
CN102521927B (en) | Self-aided terminal, system and transaction service method | |
CN104836780B (en) | Data interactive method, checking terminal, server and system | |
CN105761139A (en) | Account checking system and method | |
CN102469081B (en) | Method, equipment and system for operating smart card | |
CN104361493A (en) | Electronic payment method on basis of biological characteristics | |
CN105898418A (en) | Intelligent terminal, remote controller, and intelligent terminal payment method | |
US10977623B2 (en) | Chat session communication for transactions between chat bot applications | |
CN104618101A (en) | Data processing method, intermediate server and data processing system | |
CN104092653B (en) | Data processing method and system | |
CN103606082A (en) | A television payment system based on fingerprint identification and a method | |
CN105701692A (en) | Electronic transaction writing-off method, electronic transaction writing-off client, electronic transaction writing-off server and electronic transaction writing-off system | |
CN105046540A (en) | Automated remote transaction assistance | |
CN106779640A (en) | Face-to-face electronic payment controlling method and its device | |
CN105096106A (en) | Internet based tuition fee paying system | |
CN104270253A (en) | Method, devices and system for user identity authentication | |
CN102467708A (en) | Payment method, transaction origination terminal and transaction execution terminal | |
CN104618322B (en) | Data processing method and device based on immediate communication tool | |
KR102270774B1 (en) | Two-way verification mobile payment method and system | |
CN104123647A (en) | Payment method and system | |
CN105224071B (en) | A kind of method of data interaction, equipment and system | |
CN106470200A (en) | A kind of auth method and relevant apparatus | |
CN106101128B (en) | Safety information interaction method | |
CN102195943B (en) | Safety information interaction method and system | |
CN109858580A (en) | A kind of exchange method of graphic code, electronic equipment and storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |