CN112468535A - Method, device and system for realizing safety type human-computer interaction service - Google Patents

Method, device and system for realizing safety type human-computer interaction service Download PDF

Info

Publication number
CN112468535A
CN112468535A CN202011136240.6A CN202011136240A CN112468535A CN 112468535 A CN112468535 A CN 112468535A CN 202011136240 A CN202011136240 A CN 202011136240A CN 112468535 A CN112468535 A CN 112468535A
Authority
CN
China
Prior art keywords
control instruction
user side
server
computer interaction
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011136240.6A
Other languages
Chinese (zh)
Inventor
金家红
胡泳
陈烨洪
叶志军
徐文华
常冲
寿海锋
张丙垒
张�杰
张继佳
赵峰
倪颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202011136240.6A priority Critical patent/CN112468535A/en
Publication of CN112468535A publication Critical patent/CN112468535A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • G06F13/4282Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure provides a method, a device and a system for realizing a safety type human-computer interaction service. The implementation method of the safety type human-computer interaction service comprises the following steps: acquiring a control instruction from a user side; the server side processes the control instruction and generates response information; the server displays the response information in a display; acquiring a page of the display in real time to generate video data; and sending the video data to the user side to respond to the control instruction. The method for realizing the safe human-computer interaction service can thoroughly get rid of the limitation of objects in space on the premise of ensuring information safety, fully exerts the improvement of working quality and efficiency caused by human-computer interconnection, and realizes point-to-point safe human-computer interconnection service.

Description

Method, device and system for realizing safety type human-computer interaction service
Technical Field
The disclosure relates to the technical field of human-computer interaction, in particular to a method, a device and a system for realizing a safety human-computer interaction service.
Background
With the deep application of the informatization technology in power enterprises, various professional information systems such as marketing, production and the like are on line and are gradually improved. And the computer is used as a terminal entrance for interactive fusion of various system information and plays a role without replacement. In the process of constructing a ubiquitous power internet of things in a company, how to effectively connect objects and people which integrate information flow, application flow and processing flow into a whole so as to enable the objects to play more efficient and timely transient response is a problem which needs to be solved urgently.
Especially in the application of the power grid, when the staff of the power grid debugs the instrument at the user's home or needs to inquire the data of the power grid intranet in other occasions, because the internet environment where the staff of the power grid is located is complex, if the staff is allowed to access the data of the intranet in real time, great risk is brought to the data of the intranet of the power grid. However, data of the power grid are updated in real time, if power grid workers cannot be allowed to access the data in real time, problems of equipment debugging failure, user power error and the like often occur, and how to increase convenience of the power grid workers for accessing the data is a problem to be solved urgently at present under the condition that the safety of the data in the power grid is ensured.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure is directed to a method, an apparatus, and a system for implementing a secure human-computer interaction service, which overcome, at least to some extent, one or more of the problems due to the limitations and disadvantages of the related art.
According to a first aspect of the embodiments of the present disclosure, a method for implementing a secure human-computer interaction service is provided, including: acquiring a control instruction from a user side; the server side processes the control instruction and generates response information; the server displays the response information in a display; acquiring a page of the display in real time to generate video data; and sending the video data to the user side to respond to the control instruction.
In an exemplary embodiment of the present disclosure, obtaining the control instruction by the user side includes: obtaining mouse operation actions by a user side to generate the control instruction; and/or obtaining a keyboard operation action from the user side to generate the control instruction.
In an exemplary embodiment of the present disclosure, obtaining the control instruction by the user side further includes: and acquiring the control instruction in a one-way transmission mode through a universal serial bus interface.
In an exemplary embodiment of the present disclosure, before obtaining the control instruction by the user side, the method further includes: performing security verification on the user side in a password verification mode; and acquiring a control instruction by the user terminal user side after the security verification is passed.
In an exemplary embodiment of the present disclosure, the processing, by the server, the control instruction, and the generating the response information includes: the server in the intranet processes the control instruction; generating response data according to the control instruction; and converting the response data into displayable response information.
In an exemplary embodiment of the present disclosure, before the server processes the control instruction, the method further includes: and the server side verifies the control instruction in a double verification mode. .
In an exemplary embodiment of the present disclosure, the transmitting the video data to the user terminal in response to the control instruction includes: compressing the video data based on a transmission key; and sending the compressed video data to the user side to respond to the control instruction.
According to a second aspect of the embodiments of the present disclosure, there is provided a human-computer interaction device, including: the instruction module is used for acquiring a control instruction from a user side; the response module is used for processing the control instruction by the server and generating response information; the display module is used for displaying the response information in a display by the server; the video module is used for acquiring a page of the display in real time and generating video data; and the sending module is used for sending the video data to the user side so as to respond to the control instruction.
In an exemplary embodiment of the present disclosure, further comprising: the authentication module is used for carrying out security authentication on the user side in a password authentication mode; and acquiring a control instruction by the user terminal user side after the security verification is passed.
According to a third aspect of the embodiments of the present disclosure, there is provided a human-computer interaction system, including: the user side is used for producing the control command; the server is used for processing the control instruction, generating response information and displaying the response information in a display; the interconnection terminal is used for acquiring the control instruction from the user side; acquiring a page of the display in real time to generate video data; and sending the video data to the user side to respond to the control instruction.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising: a memory; and a processor coupled to the memory, the processor configured to perform the method of any of the above based on instructions stored in the memory.
According to a fifth aspect of the present disclosure, there is provided a computer readable storage medium, on which a program is stored, which when executed by a processor, implements the secure human-computer interaction service implementation method as described in any one of the above.
The technical effect in one embodiment of the disclosure can thoroughly get rid of the limitation of objects in space on the premise of ensuring information security, fully play the improvement of working quality and efficiency caused by man-machine interconnection, and realize point-to-point safety man-machine interconnection service.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 schematically illustrates a system application diagram of a secure human-computer interaction service implementation method and apparatus in an exemplary embodiment of the present disclosure.
Fig. 2 schematically shows a flowchart of a secure human-computer interaction service implementation method in an exemplary embodiment of the present disclosure.
Fig. 3 schematically illustrates a system framework diagram of a secure human-computer interaction service implementation method and apparatus in an exemplary embodiment of the present disclosure.
Fig. 4 schematically shows a flowchart of a secure human-computer interaction service implementation method in an exemplary embodiment of the present disclosure.
Fig. 5 schematically illustrates a block diagram of a human-computer interaction device in an exemplary embodiment of the present disclosure.
Fig. 6 schematically shows a block diagram of a human-computer interaction system in an exemplary embodiment of the disclosure.
Fig. 7 schematically illustrates a block diagram of an electronic device in an exemplary embodiment of the disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various components, these components should not be limited by these terms. These terms are used to distinguish one element from another. Thus, a first component discussed below may be termed a second component without departing from the teachings of the disclosed concept. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It is to be understood by those skilled in the art that the drawings are merely schematic representations of exemplary embodiments, and that the blocks or processes shown in the drawings are not necessarily required to practice the present disclosure and are, therefore, not intended to limit the scope of the present disclosure.
Fig. 1 schematically illustrates a system application diagram of a secure human-computer interaction service implementation method and apparatus in an exemplary embodiment of the present disclosure.
As shown in fig. 1, the system architecture 100 may include user terminal devices 101, 102, 103, a network 104 and interconnected terminal servers 105, an intranet server 106. The network 104 medium to provide communication links between the user terminal devices 101, 102, 103 and the internet terminal server 105; network 104 also serves as a medium for providing a communication link between intranet server 106 and internet terminal server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
A user may use user terminal devices 101, 102, 103 to interact with an internet terminal server 105 via a network 104 to receive or send messages or the like. The user terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, and the like.
Internet terminal server 105 may interact with intranet server 106 through network 104 to receive or send messages, etc., and intranet server 106 may be installed with various service programs, such as a program for receiving a search instruction of a user and feeding back, a program for performing data processing according to the user's instruction, a data display platform, etc.
The user terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The internet terminal server 105 may be a server that provides various services, such as a background management server that provides support for a grid data website browsed by a user using the user terminal device 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (e.g., video display content) to the terminal device.
The internet terminal server 105 may obtain the control instruction, for example, from the user side; intranet server 106 may, for example, process the control instruction to generate response information; intranet server 106 may, for example, present the response information in a display; the internet terminal server 105 may, for example, obtain the page of the display in real time, and generate video data; the inter-connected terminal server 105 may for example send the video data to the user terminal in response to the control instruction.
The internet terminal server 105 may be a physical server, or may be composed of a plurality of servers, for example, a part of the internet terminal server 105 may be, for example, a data receiving system in the present disclosure, and is configured to obtain a control instruction from a user side; and a part of the internet terminal server 105 may also be used, for example, as a sending system in the present disclosure, for obtaining a page of the display in real time, and generating video data; and sending the video data to the user side to respond to the control instruction.
It should be noted that the secure human-computer interaction service implementation method provided by the embodiment of the present disclosure may be executed by the internet terminal server 105, and accordingly, the secure human-computer interaction service implementation apparatus may be disposed in the internet terminal server 105. The input end for providing control instruction input for the user is generally located in the user terminal equipment 101, 102, 103, and the response end for generating response information in response to the user instruction is generally located in the intranet server 106.
According to the method for realizing the safety type human-computer interaction service, the user side obtains the control instruction; the server side processes the control instruction and generates response information; the server displays the response information in a display; generating video data from the information of the display; and sending the video data to the user side to respond to the control instruction. The method can thoroughly get rid of the limitation of objects in space on the premise of ensuring information safety, fully play the improvement of working quality and efficiency caused by man-machine interconnection, and realize point-to-point safety man-machine interconnection service.
Fig. 2 schematically shows a flowchart of a secure human-computer interaction service implementation method in an exemplary embodiment of the present disclosure. Referring to fig. 2, the secure human-computer interaction service implementation method at least includes steps S202 to S210.
In step S202, the user obtains a control command;
in one embodiment, the obtaining of the control command by the user side includes: obtaining mouse operation actions by a user side to generate the control instruction; the amount of mouse displacement clicks may be identified, for example, to generate the control command. Specifically, the control command can be generated by an event triggered on the service platform of the user side when the mouse is clicked. Specifically, the mouse displacement click event can be acquired through the JS language.
The event acquisition of the mouse displacement click volume needs three kinds of messages: event sources, event data, event handlers, may for example:
event bubbling: when the elements are nested, after the internal element triggers a certain event, the corresponding event of the external element is also sequentially triggered under the default condition
Return false can be added; is to block the default operation
onclick mouse click trigger
ondbllick double click trigger
onmouseover, mouse movement top trigger
onmouseout trigger when mouse leaves
onmousemove, which is triggered when the mouse moves on the mouse
onchange-whenever a content change triggers
onbur-triggering upon loss of focus
onfocus-trigger when focus is acquired
onkeydown, triggered by key press
onkeyup: triggered when the key is lifted
onkeypress: an event occurs when the user presses and releases any alphanumeric key.
In one embodiment, the obtaining of the control command by the user side further comprises: and acquiring the keyboard operation action by the user side to generate the control instruction. For example, a common IO port or an ADC port may be used for key scanning to collect user key information. Hook functions may also be built in, for example, a platform of user data instructions to obtain key information for a user. The hook function is a part of a Windows message processing mechanism, and by setting a hook, an application program can filter all messages and events at a system level and access messages which cannot be accessed under normal conditions. The essence of a hook is a program that handles system messages, which are put on the system through system calls. The hook function of WINDOWS can be considered as one of the main characteristics of WINDOWS. The hook function can be used for capturing events occurring in the process related to the keyboard operation of the user.
In one embodiment, the obtaining of the control command by the user side further comprises: and acquiring the control instruction in a one-way transmission mode through a universal serial bus interface. And the received keyboard key signal and mouse operation signal are transmitted to the computer through the usb interface in a one-way mode.
In one embodiment, before obtaining the control command from the user side, the method further includes: performing security verification on the user side in a password verification mode; and acquiring a control instruction by the user terminal user side after the security verification is passed. And logging in measures on the safety protection aspect of the interconnection service by the user. Both secure login authentication and secure information transfer may be used.
And in a safe login verification mode, a user inputs an account password through an APP to log in an Internet of things management center of a preset platform, the management center sends a request to a specific remote interconnection terminal according to the account, and the terminal sends a verification code to a user mobile phone after receiving the request to confirm whether to start login. The video signal flow and the operation signal flow required by the man-machine interconnection service are completely independently communicated and transmitted in a one-way mode in a safety information transmission mode, and the possibility of background hijack control is avoided. At the same time, the Internet of things management center and the interconnection terminal of the booking platform carry out double check on the operation signal flow,
step S204, the server side processes the control instruction and generates response information;
in one embodiment, one may for example: the server in the intranet processes the control instruction; generating response data according to the control instruction; and converting the response data into displayable response information.
And according to different control instructions, the server performs different response processing to give response information. For example, when business layer personnel develop a business expansion scheme survey on site, various information such as a regulation and control system, a production system, a marketing system and the like can be called, and an optimized scheme is provided for a client; when the energy use service promotion is carried out, the contents such as the monthly electricity use condition, the electricity fee expenditure condition, the implementation effect of a typical scheme and the like of a user are called, and more persuasive data are provided for a client; when the field fault first-aid repair is carried out, information such as a topological relation of equipment of a PMS system, remote line measurement of a scheduling system, an intelligent public transformer monitoring system, a power utilization information acquisition system and the like is called in real time, and more accurate and complete work instructions are made for first-aid repair team members. Meanwhile, the personnel in each management layer need to receive and transmit important files during the outgoing office, and the emergency deployment related work and the like can also enter the personal exclusive office state through the interconnection service.
Step S206, the server displays the response information in a display;
step S208, acquiring a page of the display in real time to generate video data; and
step S210, sending the video data to the user side to respond to the control instruction.
In one embodiment, one may for example: compressing the video data based on a transmission key; and sending the compressed video data to the user side to respond to the control instruction.
In the present disclosure, video data may be encrypted by:
username/password authentication for SSH
An asymmetric key is used in the authentication process, the asymmetric key is generated by an interconnection terminal server 105, user terminal equipment 101, 102 and 103 initiate an authentication request of a certain user name, the interconnection terminal server 105 transmits a public key (pub _ key) to the user terminal equipment 101, 102 and 103, under the default condition, the user terminal equipment 101, 102 and 103 can check a known _ hosts file record, and if the public key record exists, the public key (pub _ key) is directly used for encrypting a password; if the public key does not exist, recording the public key into a knock _ hosts file and then encrypting the password by using the public key (pub _ key); then, the user terminal devices 101, 102, and 103 transmit the encrypted password to the internet terminal server 105, and the internet terminal server 105 decrypts the encrypted password by using the corresponding private key (pri _ key) to obtain the password plaintext, and if the encrypted password plaintext is matched with the private key (pri _ key), the authentication is successful.
SSH public key authentication (secret-free authentication)
In the authentication process, asymmetric keys are used, the asymmetric keys are generated by the user terminal devices 101, 102, 103, and public keys (pub _ key) generated by the user terminal devices 101, 102, 103 are to be deployed in advance in authorized _ keys files of the internet terminal server 105, the user terminal devices 101, 102, 103 initiate public key authentication requests, the internet terminal server 105 generates a random authentication code (random num) and encrypts and transmits the random authentication code (pub _ key) to the user terminal devices 101, 102, 103 using the private key (pub _ key), and then the user terminal devices 101, 102, 103 decrypt the random authentication code (random num) using the private key (pri _ key) and return the random authentication code (random num) to the internet terminal server 105, and the random code matching is successful, i.e. authentication.
Message interaction for SSH
Generally, after successful authentication, the internet terminal server 105 randomly generates a symmetric key (key) and sends the key to the user terminal device 101, 102, 103 for subsequent message encryption and decryption
SSL/TLS
A common practical application is https, where the asymmetric key for the negotiation authentication phase is generated by the internet terminal server 105, and the public key (pub _ key) submits the certificate (Cert) which is signed by CA and acquired, the user terminal equipment 101, 102, 103 initiates a service request, the interconnection terminal server 105 sends the deployment certificate (Cert) to the user terminal equipment 101, 102, 103, the user terminal equipment 101, 102, 103 searches for the certificate CA, and verifying the authenticity of the certificate and decrypting the public key (pub _ key) in the certificate by using the public key (pub _ key) acquired from the CA self-signed certificate, then encrypting the message by using the public key (pub _ key) and sending the message to the internet terminal server 105 for negotiation authentication, wherein the encrypted message can be decrypted by the corresponding private key (pri _ key) in the internet terminal server 105, and then the negotiated symmetric secret key (key) is used for encryption and decryption in the subsequent message interaction.
Certificate authentication of user terminal devices 101, 102, 103
Similar to the public key authentication of SSH, the difference is that the public key of the user terminal device 101, 102, 103 is verified by sending a signed certificate to the internet terminal server 105, i.e. the required asymmetric key is generated by the user terminal device 101, 102, 103, and the public key (pub _ key) submits the CA to pick up the signed certificate (Cert), the user terminal device 101, 102, 103 initiates an authentication request and sends the certificate (Cert) to the internet terminal server 105, and the internet terminal server 105 verifies the certificate (Cert) and extracts the public key (pub _ key).
According to the method for realizing the safe human-computer interaction service, various computer terminals in the system are effectively connected through the remote interconnection terminal, and the close interconnection of people and objects is realized. The limit of objects in the space is thoroughly eliminated on the premise of ensuring information safety, and the improvement of the working quality and efficiency brought by man-machine interconnection is fully exerted.
Fig. 3 schematically illustrates a system framework diagram of a secure human-computer interaction service implementation method and apparatus in an exemplary embodiment of the present disclosure.
As illustrated in fig. 3, the system framework may include: the application layer is located in the user terminal devices 101, 102 and 103 and is used for providing a reservation platform or app for the staff of the power grid to apply for access; a client-oriented APP can be developed. And after the user information safety verification, the video signal acquired by the sensing layer terminal is displayed, and meanwhile, the operation data stream of a user keyboard and a mouse is sent to the sensing layer terminal through the Internet of things management center.
The platform layer may be located in the internet terminal server 105, and is used for providing security authentication, user management and other functions; the method mainly starts from two aspects of safe login authentication and safe information transmission. And in a safe login verification mode, a user inputs an account password through an APP to log in a platform layer internet of things management center, the management center sends a request to a specific remote interconnection terminal according to the account, and the terminal sends a verification code to a user mobile phone after receiving the request to confirm whether to start login. The video signal flow and the operation signal flow required by the man-machine interconnection service are completely independently communicated and transmitted in a one-way mode in a safety information transmission mode, and the possibility of background hijack control is avoided. Meanwhile, the Internet of things management center and the interconnection terminal carry out double check on the operation signal flow, only the displacement click quantity of a mouse and the key information of a keyboard are identified in principle, and the possibility of network attack by implanting malicious code information is fundamentally solved.
The sensing layer may be located in the internet terminal server 105 for final authentication and will communicate with the intranet data. And a sensing layer develops a set of remote interconnection terminals. Mainly realizes the functions of sending and receiving: the sending end is responsible for sending computer video display signals to the platform layer data center, and the receiving end is responsible for sending keyboard key signals and mouse operation signals received by the platform layer internet of things management center to the computer in a one-way mode through the usb interface.
Fig. 4 schematically shows a flowchart of a secure human-computer interaction service implementation method in an exemplary embodiment of the present disclosure. The flow shown in fig. 4 is a detailed description of the flow shown in fig. 2.
As shown in fig. 4, in S402, a control instruction is generated at the user terminal.
In S404, the control command is sent to the internet terminal server.
In S406, security is verified.
In S408, the command after the verification is passed is transmitted to the intranet server.
In S410, the intranet server generates response information.
In S412, the internet terminal server acquires video data including the response information.
In S414, the video data is transmitted to the user side.
According to the method for realizing the safe human-computer interaction service, an innovative design is introduced from a sensing layer, a platform layer and an application layer of the power internet of things, and the point-to-point safe human-computer interaction service is realized on the premise of keeping the existing safety protection system of the national network. And the remote interconnection terminal is used for effectively connecting various computer terminals in the system, so that the close interconnection of people and objects is realized. The limit of objects in the space is thoroughly eliminated on the premise of ensuring information safety, and the improvement of the working quality and efficiency brought by man-machine interconnection is fully exerted.
Corresponding to the method embodiment, the disclosure also provides a method and a device for implementing the secure human-computer interaction service, which can be used for executing the method embodiment.
Fig. 5 is a block diagram schematically illustrating an apparatus for implementing a secure human-computer interaction service in an exemplary embodiment of the disclosure. As illustrated in fig. 5, the human-computer interaction device may include: the system comprises an instruction module 502, a response module 504, a presentation module 506, a video module 508 and a sending module 510. The human-computer interaction device may further include: a verification module 512.
The instruction module 502 is used for acquiring a control instruction from a user side; can include the following steps: obtaining mouse operation actions by a user side to generate the control instruction; the amount of mouse displacement clicks may be identified, for example, to generate the control command. Specifically, the control command can be generated by an event triggered on the service platform of the user side when the mouse is clicked. Specifically, the mouse displacement click event can be acquired through the JS language.
The response module 504 is configured to process the control instruction at the server and generate response information; can be for example: the server in the intranet processes the control instruction; generating response data according to the control instruction; and converting the response data into displayable response information.
The display module 506 is used for the server to display the response information in a display;
the video module 508 is configured to obtain a page of the display in real time, and generate video data; and
the sending module 510 is configured to send the video data to the user side in response to the control instruction. Can be for example: compressing the video data based on a transmission key; and sending the compressed video data to the user side to respond to the control instruction.
The verification module 512 is configured to perform security verification on the user side by means of password verification; and acquiring a control instruction by the user terminal user side after the security verification is passed.
According to the safe human-computer interaction service implementation device, various computer terminals in the system are effectively connected through the remote interconnection terminal, and close interconnection between people and objects is achieved. The limit of objects in the space is thoroughly eliminated on the premise of ensuring information safety, and the improvement of the working quality and efficiency brought by man-machine interconnection is fully exerted.
Since the functions of the device have been described in detail in the corresponding method embodiments, the disclosure is not repeated herein.
Fig. 6 schematically shows a block diagram of a human-computer interaction system in an exemplary embodiment of the disclosure. As shown in fig. 6, a user terminal 602, a service terminal 604, and an interconnection terminal 606.
The user side 602 is used for producing control instructions;
the server 604 is configured to process the control instruction, generate response information, and display the response information on a display; and
the interconnection terminal 606 is used for acquiring a control instruction from a user side; acquiring a page of the display in real time to generate video data; and sending the video data to the user side to respond to the control instruction.
According to the method for realizing the safe human-computer interaction service, various computer terminals in the system are effectively connected through the remote interconnection terminal, and the close interconnection of people and objects is realized. The limit of objects in the space is thoroughly eliminated on the premise of ensuring information safety, and the improvement of the working quality and efficiency brought by man-machine interconnection is fully exerted.
For example, when business layer personnel develop and expand project survey on site, various information such as a regulation and control system, a production system, a marketing system and the like can be called, and an optimized project is provided for a client; when the energy use service promotion is carried out, the contents such as the monthly electricity use condition, the electricity fee expenditure condition, the implementation effect of a typical scheme and the like of a user are called, and more persuasive data are provided for a client; when the field fault first-aid repair is carried out, information such as a topological relation of equipment of a PMS system, remote line measurement of a scheduling system, an intelligent public transformer monitoring system, a power utilization information acquisition system and the like is called in real time, and more accurate and complete work instructions are made for first-aid repair team members. Meanwhile, the personnel in each management layer need to receive and transmit important files during the outgoing office, and the emergency deployment related work and the like can also enter the personal exclusive office state through the interconnection service.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
In an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 200 according to this embodiment of the invention is described below with reference to fig. 7. The electronic device 200 shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 7, the electronic device 200 is embodied in the form of a general purpose computing device. The components of the electronic device 200 may include, but are not limited to: at least one processing unit 210, at least one memory unit 220, a bus 230 connecting different system components (including the memory unit 220 and the processing unit 210), a display unit 240, and the like.
Wherein the storage unit stores program code executable by the processing unit 210 to cause the processing unit 210 to perform the steps according to various exemplary embodiments of the present disclosure described in the above-mentioned electronic prescription flow processing method section of the present specification. For example, the processing unit 210 may perform the steps as shown in fig. 2 and 4.
The memory unit 220 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)2201 and/or a cache memory unit 2202, and may further include a read only memory unit (ROM) 2203.
The storage unit 220 may also include a program/utility 2204 having a set (at least one) of program modules 2205, such program modules 2205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 230 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 200 may also communicate with one or more external devices 300 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 200, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 200 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 250. Also, the electronic device 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 260. The network adapter 260 may communicate with other modules of the electronic device 200 via the bus 230. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 200, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above method according to the embodiments of the present disclosure.
The software product may employ any combination of one or more computer-readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The one or more computer readable media carry one or more programs which, when executed by the apparatus, cause the computer readable media to perform the functions of: acquiring a control instruction from a user side; the server side processes the control instruction and generates response information; the server displays the response information in a display; acquiring a page of the display in real time to generate video data; and sending the video data to the user side to respond to the control instruction.
Furthermore, the above-described figures are merely schematic illustrations of processes involved in methods according to exemplary embodiments of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A method for realizing safe human-computer interaction service is characterized by comprising the following steps:
acquiring a control instruction from a user side;
the server side processes the control instruction and generates response information;
the server displays the response information in a display;
acquiring a page of the display in real time to generate video data; and
and sending the video data to the user side to respond to the control instruction.
2. The method for implementing secure human-computer interaction service of claim 1, wherein the obtaining of the control command by the user side comprises:
obtaining mouse operation actions by a user side to generate the control instruction; and/or
And acquiring the keyboard operation action by the user side to generate the control instruction.
3. The method for implementing secure human-computer interaction service of claim 1, wherein obtaining the control command from the user side further comprises:
and acquiring the control instruction in a one-way transmission mode through a universal serial bus interface.
4. The method for implementing secure human-computer interaction service of claim 1, wherein before the obtaining of the control command by the user side, the method further comprises:
performing security verification on the user side in a password verification mode;
and acquiring a control instruction by the user terminal user side after the security verification is passed.
5. The method for implementing secure human-computer interaction service of claim 1, wherein the step of processing the control command by the server and generating the response information comprises the steps of:
the server in the intranet processes the control instruction;
generating response data according to the control instruction; and
and converting the response data into displayable response information.
6. The method for implementing secure human-computer interaction service according to claim 1, wherein before the server processing the control command, the method further comprises:
and the server side verifies the control instruction in a double verification mode.
7. The method for implementing secure human-computer interaction service of claim 1, wherein sending the video data to the user side in response to the control instruction comprises:
compressing the video data based on a transmission key; and
and sending the compressed video data to the user side to respond to the control instruction.
8. The utility model provides a safe type human-computer interaction service realizes device which characterized in that includes:
the instruction module is used for acquiring a control instruction from a user side;
the response module is used for processing the control instruction by the server and generating response information;
the display module is used for displaying the response information in a display by the server;
the video module is used for acquiring a page of the display in real time and generating video data; and
and the sending module is used for sending the video data to the user side so as to respond to the control instruction.
9. The apparatus of claim 8, further comprising:
the authentication module is used for carrying out security authentication on the user side in a password authentication mode; and acquiring a control instruction by the user terminal user side after the security verification is passed.
10. A human-computer interaction system, comprising:
the user side is used for producing the control command;
the server is used for processing the control instruction, generating response information and displaying the response information in a display; and
the interconnection terminal is used for acquiring the control instruction by the user side; acquiring a page of the display in real time to generate video data; and sending the video data to the user side to respond to the control instruction.
CN202011136240.6A 2020-10-22 2020-10-22 Method, device and system for realizing safety type human-computer interaction service Pending CN112468535A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011136240.6A CN112468535A (en) 2020-10-22 2020-10-22 Method, device and system for realizing safety type human-computer interaction service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011136240.6A CN112468535A (en) 2020-10-22 2020-10-22 Method, device and system for realizing safety type human-computer interaction service

Publications (1)

Publication Number Publication Date
CN112468535A true CN112468535A (en) 2021-03-09

Family

ID=74833250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011136240.6A Pending CN112468535A (en) 2020-10-22 2020-10-22 Method, device and system for realizing safety type human-computer interaction service

Country Status (1)

Country Link
CN (1) CN112468535A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931626A (en) * 2010-08-25 2010-12-29 深圳市傲冠软件股份有限公司 Service terminal realizing safe auditing function in remote control process
CN107295312A (en) * 2017-08-10 2017-10-24 上海辰锐信息科技公司 A kind of wireless video safety access system based on SSL VPN
CN107945718A (en) * 2017-12-07 2018-04-20 广州雷烽科技有限公司 A kind of multimedia service management system
CN111191200A (en) * 2019-12-20 2020-05-22 北京淇瑀信息科技有限公司 Page display method and device and electronic equipment
EP3716059A1 (en) * 2017-12-12 2020-09-30 Huawei Technologies Co., Ltd. App remote control method and related devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931626A (en) * 2010-08-25 2010-12-29 深圳市傲冠软件股份有限公司 Service terminal realizing safe auditing function in remote control process
CN107295312A (en) * 2017-08-10 2017-10-24 上海辰锐信息科技公司 A kind of wireless video safety access system based on SSL VPN
CN107945718A (en) * 2017-12-07 2018-04-20 广州雷烽科技有限公司 A kind of multimedia service management system
EP3716059A1 (en) * 2017-12-12 2020-09-30 Huawei Technologies Co., Ltd. App remote control method and related devices
CN111191200A (en) * 2019-12-20 2020-05-22 北京淇瑀信息科技有限公司 Page display method and device and electronic equipment

Similar Documents

Publication Publication Date Title
WO2022206349A1 (en) Information verification method, related apparatus, device, and storage medium
JP6098636B2 (en) Information processing apparatus, information processing system, information processing method, and program
KR101590076B1 (en) Method for managing personal information
US9965645B2 (en) Field level data protection for cloud services using asymmetric cryptography
CN103051600B (en) document access control method and system
CN102546601B (en) The servicing unit of cloud computing terminal for accessing virtual machine
CA3083508A1 (en) Blockchain systems and methods for user authentication
CN103560888B (en) Digital certificate-based unified authentication login method for integrating multiple application systems
CN103227799A (en) Implementing method of unified user management and single sign-on platform based on multiple application systems
CN109347855A (en) Data access method, device, system, Electronic Design and computer-readable medium
US10831754B2 (en) Using metadata to take action on an SMS message on a proprietary system
CN105577677A (en) Remote login method and system based on J2EE
CN104168304A (en) System and method for single-sign-on in virtual desktop infrastructure environment
CN112039826A (en) Login method and device applied to applet terminal
CN106790121A (en) Power system service network
CN102065131A (en) Single-point logging way and logging authentication
CN105324779A (en) Host recovery using a secure store
CN113364587A (en) System, method, device, medium and equipment for processing streaming media data
CN109450925B (en) User authority verification method and device for operation and maintenance of power secondary system and electronic equipment
CN112346803A (en) Remote assistance method, device and system and electronic equipment
US11824942B2 (en) Communication system, information processing apparatus, and information processing method
US20180225479A1 (en) Personal data providing system, personal data providing method, and information processing apparatus
JP2011118853A (en) Server for providing mobile standard template data
CN112468535A (en) Method, device and system for realizing safety type human-computer interaction service
US10664605B2 (en) Interface coordination

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210309

RJ01 Rejection of invention patent application after publication