Data interaction method and device for information system
A data interaction and information system technology, applied in the field of data security, can solve the problem of low security of data interaction methods, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0021] figure 1 It is a flow chart of the data interaction method of the information system in Embodiment 1 of the present invention.
[0022] In the following, the first server is the upper-level server, and the second server is the lower-level server. Steps 101 to 103 are the process for the user to obtain confidential data from the upper-level server through the lower-level server.
[0023] Step 101: the first server receives the user's data request, and sends the data request and the user's authentication key to the second server;
[0024] Wherein, the above-mentioned authentication key of the user is an authentication key issued by the second server to the first server in advance;
[0025] Step 102: the first server receives the data required by the user and sends it according to the data request after the second server verifies that the authentication key is legal;
[0026] Step 103: the first server presents the data required by the user to the user.
[0027] The fir...
Embodiment 2
[0042] figure 2 It is a structural block diagram of the data interaction device of the information system according to Embodiment 2 of the present invention.
[0043] Such as figure 2 As shown, the device 20 includes the following components:
[0044] The first sending module 21 is configured to send the data request and the user's authentication key to the second server after receiving the user's data request; the user's authentication key is the authentication issued by the second server to the first server in advance key;
[0045] The first receiving module 22 is configured to receive the data required by the user sent according to the data request after the second server verifies that the authentication key is legal;
[0046] The presentation module 23 is used for presenting data to the user.
[0047] Wherein, the above-mentioned device can also periodically replace the authentication key pushed to the second server, based on this, the above-mentioned device also inc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
