Unlock instant, AI-driven research and patent intelligence for your innovation.
Data interaction method and device for information system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A data interaction and information system technology, applied in the field of data security, can solve the problem of low security of data interaction methods, and achieve the effect of improving security
Active Publication Date: 2015-01-21
BEIJING GUODIANTONG NETWORK TECH CO LTD +1
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] The invention provides a data interaction method and device of an information system, which is used to solve the problem of low security of the data interaction mode of an information system in the prior art
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0021] figure 1 It is a flow chart of the data interaction method of the information system in Embodiment 1 of the present invention.
[0022] In the following, the first server is the upper-level server, and the second server is the lower-level server. Steps 101 to 103 are the process for the user to obtain confidential data from the upper-level server through the lower-level server.
[0023] Step 101: the first server receives the user's data request, and sends the data request and the user's authentication key to the second server;
[0024] Wherein, the above-mentioned authentication key of the user is an authentication key issued by the second server to the first server in advance;
[0025] Step 102: the first server receives the data required by the user and sends it according to the data request after the second server verifies that the authentication key is legal;
[0026] Step 103: the first server presents the data required by the user to the user.
[0027] The fir...
Embodiment 2
[0042] figure 2 It is a structural block diagram of the data interaction device of the information system according to Embodiment 2 of the present invention.
[0043] Such as figure 2 As shown, the device 20 includes the following components:
[0044] The first sending module 21 is configured to send the data request and the user's authentication key to the second server after receiving the user's data request; the user's authentication key is the authentication issued by the second server to the first server in advance key;
[0045] The first receiving module 22 is configured to receive the data required by the user sent according to the data request after the second server verifies that the authentication key is legal;
[0046] The presentation module 23 is used for presenting data to the user.
[0047] Wherein, the above-mentioned device can also periodically replace the authentication key pushed to the second server, based on this, the above-mentioned device also inc...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a data interaction method and device for an information system, and the method and the device are used for solving the problem that the security of the conventional data interaction method for the information system is relatively low in the prior art. The method comprises the following steps that: a first server receives a data request of a user and sends the data request and an authentication key of the user to a second server, wherein the authentication key of the user is an authentication key which is pretransmitted by the second server to the first server; the first server receives data which is required by the user and is sent by the second server according to the data request under the condition that the authentication key is legal; and the first server shows the data required by the user to the user. Compared with the prior art, the data interaction method has the advantage that the security of data interaction of the information system is improved.
Description
technical field [0001] The present invention relates to the field of data security, in particular to a data interaction method and device for an information system. Background technique [0002] At present, the core of most information systems is the organization structure, which is usually displayed as an organization tree, and each organization has a subordinate relationship between the upper and lower levels. The traditional information system adopts a centralized storage method for data, that is, the data of each unit is stored in the database of the same server. The lower-level users can log in to the upper-level system by logging in to the system with user authority, and then obtain the data in the upper-level system. Specifically, after receiving the user's data request, the upper-level system extracts the unit's data requested by the user from the full database according to the user's authority. This method has low security for information systems with high confide...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.