Unlock instant, AI-driven research and patent intelligence for your innovation.

Data interaction method and device for information system

A data interaction and information system technology, applied in the field of data security, can solve the problem of low security of data interaction methods, and achieve the effect of improving security

Active Publication Date: 2015-01-21
BEIJING GUODIANTONG NETWORK TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention provides a data interaction method and device of an information system, which is used to solve the problem of low security of the data interaction mode of an information system in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data interaction method and device for information system
  • Data interaction method and device for information system
  • Data interaction method and device for information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] figure 1 It is a flow chart of the data interaction method of the information system in Embodiment 1 of the present invention.

[0022] In the following, the first server is the upper-level server, and the second server is the lower-level server. Steps 101 to 103 are the process for the user to obtain confidential data from the upper-level server through the lower-level server.

[0023] Step 101: the first server receives the user's data request, and sends the data request and the user's authentication key to the second server;

[0024] Wherein, the above-mentioned authentication key of the user is an authentication key issued by the second server to the first server in advance;

[0025] Step 102: the first server receives the data required by the user and sends it according to the data request after the second server verifies that the authentication key is legal;

[0026] Step 103: the first server presents the data required by the user to the user.

[0027] The fir...

Embodiment 2

[0042] figure 2 It is a structural block diagram of the data interaction device of the information system according to Embodiment 2 of the present invention.

[0043] Such as figure 2 As shown, the device 20 includes the following components:

[0044] The first sending module 21 is configured to send the data request and the user's authentication key to the second server after receiving the user's data request; the user's authentication key is the authentication issued by the second server to the first server in advance key;

[0045] The first receiving module 22 is configured to receive the data required by the user sent according to the data request after the second server verifies that the authentication key is legal;

[0046] The presentation module 23 is used for presenting data to the user.

[0047] Wherein, the above-mentioned device can also periodically replace the authentication key pushed to the second server, based on this, the above-mentioned device also inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data interaction method and device for an information system, and the method and the device are used for solving the problem that the security of the conventional data interaction method for the information system is relatively low in the prior art. The method comprises the following steps that: a first server receives a data request of a user and sends the data request and an authentication key of the user to a second server, wherein the authentication key of the user is an authentication key which is pretransmitted by the second server to the first server; the first server receives data which is required by the user and is sent by the second server according to the data request under the condition that the authentication key is legal; and the first server shows the data required by the user to the user. Compared with the prior art, the data interaction method has the advantage that the security of data interaction of the information system is improved.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a data interaction method and device for an information system. Background technique [0002] At present, the core of most information systems is the organization structure, which is usually displayed as an organization tree, and each organization has a subordinate relationship between the upper and lower levels. The traditional information system adopts a centralized storage method for data, that is, the data of each unit is stored in the database of the same server. The lower-level users can log in to the upper-level system by logging in to the system with user authority, and then obtain the data in the upper-level system. Specifically, after receiving the user's data request, the upper-level system extracts the unit's data requested by the user from the full database according to the user's authority. This method has low security for information systems with high confide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 王奔王林
Owner BEIJING GUODIANTONG NETWORK TECH CO LTD