Secure data interaction method and system
First Claim
Patent Images
1. A secure data interactive method, comprising:
- scanning, by a terminal, an intelligent cipher token in a signal coverage range and obtaining identification information of the intelligent cipher token;
conducting a mutual authentication between the terminal and at least one of a background system server and the intelligent cipher token;
obtaining, by the terminal, user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token; and
storing, by the terminal, the user information into a pre-established current user list;
wherein obtaining by the terminal user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token comprises;
sending, by the terminal, the identification information of the intelligent cipher token and a user information reading request to the background system server;
obtaining, by the background system server, the user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token, after the background system server receives the identification information of the intelligent cipher token and the user information reading request;
obtaining, by the background system server, response information of the user information reading request based on the user information and sending the response information of the user information reading request to the terminal; and
obtaining, by the terminal, the user information based on the response information of the user information reading request, after the terminal receives the response information of the user information reading request;
orsending, by the terminal, a user information reading request to the intelligent cipher token, based on the identification information of the intelligent cipher token;
obtaining, by the intelligent cipher token, pre-stored user information, obtaining response information of the user information reading request based on the pre-stored user information, and sending the response information of the user information reading request to the terminal; and
obtaining, by the terminal, the user information based on the response information of the user information reading request, after the terminal receives the response information of the user information reading request.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are a secure data interactive method and system, the method including: scanning, by a terminal, an intelligent cipher token in a signal coverage range and obtaining identification information of the intelligent cipher token; conducting a mutual authentication between the terminal and a background system server, and/or conducting a mutual authentication between the terminal and the intelligent cipher token; obtaining, by the terminal, user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token; and storing, by the terminal, the user information into a pre-established current user list.
-
Citations
16 Claims
-
1. A secure data interactive method, comprising:
-
scanning, by a terminal, an intelligent cipher token in a signal coverage range and obtaining identification information of the intelligent cipher token; conducting a mutual authentication between the terminal and at least one of a background system server and the intelligent cipher token; obtaining, by the terminal, user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token; and storing, by the terminal, the user information into a pre-established current user list; wherein obtaining by the terminal user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token comprises; sending, by the terminal, the identification information of the intelligent cipher token and a user information reading request to the background system server;
obtaining, by the background system server, the user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token, after the background system server receives the identification information of the intelligent cipher token and the user information reading request;
obtaining, by the background system server, response information of the user information reading request based on the user information and sending the response information of the user information reading request to the terminal; and
obtaining, by the terminal, the user information based on the response information of the user information reading request, after the terminal receives the response information of the user information reading request;
orsending, by the terminal, a user information reading request to the intelligent cipher token, based on the identification information of the intelligent cipher token;
obtaining, by the intelligent cipher token, pre-stored user information, obtaining response information of the user information reading request based on the pre-stored user information, and sending the response information of the user information reading request to the terminal; and
obtaining, by the terminal, the user information based on the response information of the user information reading request, after the terminal receives the response information of the user information reading request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A secure data interactive system, comprising:
- a terminal, a background system server and an intelligent cipher token;
wherein,the terminal is configured to;
scan the intelligent cipher token in a signal coverage range, and obtain identification information of the intelligent cipher token;
conduct a mutual authentication with at least one of the background system server and the intelligent cipher token;
obtain user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token; and
store the user information into a pre-established current user list;when the terminal obtains the user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token by cooperating with the background system server, the terminal is further configured to;
send the identification information of the intelligent cipher token and a user information reading request to the background system server; and
receive response information of the user information reading request sent by the background system server and obtain the user information based on the response information of the user information reading request; and
the background system server is configured to;
receive the identification information of the intelligent cipher token and the user information reading request sent by the terminal, and obtain the user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token; and
obtain the response information of the user information reading request based on the user information, and send the response information of the user information reading request to the terminal;when the terminal obtains the user information corresponding to the intelligent cipher token based on the identification information of the intelligent cipher token by cooperating with the intelligent cipher token, the terminal is further configured to;
send a user information reading request to the intelligent cipher token based on the identification information of the intelligent cipher token;
receive response information of the user information reading request sent by the intelligent cipher token, and obtain the user information based on the response information of the user information reading request; and
the intelligent cipher token is configured to;
obtain pre-stored user information, obtain the response information of the user information reading request based on the pre-stored user information, and send the response information of the user information reading request to the terminal. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
- a terminal, a background system server and an intelligent cipher token;
Specification