Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-tamper verification method for key data in database

A technology of key data and inspection methods, applied in the fields of electrical digital data processing, special data processing applications, instruments, etc., can solve problems such as inability to detect and monitor core data, and achieve the effect of ensuring accuracy

Inactive Publication Date: 2009-07-15
SUMAVISION TECH CO LTD
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The present invention aims to provide a tamper-proof inspection method for key database data, which can solve the problem that the existing technology cannot detect and monitor the tampered core data when the core data stored in the database server is tampered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-tamper verification method for key data in database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be described in detail below with reference to the accompanying drawings and in combination with embodiments.

[0020] figure 1 It shows a flow chart of a tamper-proof inspection method for database key data according to an embodiment of the present invention, including the following steps:

[0021] S102, setting a check code in the record of the database, the check code is generated according to the key data in the record;

[0022] S104, when checking, generate the ciphertext of the key data;

[0023] S106, comparing the ciphertext with the check code, and determining whether the key data has been tampered with according to the comparison result.

[0024] The above-mentioned embodiment generates ciphertext by combining the key data with the key configured in the system, compares the ciphertext with the check code generated in the same way stored in the database, and determines whether the key data has been tampered with according to the com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a tamper-proofing test method of key data in the database, which comprises following steps: arranging a check code in the record of the database, wherein the check code is generated according to the key data in the record; generating a cipher text of the key data when testing; comparing the cipher text and the check code, and determining if the key data is tampered with according to the comparing result. In the state of guaranteeing the safety of the system key and after the database is externally tampered with, the external attack which tampers with the data can't obtain a key value and can't fake the check code matched with the core data, thereby the tamper-proofing test method of the invention can fundamentally guarantee the accuracy of the data, and overcome theproblems that the prior art is the tamper-proofing scheme aiming at web page, and when the core data stored in the database server is tampered with, the prior art can't test and monitor the tampered core data.

Description

technical field [0001] The invention relates to the field of radio and television, in particular to a tamper-proof checking method for key data in a database. Background technique [0002] With the continuous development of computer technology and the popularization of the Internet, information technology has extended to every corner of our work and life. In information technology, a large amount of stored data is the main basis for the realization of various system functions. When these data are wrong, the impact is very serious, especially if the sensitive data of financial companies such as banks are damaged and Tampering, then the loss is incalculable. Therefore, in the face of the threats of various human factors such as hackers, information theft, virus Trojan horses, and employee malfeasance, a technology that can ensure data security is very much needed. [0003] The existing technical solutions are all aimed at anti-tampering solutions for pages, which are mainly ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/00
Inventor 杨子彬
Owner SUMAVISION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products