A method and system for verifying storage integrity of target data
A technology for target data and integrity, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve problems such as consuming large computing resources, and achieve the effect of ensuring privacy, confidentiality, and avoiding hidden dangers of information leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0022] see figure 1 , the method for verifying the storage integrity of the target data provided by the embodiment of the present invention includes the following steps:
[0023] S1. Process the target data to generate a message authentication code list, the message authentication code list includes a mark that can uniquely identify the target data, a key, and a key to calculate the target data The obtained first message authentication code;
[0024] Usually, different users will store a large amount of data in the cloud server. If you want to verify the integrity of specific data according to th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
