Data tamper-proofing method and system

A tamper-proof, data technology, applied in the field of data security, can solve problems such as data information being easily tampered with

Inactive Publication Date: 2017-04-19
PHICOMM (SHANGHAI) CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a data tamper-proof method and system to solve the problem in the prior art that transmitted data information is easily tampered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data tamper-proofing method and system
  • Data tamper-proofing method and system
  • Data tamper-proofing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0152] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0153] A kind of data anti-tampering method provided by the present invention, embodiment 1 is as follows figure 1 shown, including steps:

[0154] S100: After segmenting the original data information before sending, perform hashing using a pre-stored hash function to obtain an original data information verification string;

[0155] S200 sending the original data and the original data information verification string at the same time;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data tamper-proofing method comprising the following steps of after original data information is segmented before sending, hashing the segmented information by using a pre-stored hash function to acquire an original data information verification string; synchronously sending the original data and the original data information verification string when in sending, synchronously receiving the sent data information and original data information verification string when in receiving; after the data information and the original data information verification string are received, segmenting the received data information, and then hashing the segmented information by using the pre-stored hash function to acquire a received data information verification string; and judging whether the received data information verification string is accordant with the original data information verification string by comparison, if yes, determining that the received data information is not tampered, and otherwise, determining that the received data information is tampered. The invention also provides a data tamper-proofing system. According to the method and the system provided by the invention, the difficulty of tampering the data by a third party is greatly increased, a collision attack from the third party with the aid of a rainbow table is effectively prevented, data falsification of a user is prevented, and data transmission security is ensured.

Description

technical field [0001] The invention belongs to the field of data security, in particular to a data tamper-proof method and system. Background technique [0002] Important data in an open network environment must be protected from tampering when it is transmitted to others, such as digital signatures and password verification. At present, the anti-tampering algorithm is to calculate the data with a one-way hash algorithm (also called a digest algorithm, and the commonly used digest algorithms are MD5 and SHA1), and then publish the hash value publicly. Before using the data, the data user also performs one-way hash calculation on the data, and compares the obtained value (also called the information summary of the original data) with the hash value disclosed by the publisher to verify whether the data has been tampered with . The data is slightly different, and its hash value is always different, and the information summary of the same data must be consistent, so the one-w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 仇亚东
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products