Verification method of contract data and its network and electronic equipment

A verification method and contract technology, applied in the field of data security, can solve problems such as files being easily modified maliciously, files being insecure, and the interests of both parties being damaged.

Pending Publication Date: 2019-03-15
YGSOFT INC
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this centralized storage method will make the files easy to be modified maliciously, which will bring greater insecurity to the files, especially for some files with high security requirements, such as contract documents
If these contract documents are maliciously modified by criminals by invading the server, but the relevant personnel of the files cannot know the modification, it is easy to cause damage to the interests of both parties to the contract

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method of contract data and its network and electronic equipment
  • Verification method of contract data and its network and electronic equipment
  • Verification method of contract data and its network and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The solutions of the embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0020] In the following description, for purposes of illustration rather than limitation, specific details, such as specific system architectures, interfaces, and techniques, are set forth in order to provide a thorough understanding of the present application.

[0021] The terms "system" and "network" are often used interchangeably herein. The term "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and there exists alone B these three situations. In addition, the character " / " in this article generally indicates that the contextual objects are an "or" relationship.

[0022] Blockchain technology is a new type of distributed data organization method and calcu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a method for verifying contract data and a network and electronic equipment thereof. The method comprises the following steps: the verification node obtains a first digital fingerprint of the target contract data stored in the block chain; Acquiring the target contract data stored by the contract storage node, and calculating a second digital fingerprint using thetarget contract data; Judging whether the first digital fingerprint and the second digital fingerprint are consistent, and if so, determining that the target contract data in the contract storage node has not been tampered with. The scheme can avoid the contract being tampered with maliciously and guarantee the reliability of the contract data.

Description

technical field [0001] The application relates to the field of data security, in particular to a contract data verification method and its network and electronic equipment. Background technique [0002] At present, various documents such as contract documents exist in two forms, one is paper form, which is not easy to store, and paper documents are easy to be lost or damaged; the other is electronic form, which is more convenient to store and not easy to store. lost. Based on the obvious advantages of electronic documents, document digitization is a form that is increasingly widely used. [0003] Today, electronic files are mainly stored in a centralized manner, that is, files are stored centrally in one or more servers. However, this centralized storage method will make the files easy to be modified maliciously, which will bring greater insecurity to the files, especially for some files with high security requirements, such as contract files. If these contract documents ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06Q40/04
CPCG06F21/645G06Q40/04
Inventor 鲁静程晗蕾向智宇陈利浩
Owner YGSOFT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products