Data tamper-proofing method and device, computer equipment and storage medium

A tamper-proof, computer program technology, applied in the field of data processing, can solve problems such as final data mismatch and poor database reliability, and achieve the effect of improving reliability

Active Publication Date: 2019-04-02
KINGDEE SOFTWARE(CHINA) CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to address the technical problem that the data in the ERP database in the above-mentioned traditional scheme may be tampered with, causing the original settlement data recorded in the database to not match the final data at the time of payment, resulting in poor reliability of the ERP system database. A data tamper-proof method, device, computer equipment and storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data tamper-proofing method and device, computer equipment and storage medium
  • Data tamper-proofing method and device, computer equipment and storage medium
  • Data tamper-proofing method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0059] The data tamper-proof method provided by this application can be applied to such as figure 1 Shown computer equipment, the computer equipment can be a server, and its internal structure diagram can be as follows figure 1shown. The computer device includes a processor, memory, network interface and database connected by a system bus. Wherein, the processor of the computer device is used to provide calculation and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data temper-proofing method and device, computer equipment and a storage medium. The computer equipment firstly receives target document information including product identification, then obtains first data corresponding to the product identification from a database and finally verifies and signs the target document information according to the first data. A first data encryption packet included in the first data is obtained by carrying out encryption according to original document information, and first signature data is obtained by signing the first data encryption packet, so that double encryption is carried out on the original document information, and the original document information recorded in the database cannot be tampered. Furthermore, the target document information is verified and signed according to the first data, the consistency between settlement data in the original document information recorded in the database and settlement data in the target document information can be guaranteed through the verifying and signing process, and the reliability of the database is greatly improved.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to a data tamper-proof method, device, computer equipment and storage medium. Background technique [0002] Enterprise Resource Planning (ERP for short), that is, ERP system, is a highly integrated system that is applied throughout the company. For example, the financial affairs of an enterprise can record the funds during the operation of the enterprise from the ERP system. . [0003] Generally, in traditional ERP products, enterprise payment and settlement are collected and classified manually or using third-party tools to collect and classify the data at the time of payment and the data at the time of settlement, and then compare the two repeatedly to ensure settlement Correctness and consistency of data and payment data. [0004] However, the data in the ERP database in the above-mentioned traditional solution may be tampered with, so that the original settle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06Q10/06
CPCH04L9/3236H04L9/3247H04L9/3268G06Q10/0631
Inventor 刘浩杨刚
Owner KINGDEE SOFTWARE(CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products