Data tamper-proofing method, system and related device

A tamper-proof, data technology, applied in the direction of digital data protection, network data retrieval, other database retrieval, etc., can solve problems such as easy loss, and achieve the effect of reducing phishing

Pending Publication Date: 2020-12-08
杭州安恒信息安全技术有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But obviously, it is difficult to achieve non-real-time round robin, otherwise it will cause great performance consumption, and there is a time difference between being tampered with and discovering the tampering. During this time difference period, it is easy to cause losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data tamper-proofing method, system and related device
  • Data tamper-proofing method, system and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0043] At present, there are endless ways to attack web pages or network data by tampering, mainly referring to application layer hijacking. Compared with kernel mode hijacking, application layer hijacking refers to hijacking at the RING3 layer. The form of tampering includes phishing and changing links, etc. Phishing (Phishing, similar to the English...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data tamper-proofing method, which comprises the steps of obtaining a rewriting function corresponding to a target file when the target file is rewritten; determining a file path of the rewriting function; performing rule matching on the file path, and judging whether the rewriting function is hijacking operation; and if yes, refusing the rewriting of the target file. According to the invention, when the target file is rewritten, the file path of the rewriting function used for rewriting is obtained, rule matching is conducted on the file path to judge whether the rewriting function is hijacking operation, then whether the rewriting is hijacking operation is determined, and once it is determined that the rewriting operation is hijacking operation, rewriting of thetarget file is refused, so that the problem of common webpage tamper-proofing can be effectively solved so as to reduce malicious operation behaviors such as phishing, illegal content, fraud, dark link and the like. The invention further provides a data tamper-proofing system, a computer readable storage medium and electronic equipment, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the field of network data security, in particular to a data tamper-proof method, system and related devices. Background technique [0002] Web page tampering is a method commonly used by hackers, and some bad information often appears on the tampered web page. The current anti-tampering of webpage files mainly relies on round-robin scanning, that is, obtaining a hash value for each webpage through a digest algorithm. By regularly polling all web pages, comparing the new and old hash values, if they are different, it is found that the web page has been tampered with, a corresponding alarm is generated, and further recovery measures are taken. But obviously, round robin is difficult to achieve non-real-time, otherwise it will cause great performance consumption, and there is a time gap between the tampering and the discovery of the tampering. During this time difference, it is easy to cause losses. [0003] Therefore,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/958G06F21/64
CPCG06F21/64G06F16/958
Inventor 胡冬李华生
Owner 杭州安恒信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products