Data tamper-proofing method and system based on abstract algorithm

A digest algorithm and anti-tampering technology, applied in the field of network security, can solve problems such as loss, reduce storage space, improve system security, and increase algorithm complexity.

Active Publication Date: 2020-12-29
福建天晴在线互动科技有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Data security is an issue that must be paid attention to in program design. If the data is maliciously tampered with, it will cause irreparable losses, such as the balance of the bank account, the wallet amount of the shopping mall shopping system, the order status of the payment order system, etc., the program is in When reading database data, the default data is correct and safe, but if some key data and important data are involved, we should consider data security. We not only need to ensure the security of database permissions, but also assume that How can our program ensure the security again after the database permissions are invaded and data tampering occurs?

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data tamper-proofing method and system based on abstract algorithm
  • Data tamper-proofing method and system based on abstract algorithm
  • Data tamper-proofing method and system based on abstract algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below in conjunction with the accompanying drawings.

[0031] see figure 1 Shown, a kind of data tamper-proof method based on summary algorithm of the present invention, described method comprises the following steps:

[0032] Step 1. Extract the fields in the data table that need to participate in the generation of digital certificates, and concatenate the fields to obtain the original string;

[0033] Step 2. Set a key md5Key, and splice the original character string with the key md5Key to form a new character string;

[0034] Step 3. Perform the MD5 digest algorithm on the new string, and then start to generate a digital certificate, which is a number within 11 digits;

[0035] The step 3 is further specifically:

[0036] Step 3.1: Perform MD5 with the new string to obtain a byte array with a length of 16;

[0037] Step 3.2: Circularly accumulate the first 13 byte arrays to obtain a first value between 13 and 3328. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data tamper-proofing method based on an abstract algorithm, and the method comprises the steps: 1, extracting fields, needing to participate in the generation of a digital certificate, in a data table, and carrying out the character string splicing of the fields, and obtaining an original character string; 2, setting a secret key md5Key, and splicing the original characterstring and the secret key md5Key to form a new character string; 3, enabling the new character string to be subjected to an MD5 digest algorithm, and generating a digital certificate, wherein the digital certificate is a number within 11 bits; 4, generating a digital certificate, and storing the digital certificate into a digital certificate field of the current data table; 5, when the delivery operation is carried out, repeatedly executing the steps 1 to 3, comparing the newly generated digital certificate with the digital certificate field stored in the data table, if the newly generated digital certificate is consistent with the digital certificate field stored in the data table, legitimate, allowing the delivery, and if the newly generated digital certificate is inconsistent with thedigital certificate field, not legitimate and not allowing the operation. Safety guarantee is provided for the system.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data tamper-proof method and system based on a digest algorithm. Background technique [0002] Data security is an issue that must be paid attention to in program design. If the data is maliciously tampered with, it will cause irreparable losses, such as the balance of the bank account, the wallet amount of the shopping mall shopping system, the order status of the payment order system, etc., the program is in When reading database data, the default data is correct and safe, but if some key data and important data are involved, we should consider data security. We not only need to ensure the security of database permissions, but also assume that How can our program ensure security again after the database permissions are invaded and data tampering occurs. Contents of the invention [0003] In order to overcome the above problems, the purpose of the present invention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 刘德建叶伟郑彬岳万恕陈宏展
Owner 福建天晴在线互动科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products