Data inspection method and device, computer readable storage medium and electronic equipment

A data inspection and computer program technology, applied in the field of financial technology, can solve problems such as the high error rate of decryption result judgment and the inability to accurately judge the encryption party and decryption party, so as to avoid the large judgment error rate and improve the accuracy

Pending Publication Date: 2022-07-01
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a data inspection method, device, computer-readable storage medium, and electronic equipment, to at least solve the problem of inability to accurately determi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data inspection method and device, computer readable storage medium and electronic equipment
  • Data inspection method and device, computer readable storage medium and electronic equipment
  • Data inspection method and device, computer readable storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032]In the existing related technologies, DES (Data Encryption Standard, data encryption standard) is an encryption and decryption algorithm widely used in the banking industry. The DES algorithm is encrypted in blocks, and every 8 bytes is a block. It supports ECB (Electronic Codebook), CBC (Cipher Block Chaining, ciphertext block chaining), CFB (Cipher Feedback, ciphertext feedback) and OFB. (Output Feedback, output feedback) 4 operation modes, of which the most commonly used is the ECB mode. In the case of encryption, the length of the plaintext is N, then the length of the ciphertext is ((N / 8)+1)*8; in the case of decryption, the length of the ciphertext is N, then the length of the plaintext is ((N / 8)-1) *Between 8 and N. In many cases, ECB and CBC use a PKCS#5 complementing principle. This complementing part is used in the existing algorithm to judge whether the decryption is successful and effective.

[0033] Specifically, the complementing principle of PKCS#5 is: w...

Embodiment 2

[0081] According to an embodiment of the present invention, an embodiment of a data checking apparatus is provided, wherein, figure 2 is a schematic diagram of an optional data checking device according to an embodiment of the present invention, such as figure 2 As shown, the device includes:

[0082] The obtaining module 201 is configured to obtain the verification ciphertext from the target encrypted message sent by the preset platform, wherein the verification ciphertext is the ciphertext obtained after the preset platform encrypts the preset verification plaintext based on the first key, The first key is used to encrypt the first data sent by the preset platform to the terminal device, and the plaintext is verified as a fixed-length character, and is used to verify the first key;

[0083] The comparison module 202 is configured to compare the verification ciphertext with the first target verification ciphertext, wherein the first target verification ciphertext is the ci...

Embodiment 3

[0096] According to another aspect of the embodiments of the present invention, a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to execute the above-mentioned data verification method when running.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data inspection method and device, a computer readable storage medium and electronic equipment. Relates to the field of financial science and technology, and the method comprises the steps: obtaining a test ciphertext from a target encrypted message sent by a preset platform, the test ciphertext being a ciphertext obtained after the preset platform encrypts a preset test plaintext based on a first key, and the test plaintext being a character with a fixed length; the inspection ciphertext is compared with a first target inspection ciphertext, and the first target inspection ciphertext is a ciphertext obtained after the inspection plaintext is encrypted based on the current key; and when the test ciphertext is the same as the first target test ciphertext, determining that the current key is the same as the first key. According to the method and the device, the technical problem that whether the secret keys between the encryption party and the decryption party are the same or not cannot be accurately judged due to high judgment error rate of the decryption result in the prior art is solved.

Description

technical field [0001] The present invention relates to the field of financial technology, and in particular, to a data verification method, an apparatus, a computer-readable storage medium, and an electronic device. Background technique [0002] With the rapid development of science and technology, communication between partners is ubiquitous in various industry systems (such as commercial systems, etc.), and care is generally carried out through the Internet or dedicated lines. In order to maintain the security of communication information, it is necessary to encrypt communication messages. means. [0003] The basic process of data encryption is to process the original plaintext file or data according to a certain algorithm information, making it an unreadable piece of code called "ciphertext", and this ciphertext can only be obtained after entering the corresponding key. Display the original content, so as to achieve the purpose of protecting the data from being stolen a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/06H04L9/0861
Inventor 徐忠黄敬埕程海峰冯晓华
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products