CN107395580B - Data verification method and device - Google Patents

Data verification method and device Download PDF

Info

Publication number
CN107395580B
CN107395580B CN201710556591.4A CN201710556591A CN107395580B CN 107395580 B CN107395580 B CN 107395580B CN 201710556591 A CN201710556591 A CN 201710556591A CN 107395580 B CN107395580 B CN 107395580B
Authority
CN
China
Prior art keywords
data
sending
dynamic
factor
check
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710556591.4A
Other languages
Chinese (zh)
Other versions
CN107395580A (en
Inventor
高锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yihua Computer Co Ltd
Shenzhen Yihua Time Technology Co Ltd
Shenzhen Yihua Financial Intelligent Research Institute
Original Assignee
Shenzhen Yihua Computer Co Ltd
Shenzhen Yihua Time Technology Co Ltd
Shenzhen Yihua Financial Intelligent Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yihua Computer Co Ltd, Shenzhen Yihua Time Technology Co Ltd, Shenzhen Yihua Financial Intelligent Research Institute filed Critical Shenzhen Yihua Computer Co Ltd
Priority to CN201710556591.4A priority Critical patent/CN107395580B/en
Publication of CN107395580A publication Critical patent/CN107395580A/en
Application granted granted Critical
Publication of CN107395580B publication Critical patent/CN107395580B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The embodiment of the invention discloses a data verification method and a data verification device. The method comprises the following steps: the receiver randomly generates a dynamic check factor and sends the dynamic check factor to the sender; the sender extracts the data characteristics of the data to be transmitted; determining a check code according to the data characteristics and the dynamic check factor; the sender acts the check code on the data to be transmitted to form sending data, and the sending data is sent to the receiver, wherein the sending data comprises the data characteristics; and the receiver checks whether the sending data is legal or not according to the data characteristics contained in the sending data and the dynamic verification factor, and if so, determines the data to be transmitted according to the sending data. The technical scheme provided by the embodiment of the invention can realize the effects of improving the data transmission safety and improving the flexibility of a data verification mechanism.

Description

Data verification method and device
Technical Field
The embodiment of the invention relates to the technical field of data transmission safety, in particular to a data verification method and device.
Background
The service command and the data transmission are transmitted between different modules, a strict checking mechanism is required, and the situations that an error command is executed or error data is transmitted and the like can be avoided.
At present, ATMs are becoming more and more common in people's daily life. Because the ATM equipment supports more service functions, more commands and data such as man-machine interaction and the like, and the abnormal data transmission condition is inevitable in the communication process, the requirement for data verification is extremely high. In the conventional scheme, a CRC (Cyclic Redundancy Check) Check is usually performed on transmission data, and then whether the data is correct is determined by comparing whether a CRC calculation value and a Check value are matched.
However, the CRC check only checks the data by a calculation method agreed in advance by both parties, which easily causes the check rule to be broken by a third party, has a potential safety hazard, and cannot ensure the validity of the data; in addition, all data are checked according to a rule, so that the flexibility is poor, and the efficiency is low.
Disclosure of Invention
The embodiment of the invention provides a data verification method and a data verification device, which are used for achieving the effects of improving data transmission safety and improving flexibility of a data verification mechanism.
In a first aspect, an embodiment of the present invention provides a data verification method, where the method includes:
the receiver randomly generates a dynamic check factor and sends the dynamic check factor to the sender;
the sender extracts the data characteristics of the data to be transmitted; determining a check code according to the data characteristics and the dynamic check factor;
the sender acts the check code on the data to be transmitted to form sending data, and the sending data is sent to the receiver, wherein the sending data comprises the data characteristics;
and the receiver checks whether the sending data is legal or not according to the data characteristics contained in the sending data and the dynamic verification factor, and if so, determines the data to be transmitted according to the sending data.
Further, the randomly generating the dynamic verification factor by the receiver and sending the dynamic verification factor to the sender includes:
a sender sends a dynamic check factor acquisition request to a receiver;
the receiver checks the validity of the dynamic check factor acquisition request according to a first preset rule;
and when the dynamic verification factor acquisition request is legal, the receiver randomly generates a dynamic verification factor and sends the dynamic verification factor to the data sender.
Further, the data features include: data type, data organization rules, and data length.
Further, determining a check code according to the data feature and the dynamic check factor specifically includes:
the sender determines a calculation data check formula according to the data type and the dynamic check factor;
and calculating the check code by using the calculation data check formula.
Further, the sending party applies the check code to the data to be transmitted to form sending data, and sends the sending data to the receiving party, where the sending data includes the data characteristics, including:
the sender generates sending frame data according to a second preset rule, wherein the sending frame data comprises: the method comprises the following steps of marking effective frames, data types, data to be transmitted, data organization rules, data lengths and check codes;
and sending the sending frame data to the receiving party.
Further, the receiving side checks whether the sending data is legal or not according to the data characteristics included in the sending data and the dynamic check factor, and if so, determines the data to be transmitted according to the sending data, including:
after receiving the sending frame data, a receiving party acquires the data characteristics contained in the sending frame data, and determines whether the data to be transmitted in the sending frame data meet the standard or not according to a data organization rule in the data characteristics;
if the data characteristics and the dynamic check factors meet the standard, the receiver determines a verification check code according to the data characteristics and the dynamic check factors, and judges whether the verification check code is consistent with the check code;
and if the data of the sending frame is consistent with the data of the sending frame, determining the data to be transmitted from the sending frame data.
Further, after determining the data to be transmitted according to the sending data, the method further includes:
and the receiver returns response data to the sender, and the response data contains a randomly generated dynamic verification factor required by the next verification.
Further, the dynamic verification factor includes a time verification factor.
In a second aspect, an embodiment of the present invention further provides a data verification apparatus, where the apparatus includes:
the dynamic verification factor generation module is integrated on the receiving party and used for randomly generating the dynamic verification factor and sending the dynamic verification factor to the sending party;
the check code determining module is integrated in the sender and used for extracting data characteristics of the data to be transmitted; determining a check code according to the data characteristics and the dynamic check factor;
a sending data generating module, integrated with the sender, configured to apply the check code to the data to be transmitted to form sending data, and send the sending data to the receiver, where the sending data includes the data characteristics;
and the checking module is integrated at the receiving party and used for checking whether the sending data is legal or not according to the data characteristics contained in the sending data and the dynamic checking factor, and if so, determining the data to be transmitted according to the sending data.
Further, the dynamic verification factor generation module includes:
the request receiving unit is used for receiving a dynamic verification factor acquisition request sent by a sender;
the request checking unit is used for checking the validity of the dynamic checking factor acquisition request according to a first preset rule;
and the dynamic verification factor generating unit is used for randomly generating the dynamic verification factor when the dynamic verification factor acquiring request is legal and sending the dynamic verification factor to the data sending party.
The embodiment of the invention generates the dynamic check factor by the receiver before the data transmission is carried out by the sender and the receiver of the data, then determines the check code according to the dynamic check factor and the data characteristics of the data to be transmitted, and sends and receives the data to be transmitted after the check code is acted on the data to be transmitted, so that the receiver can verify the check code and extract the data to be transmitted after the data to be transmitted is verified to be legal, thereby solving the problem that the data can only be verified in a fixed check mode in the prior art and the check mechanism is easy to be broken by a third party, and simultaneously solving the problem that file transmission with lower security level needs to pass through a complex check mechanism no matter what kind of data is adopted in the prior art, thereby increasing the complexity of the data transmission and realizing the improvement of the data transmission security, and the effect of improving the flexibility of the data checking mechanism.
Drawings
Fig. 1 is a flowchart of a data verification method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a data verification method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a data verification apparatus according to a third embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Example one
Fig. 1 is a flowchart of a data verification method according to an embodiment of the present invention, where the data verification method is applicable to a data verification situation, and the data verification method may be executed by a data verification apparatus according to an embodiment of the present invention, where the data verification apparatus may be implemented by software and/or hardware, and may be integrated in a cash transaction device such as an ATM machine.
As shown in fig. 1, the data verification method includes:
and S110, the receiver randomly generates a dynamic check factor and sends the dynamic check factor to the sender.
The receiver and the sender are relative concepts, and if data is sent from A to B, the A is the sender and the B is the receiver. The receiving party can be one end or multiple ends. In the embodiment of the invention, the receiver and the sender can be different modules in the ATM, such as a temporary storage part and a cash box.
The dynamic verification factor randomly generated by the receiver is a non-fixed form of verification factor, and preferably, the dynamic verification factor may be a time verification factor that changes with time. By the arrangement, the check factor between the sender and the receiver can be kept dynamically changed, and is not easy to be simulated by a third party, so that the problem of data stealing occurs.
S120, the sender extracts the data characteristics of the data to be transmitted; and determining a check code according to the data characteristics and the dynamic check factor.
The data characteristics may be characteristics reflecting information of the data itself, such as a data type, and the data type may reflect that the data to be transmitted is instruction data or information data. Before sending data to be transmitted, a sender extracts data characteristics and determines a check code according to the data characteristics and a received dynamic check factor sent by a receiver.
S130, the sender acts the check code on the data to be transmitted to form sending data, and the sending data is sent to the receiver, wherein the sending data comprises the data characteristics.
The check code may act on the data to be transmitted in a plurality of ways, for example, the data to be transmitted is encrypted, the check code is used as an encrypted password, the data to be transmitted may be split and reassembled according to a certain rule, the split and reassembled rule is determined by the check code, and the like, so as to form the transmitted data. The data characteristics are included in the transmission data, and may be encoded into a field in the form of a field and appended to the transmission data, for example.
S140, the receiver checks whether the sending data is legal or not according to the data characteristics contained in the sending data and the dynamic check factor, and if the sending data is legal, the receiver determines the data to be transmitted according to the sending data.
After receiving the sending data, the receiving party can check whether the sending data is legal or not according to the data characteristics and the dynamic check factors contained in the sending data, if so, the data to be transmitted is determined according to the sending data to obtain the original sending instruction or the sending information of the sending party, and if not, the received sending data can not be processed, such as packet loss processing can be directly performed after receiving the data packet.
The specific verification method may be that after receiving the transmission data, the receiver extracts data characteristics in the transmission data, generates a calibration check code according to the data characteristics and a dynamic check factor randomly generated before the receiver, and verifies whether the calibration check code is consistent with a check code in the received transmission data.
The embodiment of the invention generates the dynamic check factor by the receiver before the data transmission is carried out by the sender and the receiver of the data, then determines the check code according to the dynamic check factor and the data characteristics of the data to be transmitted, and sends and receives the data to be transmitted after the check code is acted on the data to be transmitted, so that the receiver can verify the check code and extract the data to be transmitted after the data to be transmitted is verified to be legal, thereby solving the problem that the data can only be verified in a fixed check mode in the prior art and the check mechanism is easy to be broken by a third party, and simultaneously solving the problem that file transmission with lower security level needs to pass through a complex check mechanism no matter what kind of data is adopted in the prior art, thereby increasing the complexity of the data transmission and realizing the improvement of the data transmission security, and the effect of improving the flexibility of the data checking mechanism.
On the basis of the above technical solution, preferably, the randomly generating the dynamic verification factor by the receiving side and sending the dynamic verification factor to the sending side includes: a sender sends a dynamic check factor acquisition request to a receiver; the receiver checks the validity of the dynamic check factor acquisition request according to a first preset rule; and when the dynamic verification factor acquisition request is legal, the receiver randomly generates a dynamic verification factor and sends the dynamic verification factor to the data sender.
The first preset rule may be a rule agreed in advance by both data transmission parties, for example, a specific mark of a specific frame may be used to verify whether the request is legal. Before the receiver randomly generates the dynamic verification factor, the sender sends a request for obtaining the dynamic verification factor to the receiver, and after the receiver receives the request, the validity of the request can be verified by a preset rule. If the request is verified legally, a dynamic verification factor is randomly generated, and if the request is not legal, data transmission with the sender is terminated.
The method has the advantages that before data transmission, when a dynamic verification factor acquisition request is sent to a receiver by a sender, the request is verified, and corresponding processing is carried out according to a verification result, so that the safety of the data transmission is improved, the verification efficiency between the sender and the receiver is improved, and if the request is illegal, the data transmission of the sender and the receiver can be stopped.
On the basis of the above technical solutions, preferably, the data characteristics include: data type, data organization rules, and data length. The data types may include: the security level required by different data types can be different, such as log data, the security level can be set to be lower, and the security level required by command data and information data is higher. The data organization rule may be a mapping relationship with data structures, and different data organization rules may exist for different data structures. The data length may be how much of the character the data occupies. The method has the advantages that when the data features are extracted, the data content can be incompletely read, some feature information in the data can be extracted, so that the method is beneficial to subsequent processing and use, and even can be used for a verification parameter in the verification process of the data, and the stability and the speed of data verification can be improved.
On the basis of the above technical solutions, preferably, determining the check code according to the data characteristic and the dynamic check factor specifically includes: the sender determines a calculation data check formula according to the data type and the dynamic check factor; and calculating the check code by using the calculation data check formula. The calculation data check formula may use f (t) ═ Φ (p (t)), where p (t) is a dynamic check factor, and the calculation data check formula may be different according to different data types, and if the data type is log data, the calculation data check formula may be relatively simple, because the security level required by the log data itself is low, and if the data type is command data or information data, the calculation data check formula may be relatively complex. After determining the calculation data check formula, calculating a check code by using the calculation data check formula.
The method has the advantages that the corresponding calculation data check formula can be selected to calculate the check code according to different security levels of the data to be transmitted, so that relatively simple check can be performed on the data with lower security level requirements in the check process, the problem that the same check mechanism is adopted for any data in the prior art is avoided, and the check mechanism is too long and complicated when the security level of the data to be transmitted is lower, and the effect of determining the check complexity according to the requirement of the data to be transmitted is achieved by the technical scheme.
On the basis of the foregoing technical solutions, preferably, the method for enabling the sender to act on the check code on the data to be transmitted to form sending data, and sending the sending data to the receiver, where the sending data includes the data characteristics includes: the sender generates sending frame data according to a second preset rule, wherein the sending frame data comprises: the method comprises the following steps of marking effective frames, data types, data to be transmitted, data organization rules, data lengths and check codes; and sending the sending frame data to the receiving party. The specific way of the check code acting on the data to be transmitted can be that the check code is a part of the sending frame data, wherein the sending frame data further comprises an effective frame mark, a data type, the data to be transmitted, a data organization rule and a data length. The valid frame flag may be used to detect whether the data packet is valid. The data type, the data organization rule and the data length are data characteristics, and the data to be transmitted is data to be transmitted. The technical scheme discloses that the data to be transmitted is transmitted in a data frame mode, and the data frame also comprises other data used for verification, identification and the like. Therefore, in the data transmission process, the validity and the legality of the data frame can be verified firstly, and then the data frame is extracted and subjected to subsequent operation, so that the safety in the data transmission process and the efficiency in the verification process are improved, namely once illegal or invalid data are found, packet loss processing can be carried out, and other redundant judgment is not carried out.
Example two
Fig. 2 is a flowchart of a data verification method according to a second embodiment of the present invention. On the basis of the foregoing embodiment, this embodiment verifies whether the sending data is legal or not by the receiving side according to the data characteristics included in the sending data and the dynamic verification factor, and if so, determines the data to be transmitted according to the sending data, and further optimizes the data to be transmitted as follows: after receiving the sending frame data, a receiving party acquires the data characteristics contained in the sending frame data, and determines whether the data to be transmitted in the sending frame data meet the standard or not according to a data organization rule in the data characteristics; if the data characteristics and the dynamic check factors meet the standard, the receiver determines a verification check code according to the data characteristics and the dynamic check factors, and judges whether the verification check code is consistent with the check code; and if the data of the sending frame is consistent with the data of the sending frame, determining the data to be transmitted from the sending frame data.
As shown in fig. 2, the data verification method includes:
s210, the receiver randomly generates a dynamic check factor and sends the dynamic check factor to the sender.
S220, the sender extracts the data characteristics of the data to be transmitted; and determining a check code according to the data characteristics and the dynamic check factor.
And S230, the sending party generates sending frame data according to a second preset rule. Wherein the transmitting the frame data comprises: the method comprises the steps of effective frame marking, data type, data to be transmitted, data organization rules, data length and check codes.
And S240, sending the sending frame data to the receiving party.
S250, a receiving party acquires the data characteristics contained in the sending frame data, and determines whether the data to be transmitted in the sending frame data meet the standard or not according to the data organization rules in the data characteristics. If the standard is met, executing S260; if not, go to step S280.
The data organization rule comprises data structure information of the data to be transmitted, and if the data structure information determined according to the data organization rule is not consistent with the data structure information of the data to be transmitted in the actual sending frame data, the data to be transmitted is not in accordance with the standard. Accordingly, the data transmission may be terminated, and S280 is performed.
And S260, the receiver determines a verification check code according to the data characteristics and the dynamic check factor, and judges whether the verification check code is consistent with the check code. If yes, go to S270; if not, go to step S280.
The receiving side can calculate a verification check code according to the data characteristics and the dynamic check factor, compare whether the verification check code is consistent with the check code in the transmission frame data, if so, prove that the data is valid, if not, consider that the data to be transmitted in the transmission frame data may be the data transmission simulated by the third party for illegal purpose, terminate the data transmission, and execute S280.
S270, determining that the sending frame data is legal, and determining the data to be transmitted from the sending frame data.
And S280, terminating data transmission.
Based on the above embodiment, the data teaching and research process after the receiving side receives the sending frame data is further optimized, so that the advantages of improving the speed and accuracy of data verification and avoiding the phenomenon that the interests of the public are influenced by an illegal third party seeking privacy through imitating or cracking a data verification mechanism are achieved.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a data verification apparatus according to a third embodiment of the present invention. As shown in fig. 3, the data verification apparatus includes:
the dynamic verification factor generation module 310 is integrated in the receiving party, and is used for randomly generating a dynamic verification factor and sending the dynamic verification factor to the sending party;
a check code determining module 320, integrated with the sender, configured to perform data feature extraction on data to be transmitted; determining a check code according to the data characteristics and the dynamic check factor;
a sending data generating module 330, integrated with the sender, configured to apply the check code to the data to be transmitted to form sending data, and send the sending data to the receiver, where the sending data includes the data feature;
the checking module 340, integrated at the receiving side, is configured to check whether the sending data is legal according to the data features included in the sending data and the dynamic checking factor, and if so, determine the data to be transmitted according to the sending data.
The embodiment of the invention generates the dynamic check factor by the receiver before the data transmission is carried out by the sender and the receiver of the data, then determines the check code according to the dynamic check factor and the data characteristics of the data to be transmitted, and sends and receives the data to be transmitted after the check code is acted on the data to be transmitted, so that the receiver can verify the check code and extract the data to be transmitted after the data to be transmitted is verified to be legal, thereby solving the problem that the data can only be verified in a fixed check mode in the prior art and the check mechanism is easy to be broken by a third party, and simultaneously solving the problem that file transmission with lower security level needs to pass through a complex check mechanism no matter what kind of data is adopted in the prior art, thereby increasing the complexity of the data transmission and realizing the improvement of the data transmission security, and the effect of improving the flexibility of the data checking mechanism.
On the basis of the foregoing embodiments, preferably, the dynamic verification factor generation module 310 includes:
the request receiving unit is used for receiving a dynamic verification factor acquisition request sent by a sender;
the request checking unit is used for checking the validity of the dynamic checking factor acquisition request according to a first preset rule;
and the dynamic verification factor generating unit is used for randomly generating the dynamic verification factor when the dynamic verification factor acquiring request is legal and sending the dynamic verification factor to the data sending party.
On the basis of the foregoing embodiments, preferably, the data characteristics include: data type, data organization rules, and data length.
On the basis of the foregoing embodiments, preferably, the check code determining module 320 specifically includes:
the data check formula calculation unit is used for determining a calculation data check formula according to the data type and the dynamic check factor;
and the check code calculation unit is used for calculating the check code by using the calculation data check formula.
On the basis of the foregoing embodiments, preferably, the sending data generating module 330 includes:
a sending frame data generating unit, configured to generate sending frame data according to a second preset rule, where the sending frame data includes: the method comprises the following steps of marking effective frames, data types, data to be transmitted, data organization rules, data lengths and check codes;
a transmission frame data transmitting unit configured to transmit the transmission frame data to the receiving side.
On the basis of the foregoing embodiments, preferably, the verification module 340 includes:
the to-be-transmitted data judging unit is used for acquiring the data characteristics contained in the sending frame data after receiving the sending frame data, and determining whether the to-be-transmitted data in the sending frame data meets the standard or not according to a data organization rule in the data characteristics;
the check code judging unit is used for determining a verification check code by the receiver according to the data characteristics and the dynamic check factor if the data to be transmitted conforms to the standard and judging whether the verification check code is consistent with the check code;
and the data to be transmitted determining unit is used for determining that the sending frame data is legal if the check codes are judged to be consistent, and determining the data to be transmitted from the sending frame data.
On the basis of the above embodiments, preferably, the apparatus further includes:
and the response data returning module is configured at the receiving party and used for returning the response data to the sending party and including the randomly generated dynamic verification factor required by the next verification in the response data.
On the basis of the foregoing embodiments, preferably, the dynamic verification factor includes a time verification factor.
The product can execute the method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (8)

1. A method for data verification, comprising:
the receiver randomly generates a dynamic check factor and sends the dynamic check factor to the sender;
the sender extracts the data characteristics of the data to be transmitted; determining a check code according to the data characteristics and the dynamic check factor;
the sender acts the check code on the data to be transmitted to form sending data, and the sending data is sent to the receiver, wherein the sending data comprises the data characteristics;
the receiver checks whether the sending data is legal or not according to the data characteristics contained in the sending data and the dynamic verification factor, and if the sending data is legal, the receiver determines the data to be transmitted according to the sending data;
wherein the data characteristics include: data type, data organization rules and data length;
determining a check code according to the data characteristics and the dynamic check factor, specifically comprising:
the sender determines a calculation data check formula according to the data type and the dynamic check factor;
and calculating the check code by using the calculation data check formula.
2. The data verification method of claim 1, wherein the randomly generating a dynamic verification factor by the receiver and sending the dynamic verification factor to the sender comprises:
a sender sends a dynamic check factor acquisition request to a receiver;
the receiver checks the validity of the dynamic check factor acquisition request according to a first preset rule;
and when the dynamic verification factor acquisition request is legal, the receiver randomly generates a dynamic verification factor and sends the dynamic verification factor to the data sender.
3. The data verification method of claim 1, wherein the sending party applies the verification code to the data to be transmitted to form sending data, and sends the sending data to the receiving party, wherein the sending data includes the data characteristics, and the method includes:
the sender generates sending frame data according to a second preset rule, wherein the sending frame data comprises: the method comprises the following steps of marking effective frames, data types, data to be transmitted, data organization rules, data lengths and check codes;
and sending the sending frame data to the receiving party.
4. The data verification method of claim 3, wherein the receiver verifies whether the sent data is legal according to the data characteristics included in the sent data and the dynamic verification factor, and if so, determines the data to be transmitted according to the sent data, including:
after receiving the sending frame data, a receiving party acquires the data characteristics contained in the sending frame data, and determines whether the data to be transmitted in the sending frame data meet the standard or not according to a data organization rule in the data characteristics;
if the data characteristics and the dynamic check factors meet the standard, the receiver determines a verification check code according to the data characteristics and the dynamic check factors, and judges whether the verification check code is consistent with the check code;
and if the data of the sending frame is consistent with the data of the sending frame, determining the data to be transmitted from the sending frame data.
5. The data verification method of claim 1, wherein after determining the data to be transmitted according to the sending data, the method further comprises:
and the receiver returns response data to the sender, and the response data contains a randomly generated dynamic verification factor required by the next verification.
6. A data verification method as claimed in any one of claims 1 to 5, wherein the dynamic verification factor comprises a time verification factor.
7. A data verification apparatus, comprising:
the dynamic verification factor generation module is integrated on the receiving party and used for randomly generating the dynamic verification factor and sending the dynamic verification factor to the sending party;
the check code determining module is integrated in the sender and used for extracting data characteristics of the data to be transmitted; determining a check code according to the data characteristics and the dynamic check factor;
a sending data generating module, integrated with the sender, configured to apply the check code to the data to be transmitted to form sending data, and send the sending data to the receiver, where the sending data includes the data characteristics;
the verification module is integrated at the receiving party and used for verifying whether the sending data is legal or not according to the data characteristics contained in the sending data and the dynamic verification factor, and if the sending data is legal, the data to be transmitted is determined according to the sending data;
wherein the data characteristics include: data type, data organization rules and data length;
the check code determining module specifically includes:
the data check formula calculation unit is used for determining a calculation data check formula according to the data type and the dynamic check factor;
and the check code calculation unit is used for calculating the check code by using the calculation data check formula.
8. The data verification apparatus of claim 7, wherein the dynamic verification factor generation module comprises:
the request receiving unit is used for receiving a dynamic verification factor acquisition request sent by a sender;
the request checking unit is used for checking the validity of the dynamic checking factor acquisition request according to a first preset rule;
and the dynamic verification factor generating unit is used for randomly generating the dynamic verification factor when the dynamic verification factor acquiring request is legal and sending the dynamic verification factor to the data sending party.
CN201710556591.4A 2017-07-10 2017-07-10 Data verification method and device Active CN107395580B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710556591.4A CN107395580B (en) 2017-07-10 2017-07-10 Data verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710556591.4A CN107395580B (en) 2017-07-10 2017-07-10 Data verification method and device

Publications (2)

Publication Number Publication Date
CN107395580A CN107395580A (en) 2017-11-24
CN107395580B true CN107395580B (en) 2020-09-15

Family

ID=60335497

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710556591.4A Active CN107395580B (en) 2017-07-10 2017-07-10 Data verification method and device

Country Status (1)

Country Link
CN (1) CN107395580B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187412B (en) * 2020-10-10 2022-11-15 中车青岛四方机车车辆股份有限公司 Data transmission method and related device
CN114826669A (en) * 2022-03-23 2022-07-29 惠州华阳通用电子有限公司 Communication data sending and receiving method and device
CN115473717B (en) * 2022-09-05 2023-09-01 杭州思拓瑞吉科技有限公司 Energy storage system time sequence data verification method based on prime power remainder

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624515A (en) * 2011-11-24 2012-08-01 中联重科股份有限公司 Data transmission method, system and terminals
CN103209202A (en) * 2012-01-16 2013-07-17 联想(北京)有限公司 Method and device for transmitting data
CN103780622A (en) * 2014-01-24 2014-05-07 华中科技大学 Data classification and encryption method for cloud storage
US8996869B1 (en) * 2012-07-02 2015-03-31 Bae Systems Information And Electronic Systems Integration Inc. Secure mission module
CN106357393A (en) * 2016-08-27 2017-01-25 飞天诚信科技股份有限公司 Safe data transmission method and device
CN106936771A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of secure cloud storage method and system based on graded encryption

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070283161A1 (en) * 2006-06-06 2007-12-06 Kabushiki Kaisha Toshiba System and method for generating verifiable device user passwords

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624515A (en) * 2011-11-24 2012-08-01 中联重科股份有限公司 Data transmission method, system and terminals
CN103209202A (en) * 2012-01-16 2013-07-17 联想(北京)有限公司 Method and device for transmitting data
US8996869B1 (en) * 2012-07-02 2015-03-31 Bae Systems Information And Electronic Systems Integration Inc. Secure mission module
CN103780622A (en) * 2014-01-24 2014-05-07 华中科技大学 Data classification and encryption method for cloud storage
CN106936771A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of secure cloud storage method and system based on graded encryption
CN106357393A (en) * 2016-08-27 2017-01-25 飞天诚信科技股份有限公司 Safe data transmission method and device

Also Published As

Publication number Publication date
CN107395580A (en) 2017-11-24

Similar Documents

Publication Publication Date Title
CN106779716B (en) Authentication method, device and system based on block chain account address
US8719915B2 (en) Method for improving network application security and the system thereof
US20110047607A1 (en) User verification using voice based password
CN104468531A (en) Authorization method, device and system for sensitive data
CN103905194B (en) Identity traceability authentication method and system
CN107395580B (en) Data verification method and device
CN103139200A (en) Single sign-on method of web service
CN102300182A (en) Short-message-based authentication method, system and device
CN105656850B (en) Data processing method, related device and system
CN102868702B (en) System login device and system login method
CN110175448B (en) Trusted device login authentication method and application system with authentication function
CN105323222A (en) Login verification method and login verification system
CN104901808A (en) Voiceprint authentication system and method based on time type dynamic password
CN104850996B (en) Transaction method, system and server based on external security equipment
CN103532979A (en) Method for generating and verifying multi-conversation verification codes under CGI (common gateway interface) for web
EP3334086A1 (en) Online authentication method based on smart card, smart card and authentication server
CN111104653B (en) User operation processing method and device, electronic equipment and readable storage medium
KR101676846B1 (en) Mutual verification system and method performing thereof
KR20130077682A (en) Recording medium, method and system for log-in confirmation use of smart phone
CN111949952B (en) Method for processing verification code request and computer-readable storage medium
CN103514651A (en) Internet lottery secure transaction and claiming system based on face recognition and method thereof
CN108259436A (en) Authenticating user identification processing method, application server and Verification System server
WO2023142436A1 (en) Authentication method and apparatus, payment method and apparatus, and device
CN104301285B (en) Login method for web system
CN115168830A (en) Login method and login device for detecting user login environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant