CN107392764A - The method, apparatus and computer-readable storage medium of a kind of verification of data - Google Patents

The method, apparatus and computer-readable storage medium of a kind of verification of data Download PDF

Info

Publication number
CN107392764A
CN107392764A CN201710581560.4A CN201710581560A CN107392764A CN 107392764 A CN107392764 A CN 107392764A CN 201710581560 A CN201710581560 A CN 201710581560A CN 107392764 A CN107392764 A CN 107392764A
Authority
CN
China
Prior art keywords
data
verification
cryptographic hash
transaction
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710581560.4A
Other languages
Chinese (zh)
Inventor
祝晓潭
徐加明
刘胜
殷舒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Union Mobile Pay Co Ltd
Original Assignee
Union Mobile Pay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Union Mobile Pay Co Ltd filed Critical Union Mobile Pay Co Ltd
Priority to CN201710581560.4A priority Critical patent/CN107392764A/en
Publication of CN107392764A publication Critical patent/CN107392764A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method, apparatus of verification of data and computer-readable storage medium, for improving the transmission rate of data.This method includes:The receiving module of verification of data system receives the first verification data from data providing system;Wherein, the first Hash table that the first verification data are formed for cryptographic Hash of being merchandised to the N bars obtained after the N bars transaction in be recorded in the data providing system one predetermined batch in plain text progress Hash calculation;The processing module of the verification of data system reads the transaction of the M bars in the predetermined batch in plain text and carries out Hash calculation from memory cell, and to obtain the second verification data, the second verification data are to include the second Hash table of the M bars transaction cryptographic Hash;The processing module carries out Hash calculation respectively to the described first verification data and the second verification data, obtains the first cryptographic Hash, the second cryptographic Hash, and checks first cryptographic Hash and whether second cryptographic Hash is identical, to obtain checked result.

Description

The method, apparatus and computer-readable storage medium of a kind of verification of data
Technical field
The present invention relates to computer realm, the method, apparatus and computer-readable storage medium of especially a kind of verification of data.
Background technology
With the development of science and technology, enterprises and institutions more and more use electronics pair when being traded verification of data The mode of account.
At present, enterprises and institutions with bank, Third-party payment mechanism etc. during reconciliation is carried out, conventional electronics pair Account mode has two kinds.One kind is, the billing data of bank or payment mechanism is locally downloading, then with local data base After billing data carries out permutation with positive order by serial number, one by one, word for word section is checked since first serial number, wherein, a stream Field corresponding to water number generally has multiple, such as serial number, date, the amount of money.Another way is that both sides arrange transaction data mark Know, and contrast enterprise's journal account and bank statement data accordingly, if mark is not present, according to paying party, the amount of money and date Etc. field, to contrast journal account and statement.
However, increasing rapidly with Internet service, on the one hand, daily trading volume is increasing, and this is resulted in Not only need to transmit substantial amounts of transaction data before verification of data, and need in verification of data the data volume checked into multiplication Add, and then reduce the speed of verification of data;On the other hand, in the transaction data transmitted due to these needs and exist a large amount of hidden Personal letter ceases, and this private data for causing user again has compromised risk in transmitting procedure.
The content of the invention
The present invention provides a kind of method, apparatus and computer-readable storage medium of verification of data, to solve in the prior art The problem of making verification of data slow in the presence of needing to check substantial amounts of transaction data.
The first aspect of the embodiment of the present invention, there is provided a kind of verification of data method, applied to verification of data system, including: The receiving module of the verification of data system receives the first verification data from data providing system;Wherein, the first verification number According to for the data providing system to be recorded in the data providing system a predetermined batch in N bars transaction in plain text breathe out The first Hash table that the N bars transaction cryptographic Hash obtained after uncommon calculating is formed, N is positive integer;The place of the verification of data system Module is managed from the memory cell of the verification of data system, reads the predetermined batch for being recorded in the verification of data system Interior M bars transaction is in plain text;Wherein, M is positive integer;The processing module is merchandised to the M bars and carries out Hash calculation in plain text, is obtained M bars are merchandised cryptographic Hash, and to obtain the second verification data, the second verification data are include the M articles of transaction cryptographic Hash the Two Hash tables;The processing module carries out Hash calculation to the first verification data obtained from the receiving module, obtains First cryptographic Hash, and Hash calculation is carried out to the described second verification data, obtain the second cryptographic Hash;The processing module verification Whether first cryptographic Hash and second cryptographic Hash are identical, to obtain checked result.
With reference in a first aspect, in the first possible embodiment of first aspect, methods described also includes:The number Also signing messages is received according to the receiving module of check system from the data providing system;Wherein, the signing messages is described The information that data providing system obtains after the 3rd cryptographic Hash is encrypted, the 3rd cryptographic Hash are the data providing system To what is obtained after the described first verification data progress Hash calculation.
The first possible embodiment with reference to first aspect, in second of possible embodiment of first aspect, First cryptographic Hash is checked in the processing module and whether second cryptographic Hash is identical, with before obtaining checked result, Methods described includes:The signing messages is decrypted the deciphering module of the verification of data system, to obtain the described 3rd Cryptographic Hash;The processing module checks first cryptographic Hash and whether the 3rd cryptographic Hash is identical;When to be, the place Whether identical the first cryptographic Hash and second cryptographic Hash described in module checks are managed, to obtain the checked result.
Any embodiment with reference to first aspect to second of possible embodiment of first aspect, in first aspect In the third possible embodiment, methods described also includes:When the checked result is different, the processing module verification Transaction cryptographic Hash in the first verification data and the transaction cryptographic Hash in the described second verification data, to obtain mistake transaction Cryptographic Hash.
The third possible embodiment with reference to first aspect, in the 4th kind of possible embodiment of first aspect, After the processing module obtains mistake transaction cryptographic Hash, methods described also includes:The processing module judges the mistake Cryptographic Hash of merchandising whether there is in the described second verification data;For it is no when, the processing module to the data provide system System asks the first transaction corresponding to the mistake transaction cryptographic Hash in plain text;When to be, the processing module is single from the storage Member obtains the second transaction corresponding with mistake transaction cryptographic Hash in plain text, and the described second transaction is sent into the number in plain text According to the system of offer.
The second aspect of the embodiment of the present invention, there is provided a kind of method for obtaining verification data, applied to data providing system, Including:The receiving module of the data providing system receives verification of data request from verification of data system;The data provide system The processing module of system is asked from the memory cell of the data providing system based on the verification of data, and reading is recorded in described N bars transaction in a predetermined batch in data providing system is in plain text;Wherein, N is positive integer;The processing module is to the N Hash calculation is carried out in bar transaction plaintext, obtains N bars transaction cryptographic Hash, to obtain the first verification data, the first verification number According to the first Hash table for cryptographic Hash of being merchandised including the N bars;The first verification data are sent to the verification of data system.
The third aspect of the embodiment of the present invention, there is provided a kind of verification of data device, including:Receiving module, for from data Offer system receives the first verification data;Wherein, the first verification data are that the data providing system is described to being recorded in N bars transaction in one predetermined batch of data providing system carries out the N bars transaction cryptographic Hash institute group obtained after Hash calculation in plain text Into the first Hash table, N is positive integer;Processing module, for from the memory cell of verification of data system, reading to be recorded in institute State the M bars transaction plaintext in the predetermined batch in verification of data system;Wherein, M is positive integer;The processing module is also used In, the M bars are merchandised and carry out Hash calculation in plain text, obtain M bars transaction cryptographic Hash, to obtain the second verification data, described the Two verification data are to include the second Hash table of the M bars transaction cryptographic Hash;The processing module is additionally operable to, to from the reception The first verification data that module obtains carry out Hash calculation, obtain the first cryptographic Hash, and to the described second verification data Hash calculation is carried out, obtains the second cryptographic Hash;The processing module is additionally operable to, and is checked first cryptographic Hash and is breathed out with described second Whether uncommon value is identical, to obtain checked result.
It is described to connect in the first possible embodiment of the third aspect with reference to the possible embodiment of the third aspect Module is received to be additionally operable to receive signing messages from the data providing system;Wherein, the signing messages provides system for the data The information that system obtains after the 3rd cryptographic Hash is encrypted, the 3rd cryptographic Hash are the data providing system to described first Obtained after verification data progress Hash calculation.
With reference to the first possible embodiment of the third aspect, in second of possible embodiment of the third aspect In, the processing module includes:Submodule is decrypted, for the signing messages to be decrypted, to obtain the 3rd Hash Value;Whether the first verification submodule is identical for checking first cryptographic Hash and the 3rd cryptographic Hash;Obtain submodule, For when to be, whether verification first cryptographic Hash and second cryptographic Hash to be identical, to obtain the checked result.
Any embodiment with reference to the third aspect to second of possible embodiment of the third aspect, in the third aspect In the third possible embodiment, the processing module is additionally operable to when the checked result is different, verification described first The transaction cryptographic Hash in data and the transaction cryptographic Hash in the described second verification data are checked, to obtain mistake transaction cryptographic Hash.
With reference to the third possible embodiment of the third aspect, in the 4th kind of possible embodiment of the third aspect In, the processing module also includes:Judging submodule, for judging that the mistake transaction cryptographic Hash whether there is in described second Check in data;Ask submodule, for for it is no when, ask the mistake to be merchandised cryptographic Hash pair to the data providing system The first transaction answered is in plain text;Second acquisition submodule, for when to be, obtaining from the memory cell and being merchandised with the mistake Described second transaction in plain text, and is sent to the data providing system by the second transaction corresponding to cryptographic Hash in plain text.
The fourth aspect of the embodiment of the present invention, there is provided a kind of data supplying device, including:Receiving module, for from data Check system receives verification of data request;Processing module, for asking depositing from data providing system based on the verification of data In storage unit, the N bars transaction plaintext in the predetermined batch being recorded in the data providing system is read;Wherein, N is just whole Number;The processing module is additionally operable to, and the N bars are merchandised and carry out Hash calculation in plain text, N bars transaction cryptographic Hash is obtained, to obtain First verification data, the first verification data are to include the first Hash table of the N bars transaction cryptographic Hash;Sending module, use Data are checked to the verification of data system in sending described first.
5th aspect of the embodiment of the present invention, there is provided a kind of computer-readable recording medium, including instruction, when the instruction When running on computers so that the computer is performed such as the 4th kind of possible embodiment of first aspect to first aspect Method described in any embodiment.
6th aspect of the embodiment of the present invention, a kind of computer-readable recording medium, including instruction, when the instruction is being counted When being run on calculation machine so that the computer performs the method as described in second aspect.
By the technical scheme in the said one of the embodiment of the present invention or multiple embodiments, the embodiment of the present invention at least has There is following technique effect:
1st, in the embodiment that the application provides, by check first cryptographic Hash and second cryptographic Hash whether phase Together, can quickly know the first verification data is in plain text with the N bars transaction plaintext corresponding to the second verification data and the transaction of M bars No identical, whole audit process, which only need to be checked once, just can quickly obtain checked result, without as prior art that Sample needs to check item by item transaction in plain text, and checked result could be obtained after the All Activity plaintext in predetermined batch has been checked.Therefore The embodiment that the application provides can effectively improve the work of verification of data.
2nd, the application provide embodiment in, due to verification be All Activity plaintext in predetermined batch transaction Hash It is worth the cryptographic Hash of the Hash table formed, so, no longer need to transmit transaction in plain text in the process carried out data transmission, and only need to pass Transaction cryptographic Hash corresponding to easily plaintext is submitted, this allows for private data (such as account, dealing money) will not be compromised, and then Private network transmission data may not necessarily be built again, effectively reduce user cost;And transmit the data length of a transaction cryptographic Hash It is much smaller more than the data length for transmitting a transaction plaintext, this allows for needing to transmit during carrying out data transmission Data volume greatly reduce, and then can also effectively save bandwidth, improve transmission rate.The embodiment that i.e. the application provides is not only It can ensure that private data is not compromised, moreover it is possible to effectively reduce user cost, and reduce the transmission quantity of data, improve the biography of data Defeated speed.
3rd, in the embodiment that the application provides, because the verification of data system need to only check the first verification data The first cryptographic Hash with described second verification data the second cryptographic Hash, in the case where error rate is low, the efficiency of verification of data It will greatly improve.Because the efficiency of verification of data can be improved significantly, so growth data can also be needed according to user The frequency is checked, a day end-nucleus pair, end of the month verification, hour verification, batch verification etc. can be such as carried out, so as to full to greatest extent Sufficient user's request, raising experience.
Brief description of the drawings
Fig. 1 is verification of data flow chart provided in an embodiment of the present invention;
Fig. 2 checks data flowchart for provided in an embodiment of the present invention obtain;
Fig. 3 is a kind of structural representation of verification of data device provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of data supplying device provided in an embodiment of the present invention.
Embodiment
In order that the purpose, technical scheme and advantage of the embodiment of the present invention are clearer, below in conjunction with accompanying drawing to this hair Bright embodiment is described in further detail.
Not only banking institution can use technology described herein, Third-party payment mechanism, securities broker company, Transaction apparatus Structure, enterprises and institutions etc. can also use.
The technical background of the embodiment of the present invention is introduced first.
Generally all it is that the transaction to every transaction record is carried out in plain text when enterprise and bank are traded the verification of data Contrast.The transaction of one transaction record includes but is not limited to following field in plain text:Serial number, trade date, exchange hour, friendship Easy type, paying party account, beneficiary account, amount of money etc..
At present, when enterprise carries out verification of data with bank, the electronics reconciliation mode of use generally has following two modes.
First way, enterprise download reconciliation file from bank, then read the billing data in local billing data storehouse, Positive sequence sequence all is carried out by serial number by the reconciliation file obtained from bank and from the billing data locally read, afterwards, from right First transaction record of account file and billing data starts a verification to the last transaction record.Wherein, every is merchandised The verification of record is required for serial number, trade date, exchange hour, type of transaction, paying party account, beneficiary account, gold The fields such as volume are checked one by one.
The second way, using reconciliation system, billing data is obtained from enterprise and bank respectively, and according to enterprise and silver Capable predetermined mark is checked the amount of money, if the predetermined mark of a transaction, the verification mode of the transaction and the A kind of verification mode in mode is identical.
Reconciliation is carried out by above two mode, on the one hand in reconciliation, is often required for transmitting full dose transaction data, i.e., The transaction of All Activity record is required for transmitting in plain text, and this will not only cause volume of transmitted data increase, will also cause to check speed Slack-off technical problem;On the other hand in data transmission procedure, there is also the possibility of user profile leakage, and then safety be present Sex chromosome mosaicism.
In view of this, in an embodiment of the present invention, just can only be completed by checking the transaction data after Hash calculation The checking work of transaction data, the transaction that this allows for no longer needing to transmit All Activity record when transmitting transaction data are bright Text, and only transmit transaction cryptographic Hash corresponding to transaction in plain text.So as to reduce the transmission quantity of data, improve transmission speed Degree, and can also effectively take precautions against the risk of privacy leakage.
Technical scheme provided in an embodiment of the present invention is introduced below in conjunction with the accompanying drawings.
Before embodiments of the invention are introduced, in order that those skilled in the art is better understood on this programme, under Face is first simple to be introduced on a significant data processing concept in the present invention:Hash algorithm.
Hash (Hash) algorithm, i.e. hash function.It is a kind of one-way cipher system, i.e., it is one from plaintext to ciphertext Irreversible mapping, only ciphering process, without decrypting process.Meanwhile hash function can pass through the input of random length Cross the output that change is fixed length later.The feature that this characteristic of unidirectional and the output data length of hash function is fixed makes Message or data can be generated by obtaining it.
Fig. 1 is referred to, the embodiment of the present invention provides a kind of method of verification of data, and the processing procedure of this method is as follows.
Step 101:The receiving module of the verification of data system receives the first verification data from data providing system;Its In, it is described first verification data be the data providing system to be recorded in the data providing system a predetermined batch in The first Hash table that the N bars transaction cryptographic Hash that the transaction of N bars carries out obtaining after Hash calculation in plain text is formed, N is positive integer.
For example, it is assumed that predetermined batch is batch 1, there are 8 transaction cryptographic Hash in the predetermined batch, then the first verification number It is as follows according to example.
Table 1
In table 1, H1-H8 is transaction cryptographic Hash corresponding to 8 transaction plaintext tx1-tx8, and 8 transaction plaintext tx1- Every transaction in tx8 is in plain text again comprising such as batch number, serial number, the date of payment, payment time, payment account number, gathering account Number, the field such as the amount of money, the field contents that specific every transaction includes in plain text do not limit, can be by the verification of data system or institute Data providing system is stated to preset.
The predetermined batch is the batch that the verification of data system asks verification to the data providing system.Really The mode of a fixed batch is specially to be determined by a preset rules, when the preset rules can be the start-stop by agreement Between, the All Activity within the period is recorded as a batch, such as 0 point to 24 points or every 1 hour be a collection of since 0 point It is secondary;It can also be by agreement number of transaction, the All Activity record in the amount is as a collection of, such as every 1000 are one Batch;It can also be and set batch to switch, to all friendships of batch down periods since the batch of batch switch setting Easily record is used as a batch;It should be understood that the preset rules should not necessarily be limited by several forms listed above or The preset rules of other forms, are not limited herein.
Step 102:The processing module of the verification of data system is read from the memory cell of the verification of data system The M bars transaction plaintext being recorded in the predetermined batch of the verification of data system;Wherein, M is positive integer.
As an example it is assumed that M is 8, when the field of every transaction plaintext includes batch number, serial number, the date of payment, payment Between, payment account number, the amount of money.Then the example content of 8 transaction plaintexts is as shown in table 2, wherein, for convenience of describing, spy introduces sequence Number, sequence number 1 represents first transaction in plain text, other to be analogized with secondary, and sequence number is not the actual field of M bars transaction plaintext.
Table 2
Wherein, the data length that every transaction takes in plain text is as shown in table 3.
Table 3
Field Data length (unit:Byte)
Batch number 8
Serial number 16
The date of payment 8
Payment time 6
Payment account number 16-19
The amount of money 4-8
As known from Table 3, the data length that a transaction takes in plain text is 58-65 bytes, then, 8 transaction in table 2 are bright Data length that is literary then needing occupancy 464-520 bytes, and when the field in table 3 increases, the data length of a transaction plaintext Degree also can accordingly increase, then the data length shared by M bars transaction plaintext in a predetermined batch will also increase into geometry multiple Add.
Step 103:The processing module is merchandised to the M bars and carries out Hash calculation in plain text, obtains M bars transaction cryptographic Hash, To obtain the second verification data, the second verification data are to include the second Hash table of the M bars transaction cryptographic Hash;
The processing module to the M bars merchandise in plain text carry out Hash calculation, can be need carry out verification of data before, Hash calculation is carried out after once reading the data of the All Activity plaintext in the memory cell in predetermined batch;Can also be Transaction carries out Hash calculation in plain text to transaction corresponding to transaction just occurs immediately after occurring, and now then step 102 can be omitted.
Continue by taking the example in step 102 as an example, Hash calculation, second obtained are carried out in plain text to 8 transaction in table 2 The result of calculation for checking data instance is as shown in table 4.
Table 4
When carrying out Hash calculation, the data length of conventional hash algorithm and the cryptographic Hash obtained with the hash algorithm As shown in table 5.
Table 5
Hash algorithm Cryptographic Hash length (byte)
SHA256 32
SHA1 or RIPEMD160 20
RIPEMD160(SHA256) 20
As shown in Table 5,8 transaction cryptographic Hash in table 4, according to the data of different every transaction cryptographic Hash of hash algorithm Length is 32 bytes or 20 bytes, then the data length that the second verification data shown in table 4 take is 256 bytes or 160 bytes, Obviously the data length 464-520 bytes than being taken needed for 8 transaction in plain text in table 2 reduce the data length of half.
As shown in the hash algorithm RIPEMD160 (SHA256) in table 5, obtained carrying out Hash calculation in plain text to a transaction To after corresponding transaction cryptographic Hash, the transaction cryptographic Hash can also be calculated again, and the Hash of front and rear 2 uses Algorithm can be the same or different, and so can further improve the safety of the private data during carrying out data transmission Property.
Therefore, it should be understood that the hash algorithm described in the present embodiment should not be considered limited to a kind of hash algorithm, also A variety of hash algorithms can be used, and to can also continue to the Kazakhstan to plaintext of merchandising after a transaction in plain text progress Hash calculation Uncommon result of calculation carries out Hash calculation again.
It should be noted that step 102, step 103 can before step 101 can also after step 101, herein Do not limit, those skilled in the art should not be construed as only implementing after step 101 could implementation steps 102, step 103.Also, it can be immediately to new caused transaction note after a transaction record is produced to carry out Hash calculation in plain text to transaction Transaction is calculated in plain text corresponding to record, and stores result of calculation, is now just not required to perform step 102, and step 103 also only needs The second verification data are read from memory cell;Can also be after a transaction record is produced directly storage corresponding to Transaction in plain text, and reads as step 102 transaction in predetermined batch in plain text when needing to carry out verification of data, then For another example step 103 carries out Hash calculation and obtains the second verification data in plain text to the transaction in the predetermined batch like that.Therefore When transaction plaintext progress Hash calculation is not being limited specifically.
Step 104:The processing module carries out Hash meter to the first verification data obtained from the receiving module Calculate, obtain the first cryptographic Hash, and Hash calculation is carried out to the described second verification data, obtain the second cryptographic Hash;
Continue step 103 in example exemplified by, it is assumed that first verification data and second verification data be all institute in 4 thick frame of table The data shown, Hash calculation is carried out namely to the data shown in 4 thick frame of table to the first verification data and the second verification data Table carries out Hash calculation, and obtained cryptographic Hash is assumed to be PQVGETM8395972, then the first cryptographic Hash is PQVGETM8395972, Second cryptographic Hash is PQVGETM8395972.
Step 105:The processing module checks first cryptographic Hash and whether second cryptographic Hash is identical, to obtain Checked result.
Continue by taking the example in step 4 as an example, because the first cryptographic Hash is PQVGETM8395972, the second cryptographic Hash is PQVGETM8395972, the processing module checks first cryptographic Hash and whether second cryptographic Hash is identical, obtains Checked result is identical, then just completes the verification to the All Activity data in the batch.
In the embodiment that the application provides, by check first cryptographic Hash and second cryptographic Hash whether phase Together, can quickly know the first verification data is in plain text with the N bars transaction plaintext corresponding to the second verification data and the transaction of M bars No identical, whole audit process, which only need to be checked once, just can quickly obtain checked result, without as prior art that Sample needs to check item by item transaction in plain text, and checked result could be obtained after the All Activity plaintext in predetermined batch has been checked.Therefore The embodiment that the application provides can effectively improve the work of verification of data.
Further, by the verification of data system need to only check the first cryptographic Hash and the institute of the first verification data The second cryptographic Hash of the second verification data is stated, in the case where error rate is low, the efficiency of verification of data will greatly improve.Due to number It can significantly be improved according to the efficiency of verification, so growth data can also be needed to check the frequency according to user, can such as be entered Row day end-nucleus pair, the end of the month verification, hour verification, batch verification etc..
Further, due to verification be All Activity plaintext in predetermined batch transaction cryptographic Hash form Hash table Cryptographic Hash, so, no longer need to transmit transaction in plain text in the process carried out data transmission, and only need to transmit corresponding to transaction plaintext Transaction cryptographic Hash, this allows for private data (such as account, dealing money) will not be compromised, and then may not necessarily build again specially Net transmission data, effectively reduce user cost;And the data length for transmitting a transaction cryptographic Hash is merchandised more than transmitting one The data length of plaintext is much smaller, and this data volume for allowing for needing to transmit during carrying out data transmission greatly subtracts It is small, and then can also effectively save bandwidth, improve transmission rate.The embodiment that i.e. the application provides not only can ensure that private data It is not compromised, moreover it is possible to effectively reduce user cost, and reduce the transmission quantity of data, improve the transmission speed of data.
In one embodiment, methods described also includes:
The receiving module of the verification of data system also receives signing messages from the data providing system;Wherein, it is described Signing messages is the information obtained after the 3rd cryptographic Hash is encrypted the data providing system, and the 3rd cryptographic Hash is institute State after data providing system carries out Hash calculation to the described first verification data and obtain.
It can also be received while the receiving module of the verification of data system receives the first verification data described Data providing system receives signing messages.
Exemplary, the first verification data are the data in table 2 shown in thick frame, and the data providing system is to institute State the first verification data and carry out after Hash calculation that to obtain the 3rd cryptographic Hash be PQVGETM8395972, the data offer system System can obtain signing messages after the 3rd cryptographic Hash is encrypted with private spoon, the receiving module of the verification of data system receives What is arrived is exactly this signing messages.
In the embodiment that the application provides, by transmitting the signing messages of the data providing system, it can make described Verification of data system the first verification data that quickly identification receives are to be provided by the verification of data system, from And improve the reliability for receiving data.
In one embodiment, first cryptographic Hash and second cryptographic Hash are checked whether in the processing module It is identical, so that before obtaining checked result, methods described includes:
The signing messages is decrypted the deciphering module of the verification of data system, to obtain the 3rd Hash Value.
After the receiving module of the verification of data system receives the signing messages of the first verification data, public affairs can be used The signing messages is decrypted spoon, obtains the 3rd cryptographic Hash, wherein the public spoon of the verification of data system and the data The private spoon of offer system is matching used.
Further, the processing module checks first cryptographic Hash and whether the 3rd cryptographic Hash is identical.
First cryptographic Hash is carried out for the processing unit of the verification of data system to the first verification data received Obtained after Hash calculation, the 3rd cryptographic Hash is the processing unit of the data providing system to the described first verification data Obtained after progress Hash calculation, it is whether identical by checking the first cryptographic Hash and the 3rd cryptographic Hash, the signature can be verified Whether information is correct.
Further, when to be, whether the processing module checks first cryptographic Hash and second cryptographic Hash It is identical, to obtain the checked result.
When the result of the signing messages is correct, the processing unit of the verification of data system just can be to described Second verification data carry out Hash calculation, and then whether verification first cryptographic Hash and second cryptographic Hash are identical, to obtain Obtain the checked result.
In the embodiment that the application provides, decided whether by verifying signing messages in advance to first core To data and it is described second verification data check, can effectively avoid to it is non-from the data providing system first Verification data are checked, and so as to save workflow, improve operating efficiency.
In one embodiment, methods described also includes:
When the checked result is different, the transaction cryptographic Hash in processing module verification the first verification data With described second verification data in transaction cryptographic Hash, with obtain mistake transaction cryptographic Hash.
When first cryptographic Hash and the second cryptographic Hash difference, i.e., when described checked result is different, the place Reason module will check the transaction cryptographic Hash in the first verification data and the transaction cryptographic Hash in the described second verification data, And therefrom find out mistake transaction cryptographic Hash.
For example, when the checked result is different (when the first cryptographic Hash is with the second cryptographic Hash difference), it is assumed that The data of first Hash table and the second Hash table are as shown in table 6.
Table 6
The processing module checks data by the transaction cryptographic Hash and second of the first verification data to being shown in table 6 After transaction cryptographic Hash is checked, obtain the in the first verification data the 4th article of transaction cryptographic Hash and be not present in the second verification data In, for mistake transaction cryptographic Hash;The 7th article of transaction cryptographic Hash in second verification data is not present in the first verification data, is Mistake transaction cryptographic Hash.The 7th article of transaction in the transaction cryptographic Hash and the second verification data in i.e. first verification data is breathed out Uncommon value is mistake transaction cryptographic Hash.
In the embodiment that the application provides, by the transaction cryptographic Hash and described second for checking the first verification data The transaction cryptographic Hash of data is checked, the mistake transaction cryptographic Hash can be rapidly found out, and then quickly determines the mistake transaction Transaction corresponding to cryptographic Hash in plain text, without checking again each field data in transaction plaintext, works so as to save Flow, improve operating efficiency.
In one embodiment, after the processing module obtains mistake transaction cryptographic Hash, methods described also includes:
The processing module judges that the mistake transaction cryptographic Hash whether there is in the described second verification data;
For it is no when, the processing module asks corresponding to mistake transaction cryptographic Hash the to the data providing system One transaction is in plain text;
When to be, the processing module obtains and mistake transaction cryptographic Hash corresponding second from the memory cell Described second transaction in plain text, and is sent to the data providing system by transaction in plain text.
Exemplified by example more than continuing in an embodiment, because the processing module transaction cryptographic Hash that judges to make mistakes is The 4th article of transaction cryptographic Hash in first verification data is not present in the second verification data, then the processing module is to the number It is bright for the first transaction corresponding to the 4th article of transaction cryptographic Hash in the first verification data according to system request mistake transaction cryptographic Hash is provided Text.
Further, because the processing module judges to make mistakes transaction cryptographic Hash as the 7th article in the second verification data Transaction cryptographic Hash is not present in the first verification data, then the processing module is obtained from the memory cell and handed over the mistake Easy cryptographic Hash is that the 7th article in the second verification data merchandises the second transaction corresponding to cryptographic Hash in plain text, and is provided to the data It is that the 7th article in the second verification data merchandises the second transaction corresponding to cryptographic Hash in plain text that system, which sends mistake transaction cryptographic Hash,.
In the embodiment that the application provides, after the mistake transaction cryptographic Hash is found, lead to and transmit the mistake transaction Transaction corresponding to cryptographic Hash in plain text, can quickly handle the transaction record in the presence of mistake, also, due to transmission only be the difference Transaction plaintext corresponding to mistake transaction cryptographic Hash, without transmitting transaction all in the batch in plain text, so as to effectively save About bandwidth, raising transmission rate.
Fig. 2 is referred to, based on same present inventive concept, one embodiment of the invention provides a kind of side for obtaining verification data Method, the processing procedure of this method are as follows.
Step 201:The receiving module of the data providing system receives verification of data request from verification of data system.
Step 202:The processing module of the data providing system, which is based on the verification of data, asks to provide from the data In the memory cell of system, the N bars transaction plaintext in the predetermined batch being recorded in the data providing system is read;Its In, N is positive integer.
The receiving module of the data providing system is described after the verification of data for receiving verification of data system is asked From the memory cell of the data providing system, reading is recorded in the data and provides system the processing module of data providing system In plain text, the exemplary forms for plaintext of merchandising are referring to table 2, because the data provide system for N bars transaction in a predetermined batch in system The field contents of transaction plaintext in system are identical with the field contents of the transaction plaintext in the verification of data system, therefore can refer to Content in step 102, it will not be repeated here to save length.
Step 203:The processing module obtains N bars transaction Hash to carrying out Hash calculation in N bars transaction plaintext Value, to obtain the first verification data, the first verification data are to include the first Hash table of the N bars transaction cryptographic Hash.
After N bars transaction plaintext of the processing module in the predetermined batch read in the data providing system, To carrying out Hash calculation in N bars transaction plaintext, N bars transaction cryptographic Hash is obtained, to obtain the first verification data.Due to step 203 processing procedure is similar to the processing procedure of step 103, therefore can refer to the content in step 103, no longer superfluous to save length State.
It should be understood that the hash algorithm described in the present embodiment is same as in step 103, it is understood not to only limit In a kind of hash algorithm, a variety of hash algorithms can also be used, and a transaction is carried out in plain text after Hash calculation can be with Continue to carry out Hash calculation again to the result that a preceding Hash calculation obtains.
And it should be noted that step 202, step 203 can before step 201 can also after step 201, This is not limited, and those skilled in the art should not be construed as only implementing after step 201 could implementation steps 202, step Rapid 203.Also, to the nearly Hash of new caused transaction plaintext after the data providing system is being produced once transaction plaintext Calculate, then at this moment step 202 is just not required to implement, and step 203 then need to only allow the processing module from the memory cell An All Activity cryptographic Hash subscribed in batch is read, i.e., described first verification data;When the data providing system exists Hash calculation is not carried out in plain text to corresponding transaction immediately after producing a transaction record, but is needing to carry out verification of data When transaction in predetermined batch is read as step 202 in plain text, then for another example step 203 like that in the predetermined batch Transaction in plain text carry out Hash calculation obtain it is described first verification data.Therefore specifically when transaction is being breathed out in plain text Uncommon calculating does not limit.
Step 204:The first verification data are sent to the verification of data system.
The data providing system is based on verification of data request and sends the first verification data to the data core To system.
In the embodiment that the application provides, what it is due to data providing system transmission is All Activity in predetermined batch The cryptographic Hash for the Hash table that the transaction cryptographic Hash of plaintext is formed, so, no longer need to transmit to hand in the process carried out data transmission Easily in plain text, only need to transmit transaction cryptographic Hash corresponding to transaction in plain text, this allows for private data (such as account, dealing money) Will not be compromised, and then private network transmission data may not necessarily be built again, effectively reduce user cost;And transmit a transaction and breathe out The data length of uncommon value is much smaller more than the data length for transmitting a plaintext of merchandising, and this allows for carrying out data transmission During the data volume that needs to transmit greatly reduce, and then can also effectively save bandwidth, improve transmission rate.I.e. the application carries The embodiment of confession not only can ensure that private data is not compromised, moreover it is possible to effectively reduces user cost, and reduces the transmission of data Amount, the transmission speed for improving data.
Fig. 3 is referred to, based on same present inventive concept, one embodiment of the invention provides a kind of verification of data device, the dress Put including processor 301, memory 302, receiver 303, transmitter 304.
Wherein, processor 301 can include central processing unit (CPU) or ASIC
(Application Specific Integrated Circuit, ASIC), can be used for including one or more The integrated circuit that control program performs, can be including the use of field programmable gate array (Field Programmable Gate Array, FPGA) exploitation hardware circuit, baseband chip can be included.
In possible embodiment, the device can also include memory 302, show in the lump in figure 3.Memory 302 quantity can be one or more.Memory 302 can include read-only storage (Read Only Memory, ROM), Random access memory (Random Access Memory, RAM) and magnetic disk storage, etc..Memory 302 can be used for depositing Data are stored up, can be also used for storing the program code that processor 301 performs required by task.
Wherein, receiver 303 is used to receive the first verification data from data providing system;Wherein, first core To data be the data providing system to be recorded in the data providing system a predetermined batch in N bars transaction in plain text enter The first Hash table that the N bars transaction cryptographic Hash obtained after row Hash calculation is formed, N is positive integer;Processor 301 is used for from number The M bars transaction being recorded in according in the memory cell of check system, reading in the predetermined batch in the verification of data system In plain text;Wherein, M is positive integer;Processor 301 is additionally operable to, and the M bars are merchandised and carry out Hash calculation in plain text, obtains the transaction of M bars Cryptographic Hash, to obtain the second verification data, the second verification data are to include the second Hash of the M bars transaction cryptographic Hash Table;Processor 301 is additionally operable to, and is carried out Hash calculation to the first verification data obtained from the receiving module, is obtained the One cryptographic Hash, and Hash calculation is carried out to the described second verification data, obtain the second cryptographic Hash;Processor 301 is additionally operable to, core It is whether identical to first cryptographic Hash and second cryptographic Hash, to obtain checked result.
In possible embodiment, receiver 303 is additionally operable to receive signing messages from the data providing system;Its In, the signing messages is the information obtained after the 3rd cryptographic Hash is encrypted the data providing system, and the described 3rd breathes out The uncommon value data providing system obtains after carrying out Hash calculation to the described first verification data.
In possible embodiment, processor 301 is used to the signing messages be decrypted, to obtain the described 3rd Cryptographic Hash;Processor 301 is additionally operable to check first cryptographic Hash and whether the 3rd cryptographic Hash is identical;Processor 301 is also For when to be, whether verification first cryptographic Hash and second cryptographic Hash to be identical, to obtain the checked result.
In possible embodiment, processor 301 is additionally operable to when the checked result is different, verification described first The transaction cryptographic Hash in data and the transaction cryptographic Hash in the described second verification data are checked, to obtain mistake transaction cryptographic Hash.
In possible embodiment, processor 301 is additionally operable to judge that the mistake transaction cryptographic Hash whether there is in institute State in the second verification data;Processor 301 be additionally operable to for it is no when, with transmitter 304 to the data providing system ask institute State the first transaction corresponding to mistake transaction cryptographic Hash in plain text;Processor 301 is additionally operable to when to be, is obtained from the memory cell The second transaction corresponding with mistake transaction cryptographic Hash in plain text, and is sent the described second transaction by transmitter 304 in plain text To the data providing system.
Fig. 4 is referred to, based on same present inventive concept, one embodiment of the invention provides a kind of data supplying device, the dress Put including processor 401, memory 402, receiver 403, transmitter 404.
Wherein, processor 401 can include central processing unit (CPU) or ASIC
(Application Specific Integrated Circuit, ASIC), can be used for including one or more The integrated circuit that control program performs, can be including the use of field programmable gate array (Field Programmable Gate Array, FPGA) exploitation hardware circuit, baseband chip can be included.
In possible embodiment, the device can also include memory 402, show in the lump in Fig. 4.Memory 402 quantity can be one or more.Memory 402 can include read-only storage (Read Only Memory, ROM), Random access memory (Random Access Memory, RAM) and magnetic disk storage, etc..Memory 402 can be used for depositing Data are stored up, can be also used for storing the program code that processor 401 performs required by task.
Wherein, receiver 403 is used to receive verification of data request from verification of data system;Processor 401, for based on institute Verification of data request is stated from the memory cell of data providing system, it is predetermined to read one be recorded in the data providing system N bars transaction in batch is in plain text;Wherein, N is positive integer;Processor 401 is additionally operable to, and the N bars are merchandised and carry out Hash in plain text Calculate, obtain N bars transaction cryptographic Hash, to obtain the first verification data, the first verification data are to include the N bars transaction to breathe out First Hash table of uncommon value;Transmitter 404, for sending the first verification data to the verification of data system.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can be stored with journey Sequence, the Overall Steps when program performs performed by including the base station described in the embodiment of the method as shown in preceding Fig. 1.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can be stored with journey Sequence, the Overall Steps when program performs performed by including the base station described in the embodiment of the method as shown in preceding Fig. 2.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program production Product.Therefore, in terms of the embodiment of the present invention can use complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, the embodiment of the present invention can use wherein includes computer available programs generation in one or more The meter implemented in the computer-usable storage medium (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) of code The form of calculation machine program product.
The embodiment of the present invention is with reference to method according to embodiments of the present invention, equipment (system) and computer program product Flow chart and/or block diagram describe.It should be understood that can be by computer program instructions implementation process figure and/or block diagram Each flow and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These calculating can be provided Processing of the machine programmed instruction to all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices Device is to produce a machine so that the instruction for passing through computer or the computing device of other programmable data processing devices produces For realizing the function of being specified in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames Device.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (14)

  1. A kind of 1. verification of data method, applied to verification of data system, it is characterised in that including:
    The receiving module of the verification of data system receives the first verification data from data providing system;Wherein, first core To data be the data providing system to be recorded in the data providing system a predetermined batch in N bars transaction in plain text enter The first Hash table that the N bars transaction cryptographic Hash obtained after row Hash calculation is formed, N is positive integer;
    For the processing module of the verification of data system from the memory cell of the verification of data system, reading is recorded in the number Merchandised in plain text according to the M bars in the predetermined batch of check system;Wherein, M is positive integer;
    The processing module is merchandised to the M bars and carries out Hash calculation in plain text, M bars transaction cryptographic Hash is obtained, to obtain the second core To data, the second verification data are to include the second Hash table of the M bars transaction cryptographic Hash;
    The processing module carries out Hash calculation to the first verification data obtained from the receiving module, obtains first and breathes out Uncommon value, and Hash calculation is carried out to the described second verification data, obtain the second cryptographic Hash;
    The processing module checks first cryptographic Hash and whether second cryptographic Hash is identical, to obtain checked result.
  2. 2. the method as described in claim 1, it is characterised in that methods described also includes:
    The receiving module of the verification of data system also receives signing messages from the data providing system;Wherein, the signature Information is the information obtained after the 3rd cryptographic Hash is encrypted the data providing system, and the 3rd cryptographic Hash is the number Obtained after carrying out Hash calculation to the described first verification data according to offer system.
  3. 3. method as claimed in claim 2, it is characterised in that the processing module check first cryptographic Hash with it is described Whether the second cryptographic Hash is identical, so that before obtaining checked result, methods described includes:
    The signing messages is decrypted the deciphering module of the verification of data system, to obtain the 3rd cryptographic Hash;
    The processing module checks first cryptographic Hash and whether the 3rd cryptographic Hash is identical;
    When to be, the processing module checks first cryptographic Hash and whether second cryptographic Hash is identical, to obtain State checked result.
  4. 4. the method as described in claim any one of 1-3, it is characterised in that methods described also includes:
    When the checked result is different, transaction cryptographic Hash and institute in processing module verification the first verification data The transaction cryptographic Hash in the second verification data is stated, to obtain mistake transaction cryptographic Hash.
  5. 5. method as claimed in claim 4, it is characterised in that after the processing module obtains mistake transaction cryptographic Hash, Methods described also includes:
    The processing module judges that the mistake transaction cryptographic Hash whether there is in the described second verification data;
    For it is no when, the processing module asks corresponding to mistake transaction cryptographic Hash first to hand over to the data providing system Easily in plain text;
    When to be, the processing module obtains the second transaction corresponding with mistake transaction cryptographic Hash from the memory cell In plain text, and by the described second transaction it is sent to the data providing system in plain text.
  6. A kind of 6. method for obtaining verification data, applied to data providing system, it is characterised in that including:
    The receiving module of the data providing system receives verification of data request from verification of data system;
    The processing module of the data providing system asks the storage list from the data providing system based on the verification of data In member, the N bars transaction plaintext in the predetermined batch being recorded in the data providing system is read;Wherein, N is positive integer;
    The processing module obtains N bars transaction cryptographic Hash, to obtain first to carrying out Hash calculation in N bars transaction plaintext Data are checked, the first verification data are to include the first Hash table of the N bars transaction cryptographic Hash;
    The first verification data are sent to the verification of data system.
  7. A kind of 7. verification of data device, it is characterised in that including:
    Receiving module, for receiving the first verification data from data providing system;Wherein, the first verification data are the number According to offer system to be recorded in the data providing system a predetermined batch in N bars transaction in plain text carry out Hash calculation after To the first Hash table for being formed of N bars transaction cryptographic Hash, N is positive integer;
    Processing module, for from the memory cell of verification of data system, reading the institute being recorded in the verification of data system State the M bars transaction plaintext in predetermined batch;Wherein, M is positive integer;
    The processing module is additionally operable to, and the M bars are merchandised and carry out Hash calculation in plain text, M bars transaction cryptographic Hash is obtained, to obtain Second verification data, the second verification data are to include the second Hash table of the M bars transaction cryptographic Hash;
    The processing module is additionally operable to, and is carried out Hash calculation to the first verification data obtained from the receiving module, is obtained The first cryptographic Hash is obtained, and Hash calculation is carried out to the described second verification data, obtains the second cryptographic Hash;
    The processing module is additionally operable to, and checks first cryptographic Hash and whether second cryptographic Hash is identical, to be checked As a result.
  8. 8. verification of data device as claimed in claim 7, it is characterised in that the receiving module is additionally operable to carry from the data Signing messages is received for system;Wherein, the signing messages is after the 3rd cryptographic Hash is encrypted the data providing system Obtained information, the 3rd cryptographic Hash are to be obtained after the data providing system carries out Hash calculation to the described first verification data Arrive.
  9. 9. verification of data device as claimed in claim 8, it is characterised in that the processing module includes:
    Submodule is decrypted, for the signing messages to be decrypted, to obtain the 3rd cryptographic Hash;
    Whether the first verification submodule is identical for checking first cryptographic Hash and the 3rd cryptographic Hash;
    Submodule is obtained, for when to be, whether with second cryptographic Hash identical, with acquisition if checking first cryptographic Hash The checked result.
  10. 10. the verification of data device as described in claim any one of 7-9, it is characterised in that the processing module is additionally operable to work as When the checked result is different, the transaction cryptographic Hash in verification the first verification data is checked in data with described second Transaction cryptographic Hash, to obtain mistake transaction cryptographic Hash.
  11. 11. verification of data device as claimed in claim 10, it is characterised in that the processing module also includes:
    Judging submodule, for judging that the mistake transaction cryptographic Hash whether there is in the described second verification data;
    Ask submodule, for for it is no when, ask corresponding to mistake transaction cryptographic Hash the to the data providing system One transaction is in plain text;
    Second acquisition submodule, for when to be, being obtained from the memory cell corresponding with mistake transaction cryptographic Hash Described second transaction in plain text, and is sent to the data providing system by the second transaction in plain text.
  12. A kind of 12. data supplying device, it is characterised in that including:
    Receiving module, for receiving verification of data request from verification of data system;
    Processing module, for from the memory cell of data providing system, reading to be recorded in institute based on verification of data request State the N bars transaction plaintext in the predetermined batch in data providing system;Wherein, N is positive integer;
    The processing module is additionally operable to, and the N bars are merchandised and carry out Hash calculation in plain text, N bars transaction cryptographic Hash is obtained, to obtain First verification data, the first verification data are to include the first Hash table of the N bars transaction cryptographic Hash;
    Sending module, for sending the first verification data to the verification of data system.
  13. 13. a kind of computer-readable recording medium, including instruction, when the instruction is run on computers so that the meter Calculation machine performs the method as described in any claims of claim 1-5.
  14. 14. a kind of computer-readable recording medium, including instruction, when the instruction is run on computers so that the meter Calculation machine performs method as claimed in claim 6.
CN201710581560.4A 2017-07-17 2017-07-17 The method, apparatus and computer-readable storage medium of a kind of verification of data Pending CN107392764A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710581560.4A CN107392764A (en) 2017-07-17 2017-07-17 The method, apparatus and computer-readable storage medium of a kind of verification of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710581560.4A CN107392764A (en) 2017-07-17 2017-07-17 The method, apparatus and computer-readable storage medium of a kind of verification of data

Publications (1)

Publication Number Publication Date
CN107392764A true CN107392764A (en) 2017-11-24

Family

ID=60340369

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710581560.4A Pending CN107392764A (en) 2017-07-17 2017-07-17 The method, apparatus and computer-readable storage medium of a kind of verification of data

Country Status (1)

Country Link
CN (1) CN107392764A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632046A (en) * 2018-05-14 2018-10-09 深圳市合众万邦科技有限公司 It is classified card, read-write equipment, healthcare management system and method
CN109684350A (en) * 2018-12-15 2019-04-26 平安证券股份有限公司 Registration of securities verification of data method, apparatus, computer equipment and storage medium
CN110264213A (en) * 2019-05-24 2019-09-20 阿里巴巴集团控股有限公司 A kind of processing method of information, device and equipment
WO2020147484A1 (en) * 2019-01-14 2020-07-23 阿里巴巴集团控股有限公司 Transaction clearing method and transaction clearing system
CN112433988A (en) * 2020-11-30 2021-03-02 中国建设银行股份有限公司 Data checking method, device, computer equipment and storage medium
CN113342857A (en) * 2021-06-28 2021-09-03 北京三快在线科技有限公司 Transaction record checking method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101710410A (en) * 2009-10-28 2010-05-19 金蝶软件(中国)有限公司 Method and system for checking accounting data
CN103780390A (en) * 2013-11-05 2014-05-07 汉柏科技有限公司 Method and device for presenting plaintext information by user
CN105427031A (en) * 2015-11-06 2016-03-23 中国南方电网有限责任公司 Three-party data check method and system
CN105677645A (en) * 2014-11-17 2016-06-15 阿里巴巴集团控股有限公司 Data sheet comparison method and device
CN105933280A (en) * 2016-03-15 2016-09-07 天地融科技股份有限公司 Identity authentication method and system
CN105989059A (en) * 2015-02-09 2016-10-05 阿里巴巴集团控股有限公司 Data record checking method and device
US20160335342A1 (en) * 2014-03-18 2016-11-17 Palantir Technologies Inc. Determining and extracting changed data from a data source

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101710410A (en) * 2009-10-28 2010-05-19 金蝶软件(中国)有限公司 Method and system for checking accounting data
CN103780390A (en) * 2013-11-05 2014-05-07 汉柏科技有限公司 Method and device for presenting plaintext information by user
US20160335342A1 (en) * 2014-03-18 2016-11-17 Palantir Technologies Inc. Determining and extracting changed data from a data source
CN105677645A (en) * 2014-11-17 2016-06-15 阿里巴巴集团控股有限公司 Data sheet comparison method and device
CN105989059A (en) * 2015-02-09 2016-10-05 阿里巴巴集团控股有限公司 Data record checking method and device
CN105427031A (en) * 2015-11-06 2016-03-23 中国南方电网有限责任公司 Three-party data check method and system
CN105933280A (en) * 2016-03-15 2016-09-07 天地融科技股份有限公司 Identity authentication method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632046A (en) * 2018-05-14 2018-10-09 深圳市合众万邦科技有限公司 It is classified card, read-write equipment, healthcare management system and method
CN108632046B (en) * 2018-05-14 2021-05-04 深圳市合众万邦科技有限公司 Grading card, reading and writing device, medical care management system and method
CN109684350A (en) * 2018-12-15 2019-04-26 平安证券股份有限公司 Registration of securities verification of data method, apparatus, computer equipment and storage medium
WO2020147484A1 (en) * 2019-01-14 2020-07-23 阿里巴巴集团控股有限公司 Transaction clearing method and transaction clearing system
CN110264213A (en) * 2019-05-24 2019-09-20 阿里巴巴集团控股有限公司 A kind of processing method of information, device and equipment
CN112433988A (en) * 2020-11-30 2021-03-02 中国建设银行股份有限公司 Data checking method, device, computer equipment and storage medium
CN113342857A (en) * 2021-06-28 2021-09-03 北京三快在线科技有限公司 Transaction record checking method and device, electronic equipment and storage medium
CN113342857B (en) * 2021-06-28 2022-09-16 北京三快在线科技有限公司 Transaction record checking method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107392764A (en) The method, apparatus and computer-readable storage medium of a kind of verification of data
US11082234B2 (en) Method and system for privacy-preserving social media advertising
US11728994B2 (en) Systems and methods for cryptographic authentication of contactless cards
US20220237590A1 (en) Systems and methods for phone-based card activation
CN109359974A (en) Block chain method of commerce and device, electronic equipment
CN111191280B (en) Blockchain transaction method based on encrypted data, electronic equipment and storage medium
US11210664B2 (en) Systems and methods for amplifying the strength of cryptographic algorithms
CN107798517A (en) Bill payment method, apparatus and system
CN102054258A (en) Electronic bank safety certificating method and system based on mobile equipment
CN106716916A (en) Authentication system and method
US20220377084A1 (en) Decentralized techniques for verification of data in transport layer security and other contexts
CN108241976A (en) A kind of Quick Response Code method of payment based on block chain
WO2021040784A1 (en) Gateway agnostic tokenization
Akinyede et al. Development of a secure mobile e-banking system
Thammarat et al. A secure fair exchange for SMS‐based mobile payment protocols based on symmetric encryption algorithms with formal verification
CN104539616B (en) Realize credible MESSAGE EXCHANGE and the system of storage between heterogeneous system
CN117078247A (en) Payment medium opening method, device, equipment and storage medium
CN116823257A (en) Information processing method, device, equipment and storage medium
CN107403310A (en) Payment system and its method of payment under quantum Metropolitan Area Network (MAN)
CN109816525A (en) A kind of data processing method and its device, medium, terminal
CN107947935A (en) A kind of endorsement method of message, system and terminal device
Plummer Bitcoin, Blockchain Technology, and Secure Hash Algorithms
SE512279C2 (en) Electronic transaction system
CN115017431A (en) Method and device for collecting customer application links and electronic equipment
CN112990904A (en) Block chain-based transfer method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171124

RJ01 Rejection of invention patent application after publication