CN107392764A - The method, apparatus and computer-readable storage medium of a kind of verification of data - Google Patents
The method, apparatus and computer-readable storage medium of a kind of verification of data Download PDFInfo
- Publication number
- CN107392764A CN107392764A CN201710581560.4A CN201710581560A CN107392764A CN 107392764 A CN107392764 A CN 107392764A CN 201710581560 A CN201710581560 A CN 201710581560A CN 107392764 A CN107392764 A CN 107392764A
- Authority
- CN
- China
- Prior art keywords
- data
- verification
- cryptographic hash
- transaction
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Development Economics (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method, apparatus of verification of data and computer-readable storage medium, for improving the transmission rate of data.This method includes:The receiving module of verification of data system receives the first verification data from data providing system;Wherein, the first Hash table that the first verification data are formed for cryptographic Hash of being merchandised to the N bars obtained after the N bars transaction in be recorded in the data providing system one predetermined batch in plain text progress Hash calculation;The processing module of the verification of data system reads the transaction of the M bars in the predetermined batch in plain text and carries out Hash calculation from memory cell, and to obtain the second verification data, the second verification data are to include the second Hash table of the M bars transaction cryptographic Hash;The processing module carries out Hash calculation respectively to the described first verification data and the second verification data, obtains the first cryptographic Hash, the second cryptographic Hash, and checks first cryptographic Hash and whether second cryptographic Hash is identical, to obtain checked result.
Description
Technical field
The present invention relates to computer realm, the method, apparatus and computer-readable storage medium of especially a kind of verification of data.
Background technology
With the development of science and technology, enterprises and institutions more and more use electronics pair when being traded verification of data
The mode of account.
At present, enterprises and institutions with bank, Third-party payment mechanism etc. during reconciliation is carried out, conventional electronics pair
Account mode has two kinds.One kind is, the billing data of bank or payment mechanism is locally downloading, then with local data base
After billing data carries out permutation with positive order by serial number, one by one, word for word section is checked since first serial number, wherein, a stream
Field corresponding to water number generally has multiple, such as serial number, date, the amount of money.Another way is that both sides arrange transaction data mark
Know, and contrast enterprise's journal account and bank statement data accordingly, if mark is not present, according to paying party, the amount of money and date
Etc. field, to contrast journal account and statement.
However, increasing rapidly with Internet service, on the one hand, daily trading volume is increasing, and this is resulted in
Not only need to transmit substantial amounts of transaction data before verification of data, and need in verification of data the data volume checked into multiplication
Add, and then reduce the speed of verification of data;On the other hand, in the transaction data transmitted due to these needs and exist a large amount of hidden
Personal letter ceases, and this private data for causing user again has compromised risk in transmitting procedure.
The content of the invention
The present invention provides a kind of method, apparatus and computer-readable storage medium of verification of data, to solve in the prior art
The problem of making verification of data slow in the presence of needing to check substantial amounts of transaction data.
The first aspect of the embodiment of the present invention, there is provided a kind of verification of data method, applied to verification of data system, including:
The receiving module of the verification of data system receives the first verification data from data providing system;Wherein, the first verification number
According to for the data providing system to be recorded in the data providing system a predetermined batch in N bars transaction in plain text breathe out
The first Hash table that the N bars transaction cryptographic Hash obtained after uncommon calculating is formed, N is positive integer;The place of the verification of data system
Module is managed from the memory cell of the verification of data system, reads the predetermined batch for being recorded in the verification of data system
Interior M bars transaction is in plain text;Wherein, M is positive integer;The processing module is merchandised to the M bars and carries out Hash calculation in plain text, is obtained
M bars are merchandised cryptographic Hash, and to obtain the second verification data, the second verification data are include the M articles of transaction cryptographic Hash the
Two Hash tables;The processing module carries out Hash calculation to the first verification data obtained from the receiving module, obtains
First cryptographic Hash, and Hash calculation is carried out to the described second verification data, obtain the second cryptographic Hash;The processing module verification
Whether first cryptographic Hash and second cryptographic Hash are identical, to obtain checked result.
With reference in a first aspect, in the first possible embodiment of first aspect, methods described also includes:The number
Also signing messages is received according to the receiving module of check system from the data providing system;Wherein, the signing messages is described
The information that data providing system obtains after the 3rd cryptographic Hash is encrypted, the 3rd cryptographic Hash are the data providing system
To what is obtained after the described first verification data progress Hash calculation.
The first possible embodiment with reference to first aspect, in second of possible embodiment of first aspect,
First cryptographic Hash is checked in the processing module and whether second cryptographic Hash is identical, with before obtaining checked result,
Methods described includes:The signing messages is decrypted the deciphering module of the verification of data system, to obtain the described 3rd
Cryptographic Hash;The processing module checks first cryptographic Hash and whether the 3rd cryptographic Hash is identical;When to be, the place
Whether identical the first cryptographic Hash and second cryptographic Hash described in module checks are managed, to obtain the checked result.
Any embodiment with reference to first aspect to second of possible embodiment of first aspect, in first aspect
In the third possible embodiment, methods described also includes:When the checked result is different, the processing module verification
Transaction cryptographic Hash in the first verification data and the transaction cryptographic Hash in the described second verification data, to obtain mistake transaction
Cryptographic Hash.
The third possible embodiment with reference to first aspect, in the 4th kind of possible embodiment of first aspect,
After the processing module obtains mistake transaction cryptographic Hash, methods described also includes:The processing module judges the mistake
Cryptographic Hash of merchandising whether there is in the described second verification data;For it is no when, the processing module to the data provide system
System asks the first transaction corresponding to the mistake transaction cryptographic Hash in plain text;When to be, the processing module is single from the storage
Member obtains the second transaction corresponding with mistake transaction cryptographic Hash in plain text, and the described second transaction is sent into the number in plain text
According to the system of offer.
The second aspect of the embodiment of the present invention, there is provided a kind of method for obtaining verification data, applied to data providing system,
Including:The receiving module of the data providing system receives verification of data request from verification of data system;The data provide system
The processing module of system is asked from the memory cell of the data providing system based on the verification of data, and reading is recorded in described
N bars transaction in a predetermined batch in data providing system is in plain text;Wherein, N is positive integer;The processing module is to the N
Hash calculation is carried out in bar transaction plaintext, obtains N bars transaction cryptographic Hash, to obtain the first verification data, the first verification number
According to the first Hash table for cryptographic Hash of being merchandised including the N bars;The first verification data are sent to the verification of data system.
The third aspect of the embodiment of the present invention, there is provided a kind of verification of data device, including:Receiving module, for from data
Offer system receives the first verification data;Wherein, the first verification data are that the data providing system is described to being recorded in
N bars transaction in one predetermined batch of data providing system carries out the N bars transaction cryptographic Hash institute group obtained after Hash calculation in plain text
Into the first Hash table, N is positive integer;Processing module, for from the memory cell of verification of data system, reading to be recorded in institute
State the M bars transaction plaintext in the predetermined batch in verification of data system;Wherein, M is positive integer;The processing module is also used
In, the M bars are merchandised and carry out Hash calculation in plain text, obtain M bars transaction cryptographic Hash, to obtain the second verification data, described the
Two verification data are to include the second Hash table of the M bars transaction cryptographic Hash;The processing module is additionally operable to, to from the reception
The first verification data that module obtains carry out Hash calculation, obtain the first cryptographic Hash, and to the described second verification data
Hash calculation is carried out, obtains the second cryptographic Hash;The processing module is additionally operable to, and is checked first cryptographic Hash and is breathed out with described second
Whether uncommon value is identical, to obtain checked result.
It is described to connect in the first possible embodiment of the third aspect with reference to the possible embodiment of the third aspect
Module is received to be additionally operable to receive signing messages from the data providing system;Wherein, the signing messages provides system for the data
The information that system obtains after the 3rd cryptographic Hash is encrypted, the 3rd cryptographic Hash are the data providing system to described first
Obtained after verification data progress Hash calculation.
With reference to the first possible embodiment of the third aspect, in second of possible embodiment of the third aspect
In, the processing module includes:Submodule is decrypted, for the signing messages to be decrypted, to obtain the 3rd Hash
Value;Whether the first verification submodule is identical for checking first cryptographic Hash and the 3rd cryptographic Hash;Obtain submodule,
For when to be, whether verification first cryptographic Hash and second cryptographic Hash to be identical, to obtain the checked result.
Any embodiment with reference to the third aspect to second of possible embodiment of the third aspect, in the third aspect
In the third possible embodiment, the processing module is additionally operable to when the checked result is different, verification described first
The transaction cryptographic Hash in data and the transaction cryptographic Hash in the described second verification data are checked, to obtain mistake transaction cryptographic Hash.
With reference to the third possible embodiment of the third aspect, in the 4th kind of possible embodiment of the third aspect
In, the processing module also includes:Judging submodule, for judging that the mistake transaction cryptographic Hash whether there is in described second
Check in data;Ask submodule, for for it is no when, ask the mistake to be merchandised cryptographic Hash pair to the data providing system
The first transaction answered is in plain text;Second acquisition submodule, for when to be, obtaining from the memory cell and being merchandised with the mistake
Described second transaction in plain text, and is sent to the data providing system by the second transaction corresponding to cryptographic Hash in plain text.
The fourth aspect of the embodiment of the present invention, there is provided a kind of data supplying device, including:Receiving module, for from data
Check system receives verification of data request;Processing module, for asking depositing from data providing system based on the verification of data
In storage unit, the N bars transaction plaintext in the predetermined batch being recorded in the data providing system is read;Wherein, N is just whole
Number;The processing module is additionally operable to, and the N bars are merchandised and carry out Hash calculation in plain text, N bars transaction cryptographic Hash is obtained, to obtain
First verification data, the first verification data are to include the first Hash table of the N bars transaction cryptographic Hash;Sending module, use
Data are checked to the verification of data system in sending described first.
5th aspect of the embodiment of the present invention, there is provided a kind of computer-readable recording medium, including instruction, when the instruction
When running on computers so that the computer is performed such as the 4th kind of possible embodiment of first aspect to first aspect
Method described in any embodiment.
6th aspect of the embodiment of the present invention, a kind of computer-readable recording medium, including instruction, when the instruction is being counted
When being run on calculation machine so that the computer performs the method as described in second aspect.
By the technical scheme in the said one of the embodiment of the present invention or multiple embodiments, the embodiment of the present invention at least has
There is following technique effect:
1st, in the embodiment that the application provides, by check first cryptographic Hash and second cryptographic Hash whether phase
Together, can quickly know the first verification data is in plain text with the N bars transaction plaintext corresponding to the second verification data and the transaction of M bars
No identical, whole audit process, which only need to be checked once, just can quickly obtain checked result, without as prior art that
Sample needs to check item by item transaction in plain text, and checked result could be obtained after the All Activity plaintext in predetermined batch has been checked.Therefore
The embodiment that the application provides can effectively improve the work of verification of data.
2nd, the application provide embodiment in, due to verification be All Activity plaintext in predetermined batch transaction Hash
It is worth the cryptographic Hash of the Hash table formed, so, no longer need to transmit transaction in plain text in the process carried out data transmission, and only need to pass
Transaction cryptographic Hash corresponding to easily plaintext is submitted, this allows for private data (such as account, dealing money) will not be compromised, and then
Private network transmission data may not necessarily be built again, effectively reduce user cost;And transmit the data length of a transaction cryptographic Hash
It is much smaller more than the data length for transmitting a transaction plaintext, this allows for needing to transmit during carrying out data transmission
Data volume greatly reduce, and then can also effectively save bandwidth, improve transmission rate.The embodiment that i.e. the application provides is not only
It can ensure that private data is not compromised, moreover it is possible to effectively reduce user cost, and reduce the transmission quantity of data, improve the biography of data
Defeated speed.
3rd, in the embodiment that the application provides, because the verification of data system need to only check the first verification data
The first cryptographic Hash with described second verification data the second cryptographic Hash, in the case where error rate is low, the efficiency of verification of data
It will greatly improve.Because the efficiency of verification of data can be improved significantly, so growth data can also be needed according to user
The frequency is checked, a day end-nucleus pair, end of the month verification, hour verification, batch verification etc. can be such as carried out, so as to full to greatest extent
Sufficient user's request, raising experience.
Brief description of the drawings
Fig. 1 is verification of data flow chart provided in an embodiment of the present invention;
Fig. 2 checks data flowchart for provided in an embodiment of the present invention obtain;
Fig. 3 is a kind of structural representation of verification of data device provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of data supplying device provided in an embodiment of the present invention.
Embodiment
In order that the purpose, technical scheme and advantage of the embodiment of the present invention are clearer, below in conjunction with accompanying drawing to this hair
Bright embodiment is described in further detail.
Not only banking institution can use technology described herein, Third-party payment mechanism, securities broker company, Transaction apparatus
Structure, enterprises and institutions etc. can also use.
The technical background of the embodiment of the present invention is introduced first.
Generally all it is that the transaction to every transaction record is carried out in plain text when enterprise and bank are traded the verification of data
Contrast.The transaction of one transaction record includes but is not limited to following field in plain text:Serial number, trade date, exchange hour, friendship
Easy type, paying party account, beneficiary account, amount of money etc..
At present, when enterprise carries out verification of data with bank, the electronics reconciliation mode of use generally has following two modes.
First way, enterprise download reconciliation file from bank, then read the billing data in local billing data storehouse,
Positive sequence sequence all is carried out by serial number by the reconciliation file obtained from bank and from the billing data locally read, afterwards, from right
First transaction record of account file and billing data starts a verification to the last transaction record.Wherein, every is merchandised
The verification of record is required for serial number, trade date, exchange hour, type of transaction, paying party account, beneficiary account, gold
The fields such as volume are checked one by one.
The second way, using reconciliation system, billing data is obtained from enterprise and bank respectively, and according to enterprise and silver
Capable predetermined mark is checked the amount of money, if the predetermined mark of a transaction, the verification mode of the transaction and the
A kind of verification mode in mode is identical.
Reconciliation is carried out by above two mode, on the one hand in reconciliation, is often required for transmitting full dose transaction data, i.e.,
The transaction of All Activity record is required for transmitting in plain text, and this will not only cause volume of transmitted data increase, will also cause to check speed
Slack-off technical problem;On the other hand in data transmission procedure, there is also the possibility of user profile leakage, and then safety be present
Sex chromosome mosaicism.
In view of this, in an embodiment of the present invention, just can only be completed by checking the transaction data after Hash calculation
The checking work of transaction data, the transaction that this allows for no longer needing to transmit All Activity record when transmitting transaction data are bright
Text, and only transmit transaction cryptographic Hash corresponding to transaction in plain text.So as to reduce the transmission quantity of data, improve transmission speed
Degree, and can also effectively take precautions against the risk of privacy leakage.
Technical scheme provided in an embodiment of the present invention is introduced below in conjunction with the accompanying drawings.
Before embodiments of the invention are introduced, in order that those skilled in the art is better understood on this programme, under
Face is first simple to be introduced on a significant data processing concept in the present invention:Hash algorithm.
Hash (Hash) algorithm, i.e. hash function.It is a kind of one-way cipher system, i.e., it is one from plaintext to ciphertext
Irreversible mapping, only ciphering process, without decrypting process.Meanwhile hash function can pass through the input of random length
Cross the output that change is fixed length later.The feature that this characteristic of unidirectional and the output data length of hash function is fixed makes
Message or data can be generated by obtaining it.
Fig. 1 is referred to, the embodiment of the present invention provides a kind of method of verification of data, and the processing procedure of this method is as follows.
Step 101:The receiving module of the verification of data system receives the first verification data from data providing system;Its
In, it is described first verification data be the data providing system to be recorded in the data providing system a predetermined batch in
The first Hash table that the N bars transaction cryptographic Hash that the transaction of N bars carries out obtaining after Hash calculation in plain text is formed, N is positive integer.
For example, it is assumed that predetermined batch is batch 1, there are 8 transaction cryptographic Hash in the predetermined batch, then the first verification number
It is as follows according to example.
Table 1
In table 1, H1-H8 is transaction cryptographic Hash corresponding to 8 transaction plaintext tx1-tx8, and 8 transaction plaintext tx1-
Every transaction in tx8 is in plain text again comprising such as batch number, serial number, the date of payment, payment time, payment account number, gathering account
Number, the field such as the amount of money, the field contents that specific every transaction includes in plain text do not limit, can be by the verification of data system or institute
Data providing system is stated to preset.
The predetermined batch is the batch that the verification of data system asks verification to the data providing system.Really
The mode of a fixed batch is specially to be determined by a preset rules, when the preset rules can be the start-stop by agreement
Between, the All Activity within the period is recorded as a batch, such as 0 point to 24 points or every 1 hour be a collection of since 0 point
It is secondary;It can also be by agreement number of transaction, the All Activity record in the amount is as a collection of, such as every 1000 are one
Batch;It can also be and set batch to switch, to all friendships of batch down periods since the batch of batch switch setting
Easily record is used as a batch;It should be understood that the preset rules should not necessarily be limited by several forms listed above or
The preset rules of other forms, are not limited herein.
Step 102:The processing module of the verification of data system is read from the memory cell of the verification of data system
The M bars transaction plaintext being recorded in the predetermined batch of the verification of data system;Wherein, M is positive integer.
As an example it is assumed that M is 8, when the field of every transaction plaintext includes batch number, serial number, the date of payment, payment
Between, payment account number, the amount of money.Then the example content of 8 transaction plaintexts is as shown in table 2, wherein, for convenience of describing, spy introduces sequence
Number, sequence number 1 represents first transaction in plain text, other to be analogized with secondary, and sequence number is not the actual field of M bars transaction plaintext.
Table 2
Wherein, the data length that every transaction takes in plain text is as shown in table 3.
Table 3
Field | Data length (unit:Byte) |
Batch number | 8 |
Serial number | 16 |
The date of payment | 8 |
Payment time | 6 |
Payment account number | 16-19 |
The amount of money | 4-8 |
As known from Table 3, the data length that a transaction takes in plain text is 58-65 bytes, then, 8 transaction in table 2 are bright
Data length that is literary then needing occupancy 464-520 bytes, and when the field in table 3 increases, the data length of a transaction plaintext
Degree also can accordingly increase, then the data length shared by M bars transaction plaintext in a predetermined batch will also increase into geometry multiple
Add.
Step 103:The processing module is merchandised to the M bars and carries out Hash calculation in plain text, obtains M bars transaction cryptographic Hash,
To obtain the second verification data, the second verification data are to include the second Hash table of the M bars transaction cryptographic Hash;
The processing module to the M bars merchandise in plain text carry out Hash calculation, can be need carry out verification of data before,
Hash calculation is carried out after once reading the data of the All Activity plaintext in the memory cell in predetermined batch;Can also be
Transaction carries out Hash calculation in plain text to transaction corresponding to transaction just occurs immediately after occurring, and now then step 102 can be omitted.
Continue by taking the example in step 102 as an example, Hash calculation, second obtained are carried out in plain text to 8 transaction in table 2
The result of calculation for checking data instance is as shown in table 4.
Table 4
When carrying out Hash calculation, the data length of conventional hash algorithm and the cryptographic Hash obtained with the hash algorithm
As shown in table 5.
Table 5
Hash algorithm | Cryptographic Hash length (byte) |
SHA256 | 32 |
SHA1 or RIPEMD160 | 20 |
RIPEMD160(SHA256) | 20 |
As shown in Table 5,8 transaction cryptographic Hash in table 4, according to the data of different every transaction cryptographic Hash of hash algorithm
Length is 32 bytes or 20 bytes, then the data length that the second verification data shown in table 4 take is 256 bytes or 160 bytes,
Obviously the data length 464-520 bytes than being taken needed for 8 transaction in plain text in table 2 reduce the data length of half.
As shown in the hash algorithm RIPEMD160 (SHA256) in table 5, obtained carrying out Hash calculation in plain text to a transaction
To after corresponding transaction cryptographic Hash, the transaction cryptographic Hash can also be calculated again, and the Hash of front and rear 2 uses
Algorithm can be the same or different, and so can further improve the safety of the private data during carrying out data transmission
Property.
Therefore, it should be understood that the hash algorithm described in the present embodiment should not be considered limited to a kind of hash algorithm, also
A variety of hash algorithms can be used, and to can also continue to the Kazakhstan to plaintext of merchandising after a transaction in plain text progress Hash calculation
Uncommon result of calculation carries out Hash calculation again.
It should be noted that step 102, step 103 can before step 101 can also after step 101, herein
Do not limit, those skilled in the art should not be construed as only implementing after step 101 could implementation steps 102, step
103.Also, it can be immediately to new caused transaction note after a transaction record is produced to carry out Hash calculation in plain text to transaction
Transaction is calculated in plain text corresponding to record, and stores result of calculation, is now just not required to perform step 102, and step 103 also only needs
The second verification data are read from memory cell;Can also be after a transaction record is produced directly storage corresponding to
Transaction in plain text, and reads as step 102 transaction in predetermined batch in plain text when needing to carry out verification of data, then
For another example step 103 carries out Hash calculation and obtains the second verification data in plain text to the transaction in the predetermined batch like that.Therefore
When transaction plaintext progress Hash calculation is not being limited specifically.
Step 104:The processing module carries out Hash meter to the first verification data obtained from the receiving module
Calculate, obtain the first cryptographic Hash, and Hash calculation is carried out to the described second verification data, obtain the second cryptographic Hash;
Continue step 103 in example exemplified by, it is assumed that first verification data and second verification data be all institute in 4 thick frame of table
The data shown, Hash calculation is carried out namely to the data shown in 4 thick frame of table to the first verification data and the second verification data
Table carries out Hash calculation, and obtained cryptographic Hash is assumed to be PQVGETM8395972, then the first cryptographic Hash is PQVGETM8395972,
Second cryptographic Hash is PQVGETM8395972.
Step 105:The processing module checks first cryptographic Hash and whether second cryptographic Hash is identical, to obtain
Checked result.
Continue by taking the example in step 4 as an example, because the first cryptographic Hash is PQVGETM8395972, the second cryptographic Hash is
PQVGETM8395972, the processing module checks first cryptographic Hash and whether second cryptographic Hash is identical, obtains
Checked result is identical, then just completes the verification to the All Activity data in the batch.
In the embodiment that the application provides, by check first cryptographic Hash and second cryptographic Hash whether phase
Together, can quickly know the first verification data is in plain text with the N bars transaction plaintext corresponding to the second verification data and the transaction of M bars
No identical, whole audit process, which only need to be checked once, just can quickly obtain checked result, without as prior art that
Sample needs to check item by item transaction in plain text, and checked result could be obtained after the All Activity plaintext in predetermined batch has been checked.Therefore
The embodiment that the application provides can effectively improve the work of verification of data.
Further, by the verification of data system need to only check the first cryptographic Hash and the institute of the first verification data
The second cryptographic Hash of the second verification data is stated, in the case where error rate is low, the efficiency of verification of data will greatly improve.Due to number
It can significantly be improved according to the efficiency of verification, so growth data can also be needed to check the frequency according to user, can such as be entered
Row day end-nucleus pair, the end of the month verification, hour verification, batch verification etc..
Further, due to verification be All Activity plaintext in predetermined batch transaction cryptographic Hash form Hash table
Cryptographic Hash, so, no longer need to transmit transaction in plain text in the process carried out data transmission, and only need to transmit corresponding to transaction plaintext
Transaction cryptographic Hash, this allows for private data (such as account, dealing money) will not be compromised, and then may not necessarily build again specially
Net transmission data, effectively reduce user cost;And the data length for transmitting a transaction cryptographic Hash is merchandised more than transmitting one
The data length of plaintext is much smaller, and this data volume for allowing for needing to transmit during carrying out data transmission greatly subtracts
It is small, and then can also effectively save bandwidth, improve transmission rate.The embodiment that i.e. the application provides not only can ensure that private data
It is not compromised, moreover it is possible to effectively reduce user cost, and reduce the transmission quantity of data, improve the transmission speed of data.
In one embodiment, methods described also includes:
The receiving module of the verification of data system also receives signing messages from the data providing system;Wherein, it is described
Signing messages is the information obtained after the 3rd cryptographic Hash is encrypted the data providing system, and the 3rd cryptographic Hash is institute
State after data providing system carries out Hash calculation to the described first verification data and obtain.
It can also be received while the receiving module of the verification of data system receives the first verification data described
Data providing system receives signing messages.
Exemplary, the first verification data are the data in table 2 shown in thick frame, and the data providing system is to institute
State the first verification data and carry out after Hash calculation that to obtain the 3rd cryptographic Hash be PQVGETM8395972, the data offer system
System can obtain signing messages after the 3rd cryptographic Hash is encrypted with private spoon, the receiving module of the verification of data system receives
What is arrived is exactly this signing messages.
In the embodiment that the application provides, by transmitting the signing messages of the data providing system, it can make described
Verification of data system the first verification data that quickly identification receives are to be provided by the verification of data system, from
And improve the reliability for receiving data.
In one embodiment, first cryptographic Hash and second cryptographic Hash are checked whether in the processing module
It is identical, so that before obtaining checked result, methods described includes:
The signing messages is decrypted the deciphering module of the verification of data system, to obtain the 3rd Hash
Value.
After the receiving module of the verification of data system receives the signing messages of the first verification data, public affairs can be used
The signing messages is decrypted spoon, obtains the 3rd cryptographic Hash, wherein the public spoon of the verification of data system and the data
The private spoon of offer system is matching used.
Further, the processing module checks first cryptographic Hash and whether the 3rd cryptographic Hash is identical.
First cryptographic Hash is carried out for the processing unit of the verification of data system to the first verification data received
Obtained after Hash calculation, the 3rd cryptographic Hash is the processing unit of the data providing system to the described first verification data
Obtained after progress Hash calculation, it is whether identical by checking the first cryptographic Hash and the 3rd cryptographic Hash, the signature can be verified
Whether information is correct.
Further, when to be, whether the processing module checks first cryptographic Hash and second cryptographic Hash
It is identical, to obtain the checked result.
When the result of the signing messages is correct, the processing unit of the verification of data system just can be to described
Second verification data carry out Hash calculation, and then whether verification first cryptographic Hash and second cryptographic Hash are identical, to obtain
Obtain the checked result.
In the embodiment that the application provides, decided whether by verifying signing messages in advance to first core
To data and it is described second verification data check, can effectively avoid to it is non-from the data providing system first
Verification data are checked, and so as to save workflow, improve operating efficiency.
In one embodiment, methods described also includes:
When the checked result is different, the transaction cryptographic Hash in processing module verification the first verification data
With described second verification data in transaction cryptographic Hash, with obtain mistake transaction cryptographic Hash.
When first cryptographic Hash and the second cryptographic Hash difference, i.e., when described checked result is different, the place
Reason module will check the transaction cryptographic Hash in the first verification data and the transaction cryptographic Hash in the described second verification data,
And therefrom find out mistake transaction cryptographic Hash.
For example, when the checked result is different (when the first cryptographic Hash is with the second cryptographic Hash difference), it is assumed that
The data of first Hash table and the second Hash table are as shown in table 6.
Table 6
The processing module checks data by the transaction cryptographic Hash and second of the first verification data to being shown in table 6
After transaction cryptographic Hash is checked, obtain the in the first verification data the 4th article of transaction cryptographic Hash and be not present in the second verification data
In, for mistake transaction cryptographic Hash;The 7th article of transaction cryptographic Hash in second verification data is not present in the first verification data, is
Mistake transaction cryptographic Hash.The 7th article of transaction in the transaction cryptographic Hash and the second verification data in i.e. first verification data is breathed out
Uncommon value is mistake transaction cryptographic Hash.
In the embodiment that the application provides, by the transaction cryptographic Hash and described second for checking the first verification data
The transaction cryptographic Hash of data is checked, the mistake transaction cryptographic Hash can be rapidly found out, and then quickly determines the mistake transaction
Transaction corresponding to cryptographic Hash in plain text, without checking again each field data in transaction plaintext, works so as to save
Flow, improve operating efficiency.
In one embodiment, after the processing module obtains mistake transaction cryptographic Hash, methods described also includes:
The processing module judges that the mistake transaction cryptographic Hash whether there is in the described second verification data;
For it is no when, the processing module asks corresponding to mistake transaction cryptographic Hash the to the data providing system
One transaction is in plain text;
When to be, the processing module obtains and mistake transaction cryptographic Hash corresponding second from the memory cell
Described second transaction in plain text, and is sent to the data providing system by transaction in plain text.
Exemplified by example more than continuing in an embodiment, because the processing module transaction cryptographic Hash that judges to make mistakes is
The 4th article of transaction cryptographic Hash in first verification data is not present in the second verification data, then the processing module is to the number
It is bright for the first transaction corresponding to the 4th article of transaction cryptographic Hash in the first verification data according to system request mistake transaction cryptographic Hash is provided
Text.
Further, because the processing module judges to make mistakes transaction cryptographic Hash as the 7th article in the second verification data
Transaction cryptographic Hash is not present in the first verification data, then the processing module is obtained from the memory cell and handed over the mistake
Easy cryptographic Hash is that the 7th article in the second verification data merchandises the second transaction corresponding to cryptographic Hash in plain text, and is provided to the data
It is that the 7th article in the second verification data merchandises the second transaction corresponding to cryptographic Hash in plain text that system, which sends mistake transaction cryptographic Hash,.
In the embodiment that the application provides, after the mistake transaction cryptographic Hash is found, lead to and transmit the mistake transaction
Transaction corresponding to cryptographic Hash in plain text, can quickly handle the transaction record in the presence of mistake, also, due to transmission only be the difference
Transaction plaintext corresponding to mistake transaction cryptographic Hash, without transmitting transaction all in the batch in plain text, so as to effectively save
About bandwidth, raising transmission rate.
Fig. 2 is referred to, based on same present inventive concept, one embodiment of the invention provides a kind of side for obtaining verification data
Method, the processing procedure of this method are as follows.
Step 201:The receiving module of the data providing system receives verification of data request from verification of data system.
Step 202:The processing module of the data providing system, which is based on the verification of data, asks to provide from the data
In the memory cell of system, the N bars transaction plaintext in the predetermined batch being recorded in the data providing system is read;Its
In, N is positive integer.
The receiving module of the data providing system is described after the verification of data for receiving verification of data system is asked
From the memory cell of the data providing system, reading is recorded in the data and provides system the processing module of data providing system
In plain text, the exemplary forms for plaintext of merchandising are referring to table 2, because the data provide system for N bars transaction in a predetermined batch in system
The field contents of transaction plaintext in system are identical with the field contents of the transaction plaintext in the verification of data system, therefore can refer to
Content in step 102, it will not be repeated here to save length.
Step 203:The processing module obtains N bars transaction Hash to carrying out Hash calculation in N bars transaction plaintext
Value, to obtain the first verification data, the first verification data are to include the first Hash table of the N bars transaction cryptographic Hash.
After N bars transaction plaintext of the processing module in the predetermined batch read in the data providing system,
To carrying out Hash calculation in N bars transaction plaintext, N bars transaction cryptographic Hash is obtained, to obtain the first verification data.Due to step
203 processing procedure is similar to the processing procedure of step 103, therefore can refer to the content in step 103, no longer superfluous to save length
State.
It should be understood that the hash algorithm described in the present embodiment is same as in step 103, it is understood not to only limit
In a kind of hash algorithm, a variety of hash algorithms can also be used, and a transaction is carried out in plain text after Hash calculation can be with
Continue to carry out Hash calculation again to the result that a preceding Hash calculation obtains.
And it should be noted that step 202, step 203 can before step 201 can also after step 201,
This is not limited, and those skilled in the art should not be construed as only implementing after step 201 could implementation steps 202, step
Rapid 203.Also, to the nearly Hash of new caused transaction plaintext after the data providing system is being produced once transaction plaintext
Calculate, then at this moment step 202 is just not required to implement, and step 203 then need to only allow the processing module from the memory cell
An All Activity cryptographic Hash subscribed in batch is read, i.e., described first verification data;When the data providing system exists
Hash calculation is not carried out in plain text to corresponding transaction immediately after producing a transaction record, but is needing to carry out verification of data
When transaction in predetermined batch is read as step 202 in plain text, then for another example step 203 like that in the predetermined batch
Transaction in plain text carry out Hash calculation obtain it is described first verification data.Therefore specifically when transaction is being breathed out in plain text
Uncommon calculating does not limit.
Step 204:The first verification data are sent to the verification of data system.
The data providing system is based on verification of data request and sends the first verification data to the data core
To system.
In the embodiment that the application provides, what it is due to data providing system transmission is All Activity in predetermined batch
The cryptographic Hash for the Hash table that the transaction cryptographic Hash of plaintext is formed, so, no longer need to transmit to hand in the process carried out data transmission
Easily in plain text, only need to transmit transaction cryptographic Hash corresponding to transaction in plain text, this allows for private data (such as account, dealing money)
Will not be compromised, and then private network transmission data may not necessarily be built again, effectively reduce user cost;And transmit a transaction and breathe out
The data length of uncommon value is much smaller more than the data length for transmitting a plaintext of merchandising, and this allows for carrying out data transmission
During the data volume that needs to transmit greatly reduce, and then can also effectively save bandwidth, improve transmission rate.I.e. the application carries
The embodiment of confession not only can ensure that private data is not compromised, moreover it is possible to effectively reduces user cost, and reduces the transmission of data
Amount, the transmission speed for improving data.
Fig. 3 is referred to, based on same present inventive concept, one embodiment of the invention provides a kind of verification of data device, the dress
Put including processor 301, memory 302, receiver 303, transmitter 304.
Wherein, processor 301 can include central processing unit (CPU) or ASIC
(Application Specific Integrated Circuit, ASIC), can be used for including one or more
The integrated circuit that control program performs, can be including the use of field programmable gate array (Field Programmable Gate
Array, FPGA) exploitation hardware circuit, baseband chip can be included.
In possible embodiment, the device can also include memory 302, show in the lump in figure 3.Memory
302 quantity can be one or more.Memory 302 can include read-only storage (Read Only Memory, ROM),
Random access memory (Random Access Memory, RAM) and magnetic disk storage, etc..Memory 302 can be used for depositing
Data are stored up, can be also used for storing the program code that processor 301 performs required by task.
Wherein, receiver 303 is used to receive the first verification data from data providing system;Wherein, first core
To data be the data providing system to be recorded in the data providing system a predetermined batch in N bars transaction in plain text enter
The first Hash table that the N bars transaction cryptographic Hash obtained after row Hash calculation is formed, N is positive integer;Processor 301 is used for from number
The M bars transaction being recorded in according in the memory cell of check system, reading in the predetermined batch in the verification of data system
In plain text;Wherein, M is positive integer;Processor 301 is additionally operable to, and the M bars are merchandised and carry out Hash calculation in plain text, obtains the transaction of M bars
Cryptographic Hash, to obtain the second verification data, the second verification data are to include the second Hash of the M bars transaction cryptographic Hash
Table;Processor 301 is additionally operable to, and is carried out Hash calculation to the first verification data obtained from the receiving module, is obtained the
One cryptographic Hash, and Hash calculation is carried out to the described second verification data, obtain the second cryptographic Hash;Processor 301 is additionally operable to, core
It is whether identical to first cryptographic Hash and second cryptographic Hash, to obtain checked result.
In possible embodiment, receiver 303 is additionally operable to receive signing messages from the data providing system;Its
In, the signing messages is the information obtained after the 3rd cryptographic Hash is encrypted the data providing system, and the described 3rd breathes out
The uncommon value data providing system obtains after carrying out Hash calculation to the described first verification data.
In possible embodiment, processor 301 is used to the signing messages be decrypted, to obtain the described 3rd
Cryptographic Hash;Processor 301 is additionally operable to check first cryptographic Hash and whether the 3rd cryptographic Hash is identical;Processor 301 is also
For when to be, whether verification first cryptographic Hash and second cryptographic Hash to be identical, to obtain the checked result.
In possible embodiment, processor 301 is additionally operable to when the checked result is different, verification described first
The transaction cryptographic Hash in data and the transaction cryptographic Hash in the described second verification data are checked, to obtain mistake transaction cryptographic Hash.
In possible embodiment, processor 301 is additionally operable to judge that the mistake transaction cryptographic Hash whether there is in institute
State in the second verification data;Processor 301 be additionally operable to for it is no when, with transmitter 304 to the data providing system ask institute
State the first transaction corresponding to mistake transaction cryptographic Hash in plain text;Processor 301 is additionally operable to when to be, is obtained from the memory cell
The second transaction corresponding with mistake transaction cryptographic Hash in plain text, and is sent the described second transaction by transmitter 304 in plain text
To the data providing system.
Fig. 4 is referred to, based on same present inventive concept, one embodiment of the invention provides a kind of data supplying device, the dress
Put including processor 401, memory 402, receiver 403, transmitter 404.
Wherein, processor 401 can include central processing unit (CPU) or ASIC
(Application Specific Integrated Circuit, ASIC), can be used for including one or more
The integrated circuit that control program performs, can be including the use of field programmable gate array (Field Programmable Gate
Array, FPGA) exploitation hardware circuit, baseband chip can be included.
In possible embodiment, the device can also include memory 402, show in the lump in Fig. 4.Memory
402 quantity can be one or more.Memory 402 can include read-only storage (Read Only Memory, ROM),
Random access memory (Random Access Memory, RAM) and magnetic disk storage, etc..Memory 402 can be used for depositing
Data are stored up, can be also used for storing the program code that processor 401 performs required by task.
Wherein, receiver 403 is used to receive verification of data request from verification of data system;Processor 401, for based on institute
Verification of data request is stated from the memory cell of data providing system, it is predetermined to read one be recorded in the data providing system
N bars transaction in batch is in plain text;Wherein, N is positive integer;Processor 401 is additionally operable to, and the N bars are merchandised and carry out Hash in plain text
Calculate, obtain N bars transaction cryptographic Hash, to obtain the first verification data, the first verification data are to include the N bars transaction to breathe out
First Hash table of uncommon value;Transmitter 404, for sending the first verification data to the verification of data system.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can be stored with journey
Sequence, the Overall Steps when program performs performed by including the base station described in the embodiment of the method as shown in preceding Fig. 1.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can be stored with journey
Sequence, the Overall Steps when program performs performed by including the base station described in the embodiment of the method as shown in preceding Fig. 2.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program production
Product.Therefore, in terms of the embodiment of the present invention can use complete hardware embodiment, complete software embodiment or combine software and hardware
Embodiment form.Moreover, the embodiment of the present invention can use wherein includes computer available programs generation in one or more
The meter implemented in the computer-usable storage medium (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) of code
The form of calculation machine program product.
The embodiment of the present invention is with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Flow chart and/or block diagram describe.It should be understood that can be by computer program instructions implementation process figure and/or block diagram
Each flow and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These calculating can be provided
Processing of the machine programmed instruction to all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices
Device is to produce a machine so that the instruction for passing through computer or the computing device of other programmable data processing devices produces
For realizing the function of being specified in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames
Device.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (14)
- A kind of 1. verification of data method, applied to verification of data system, it is characterised in that including:The receiving module of the verification of data system receives the first verification data from data providing system;Wherein, first core To data be the data providing system to be recorded in the data providing system a predetermined batch in N bars transaction in plain text enter The first Hash table that the N bars transaction cryptographic Hash obtained after row Hash calculation is formed, N is positive integer;For the processing module of the verification of data system from the memory cell of the verification of data system, reading is recorded in the number Merchandised in plain text according to the M bars in the predetermined batch of check system;Wherein, M is positive integer;The processing module is merchandised to the M bars and carries out Hash calculation in plain text, M bars transaction cryptographic Hash is obtained, to obtain the second core To data, the second verification data are to include the second Hash table of the M bars transaction cryptographic Hash;The processing module carries out Hash calculation to the first verification data obtained from the receiving module, obtains first and breathes out Uncommon value, and Hash calculation is carried out to the described second verification data, obtain the second cryptographic Hash;The processing module checks first cryptographic Hash and whether second cryptographic Hash is identical, to obtain checked result.
- 2. the method as described in claim 1, it is characterised in that methods described also includes:The receiving module of the verification of data system also receives signing messages from the data providing system;Wherein, the signature Information is the information obtained after the 3rd cryptographic Hash is encrypted the data providing system, and the 3rd cryptographic Hash is the number Obtained after carrying out Hash calculation to the described first verification data according to offer system.
- 3. method as claimed in claim 2, it is characterised in that the processing module check first cryptographic Hash with it is described Whether the second cryptographic Hash is identical, so that before obtaining checked result, methods described includes:The signing messages is decrypted the deciphering module of the verification of data system, to obtain the 3rd cryptographic Hash;The processing module checks first cryptographic Hash and whether the 3rd cryptographic Hash is identical;When to be, the processing module checks first cryptographic Hash and whether second cryptographic Hash is identical, to obtain State checked result.
- 4. the method as described in claim any one of 1-3, it is characterised in that methods described also includes:When the checked result is different, transaction cryptographic Hash and institute in processing module verification the first verification data The transaction cryptographic Hash in the second verification data is stated, to obtain mistake transaction cryptographic Hash.
- 5. method as claimed in claim 4, it is characterised in that after the processing module obtains mistake transaction cryptographic Hash, Methods described also includes:The processing module judges that the mistake transaction cryptographic Hash whether there is in the described second verification data;For it is no when, the processing module asks corresponding to mistake transaction cryptographic Hash first to hand over to the data providing system Easily in plain text;When to be, the processing module obtains the second transaction corresponding with mistake transaction cryptographic Hash from the memory cell In plain text, and by the described second transaction it is sent to the data providing system in plain text.
- A kind of 6. method for obtaining verification data, applied to data providing system, it is characterised in that including:The receiving module of the data providing system receives verification of data request from verification of data system;The processing module of the data providing system asks the storage list from the data providing system based on the verification of data In member, the N bars transaction plaintext in the predetermined batch being recorded in the data providing system is read;Wherein, N is positive integer;The processing module obtains N bars transaction cryptographic Hash, to obtain first to carrying out Hash calculation in N bars transaction plaintext Data are checked, the first verification data are to include the first Hash table of the N bars transaction cryptographic Hash;The first verification data are sent to the verification of data system.
- A kind of 7. verification of data device, it is characterised in that including:Receiving module, for receiving the first verification data from data providing system;Wherein, the first verification data are the number According to offer system to be recorded in the data providing system a predetermined batch in N bars transaction in plain text carry out Hash calculation after To the first Hash table for being formed of N bars transaction cryptographic Hash, N is positive integer;Processing module, for from the memory cell of verification of data system, reading the institute being recorded in the verification of data system State the M bars transaction plaintext in predetermined batch;Wherein, M is positive integer;The processing module is additionally operable to, and the M bars are merchandised and carry out Hash calculation in plain text, M bars transaction cryptographic Hash is obtained, to obtain Second verification data, the second verification data are to include the second Hash table of the M bars transaction cryptographic Hash;The processing module is additionally operable to, and is carried out Hash calculation to the first verification data obtained from the receiving module, is obtained The first cryptographic Hash is obtained, and Hash calculation is carried out to the described second verification data, obtains the second cryptographic Hash;The processing module is additionally operable to, and checks first cryptographic Hash and whether second cryptographic Hash is identical, to be checked As a result.
- 8. verification of data device as claimed in claim 7, it is characterised in that the receiving module is additionally operable to carry from the data Signing messages is received for system;Wherein, the signing messages is after the 3rd cryptographic Hash is encrypted the data providing system Obtained information, the 3rd cryptographic Hash are to be obtained after the data providing system carries out Hash calculation to the described first verification data Arrive.
- 9. verification of data device as claimed in claim 8, it is characterised in that the processing module includes:Submodule is decrypted, for the signing messages to be decrypted, to obtain the 3rd cryptographic Hash;Whether the first verification submodule is identical for checking first cryptographic Hash and the 3rd cryptographic Hash;Submodule is obtained, for when to be, whether with second cryptographic Hash identical, with acquisition if checking first cryptographic Hash The checked result.
- 10. the verification of data device as described in claim any one of 7-9, it is characterised in that the processing module is additionally operable to work as When the checked result is different, the transaction cryptographic Hash in verification the first verification data is checked in data with described second Transaction cryptographic Hash, to obtain mistake transaction cryptographic Hash.
- 11. verification of data device as claimed in claim 10, it is characterised in that the processing module also includes:Judging submodule, for judging that the mistake transaction cryptographic Hash whether there is in the described second verification data;Ask submodule, for for it is no when, ask corresponding to mistake transaction cryptographic Hash the to the data providing system One transaction is in plain text;Second acquisition submodule, for when to be, being obtained from the memory cell corresponding with mistake transaction cryptographic Hash Described second transaction in plain text, and is sent to the data providing system by the second transaction in plain text.
- A kind of 12. data supplying device, it is characterised in that including:Receiving module, for receiving verification of data request from verification of data system;Processing module, for from the memory cell of data providing system, reading to be recorded in institute based on verification of data request State the N bars transaction plaintext in the predetermined batch in data providing system;Wherein, N is positive integer;The processing module is additionally operable to, and the N bars are merchandised and carry out Hash calculation in plain text, N bars transaction cryptographic Hash is obtained, to obtain First verification data, the first verification data are to include the first Hash table of the N bars transaction cryptographic Hash;Sending module, for sending the first verification data to the verification of data system.
- 13. a kind of computer-readable recording medium, including instruction, when the instruction is run on computers so that the meter Calculation machine performs the method as described in any claims of claim 1-5.
- 14. a kind of computer-readable recording medium, including instruction, when the instruction is run on computers so that the meter Calculation machine performs method as claimed in claim 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710581560.4A CN107392764A (en) | 2017-07-17 | 2017-07-17 | The method, apparatus and computer-readable storage medium of a kind of verification of data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710581560.4A CN107392764A (en) | 2017-07-17 | 2017-07-17 | The method, apparatus and computer-readable storage medium of a kind of verification of data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107392764A true CN107392764A (en) | 2017-11-24 |
Family
ID=60340369
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710581560.4A Pending CN107392764A (en) | 2017-07-17 | 2017-07-17 | The method, apparatus and computer-readable storage medium of a kind of verification of data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107392764A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108632046A (en) * | 2018-05-14 | 2018-10-09 | 深圳市合众万邦科技有限公司 | It is classified card, read-write equipment, healthcare management system and method |
CN109684350A (en) * | 2018-12-15 | 2019-04-26 | 平安证券股份有限公司 | Registration of securities verification of data method, apparatus, computer equipment and storage medium |
CN110264213A (en) * | 2019-05-24 | 2019-09-20 | 阿里巴巴集团控股有限公司 | A kind of processing method of information, device and equipment |
WO2020147484A1 (en) * | 2019-01-14 | 2020-07-23 | 阿里巴巴集团控股有限公司 | Transaction clearing method and transaction clearing system |
CN112433988A (en) * | 2020-11-30 | 2021-03-02 | 中国建设银行股份有限公司 | Data checking method, device, computer equipment and storage medium |
CN113342857A (en) * | 2021-06-28 | 2021-09-03 | 北京三快在线科技有限公司 | Transaction record checking method and device, electronic equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101710410A (en) * | 2009-10-28 | 2010-05-19 | 金蝶软件(中国)有限公司 | Method and system for checking accounting data |
CN103780390A (en) * | 2013-11-05 | 2014-05-07 | 汉柏科技有限公司 | Method and device for presenting plaintext information by user |
CN105427031A (en) * | 2015-11-06 | 2016-03-23 | 中国南方电网有限责任公司 | Three-party data check method and system |
CN105677645A (en) * | 2014-11-17 | 2016-06-15 | 阿里巴巴集团控股有限公司 | Data sheet comparison method and device |
CN105933280A (en) * | 2016-03-15 | 2016-09-07 | 天地融科技股份有限公司 | Identity authentication method and system |
CN105989059A (en) * | 2015-02-09 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Data record checking method and device |
US20160335342A1 (en) * | 2014-03-18 | 2016-11-17 | Palantir Technologies Inc. | Determining and extracting changed data from a data source |
-
2017
- 2017-07-17 CN CN201710581560.4A patent/CN107392764A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101710410A (en) * | 2009-10-28 | 2010-05-19 | 金蝶软件(中国)有限公司 | Method and system for checking accounting data |
CN103780390A (en) * | 2013-11-05 | 2014-05-07 | 汉柏科技有限公司 | Method and device for presenting plaintext information by user |
US20160335342A1 (en) * | 2014-03-18 | 2016-11-17 | Palantir Technologies Inc. | Determining and extracting changed data from a data source |
CN105677645A (en) * | 2014-11-17 | 2016-06-15 | 阿里巴巴集团控股有限公司 | Data sheet comparison method and device |
CN105989059A (en) * | 2015-02-09 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Data record checking method and device |
CN105427031A (en) * | 2015-11-06 | 2016-03-23 | 中国南方电网有限责任公司 | Three-party data check method and system |
CN105933280A (en) * | 2016-03-15 | 2016-09-07 | 天地融科技股份有限公司 | Identity authentication method and system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108632046A (en) * | 2018-05-14 | 2018-10-09 | 深圳市合众万邦科技有限公司 | It is classified card, read-write equipment, healthcare management system and method |
CN108632046B (en) * | 2018-05-14 | 2021-05-04 | 深圳市合众万邦科技有限公司 | Grading card, reading and writing device, medical care management system and method |
CN109684350A (en) * | 2018-12-15 | 2019-04-26 | 平安证券股份有限公司 | Registration of securities verification of data method, apparatus, computer equipment and storage medium |
WO2020147484A1 (en) * | 2019-01-14 | 2020-07-23 | 阿里巴巴集团控股有限公司 | Transaction clearing method and transaction clearing system |
CN110264213A (en) * | 2019-05-24 | 2019-09-20 | 阿里巴巴集团控股有限公司 | A kind of processing method of information, device and equipment |
CN112433988A (en) * | 2020-11-30 | 2021-03-02 | 中国建设银行股份有限公司 | Data checking method, device, computer equipment and storage medium |
CN113342857A (en) * | 2021-06-28 | 2021-09-03 | 北京三快在线科技有限公司 | Transaction record checking method and device, electronic equipment and storage medium |
CN113342857B (en) * | 2021-06-28 | 2022-09-16 | 北京三快在线科技有限公司 | Transaction record checking method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107392764A (en) | The method, apparatus and computer-readable storage medium of a kind of verification of data | |
US11082234B2 (en) | Method and system for privacy-preserving social media advertising | |
US11728994B2 (en) | Systems and methods for cryptographic authentication of contactless cards | |
US20220237590A1 (en) | Systems and methods for phone-based card activation | |
CN109359974A (en) | Block chain method of commerce and device, electronic equipment | |
CN111191280B (en) | Blockchain transaction method based on encrypted data, electronic equipment and storage medium | |
US11210664B2 (en) | Systems and methods for amplifying the strength of cryptographic algorithms | |
CN107798517A (en) | Bill payment method, apparatus and system | |
CN102054258A (en) | Electronic bank safety certificating method and system based on mobile equipment | |
CN106716916A (en) | Authentication system and method | |
US20220377084A1 (en) | Decentralized techniques for verification of data in transport layer security and other contexts | |
CN108241976A (en) | A kind of Quick Response Code method of payment based on block chain | |
WO2021040784A1 (en) | Gateway agnostic tokenization | |
Akinyede et al. | Development of a secure mobile e-banking system | |
Thammarat et al. | A secure fair exchange for SMS‐based mobile payment protocols based on symmetric encryption algorithms with formal verification | |
CN104539616B (en) | Realize credible MESSAGE EXCHANGE and the system of storage between heterogeneous system | |
CN117078247A (en) | Payment medium opening method, device, equipment and storage medium | |
CN116823257A (en) | Information processing method, device, equipment and storage medium | |
CN107403310A (en) | Payment system and its method of payment under quantum Metropolitan Area Network (MAN) | |
CN109816525A (en) | A kind of data processing method and its device, medium, terminal | |
CN107947935A (en) | A kind of endorsement method of message, system and terminal device | |
Plummer | Bitcoin, Blockchain Technology, and Secure Hash Algorithms | |
SE512279C2 (en) | Electronic transaction system | |
CN115017431A (en) | Method and device for collecting customer application links and electronic equipment | |
CN112990904A (en) | Block chain-based transfer method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171124 |
|
RJ01 | Rejection of invention patent application after publication |