CN107609874A - A kind of transaction log data verification method and checking system - Google Patents

A kind of transaction log data verification method and checking system Download PDF

Info

Publication number
CN107609874A
CN107609874A CN201710929265.3A CN201710929265A CN107609874A CN 107609874 A CN107609874 A CN 107609874A CN 201710929265 A CN201710929265 A CN 201710929265A CN 107609874 A CN107609874 A CN 107609874A
Authority
CN
China
Prior art keywords
transaction log
log data
hash value
newest
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710929265.3A
Other languages
Chinese (zh)
Other versions
CN107609874B (en
Inventor
李勇
陆道如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengbao Co Ltd
Original Assignee
Hengbao Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hengbao Co Ltd filed Critical Hengbao Co Ltd
Priority to CN201710929265.3A priority Critical patent/CN107609874B/en
Publication of CN107609874A publication Critical patent/CN107609874A/en
Application granted granted Critical
Publication of CN107609874B publication Critical patent/CN107609874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This application discloses a kind of transaction log data verification method and checking system, it is related to the verification technique field of electronic data, solves the technical problem that can not identify that transaction log data is tampered in the prior art using Hash chain modes.The transaction log data verification method of the application, comprises the following steps:Store whole transaction log datas and transaction log data hash value;Obtain whole transaction log datas;According to the transaction log data of whole, newest transaction log data hash value is calculated;Read the newest transaction log data hash value of storage;Whether the newest transaction log data hash value for judging to calculate and the newest transaction log data hash value read are consistent;It is consistent with the newest transaction log data hash value read in response to the newest transaction log data hash value that calculates, judge that transaction log data is not tampered with.The application is mainly used in transaction log data checking.

Description

A kind of transaction log data verification method and checking system
Technical field
The application is related to the verification technique field of electronic data, and in particular to a kind of transaction log data verification method and tests Card system.
Background technology
With the lifting of scientific and technological level, increasing payment species and the means of payment are appeared in our life.By In the increase for paying species, personal or unit may need to carry out expense rating inquiry and amount of money system in different payment mechanisms Meter.In the case, the safety and reliability of payment transaction daily record data has increasing need for paying attention to.With conventional payment counterparty Exemplified by formula, in bank's card payment transactions system, day of trade when card and credit card issuer backstage can all preserve off line payment transaction Will.For a legal holder, the transaction log and hair fastener recorded in card can be got by legal means The transaction log for the backstage record that row provides.How to ensure the reliability of data, be the problem that holder may encounter. Equally, acquirer and payment mechanism are also required to a kind of transaction log data checking system to verify that transaction log data is not non- Method is distorted.
Current daily record storage mode, most technical concerns point wall scroll transaction log protection above, for complete The interrelational form concern of this chain type of portion's daily record is less.Exemplified by still in a manner of conventional payment, in payment transaction log query mistake Cheng Zhong, when holder (or consumer) has doubt to acquired credit card issuer backstage transaction log, or when holder obtains When the transaction log that transaction log and the credit card issuer backstage for the card got provide occurs inconsistent, holder can not determine problem Go out at which side, and existing card transaction daily record data can not provide method to holder and verify credit card issuer from rear for holder Whether the transaction log that platform obtains is tampered.
The content of the invention
The purpose of the application is, there is provided a kind of transaction log data verification method and checking system, it is existing for solving The technical problem that transaction log data is tampered can not be identified in technology.
The transaction log data verification method of the application, comprises the following steps:
Store whole transaction log datas and transaction log data hash value;
Obtain whole transaction log datas;
According to the transaction log data of whole, newest transaction log data hash value is calculated;
Read the newest transaction log data hash value of storage;
Whether the newest transaction log data hash value and the newest transaction log data hash value of reading that judgement calculates Unanimously;
In response to the newest transaction log data hash value and the newest transaction log data hash value one of reading calculated Cause, judge that transaction log data is not tampered with.
Alternatively, the newest transaction log data hash value and the newest transaction log data of reading in response to calculating Hash value is inconsistent, judges that transaction log data is tampered.
Further, the newest transaction log data hash value and the newest transaction log number of reading in response to calculating It is inconsistent according to hash value, judge that one or several data in acquired transaction log data are tampered.
Preferably, while store transaction daily record data, the transaction log number corresponding with transaction log data is calculated According to hash value, and recorded.
Preferably, the computational methods of transaction log data hash value, including following sub-step:
Calculate initial transaction daily record data hash value;
1st transaction log number is calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time According to hash value;
2nd transaction log number is calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time According to hash value;
Ith transaction log is calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith Data hash value, i are the natural number more than 2.
The transaction log data verification method of the application, supported suitable for all records the place of transaction log.It is this Transaction log data verification method, does not interfere with the storage and access of original daily record data, but can make holder or disappear Expense person confirms whether acquired transaction log is authentic data, confirms whether transaction log data is tampered.
The application also proposes a kind of transaction log data checking system, including:
Memory module, store whole transaction log datas and transaction log data hash value;
First acquisition module, obtain whole transaction log datas;
Computing module, according to the transaction log data of whole, calculate newest transaction log data hash value;
Second acquisition module, read the newest transaction log data hash value of storage;
Determination module, judge the newest transaction log data hash value calculated and the newest transaction log data read Whether hash value is consistent;
First output module, in response to the newest transaction log data hash value and the newest transaction log of reading calculated Data hash value is consistent, judges that transaction log data is not tampered with.
Alternatively, in addition to the second output module, in response to the newest transaction log data hash value that calculates with reading The newest transaction log data hash value taken is inconsistent, judges that transaction log data is tampered.
Further, the newest transaction log data hash value and the newest transaction log number of reading in response to calculating It is inconsistent according to hash value, judge that one or several data in acquired transaction log data are tampered.
Preferably, memory module calculates the friendship corresponding with transaction log data while store transaction daily record data Easy daily record data hash value, and recorded.
Preferably, in addition to hash value computing module, hash value computing module include:
Initial computation unit, calculate initial transaction daily record data hash value;
First computing unit, the 1st is calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time Secondary transaction log data hash value;
Second computing unit, is calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time 2 transaction log data hash values;
I-th computing unit, calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith Ith transaction log data hash value, i are the natural number more than 2.
The transaction log data checking system of the application is consistent with the technique effect of transaction log data verification method, herein Just do not repeat one by one.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments described in application, for those of ordinary skill in the art, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is the flow chart of the transaction log data verification method of the application;
Fig. 2 is the structural representation of the data storage method of the application;
Fig. 3 is the flow chart of the computational methods of the transaction log data hash value of the application;
Fig. 4 is the schematic diagram of the computational methods of the transaction log data hash value of the application;
Fig. 5 is the structural representation of the transaction log data checking system of the application;
Fig. 6 is the structural representation of the hash value computing module of the application.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on the present invention In embodiment, the every other embodiment that those skilled in the art are obtained under the premise of creative work is not made, all Belong to the scope of protection of the invention.
Embodiment one
Fig. 1 is the flow chart of the transaction log data verification method of the application.As shown in figure 1, the transaction log of the application Data verification method, comprise the following steps:
Store whole transaction log datas and transaction log data hash value (110);Obtain whole transaction log numbers According to (120);According to the transaction log data of whole, newest transaction log data hash value (130) is calculated;Read storage most New Transaction daily record data hash value (140);Judge the newest transaction log data hash value calculated and the newest transaction read Whether daily record data hash value is consistent (150);It is newest with reading in response to the newest transaction log data hash value that calculates Transaction log data hash value is consistent, judges that transaction log data is not tampered with (160).In response to the newest transaction calculated Daily record data hash value and the newest transaction log data hash value read are inconsistent, judge that transaction log data is tampered (170)。
The transaction log data verification method of the application, supported suitable for all records the place of transaction log.It is this Transaction log data verification method, does not interfere with the storage and access of original daily record data, but can make holder or disappear Expense person confirms whether acquired transaction log is authentic data, confirms whether transaction log data is tampered.
Wherein, the newest transaction log data hash value and the newest transaction log data of reading in response to calculating Hash value is inconsistent, judges that one or several data in acquired transaction log data are tampered.In response to what is calculated Newest transaction log data hash value is consistent with the newest transaction log data hash value read, judges the acquired day of trade Will data are all not tampered with.
Preferably, while store transaction daily record data, the transaction log number corresponding with transaction log data is calculated According to hash value, and recorded.Fig. 2 is the structural representation of the data storage method of the application.As shown in Fig. 2 RecordnFor The transaction log of n-th, TransHashnFor the transaction log data hash value of n-th, n is natural number, n=1,2,3, 4…...When recording transaction log data, it is necessary to calculate and preserve a transaction log data hash value.All days of trade Will data are recorded, and each transaction log data generates a corresponding transaction log data in firm generation Hash value.
In storage, all transaction log datas and the day of trade corresponding with each transaction log data are stored Will data hash value;When limited storage space, also can only store all transaction log datas and with the newest day of trade The corresponding transaction log data hash value of will data, what is shown in Fig. 2 is only storage and newest transaction log data phase Corresponding transaction log data hash value.
Exemplarily, when n is 3,3 transaction logs are generated.Store 3 transaction log data Record1、 Record2、Record3The transaction log data hash value TransHash corresponding with each transaction log data1、 TransHash2、TransHash3, 3 transaction log data Record can also be stored1、Record2、Record3With it is newest The corresponding transaction log data hash value TransHash of transaction log data3
It is pointed out that when storing all transaction log data and corresponding with each transaction log data During transaction log data hash value;When judging that one or several data in acquired transaction log data are tampered, than To transaction log data hash value corresponding to every transaction log data of storage and the every transaction log data pair calculated The transaction log data hash value answered, with regard to the transaction log data being tampered can be found out.
Fig. 3 is the flow chart of the computational methods of the transaction log data hash value of the application.As shown in figure 3, transaction log The computational methods of data hash value, including following sub-step:Calculate initial transaction daily record data hash value (310);According to first Beginning transaction log data hash value and the transaction log data of the 1st time calculate the 1st transaction log data hash value (320); 2nd transaction log data hash value is calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time (330);Ith transaction log number is calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith According to hash value, i is the natural number (340) more than 2.
Fig. 4 is the schematic diagram of the computational methods of the transaction log data hash value of the application.As shown in figure 4, TransHashnFor the transaction log data hash value of n-th, n is natural number, n=1,2,3,4 ... ..;| | it is connector, RecordnFor the transaction log data of n-th, n values are bigger, record newer, RecordnThe newest transaction log of record is represented, Recordn-1N-1 new record is represented, the like;N is natural number, n=1,2,3,4 ... ..;Hash (), it is data Hash algorithm, DnData block after being connected for (n-1)th transaction log data hash value with n-th transaction log data, n are certainly So number, n=1,2,3,4 ... ...
When n is 1, it is only necessary to step 310 and step 320 are performed, wherein, in step 310, initial transaction daily record data Hash It is worth for TransHash0=Hash (L), L are the length of transaction log.L byte length is fixed.D1For TransHash0| |Record1.In step 320, calculated the 1st time according to initial transaction daily record data hash value and the transaction log data of the 1st time The formula of transaction log data hash value is:
TransHash1=Hash (TransHash0||Record1) ... formula (1);
When n is 2, D2For TransHash1||Record2
TransHash2=Hash (TransHash1||Record2) ... formula (2);
When n is 3, D3For TransHash2||Record3
TransHash3=Hash (TransHash2||Record3) ... formula (3);
During the n-th transaction, DnFor TransHashn-1||Recordn
It can thus be concluded that TransHashn=Hash (TransHashn-1||Recordn) ... formula (4),
N is natural number, n=1,2,3,4 ... ...
It should be noted that the method for the newest transaction log data hash value calculated, performs as described above hand over The computational methods of easy daily record data hash value.The newest transaction log data hash value calculated is according to all days of trade Obtained by will data are calculated according to above-mentioned formula;Newest transaction log data hash value is obtained, is directly obtained. Used computational algorithm is hash algorithm.Hash algorithm is one of SHA-1, SHA-256, MD5 algorithm or other Hash Algorithm.
Exemplarily, the transaction log data verification method of the application can be used on credit card issuer, can also be used On the medium of any need checking transaction log, when the memory space of smart card is sufficiently large, transaction log data verification method It can also use on smart cards..
Embodiment two
The application also proposes a kind of transaction log data checking system, suitable for the transaction log data described in embodiment one Verification method.Fig. 5 is the structural representation of the transaction log data checking system of the application.As shown in figure 5, the transaction of the application Daily record data verifies system, including:Memory module 51, store whole transaction log datas and transaction log data hash value; First acquisition module 52, obtains whole transaction log datas;Computing module 53, according to the transaction log data of whole, calculate Go out newest transaction log data hash value;Second acquisition module 54, read the newest transaction log data hash value of storage;Judge Module 55, judge the newest transaction log data hash value that calculates and the newest transaction log data hash value that reads whether one Cause;First output module 56, in response to the newest transaction log data hash value and the newest transaction log number of reading calculated It is consistent according to hash value, judge that transaction log data is not tampered with.
Wherein, transaction log data checking system, in addition to the second output module, in response to the newest transaction calculated Daily record data hash value and the newest transaction log data hash value read are inconsistent, judge acquired transaction log data quilt Distort.Differ in response to the newest transaction log data hash value calculated with the newest transaction log data hash value read Cause, judge that one or several data in acquired transaction log data are tampered.
Alternatively, memory module 51 calculates corresponding with transaction log data while store transaction daily record data Transaction log data hash value, and recorded.
Specifically, transaction log data checking system also includes hash value computing module, hash value computing module, and Fig. 6 is The structural representation of the hash value computing module of the application.As shown in fig. 6, hash value computing module includes:
Initial computation unit 61, calculate initial transaction daily record data hash value;
First computing unit 62, calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time 1st transaction log data hash value;
Second computing unit 63, calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time 2nd transaction log data hash value;
I-th computing unit 64, calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith Go out ith transaction log data hash value, i is the natural number more than 2.
Computing module 53 is consistent with the computational methods of hash value computing module.
Memory module 51 is in storage, when memory space is sufficiently large, stores whole transaction log datas and owns The transaction log data hash value corresponding with each transaction log data;When limited storage space, also can only store Whole transaction log datas transaction log data hash value corresponding with newest transaction log data.
It is pointed out that when memory module 51 store all transaction log datas and with each transaction log number During according to corresponding transaction log data hash value;One or several data quilt in the transaction log data acquired in judging When distorting, transaction log data hash value corresponding to every transaction log data of storage and the every day of trade calculated are compared Transaction log data hash value corresponding to will data, with regard to the transaction log data being tampered can be found out.
Preferably, transaction log data and transaction log data hash value should preserve success simultaneously, if alternative one fails, Then another operation should fail simultaneously.It is i.e. corresponding, memory module 51 store all transaction log datas and with it is every During the corresponding transaction log data hash value of one transaction log data, each transaction log data and corresponding transaction Daily record data hash value should preserve success simultaneously;Whole transaction log datas and newest transaction are only stored in memory module 51 During the corresponding transaction log data hash value of daily record data, newest transaction log data and the corresponding newest day of trade Will data hash value should preserve success simultaneously.
Exemplarily, the transaction log data checking system of the application can be credit card issuer, can also be integrated in any need Verify on the medium of transaction log.When the memory space of smart card is sufficiently large, transaction log data checking system can also Integrate on smart cards.
It should be noted that the method for the newest transaction log data hash value calculated, is performed such as the institute of embodiment one The computational methods for the transaction log data hash value stated.The newest transaction log data hash value calculated is according to all Obtained by transaction log data is calculated according to above-mentioned formula;Newest transaction log data hash value is read, directly from storage Module 51 is read out.Used computational algorithm is hash algorithm.Hash algorithm is SHA-1, SHA-256, MD5 algorithm One of or other hash algorithms.
The transaction log data checking system of the application is consistent with the technique effect of transaction log data verification method, herein Just do not repeat one by one.
Although having been described for the preferred embodiment of the application, those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the application scope.Obviously, those skilled in the art can be to the application Various changes and modification are carried out without departing from spirit and scope.So, if these modifications and variations of the application Belong within the scope of the application claim and its equivalent technologies, then the application is also intended to exist comprising these changes and modification It is interior.

Claims (10)

1. a kind of transaction log data verification method, it is characterised in that comprise the following steps:
Store whole transaction log datas and transaction log data hash value;
Obtain whole transaction log datas;
According to the transaction log data of whole, newest transaction log data hash value is calculated;
Read the newest transaction log data hash value of storage;
Whether the newest transaction log data hash value for judging to calculate and the newest transaction log data hash value read are consistent;
It is consistent with the newest transaction log data hash value read in response to the newest transaction log data hash value that calculates, sentence Disconnected transaction log data is not tampered with.
2. transaction log data verification method as claimed in claim 1, it is characterised in that in response to the newest friendship calculated Easy daily record data hash value and the newest transaction log data hash value read are inconsistent, judge that transaction log data is tampered.
3. transaction log data verification method as claimed in claim 2, it is characterised in that in response to the newest friendship calculated Easy daily record data hash value and the newest transaction log data hash value read are inconsistent, judge acquired transaction log data In one or several data be tampered.
4. transaction log data verification method as claimed in claim 1, it is characterised in that in the same of store transaction daily record data When, the transaction log data hash value corresponding with transaction log data is calculated, and recorded.
5. transaction log data verification method as claimed in claim 4, it is characterised in that the meter of transaction log data hash value Calculation method, including following sub-step:
Calculate initial transaction daily record data hash value;
1st transaction log data is calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time Hash value;
2nd transaction log data is calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time Hash value;
Ith transaction log data is calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith Hash value, i are the natural number more than 2.
6. a kind of transaction log data verifies system, it is characterised in that including:
Memory module, store whole transaction log datas and transaction log data hash value;
First acquisition module, obtain whole transaction log datas;
Computing module, according to the transaction log data of whole, calculate newest transaction log data hash value;
Second acquisition module, read the newest transaction log data hash value of storage;
Determination module, judge the newest transaction log data hash value calculated and the newest transaction log data hash value read It is whether consistent;
First output module, in response to the newest transaction log data hash value and the newest transaction log data of reading calculated Hash value is consistent, judges that transaction log data is not tampered with.
7. transaction log data as claimed in claim 6 verifies system, it is characterised in that also including the second output module, rings The newest transaction log data hash value that Ying Yu is calculated and the newest transaction log data hash value read are inconsistent, judge Transaction log data is tampered.
8. transaction log data as claimed in claim 7 verifies system, it is characterised in that in response to the newest friendship calculated Easy daily record data hash value and the newest transaction log data hash value read are inconsistent, judge acquired transaction log data In one or several data be tampered.
9. transaction log data as claimed in claim 6 verifies system, it is characterised in that memory module is in store transaction daily record While data, the transaction log data hash value corresponding with transaction log data is calculated, and recorded.
10. transaction log data as claimed in claim 9 verifies system, it is characterised in that also including hash value computing module, Hash value computing module includes:
Initial computation unit, calculate initial transaction daily record data hash value;
First computing unit, the 1st friendship is calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time Easy daily record data hash value;
Second computing unit, calculated the 2nd time according to the 1st transaction log data hash value and the transaction log data of the 2nd time Transaction log data hash value;
I-th computing unit, ith is calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith Transaction log data hash value, i are the natural number more than 2.
CN201710929265.3A 2017-10-09 2017-10-09 Transaction log data verification method and verification system Active CN107609874B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710929265.3A CN107609874B (en) 2017-10-09 2017-10-09 Transaction log data verification method and verification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710929265.3A CN107609874B (en) 2017-10-09 2017-10-09 Transaction log data verification method and verification system

Publications (2)

Publication Number Publication Date
CN107609874A true CN107609874A (en) 2018-01-19
CN107609874B CN107609874B (en) 2020-06-30

Family

ID=61067624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710929265.3A Active CN107609874B (en) 2017-10-09 2017-10-09 Transaction log data verification method and verification system

Country Status (1)

Country Link
CN (1) CN107609874B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112506884A (en) * 2020-12-10 2021-03-16 杭州安恒信息技术股份有限公司 Log checking method, device, equipment and storage medium
CN115766166A (en) * 2022-11-08 2023-03-07 鼎铉商用密码测评技术(深圳)有限公司 Log processing method, log processing device and storage medium
CN115766165A (en) * 2022-11-08 2023-03-07 鼎铉商用密码测评技术(深圳)有限公司 Log processing method, log processing device and storage medium
CN116305290A (en) * 2023-05-16 2023-06-23 北京安天网络安全技术有限公司 System log security detection method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826219A (en) * 2010-05-05 2010-09-08 南京熊猫信息产业有限公司 Rail transportation ticket-card processing intelligent system and data encryption auditing method
CN103793522A (en) * 2008-10-20 2014-05-14 王强 Method and system for rapidly scanning feature codes
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
US20170161724A1 (en) * 2015-12-05 2017-06-08 Uniway Technology Limited Radio frequency identification card and mobile phone interlinking embedded electronic payment apparatus and methods
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793522A (en) * 2008-10-20 2014-05-14 王强 Method and system for rapidly scanning feature codes
CN101826219A (en) * 2010-05-05 2010-09-08 南京熊猫信息产业有限公司 Rail transportation ticket-card processing intelligent system and data encryption auditing method
US20170161724A1 (en) * 2015-12-05 2017-06-08 Uniway Technology Limited Radio frequency identification card and mobile phone interlinking embedded electronic payment apparatus and methods
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112506884A (en) * 2020-12-10 2021-03-16 杭州安恒信息技术股份有限公司 Log checking method, device, equipment and storage medium
CN115766166A (en) * 2022-11-08 2023-03-07 鼎铉商用密码测评技术(深圳)有限公司 Log processing method, log processing device and storage medium
CN115766165A (en) * 2022-11-08 2023-03-07 鼎铉商用密码测评技术(深圳)有限公司 Log processing method, log processing device and storage medium
CN115766166B (en) * 2022-11-08 2023-09-19 鼎铉商用密码测评技术(深圳)有限公司 Log processing method, device and storage medium
CN115766165B (en) * 2022-11-08 2023-10-27 鼎铉商用密码测评技术(深圳)有限公司 Log processing method, device and storage medium
CN116305290A (en) * 2023-05-16 2023-06-23 北京安天网络安全技术有限公司 System log security detection method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN107609874B (en) 2020-06-30

Similar Documents

Publication Publication Date Title
CN107609874A (en) A kind of transaction log data verification method and checking system
US7841539B2 (en) Smart card with random temporary account number generation
US20040034734A1 (en) Method of data caching on a smartcard
US8768802B2 (en) System and method of matching financial transaction records to merchant records of a merchant profile database
US8925826B2 (en) Magnetic stripe-based transactions using mobile communication devices
CN107239954A (en) It is a kind of to improve the method and device that block produces speed
US8001047B2 (en) Method and apparatus for effecting payment
US9213968B2 (en) Systems and methods for conducting financial transactions using non-standard magstripe payment cards
CN107993146A (en) The air control method and system of financial big data
CN108364218A (en) A kind of sharing method and device of user's collage-credit data
CN110880143A (en) System and method for processing transaction verification operations in decentralized applications
CN100587740C (en) Tax-control data declaration, checking treatment method of network tax-control system
CN108230130A (en) Day cuts the method, apparatus and electronic equipment of data verification
CN110222035A (en) A kind of efficient fault-tolerance approach of database page based on exclusive or check and journal recovery
US7761353B1 (en) Validating financial accounts
CN105260130B (en) A kind of reading/writing method of Seagate hard-disk system file
CN115082173B (en) Account checking processing method and device, computer equipment and storage medium
JPS6112309B2 (en)
TWM624352U (en) Trading data integration system
CN111383092A (en) Cloud computing big data credit limit estimation method and system based on block chain
CN103793486A (en) Method and system for performing storage and seal verification on seal combined data
CN112036891B (en) Transaction control method and device, computer equipment and computer readable storage medium
CN114387071A (en) Capital settlement method, device, equipment and storage medium
JPH08202774A (en) Electronic receipt filing card and device for performing access to this card
JP6585135B2 (en) Automatic transaction equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant