CN107609874A - A kind of transaction log data verification method and checking system - Google Patents
A kind of transaction log data verification method and checking system Download PDFInfo
- Publication number
- CN107609874A CN107609874A CN201710929265.3A CN201710929265A CN107609874A CN 107609874 A CN107609874 A CN 107609874A CN 201710929265 A CN201710929265 A CN 201710929265A CN 107609874 A CN107609874 A CN 107609874A
- Authority
- CN
- China
- Prior art keywords
- transaction log
- log data
- hash value
- newest
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
This application discloses a kind of transaction log data verification method and checking system, it is related to the verification technique field of electronic data, solves the technical problem that can not identify that transaction log data is tampered in the prior art using Hash chain modes.The transaction log data verification method of the application, comprises the following steps:Store whole transaction log datas and transaction log data hash value;Obtain whole transaction log datas;According to the transaction log data of whole, newest transaction log data hash value is calculated;Read the newest transaction log data hash value of storage;Whether the newest transaction log data hash value for judging to calculate and the newest transaction log data hash value read are consistent;It is consistent with the newest transaction log data hash value read in response to the newest transaction log data hash value that calculates, judge that transaction log data is not tampered with.The application is mainly used in transaction log data checking.
Description
Technical field
The application is related to the verification technique field of electronic data, and in particular to a kind of transaction log data verification method and tests
Card system.
Background technology
With the lifting of scientific and technological level, increasing payment species and the means of payment are appeared in our life.By
In the increase for paying species, personal or unit may need to carry out expense rating inquiry and amount of money system in different payment mechanisms
Meter.In the case, the safety and reliability of payment transaction daily record data has increasing need for paying attention to.With conventional payment counterparty
Exemplified by formula, in bank's card payment transactions system, day of trade when card and credit card issuer backstage can all preserve off line payment transaction
Will.For a legal holder, the transaction log and hair fastener recorded in card can be got by legal means
The transaction log for the backstage record that row provides.How to ensure the reliability of data, be the problem that holder may encounter.
Equally, acquirer and payment mechanism are also required to a kind of transaction log data checking system to verify that transaction log data is not non-
Method is distorted.
Current daily record storage mode, most technical concerns point wall scroll transaction log protection above, for complete
The interrelational form concern of this chain type of portion's daily record is less.Exemplified by still in a manner of conventional payment, in payment transaction log query mistake
Cheng Zhong, when holder (or consumer) has doubt to acquired credit card issuer backstage transaction log, or when holder obtains
When the transaction log that transaction log and the credit card issuer backstage for the card got provide occurs inconsistent, holder can not determine problem
Go out at which side, and existing card transaction daily record data can not provide method to holder and verify credit card issuer from rear for holder
Whether the transaction log that platform obtains is tampered.
The content of the invention
The purpose of the application is, there is provided a kind of transaction log data verification method and checking system, it is existing for solving
The technical problem that transaction log data is tampered can not be identified in technology.
The transaction log data verification method of the application, comprises the following steps:
Store whole transaction log datas and transaction log data hash value;
Obtain whole transaction log datas;
According to the transaction log data of whole, newest transaction log data hash value is calculated;
Read the newest transaction log data hash value of storage;
Whether the newest transaction log data hash value and the newest transaction log data hash value of reading that judgement calculates
Unanimously;
In response to the newest transaction log data hash value and the newest transaction log data hash value one of reading calculated
Cause, judge that transaction log data is not tampered with.
Alternatively, the newest transaction log data hash value and the newest transaction log data of reading in response to calculating
Hash value is inconsistent, judges that transaction log data is tampered.
Further, the newest transaction log data hash value and the newest transaction log number of reading in response to calculating
It is inconsistent according to hash value, judge that one or several data in acquired transaction log data are tampered.
Preferably, while store transaction daily record data, the transaction log number corresponding with transaction log data is calculated
According to hash value, and recorded.
Preferably, the computational methods of transaction log data hash value, including following sub-step:
Calculate initial transaction daily record data hash value;
1st transaction log number is calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time
According to hash value;
2nd transaction log number is calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time
According to hash value;
Ith transaction log is calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith
Data hash value, i are the natural number more than 2.
The transaction log data verification method of the application, supported suitable for all records the place of transaction log.It is this
Transaction log data verification method, does not interfere with the storage and access of original daily record data, but can make holder or disappear
Expense person confirms whether acquired transaction log is authentic data, confirms whether transaction log data is tampered.
The application also proposes a kind of transaction log data checking system, including:
Memory module, store whole transaction log datas and transaction log data hash value;
First acquisition module, obtain whole transaction log datas;
Computing module, according to the transaction log data of whole, calculate newest transaction log data hash value;
Second acquisition module, read the newest transaction log data hash value of storage;
Determination module, judge the newest transaction log data hash value calculated and the newest transaction log data read
Whether hash value is consistent;
First output module, in response to the newest transaction log data hash value and the newest transaction log of reading calculated
Data hash value is consistent, judges that transaction log data is not tampered with.
Alternatively, in addition to the second output module, in response to the newest transaction log data hash value that calculates with reading
The newest transaction log data hash value taken is inconsistent, judges that transaction log data is tampered.
Further, the newest transaction log data hash value and the newest transaction log number of reading in response to calculating
It is inconsistent according to hash value, judge that one or several data in acquired transaction log data are tampered.
Preferably, memory module calculates the friendship corresponding with transaction log data while store transaction daily record data
Easy daily record data hash value, and recorded.
Preferably, in addition to hash value computing module, hash value computing module include:
Initial computation unit, calculate initial transaction daily record data hash value;
First computing unit, the 1st is calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time
Secondary transaction log data hash value;
Second computing unit, is calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time
2 transaction log data hash values;
I-th computing unit, calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith
Ith transaction log data hash value, i are the natural number more than 2.
The transaction log data checking system of the application is consistent with the technique effect of transaction log data verification method, herein
Just do not repeat one by one.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments described in application, for those of ordinary skill in the art, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is the flow chart of the transaction log data verification method of the application;
Fig. 2 is the structural representation of the data storage method of the application;
Fig. 3 is the flow chart of the computational methods of the transaction log data hash value of the application;
Fig. 4 is the schematic diagram of the computational methods of the transaction log data hash value of the application;
Fig. 5 is the structural representation of the transaction log data checking system of the application;
Fig. 6 is the structural representation of the hash value computing module of the application.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Ground describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on the present invention
In embodiment, the every other embodiment that those skilled in the art are obtained under the premise of creative work is not made, all
Belong to the scope of protection of the invention.
Embodiment one
Fig. 1 is the flow chart of the transaction log data verification method of the application.As shown in figure 1, the transaction log of the application
Data verification method, comprise the following steps:
Store whole transaction log datas and transaction log data hash value (110);Obtain whole transaction log numbers
According to (120);According to the transaction log data of whole, newest transaction log data hash value (130) is calculated;Read storage most
New Transaction daily record data hash value (140);Judge the newest transaction log data hash value calculated and the newest transaction read
Whether daily record data hash value is consistent (150);It is newest with reading in response to the newest transaction log data hash value that calculates
Transaction log data hash value is consistent, judges that transaction log data is not tampered with (160).In response to the newest transaction calculated
Daily record data hash value and the newest transaction log data hash value read are inconsistent, judge that transaction log data is tampered
(170)。
The transaction log data verification method of the application, supported suitable for all records the place of transaction log.It is this
Transaction log data verification method, does not interfere with the storage and access of original daily record data, but can make holder or disappear
Expense person confirms whether acquired transaction log is authentic data, confirms whether transaction log data is tampered.
Wherein, the newest transaction log data hash value and the newest transaction log data of reading in response to calculating
Hash value is inconsistent, judges that one or several data in acquired transaction log data are tampered.In response to what is calculated
Newest transaction log data hash value is consistent with the newest transaction log data hash value read, judges the acquired day of trade
Will data are all not tampered with.
Preferably, while store transaction daily record data, the transaction log number corresponding with transaction log data is calculated
According to hash value, and recorded.Fig. 2 is the structural representation of the data storage method of the application.As shown in Fig. 2 RecordnFor
The transaction log of n-th, TransHashnFor the transaction log data hash value of n-th, n is natural number, n=1,2,3,
4…...When recording transaction log data, it is necessary to calculate and preserve a transaction log data hash value.All days of trade
Will data are recorded, and each transaction log data generates a corresponding transaction log data in firm generation
Hash value.
In storage, all transaction log datas and the day of trade corresponding with each transaction log data are stored
Will data hash value;When limited storage space, also can only store all transaction log datas and with the newest day of trade
The corresponding transaction log data hash value of will data, what is shown in Fig. 2 is only storage and newest transaction log data phase
Corresponding transaction log data hash value.
Exemplarily, when n is 3,3 transaction logs are generated.Store 3 transaction log data Record1、
Record2、Record3The transaction log data hash value TransHash corresponding with each transaction log data1、
TransHash2、TransHash3, 3 transaction log data Record can also be stored1、Record2、Record3With it is newest
The corresponding transaction log data hash value TransHash of transaction log data3。
It is pointed out that when storing all transaction log data and corresponding with each transaction log data
During transaction log data hash value;When judging that one or several data in acquired transaction log data are tampered, than
To transaction log data hash value corresponding to every transaction log data of storage and the every transaction log data pair calculated
The transaction log data hash value answered, with regard to the transaction log data being tampered can be found out.
Fig. 3 is the flow chart of the computational methods of the transaction log data hash value of the application.As shown in figure 3, transaction log
The computational methods of data hash value, including following sub-step:Calculate initial transaction daily record data hash value (310);According to first
Beginning transaction log data hash value and the transaction log data of the 1st time calculate the 1st transaction log data hash value (320);
2nd transaction log data hash value is calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time
(330);Ith transaction log number is calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith
According to hash value, i is the natural number (340) more than 2.
Fig. 4 is the schematic diagram of the computational methods of the transaction log data hash value of the application.As shown in figure 4,
TransHashnFor the transaction log data hash value of n-th, n is natural number, n=1,2,3,4 ... ..;| | it is connector,
RecordnFor the transaction log data of n-th, n values are bigger, record newer, RecordnThe newest transaction log of record is represented,
Recordn-1N-1 new record is represented, the like;N is natural number, n=1,2,3,4 ... ..;Hash (), it is data
Hash algorithm, DnData block after being connected for (n-1)th transaction log data hash value with n-th transaction log data, n are certainly
So number, n=1,2,3,4 ... ...
When n is 1, it is only necessary to step 310 and step 320 are performed, wherein, in step 310, initial transaction daily record data Hash
It is worth for TransHash0=Hash (L), L are the length of transaction log.L byte length is fixed.D1For TransHash0|
|Record1.In step 320, calculated the 1st time according to initial transaction daily record data hash value and the transaction log data of the 1st time
The formula of transaction log data hash value is:
TransHash1=Hash (TransHash0||Record1) ... formula (1);
When n is 2, D2For TransHash1||Record2;
TransHash2=Hash (TransHash1||Record2) ... formula (2);
When n is 3, D3For TransHash2||Record3;
TransHash3=Hash (TransHash2||Record3) ... formula (3);
During the n-th transaction, DnFor TransHashn-1||Recordn
It can thus be concluded that TransHashn=Hash (TransHashn-1||Recordn) ... formula (4),
N is natural number, n=1,2,3,4 ... ...
It should be noted that the method for the newest transaction log data hash value calculated, performs as described above hand over
The computational methods of easy daily record data hash value.The newest transaction log data hash value calculated is according to all days of trade
Obtained by will data are calculated according to above-mentioned formula;Newest transaction log data hash value is obtained, is directly obtained.
Used computational algorithm is hash algorithm.Hash algorithm is one of SHA-1, SHA-256, MD5 algorithm or other Hash
Algorithm.
Exemplarily, the transaction log data verification method of the application can be used on credit card issuer, can also be used
On the medium of any need checking transaction log, when the memory space of smart card is sufficiently large, transaction log data verification method
It can also use on smart cards..
Embodiment two
The application also proposes a kind of transaction log data checking system, suitable for the transaction log data described in embodiment one
Verification method.Fig. 5 is the structural representation of the transaction log data checking system of the application.As shown in figure 5, the transaction of the application
Daily record data verifies system, including:Memory module 51, store whole transaction log datas and transaction log data hash value;
First acquisition module 52, obtains whole transaction log datas;Computing module 53, according to the transaction log data of whole, calculate
Go out newest transaction log data hash value;Second acquisition module 54, read the newest transaction log data hash value of storage;Judge
Module 55, judge the newest transaction log data hash value that calculates and the newest transaction log data hash value that reads whether one
Cause;First output module 56, in response to the newest transaction log data hash value and the newest transaction log number of reading calculated
It is consistent according to hash value, judge that transaction log data is not tampered with.
Wherein, transaction log data checking system, in addition to the second output module, in response to the newest transaction calculated
Daily record data hash value and the newest transaction log data hash value read are inconsistent, judge acquired transaction log data quilt
Distort.Differ in response to the newest transaction log data hash value calculated with the newest transaction log data hash value read
Cause, judge that one or several data in acquired transaction log data are tampered.
Alternatively, memory module 51 calculates corresponding with transaction log data while store transaction daily record data
Transaction log data hash value, and recorded.
Specifically, transaction log data checking system also includes hash value computing module, hash value computing module, and Fig. 6 is
The structural representation of the hash value computing module of the application.As shown in fig. 6, hash value computing module includes:
Initial computation unit 61, calculate initial transaction daily record data hash value;
First computing unit 62, calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time
1st transaction log data hash value;
Second computing unit 63, calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time
2nd transaction log data hash value;
I-th computing unit 64, calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith
Go out ith transaction log data hash value, i is the natural number more than 2.
Computing module 53 is consistent with the computational methods of hash value computing module.
Memory module 51 is in storage, when memory space is sufficiently large, stores whole transaction log datas and owns
The transaction log data hash value corresponding with each transaction log data;When limited storage space, also can only store
Whole transaction log datas transaction log data hash value corresponding with newest transaction log data.
It is pointed out that when memory module 51 store all transaction log datas and with each transaction log number
During according to corresponding transaction log data hash value;One or several data quilt in the transaction log data acquired in judging
When distorting, transaction log data hash value corresponding to every transaction log data of storage and the every day of trade calculated are compared
Transaction log data hash value corresponding to will data, with regard to the transaction log data being tampered can be found out.
Preferably, transaction log data and transaction log data hash value should preserve success simultaneously, if alternative one fails,
Then another operation should fail simultaneously.It is i.e. corresponding, memory module 51 store all transaction log datas and with it is every
During the corresponding transaction log data hash value of one transaction log data, each transaction log data and corresponding transaction
Daily record data hash value should preserve success simultaneously;Whole transaction log datas and newest transaction are only stored in memory module 51
During the corresponding transaction log data hash value of daily record data, newest transaction log data and the corresponding newest day of trade
Will data hash value should preserve success simultaneously.
Exemplarily, the transaction log data checking system of the application can be credit card issuer, can also be integrated in any need
Verify on the medium of transaction log.When the memory space of smart card is sufficiently large, transaction log data checking system can also
Integrate on smart cards.
It should be noted that the method for the newest transaction log data hash value calculated, is performed such as the institute of embodiment one
The computational methods for the transaction log data hash value stated.The newest transaction log data hash value calculated is according to all
Obtained by transaction log data is calculated according to above-mentioned formula;Newest transaction log data hash value is read, directly from storage
Module 51 is read out.Used computational algorithm is hash algorithm.Hash algorithm is SHA-1, SHA-256, MD5 algorithm
One of or other hash algorithms.
The transaction log data checking system of the application is consistent with the technique effect of transaction log data verification method, herein
Just do not repeat one by one.
Although having been described for the preferred embodiment of the application, those skilled in the art once know basic creation
Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into having altered and changing for the application scope.Obviously, those skilled in the art can be to the application
Various changes and modification are carried out without departing from spirit and scope.So, if these modifications and variations of the application
Belong within the scope of the application claim and its equivalent technologies, then the application is also intended to exist comprising these changes and modification
It is interior.
Claims (10)
1. a kind of transaction log data verification method, it is characterised in that comprise the following steps:
Store whole transaction log datas and transaction log data hash value;
Obtain whole transaction log datas;
According to the transaction log data of whole, newest transaction log data hash value is calculated;
Read the newest transaction log data hash value of storage;
Whether the newest transaction log data hash value for judging to calculate and the newest transaction log data hash value read are consistent;
It is consistent with the newest transaction log data hash value read in response to the newest transaction log data hash value that calculates, sentence
Disconnected transaction log data is not tampered with.
2. transaction log data verification method as claimed in claim 1, it is characterised in that in response to the newest friendship calculated
Easy daily record data hash value and the newest transaction log data hash value read are inconsistent, judge that transaction log data is tampered.
3. transaction log data verification method as claimed in claim 2, it is characterised in that in response to the newest friendship calculated
Easy daily record data hash value and the newest transaction log data hash value read are inconsistent, judge acquired transaction log data
In one or several data be tampered.
4. transaction log data verification method as claimed in claim 1, it is characterised in that in the same of store transaction daily record data
When, the transaction log data hash value corresponding with transaction log data is calculated, and recorded.
5. transaction log data verification method as claimed in claim 4, it is characterised in that the meter of transaction log data hash value
Calculation method, including following sub-step:
Calculate initial transaction daily record data hash value;
1st transaction log data is calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time
Hash value;
2nd transaction log data is calculated according to the 1st transaction log data hash value and the transaction log data of the 2nd time
Hash value;
Ith transaction log data is calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith
Hash value, i are the natural number more than 2.
6. a kind of transaction log data verifies system, it is characterised in that including:
Memory module, store whole transaction log datas and transaction log data hash value;
First acquisition module, obtain whole transaction log datas;
Computing module, according to the transaction log data of whole, calculate newest transaction log data hash value;
Second acquisition module, read the newest transaction log data hash value of storage;
Determination module, judge the newest transaction log data hash value calculated and the newest transaction log data hash value read
It is whether consistent;
First output module, in response to the newest transaction log data hash value and the newest transaction log data of reading calculated
Hash value is consistent, judges that transaction log data is not tampered with.
7. transaction log data as claimed in claim 6 verifies system, it is characterised in that also including the second output module, rings
The newest transaction log data hash value that Ying Yu is calculated and the newest transaction log data hash value read are inconsistent, judge
Transaction log data is tampered.
8. transaction log data as claimed in claim 7 verifies system, it is characterised in that in response to the newest friendship calculated
Easy daily record data hash value and the newest transaction log data hash value read are inconsistent, judge acquired transaction log data
In one or several data be tampered.
9. transaction log data as claimed in claim 6 verifies system, it is characterised in that memory module is in store transaction daily record
While data, the transaction log data hash value corresponding with transaction log data is calculated, and recorded.
10. transaction log data as claimed in claim 9 verifies system, it is characterised in that also including hash value computing module,
Hash value computing module includes:
Initial computation unit, calculate initial transaction daily record data hash value;
First computing unit, the 1st friendship is calculated according to initial transaction daily record data hash value and the transaction log data of the 1st time
Easy daily record data hash value;
Second computing unit, calculated the 2nd time according to the 1st transaction log data hash value and the transaction log data of the 2nd time
Transaction log data hash value;
I-th computing unit, ith is calculated according to the transaction log data of the i-th -1 time transaction log data hash value and ith
Transaction log data hash value, i are the natural number more than 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710929265.3A CN107609874B (en) | 2017-10-09 | 2017-10-09 | Transaction log data verification method and verification system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710929265.3A CN107609874B (en) | 2017-10-09 | 2017-10-09 | Transaction log data verification method and verification system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107609874A true CN107609874A (en) | 2018-01-19 |
CN107609874B CN107609874B (en) | 2020-06-30 |
Family
ID=61067624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710929265.3A Active CN107609874B (en) | 2017-10-09 | 2017-10-09 | Transaction log data verification method and verification system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107609874B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112506884A (en) * | 2020-12-10 | 2021-03-16 | 杭州安恒信息技术股份有限公司 | Log checking method, device, equipment and storage medium |
CN115766166A (en) * | 2022-11-08 | 2023-03-07 | 鼎铉商用密码测评技术(深圳)有限公司 | Log processing method, log processing device and storage medium |
CN115766165A (en) * | 2022-11-08 | 2023-03-07 | 鼎铉商用密码测评技术(深圳)有限公司 | Log processing method, log processing device and storage medium |
CN116305290A (en) * | 2023-05-16 | 2023-06-23 | 北京安天网络安全技术有限公司 | System log security detection method and device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101826219A (en) * | 2010-05-05 | 2010-09-08 | 南京熊猫信息产业有限公司 | Rail transportation ticket-card processing intelligent system and data encryption auditing method |
CN103793522A (en) * | 2008-10-20 | 2014-05-14 | 王强 | Method and system for rapidly scanning feature codes |
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
CN106548091A (en) * | 2016-10-14 | 2017-03-29 | 北京爱接力科技发展有限公司 | A kind of data deposit card, the method and device of checking |
US20170161724A1 (en) * | 2015-12-05 | 2017-06-08 | Uniway Technology Limited | Radio frequency identification card and mobile phone interlinking embedded electronic payment apparatus and methods |
CN107180350A (en) * | 2017-03-31 | 2017-09-19 | 唐晓领 | A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system |
-
2017
- 2017-10-09 CN CN201710929265.3A patent/CN107609874B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793522A (en) * | 2008-10-20 | 2014-05-14 | 王强 | Method and system for rapidly scanning feature codes |
CN101826219A (en) * | 2010-05-05 | 2010-09-08 | 南京熊猫信息产业有限公司 | Rail transportation ticket-card processing intelligent system and data encryption auditing method |
US20170161724A1 (en) * | 2015-12-05 | 2017-06-08 | Uniway Technology Limited | Radio frequency identification card and mobile phone interlinking embedded electronic payment apparatus and methods |
CN106548091A (en) * | 2016-10-14 | 2017-03-29 | 北京爱接力科技发展有限公司 | A kind of data deposit card, the method and device of checking |
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
CN107180350A (en) * | 2017-03-31 | 2017-09-19 | 唐晓领 | A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112506884A (en) * | 2020-12-10 | 2021-03-16 | 杭州安恒信息技术股份有限公司 | Log checking method, device, equipment and storage medium |
CN115766166A (en) * | 2022-11-08 | 2023-03-07 | 鼎铉商用密码测评技术(深圳)有限公司 | Log processing method, log processing device and storage medium |
CN115766165A (en) * | 2022-11-08 | 2023-03-07 | 鼎铉商用密码测评技术(深圳)有限公司 | Log processing method, log processing device and storage medium |
CN115766166B (en) * | 2022-11-08 | 2023-09-19 | 鼎铉商用密码测评技术(深圳)有限公司 | Log processing method, device and storage medium |
CN115766165B (en) * | 2022-11-08 | 2023-10-27 | 鼎铉商用密码测评技术(深圳)有限公司 | Log processing method, device and storage medium |
CN116305290A (en) * | 2023-05-16 | 2023-06-23 | 北京安天网络安全技术有限公司 | System log security detection method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107609874B (en) | 2020-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107609874A (en) | A kind of transaction log data verification method and checking system | |
US7841539B2 (en) | Smart card with random temporary account number generation | |
US20040034734A1 (en) | Method of data caching on a smartcard | |
US8768802B2 (en) | System and method of matching financial transaction records to merchant records of a merchant profile database | |
US8925826B2 (en) | Magnetic stripe-based transactions using mobile communication devices | |
CN107239954A (en) | It is a kind of to improve the method and device that block produces speed | |
US8001047B2 (en) | Method and apparatus for effecting payment | |
US9213968B2 (en) | Systems and methods for conducting financial transactions using non-standard magstripe payment cards | |
CN107993146A (en) | The air control method and system of financial big data | |
CN108364218A (en) | A kind of sharing method and device of user's collage-credit data | |
CN110880143A (en) | System and method for processing transaction verification operations in decentralized applications | |
CN100587740C (en) | Tax-control data declaration, checking treatment method of network tax-control system | |
CN108230130A (en) | Day cuts the method, apparatus and electronic equipment of data verification | |
CN110222035A (en) | A kind of efficient fault-tolerance approach of database page based on exclusive or check and journal recovery | |
US7761353B1 (en) | Validating financial accounts | |
CN105260130B (en) | A kind of reading/writing method of Seagate hard-disk system file | |
CN115082173B (en) | Account checking processing method and device, computer equipment and storage medium | |
JPS6112309B2 (en) | ||
TWM624352U (en) | Trading data integration system | |
CN111383092A (en) | Cloud computing big data credit limit estimation method and system based on block chain | |
CN103793486A (en) | Method and system for performing storage and seal verification on seal combined data | |
CN112036891B (en) | Transaction control method and device, computer equipment and computer readable storage medium | |
CN114387071A (en) | Capital settlement method, device, equipment and storage medium | |
JPH08202774A (en) | Electronic receipt filing card and device for performing access to this card | |
JP6585135B2 (en) | Automatic transaction equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |