CN111222180A - Method, system, device and medium for judging whether accounting document is tampered - Google Patents

Method, system, device and medium for judging whether accounting document is tampered Download PDF

Info

Publication number
CN111222180A
CN111222180A CN202010123909.1A CN202010123909A CN111222180A CN 111222180 A CN111222180 A CN 111222180A CN 202010123909 A CN202010123909 A CN 202010123909A CN 111222180 A CN111222180 A CN 111222180A
Authority
CN
China
Prior art keywords
time
current
accounting document
last
abstract value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010123909.1A
Other languages
Chinese (zh)
Inventor
魏晓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Genersoft Information Technology Co Ltd
Original Assignee
Shandong Inspur Genersoft Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Genersoft Information Technology Co Ltd filed Critical Shandong Inspur Genersoft Information Technology Co Ltd
Priority to CN202010123909.1A priority Critical patent/CN111222180A/en
Publication of CN111222180A publication Critical patent/CN111222180A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a method, a system, equipment and a storage medium for judging whether an accounting document is tampered, wherein the method comprises the following steps: responding to the storage of the accounting document every time, recording the generated current random code and a current abstract value obtained based on the current random code, and uploading the current abstract value to a database; responding to each time of opening the accounting document, and calculating to obtain a summary value based on the current random code recorded last time; judging whether the abstract value is the same as the current abstract value uploaded last time in the database; and in response to the digest value being different from the current digest value last uploaded in the database, prompting the accounting document to be subject to tampering. The method, the system, the equipment and the medium for judging whether the accounting document is falsified or not recognize illegal falsification of the accounting document data by a user through calculating the abstract value, and ensure the authenticity and effectiveness of the accounting data.

Description

Method, system, device and medium for judging whether accounting document is tampered
Technical Field
The present invention relates to the field of security, and more particularly, to a method, a system, a computer device and a readable medium for determining whether an accounting document is tampered.
Background
Accounting documents are written proofs that record economic business, define economic liability, and are formatted to register an accounting book. The legality and the rationality of the economic business are recorded, the authenticity of the accounting record is ensured, and the economic responsibility system is enhanced. Accounting documents are classified into original documents and bookkeeping documents according to their preparation procedures and uses, the former is also called original bills or documents, and is original written certificates filled when economic business occurs at first, such as sales invoices, money receipts, travel invoices and the like. The latter is also called a bookkeeping voucher, which is based on the original bill without error, classifies according to the content of the economic business items, and determines the accounting voucher filled after the accounting subjects are classified.
In the current financial software, no precautionary measure is provided for the false problem of accounting data caused by directly modifying database information by a user, and after false content is generated, the troubleshooting is difficult and the harm is large.
Disclosure of Invention
In view of the above, an object of the embodiments of the present invention is to provide a method, a system, a computer device, and a computer readable storage medium for determining whether an accounting document is tampered with, wherein the method identifies illegal tampering of accounting document data by a user by calculating a digest value, so as to ensure authenticity and validity of accounting data.
Based on the above purpose, an aspect of the embodiments of the present invention provides a method for determining whether an accounting document is tampered, including the following steps: responding to the storage of the accounting document every time, recording a generated current random code and a current abstract value obtained based on the current random code, and uploading the current abstract value to a database; in response to each opening of the accounting document, calculating a digest value based on the current random code recorded last time; judging whether the abstract value is the same as the current abstract value uploaded last time in the database; and prompting that the accounting document is subjected to illegal tampering in response to the digest value being different from the current digest value uploaded last time in the database.
In some embodiments, recording the generated current random code and the current digest value derived based on the current random code comprises: recording a retention time in the accounting document, generating a timestamp based on the retention time, and obtaining the current digest value based on the timestamp and the current random code.
In some embodiments, further comprising: and judging whether the first storage time is the same as the last storage time or not in response to the fact that the abstract value is the same as the current abstract value uploaded last time in the database.
In some embodiments, further comprising: and responding to the difference between the first-time preservation time and the last-time preservation time, and displaying the last-time preservation time and a last-time preservation user on a display page of the accounting document.
In another aspect of the embodiments of the present invention, a system for determining whether an accounting document is tampered is further provided, including: the recording module is configured to respond to the storage of the accounting document every time, record the generated current random code and the current abstract value obtained based on the current random code, and upload the current abstract value to a database; the calculation module is configured for responding to the opening of the accounting document every time and calculating to obtain an abstract value based on the current random code recorded last time; the judging module is configured to judge whether the abstract value is the same as the current abstract value uploaded last time in the database; and the prompting module is configured to respond that the abstract value is different from the current abstract value uploaded last time in the database, and prompt that the accounting document is subjected to illegal tampering.
In some embodiments, the recording module is further configured to: recording a retention time in the accounting document, generating a timestamp based on the retention time, and obtaining the current digest value based on the timestamp and the current random code.
In some embodiments, further comprising: and the second judgment module is configured to respond to the fact that the abstract value is the same as the current abstract value uploaded last time in the database, and judge whether the first storage time is the same as the last storage time.
In some embodiments, further comprising: and responding to the difference between the first-time preservation time and the last-time preservation time, and displaying the last-time preservation time and a last-time preservation user on a display page of the accounting document.
In another aspect of the embodiments of the present invention, there is also provided a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions when executed by the processor implementing the steps of the method as above.
In a further aspect of the embodiments of the present invention, a computer-readable storage medium is also provided, in which a computer program for implementing the above method steps is stored when the computer program is executed by a processor.
The invention has the following beneficial technical effects:
(1) through calculating the abstract value, the illegal tampering of the accounting document data by the user is identified, and the reality and the effectiveness of the accounting data are ensured;
(2) identifying legal modification of the user by comparing the timestamps, and giving a user prompt;
(3) the time stamp and the random code information are respectively added during the calculation of the digest value, so that the user can be prevented from cracking through modes such as regular speculation and the like, the digest value is further forged, and the safety is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a schematic diagram of an embodiment of a method for determining whether an accounting document is tampered;
fig. 2 is a schematic hardware structure diagram of an embodiment of the method for determining whether an accounting document is tampered with.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
In view of the above, a first aspect of the embodiments of the present invention provides an embodiment of a method for determining whether an accounting document is tampered. Fig. 1 is a schematic diagram illustrating an embodiment of the method for determining whether an accounting document is tampered with. As shown in fig. 1, the embodiment of the present invention includes the following steps:
s1, responding to the accounting voucher stored each time, recording the generated current random code and the current abstract value obtained based on the current random code, and uploading the current abstract value to a database;
s2, responding to the opening of the accounting document each time, and calculating to obtain a summary value based on the current random code recorded last time;
s3, judging whether the digest value is the same as the current digest value uploaded last time in the database; and
and S4, responding to the summary value different from the current summary value uploaded last time in the database, and prompting the accounting document to be illegally tampered.
And responding to the storage of the accounting document each time, recording the generated current random code and the current abstract value obtained based on the current random code, and uploading the current abstract value to the database. Adding an abstract value into the accounting voucher, recording an initial random code and an initial abstract value obtained by calculating the initial random code when the accounting voucher is stored for the first time, and uploading the initial abstract value to a database; and during each subsequent storage, recording the generated current random code and the current abstract value obtained based on the current random code, and uploading the current abstract value to the database.
In response to each opening of the accounting document, a digest value is calculated based on the current random code of the last record. The MD5 algorithm can be used for calculating the digest value, and the MD5 digest algorithm has the characteristic of being irreversible and therefore cannot be cracked by a user. And judging whether the abstract value is the same as the current abstract value uploaded last time in the database. And prompting the accounting document to be illegally tampered in response to the digest value being different from the current digest value uploaded last in the database.
In some embodiments, recording the generated current random code and the current digest value derived based on the current random code comprises: recording a retention time in the accounting document, generating a timestamp based on the retention time, and obtaining the current digest value based on the timestamp and the current random code. Adding 4 attributes of first-time storage time, first-time storage user, last-time storage time and last-time storage user in the accounting document. When the accounting voucher is stored for the first time, the first storage time and the first storage user are recorded, an initial abstract value is calculated, and when the accounting voucher is modified and stored for each time later, the last storage time and the last storage user are updated, and a current abstract value is calculated. For example, 5 fields may be added to the data structure of the accounting document, the CurrentDigestValue stores the current digest value, the CreatedTime stores the first save time, the Creator stores the first save user, the lastmodifidtime stores the last save time, and the lastmodifide stores the last save user.
In the accounting document, the accounting subjects in the accounting entry, the entry amount, the keeping direction and the auxiliary amount in the entry auxiliary are the main matters which may influence the accounting content, and these elements are organized into the Json format and are used as a part of calculating the abstract value. A random code may be added to the Json data, generated in Guid form and kept secret from the user. The current random code may be, for example: 902df8ff-bce3-4cc2-b2c7-71bc1b82ab 29.
In some embodiments, further comprising: and judging whether the first storage time is the same as the last storage time or not in response to the fact that the abstract value is the same as the current abstract value uploaded last time in the database. The calculated abstract value is the same as the current abstract value in the database, which indicates that the accounting document is not modified or legally modified, and in order to show the modified time, whether the first storage time is the same as the last storage time can be judged.
In some embodiments, further comprising: and responding to the difference between the first-time preservation time and the last-time preservation time, and displaying the last-time preservation time and a last-time preservation user on a display page of the accounting document. The difference between the first preservation time and the last preservation time indicates that the accounting document is modified, and relevant modified information can be displayed by showing the last preservation time and a last preservation user.
Aiming at the situation that the accounting document contents are tampered by various modes such as manual modification of database records and the like which may occur, so as to achieve the situation of generating false accounting contents, legal modification and illegal modification of a user are well documented and can be checked by calculating an abstract value when the accounting document is stored for the first time and each modification and storage later, the situation that the accounting document is modified by various modes is effectively recorded and identified, and the authenticity of the accounting contents is ensured. When the accounting document is stored for the first time and is modified and stored for each time later, legal modification and illegal modification of the accounting document are identified by a method of extracting important elements, timestamps and random codes of the accounting document to calculate the digest value, and meanwhile, the calculation method of the digest value can be prevented from being cracked by means of regular calculation and the like. The method is suitable for protecting important financial data such as accounting documents and the like from being illegally tampered, and recording modification operation traces of users.
It should be noted that, the steps in the embodiments of the method for determining whether an accounting document is tampered with may be intersected, replaced, added, or deleted, so that these methods for determining whether an accounting document is tampered with, which are reasonably arranged and combined, should also belong to the scope of the present invention, and should not limit the scope of the present invention to the embodiments.
In view of the above object, a second aspect of the embodiments of the present invention provides a system for determining whether an accounting document is tampered, including: the recording module is configured to respond to the storage of the accounting document every time, record the generated current random code and the current abstract value obtained based on the current random code, and upload the current abstract value to a database; the calculation module is configured for responding to the opening of the accounting document every time and calculating to obtain an abstract value based on the current random code recorded last time; the judging module is configured to judge whether the abstract value is the same as the current abstract value uploaded last time in the database; and the prompting module is configured to respond that the abstract value is different from the current abstract value uploaded last time in the database, and prompt that the accounting document is subjected to illegal tampering.
In some embodiments, the recording module is further configured to: recording a retention time in the accounting document, generating a timestamp based on the retention time, and obtaining the current digest value based on the timestamp and the current random code.
In some embodiments, further comprising: and the second judgment module is configured to respond to the fact that the abstract value is the same as the current abstract value uploaded last time in the database, and judge whether the first storage time is the same as the last storage time.
In some embodiments, further comprising: and responding to the difference between the first-time preservation time and the last-time preservation time, and displaying the last-time preservation time and a last-time preservation user on a display page of the accounting document.
In view of the above object, a third aspect of the embodiments of the present invention provides a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions being executable by the processor to perform the steps of: s1, responding to the accounting voucher stored each time, recording the generated current random code and the current abstract value obtained based on the current random code, and uploading the current abstract value to a database; s2, responding to the opening of the accounting document each time, and calculating to obtain a summary value based on the current random code recorded last time; s3, judging whether the digest value is the same as the current digest value uploaded last time in the database; and S4, responding to the summary value different from the current summary value uploaded last time in the database, prompting the accounting document to be illegally tampered.
In some embodiments, recording the generated current random code and the current digest value derived based on the current random code comprises: recording a retention time in the accounting document, generating a timestamp based on the retention time, and obtaining the current digest value based on the timestamp and the current random code.
In some embodiments, further comprising: and judging whether the first storage time is the same as the last storage time or not in response to the fact that the abstract value is the same as the current abstract value uploaded last time in the database.
In some embodiments, further comprising: and responding to the difference between the first-time preservation time and the last-time preservation time, and displaying the last-time preservation time and a last-time preservation user on a display page of the accounting document.
Fig. 2 is a schematic hardware structure diagram of an embodiment of the method for determining whether an accounting document is tampered according to the present invention.
Taking the apparatus shown in fig. 2 as an example, the apparatus includes a processor 301 and a memory 302, and may further include: an input device 303 and an output device 304.
The processor 301, the memory 302, the input device 303 and the output device 304 may be connected by a bus or other means, and fig. 2 illustrates the connection by a bus as an example.
The memory 302 is a non-volatile computer readable storage medium, and can be used for storing non-volatile software programs, non-volatile computer executable programs, and modules, such as program instructions/modules corresponding to the method for determining whether an accounting document is tampered in the embodiment of the present application. The processor 301 executes various functional applications and data processing of the server by running the nonvolatile software program, instructions and modules stored in the memory 302, namely, implements the method for determining whether the accounting document is tampered with according to the above method embodiment.
The memory 302 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of a method of determining whether the accounting document is subject to tampering, and the like. Further, the memory 302 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 302 optionally includes memory located remotely from processor 301, which may be connected to a local module via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 303 may receive information such as a user name and a password that are input. The output means 304 may comprise a display device such as a display screen.
Program instructions/modules corresponding to one or more methods for determining whether an accounting document is subject to tampering are stored in the memory 302, and when executed by the processor 301, perform the method for determining whether an accounting document is subject to tampering in any of the above-described method embodiments.
Any embodiment of the computer device executing the method for judging whether the accounting document is tampered can achieve the same or similar effects as any corresponding method embodiment.
The invention also provides a computer readable storage medium storing a computer program which, when executed by a processor, performs the method as above.
Finally, it should be noted that, as one of ordinary skill in the art can appreciate that all or part of the processes of the methods of the above embodiments may be implemented by a computer program to instruct related hardware, and the program of the method for determining whether an accounting document is tampered with may be stored in a computer readable storage medium, and when executed, the program may include the processes of the embodiments of the methods described above. The storage medium of the program may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
Furthermore, the methods disclosed according to embodiments of the present invention may also be implemented as a computer program executed by a processor, which may be stored in a computer-readable storage medium. Which when executed by a processor performs the above-described functions defined in the methods disclosed in embodiments of the invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM may be available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. A method of determining whether an accounting document has been tampered with, comprising the steps of:
responding to the storage of the accounting document every time, recording a generated current random code and a current abstract value obtained based on the current random code, and uploading the current abstract value to a database;
in response to each opening of the accounting document, calculating a digest value based on the current random code recorded last time;
judging whether the abstract value is the same as the current abstract value uploaded last time in the database; and
and prompting that the accounting document is tampered in response to the abstract value being different from the current abstract value uploaded last time in the database.
2. The method of claim 1, wherein recording the generated current random code and the current digest value derived based on the current random code comprises:
recording a retention time in the accounting document, generating a timestamp based on the retention time, and obtaining the current digest value based on the timestamp and the current random code.
3. The method of claim 2, further comprising:
and judging whether the first storage time is the same as the last storage time or not in response to the fact that the abstract value is the same as the current abstract value uploaded last time in the database.
4. The method of claim 3, further comprising:
and responding to the difference between the first-time preservation time and the last-time preservation time, and displaying the last-time preservation time and a last-time preservation user on a display page of the accounting document.
5. A system for determining whether an accounting document has been tampered with, comprising:
the recording module is configured to respond to the storage of the accounting document every time, record the generated current random code and the current abstract value obtained based on the current random code, and upload the current abstract value to a database;
the calculation module is configured for responding to the opening of the accounting document every time and calculating to obtain an abstract value based on the current random code recorded last time;
the judging module is configured to judge whether the abstract value is the same as the current abstract value uploaded last time in the database; and
and the prompting module is configured for responding to the fact that the abstract value is different from the current abstract value uploaded last time in the database, and prompting that the accounting document is tampered.
6. The system of claim 5, wherein the recording module is further configured to:
recording a retention time in the accounting document, generating a timestamp based on the retention time, and obtaining the current digest value based on the timestamp and the current random code.
7. The system of claim 6, further comprising:
and the second judgment module is configured to respond to the fact that the abstract value is the same as the current abstract value uploaded last time in the database, and judge whether the first storage time is the same as the last storage time.
8. The system of claim 7, further comprising:
and responding to the difference between the first-time preservation time and the last-time preservation time, and displaying the last-time preservation time and a last-time preservation user on a display page of the accounting document.
9. A computer device, comprising:
at least one processor; and
a memory storing computer instructions executable on the processor, the instructions when executed by the processor implementing the steps of the method of any one of claims 1 to 4.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 4.
CN202010123909.1A 2020-02-27 2020-02-27 Method, system, device and medium for judging whether accounting document is tampered Pending CN111222180A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010123909.1A CN111222180A (en) 2020-02-27 2020-02-27 Method, system, device and medium for judging whether accounting document is tampered

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010123909.1A CN111222180A (en) 2020-02-27 2020-02-27 Method, system, device and medium for judging whether accounting document is tampered

Publications (1)

Publication Number Publication Date
CN111222180A true CN111222180A (en) 2020-06-02

Family

ID=70827245

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010123909.1A Pending CN111222180A (en) 2020-02-27 2020-02-27 Method, system, device and medium for judging whether accounting document is tampered

Country Status (1)

Country Link
CN (1) CN111222180A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111783152A (en) * 2020-07-03 2020-10-16 中国工商银行股份有限公司 Decision tree-based accounting anti-tampering abstract generation method and system
CN112487476A (en) * 2020-11-30 2021-03-12 山东浪潮通软信息科技有限公司 Method, device, equipment and medium for preventing accounting document data from being tampered
CN113190853A (en) * 2021-03-24 2021-07-30 中国电力科学研究院有限公司 Computer credibility authentication system, method, equipment and readable storage medium
CN113204805A (en) * 2021-04-25 2021-08-03 山东英信计算机技术有限公司 Server power-on method, system, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108494775A (en) * 2018-03-26 2018-09-04 四川长虹电器股份有限公司 It prevents from utilizing valid data or the method for distorting valid data progress network attack
CN109308421A (en) * 2017-07-28 2019-02-05 腾讯科技(深圳)有限公司 A kind of information tamper resistant method, device, server and computer storage medium
CN109636553A (en) * 2018-11-13 2019-04-16 平安科技(深圳)有限公司 Credential management method, apparatus, computer equipment and storage medium
CN109635586A (en) * 2018-12-13 2019-04-16 苏州科达科技股份有限公司 Media file encryption key managing method, system, equipment and storage medium
CN110061849A (en) * 2019-04-29 2019-07-26 中兴新能源汽车有限责任公司 Verification method, server, mobile unit and the storage medium of mobile unit
CN110149209A (en) * 2019-04-15 2019-08-20 深圳奇迹智慧网络有限公司 Internet of things equipment and its method and apparatus of improve data transfer safety

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109308421A (en) * 2017-07-28 2019-02-05 腾讯科技(深圳)有限公司 A kind of information tamper resistant method, device, server and computer storage medium
CN108494775A (en) * 2018-03-26 2018-09-04 四川长虹电器股份有限公司 It prevents from utilizing valid data or the method for distorting valid data progress network attack
CN109636553A (en) * 2018-11-13 2019-04-16 平安科技(深圳)有限公司 Credential management method, apparatus, computer equipment and storage medium
CN109635586A (en) * 2018-12-13 2019-04-16 苏州科达科技股份有限公司 Media file encryption key managing method, system, equipment and storage medium
CN110149209A (en) * 2019-04-15 2019-08-20 深圳奇迹智慧网络有限公司 Internet of things equipment and its method and apparatus of improve data transfer safety
CN110061849A (en) * 2019-04-29 2019-07-26 中兴新能源汽车有限责任公司 Verification method, server, mobile unit and the storage medium of mobile unit

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111783152A (en) * 2020-07-03 2020-10-16 中国工商银行股份有限公司 Decision tree-based accounting anti-tampering abstract generation method and system
CN111783152B (en) * 2020-07-03 2023-08-25 中国工商银行股份有限公司 Method and system for generating tamper-proof abstract of accounting based on decision tree
CN112487476A (en) * 2020-11-30 2021-03-12 山东浪潮通软信息科技有限公司 Method, device, equipment and medium for preventing accounting document data from being tampered
CN113190853A (en) * 2021-03-24 2021-07-30 中国电力科学研究院有限公司 Computer credibility authentication system, method, equipment and readable storage medium
CN113204805A (en) * 2021-04-25 2021-08-03 山东英信计算机技术有限公司 Server power-on method, system, equipment and medium
CN113204805B (en) * 2021-04-25 2022-12-20 山东英信计算机技术有限公司 Server power-on method, system, equipment and medium

Similar Documents

Publication Publication Date Title
CN111222180A (en) Method, system, device and medium for judging whether accounting document is tampered
Lemieux Blockchain and distributed ledgers as trusted recordkeeping systems
US11764946B2 (en) Audit chain for private blockchain
US11379771B2 (en) Management of workflows
KR101948721B1 (en) Method and apparatus for examining forgery of file by using file hash value
US11651468B2 (en) Watermark security
JP2020511059A (en) Information authentication method and system
US11240028B2 (en) Trust service engine for external blockchain verification
CN106548092A (en) File processing method and device
CN110008743B (en) Data attribute identification method, device and equipment in block chain type account book
US10728036B2 (en) Cryptographically linking related events processed across multiple processing systems
US20190073670A1 (en) Capturing Related Events in Cryptographically Linked Records
US11138343B2 (en) Multiple signatures in metadata for the same data record
US20170093813A1 (en) Automating the creation and maintenance of policy compliant environments
CN112148573A (en) Method and device for recording and playing back webpage operation process
CN107609874B (en) Transaction log data verification method and verification system
WO2023051308A1 (en) Data verification method and apparatus, device and storage medium
CN111625787A (en) OFD-based electronic signature multi-version traceable rapid signature checking method
CN110347678B (en) Financial data storage method, system, device and equipment
CN110059087B (en) Data attribute identification method, device and equipment in block chain type account book
CN116051303A (en) Method, device, equipment and medium for electronic certificate identification processing
US20220027342A1 (en) Methods for providing and checking data provenance
US11295031B2 (en) Event log tamper resistance
KR20220126463A (en) Method for proving original of data, and apparatus therefor
WO2024079962A1 (en) Information terminal and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200602