CN113591123A - Method and system for realizing data security of integral system through associated encryption - Google Patents

Method and system for realizing data security of integral system through associated encryption Download PDF

Info

Publication number
CN113591123A
CN113591123A CN202110920244.1A CN202110920244A CN113591123A CN 113591123 A CN113591123 A CN 113591123A CN 202110920244 A CN202110920244 A CN 202110920244A CN 113591123 A CN113591123 A CN 113591123A
Authority
CN
China
Prior art keywords
point
user
data
exchange
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110920244.1A
Other languages
Chinese (zh)
Other versions
CN113591123B (en
Inventor
刘德建
叶伟
陈宏展
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian TQ Digital Co Ltd
Original Assignee
Fujian TQ Digital Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian TQ Digital Co Ltd filed Critical Fujian TQ Digital Co Ltd
Priority to CN202110920244.1A priority Critical patent/CN113591123B/en
Publication of CN113591123A publication Critical patent/CN113591123A/en
Application granted granted Critical
Publication of CN113591123B publication Critical patent/CN113591123B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

The invention provides a method for realizing data security of an integral system through associated encryption, which comprises the following steps: step S1, the user triggers the point consumption through the browser; step S2, the server judges whether the integral of the user is enough; step S3, reading the user point change log, and checking the reasonability of the point data of the user; step S4, verifying whether the single abstract value in the user point change log is correct; step S5, when the single abstract value is correct, verifying whether the associated abstract values of all the data are correct; step S6, the server deducts the points of the commodity exchanged by the user and updates the point balance of the user account; step S7, generating random seeds; step S8, generating a single abstract value, generating a correlation abstract value and generating a new integral change log; step S9, returning the point exchange commodity interface of the browser by the user, wherein the point exchange is successful; the invention can carry out validity check on the data and realize data security.

Description

Method and system for realizing data security of integral system through associated encryption
Technical Field
The invention relates to the technical field of computers, in particular to a method and a system for realizing data security by a score system through associated encryption.
Background
In the item of the bonus system, when a user exchanges prizes with bonus points, the bonus system can check whether balance is sufficient, if so, exchange is allowed, otherwise, exchange is not allowed. However, if someone maliciously obtains the database authority, the score data in the score table of the database are maliciously modified, so that illegal profit-making is carried out, and a company can cause great loss. Therefore, data security needs to be emphasized, the database server is not only required to be managed safely, but also a series of secure encryption can be carried out on the data from the design of a program system, so that the legality of the data is verified, the threshold of illegal data tampering is increased, and the data security is realized.
Disclosure of Invention
In order to overcome the above problems, an object of the present invention is to provide a method for verifying the validity of data and realizing data security.
The invention is realized by adopting the following scheme: a method for a scoring system to implement data security through associative encryption, the method comprising the steps of:
step S1, the user triggers the point consumption through the browser;
step S2, the server judges whether the points of the user are enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail;
step S3, reading the user point change log, and checking the reasonability of the point data of the user;
step S4, verifying whether the single abstract value in the user point change log is correct, if yes, entering the next step, if not, having the risk of tampering, and returning to fail;
step S5, when the single abstract value is correct, verifying whether the associated abstract values of all the data are correct, if so, verifying the next abstract value, and if not, returning to fail;
step S6, the server deducts the points of the commodity exchanged by the user and updates the point balance of the user account;
step S7, generating random seeds;
step S8, generating a single abstract value, generating a correlation abstract value and generating a new integral change log;
and step S9, returning the browser point exchange commodity interface by the user, and successfully exchanging the points, so that the data legality can be verified, and the data safety is realized.
Further, the step S1 is further specifically: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
Further, the step S2 is further specifically: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
Further, the step S3 is further specifically: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
Further, the step S4 is further specifically: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
Further, the step S5 is further specifically: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
Further, the step S6 is further specifically: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
Further, the step S7 is further specifically: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
The invention also provides a system for realizing data security of the score system through associated encryption, which comprises a triggering module, a judging module, a reading module, a first verification module, a second verification module, a deduction module, a first generation module, a second generation module and a successful exchange module; the triggering module is used for triggering point consumption by a user through a browser; the judging module, namely the server judges whether the integral of the user is enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail; the reading module is used for reading the user point change log and checking the reasonability of point data of the user; the first verification module verifies whether a single abstract value in the user point change log is correct or not, if yes, the next step is carried out, if not, a tampering risk exists, and the return is failed; the second verification module verifies whether the associated abstract values of all the data are correct or not when the single abstract value is correct, if so, verifies the next abstract value, and if not, returns a failure; the deduction module, namely the server deducts the points of the commodities exchanged by the user and updates the point balance of the user account; the first generation module generates a random seed; the second generation module generates a single abstract value, generates a correlation abstract value and generates a new integral change log; the exchange success module is used for enabling the user to return to the browser point exchange commodity interface, and the point exchange is successful, so that the data legality can be verified, and data safety is achieved.
Further, the triggering module is further specifically: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
Further, the determining module is further specifically: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
Further, the reading module is further specifically: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
Further, the first verification module is further specifically: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
Further, the second verification module is further specifically: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
Further, the deduction module is further specifically: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
Further, the first generating module is further specifically: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
The invention has the beneficial effects that: the invention verifies the legality of the data through single data abstract verification and multiple associated abstract verification, the associated abstract value of each record is calculated according to the random seed of the previous record, the data log is associated with one record, and the earliest record can be continuously calculated, so that the cost of illegal data tampering is increased, and the data security is realized.
Drawings
FIG. 1 is a schematic flow diagram of the process of the present invention.
Fig. 2 is a schematic block diagram of the system of the present invention.
Fig. 3 is a data structure table of the integral change log.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1, a method for implementing data security by associated encryption in a scoring system according to the present invention includes the following steps:
step S1, the user triggers the point consumption through the browser;
step S2, the server judges whether the points of the user are enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail;
step S3, reading the user point change log, and checking the reasonability of the point data of the user;
step S4, verifying whether the single abstract value in the user point change log is correct, if yes, entering the next step, if not, having the risk of tampering, and returning to fail;
step S5, when the single abstract value is correct, verifying whether the associated abstract values of all the data are correct, if so, verifying the next abstract value, and if not, returning to fail;
step S6, the server deducts the points of the commodity exchanged by the user and updates the point balance of the user account;
step S7, generating random seeds;
step S8, generating a single abstract value, generating a correlation abstract value and generating a new integral change log;
and step S9, returning the browser point exchange commodity interface by the user, and successfully exchanging the points, so that the data legality can be verified, and the data safety is realized.
The invention is further illustrated by the following example:
step 1, user triggers point consumption
The user enters commodity details through the client browser, clicks the exchange button, triggers commodity exchange behaviors and initiates a point deduction request to the server.
Step 2, judging whether the integral is full or not
The server receives the point deduction request, for example, the user currently leaves the point 300, exchanges the point 200 required by the commodity, the system reads the account point balance, judges whether the remaining point of the account is enough or not by comparing the point required by the commodity exchange with the account point balance, if not, the server returns failure, and if so, the server goes to step 3.
Step 3, reading nearly 10 integral change logs
The credit balance is sufficient, and in step 3, the system needs to read the latest 10 credit change logs for checking the validity of the credit data in steps 4 and 5. The read data structure is shown in FIG. 3:
step 4, verifying whether the single abstract value is correct
The latest integral change log is taken from 10 integral change logs, the data is the data with the number being 538, the formula of a single abstract value is (user ID + current integral + time + password) MD5, the formula of "QWERT" is the password added by the system, the original string is 987653002021-07-31QWERT, the abstract value obtained after MD5 is carried out is 9D316565A52C534756CBBA250695F895, whether the obtained result is equal to the single abstract value on the data or not is verified, if the two are not equal, the tampering risk exists, and the return failure occurs. If it is correct step 5 is entered.
Step 5, verifying whether the multiple associated abstract values are correct
And after the single digest value is correct, verifying whether the associated digest values of all the obtained data are correct, wherein the formula of the associated digest values is (user ID + current integral + time + random seed of the previous data + password) MD5, taking the data with the number 538 as an example, the original string is 987653002021-07-317592QWERT, performing MD5 to obtain a digest value 15DB1ACD2A21432DC77351A6029702FA, verifying whether the obtained result is equal to the associated digest value on the data, and if the obtained result is not equal, tampering risk exists, and returning failure. And if the data is correct, verifying the next strip until the associated digest values of the 10 taken data are correct, and representing that the data is safe.
Step 6, deducting integral
For example, the point commodity exchange needs to be deducted by 200, the point balance is 300-.
Step 7, generating random seeds
The random seed generation rule is to randomly obtain a number from 0 to 9999, and complement the insufficient position with 0, for example, if the random number of this time is 56, the random seed is 0056. The random seed is generated in step 7 without any need to generate data according to which step, namely, a seed is generated at random at present for generating a correlation summary value for the next integral variation.
Step 8, generating a single abstract value
According to the single digest value formula (user ID + current point + time + password) MD5 in step 4, the original string of the user ID + current point + time + password is obtained by splicing 987651002021-08-01QWER, and a single digest value 92A3DD87E270B5BF37F0D2F0136137a6 is obtained by using MD5 digest algorithm. The original string is the character string concatenation of the user ID + the current score + the time + the password, and a single digest value can be obtained by adopting the MD5 digest algorithm.
Step 9, generating associated abstract value
According to the associated digest value formula (user ID + current point + time + random seed of the previous piece of data + password) MD5 in step 5, the original string of the user ID + current point + time + random seed of the previous piece of data + password is obtained by splicing and is 987651002021-08-012495QWER, and an MD5 digest algorithm is adopted to obtain an associated digest value 36DBD98CF7DAB7B9E33FA3689BC5ECA 2. The original string is the string splice content before MD 5.
Step 10, generating a new point change log
And (4) counting the remaining points after conversion, namely 300-100 of the points required for conversion, obtaining a single summary value of 92A3DD87E270B5BF37F0D2F0136137A6, a related summary value of 987651002021-08-012495QWER, a random seed of 0056 and a time of 2021-08-01 according to the steps 5 to 9, and storing a new point change log in a database.
And step 11, returning the successful point redemption.
In summary, the general idea of the present invention is to generate an abstract value (a character string) for each change of point data, and store the current remaining points and the abstract value in a database, and when a point change action occurs next time, for example, when a user exchanges a prize with a point, obtain the abstract value to check whether the abstract value and the point are paired. But the security of the single data check is not high enough, because if the encryption mode is leaked, a hacker can modify the digest value and the point of the single record to make an illegal profit. On the basis, a data log needs to be generated for each change of the integral, each data log can store the current integral and the generated abstract value, and can generate a related abstract value according to the random seed of the previous record, and then a new random seed is generated for the next change of the integral. The associated abstract value of each record is calculated according to the random seed of the previous record, so that the data log is associated with one record, and the earliest record can be continuously calculated.
Referring to fig. 2, the present invention further provides a system for implementing data security by a score system through associated encryption, including a triggering module, a determining module, a reading module, a first verifying module, a second verifying module, a deducting module, a first generating module, a second generating module, and a successful exchange module; the triggering module is used for triggering point consumption by a user through a browser; the judging module, namely the server judges whether the integral of the user is enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail; the reading module is used for reading the user point change log and checking the reasonability of point data of the user; the first verification module verifies whether a single abstract value in the user point change log is correct or not, if yes, the next step is carried out, if not, a tampering risk exists, and the return is failed; the second verification module verifies whether the associated abstract values of all the data are correct or not when the single abstract value is correct, if so, verifies the next abstract value, and if not, returns a failure; the deduction module, namely the server deducts the points of the commodities exchanged by the user and updates the point balance of the user account; the first generation module generates a random seed; the second generation module generates a single abstract value, generates a correlation abstract value and generates a new integral change log; the exchange success module is used for enabling the user to return to the browser point exchange commodity interface, and the point exchange is successful, so that the data legality can be verified, and data safety is achieved.
The triggering module is further specifically: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
The judging module is further specifically: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
The reading module is further specifically: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
The first verification module is further specifically: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
The second verification module is further specifically: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
The deduction module is further embodied as: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
The first generating module is further specifically: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
The above description is only a preferred embodiment of the present invention, and all equivalent changes and modifications made in accordance with the claims of the present invention should be covered by the present invention.

Claims (16)

1. A method for realizing data security by a scoring system through associated encryption is characterized by comprising the following steps:
step S1, the user triggers the point consumption through the browser;
step S2, the server judges whether the points of the user are enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail;
step S3, reading the user point change log, and checking the reasonability of the point data of the user;
step S4, verifying whether the single abstract value in the user point change log is correct, if yes, entering the next step, if not, having the risk of tampering, and returning to fail;
step S5, when the single abstract value is correct, verifying whether the associated abstract values of all the data are correct, if so, verifying the next abstract value, and if not, returning to fail;
step S6, the server deducts the points of the commodity exchanged by the user and updates the point balance of the user account;
step S7, generating random seeds;
step S8, generating a single abstract value, generating a correlation abstract value and generating a new integral change log;
and step S9, returning the browser point exchange commodity interface by the user, and successfully exchanging the points, so that the data legality can be verified, and the data safety is realized.
2. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S1 further includes: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
3. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S2 further includes: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
4. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S3 further includes: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
5. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S4 further includes: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
6. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S5 further includes: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
7. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S6 further includes: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
8. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S7 further includes: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
9. A system for realizing data security by a score system through associated encryption is characterized in that: the system comprises a triggering module, a judging module, a reading module, a first verification module, a second verification module, a deduction module, a first generation module, a second generation module and a conversion success module; the triggering module is used for triggering point consumption by a user through a browser; the judging module, namely the server judges whether the integral of the user is enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail; the reading module is used for reading the user point change log and checking the reasonability of point data of the user; the first verification module verifies whether a single abstract value in the user point change log is correct or not, if yes, the next step is carried out, if not, a tampering risk exists, and the return is failed; the second verification module verifies whether the associated abstract values of all the data are correct or not when the single abstract value is correct, if so, verifies the next abstract value, and if not, returns a failure; the deduction module, namely the server deducts the points of the commodities exchanged by the user and updates the point balance of the user account; the first generation module generates a random seed; the second generation module generates a single abstract value, generates a correlation abstract value and generates a new integral change log; the exchange success module is used for enabling the user to return to the browser point exchange commodity interface, and the point exchange is successful, so that the data legality can be verified, and data safety is achieved.
10. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the triggering module is further specifically: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
11. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the judging module is further specifically: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
12. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the reading module is further specifically: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
13. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the first verification module is further specifically: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
14. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the second verification module is further specifically: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
15. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the deduction module is further embodied as: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
16. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the first generating module is further specifically: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
CN202110920244.1A 2021-08-11 2021-08-11 Method and system for realizing data security of integrating system through associated encryption Active CN113591123B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110920244.1A CN113591123B (en) 2021-08-11 2021-08-11 Method and system for realizing data security of integrating system through associated encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110920244.1A CN113591123B (en) 2021-08-11 2021-08-11 Method and system for realizing data security of integrating system through associated encryption

Publications (2)

Publication Number Publication Date
CN113591123A true CN113591123A (en) 2021-11-02
CN113591123B CN113591123B (en) 2023-09-22

Family

ID=78257266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110920244.1A Active CN113591123B (en) 2021-08-11 2021-08-11 Method and system for realizing data security of integrating system through associated encryption

Country Status (1)

Country Link
CN (1) CN113591123B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018124718A1 (en) * 2016-12-29 2018-07-05 주식회사 코인플러그 Method for providing integrated point service by managing balance database for each block in blockchain, and support server using same
CN110471931A (en) * 2019-08-13 2019-11-19 山大地纬软件股份有限公司 A kind of digital asset trade identity maintaining method based on transaction in assets chain
CN111161043A (en) * 2019-12-09 2020-05-15 杭州爱易货科技有限公司 Block chain-based acceptance draft application method
CN111445281A (en) * 2020-03-18 2020-07-24 中国建设银行股份有限公司 Block chain-based integral monitoring method and device and computer-readable storage medium
CN111695934A (en) * 2020-05-13 2020-09-22 陈议尊 Integral tracing method and system for block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018124718A1 (en) * 2016-12-29 2018-07-05 주식회사 코인플러그 Method for providing integrated point service by managing balance database for each block in blockchain, and support server using same
CN110471931A (en) * 2019-08-13 2019-11-19 山大地纬软件股份有限公司 A kind of digital asset trade identity maintaining method based on transaction in assets chain
CN111161043A (en) * 2019-12-09 2020-05-15 杭州爱易货科技有限公司 Block chain-based acceptance draft application method
CN111445281A (en) * 2020-03-18 2020-07-24 中国建设银行股份有限公司 Block chain-based integral monitoring method and device and computer-readable storage medium
CN111695934A (en) * 2020-05-13 2020-09-22 陈议尊 Integral tracing method and system for block chain

Also Published As

Publication number Publication date
CN113591123B (en) 2023-09-22

Similar Documents

Publication Publication Date Title
CN106875254B (en) Android malicious application program control method based on block chain technology
CN101116097B (en) Secure cell phone for ATM transactions
KR101851686B1 (en) Abstracted and randomized one-time passwords for transactional authentication
KR101937220B1 (en) Method for generating and verifying a digital signature or message authentication code based on a block chain that does not require key management
US11271751B2 (en) Distributed data records
CN100531035C (en) Method and system for verifying electronic signatures and microcircuit card for carrying out said method
EP0941524A1 (en) Transaction system
CN112084484B (en) Equipment hardware safety detection method and device, electronic equipment and storage medium
CN100383694C (en) Maintaining privacy for transactions performable by a user device having a security module
CN107169499A (en) A kind of Risk Identification Method and device
CN104683354A (en) Dynamic password system based on label
EP3963497B1 (en) Protocol for validating blockchain transactions
CN107833053A (en) The Information Authentication method and device of core banking system
US10115097B2 (en) Protecting lottery receipts
CN113591123A (en) Method and system for realizing data security of integral system through associated encryption
CN111597538A (en) Verification code generation method and system
CN111191215A (en) Safety equipment identification method and system
TW202307758A (en) Learning model evaluation system, learning model evaluation method, and program
CN112948847B (en) Block chain-based data sharing system and data correctness verification method
Adams et al. A framework using useful work for transient committee selections in blockchain consensus
CN112671738A (en) Login method, device, terminal and storage medium of enterprise internal system
Burhanuddin et al. Blockchain in voting system application
CN113783839B (en) Block chain data updating method and device, computer equipment and storage medium
US11893587B2 (en) System for enhanced authentication using non-fungible tokens (NFTs)
JP2015038691A (en) Transfer processing system and method by action pattern authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant