CN113591123A - Method and system for realizing data security of integral system through associated encryption - Google Patents
Method and system for realizing data security of integral system through associated encryption Download PDFInfo
- Publication number
- CN113591123A CN113591123A CN202110920244.1A CN202110920244A CN113591123A CN 113591123 A CN113591123 A CN 113591123A CN 202110920244 A CN202110920244 A CN 202110920244A CN 113591123 A CN113591123 A CN 113591123A
- Authority
- CN
- China
- Prior art keywords
- point
- user
- data
- exchange
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Cash Registers Or Receiving Machines (AREA)
Abstract
The invention provides a method for realizing data security of an integral system through associated encryption, which comprises the following steps: step S1, the user triggers the point consumption through the browser; step S2, the server judges whether the integral of the user is enough; step S3, reading the user point change log, and checking the reasonability of the point data of the user; step S4, verifying whether the single abstract value in the user point change log is correct; step S5, when the single abstract value is correct, verifying whether the associated abstract values of all the data are correct; step S6, the server deducts the points of the commodity exchanged by the user and updates the point balance of the user account; step S7, generating random seeds; step S8, generating a single abstract value, generating a correlation abstract value and generating a new integral change log; step S9, returning the point exchange commodity interface of the browser by the user, wherein the point exchange is successful; the invention can carry out validity check on the data and realize data security.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a method and a system for realizing data security by a score system through associated encryption.
Background
In the item of the bonus system, when a user exchanges prizes with bonus points, the bonus system can check whether balance is sufficient, if so, exchange is allowed, otherwise, exchange is not allowed. However, if someone maliciously obtains the database authority, the score data in the score table of the database are maliciously modified, so that illegal profit-making is carried out, and a company can cause great loss. Therefore, data security needs to be emphasized, the database server is not only required to be managed safely, but also a series of secure encryption can be carried out on the data from the design of a program system, so that the legality of the data is verified, the threshold of illegal data tampering is increased, and the data security is realized.
Disclosure of Invention
In order to overcome the above problems, an object of the present invention is to provide a method for verifying the validity of data and realizing data security.
The invention is realized by adopting the following scheme: a method for a scoring system to implement data security through associative encryption, the method comprising the steps of:
step S1, the user triggers the point consumption through the browser;
step S2, the server judges whether the points of the user are enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail;
step S3, reading the user point change log, and checking the reasonability of the point data of the user;
step S4, verifying whether the single abstract value in the user point change log is correct, if yes, entering the next step, if not, having the risk of tampering, and returning to fail;
step S5, when the single abstract value is correct, verifying whether the associated abstract values of all the data are correct, if so, verifying the next abstract value, and if not, returning to fail;
step S6, the server deducts the points of the commodity exchanged by the user and updates the point balance of the user account;
step S7, generating random seeds;
step S8, generating a single abstract value, generating a correlation abstract value and generating a new integral change log;
and step S9, returning the browser point exchange commodity interface by the user, and successfully exchanging the points, so that the data legality can be verified, and the data safety is realized.
Further, the step S1 is further specifically: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
Further, the step S2 is further specifically: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
Further, the step S3 is further specifically: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
Further, the step S4 is further specifically: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
Further, the step S5 is further specifically: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
Further, the step S6 is further specifically: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
Further, the step S7 is further specifically: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
The invention also provides a system for realizing data security of the score system through associated encryption, which comprises a triggering module, a judging module, a reading module, a first verification module, a second verification module, a deduction module, a first generation module, a second generation module and a successful exchange module; the triggering module is used for triggering point consumption by a user through a browser; the judging module, namely the server judges whether the integral of the user is enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail; the reading module is used for reading the user point change log and checking the reasonability of point data of the user; the first verification module verifies whether a single abstract value in the user point change log is correct or not, if yes, the next step is carried out, if not, a tampering risk exists, and the return is failed; the second verification module verifies whether the associated abstract values of all the data are correct or not when the single abstract value is correct, if so, verifies the next abstract value, and if not, returns a failure; the deduction module, namely the server deducts the points of the commodities exchanged by the user and updates the point balance of the user account; the first generation module generates a random seed; the second generation module generates a single abstract value, generates a correlation abstract value and generates a new integral change log; the exchange success module is used for enabling the user to return to the browser point exchange commodity interface, and the point exchange is successful, so that the data legality can be verified, and data safety is achieved.
Further, the triggering module is further specifically: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
Further, the determining module is further specifically: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
Further, the reading module is further specifically: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
Further, the first verification module is further specifically: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
Further, the second verification module is further specifically: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
Further, the deduction module is further specifically: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
Further, the first generating module is further specifically: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
The invention has the beneficial effects that: the invention verifies the legality of the data through single data abstract verification and multiple associated abstract verification, the associated abstract value of each record is calculated according to the random seed of the previous record, the data log is associated with one record, and the earliest record can be continuously calculated, so that the cost of illegal data tampering is increased, and the data security is realized.
Drawings
FIG. 1 is a schematic flow diagram of the process of the present invention.
Fig. 2 is a schematic block diagram of the system of the present invention.
Fig. 3 is a data structure table of the integral change log.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1, a method for implementing data security by associated encryption in a scoring system according to the present invention includes the following steps:
step S1, the user triggers the point consumption through the browser;
step S2, the server judges whether the points of the user are enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail;
step S3, reading the user point change log, and checking the reasonability of the point data of the user;
step S4, verifying whether the single abstract value in the user point change log is correct, if yes, entering the next step, if not, having the risk of tampering, and returning to fail;
step S5, when the single abstract value is correct, verifying whether the associated abstract values of all the data are correct, if so, verifying the next abstract value, and if not, returning to fail;
step S6, the server deducts the points of the commodity exchanged by the user and updates the point balance of the user account;
step S7, generating random seeds;
step S8, generating a single abstract value, generating a correlation abstract value and generating a new integral change log;
and step S9, returning the browser point exchange commodity interface by the user, and successfully exchanging the points, so that the data legality can be verified, and the data safety is realized.
The invention is further illustrated by the following example:
The user enters commodity details through the client browser, clicks the exchange button, triggers commodity exchange behaviors and initiates a point deduction request to the server.
The server receives the point deduction request, for example, the user currently leaves the point 300, exchanges the point 200 required by the commodity, the system reads the account point balance, judges whether the remaining point of the account is enough or not by comparing the point required by the commodity exchange with the account point balance, if not, the server returns failure, and if so, the server goes to step 3.
The credit balance is sufficient, and in step 3, the system needs to read the latest 10 credit change logs for checking the validity of the credit data in steps 4 and 5. The read data structure is shown in FIG. 3:
step 4, verifying whether the single abstract value is correct
The latest integral change log is taken from 10 integral change logs, the data is the data with the number being 538, the formula of a single abstract value is (user ID + current integral + time + password) MD5, the formula of "QWERT" is the password added by the system, the original string is 987653002021-07-31QWERT, the abstract value obtained after MD5 is carried out is 9D316565A52C534756CBBA250695F895, whether the obtained result is equal to the single abstract value on the data or not is verified, if the two are not equal, the tampering risk exists, and the return failure occurs. If it is correct step 5 is entered.
And after the single digest value is correct, verifying whether the associated digest values of all the obtained data are correct, wherein the formula of the associated digest values is (user ID + current integral + time + random seed of the previous data + password) MD5, taking the data with the number 538 as an example, the original string is 987653002021-07-317592QWERT, performing MD5 to obtain a digest value 15DB1ACD2A21432DC77351A6029702FA, verifying whether the obtained result is equal to the associated digest value on the data, and if the obtained result is not equal, tampering risk exists, and returning failure. And if the data is correct, verifying the next strip until the associated digest values of the 10 taken data are correct, and representing that the data is safe.
Step 6, deducting integral
For example, the point commodity exchange needs to be deducted by 200, the point balance is 300-.
The random seed generation rule is to randomly obtain a number from 0 to 9999, and complement the insufficient position with 0, for example, if the random number of this time is 56, the random seed is 0056. The random seed is generated in step 7 without any need to generate data according to which step, namely, a seed is generated at random at present for generating a correlation summary value for the next integral variation.
Step 8, generating a single abstract value
According to the single digest value formula (user ID + current point + time + password) MD5 in step 4, the original string of the user ID + current point + time + password is obtained by splicing 987651002021-08-01QWER, and a single digest value 92A3DD87E270B5BF37F0D2F0136137a6 is obtained by using MD5 digest algorithm. The original string is the character string concatenation of the user ID + the current score + the time + the password, and a single digest value can be obtained by adopting the MD5 digest algorithm.
According to the associated digest value formula (user ID + current point + time + random seed of the previous piece of data + password) MD5 in step 5, the original string of the user ID + current point + time + random seed of the previous piece of data + password is obtained by splicing and is 987651002021-08-012495QWER, and an MD5 digest algorithm is adopted to obtain an associated digest value 36DBD98CF7DAB7B9E33FA3689BC5ECA 2. The original string is the string splice content before MD 5.
Step 10, generating a new point change log
And (4) counting the remaining points after conversion, namely 300-100 of the points required for conversion, obtaining a single summary value of 92A3DD87E270B5BF37F0D2F0136137A6, a related summary value of 987651002021-08-012495QWER, a random seed of 0056 and a time of 2021-08-01 according to the steps 5 to 9, and storing a new point change log in a database.
And step 11, returning the successful point redemption.
In summary, the general idea of the present invention is to generate an abstract value (a character string) for each change of point data, and store the current remaining points and the abstract value in a database, and when a point change action occurs next time, for example, when a user exchanges a prize with a point, obtain the abstract value to check whether the abstract value and the point are paired. But the security of the single data check is not high enough, because if the encryption mode is leaked, a hacker can modify the digest value and the point of the single record to make an illegal profit. On the basis, a data log needs to be generated for each change of the integral, each data log can store the current integral and the generated abstract value, and can generate a related abstract value according to the random seed of the previous record, and then a new random seed is generated for the next change of the integral. The associated abstract value of each record is calculated according to the random seed of the previous record, so that the data log is associated with one record, and the earliest record can be continuously calculated.
Referring to fig. 2, the present invention further provides a system for implementing data security by a score system through associated encryption, including a triggering module, a determining module, a reading module, a first verifying module, a second verifying module, a deducting module, a first generating module, a second generating module, and a successful exchange module; the triggering module is used for triggering point consumption by a user through a browser; the judging module, namely the server judges whether the integral of the user is enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail; the reading module is used for reading the user point change log and checking the reasonability of point data of the user; the first verification module verifies whether a single abstract value in the user point change log is correct or not, if yes, the next step is carried out, if not, a tampering risk exists, and the return is failed; the second verification module verifies whether the associated abstract values of all the data are correct or not when the single abstract value is correct, if so, verifies the next abstract value, and if not, returns a failure; the deduction module, namely the server deducts the points of the commodities exchanged by the user and updates the point balance of the user account; the first generation module generates a random seed; the second generation module generates a single abstract value, generates a correlation abstract value and generates a new integral change log; the exchange success module is used for enabling the user to return to the browser point exchange commodity interface, and the point exchange is successful, so that the data legality can be verified, and data safety is achieved.
The triggering module is further specifically: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
The judging module is further specifically: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
The reading module is further specifically: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
The first verification module is further specifically: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
The second verification module is further specifically: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
The deduction module is further embodied as: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
The first generating module is further specifically: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
The above description is only a preferred embodiment of the present invention, and all equivalent changes and modifications made in accordance with the claims of the present invention should be covered by the present invention.
Claims (16)
1. A method for realizing data security by a scoring system through associated encryption is characterized by comprising the following steps:
step S1, the user triggers the point consumption through the browser;
step S2, the server judges whether the points of the user are enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail;
step S3, reading the user point change log, and checking the reasonability of the point data of the user;
step S4, verifying whether the single abstract value in the user point change log is correct, if yes, entering the next step, if not, having the risk of tampering, and returning to fail;
step S5, when the single abstract value is correct, verifying whether the associated abstract values of all the data are correct, if so, verifying the next abstract value, and if not, returning to fail;
step S6, the server deducts the points of the commodity exchanged by the user and updates the point balance of the user account;
step S7, generating random seeds;
step S8, generating a single abstract value, generating a correlation abstract value and generating a new integral change log;
and step S9, returning the browser point exchange commodity interface by the user, and successfully exchanging the points, so that the data legality can be verified, and the data safety is realized.
2. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S1 further includes: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
3. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S2 further includes: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
4. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S3 further includes: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
5. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S4 further includes: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
6. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S5 further includes: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
7. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S6 further includes: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
8. The method for realizing data security by the integral system through the associative encryption according to claim 1, wherein the method comprises the following steps: the step S7 further includes: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
9. A system for realizing data security by a score system through associated encryption is characterized in that: the system comprises a triggering module, a judging module, a reading module, a first verification module, a second verification module, a deduction module, a first generation module, a second generation module and a conversion success module; the triggering module is used for triggering point consumption by a user through a browser; the judging module, namely the server judges whether the integral of the user is enough, if yes, the next commodity exchange is carried out, and if not, the exchange is returned to fail; the reading module is used for reading the user point change log and checking the reasonability of point data of the user; the first verification module verifies whether a single abstract value in the user point change log is correct or not, if yes, the next step is carried out, if not, a tampering risk exists, and the return is failed; the second verification module verifies whether the associated abstract values of all the data are correct or not when the single abstract value is correct, if so, verifies the next abstract value, and if not, returns a failure; the deduction module, namely the server deducts the points of the commodities exchanged by the user and updates the point balance of the user account; the first generation module generates a random seed; the second generation module generates a single abstract value, generates a correlation abstract value and generates a new integral change log; the exchange success module is used for enabling the user to return to the browser point exchange commodity interface, and the point exchange is successful, so that the data legality can be verified, and data safety is achieved.
10. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the triggering module is further specifically: and the user enters a commodity detail interface through the client browser, clicks the point exchange commodity button, triggers the commodity exchange behavior and initiates a point deduction request to the server.
11. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the judging module is further specifically: and the server receives the point deduction request, compares the point balance of the user account with the point required by commodity exchange, and judges whether the remaining points of the user account are enough to exchange commodities, if so, the next commodity exchange step is carried out, and if not, the commodity exchange failure is returned.
12. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the reading module is further specifically: when the remaining points of the user are enough to exchange the required point goods, the server reads 10-15 point change logs of the user, so that the legality of the point data can be conveniently checked.
13. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the first verification module is further specifically: and taking the uppermost point change log from the point change logs, obtaining the abstract value of the uppermost point change log through a formula of a single abstract value, namely user ID + current point + time + password, judging whether the result obtained by verification is equal to the single abstract value on the data, if so, entering the next step, if not, having a tampering risk, and returning to the commodity exchange failure.
14. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the second verification module is further specifically: and when the single abstract value is verified to be correct, verifying whether the associated abstract values of all the obtained data are correct or not, obtaining the associated abstract values through an associated abstract value formula of user ID, current point, time, random seeds of the previous data and passwords, verifying whether the obtained associated abstract values are equal to the associated abstract values on the data or not, if yes, verifying the next data until the associated abstract values of the data taken out from the point change log are correct, judging the data safety, and if not, returning to the commodity exchange failure.
15. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the deduction module is further embodied as: and deducting the points required by the user to exchange the commodities, and updating the point balance of the user account by subtracting the points required by the commodities from the residual points of the user.
16. The system for realizing data security by the integral system through the associative encryption according to claim 9, wherein: the first generating module is further specifically: the random seed generation rule is that a number is randomly obtained from 0-9999, the insufficient position is supplemented with 0, and a seed is randomly generated at present, so that the generation of the associated abstract value for the next integral change is facilitated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110920244.1A CN113591123B (en) | 2021-08-11 | 2021-08-11 | Method and system for realizing data security of integrating system through associated encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110920244.1A CN113591123B (en) | 2021-08-11 | 2021-08-11 | Method and system for realizing data security of integrating system through associated encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113591123A true CN113591123A (en) | 2021-11-02 |
CN113591123B CN113591123B (en) | 2023-09-22 |
Family
ID=78257266
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110920244.1A Active CN113591123B (en) | 2021-08-11 | 2021-08-11 | Method and system for realizing data security of integrating system through associated encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113591123B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018124718A1 (en) * | 2016-12-29 | 2018-07-05 | 주식회사 코인플러그 | Method for providing integrated point service by managing balance database for each block in blockchain, and support server using same |
CN110471931A (en) * | 2019-08-13 | 2019-11-19 | 山大地纬软件股份有限公司 | A kind of digital asset trade identity maintaining method based on transaction in assets chain |
CN111161043A (en) * | 2019-12-09 | 2020-05-15 | 杭州爱易货科技有限公司 | Block chain-based acceptance draft application method |
CN111445281A (en) * | 2020-03-18 | 2020-07-24 | 中国建设银行股份有限公司 | Block chain-based integral monitoring method and device and computer-readable storage medium |
CN111695934A (en) * | 2020-05-13 | 2020-09-22 | 陈议尊 | Integral tracing method and system for block chain |
-
2021
- 2021-08-11 CN CN202110920244.1A patent/CN113591123B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018124718A1 (en) * | 2016-12-29 | 2018-07-05 | 주식회사 코인플러그 | Method for providing integrated point service by managing balance database for each block in blockchain, and support server using same |
CN110471931A (en) * | 2019-08-13 | 2019-11-19 | 山大地纬软件股份有限公司 | A kind of digital asset trade identity maintaining method based on transaction in assets chain |
CN111161043A (en) * | 2019-12-09 | 2020-05-15 | 杭州爱易货科技有限公司 | Block chain-based acceptance draft application method |
CN111445281A (en) * | 2020-03-18 | 2020-07-24 | 中国建设银行股份有限公司 | Block chain-based integral monitoring method and device and computer-readable storage medium |
CN111695934A (en) * | 2020-05-13 | 2020-09-22 | 陈议尊 | Integral tracing method and system for block chain |
Also Published As
Publication number | Publication date |
---|---|
CN113591123B (en) | 2023-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106875254B (en) | Android malicious application program control method based on block chain technology | |
CN101116097B (en) | Secure cell phone for ATM transactions | |
KR101851686B1 (en) | Abstracted and randomized one-time passwords for transactional authentication | |
KR101937220B1 (en) | Method for generating and verifying a digital signature or message authentication code based on a block chain that does not require key management | |
US11271751B2 (en) | Distributed data records | |
CN100531035C (en) | Method and system for verifying electronic signatures and microcircuit card for carrying out said method | |
EP0941524A1 (en) | Transaction system | |
CN112084484B (en) | Equipment hardware safety detection method and device, electronic equipment and storage medium | |
CN100383694C (en) | Maintaining privacy for transactions performable by a user device having a security module | |
CN107169499A (en) | A kind of Risk Identification Method and device | |
CN104683354A (en) | Dynamic password system based on label | |
EP3963497B1 (en) | Protocol for validating blockchain transactions | |
CN107833053A (en) | The Information Authentication method and device of core banking system | |
US10115097B2 (en) | Protecting lottery receipts | |
CN113591123A (en) | Method and system for realizing data security of integral system through associated encryption | |
CN111597538A (en) | Verification code generation method and system | |
CN111191215A (en) | Safety equipment identification method and system | |
TW202307758A (en) | Learning model evaluation system, learning model evaluation method, and program | |
CN112948847B (en) | Block chain-based data sharing system and data correctness verification method | |
Adams et al. | A framework using useful work for transient committee selections in blockchain consensus | |
CN112671738A (en) | Login method, device, terminal and storage medium of enterprise internal system | |
Burhanuddin et al. | Blockchain in voting system application | |
CN113783839B (en) | Block chain data updating method and device, computer equipment and storage medium | |
US11893587B2 (en) | System for enhanced authentication using non-fungible tokens (NFTs) | |
JP2015038691A (en) | Transfer processing system and method by action pattern authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |