CN117521155A - Text integrity verification method, device, system, computer equipment and medium - Google Patents

Text integrity verification method, device, system, computer equipment and medium Download PDF

Info

Publication number
CN117521155A
CN117521155A CN202311474890.5A CN202311474890A CN117521155A CN 117521155 A CN117521155 A CN 117521155A CN 202311474890 A CN202311474890 A CN 202311474890A CN 117521155 A CN117521155 A CN 117521155A
Authority
CN
China
Prior art keywords
text
financial
digital signature
abstract
text abstract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311474890.5A
Other languages
Chinese (zh)
Inventor
余宇航
张彬
张志群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202311474890.5A priority Critical patent/CN117521155A/en
Publication of CN117521155A publication Critical patent/CN117521155A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/34Browsing; Visualisation therefor
    • G06F16/345Summarisation for human users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The present application relates to a text integrity verification method, apparatus, system, computer device, storage medium and computer program product, and relates to the field of information security technology, and may be used in the field of financial science and technology or other related fields. The method comprises the following steps: extracting a first text abstract of a financial text from the financial text to be transmitted; encrypting the first text abstract to obtain a first digital signature of the first text abstract; and sending the financial text and the first digital signature to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature. By adopting the method, the data transmission efficiency can be improved.

Description

Text integrity verification method, device, system, computer equipment and medium
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a text integrity verification method, apparatus, system, computer device, storage medium, and computer program product.
Background
With the continuous progress of technology and the vigorous development of information society, data transmission amounts show an increasing trend. As the amount of data transmission increases, secure transmission of data such as financial text becomes very important. Meanwhile, in order to confirm whether the financial text is securely transmitted, an integrity check is required.
In the conventional technology, when the integrity of the transmitted financial text is checked, encryption processing is required to be carried out on the whole financial text before transmission; however, if the data amount of the transmitted financial text is relatively large, the encryption process consumes a large amount of computation resources, and the data amount of the transmitted encrypted financial text is also large, resulting in low data transmission efficiency.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a text integrity checking method, apparatus, system, computer device, computer readable storage medium, and computer program product that can improve data transmission efficiency.
In a first aspect, the present application provides a text integrity verification method, applied to a transmitting end, where the method includes:
extracting a first text abstract of a financial text from the financial text to be transmitted;
Encrypting the first text abstract to obtain a first digital signature of the first text abstract;
and sending the financial text and the first digital signature to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature.
In one embodiment, the extracting the first text abstract of the financial text from the financial text to be transmitted includes:
extracting key financial texts from the financial texts to be transmitted;
and combining the key financial texts to obtain a first text abstract of the financial texts.
In one embodiment, the extracting the first text abstract of the financial text from the financial text to be transmitted further includes:
inputting a plurality of pre-trained text abstract models into a financial text to be transmitted to obtain a plurality of text abstracts;
identifying the data volume of each text excerpt;
And screening out the text abstract with the minimum corresponding data quantity from the text abstracts, and taking the text abstract as the first text abstract of the financial text.
In one embodiment, the encrypting the first text excerpt to obtain a first digital signature of the first text excerpt includes:
acquiring a private key of the transmitting end;
and encrypting the first text abstract according to the private key of the sending end to obtain first encryption information serving as a first digital signature of the first text abstract.
In one embodiment, the sending the financial text and the first digital signature to a receiving end includes:
obtaining a public key of the sending end; the public key is matched with the private key;
and sending the financial text, the first digital signature and the public key of the sending end to a receiving end, so that the receiving end encrypts a second text abstract of the financial text according to the public key of the sending end to obtain second encrypted information serving as a second digital signature of the second text abstract.
In a second aspect, the present application further provides another text integrity verification method, applied to a receiving end, where the method includes:
Receiving a financial text to be transmitted and a first digital signature of a first text abstract of the financial text, wherein the financial text is sent by a sending end; the first text abstract is extracted from the financial text by the sending end, and the first digital signature is obtained by encrypting the first text abstract by the sending end;
extracting a second text abstract of the financial text from the financial text;
encrypting the second text abstract to obtain a second digital signature of the second text abstract;
and determining an integrity check result of the financial text according to the first digital signature and the second digital signature.
In one embodiment, the determining the integrity check result of the financial text according to the first digital signature and the second digital signature includes:
acquiring the coincidence degree between the first digital signature and the second digital signature;
and under the condition that the contact ratio is the preset contact ratio, determining that the data of the financial text is complete.
In a third aspect, the present application further provides a text integrity verification apparatus, applied to a transmitting end, where the apparatus includes:
The first extraction module is used for extracting a first text abstract of the financial text from the financial text to be transmitted;
the first encryption module is used for carrying out encryption processing on the first text abstract to obtain a first digital signature of the first text abstract;
and the information sending module is used for sending the financial text and the first digital signature to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature.
In a fourth aspect, the present application further provides another text integrity verification apparatus, applied to a receiving end, where the apparatus includes:
the information receiving module is used for receiving the financial text to be transmitted sent by the sending end and a first digital signature of a first text abstract of the financial text; the first text abstract is extracted from the financial text by the sending end, and the first digital signature is obtained by encrypting the first text abstract by the sending end;
The second extraction module is used for extracting a second text abstract of the financial text from the financial text;
the second encryption module is used for carrying out encryption processing on the second text abstract to obtain a second digital signature of the second text abstract;
and the result determining module is used for determining the integrity check result of the financial text according to the first digital signature and the second digital signature.
In a fifth aspect, the present application further provides a text integrity verification system, the system comprising: a transmitting end and a receiving end;
the sending end is used for extracting a first text abstract of the financial text from the financial text to be transmitted; encrypting the first text abstract to obtain a first digital signature of the first text abstract; transmitting the financial text and the first digital signature to the receiving end;
the receiving end is used for extracting a second text abstract of the financial text from the financial text, carrying out encryption processing on the second text abstract to obtain a second digital signature of the second text abstract, and determining an integrity check result of the financial text according to the first digital signature and the second digital signature.
In a sixth aspect, the present application further provides a computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
extracting a first text abstract of a financial text from the financial text to be transmitted;
encrypting the first text abstract to obtain a first digital signature of the first text abstract;
and sending the financial text and the first digital signature to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature.
In a seventh aspect, the present application also provides another computer device, including a memory storing a computer program and a processor, which when executing the computer program, performs the steps of:
receiving a financial text to be transmitted and a first digital signature of a first text abstract of the financial text, wherein the financial text is sent by a sending end; the first text abstract is extracted from the financial text by the sending end, and the first digital signature is obtained by encrypting the first text abstract by the sending end;
Extracting a second text abstract of the financial text from the financial text;
encrypting the second text abstract to obtain a second digital signature of the second text abstract;
and determining an integrity check result of the financial text according to the first digital signature and the second digital signature.
In an eighth aspect, the present application also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
extracting a first text abstract of a financial text from the financial text to be transmitted;
encrypting the first text abstract to obtain a first digital signature of the first text abstract;
and sending the financial text and the first digital signature to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature.
In a ninth aspect, the present application also provides another computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
receiving a financial text to be transmitted and a first digital signature of a first text abstract of the financial text, wherein the financial text is sent by a sending end; the first text abstract is extracted from the financial text by the sending end, and the first digital signature is obtained by encrypting the first text abstract by the sending end;
extracting a second text abstract of the financial text from the financial text;
encrypting the second text abstract to obtain a second digital signature of the second text abstract;
and determining an integrity check result of the financial text according to the first digital signature and the second digital signature.
In a tenth aspect, the present application also provides a computer program product comprising a computer program which, when executed by a processor, performs the steps of:
extracting a first text abstract of a financial text from the financial text to be transmitted;
encrypting the first text abstract to obtain a first digital signature of the first text abstract;
And sending the financial text and the first digital signature to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature.
In an eleventh aspect, the present application also provides another computer program product comprising a computer program which, when executed by a processor, performs the steps of:
receiving a financial text to be transmitted and a first digital signature of a first text abstract of the financial text, wherein the financial text is sent by a sending end; the first text abstract is extracted from the financial text by the sending end, and the first digital signature is obtained by encrypting the first text abstract by the sending end;
extracting a second text abstract of the financial text from the financial text;
encrypting the second text abstract to obtain a second digital signature of the second text abstract;
and determining an integrity check result of the financial text according to the first digital signature and the second digital signature.
The text integrity checking method, the device, the system, the computer equipment, the storage medium and the computer program product firstly extract a first text abstract of a financial text from the financial text to be transmitted, then encrypt the first text abstract to obtain a first digital signature of the first text abstract, then send the financial text and the first digital signature to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and finally determine the integrity checking result of the financial text according to the first digital signature and the second digital signature. Therefore, when the text integrity check is carried out, the first text abstract is extracted from the financial text to be transmitted, so that the data volume of the financial text can be effectively reduced, the consumption of a large amount of computation resources in the subsequent encryption processing due to the overlarge data volume of the financial text is avoided, the transmission time of the financial text is reduced, the integrity check of the financial text is effectively realized under the condition that the safety of data transmission is ensured, and the transmission efficiency of the data is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the related art, the drawings that are required to be used in the embodiments or the related technical descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to the drawings without inventive effort for a person having ordinary skill in the art.
FIG. 1 is an application environment diagram of a text integrity verification method in one embodiment;
FIG. 2 is a flow chart of a text integrity verification method applied to a sender in one embodiment;
FIG. 3 is a flowchart illustrating steps for extracting a first text excerpt of financial text in one embodiment;
FIG. 4 is a flowchart illustrating a first text summary of a financial document in another embodiment;
FIG. 5 is a flowchart illustrating steps for obtaining a first digital signature of a first text excerpt, in one embodiment;
FIG. 6 is a flowchart illustrating steps for transmitting financial text and a first digital signature to a receiving end according to one embodiment;
FIG. 7 is a flowchart of a text integrity verification method applied to a receiving end in one embodiment;
FIG. 8 is a flowchart illustrating steps for determining an integrity check result for financial text in one embodiment;
fig. 9 is a flowchart of a text integrity verification method applied to a transmitting end in another embodiment;
FIG. 10 is a flow diagram of a method of verifying data integrity based on a text digest in one embodiment;
FIG. 11 is a block diagram of a text integrity verification device in one embodiment;
FIG. 12 is a block diagram of a text integrity check apparatus in another embodiment;
FIG. 13 is an internal block diagram of a computer device in one embodiment;
fig. 14 is an internal structural view of a computer device in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use, and processing of the related data are required to meet the related regulations.
The text integrity checking method provided by the embodiment of the application can be applied to an application environment shown in fig. 1. Wherein the transmitting end 102 communicates with the receiving end 104 through a network. Specifically, referring to fig. 1, the transmitting end 102 extracts a first text abstract of a financial text from the financial text to be transmitted; the sending end 102 encrypts the first text abstract to obtain a first digital signature of the first text abstract; the transmitting end 102 transmits the financial text and the first digital signature to the receiving end 104; the receiving end 104 extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature. The sending end 102 may be a terminal or a server; the receiving end 104 may be a terminal or a server. The terminal may be, but is not limited to, various personal computers, notebook computers, smart phones and tablet computers. The server may be implemented as a stand-alone server or as a server cluster composed of a plurality of servers.
In an exemplary embodiment, as shown in fig. 2, a text integrity checking method is provided, and the method is applied to the transmitting end in fig. 1 for illustration, and includes the following steps:
step S201, a first text abstract of the financial text is extracted from the financial text to be transmitted.
The financial text refers to text related to finance, such as financial news, financial information and the like.
The first text abstract refers to a text abstract extracted from financial texts to be transmitted.
The sending end extracts key information, such as keywords, key sentences and the like, of the financial text from the financial text to be transmitted, and combines the key information to obtain a text abstract of the financial text to be transmitted as a first text abstract of the financial text.
Step S202, encryption processing is carried out on the first text abstract, and a first digital signature of the first text abstract is obtained.
The first digital signature is a digital signature obtained after the first text abstract is encrypted.
Illustratively, the transmitting end performs encryption processing on the first text abstract to obtain encryption information of the first text abstract, and the encryption information is used as a first digital signature of the first text abstract.
Step S203, the financial text and the first digital signature are sent to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature.
The receiving end refers to equipment for receiving the financial text and the first digital signature sent by the sending end.
The second text abstract refers to a text abstract extracted from the received financial text.
The second digital signature is a digital signature obtained after the second text abstract is encrypted.
The integrity check result is used for representing whether the data of the financial text is complete or tampered.
The sending end sends the financial text to be transmitted and the corresponding first digital signature to the receiving end, so that the receiving end extracts key information of the financial text, such as keywords, key sentences and the like, from the received financial text, combines the key information to obtain a text abstract of the financial text, takes the text abstract as a second text abstract of the financial text, encrypts the second text abstract to obtain encrypted information of the second text abstract, takes the encrypted information as a second digital signature of the second text abstract, compares the received first digital signature with the received second digital signature, and takes a verification result obtained by comparison as an integrity verification result of the financial text.
For example, the receiving end confirms that the data of the financial text transmitted to the receiving end is complete under the condition that the first digital signature and the second digital signature are identified to be the same; and in the case that the first digital signature and the second digital signature are recognized to be different, confirming that the data of the financial text transmitted to the receiving end is incomplete.
In the text integrity verification method, a first text abstract of a financial text is extracted from the financial text to be transmitted, encryption processing is carried out on the first text abstract to obtain a first digital signature of the first text abstract, then the financial text and the first digital signature are sent to a receiving end, the receiving end extracts a second text abstract of the financial text from the financial text, encryption processing is carried out on the second text abstract to obtain a second digital signature of the second text abstract, and finally the integrity verification result of the financial text is determined according to the first digital signature and the second digital signature. Therefore, when the text integrity check is carried out, the first text abstract is extracted from the financial text to be transmitted, so that the data volume of the financial text can be effectively reduced, the consumption of a large amount of computation resources in the subsequent encryption processing due to the overlarge data volume of the financial text is avoided, the transmission time of the financial text is reduced, the integrity check of the financial text is effectively realized under the condition that the safety of data transmission is ensured, and the transmission efficiency of the data is further improved.
In an exemplary embodiment, as shown in fig. 3, the step S201 extracts a first text summary of a financial text from the financial text to be transmitted, and specifically includes the following steps:
in step S301, a key financial text is extracted from the financial text to be transmitted.
Step S302, combining the key financial texts to obtain a first text abstract of the financial text.
The key financial text refers to financial text with higher importance extracted from financial text to be transmitted. For example, sub-financial texts (such as key words, key sentences, etc.) with importance degrees greater than a preset importance degree in the financial text are used as key financial texts.
The sending end extracts text feature words of the financial text to be transmitted from the financial text to be transmitted, and screens out text feature words meeting preset conditions from the extracted text feature words to serve as key financial text; for example, the transmitting end determines the importance degree of the text feature words according to the content of the text feature words and the content of the whole financial text; and screening out target text feature words with the corresponding importance degree larger than the preset importance degree from the extracted text feature words, and taking the target text feature words as key financial texts. Then, the sending end combines the key financial texts, and the combined result is used as a first text abstract of the financial text to be transmitted.
In this embodiment, a key financial text is extracted from a financial text to be transmitted, and the key financial text is combined to obtain a first text summary of the financial text. Therefore, by extracting the key financial texts from the financial texts to be transmitted, the important information related to the financial texts can be screened, so that the data volume of the financial text transmission can be reduced under the condition that the important information of the financial texts is not damaged, and the data transmission efficiency is improved.
In an exemplary embodiment, as shown in fig. 4, the step S201 extracts a first text summary of a financial text from the financial text to be transmitted, and specifically includes the following steps:
step S401, inputting the financial text to be transmitted into a plurality of pre-trained text abstract models to obtain a plurality of text abstracts.
Step S402, identifies the data amount of each text excerpt.
Step S403, screening out the text abstract with the minimum corresponding data amount from the text abstracts as the first text abstract of the financial text.
The text summarization model refers to a network model capable of extracting a corresponding text summary from a financial text to be transmitted, such as a text summarization model of TextRank, a text summarization model based on clustering, a text summarization model based on a neural network, and the like. It should be noted that each pre-trained text abstract model correspondingly outputs a text abstract.
The text abstract refers to a combined text of key financial texts extracted from financial texts to be transmitted through a pre-trained text abstract model.
Wherein, the data volume of the text abstract refers to the total number of words in the text abstract.
The transmitting end respectively inputs the financial text to be transmitted into a plurality of pre-trained text abstract models, and correspondingly outputs a plurality of text abstracts through the plurality of text abstract models; identifying the data volume of each text abstract, and sequencing the data volume of each text abstract to obtain the sequenced data volume; and screening the text abstract with the smallest data volume from the text abstracts according to the ordered data volume, and taking the text abstract as the first text abstract of the financial text.
In this embodiment, a plurality of text summaries are obtained by inputting a plurality of pre-trained text summary models into a financial text to be transmitted, the data volume of each text summary is identified, and the text summary with the minimum corresponding data volume is screened out from each text summary to be used as a first text summary of the financial text. Therefore, by identifying the data volume of each text abstract, the data volume of different text abstracts can be compared, and the text abstract with the minimum corresponding data volume is screened out, which is equivalent to selecting the text abstract with the minimum word number total volume, thereby reducing the data volume of financial text transmission and further improving the data transmission efficiency.
In an exemplary embodiment, as shown in fig. 5, step S202, the encrypting process is performed on the first text digest to obtain a first digital signature of the first text digest, which specifically includes the following steps:
step S501, obtain the private key of the sender.
Step S502, according to the private key of the sending end, the first text abstract is encrypted to obtain first encrypted information, and the first encrypted information is used as a first digital signature of the first text abstract.
The private key refers to a key used by the sending end for encrypting the first text abstract. In a practical scenario, the private key refers to an RSA (Rivest-Shamir-Adleman) private key.
The first encryption information is information obtained after encryption processing is performed on the first text abstract.
Illustratively, a sender obtains a private key of the sender from a local database; then, carrying out encryption processing on the first text abstract according to the private key, and taking encryption information obtained by the encryption processing as first encryption information; and finally, the first encryption information is used as a first digital signature of the first text abstract.
In this embodiment, a private key of a transmitting end is obtained, and according to the private key of the transmitting end, the first text abstract is encrypted to obtain first encrypted information, which is used as a first digital signature of the first text abstract. In this way, the digital signature is generated by encrypting the text abstract by using the private key, which is favorable for protecting the data integrity of the first text abstract, thereby enhancing the security of data transmission.
In an exemplary embodiment, as shown in fig. 6, the step S203 sends the financial text and the first digital signature to the receiving end, and specifically includes the following steps:
step S601, obtaining a public key of a transmitting end; the public key matches the private key.
Step S602, the financial text, the first digital signature and the public key of the sending end are sent to the receiving end, so that the receiving end encrypts the second text abstract of the financial text according to the public key of the sending end to obtain second encrypted information, and the second encrypted information is used as the second digital signature of the second text abstract.
The public key refers to a key used by the receiving end for encrypting the second text abstract. In a practical scenario, the public key is referred to as an RSA public key. It should be noted that the transmitting end corresponds to a private key and a public key, and the private key and the public key are matched.
The second encryption information is information obtained after encryption processing is performed on the second text abstract.
Illustratively, the sending end obtains a public key matched with the private key from a local database, and uses the public key as the public key of the sending end, and sends the financial text, the first digital signature and the public key of the sending end to the receiving end; after receiving the financial text, the first digital signature and the public key of the sending end, the receiving end encrypts a second text abstract of the financial text according to the public key of the sending end, takes encrypted information obtained by the encryption process as second encrypted information, and finally takes the second encrypted information as a second digital signature of the second text abstract.
In this embodiment, a public key matched with a private key is obtained, the financial text, the first digital signature and the public key of the transmitting end are transmitted to the receiving end, the receiving end encrypts a second text abstract of the financial text according to the public key of the transmitting end, and second encrypted information obtained after the encryption is used as a second digital signature of the second text abstract. In this way, the public key matched with the private key of the sending end is used for conducting encryption processing on the second text abstract, and second encryption information obtained through encryption processing is used as a second digital signature so as to determine the integrity check result of the financial text later, thereby being beneficial to verifying the integrity of the financial text.
In an exemplary embodiment, as shown in fig. 7, another text integrity checking method is provided, and the method is applied to the receiving end in fig. 1 for illustration, and includes the following steps:
step S701, receiving a financial text to be transmitted and a first digital signature of a first text abstract of the financial text, which are sent by a sending end; the first text abstract is extracted from the financial text by the transmitting end, and the first digital signature is obtained by encrypting the first text abstract by the transmitting end.
Step S702, a second text abstract of the financial text is extracted from the financial text.
In step S703, the second text digest is encrypted to obtain a second digital signature of the second text digest.
Step S704, determining an integrity check result of the financial text according to the first digital signature and the second digital signature.
The sending end extracts a first text abstract of the financial text from the financial text to be transmitted; encrypting the first text abstract to obtain a first digital signature of the first text abstract; and sending the financial text and the first digital signature to a receiving end. The receiving end extracts a second text abstract of the financial text from the received financial text; and carrying out encryption processing on the second text abstract to obtain a second digital signature of the second text abstract, comparing the received first digital signature with the second digital signature, and taking a verification result obtained by comparison as an integrity verification result of the financial text.
It should be noted that, regarding the specific limitation from step S701 to step S704, reference may be made to the related embodiments from step S201 to step S203, which are not described herein.
In this embodiment, a first digital signature of a first text abstract of a financial text and a financial text to be transmitted sent by a sending end are received first; extracting a second text abstract of the financial text from the financial text; then, encrypting the second text abstract to obtain a second digital signature of the second text abstract; and finally, determining an integrity check result of the financial text according to the first digital signature and the second digital signature. In this way, after the receiving end receives the financial text to be transmitted sent by the sending end and the first digital signature of the first text abstract of the financial text, the processing procedure of the sending end on the financial text is repeated to obtain the second digital signature, and then the first digital signature and the second digital signature are compared, so that the integrity check result of the financial text is determined, the financial text is not tampered or damaged in the transmission process, and the integrity check of the financial text is realized. Meanwhile, encryption processing is carried out only on the text abstract of the financial text, so that the data volume of the encryption processing is reduced, and the text integrity checking efficiency is improved. In addition, when the transmitting end transmits the digital signature, only the first digital signature of the first text abstract of the financial text is transmitted, and the digital signature of the whole financial text is not required to be transmitted, so that the transmitted data volume is reduced, and the data transmission efficiency is improved.
In an exemplary embodiment, as shown in fig. 8, the step S704 determines the integrity check result of the financial text according to the first digital signature and the second digital signature, and specifically includes the following steps:
in step S801, the coincidence between the first digital signature and the second digital signature is acquired.
Step S802, under the condition that the contact ratio is the preset contact ratio, determining that the data of the financial text is complete.
Wherein the coincidence degree refers to the degree of similarity between the first digital signature and the second digital signature.
The preset overlap ratio refers to the overlap ratio set in advance. In an actual scene, the preset overlap ratio is 1.
The receiving end obtains the coincidence degree between the first digital signature and the second digital signature, compares the coincidence degree with a preset coincidence degree, and if the coincidence degree is equal to the preset coincidence degree, determines that the first digital signature is identical to the second digital signature, and further confirms that the data of the financial text is complete; if the coincidence degree is not equal to the preset coincidence degree, the first digital signature is determined to be different from the second digital signature, and then incomplete data of the financial text is confirmed.
In this embodiment, the contact ratio between the first digital signature and the second digital signature is obtained, and the data integrity of the financial text is determined under the condition that the contact ratio is the preset contact ratio. Therefore, the integrity check result of the financial text is determined by acquiring the coincidence degree between the first digital signature and the second digital signature, so that the financial text is not tampered or damaged in the transmission process, and the integrity check of the financial text is realized.
In an exemplary embodiment, as shown in fig. 9, there is provided a further text integrity checking method, which is illustrated by taking the application of the method to the transmitting end in fig. 1 as an example, and includes the following steps:
in step S901, a key financial text is extracted from the financial text to be transmitted.
Step S902, combining the key financial texts to obtain a first text abstract of the financial text.
Step S903, obtain the private key of the transmitting end.
Step S904, according to the private key of the sending end, the first text abstract is encrypted to obtain first encrypted information, and the first encrypted information is used as a first digital signature of the first text abstract.
Step S905, obtaining a public key of a transmitting end; the public key matches the private key.
Step S906, the financial text, the first digital signature and the public key of the sending end are sent to the receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, and the second text abstract of the financial text is encrypted according to the public key of the sending end to obtain second encrypted information as a second digital signature of the second text abstract; and determining an integrity check result of the financial text according to the first digital signature and the second digital signature.
In the text integrity verification method, a first text abstract of a financial text is extracted from the financial text to be transmitted, encryption processing is carried out on the first text abstract to obtain a first digital signature of the first text abstract, then the financial text and the first digital signature are sent to a receiving end, the receiving end extracts a second text abstract of the financial text from the financial text, encryption processing is carried out on the second text abstract to obtain a second digital signature of the second text abstract, and finally the integrity verification result of the financial text is determined according to the first digital signature and the second digital signature. Therefore, when the text integrity check is carried out, the first text abstract is extracted from the financial text to be transmitted, so that the data volume of the financial text can be effectively reduced, the consumption of a large amount of computation resources in the subsequent encryption processing due to the overlarge data volume of the financial text is avoided, the transmission time of the financial text is reduced, the integrity check of the financial text is effectively realized under the condition that the safety of data transmission is ensured, and the transmission efficiency of the data is further improved.
In an exemplary embodiment, in order to more clearly clarify the text integrity checking method provided in the embodiments of the present application, a specific embodiment is described below specifically. In an exemplary embodiment, as shown in fig. 10, the present application further provides a method for verifying the integrity of data based on a text digest, where a sender extracts a text digest from text information to be transmitted, encrypts the text digest with an RSA private key to obtain a digital signature, and sends the text information, the digital signature, and an RSA public key corresponding to the RSA private key to a receiver; the receiving party extracts the text abstract from the received text information, encrypts the text abstract by using the received RSA public key to obtain a digital signature, compares the digital signature with the received digital signature, and determines the integrity check result of the text information, thereby avoiding consuming a large amount of computation resources in the encryption process due to the large data volume of the text information to be transmitted, being beneficial to reducing the transmission time of the text information and further improving the transmission efficiency of the data. The method specifically comprises the following steps:
1. And the sender extracts keywords of the original text information to be transmitted, and forms a text abstract according to the text characteristic value of the original text information.
2. And the sender uses an RSA private key to encrypt the text abstract data to form a digital signature of the text abstract.
3. The sender transmits the original text information and the digital signature transmission of the text abstract and the public key to the receiver.
4. And the receiving party extracts keywords from the received original text information, and forms a text abstract through the text characteristic values of the original text.
5. The receiver calculates the digital signature of the text digest using the public key of the sender.
6. The receiving side compares the calculated digital signature with the digital signature sent by the sending side, if the comparison is consistent, the data can be considered complete, and if the comparison is inconsistent, the data can be considered tampered.
According to the embodiment, the sender extracts the keywords of the transmitted original text information, and forms the text abstract according to the text characteristic values of the original text information, so that the data size of the original text information is reduced; the digital signature of the text abstract is formed by encrypting the private key, so that the security of data transmission is guaranteed; after receiving the original text information, the digital signature transmission of the text abstract and the public key sent by the sender, the receiver performs the same processing procedure as the sender, compares the obtained digital signature with the digital signature of the sender, considers that the data transmission is complete if the comparison is consistent, and is not tampered, thereby being beneficial to efficiently realizing the integrity check of the original text information. Because the generated text abstract is the extraction type text abstract, the original text information is compressed in the extraction process, so that the computing resource for encrypting the data by using the RSA private key is greatly reduced. Meanwhile, the time consumed in the transmission process is reduced, and the data transmission efficiency is further improved.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a text integrity checking device for realizing the above related text integrity checking method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of the text integrity checking device or devices provided below may be referred to the limitation of the text integrity checking method hereinabove, and will not be repeated herein.
In an exemplary embodiment, as shown in fig. 11, there is provided a text integrity checking apparatus, including: a first extraction module 1101, a first encryption module 1102, and an information sending module 1103, wherein:
the first extraction module 1101 is configured to extract a first text summary of a financial text from a financial text to be transmitted.
The first encryption module 1102 is configured to encrypt the first text excerpt to obtain a first digital signature of the first text excerpt.
The information sending module 1103 is configured to send the financial text and the first digital signature to the receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature.
In an exemplary embodiment, the first extraction module 1101 is further configured to extract key financial text from the financial text to be transmitted; and combining the key financial texts to obtain a first text abstract of the financial text.
In an exemplary embodiment, the first extraction module 1101 is further configured to input a financial text to be transmitted into a plurality of text summarization models trained in advance, to obtain a plurality of text summaries; identifying the data volume of each text excerpt; and screening out the text abstract with the minimum corresponding data quantity from the text abstracts, and taking the text abstract as a first text abstract of the financial text.
In an exemplary embodiment, the first encryption module 1102 is further configured to obtain a private key of the sender; and carrying out encryption processing on the first text abstract according to the private key of the sending end to obtain first encryption information serving as a first digital signature of the first text abstract.
In an exemplary embodiment, the information sending module 1103 is further configured to obtain a public key of the sending end; the public key is matched with the private key; and sending the financial text, the first digital signature and the public key of the sending end to the receiving end, so that the receiving end encrypts the second text abstract of the financial text according to the public key of the sending end to obtain second encrypted information serving as a second digital signature of the second text abstract.
In one exemplary embodiment, as shown in fig. 12, another text integrity checking apparatus is provided, comprising: an information receiving module 1201, a second extracting module 1202, a second encrypting module 1203, and a result determining module 1204, wherein:
the information receiving module 1201 is configured to receive a financial text to be transmitted sent by the sending end and a first digital signature of a first text abstract of the financial text; the first text abstract is extracted from the financial text by the transmitting end, and the first digital signature is obtained by encrypting the first text abstract by the transmitting end.
A second extraction module 1202 is configured to extract a second text abstract of the financial text from the financial text.
And the second encryption module 1203 is configured to encrypt the second text digest to obtain a second digital signature of the second text digest.
The result determining module 1204 is configured to determine an integrity check result of the financial text according to the first digital signature and the second digital signature.
In an exemplary embodiment, the result determining module 1204 is further configured to obtain a degree of coincidence between the first digital signature and the second digital signature; and under the condition that the contact ratio is the preset contact ratio, determining that the data of the financial text is complete.
The respective modules in the text integrity checking apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one exemplary embodiment, referring to FIG. 1, a text integrity verification system is provided that includes a transmitting end 102 and a receiving end 104;
The sending end 102 is configured to extract a first text abstract of a financial text from a financial text to be transmitted; encrypting the first text abstract to obtain a first digital signature of the first text abstract; transmitting the financial text and the first digital signature to the receiving end 104;
the receiving end 104 is configured to extract a second text abstract of the financial text from the financial text, encrypt the second text abstract to obtain a second digital signature of the second text abstract, and determine an integrity check result of the financial text according to the first digital signature and the second digital signature.
In the text integrity verification system, a first text abstract of a financial text is extracted from the financial text to be transmitted, then the first text abstract is encrypted to obtain a first digital signature of the first text abstract, then the financial text and the first digital signature are sent to a receiving end, the receiving end extracts a second text abstract of the financial text from the financial text, the second text abstract is encrypted to obtain a second digital signature of the second text abstract, and finally the integrity verification result of the financial text is determined according to the first digital signature and the second digital signature. Therefore, when the text integrity check is carried out, the first text abstract is extracted from the financial text to be transmitted, so that the data volume of the financial text can be effectively reduced, the consumption of a large amount of computation resources in the subsequent encryption processing due to the overlarge data volume of the financial text is avoided, the transmission time of the financial text is reduced, the integrity check of the financial text is effectively realized under the condition that the safety of data transmission is ensured, and the transmission efficiency of the data is further improved.
In one exemplary embodiment, a computer device is provided, which may be a server, and the internal structure thereof may be as shown in fig. 13. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing financial text, a first text abstract, a second text abstract, a first digital signature, a second digital signature and the like. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a text integrity checking method.
In an exemplary embodiment, another computer device, which may be a terminal, is provided, and an internal structure diagram thereof may be as shown in fig. 14. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a text integrity checking method. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structures shown in fig. 13 and 14 are block diagrams of only portions of structures associated with the present application and are not intended to limit the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In an exemplary embodiment, a computer device is also provided, comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one exemplary embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method embodiments described above.
In an exemplary embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (13)

1. A method for verifying text integrity, applied to a transmitting end, the method comprising:
extracting a first text abstract of a financial text from the financial text to be transmitted;
encrypting the first text abstract to obtain a first digital signature of the first text abstract;
and sending the financial text and the first digital signature to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature.
2. The method of claim 1, wherein extracting a first text excerpt of the financial text from the financial text to be transmitted comprises:
extracting key financial texts from the financial texts to be transmitted;
and combining the key financial texts to obtain a first text abstract of the financial texts.
3. The method of claim 1, wherein the extracting the first text excerpt of the financial text from the financial text to be transmitted further comprises:
inputting a plurality of pre-trained text abstract models into a financial text to be transmitted to obtain a plurality of text abstracts;
identifying the data volume of each text excerpt;
and screening out the text abstract with the minimum corresponding data quantity from the text abstracts, and taking the text abstract as the first text abstract of the financial text.
4. A method according to any one of claims 1 to 3, wherein said encrypting said first text excerpt to obtain a first digital signature of said first text excerpt comprises:
acquiring a private key of the transmitting end;
and encrypting the first text abstract according to the private key of the sending end to obtain first encryption information serving as a first digital signature of the first text abstract.
5. The method of claim 4, wherein the transmitting the financial text and the first digital signature to a receiving end comprises:
obtaining a public key of the sending end; the public key is matched with the private key;
and sending the financial text, the first digital signature and the public key of the sending end to a receiving end, so that the receiving end encrypts a second text abstract of the financial text according to the public key of the sending end to obtain second encrypted information serving as a second digital signature of the second text abstract.
6. A method for verifying text integrity, applied to a receiving end, the method comprising:
receiving a financial text to be transmitted and a first digital signature of a first text abstract of the financial text, wherein the financial text is sent by a sending end; the first text abstract is extracted from the financial text by the sending end, and the first digital signature is obtained by encrypting the first text abstract by the sending end;
extracting a second text abstract of the financial text from the financial text;
encrypting the second text abstract to obtain a second digital signature of the second text abstract;
And determining an integrity check result of the financial text according to the first digital signature and the second digital signature.
7. The method of claim 6, wherein determining the integrity check result of the financial document based on the first digital signature and the second digital signature comprises:
acquiring the coincidence degree between the first digital signature and the second digital signature;
and under the condition that the contact ratio is the preset contact ratio, determining that the data of the financial text is complete.
8. A text integrity verification device, applied to a transmitting end, comprising:
the first extraction module is used for extracting a first text abstract of the financial text from the financial text to be transmitted;
the first encryption module is used for carrying out encryption processing on the first text abstract to obtain a first digital signature of the first text abstract;
and the information sending module is used for sending the financial text and the first digital signature to a receiving end, so that the receiving end extracts a second text abstract of the financial text from the financial text, encrypts the second text abstract to obtain a second digital signature of the second text abstract, and determines an integrity check result of the financial text according to the first digital signature and the second digital signature.
9. A text integrity verification apparatus for use at a receiving end, the apparatus comprising:
the information receiving module is used for receiving the financial text to be transmitted sent by the sending end and a first digital signature of a first text abstract of the financial text; the first text abstract is extracted from the financial text by the sending end, and the first digital signature is obtained by encrypting the first text abstract by the sending end;
the second extraction module is used for extracting a second text abstract of the financial text from the financial text;
the second encryption module is used for carrying out encryption processing on the second text abstract to obtain a second digital signature of the second text abstract;
and the result determining module is used for determining the integrity check result of the financial text according to the first digital signature and the second digital signature.
10. A text integrity verification system, the system comprising: a transmitting end and a receiving end;
the sending end is used for extracting a first text abstract of the financial text from the financial text to be transmitted; encrypting the first text abstract to obtain a first digital signature of the first text abstract; transmitting the financial text and the first digital signature to the receiving end;
The receiving end is used for extracting a second text abstract of the financial text from the financial text, carrying out encryption processing on the second text abstract to obtain a second digital signature of the second text abstract, and determining an integrity check result of the financial text according to the first digital signature and the second digital signature.
11. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
12. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
13. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
CN202311474890.5A 2023-11-07 2023-11-07 Text integrity verification method, device, system, computer equipment and medium Pending CN117521155A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311474890.5A CN117521155A (en) 2023-11-07 2023-11-07 Text integrity verification method, device, system, computer equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311474890.5A CN117521155A (en) 2023-11-07 2023-11-07 Text integrity verification method, device, system, computer equipment and medium

Publications (1)

Publication Number Publication Date
CN117521155A true CN117521155A (en) 2024-02-06

Family

ID=89741166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311474890.5A Pending CN117521155A (en) 2023-11-07 2023-11-07 Text integrity verification method, device, system, computer equipment and medium

Country Status (1)

Country Link
CN (1) CN117521155A (en)

Similar Documents

Publication Publication Date Title
CN110245469B (en) Webpage watermark generation method, watermark analysis method, device and storage medium
CN115795000A (en) Joint similarity algorithm comparison-based enclosure identification method and device
CN114818000A (en) Privacy protection set confusion intersection method, system and related equipment
CN117390657A (en) Data encryption method, device, computer equipment and storage medium
CN116962021A (en) Method, device, equipment and medium for user real name authentication in financial cooperative institution
CN114553556B (en) Data encryption method, device, computer equipment and storage medium
CN117521155A (en) Text integrity verification method, device, system, computer equipment and medium
CN116186755A (en) Privacy calculating method, device, terminal equipment and storage medium
CN114745178A (en) Identity authentication method, identity authentication device, computer equipment, storage medium and program product
Xu et al. FedG2L: a privacy-preserving federated learning scheme base on “G2L” against poisoning attack
CN117061238A (en) Service request processing method, device, computer equipment and storage medium
CN115174260B (en) Data verification method, device, computer, storage medium and program product
CN117113366A (en) Digital asset management method, apparatus, device, storage medium, and program product
CN117240578A (en) Flow integrity verification method and device, computer equipment and storage medium thereof
CN117149371A (en) Resource borrowing method, resource borrowing device, computer equipment, storage medium and program product
CN116723014A (en) Network attack defense method, device, computer equipment and storage medium
CN115952554A (en) Electronic signature data processing method and device, computer equipment and storage medium
CN117421709A (en) Function service method, device, computer equipment and storage medium of application program
CN117932630A (en) Chip data security interaction method, device, equipment, medium and product
CN117436888A (en) Payment service processing method, device, computer equipment and storage medium
CN117391702A (en) Account data verification method, account data verification device, computer equipment and storage medium
CN117078263A (en) Resource transfer method, device, computer equipment and storage medium
CN117132273A (en) Information transmission method, information transmission device, computer equipment and storage medium
CN116938535A (en) Identification method and device of common equipment and computer equipment
CN116861396A (en) Login method, device, apparatus, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination