Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for checking and verifying data files

A technology of data files and verification methods, which is applied in the field of information security, can solve problems such as frequency and information data security cannot be effectively guaranteed, and achieve the effect of intelligent filtering

Active Publication Date: 2018-11-23
BEIJING TOPWALK INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the ensuing network intrusions and network attacks are becoming more and more frequent, and the security of information and data in network interaction cannot be effectively guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for checking and verifying data files
  • System and method for checking and verifying data files
  • System and method for checking and verifying data files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0034] figure 1 A structural block diagram of a system 100 for auditing and verifying data files according to an exemplary embodiment of the present invention is shown. Such as figure 1 As shown, the audit verification system 100 for data files may include a sending device 110 and a receiving device 120 , which can effectively detect whether a data file has been tampered with during transmission from the sending device 110 to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data file auditing and checking system. The system comprises a sending device and a receiving device, wherein the sending device is suitable for generating a hash value according to the content of a data file, generating a serial number uniquely associated with the data file, generating a dynamic verification code according to the hash value and the serial number, writing the hash value, the serial number and the dynamic verification code into the data file, and sending the data file to the receiving device; and the receiving device is suitable for receiving the data file comprising the hash value, the serial number and the dynamic verification code, verifying the hash value and the dynamic verification code, and if both the hash value and the dynamic verification code are verified successfully, confirming that the content of the data file is not tampered and deleting the hash value, the serial number and the dynamic verification code. The invention furthermore discloses a data file auditing and checking method.

Description

technical field [0001] The invention relates to the field of information security, in particular to a system and method for checking and verifying data files. Background technique [0002] With the vigorous development of industry informatization, e-commerce, etc., especially the continuous development of networked e-government, most enterprise organizations and government departments at all levels have established internal transaction networks and application systems, and exchange data between each other. The need for interaction is increasingly urgent and frequent. However, the ensuing network intrusions and network attacks are becoming more and more frequent, and the security of information and data in the interaction between networks cannot be effectively guaranteed. Among them, how to ensure the transmission security in data interaction, especially the encryption and verification of data has attracted widespread attention. [0003] Therefore, it is necessary to provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/606G06F21/64G06F2221/2107G06F2221/2133
Inventor 李志鹏王洪波令狐永兴
Owner BEIJING TOPWALK INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products