Business data inspection method and system based on Hash technology
The invention provides a business data inspection method and system based on a Hash technology, and the method is characterized in that the method comprises the steps: S1, receiving a business handling request, and obtaining first business transaction data in a business handling process; s2, compres...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | JIANG YUBIN LI XIUHAI JIA GUOCHEN NIE JINGSONG |
description | The invention provides a business data inspection method and system based on a Hash technology, and the method is characterized in that the method comprises the steps: S1, receiving a business handling request, and obtaining first business transaction data in a business handling process; s2, compressing and encrypting the first business transaction data by using an MD5 algorithm to obtain first hash data, and independently storing the first hash data; s3, the second business system receives second business data generated during business handling, and the second business data is processed by the third business system to generate third business data; s4, processing the second service data and the third service data through an MD5 algorithm to obtain second hash data and third hash data; s5, judging whether the first hash data, the second hash data and the third hash data are the same or not, if the first hash data, the second hash data and the third hash data are the same, passing the business data inspection, |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN116796373A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN116796373A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN116796373A3</originalsourceid><addsrcrecordid>eNqNyjEOwjAMRuEuDAi4gzkAQxWpFSNEoE5M7JVJfkik1olkM_T2MHAApjd8b93481uzQJUiG1MWrQiWi9AMSyUSSyRd1DDTgxWRvjSwJjKEJGUqr2XbrJ48KXa_bpr99XL3wwG1jNDKAQIb_a1tu_7Yud6d3D_PB3rKMnc</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Business data inspection method and system based on Hash technology</title><source>esp@cenet</source><creator>JIANG YUBIN ; LI XIUHAI ; JIA GUOCHEN ; NIE JINGSONG</creator><creatorcontrib>JIANG YUBIN ; LI XIUHAI ; JIA GUOCHEN ; NIE JINGSONG</creatorcontrib><description>The invention provides a business data inspection method and system based on a Hash technology, and the method is characterized in that the method comprises the steps: S1, receiving a business handling request, and obtaining first business transaction data in a business handling process; s2, compressing and encrypting the first business transaction data by using an MD5 algorithm to obtain first hash data, and independently storing the first hash data; s3, the second business system receives second business data generated during business handling, and the second business data is processed by the third business system to generate third business data; s4, processing the second service data and the third service data through an MD5 algorithm to obtain second hash data and third hash data; s5, judging whether the first hash data, the second hash data and the third hash data are the same or not, if the first hash data, the second hash data and the third hash data are the same, passing the business data inspection,</description><language>chi ; eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230922&DB=EPODOC&CC=CN&NR=116796373A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25569,76552</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20230922&DB=EPODOC&CC=CN&NR=116796373A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>JIANG YUBIN</creatorcontrib><creatorcontrib>LI XIUHAI</creatorcontrib><creatorcontrib>JIA GUOCHEN</creatorcontrib><creatorcontrib>NIE JINGSONG</creatorcontrib><title>Business data inspection method and system based on Hash technology</title><description>The invention provides a business data inspection method and system based on a Hash technology, and the method is characterized in that the method comprises the steps: S1, receiving a business handling request, and obtaining first business transaction data in a business handling process; s2, compressing and encrypting the first business transaction data by using an MD5 algorithm to obtain first hash data, and independently storing the first hash data; s3, the second business system receives second business data generated during business handling, and the second business data is processed by the third business system to generate third business data; s4, processing the second service data and the third service data through an MD5 algorithm to obtain second hash data and third hash data; s5, judging whether the first hash data, the second hash data and the third hash data are the same or not, if the first hash data, the second hash data and the third hash data are the same, passing the business data inspection,</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjEOwjAMRuEuDAi4gzkAQxWpFSNEoE5M7JVJfkik1olkM_T2MHAApjd8b93481uzQJUiG1MWrQiWi9AMSyUSSyRd1DDTgxWRvjSwJjKEJGUqr2XbrJ48KXa_bpr99XL3wwG1jNDKAQIb_a1tu_7Yud6d3D_PB3rKMnc</recordid><startdate>20230922</startdate><enddate>20230922</enddate><creator>JIANG YUBIN</creator><creator>LI XIUHAI</creator><creator>JIA GUOCHEN</creator><creator>NIE JINGSONG</creator><scope>EVB</scope></search><sort><creationdate>20230922</creationdate><title>Business data inspection method and system based on Hash technology</title><author>JIANG YUBIN ; LI XIUHAI ; JIA GUOCHEN ; NIE JINGSONG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN116796373A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>JIANG YUBIN</creatorcontrib><creatorcontrib>LI XIUHAI</creatorcontrib><creatorcontrib>JIA GUOCHEN</creatorcontrib><creatorcontrib>NIE JINGSONG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>JIANG YUBIN</au><au>LI XIUHAI</au><au>JIA GUOCHEN</au><au>NIE JINGSONG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Business data inspection method and system based on Hash technology</title><date>2023-09-22</date><risdate>2023</risdate><abstract>The invention provides a business data inspection method and system based on a Hash technology, and the method is characterized in that the method comprises the steps: S1, receiving a business handling request, and obtaining first business transaction data in a business handling process; s2, compressing and encrypting the first business transaction data by using an MD5 algorithm to obtain first hash data, and independently storing the first hash data; s3, the second business system receives second business data generated during business handling, and the second business data is processed by the third business system to generate third business data; s4, processing the second service data and the third service data through an MD5 algorithm to obtain second hash data and third hash data; s5, judging whether the first hash data, the second hash data and the third hash data are the same or not, if the first hash data, the second hash data and the third hash data are the same, passing the business data inspection,</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN116796373A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Business data inspection method and system based on Hash technology |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T11%3A47%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=JIANG%20YUBIN&rft.date=2023-09-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN116796373A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |