Tamper-proof text processing method and device and computer equipment

The invention provides a tamper-proof text processing method and device and computer equipment, and belongs to the technical field of computers. The method comprises the following steps: generating a shadow data model and a random custom tag for encrypted data to be processed; binding the shadow dat...

Full description

Saved in:
Bibliographic Details
Main Authors HAO CHANGZHENG, HOU JINMING, CHEN YE
Format Patent
LanguageChinese
English
Published 23.09.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention provides a tamper-proof text processing method and device and computer equipment, and belongs to the technical field of computers. The method comprises the following steps: generating a shadow data model and a random custom tag for encrypted data to be processed; binding the shadow data model with the custom tag to obtain a binding model; generating an actual data structure of the to-be-processed data; inserting the actual data structure into the shadow data model according to the custom label of the to-be-processed data to obtain a new binding model, and displaying a text of the to-be-processed data included in the new binding model; and determining whether the to-be-processed data is tampered according to the data change information of the new binding model, deleting the new binding model when the to-be-processed data is tampered, and re-executing the steps to re-display the text of the to-be-processed data. According to the method and the device, the effects of improving the tamper-proof capa
Bibliography:Application Number: CN202211037253