Tamper-proof text processing method and device and computer equipment
The invention provides a tamper-proof text processing method and device and computer equipment, and belongs to the technical field of computers. The method comprises the following steps: generating a shadow data model and a random custom tag for encrypted data to be processed; binding the shadow dat...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
23.09.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention provides a tamper-proof text processing method and device and computer equipment, and belongs to the technical field of computers. The method comprises the following steps: generating a shadow data model and a random custom tag for encrypted data to be processed; binding the shadow data model with the custom tag to obtain a binding model; generating an actual data structure of the to-be-processed data; inserting the actual data structure into the shadow data model according to the custom label of the to-be-processed data to obtain a new binding model, and displaying a text of the to-be-processed data included in the new binding model; and determining whether the to-be-processed data is tampered according to the data change information of the new binding model, deleting the new binding model when the to-be-processed data is tampered, and re-executing the steps to re-display the text of the to-be-processed data. According to the method and the device, the effects of improving the tamper-proof capa |
---|---|
Bibliography: | Application Number: CN202211037253 |