CN114117542B - A method, device, electronic device and storage medium for detecting tampering of a report - Google Patents
A method, device, electronic device and storage medium for detecting tampering of a report Download PDFInfo
- Publication number
- CN114117542B CN114117542B CN202111274177.7A CN202111274177A CN114117542B CN 114117542 B CN114117542 B CN 114117542B CN 202111274177 A CN202111274177 A CN 202111274177A CN 114117542 B CN114117542 B CN 114117542B
- Authority
- CN
- China
- Prior art keywords
- data
- modification
- modifiable
- modified
- report
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present application relates to the field of data inspection, and in particular, to a method and apparatus for inspecting tamper report, an electronic device, and a storage medium. The checking method comprises the steps of obtaining current report data uploaded by a user, obtaining data before modification and data after modification according to the current report data and initial report data in a database, obtaining modification attributes of the data before modification, and generating checking information used for prompting whether the current report is tampered. By comparing the data before modification with the data after modification, the difference data generated by the data due to user modification is obtained, the difference data is judged, when the modified difference data does not meet the modification range, the current report can be judged as illegal tampering, the system reminds the tampered data through the inspection information, so that the probability of report use errors caused by data tampering is reduced, and the reliability and safety of the data in the report are improved.
Description
Technical Field
The present application relates to the field of data inspection, and in particular, to a method and apparatus for inspecting tamper report, an electronic device, and a storage medium.
Background
The rapid proliferation of computer technology has prompted the rapid growth of the digital media industry as well as the traditional industry, which has led to an increasing need for content protection for digital media or related products in the traditional industry. While tamper-resistant technology for various digital media is currently relatively mature, no effective tamper-resistant technology has been implemented in medical reporting. The true reliability of the use of medical reports is critical to the patient and healthcare workers and a little bit of negligence may result in loss of property, spirit and even life for the reported user. Therefore, how to effectively detect illegal tampering of the medical report and reduce the use risk of the report for users is a problem which needs to be solved at present.
Disclosure of Invention
In view of the above, the application provides a method, a device, an electronic device and a storage medium for detecting report tampering, which solve or improve the technical problem that the prior art cannot effectively detect illegal tampering of a medical report and reduce the use risk of a user on the report.
According to a first aspect of the present application, there is provided a tamper-reporting inspection method, comprising obtaining current report data uploaded by a user, obtaining pre-modified data and modified data according to the current report data and initial report data in a database, obtaining modification attributes of the pre-modified data, and generating inspection information according to the modification attributes of the pre-modified data, the pre-modified data and the modified data, wherein the inspection information is used for prompting whether the current report is tampered.
In one embodiment, the modification attributes include an unmodified attribute, a partially modifiable attribute, and a globally modifiable attribute.
In an embodiment, the generating verification information according to the modified attribute of the data before modification, the data before modification and the data after modification includes generating tamper prompt information when the modified attribute of the data before modification is an unmodified attribute, where the tamper prompt information is used to prompt that the current report is illegally tampered.
In an embodiment, the generating verification information according to the modified attribute of the data before modification, the data before modification and the data after modification comprises obtaining a modifiable data type of the modifiable data when the modified attribute of the data before modification is a partially modifiable attribute, and generating a tamper prompt for prompting that the current report is tampered when the modified data type is inconsistent with the modifiable data type.
In one embodiment, the tamper-reporting inspection method further comprises the steps of obtaining a first difference value between the data before modification and the data after modification according to the data before modification and the data after modification when the modification attribute of the data before modification is the partial modification attribute and the data type of the data after modification is consistent with the modification data type, obtaining a first modification range of the modification data type, and generating tamper prompt information when the first difference value is not included in the first modification range.
In an embodiment, the generating verification information according to the modified attribute of the data before modification, the data before modification and the data after modification includes obtaining a second difference value between the data before modification and the data after modification according to the data before modification and the data after modification when the modified attribute of the data before modification is the globally modifiable attribute, obtaining a second modifiable range of the data with globally modifiable attribute, and generating tamper prompt information for prompting that the current report is illegally tampered when the second difference value is not included in the second modifiable range.
In an embodiment, the tamper prompt includes highlighting the tamper data.
According to a second aspect of the present application, there is provided a tamper-reporting inspection apparatus, comprising a report acquisition module configured to acquire current report data uploaded by a user, a modified data acquisition module configured to acquire data before modification and data after modification, a modified attribute acquisition module configured to acquire a modified attribute of the data before modification, and an inspection information generation module configured to generate inspection information according to the data before modification, the data after modification, and the modified attribute, the inspection information being configured to prompt whether the current report is tampered.
According to a third aspect of the present application there is provided an electronic device comprising a processor and a memory for storing information executable by the processor, wherein the processor is arranged to perform the method of verifying reporting tampering as described in the above embodiments.
According to a fourth aspect of the present application, there is provided a computer-readable storage medium storing a computer program for executing the tamper-reporting verification method described in the above-described embodiment.
The method for checking report tampering comprises the steps of obtaining current report data uploaded by a user, obtaining data before modification and data after modification according to the current report data and initial report data in a database, obtaining modification attributes of the data before modification, and generating checking information according to the modification attributes of the data before modification, the data before modification and the data after modification, wherein the checking information is used for prompting whether the current report is tampered. By comparing the data before modification with the data after modification, difference data generated by the data due to user modification is obtained, whether the difference data meets the modifiable range of the data or not is judged, when the modified difference data does not meet the modifiable range, the current report can judge that illegal tampering occurs, the system reminds the tampered data through the inspection information, so that the probability of report use errors caused by data tampering is reduced, and the reliability and safety of the data in the report are improved.
Drawings
The above and other objects, features and advantages of the present application will become more apparent by describing embodiments of the present application in more detail with reference to the attached drawings. The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate the application and together with the embodiments of the application, and not constitute a limitation to the application. In the drawings, like reference numerals generally refer to like parts or steps.
Fig. 1 is a flow chart of a tamper-reporting verification method according to an embodiment of the application.
Fig. 2 is a flow chart of a tamper-reporting verification method according to another embodiment of the present application.
Fig. 3 is a schematic flow chart of a tamper checking method capable of partially modifying attribute data in a tamper reporting checking method according to another embodiment of the present application.
Fig. 4 is a flow chart of a tamper checking method capable of globally modifying attribute data in a tamper reporting checking method according to another embodiment of the present application.
Fig. 5 is a schematic structural diagram of a tamper-reporting verification apparatus according to another embodiment of the present application.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the application.
Detailed Description
In the description of the present application, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise. All directional indications (such as up, down, left, right, front, rear, top, bottom) in embodiments of the present application are merely used to explain the relative positional relationship, movement, etc. between the components in a particular pose (as shown in the drawings), and if the particular pose changes, the directional indication changes accordingly. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Furthermore, references herein to "an embodiment" mean that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is a schematic flow chart of a tamper-reporting verification method according to the present application. As shown in fig. 1, the tamper-reporting verification method specifically includes the following steps:
Step 100, obtaining current report data uploaded by a user.
The current report data is data in a medical report uploaded by a user, and the medical report generally comprises a Word file format or an Excel file format, and the Excel file format is taken as an example for description, and the report file defaults to the Excel format and is not repeated.
Step 200, according to the current report data and the initial report data in the database, acquiring the data before modification and the data after modification.
The initial report data is original report data in the system, and usually, a user downloads and uses the report in the system, but in the using process, the condition of actively modifying or mistakenly modifying the report sometimes occurs, so that the original report data downloaded by the user exists in the system, and is called initial report data. The data before modification is the data in the initial report, and the data after modification is the report data which is obtained by modifying the original data after the user uses the original data and uploading the original data to the system again. The data before modification and the data after modification are respectively obtained, and the precondition of comparing the two data and judging whether tampering occurs or not is adopted.
Step 300, obtaining the modification attribute of the data before modification.
The modification attributes are pre-defined attributes of the system for all data in the report, defining whether such data can be modified, the scope of the modification, the type of data that can be modified, and the like. And acquiring the modification attribute of the data before modification, namely comparing and judging the data before modification and the data after modification, and judging whether the data is tampered or not.
Step 400, generating checking information according to the modification attribute of the data before modification, the data before modification and the data after modification, wherein the checking information is used for prompting whether the current report is tampered.
Comparing the data before modification with the data after modification to obtain difference data before and after modification of the data, simultaneously comparing the difference data with the modification attribute of the data again, judging whether the modification made to the data meets the definition of the modification attribute, if the modification is reasonable, the report is not tampered, and if the modification is unreasonable, the report is tampered. The inspection information is the result of the system judged according to the modified difference data of the data, is used for reminding the tampered data, reduces the use risk caused by the fact that the tampered data is still used, and effectively improves the authenticity and the safety of the report data.
The method for checking report tampering comprises the steps of obtaining current report data uploaded by a user, obtaining data before modification and data after modification according to the current report data and initial report data in a database, obtaining modification attributes of the data before modification, and generating checking information according to the modification attributes of the data before modification, the data before modification and the data after modification, wherein the checking information is used for prompting whether the current report is tampered. By comparing the data before modification with the data after modification, difference data generated by the data due to user modification is obtained, whether the difference data meets the modifiable range of the data or not is judged, when the modified difference data does not meet the modifiable range, the current report can judge that illegal tampering occurs, the system reminds the tampered data through the inspection information, so that the probability of report use errors caused by data tampering is reduced, and the reliability and safety of the data in the report are improved.
In one possible implementation, the modification properties of the data before modification in the report may be defined as non-modifiable properties, partially modifiable properties, and globally modifiable properties, respectively. The non-modifiable attribute indicates that the data is fixed data and is not modifiable, when the data is determined to be modified, the current report is illegally tampered, the partially modifiable attribute indicates that the data is partially modified and is partially modified, when the fixed data part of the data is modified, the current report is tampered, when the modifiable data of the data is modified, whether the modification is in a modifiable range is further determined, if the modification is not in the modifiable range, the current report is tampered, and the globally modifiable attribute indicates that all the contents of the data can be modified, but still whether the data has a modifiable range is determined, if the modification range is provided, when the modification difference data of the data is not satisfied, the current report is tampered. The definition of the corresponding modification attribute of the data ensures that the system has a judgment basis when judging the difference data generated after the data modification, and the tampered judgment process is more accurate and rapid.
Specifically, fig. 2 is a schematic flow chart of a tamper-reporting verification method according to another embodiment of the present application. As shown in fig. 2, based on the modified attribute definition of the data, step 400 of this tamper-reporting verification method may further include the steps of:
and 410, when the modified attribute of the data before modification is an unmodified attribute, generating tamper prompt information, wherein the tamper prompt information is used for prompting that the current report is illegally tampered.
The falsification prompting information is one of the inspection information, and is used for prompting the illegally falsified data of the current report after judging that the current report is illegally falsified so as to remind a report user, reduce the influence of falsified data on the report use and improve the reliability of the report data. When the modification attribute of the data before modification is an unmodified attribute, the data is indicated to be fixed data, and once the data is modified, illegal tampering of the current report is judged.
Optionally, fig. 3 is a schematic flow chart of a tamper checking method capable of partially modifying attribute data in a tamper reporting checking method according to another embodiment of the present application. As shown in fig. 3, step 400 may further include the steps of:
step 420, when the modification attribute of the data before modification is a partially modifiable attribute, obtaining a modifiable data type of the partially modifiable data.
The data of the partly modifiable attribute is partly modifiable and partly non-modifiable, such as the data is constituted by letters and numbers, wherein the number part can be correspondingly modified according to the use scenario and the letter part is non-modifiable. Therefore, when the modification attribute of the data before modification is a partial modification attribute, the modifiable data type of the data before modification is acquired first, so as to determine whether the modified data accords with the modifiable data type compared with the modified part of the data before modification.
Step 421, when the modified data type is inconsistent with the modifiable data type, generating a tamper prompt, wherein the tamper prompt is used for prompting that the current report is tampered.
The modified data type is inconsistent with the modifiable data type, which indicates that the modification is an error modification, and if the user modifies the letter portion, as illustrated in step 420, the modification is an error modification, i.e. tampering, and the modification may cause the current report to be unusable or misused, so that a tampering prompt needs to be generated to prompt the user that the current report is tampered, thereby reducing the loss caused by the report being unusable or misused.
In one possible implementation, as shown in fig. 3, based on steps 420 to 421, when the modification attribute of the data before modification is a partially modifiable attribute and the modified data type is consistent with the modifiable data type, step 400 further includes the steps of:
step 422, obtaining a first difference value between the data before modification and the data after modification according to the data before modification and the data after modification.
Since the above steps have already judged the data type of the data after being modified, it is further necessary to judge whether the modification scope of the modification is reasonable or not later, if the modification scope exceeds the modifiable scope, the modification is still illegal tampering. And comparing the data before modification with the data after modification to obtain a first difference value before and after modification of the data, so as to judge whether the first difference value meets the modifiable range.
Step 423, obtaining a first modifiable range of modifiable data types.
The first modifiable range is a modifiable range of data of a modifiable data type of the data currently being modified, if the digital part of the data is modifiable and the modifiable range is 5-10, then it is required to determine whether the first difference is greater than 5 and less than 10.
Step 424, generating tamper prompt information when the first difference is not included in the first modifiable range.
When the first difference value is not in the first modifiable range, the fact that the modification exceeds the reasonable modification range is indicated, the fact that the current report is tampered can be judged, meanwhile, a tamper prompt is made for a tampered part, and loss caused by using an error report is reduced.
Specifically, fig. 4 is a flow chart of a tamper checking method capable of globally modifying attribute data in a tamper-reporting checking method according to another embodiment of the present application. As shown in fig. 4, step 400 may further include the following steps.
Step 430, when the modification attribute of the data before modification is the global modification attribute, obtaining a second difference value between the data before modification and the data after modification according to the data before modification and the data after modification.
Although the data with the globally modifiable attribute can be modified without classifying the data, a certain modifiable range is generally provided, so when the data with the globally modifiable attribute is modified beyond the modifiable range, the data is still unreasonable to be modified, which causes the problem of influencing the subsequent use of the report. It is therefore necessary to obtain the difference between the data before modification and the data after modification, which is different from the above-mentioned partially modifiable data, and is called the second difference.
Step 431, obtaining a second modifiable scope of the globally modifiable attribute data.
The second modifiable range is a modifiable range of the globally modifiable attribute data, and when the second difference value is within the second modifiable range, the modification is indicated as reasonable modification, and when the second difference value is not within the second modifiable range, the modification is indicated as illegal tampering.
And 432, when the second difference value is not included in the second modifiable range, generating tamper prompt information, wherein the tamper prompt information is used for prompting that the current report is illegally tampered.
When the second difference is not included in the second modifiable range, it is indicated that the modified data exceeds the allowable modification range compared with the modification made by the data before modification, and the modification can cause subsequent unusable or incorrect use of the current report, so that tamper prompt is required for the modification, and loss caused by subsequent use of the report is reduced.
Optionally, the tamper prompt information may be reflected by highlighting the illegal tamper data, so that the user can clearly and intuitively see the tampered content, thereby performing corresponding correction, and reducing the loss of the tamper report to subsequent use.
Furthermore, the application provides a tamper-reporting verification device.
Fig. 5 is a schematic structural diagram of a tamper-reporting verification apparatus according to another embodiment of the present application. As shown in fig. 5, such a tamper-reporting inspection apparatus includes a report acquisition module, a modification data acquisition module, a modification attribute acquisition module, and an inspection information generation module. The system comprises a report acquisition module, a modification data acquisition module, a modification attribute acquisition module and a test information generation module, wherein the report acquisition module is used for acquiring current report data uploaded by a user, the modification data acquisition module is used for acquiring data before modification and data after modification, the modification attribute acquisition module is used for acquiring modification attributes of the data before modification, and the test information generation module is used for generating test information according to the data before modification, the data after modification and the modification attributes, and the test information is used for prompting whether the current report is tampered or not.
The report tampering checking device comprises a report acquisition module, a modified data acquisition module, a modified attribute acquisition module and a checking information generation module, so that the report tampering checking device can acquire current report data uploaded by a user, acquire data before modification and data after modification according to the current report data and initial report data in a database, acquire the modified attribute of the data before modification, generate checking information according to the modified attribute of the data before modification, the data before modification and the data after modification, and the checking information is used for prompting whether the current report is tampered or not. By comparing the data before modification with the data after modification, the difference of the data generated by user modification is obtained, whether the difference meets the modifiable range of the data is judged, when the modification difference does not meet the modifiable range, the current report can judge that illegal tampering occurs, the system can remind the tampered data of checking information, so that the probability of report use errors caused by data tampering is reduced, and the reliability and safety of the data in the report are improved.
Next, an electronic device according to an embodiment of the present application is described with reference to fig. 6. Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the application.
As shown in fig. 6, the electronic device 600 includes one or more processors 601 and memory 602.
The processor 601 may be a Central Processing Unit (CPU) or other form of processing unit having data processing and/or information execution capabilities and may control other components in the electronic device 600 to perform desired functions.
The memory 601 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM) and/or cache memory (cache), and the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, and the like. One or more computer program information may be stored on the computer readable storage medium, which may be executed by the processor 601 to implement the tamper-reporting verification method or other desired functions of the various embodiments of the present application described above.
In one example, the electronic device 600 may also include an input device 603 and an output device 604, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
The input device 603 may include, for example, a keyboard, a mouse, and the like.
The output device 604 can output various information to the outside. The output means 604 may comprise, for example, a display, a communication network, a remote output device to which it is connected, and so forth.
Of course, only some of the components of the electronic device 600 that are relevant to the present application are shown in fig. 6 for simplicity, components such as buses, input/output interfaces, etc. are omitted. In addition, the electronic device 600 may include any other suitable components depending on the particular application.
In addition to the methods and apparatus described above, embodiments of the application may also be a computer program product comprising computer program information which, when executed by a processor, causes the processor to perform the steps in a method of verifying reporting tampering according to various embodiments of the application described in this specification.
The computer program product may write program code for performing operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium, on which computer program information is stored, which computer program information, when being executed by a processor, causes the processor to perform the steps in the method of verifying reporting tampering according to various embodiments of the present application.
The computer readable storage medium may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may include, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of a readable storage medium include an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The basic principles of the present application have been described above in connection with specific embodiments, but it should be noted that the advantages, benefits, effects, etc. mentioned in the present application are merely examples and not intended to be limiting, and these advantages, benefits, effects, etc. are not to be construed as necessarily possessed by the various embodiments of the application. Furthermore, the specific details disclosed herein are for purposes of illustration and understanding only, and are not intended to be limiting, as the application is not necessarily limited to practice with the above described specific details.
The block diagrams of the devices, apparatuses, devices, systems referred to in the present application are only illustrative examples and are not intended to require or imply that the connections, arrangements, configurations must be made in the manner shown in the block diagrams. As will be appreciated by one of skill in the art, the devices, apparatuses, devices, systems may be connected, arranged, configured in any manner. Words such as "including," "comprising," "having," and the like are words of openness and mean "including but not limited to," and are used interchangeably therewith. The terms "or" and "as used herein refer to and are used interchangeably with the term" and/or "unless the context clearly indicates otherwise. The term "such as" as used herein refers to, and is used interchangeably with, the phrase "such as, but not limited to.
It is also noted that in the apparatus, devices and methods of the present application, the components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered as equivalent aspects of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features herein.
The above embodiments are merely preferred embodiments of the present application and are not intended to limit the present application, and any modifications, equivalents, etc. within the spirit and principles of the present application should be included in the scope of the present application.
Claims (7)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111274177.7A CN114117542B (en) | 2021-10-29 | 2021-10-29 | A method, device, electronic device and storage medium for detecting tampering of a report |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111274177.7A CN114117542B (en) | 2021-10-29 | 2021-10-29 | A method, device, electronic device and storage medium for detecting tampering of a report |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN114117542A CN114117542A (en) | 2022-03-01 |
| CN114117542B true CN114117542B (en) | 2025-06-06 |
Family
ID=80379637
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111274177.7A Active CN114117542B (en) | 2021-10-29 | 2021-10-29 | A method, device, electronic device and storage medium for detecting tampering of a report |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN114117542B (en) |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108520185A (en) * | 2018-04-16 | 2018-09-11 | 深信服科技股份有限公司 | Detect method, apparatus, equipment and the computer readable storage medium of webpage tamper |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101788977A (en) * | 2010-02-02 | 2010-07-28 | 深圳市蓝韵实业有限公司 | Method for implementing editing and modifying of medical examination report |
| KR101944010B1 (en) * | 2012-02-24 | 2019-01-30 | 삼성전자 주식회사 | Method and apparatus for detecting tampered application |
| US9798294B2 (en) * | 2012-09-18 | 2017-10-24 | Nxp B.V. | System, method and computer program product for detecting tampering in a product |
| CN103177219A (en) * | 2013-03-29 | 2013-06-26 | 太原理工大学 | Medical biochemical detection report critical data tamper-proofing method |
| CN106933888B (en) * | 2015-12-31 | 2020-07-17 | 北京城市网邻信息技术有限公司 | Database configuration management system |
| CN108768931A (en) * | 2018-04-09 | 2018-11-06 | 卓望数码技术(深圳)有限公司 | A kind of multimedia file tampering detection System and method for |
| CN111159775A (en) * | 2019-12-11 | 2020-05-15 | 中移(杭州)信息技术有限公司 | Web page tampering detection method, system, device and computer-readable storage medium |
| CN111222180A (en) * | 2020-02-27 | 2020-06-02 | 山东浪潮通软信息科技有限公司 | Method, system, device and medium for judging whether accounting document is tampered |
| CN112532589A (en) * | 2020-11-06 | 2021-03-19 | 北京冠程科技有限公司 | Webpage monitoring method and device and storage medium |
| CN113076566B (en) * | 2021-04-26 | 2024-02-27 | 深圳市三旺通信股份有限公司 | Display content detection method, apparatus, computer program product, and storage medium |
| CN113297628A (en) * | 2021-05-26 | 2021-08-24 | 杭州安恒信息技术股份有限公司 | Modification behavior auditing method, device, equipment and readable storage medium |
-
2021
- 2021-10-29 CN CN202111274177.7A patent/CN114117542B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108520185A (en) * | 2018-04-16 | 2018-09-11 | 深信服科技股份有限公司 | Detect method, apparatus, equipment and the computer readable storage medium of webpage tamper |
Also Published As
| Publication number | Publication date |
|---|---|
| CN114117542A (en) | 2022-03-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9134976B1 (en) | Cross-format analysis of software systems | |
| WO2019019628A1 (en) | Test method, apparatus, test device and medium for mobile application | |
| CN110929267A (en) | Code vulnerability detection method, device, device and storage medium | |
| CN108255702A (en) | A kind of test case creation method, apparatus, equipment and storage medium | |
| EP3443460B1 (en) | Method, apparatus, and computer-readable medium for performing functional testing of software | |
| CN111159016A (en) | Standard detection method and device | |
| CN112328612A (en) | Field consistency verification test data generation method, system, device and medium | |
| CN109800152A (en) | A kind of automated testing method and terminal device | |
| US20150143342A1 (en) | Functional validation of software | |
| CN113722215A (en) | Method, system, device and storage medium for detecting software code risk | |
| CN108875317A (en) | Software clone detection method and device, detection device and storage medium | |
| US7814334B2 (en) | Method and apparatus for changing and adding activation keys for functions of digital content without having to change and recompile the digital content | |
| CN114117542B (en) | A method, device, electronic device and storage medium for detecting tampering of a report | |
| CN112242177A (en) | Memory testing method and device, computer readable storage medium and electronic equipment | |
| CN115129746A (en) | SQL (structured query language) examination and analysis method, server and SQL examination and analysis system | |
| CN111915000B (en) | A method and device for adjusting a network model for medical images | |
| US10803219B1 (en) | Method and system for combined formal static analysis of a design code | |
| CN120179529B (en) | Rust imperfect encapsulation detection method and device based on large language model | |
| CN114386368B (en) | Processing method and processing device for packaging specification item data | |
| US9524307B2 (en) | Asynchronous error checking in structured documents | |
| CN114880225B (en) | A command testing method, computing device and storage medium | |
| CN113836541B (en) | Dependency relationship-based software security inspection method, device, equipment and medium | |
| CN113672490B (en) | Function definition identification method, device and equipment | |
| CN120066512A (en) | Code detection method, device, equipment and storage medium | |
| KR101862614B1 (en) | Apparatus for validating program effectiveness and computer readable recording medium to member deterioration |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |