[go: up one dir, main page]

CN114117542B - A method, device, electronic device and storage medium for detecting tampering of a report - Google Patents

A method, device, electronic device and storage medium for detecting tampering of a report Download PDF

Info

Publication number
CN114117542B
CN114117542B CN202111274177.7A CN202111274177A CN114117542B CN 114117542 B CN114117542 B CN 114117542B CN 202111274177 A CN202111274177 A CN 202111274177A CN 114117542 B CN114117542 B CN 114117542B
Authority
CN
China
Prior art keywords
data
modification
modifiable
modified
report
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111274177.7A
Other languages
Chinese (zh)
Other versions
CN114117542A (en
Inventor
李敏
蔡鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Taimei Xingcheng Pharmaceutical Technology Co ltd
Original Assignee
Hangzhou Taimei Xingcheng Pharmaceutical Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Taimei Xingcheng Pharmaceutical Technology Co ltd filed Critical Hangzhou Taimei Xingcheng Pharmaceutical Technology Co ltd
Priority to CN202111274177.7A priority Critical patent/CN114117542B/en
Publication of CN114117542A publication Critical patent/CN114117542A/en
Application granted granted Critical
Publication of CN114117542B publication Critical patent/CN114117542B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present application relates to the field of data inspection, and in particular, to a method and apparatus for inspecting tamper report, an electronic device, and a storage medium. The checking method comprises the steps of obtaining current report data uploaded by a user, obtaining data before modification and data after modification according to the current report data and initial report data in a database, obtaining modification attributes of the data before modification, and generating checking information used for prompting whether the current report is tampered. By comparing the data before modification with the data after modification, the difference data generated by the data due to user modification is obtained, the difference data is judged, when the modified difference data does not meet the modification range, the current report can be judged as illegal tampering, the system reminds the tampered data through the inspection information, so that the probability of report use errors caused by data tampering is reduced, and the reliability and safety of the data in the report are improved.

Description

Tamper-reporting inspection method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of data inspection, and in particular, to a method and apparatus for inspecting tamper report, an electronic device, and a storage medium.
Background
The rapid proliferation of computer technology has prompted the rapid growth of the digital media industry as well as the traditional industry, which has led to an increasing need for content protection for digital media or related products in the traditional industry. While tamper-resistant technology for various digital media is currently relatively mature, no effective tamper-resistant technology has been implemented in medical reporting. The true reliability of the use of medical reports is critical to the patient and healthcare workers and a little bit of negligence may result in loss of property, spirit and even life for the reported user. Therefore, how to effectively detect illegal tampering of the medical report and reduce the use risk of the report for users is a problem which needs to be solved at present.
Disclosure of Invention
In view of the above, the application provides a method, a device, an electronic device and a storage medium for detecting report tampering, which solve or improve the technical problem that the prior art cannot effectively detect illegal tampering of a medical report and reduce the use risk of a user on the report.
According to a first aspect of the present application, there is provided a tamper-reporting inspection method, comprising obtaining current report data uploaded by a user, obtaining pre-modified data and modified data according to the current report data and initial report data in a database, obtaining modification attributes of the pre-modified data, and generating inspection information according to the modification attributes of the pre-modified data, the pre-modified data and the modified data, wherein the inspection information is used for prompting whether the current report is tampered.
In one embodiment, the modification attributes include an unmodified attribute, a partially modifiable attribute, and a globally modifiable attribute.
In an embodiment, the generating verification information according to the modified attribute of the data before modification, the data before modification and the data after modification includes generating tamper prompt information when the modified attribute of the data before modification is an unmodified attribute, where the tamper prompt information is used to prompt that the current report is illegally tampered.
In an embodiment, the generating verification information according to the modified attribute of the data before modification, the data before modification and the data after modification comprises obtaining a modifiable data type of the modifiable data when the modified attribute of the data before modification is a partially modifiable attribute, and generating a tamper prompt for prompting that the current report is tampered when the modified data type is inconsistent with the modifiable data type.
In one embodiment, the tamper-reporting inspection method further comprises the steps of obtaining a first difference value between the data before modification and the data after modification according to the data before modification and the data after modification when the modification attribute of the data before modification is the partial modification attribute and the data type of the data after modification is consistent with the modification data type, obtaining a first modification range of the modification data type, and generating tamper prompt information when the first difference value is not included in the first modification range.
In an embodiment, the generating verification information according to the modified attribute of the data before modification, the data before modification and the data after modification includes obtaining a second difference value between the data before modification and the data after modification according to the data before modification and the data after modification when the modified attribute of the data before modification is the globally modifiable attribute, obtaining a second modifiable range of the data with globally modifiable attribute, and generating tamper prompt information for prompting that the current report is illegally tampered when the second difference value is not included in the second modifiable range.
In an embodiment, the tamper prompt includes highlighting the tamper data.
According to a second aspect of the present application, there is provided a tamper-reporting inspection apparatus, comprising a report acquisition module configured to acquire current report data uploaded by a user, a modified data acquisition module configured to acquire data before modification and data after modification, a modified attribute acquisition module configured to acquire a modified attribute of the data before modification, and an inspection information generation module configured to generate inspection information according to the data before modification, the data after modification, and the modified attribute, the inspection information being configured to prompt whether the current report is tampered.
According to a third aspect of the present application there is provided an electronic device comprising a processor and a memory for storing information executable by the processor, wherein the processor is arranged to perform the method of verifying reporting tampering as described in the above embodiments.
According to a fourth aspect of the present application, there is provided a computer-readable storage medium storing a computer program for executing the tamper-reporting verification method described in the above-described embodiment.
The method for checking report tampering comprises the steps of obtaining current report data uploaded by a user, obtaining data before modification and data after modification according to the current report data and initial report data in a database, obtaining modification attributes of the data before modification, and generating checking information according to the modification attributes of the data before modification, the data before modification and the data after modification, wherein the checking information is used for prompting whether the current report is tampered. By comparing the data before modification with the data after modification, difference data generated by the data due to user modification is obtained, whether the difference data meets the modifiable range of the data or not is judged, when the modified difference data does not meet the modifiable range, the current report can judge that illegal tampering occurs, the system reminds the tampered data through the inspection information, so that the probability of report use errors caused by data tampering is reduced, and the reliability and safety of the data in the report are improved.
Drawings
The above and other objects, features and advantages of the present application will become more apparent by describing embodiments of the present application in more detail with reference to the attached drawings. The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate the application and together with the embodiments of the application, and not constitute a limitation to the application. In the drawings, like reference numerals generally refer to like parts or steps.
Fig. 1 is a flow chart of a tamper-reporting verification method according to an embodiment of the application.
Fig. 2 is a flow chart of a tamper-reporting verification method according to another embodiment of the present application.
Fig. 3 is a schematic flow chart of a tamper checking method capable of partially modifying attribute data in a tamper reporting checking method according to another embodiment of the present application.
Fig. 4 is a flow chart of a tamper checking method capable of globally modifying attribute data in a tamper reporting checking method according to another embodiment of the present application.
Fig. 5 is a schematic structural diagram of a tamper-reporting verification apparatus according to another embodiment of the present application.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the application.
Detailed Description
In the description of the present application, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise. All directional indications (such as up, down, left, right, front, rear, top, bottom) in embodiments of the present application are merely used to explain the relative positional relationship, movement, etc. between the components in a particular pose (as shown in the drawings), and if the particular pose changes, the directional indication changes accordingly. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Furthermore, references herein to "an embodiment" mean that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is a schematic flow chart of a tamper-reporting verification method according to the present application. As shown in fig. 1, the tamper-reporting verification method specifically includes the following steps:
Step 100, obtaining current report data uploaded by a user.
The current report data is data in a medical report uploaded by a user, and the medical report generally comprises a Word file format or an Excel file format, and the Excel file format is taken as an example for description, and the report file defaults to the Excel format and is not repeated.
Step 200, according to the current report data and the initial report data in the database, acquiring the data before modification and the data after modification.
The initial report data is original report data in the system, and usually, a user downloads and uses the report in the system, but in the using process, the condition of actively modifying or mistakenly modifying the report sometimes occurs, so that the original report data downloaded by the user exists in the system, and is called initial report data. The data before modification is the data in the initial report, and the data after modification is the report data which is obtained by modifying the original data after the user uses the original data and uploading the original data to the system again. The data before modification and the data after modification are respectively obtained, and the precondition of comparing the two data and judging whether tampering occurs or not is adopted.
Step 300, obtaining the modification attribute of the data before modification.
The modification attributes are pre-defined attributes of the system for all data in the report, defining whether such data can be modified, the scope of the modification, the type of data that can be modified, and the like. And acquiring the modification attribute of the data before modification, namely comparing and judging the data before modification and the data after modification, and judging whether the data is tampered or not.
Step 400, generating checking information according to the modification attribute of the data before modification, the data before modification and the data after modification, wherein the checking information is used for prompting whether the current report is tampered.
Comparing the data before modification with the data after modification to obtain difference data before and after modification of the data, simultaneously comparing the difference data with the modification attribute of the data again, judging whether the modification made to the data meets the definition of the modification attribute, if the modification is reasonable, the report is not tampered, and if the modification is unreasonable, the report is tampered. The inspection information is the result of the system judged according to the modified difference data of the data, is used for reminding the tampered data, reduces the use risk caused by the fact that the tampered data is still used, and effectively improves the authenticity and the safety of the report data.
The method for checking report tampering comprises the steps of obtaining current report data uploaded by a user, obtaining data before modification and data after modification according to the current report data and initial report data in a database, obtaining modification attributes of the data before modification, and generating checking information according to the modification attributes of the data before modification, the data before modification and the data after modification, wherein the checking information is used for prompting whether the current report is tampered. By comparing the data before modification with the data after modification, difference data generated by the data due to user modification is obtained, whether the difference data meets the modifiable range of the data or not is judged, when the modified difference data does not meet the modifiable range, the current report can judge that illegal tampering occurs, the system reminds the tampered data through the inspection information, so that the probability of report use errors caused by data tampering is reduced, and the reliability and safety of the data in the report are improved.
In one possible implementation, the modification properties of the data before modification in the report may be defined as non-modifiable properties, partially modifiable properties, and globally modifiable properties, respectively. The non-modifiable attribute indicates that the data is fixed data and is not modifiable, when the data is determined to be modified, the current report is illegally tampered, the partially modifiable attribute indicates that the data is partially modified and is partially modified, when the fixed data part of the data is modified, the current report is tampered, when the modifiable data of the data is modified, whether the modification is in a modifiable range is further determined, if the modification is not in the modifiable range, the current report is tampered, and the globally modifiable attribute indicates that all the contents of the data can be modified, but still whether the data has a modifiable range is determined, if the modification range is provided, when the modification difference data of the data is not satisfied, the current report is tampered. The definition of the corresponding modification attribute of the data ensures that the system has a judgment basis when judging the difference data generated after the data modification, and the tampered judgment process is more accurate and rapid.
Specifically, fig. 2 is a schematic flow chart of a tamper-reporting verification method according to another embodiment of the present application. As shown in fig. 2, based on the modified attribute definition of the data, step 400 of this tamper-reporting verification method may further include the steps of:
and 410, when the modified attribute of the data before modification is an unmodified attribute, generating tamper prompt information, wherein the tamper prompt information is used for prompting that the current report is illegally tampered.
The falsification prompting information is one of the inspection information, and is used for prompting the illegally falsified data of the current report after judging that the current report is illegally falsified so as to remind a report user, reduce the influence of falsified data on the report use and improve the reliability of the report data. When the modification attribute of the data before modification is an unmodified attribute, the data is indicated to be fixed data, and once the data is modified, illegal tampering of the current report is judged.
Optionally, fig. 3 is a schematic flow chart of a tamper checking method capable of partially modifying attribute data in a tamper reporting checking method according to another embodiment of the present application. As shown in fig. 3, step 400 may further include the steps of:
step 420, when the modification attribute of the data before modification is a partially modifiable attribute, obtaining a modifiable data type of the partially modifiable data.
The data of the partly modifiable attribute is partly modifiable and partly non-modifiable, such as the data is constituted by letters and numbers, wherein the number part can be correspondingly modified according to the use scenario and the letter part is non-modifiable. Therefore, when the modification attribute of the data before modification is a partial modification attribute, the modifiable data type of the data before modification is acquired first, so as to determine whether the modified data accords with the modifiable data type compared with the modified part of the data before modification.
Step 421, when the modified data type is inconsistent with the modifiable data type, generating a tamper prompt, wherein the tamper prompt is used for prompting that the current report is tampered.
The modified data type is inconsistent with the modifiable data type, which indicates that the modification is an error modification, and if the user modifies the letter portion, as illustrated in step 420, the modification is an error modification, i.e. tampering, and the modification may cause the current report to be unusable or misused, so that a tampering prompt needs to be generated to prompt the user that the current report is tampered, thereby reducing the loss caused by the report being unusable or misused.
In one possible implementation, as shown in fig. 3, based on steps 420 to 421, when the modification attribute of the data before modification is a partially modifiable attribute and the modified data type is consistent with the modifiable data type, step 400 further includes the steps of:
step 422, obtaining a first difference value between the data before modification and the data after modification according to the data before modification and the data after modification.
Since the above steps have already judged the data type of the data after being modified, it is further necessary to judge whether the modification scope of the modification is reasonable or not later, if the modification scope exceeds the modifiable scope, the modification is still illegal tampering. And comparing the data before modification with the data after modification to obtain a first difference value before and after modification of the data, so as to judge whether the first difference value meets the modifiable range.
Step 423, obtaining a first modifiable range of modifiable data types.
The first modifiable range is a modifiable range of data of a modifiable data type of the data currently being modified, if the digital part of the data is modifiable and the modifiable range is 5-10, then it is required to determine whether the first difference is greater than 5 and less than 10.
Step 424, generating tamper prompt information when the first difference is not included in the first modifiable range.
When the first difference value is not in the first modifiable range, the fact that the modification exceeds the reasonable modification range is indicated, the fact that the current report is tampered can be judged, meanwhile, a tamper prompt is made for a tampered part, and loss caused by using an error report is reduced.
Specifically, fig. 4 is a flow chart of a tamper checking method capable of globally modifying attribute data in a tamper-reporting checking method according to another embodiment of the present application. As shown in fig. 4, step 400 may further include the following steps.
Step 430, when the modification attribute of the data before modification is the global modification attribute, obtaining a second difference value between the data before modification and the data after modification according to the data before modification and the data after modification.
Although the data with the globally modifiable attribute can be modified without classifying the data, a certain modifiable range is generally provided, so when the data with the globally modifiable attribute is modified beyond the modifiable range, the data is still unreasonable to be modified, which causes the problem of influencing the subsequent use of the report. It is therefore necessary to obtain the difference between the data before modification and the data after modification, which is different from the above-mentioned partially modifiable data, and is called the second difference.
Step 431, obtaining a second modifiable scope of the globally modifiable attribute data.
The second modifiable range is a modifiable range of the globally modifiable attribute data, and when the second difference value is within the second modifiable range, the modification is indicated as reasonable modification, and when the second difference value is not within the second modifiable range, the modification is indicated as illegal tampering.
And 432, when the second difference value is not included in the second modifiable range, generating tamper prompt information, wherein the tamper prompt information is used for prompting that the current report is illegally tampered.
When the second difference is not included in the second modifiable range, it is indicated that the modified data exceeds the allowable modification range compared with the modification made by the data before modification, and the modification can cause subsequent unusable or incorrect use of the current report, so that tamper prompt is required for the modification, and loss caused by subsequent use of the report is reduced.
Optionally, the tamper prompt information may be reflected by highlighting the illegal tamper data, so that the user can clearly and intuitively see the tampered content, thereby performing corresponding correction, and reducing the loss of the tamper report to subsequent use.
Furthermore, the application provides a tamper-reporting verification device.
Fig. 5 is a schematic structural diagram of a tamper-reporting verification apparatus according to another embodiment of the present application. As shown in fig. 5, such a tamper-reporting inspection apparatus includes a report acquisition module, a modification data acquisition module, a modification attribute acquisition module, and an inspection information generation module. The system comprises a report acquisition module, a modification data acquisition module, a modification attribute acquisition module and a test information generation module, wherein the report acquisition module is used for acquiring current report data uploaded by a user, the modification data acquisition module is used for acquiring data before modification and data after modification, the modification attribute acquisition module is used for acquiring modification attributes of the data before modification, and the test information generation module is used for generating test information according to the data before modification, the data after modification and the modification attributes, and the test information is used for prompting whether the current report is tampered or not.
The report tampering checking device comprises a report acquisition module, a modified data acquisition module, a modified attribute acquisition module and a checking information generation module, so that the report tampering checking device can acquire current report data uploaded by a user, acquire data before modification and data after modification according to the current report data and initial report data in a database, acquire the modified attribute of the data before modification, generate checking information according to the modified attribute of the data before modification, the data before modification and the data after modification, and the checking information is used for prompting whether the current report is tampered or not. By comparing the data before modification with the data after modification, the difference of the data generated by user modification is obtained, whether the difference meets the modifiable range of the data is judged, when the modification difference does not meet the modifiable range, the current report can judge that illegal tampering occurs, the system can remind the tampered data of checking information, so that the probability of report use errors caused by data tampering is reduced, and the reliability and safety of the data in the report are improved.
Next, an electronic device according to an embodiment of the present application is described with reference to fig. 6. Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the application.
As shown in fig. 6, the electronic device 600 includes one or more processors 601 and memory 602.
The processor 601 may be a Central Processing Unit (CPU) or other form of processing unit having data processing and/or information execution capabilities and may control other components in the electronic device 600 to perform desired functions.
The memory 601 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM) and/or cache memory (cache), and the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, and the like. One or more computer program information may be stored on the computer readable storage medium, which may be executed by the processor 601 to implement the tamper-reporting verification method or other desired functions of the various embodiments of the present application described above.
In one example, the electronic device 600 may also include an input device 603 and an output device 604, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
The input device 603 may include, for example, a keyboard, a mouse, and the like.
The output device 604 can output various information to the outside. The output means 604 may comprise, for example, a display, a communication network, a remote output device to which it is connected, and so forth.
Of course, only some of the components of the electronic device 600 that are relevant to the present application are shown in fig. 6 for simplicity, components such as buses, input/output interfaces, etc. are omitted. In addition, the electronic device 600 may include any other suitable components depending on the particular application.
In addition to the methods and apparatus described above, embodiments of the application may also be a computer program product comprising computer program information which, when executed by a processor, causes the processor to perform the steps in a method of verifying reporting tampering according to various embodiments of the application described in this specification.
The computer program product may write program code for performing operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium, on which computer program information is stored, which computer program information, when being executed by a processor, causes the processor to perform the steps in the method of verifying reporting tampering according to various embodiments of the present application.
The computer readable storage medium may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may include, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of a readable storage medium include an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The basic principles of the present application have been described above in connection with specific embodiments, but it should be noted that the advantages, benefits, effects, etc. mentioned in the present application are merely examples and not intended to be limiting, and these advantages, benefits, effects, etc. are not to be construed as necessarily possessed by the various embodiments of the application. Furthermore, the specific details disclosed herein are for purposes of illustration and understanding only, and are not intended to be limiting, as the application is not necessarily limited to practice with the above described specific details.
The block diagrams of the devices, apparatuses, devices, systems referred to in the present application are only illustrative examples and are not intended to require or imply that the connections, arrangements, configurations must be made in the manner shown in the block diagrams. As will be appreciated by one of skill in the art, the devices, apparatuses, devices, systems may be connected, arranged, configured in any manner. Words such as "including," "comprising," "having," and the like are words of openness and mean "including but not limited to," and are used interchangeably therewith. The terms "or" and "as used herein refer to and are used interchangeably with the term" and/or "unless the context clearly indicates otherwise. The term "such as" as used herein refers to, and is used interchangeably with, the phrase "such as, but not limited to.
It is also noted that in the apparatus, devices and methods of the present application, the components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered as equivalent aspects of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features herein.
The above embodiments are merely preferred embodiments of the present application and are not intended to limit the present application, and any modifications, equivalents, etc. within the spirit and principles of the present application should be included in the scope of the present application.

Claims (7)

1.一种报告篡改的检验方法,其特征在于,包括:1. A method for verifying report tampering, comprising: 获取用户上传的当前报告数据;Get the current report data uploaded by the user; 根据所述当前报告数据以及数据库内的初始报告数据,获取被修改前的数据以及被修改后的数据;According to the current report data and the initial report data in the database, obtaining the data before being modified and the data after being modified; 获取所述被修改前的数据的修改属性;Obtaining modification attributes of the data before modification; 根据所述被修改前的数据的所述修改属性、所述被修改前的数据以及所述被修改后的数据,生成检验信息,所述检验信息用于提示当前报告是否被篡改;Generate verification information according to the modification attribute of the data before being modified, the data before being modified, and the data after being modified, wherein the verification information is used to indicate whether the current report has been tampered with; 所述修改属性包括:不可修改属性、可部分修改属性以及可全局修改属性;The modifiable attributes include: non-modifiable attributes, partially modifiable attributes, and globally modifiable attributes; 所述根据所述被修改前的数据的所述修改属性、所述被修改前的数据以及所述被修改后的数据,生成检验信息,包括:The generating of verification information according to the modification attribute of the data before being modified, the data before being modified, and the data after being modified includes: 当所述被修改前的数据的所述修改属性为所述可部分修改属性时,获取可部分修改数据的可修改数据类型;When the modification attribute of the data before modification is the partially modifiable attribute, obtaining the modifiable data type of the partially modifiable data; 当所述被修改后的数据的数据类型与所述可修改数据类型不一致时,生成篡改提示信息,所述篡改提示信息用于提示所述当前报告被篡改;When the data type of the modified data is inconsistent with the modifiable data type, generating tampering prompt information, wherein the tampering prompt information is used to prompt that the current report has been tampered with; 所述检验方法还包括:当所述被修改前的数据的所述修改属性为所述可部分修改属性、所述被修改后的数据的数据类型与所述可修改数据类型一致时,The verification method further comprises: when the modification attribute of the data before being modified is the partially modifiable attribute and the data type of the data after being modified is consistent with the modifiable data type, 根据所述被修改前的数据以及所述被修改后的数据,获取所述被修改前的数据与所述被修改后的数据的第一差值;According to the data before being modified and the data after being modified, obtaining a first difference between the data before being modified and the data after being modified; 获取所述可修改数据类型的第一可修改范围;Obtain a first modifiable range of the modifiable data type; 当所述第一差值不包含于所述第一可修改范围时,生成篡改提示信息。When the first difference is not included in the first modifiable range, tampering prompt information is generated. 2.根据权利要求1所述的报告篡改的检验方法,其特征在于,所述根据所述被修改前的数据的所述修改属性、所述被修改前的数据以及所述被修改后的数据,生成检验信息,包括:2. The method for verifying report tampering according to claim 1, characterized in that the generating of verification information according to the modification attribute of the data before modification, the data before modification and the data after modification comprises: 当所述被修改前的数据的所述修改属性为所述不可修改属性时,生成篡改提示信息,所述篡改提示信息用于提示所述当前报告被非法篡改。When the modification attribute of the data before modification is the unmodifiable attribute, tampering prompt information is generated, and the tampering prompt information is used to prompt that the current report has been illegally tampered with. 3.根据权利要求1所述的报告篡改的检验方法,其特征在于,所述根据所述被修改前的数据的所述修改属性、所述被修改前的数据以及所述被修改后的数据,生成检验信息,包括:3. The method for verifying report tampering according to claim 1, wherein generating verification information according to the modification attribute of the data before modification, the data before modification, and the data after modification comprises: 当所述被修改前的数据的所述修改属性为所述可全局修改属性时,When the modification attribute of the data before modification is the globally modifiable attribute, 根据所述被修改前的数据以及所述被修改后的数据,获取所述被修改前的数据与所述被修改后的数据的第二差值;According to the data before being modified and the data after being modified, obtaining a second difference between the data before being modified and the data after being modified; 获取可全局修改属性数据的第二可修改范围;Get a second modifiable scope of globally modifiable attribute data; 当所述第二差值不包含于所述第二可修改范围时,生成篡改提示信息,所述篡改提示信息用于提示所述当前报告被非法篡改。When the second difference is not included in the second modifiable range, tampering prompt information is generated, where the tampering prompt information is used to prompt that the current report has been illegally tampered with. 4.根据权利要求1所述的报告篡改的检验方法,其特征在于,所述篡改提示信息包括将篡改数据进行高亮显示。4 . The method for verifying report tampering according to claim 1 , wherein the tampering prompt information includes highlighting the tampered data. 5.一种报告篡改的检验装置,其特征在于,包括:5. A tamper reporting inspection device, comprising: 报告获取模块,用于获取用户上传的当前报告数据;Report acquisition module, used to obtain the current report data uploaded by the user; 修改数据获取模块,用于获取被修改前的数据以及被修改后的数据;Modify the data acquisition module, used to obtain the data before and after the modification; 修改属性获取模块,用于获取所述被修改前的数据的修改属性;A modification attribute acquisition module, used to acquire the modification attribute of the data before modification; 检验信息生成模块,用于根据所述被修改前的数据、所述被修改后的数据以及所述修改属性生成检验信息,所述检验信息用于提示当前报告是否被篡改;A verification information generating module, used for generating verification information according to the data before being modified, the data after being modified and the modification attribute, wherein the verification information is used for indicating whether the current report has been tampered with; 其中,所述修改属性包括:不可修改属性、可部分修改属性以及可全局修改属性;The modifiable attributes include: non-modifiable attributes, partially modifiable attributes, and globally modifiable attributes; 所述根据所述被修改前的数据的所述修改属性、所述被修改前的数据以及所述被修改后的数据,生成检验信息,包括:The generating of verification information according to the modification attribute of the data before being modified, the data before being modified, and the data after being modified includes: 当所述被修改前的数据的所述修改属性为所述可部分修改属性时,获取可部分修改数据的可修改数据类型;When the modification attribute of the data before modification is the partially modifiable attribute, obtaining the modifiable data type of the partially modifiable data; 当所述被修改后的数据的数据类型与所述可修改数据类型不一致时,生成篡改提示信息,所述篡改提示信息用于提示所述当前报告被篡改;When the data type of the modified data is inconsistent with the modifiable data type, generating tampering prompt information, wherein the tampering prompt information is used to prompt that the current report has been tampered with; 检验信息生成模块还用于当所述被修改前的数据的所述修改属性为所述可部分修改属性、所述被修改后的数据的数据类型与所述可修改数据类型一致时,The verification information generating module is further configured to, when the modification attribute of the data before modification is the partially modifiable attribute and the data type of the data after modification is consistent with the modifiable data type, 根据所述被修改前的数据以及所述被修改后的数据,获取所述被修改前的数据与所述被修改后的数据的第一差值;According to the data before being modified and the data after being modified, obtaining a first difference between the data before being modified and the data after being modified; 获取所述可修改数据类型的第一可修改范围;Obtain a first modifiable range of the modifiable data type; 当所述第一差值不包含于所述第一可修改范围时,生成篡改提示信息。When the first difference is not included in the first modifiable range, tampering prompt information is generated. 6.一种电子设备,其特征在于,所述电子设备包括:6. An electronic device, characterized in that the electronic device comprises: 处理器;以及Processor; and 用于存储所述处理器可执行信息的存储器;a memory for storing information executable by the processor; 其中,所述处理器用于执行上述权利要求1-4任一项所述的报告篡改的检验方法。Wherein, the processor is used to execute the report tampering verification method described in any one of claims 1-4 above. 7.一种计算机可读存储介质,其特征在于,所述存储介质存储有计算机程序,所述计算机程序用于执行上述权利要求1-4任一项所述的报告篡改的检验方法。7. A computer-readable storage medium, characterized in that the storage medium stores a computer program, and the computer program is used to execute the report tampering verification method described in any one of claims 1 to 4.
CN202111274177.7A 2021-10-29 2021-10-29 A method, device, electronic device and storage medium for detecting tampering of a report Active CN114117542B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111274177.7A CN114117542B (en) 2021-10-29 2021-10-29 A method, device, electronic device and storage medium for detecting tampering of a report

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111274177.7A CN114117542B (en) 2021-10-29 2021-10-29 A method, device, electronic device and storage medium for detecting tampering of a report

Publications (2)

Publication Number Publication Date
CN114117542A CN114117542A (en) 2022-03-01
CN114117542B true CN114117542B (en) 2025-06-06

Family

ID=80379637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111274177.7A Active CN114117542B (en) 2021-10-29 2021-10-29 A method, device, electronic device and storage medium for detecting tampering of a report

Country Status (1)

Country Link
CN (1) CN114117542B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108520185A (en) * 2018-04-16 2018-09-11 深信服科技股份有限公司 Detect method, apparatus, equipment and the computer readable storage medium of webpage tamper

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101788977A (en) * 2010-02-02 2010-07-28 深圳市蓝韵实业有限公司 Method for implementing editing and modifying of medical examination report
KR101944010B1 (en) * 2012-02-24 2019-01-30 삼성전자 주식회사 Method and apparatus for detecting tampered application
US9798294B2 (en) * 2012-09-18 2017-10-24 Nxp B.V. System, method and computer program product for detecting tampering in a product
CN103177219A (en) * 2013-03-29 2013-06-26 太原理工大学 Medical biochemical detection report critical data tamper-proofing method
CN106933888B (en) * 2015-12-31 2020-07-17 北京城市网邻信息技术有限公司 Database configuration management system
CN108768931A (en) * 2018-04-09 2018-11-06 卓望数码技术(深圳)有限公司 A kind of multimedia file tampering detection System and method for
CN111159775A (en) * 2019-12-11 2020-05-15 中移(杭州)信息技术有限公司 Web page tampering detection method, system, device and computer-readable storage medium
CN111222180A (en) * 2020-02-27 2020-06-02 山东浪潮通软信息科技有限公司 Method, system, device and medium for judging whether accounting document is tampered
CN112532589A (en) * 2020-11-06 2021-03-19 北京冠程科技有限公司 Webpage monitoring method and device and storage medium
CN113076566B (en) * 2021-04-26 2024-02-27 深圳市三旺通信股份有限公司 Display content detection method, apparatus, computer program product, and storage medium
CN113297628A (en) * 2021-05-26 2021-08-24 杭州安恒信息技术股份有限公司 Modification behavior auditing method, device, equipment and readable storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108520185A (en) * 2018-04-16 2018-09-11 深信服科技股份有限公司 Detect method, apparatus, equipment and the computer readable storage medium of webpage tamper

Also Published As

Publication number Publication date
CN114117542A (en) 2022-03-01

Similar Documents

Publication Publication Date Title
US9134976B1 (en) Cross-format analysis of software systems
WO2019019628A1 (en) Test method, apparatus, test device and medium for mobile application
CN110929267A (en) Code vulnerability detection method, device, device and storage medium
CN108255702A (en) A kind of test case creation method, apparatus, equipment and storage medium
EP3443460B1 (en) Method, apparatus, and computer-readable medium for performing functional testing of software
CN111159016A (en) Standard detection method and device
CN112328612A (en) Field consistency verification test data generation method, system, device and medium
CN109800152A (en) A kind of automated testing method and terminal device
US20150143342A1 (en) Functional validation of software
CN113722215A (en) Method, system, device and storage medium for detecting software code risk
CN108875317A (en) Software clone detection method and device, detection device and storage medium
US7814334B2 (en) Method and apparatus for changing and adding activation keys for functions of digital content without having to change and recompile the digital content
CN114117542B (en) A method, device, electronic device and storage medium for detecting tampering of a report
CN112242177A (en) Memory testing method and device, computer readable storage medium and electronic equipment
CN115129746A (en) SQL (structured query language) examination and analysis method, server and SQL examination and analysis system
CN111915000B (en) A method and device for adjusting a network model for medical images
US10803219B1 (en) Method and system for combined formal static analysis of a design code
CN120179529B (en) Rust imperfect encapsulation detection method and device based on large language model
CN114386368B (en) Processing method and processing device for packaging specification item data
US9524307B2 (en) Asynchronous error checking in structured documents
CN114880225B (en) A command testing method, computing device and storage medium
CN113836541B (en) Dependency relationship-based software security inspection method, device, equipment and medium
CN113672490B (en) Function definition identification method, device and equipment
CN120066512A (en) Code detection method, device, equipment and storage medium
KR101862614B1 (en) Apparatus for validating program effectiveness and computer readable recording medium to member deterioration

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant