CN103841156A - File download protection method, device, and system based on an end-to-end protocol - Google Patents

File download protection method, device, and system based on an end-to-end protocol Download PDF

Info

Publication number
CN103841156A
CN103841156A CN201210486971.2A CN201210486971A CN103841156A CN 103841156 A CN103841156 A CN 103841156A CN 201210486971 A CN201210486971 A CN 201210486971A CN 103841156 A CN103841156 A CN 103841156A
Authority
CN
China
Prior art keywords
file
hash value
downloaded
value
download request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210486971.2A
Other languages
Chinese (zh)
Inventor
刘健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201210486971.2A priority Critical patent/CN103841156A/en
Publication of CN103841156A publication Critical patent/CN103841156A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention discloses a file download protection method, device, and system based on an end-to-end protocol. The method comprises the following steps that: one and only identity value of a to-be-downloaded file corresponding to an end-to-end download request is obtained; the one and only identity value is used to query a file status corresponding to the one and only identity value; and the file status identifies whether the to-be-downloaded file is safe. According to the above scheme, since the one and only identity value of the to-be-downloaded file corresponding to the end-to-end download request is obtained, and then the one and only identity value is used to query the file status corresponding to the one and only identity value, the safety of the to-be-downloaded file before the file is downloaded is determined, so that the file pre-download protection based on the P2P protocol is realized, the download time is saved for the user, and the cyber source is saved.

Description

File based on end-to-end protocol is downloaded guard method, a device, and system
Technical field
The present invention relates to communication technical field, particularly a kind of file based on end-to-end protocol is downloaded guard method, device, and system.
Background technology
Constantly universal along with the Internet, user by Network Capture with share all kinds of resources and information and become very general.Meanwhile, wooden horse, the virus document of all kinds of malice are also able to wide-scale distribution by the Internet, and the safe condition of the Internet allows of no optimist.Therefore, the security protection of download file becomes network security technology field one of the research direction of core the most.
Existing security protection instrument adopts following two class methods conventionally for the download protection of file:
Method one, client-based file detects after downloading.Traditional antivirus software major part is adopted in this way, the method is specially: file is downloaded to as user to local and preservation from network side after, antivirus software scans the content of file, analyze it and whether contain malice feature, if there is malice feature, determine that it is so malicious file, then can point out user to delete.Because antivirus software need to do a large amount of the matching analysis to the content of file, therefore its detection speed is conventionally slower, and testing process can take great amount of hardware resources, causes subscriber equipment to process request response to other of user slack-off, affect user's experience.
Method two, the file based on high in the clouds detects after downloading.Computer house keeper's file is downloaded protection system and has been adopted this mode; the method is specially: after file has been downloaded; system calculates the MD5(Message-Digest Algorithm 5 of file according to file content; message digest algorithm 5) value sends to high in the clouds wooden horse cloud and looks into server; inquire about its safe condition, blackly if point out user to delete.Because all detection logics all complete beyond the clouds, phase ratio method one, method two need to not carry out the matching analysis in subscriber equipment this locality, and therefore speed is faster, in the time that network condition is good, almost can complete file security moment and detect, the local resource taking is also less.
Along with the development of network technology, the mode that traditional service end is downloaded this one-to-many of client is difficult to meet the demand of the concurrent download of a large number of users gradually, therefore adopts P2P(Peer to Peer, end-to-end) downloading mode of agreement starts popular gradually.Adopt after P2P technology, user also constantly uploads existing file fragment in downloading, and by the co-operating mode of user, has avoided the central access for minority server, has also increased stability and the reliability downloaded.For example: for comparatively conventional a kind of P2P agreement BT(Bit Torrent, bit stream) agreement, first user need to download a seed file (conventionally at tens KB), in seed file, describe the metamessage of index server address and file to be downloaded in detail, comprise the SHA-1(Security HashAlgorithrn of file name, file block information and each file block, SHA) value etc.Support the software of BT agreement to start to download by resolving after seed file content finds object download address.Therefrom can see, seed file itself is normally containing malicious code content, but true download file corresponding to seed file may be malice trojan horse.
At present the file based on P2P agreement is downloaded protection employing method one and method two, need to be at uncertain file content download file be safe in the situation that, if what download is malicious file, wastes a large amount of user's download times and wasted Internet resources.
Summary of the invention
The embodiment of the present invention provides a kind of file based on end-to-end protocol to download guard method, device, and system, downloads front protection for the file of realizing based on P2P agreement, saves user's download time and saves Internet resources.
File based on end-to-end protocol is downloaded a guard method, comprising:
Obtain the unique identification value of the to be downloaded file corresponding with end-to-end download request;
Use the above-mentioned unique identification value inquiry file status corresponding with above-mentioned unique identification value; Above-mentioned file status has identified whether safety of above-mentioned file to be downloaded.
File based on end-to-end protocol is downloaded a guard method, comprising:
Receive the file hash value of the to be downloaded file corresponding with the algorithm title of end-to-end download request and download request;
According to above-mentioned hashing algorithm title, above-mentioned file hash value is converted to normative document hashed value, and uses the above-mentioned normative document hashed value inquiry file status corresponding with above-mentioned normative document hashed value; Above-mentioned file status has identified whether safety of above-mentioned file to be downloaded;
Above-mentioned file status is returned to the equipment that sends above-mentioned file hash value.
File based on end-to-end protocol is downloaded a protective device, comprising:
Mark acquiring unit, for obtaining the unique identification value of the to be downloaded file corresponding with end-to-end download request;
Query unit, for being used the above-mentioned unique identification value inquiry file status corresponding with above-mentioned unique identification value; Above-mentioned file status has identified whether safety of above-mentioned file to be downloaded.
A kind of database server, comprising:
Data receiver unit, for receiving the file hash value of the to be downloaded file corresponding with the algorithm title of end-to-end download request and download request;
Converting unit, for being converted to normative document hashed value according to above-mentioned hashing algorithm title by above-mentioned file hash value;
Data base querying unit, for using the above-mentioned normative document hashed value inquiry file status corresponding with above-mentioned normative document hashed value; Above-mentioned file status has identified whether safety of above-mentioned file to be downloaded;
Result transmitting element, for returning to above-mentioned file status the equipment that sends above-mentioned file hash value.
File based on end-to-end protocol is downloaded a protection system, comprising:
The device that the embodiment of the present invention provides and database server.
As can be seen from the above technical solutions, the embodiment of the present invention has the following advantages: by obtaining the unique identification value of the to be downloaded file corresponding with end-to-end download request; Then use the above-mentioned unique identification value inquiry file status corresponding with above-mentioned unique identification value; Can before file is downloaded, just determine the fail safe of file to be downloaded, thereby the file of realizing based on P2P agreement is downloaded front protection, save user's download time and save Internet resources.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing of required use during embodiment is described is briefly introduced, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is embodiment of the present invention method flow schematic diagram;
Fig. 2 is embodiment of the present invention other method schematic flow sheet;
Fig. 3 is the structural representation of embodiment of the present invention scheme framework;
Fig. 4 is embodiment of the present invention other method schematic flow sheet;
Fig. 5 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 6 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 7 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 8 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 9 is embodiment of the present invention apparatus structure schematic diagram;
Figure 10 is embodiment of the present invention database server structural representation;
Figure 11 is embodiment of the present invention database server structural representation;
Figure 12 is embodiment of the present invention system configuration schematic diagram.
Embodiment
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, the present invention is described in further detail, and obviously, described embodiment is only a part of embodiment of the present invention, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making all other embodiment that obtain under creative work prerequisite, belong to the scope of protection of the invention.
The embodiment of the present invention provides a kind of file based on end-to-end protocol to download guard method, as shown in Figure 1, comprising:
101: the unique identification value of obtaining the to be downloaded file corresponding with end-to-end download request;
The carrier of above-mentioned end-to-end download request may have a variety of, and for example, seed file during BT downloads is exactly a widely used example, will not limit for the carrier embodiment of the present invention of the download request under P2P agreement.In the end-to-end download request based on P2P agreement, generally can comprise multiple file fragmentations to be downloaded, so above-mentioned unique identification value can be the sequence of a unique identification value, and each sequence fragment identifies respectively a file fragmentation.
Alternatively, above-mentioned unique identification value is file hash value, and this step can also comprise so: the hashing algorithm title of obtaining above-mentioned end-to-end request; What those skilled in the art were known is, above-mentioned unique identification value is for identification document, the varied file hash value that is not limited in of its adoptable algorithm and form, therefore above file hash value should not be construed as the restriction to the embodiment of the present invention as a preferred version.The use of obtaining hashing algorithm title is to be described in detail the unique identification value of the various hashing algorithms that may occur under compatible P2P agreement to this in subsequent embodiment.
The executor of above-mentioned 101 steps can be transmission forwarding unit or the client device in network, the above-mentioned unique identification value of obtaining the to be downloaded file corresponding with end-to-end download request; The hashing algorithm title of obtaining above-mentioned end-to-end request comprises: from end-to-end download request, extract the file hash value of to be downloaded file and the hashing algorithm title of above-mentioned end-to-end request corresponding with above-mentioned end-to-end download request.
Further, if the executor of above-mentioned steps 101 is the transmission equipments in network, extract the file hash value of to be downloaded file corresponding with above-mentioned end-to-end download request and the hashing algorithm title of above-mentioned end-to-end request from end-to-end download request before, can also comprise so: intercept user's end-to-end download request, resolve above-mentioned end-to-end download request.
102: use the above-mentioned unique identification value inquiry file status corresponding with above-mentioned unique identification value; Above-mentioned file status has identified whether safety of above-mentioned file to be downloaded.
Above embodiment, by obtaining the unique identification value of the to be downloaded file corresponding with end-to-end download request; Then use the above-mentioned unique identification value inquiry file status corresponding with above-mentioned unique identification value; Can before file is downloaded, just determine the fail safe of file to be downloaded, thereby the file of realizing based on P2P agreement is downloaded front protection, save user's download time and save Internet resources.
Alternatively, if obtained file hash value and hashing algorithm title in step 101, in this step, use so the above-mentioned unique identification value inquiry file status corresponding with above-mentioned unique identification value to comprise: according to above-mentioned hashing algorithm title and the file hash value inquiry file status corresponding with above-mentioned file hash value.In the present embodiment, will be described in more detail in the implementation of database server one side according to the specific implementation of above-mentioned hashing algorithm title and the file hash value inquiry file status corresponding with above-mentioned file hash value.
Alternatively, if the corresponding relation of the file hash value of file to be downloaded and file status is not in this locality, but adopt the database server mode in high in the clouds to store, the above-mentioned hashing algorithm title of so above-mentioned foundation and the file hash value inquiry file status corresponding with above-mentioned file hash value comprise: above-mentioned algorithm title and file hash value are sent to database server, and receive the file status corresponding with above-mentioned file hash value that database server returns.
Further, the embodiment of the present invention also provides the data refresh mode of database server, particularly: said method also comprises: after file has been downloaded, the file hash value of the file downloading to is sent to the corresponding relation of above-mentioned database server for transaction file and file hash value.
The embodiment of the present invention also provides the another kind of file based on end-to-end protocol to download guard method, and this programme is carried out in database server side, as shown in Figure 2, specifically comprises:
201: the file hash value that receives the to be downloaded file corresponding with the algorithm title of end-to-end download request and download request;
202: according to above-mentioned hashing algorithm title, above-mentioned file hash value is converted to normative document hashed value, and uses the above-mentioned normative document hashed value inquiry file status corresponding with above-mentioned normative document hashed value; Above-mentioned file status has identified whether safety of above-mentioned file to be downloaded;
Above embodiment, by receiving the file hash value of the to be downloaded file corresponding with the algorithm title of end-to-end download request and download request; Then according to above-mentioned hashing algorithm title, above-mentioned file hash value is converted to normative document hashed value; Finally use the above-mentioned normative document hashed value inquiry file status corresponding with above-mentioned normative document hashed value; Can before file is downloaded, just determine the fail safe of file to be downloaded, thereby the file of realizing based on P2P agreement is downloaded front protection, save user's download time and save Internet resources.
The concrete mode that above-mentioned file hash value is converted to normative document hashed value by the above-mentioned hashing algorithm title of above-mentioned foundation can be: in database server, store the corresponding relation of the normative document hashed value of file hash value corresponding to various hashing algorithm titles and standard hashing algorithm, according to this corresponding relation, file hash value corresponding above-mentioned hashing algorithm title is converted to normative document hashed value.
Alternatively, above-mentioned hashing algorithm title comprises: message digest algorithm or SHA, above-mentioned normative document hashed value is the value of message digest algorithm five.It should be noted that, the of a great variety above preferred implementation for hashing algorithm of hashing algorithm should not be construed as for example exhaustive to hashing algorithm, the classification of normative document hashed value is chosen can be according to choosing arbitrarily with the principle of existing network compatibility, and above MD5 value also should not be construed as the restriction to the embodiment of the present invention as a preferred version.MD5 is the one of hashing algorithm, and for file of unique identification, after file content changes, its MD5 value also changes thereupon; Other similar hashing algorithms comprise SHA-1 algorithm etc.
203: above-mentioned file status is returned to the equipment that sends above-mentioned file hash value.
Further, the embodiment of the present invention also provides the Data Update scheme of database server, particularly: said method also comprises: receive the said equipment after file has been downloaded, the file hash value of the file downloading to of transmission, and the corresponding relation of transaction file and file hash value.
In following examples, will be illustrated, illustrating the middle value that the unique identification value of the file of downloading is adopted to hashing algorithm, more specifically use SHA-1 value, MD5 value etc., in following giving an example, accepted standard file hash value is MD5 value.
Different P2P agreements can adopt different hashing algorithms to identify file conventionally; such as: BT agreement adopts file block and records the mode mark file to be downloaded of the SHA-1 value of each blocks of files; ED2K link adopts the ED2K hashing algorithm tab file carrying; magnetic force link can in link, directly mark uses hashing algorithm, as SHA-1 or MD5 etc.The unified safe condition that adopts MD5 value to carry out log file as file identification of current computer housekeeper service end, cannot judge its safe condition for the file of other kinds hashing algorithm mark.Before realizing the download of P2P mode, detect, can set up the one-to-one relationship between all kinds of hashed values of identical file.
Whole scheme framework can, with reference to shown in figure 3, comprise: P2P download and inquiry module, wooden horse cloud killing server, hashed value corresponding relation database, hashed value corresponding relation update module; The function of each several part is as follows:
Hashed value corresponding relation database: preserved possible hashing algorithm title (as: SHA-1), the one-to-one relationship between the MD5 value of file hash value and file;
P2P download and inquiry module: receiving after the inquiry request of the file hash value that comprises hashing algorithm title and file to be downloaded, according to the file hash value of the hashing algorithm title in inquiry request and file to be downloaded to file MD5 value corresponding to hashed value corresponding relation database lookup, then look into file status corresponding to server lookup MD5 value according to MD5 value to wooden horse cloud, then return to Query Result (black/white/ash) by cloud killing server; In Query Result, the black/white of file/grey state, for the safe condition of identification document, detects as the file identification of wooden horse, virus etc. is black, detects harmless file identification for white, and file to be detected, due to safe condition the unknown, is designated ash;
When using P2P download client to complete after a file download, download protocol, hashing algorithm, the hashed value that file can be used and the MD5 value that finally downloads to file mail to hashed value corresponding relation update module, for constantly interpolation and more new database data.Take the downloading mode of BT agreement as example, the implementation of the embodiment of the present invention refers to Fig. 4, comprising:
401: intercept and capture user P2P download request, resolve this P2P download request, extract hashing algorithm title and file hash value and mail to wooden horse cloud killing server;
Particularly, in the downloading mode of BT agreement, after download client detects seed file download, can analysator subfile content, read the sequence string of SHA-1 value composition of each blocks of files (or being called file fragmentation) wherein (because SHA-1 value is 20 bytes, therefore the integral multiple that this sequence string length is 20 bytes), then this sequence string SHA-1 hash (be not limited to SHA-1 here, other any hashing algorithms all can) that tries again is obtained to the file identification of 20 bytes.Hash name (can be labeled as BT_SHA-1 here) and file hash value are mail to high in the clouds inquiry by final system; And for modes such as ED2K or magnetic force links, can directly extract hashing algorithm title and file hash value and mail to P2P download and inquiry module.
402:P2P download and inquiry module receives after inquiry request, and in file MD5 value corresponding to hashed value corresponding relation database lookup download request, if ash is directly returned in no record, user can normally download; If find record, further the file MD5 inquiring is mail to wooden horse cloud and look into server, be white or grey if wooden horse cloud is looked into the Query Result of server, let pass, user can normally download; If black file, can give a warning to point out user to abandon this subsidiary risk down operation.
The scheme that above-mentioned Fig. 4 is corresponding needs client can support and analyze all kinds of conventional P2P agreements, therefrom extracts file hash value, and then unifies to be converted into file MD5 value and inquire about.Above scheme can, in smooth compatibility in current network, be the preferred version of the embodiment of the present invention.The embodiment of the present invention also provides other replacement scheme, and replacement scheme can directly be set up P2P without the concrete P2P agreement of care and ask the corresponding relation between file MD5 value.As follows particularly:
For BT agreement, P2P download client can directly send to hashed value corresponding relation update module by the MD5 value of the MD5 value of seed file and file to be downloaded, sets up the corresponding relation of the MD5 value of seed file and the MD5 value of final download file accordingly in database; When user downloads to after seed file, system can directly mail to the MD5 of seed file high in the clouds inquiry, and the MD5 of file to be downloaded is found in high in the clouds by the MD5 value of seed file, then look into server lookup file black-white-gray state to wooden horse cloud.
For similar ED2K and magnetic force link, client can directly send to hashed value corresponding relation update module by this type of link and the MD5 value of file to be downloaded, sets up the corresponding relation of P2P link and file to be downloaded MD5 value; In the time that user initiates P2P request by this type of link, can directly link by P2P the MD5 value that finds respective file, then look into the corresponding file to be downloaded safe condition of server lookup to wooden horse cloud.
Above replacement scheme is but pointed to the seed file of same download file or P2P link owing to can constructing content difference, and fail safe is slightly poorer than the corresponding scheme of Fig. 4, for example: link for ED2K, generally have following form:
Ed2k: // | file|< file name >|< file size >|< file hash value >|/
For same file to be downloaded, can all generate a file name with random fashion at every turn, thereby produce a brand-new link, in the hashed value corresponding relation update module in high in the clouds, can not inquire the download file MD5 value of new link correspondence, thereby walk around the detection of replacement scheme; Similarly, BT seed file the inside also have filename this, also can constantly generate brand-new seed file by the mode that uses random file name, thereby walk around the inquiry (that is: each inquiry all can be returned to ash) in high in the clouds.And the hashed value of same download file cannot be tampered, therefore the technical scheme in 4 can not be bypassed, and has better fail safe, is the preferred version of the embodiment of the present invention.
The embodiment of the present invention also provides a kind of file based on end-to-end protocol to download protective device, as shown in Figure 5, comprising:
Mark acquiring unit 501, for obtaining the unique identification value of the to be downloaded file corresponding with end-to-end download request; The carrier of above-mentioned end-to-end download request may have a variety of, and for example, seed file during BT downloads is exactly a widely used example, will not limit for the carrier embodiment of the present invention of the download request under P2P agreement.In the end-to-end download request based on P2P agreement, generally can comprise multiple file fragmentations to be downloaded, so above-mentioned unique identification value can be the sequence of a unique identification value, and each sequence fragment identifies respectively a file fragmentation.
Query unit 502, for being used the above-mentioned unique identification value inquiry file status corresponding with above-mentioned unique identification value; Above-mentioned file status has identified whether safety of above-mentioned file to be downloaded.
Above embodiment, by obtaining the unique identification value of the to be downloaded file corresponding with end-to-end download request; Then use the above-mentioned unique identification value inquiry file status corresponding with above-mentioned unique identification value; Can before file is downloaded, just determine the fail safe of file to be downloaded, thereby the file of realizing based on P2P agreement is downloaded front protection, save user's download time and save Internet resources.
Alternatively, above-mentioned unique identification value is file hash value, what those skilled in the art were known is, above-mentioned unique identification value is for identification document, the varied file hash value that is not limited in of its adoptable algorithm and form, therefore above file hash value should not be construed as the restriction to the embodiment of the present invention as a preferred version.The use of obtaining hashing algorithm title is to be described in detail the unique identification value of the various hashing algorithms that may occur under compatible P2P agreement to this in subsequent embodiment.As shown in Figure 6, said apparatus also comprises:
Name acquiring unit 601, for obtaining the hashing algorithm title of above-mentioned end-to-end request;
Above-mentioned query unit 502, specifically for inquiring about the file status corresponding with above-mentioned file hash value according to above-mentioned hashing algorithm title and file hash value.
Alternatively, above-mentioned mark acquiring unit 501, specifically for extracting the file hash value of the to be downloaded file corresponding with above-mentioned end-to-end download request from end-to-end download request;
Above-mentioned name acquiring unit 601, specifically for extracting the hashing algorithm title of above-mentioned end-to-end request from end-to-end download request.
Further, as shown in Figure 7, said apparatus also comprises:
Intercept subelement 701, before extracting the file hash value of to be downloaded file and the hashing algorithm title of above-mentioned end-to-end request corresponding with above-mentioned end-to-end download request from end-to-end download request, intercept user's end-to-end download request;
Resolve subelement 702, for resolving above-mentioned end-to-end download request.
Alternatively, as shown in Figure 8, if the corresponding relation of the file hash value of file to be downloaded and file status, not in this locality, but adopts the database server mode in high in the clouds to store, above-mentioned query unit 502 comprises:
Send subelement 801, for above-mentioned algorithm title and file hash value are sent to database server;
Receive subelement 802, the file status corresponding with above-mentioned file hash value returning for receiving database server.
Further, as shown in Figure 9, the embodiment of the present invention also provides the data refresh mode of database server, and said apparatus said apparatus also comprises:
Upgrade transmitting element 901, after having downloaded at file, the file hash value of the file downloading to is sent to the corresponding relation of above-mentioned database server for transaction file and file hash value.
The embodiment of the present invention also provides a kind of database server, as shown in figure 10, comprising:
Data receiver unit 1001, for receiving the file hash value of the to be downloaded file corresponding with the algorithm title of end-to-end download request and download request;
Converting unit 1002, for being converted to normative document hashed value according to above-mentioned hashing algorithm title by above-mentioned file hash value;
Data base querying unit 1003, for using the above-mentioned normative document hashed value inquiry file status corresponding with above-mentioned normative document hashed value; Above-mentioned file status has identified whether safety of above-mentioned file to be downloaded;
Result transmitting element 1004, for returning to above-mentioned file status the equipment that sends above-mentioned file hash value.
Above embodiment, by receiving the file hash value of the to be downloaded file corresponding with the algorithm title of end-to-end download request and download request; Then according to above-mentioned hashing algorithm title, above-mentioned file hash value is converted to normative document hashed value; Finally use the above-mentioned normative document hashed value inquiry file status corresponding with above-mentioned normative document hashed value; Can before file is downloaded, just determine the fail safe of file to be downloaded, thereby the file of realizing based on P2P agreement is downloaded front protection, save user's download time and save Internet resources.
Alternatively, above-mentioned hashing algorithm title comprises: message digest algorithm or SHA;
Above-mentioned converting unit 1002, specifically for being converted to above-mentioned file hash value according to above-mentioned hashing algorithm title the value of message digest algorithm five.It should be noted that, the of a great variety above preferred implementation for hashing algorithm of hashing algorithm should not be construed as for example exhaustive to hashing algorithm, the classification of normative document hashed value is chosen can be according to choosing arbitrarily with the principle of existing network compatibility, and above MD5 value also should not be construed as the restriction to the embodiment of the present invention as a preferred version.MD5 is the one of hashing algorithm, and for file of unique identification, after file content changes, its MD5 value also changes thereupon; Other similar hashing algorithms comprise SHA-1 algorithm etc.
Further, as shown in figure 11, the embodiment of the present invention also provides the Data Update scheme of database server, and above-mentioned database server, also comprises:
Upgrade data receiver unit 1101, for receiving the said equipment after file has been downloaded, the file hash value of the file downloading to of transmission;
Updating block 1102, for the corresponding relation of the file hash value transaction file according to the above-mentioned file downloading to and file hash value.
The embodiment of the present invention also provides a kind of file based on end-to-end protocol to download protection system, as shown in figure 12, comprising:
The file based on end-to-end protocol shown in Fig. 8 is downloaded the database server 1202 shown in protective device 1201 and Figure 10, or the file based on end-to-end protocol shown in Fig. 9 is downloaded the database server 1202 shown in protective device 1201 and Figure 11.
Above embodiment, by receiving the file hash value of the to be downloaded file corresponding with the algorithm title of end-to-end download request and download request; Then according to above-mentioned hashing algorithm title, above-mentioned file hash value is converted to normative document hashed value; Finally use the above-mentioned normative document hashed value inquiry file status corresponding with above-mentioned normative document hashed value; Can before file is downloaded, just determine the fail safe of file to be downloaded, thereby the file of realizing based on P2P agreement is downloaded front protection, save user's download time and save Internet resources.
It should be noted that, the above-mentioned file based on end-to-end protocol is downloaded in protective device and database server embodiment, included unit is just divided according to function logic, but is not limited to above-mentioned division, as long as can realize corresponding function; Each functional unit can not exist in an entity device, and employing can connect corresponding function by communication mode, and in addition, the concrete title of each functional unit also, just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
In addition, one of ordinary skill in the art will appreciate that all or part of step realizing in above-mentioned each embodiment of the method is can carry out the hardware that instruction is relevant by program to complete, corresponding program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be read-only memory, disk or CD etc.
These are only preferably embodiment of the present invention; but protection scope of the present invention is not limited to this; any be familiar with those skilled in the art the embodiment of the present invention disclose technical scope in, the variation that can expect easily or replacement, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (19)

1. the file based on end-to-end protocol is downloaded a guard method, it is characterized in that, comprising:
Obtain the unique identification value of the to be downloaded file corresponding with end-to-end download request;
Use the described unique identification value inquiry file status corresponding with described unique identification value; Described file status has identified whether safety of described file to be downloaded.
2. method according to claim 1, is characterized in that, described unique identification value is file hash value, and described method also comprises: the hashing algorithm title of obtaining described end-to-end request;
The described unique identification value inquiry of the described use file status corresponding with described unique identification value comprises:
According to described hashing algorithm title and the file hash value inquiry file status corresponding with described file hash value.
3. method according to claim 2, is characterized in that, described in obtain the unique identification value of the to be downloaded file corresponding with end-to-end download request; The hashing algorithm title of obtaining described end-to-end request comprises:
From end-to-end download request, extract the file hash value of to be downloaded file and the hashing algorithm title of described end-to-end request corresponding with described end-to-end download request.
4. method according to claim 3, is characterized in that, extract the file hash value of to be downloaded file corresponding with described end-to-end download request and the hashing algorithm title of described end-to-end request from end-to-end download request before, also comprises:
Intercept user's end-to-end download request, resolve described end-to-end download request.
5. method according to claim 3, is characterized in that, the described hashing algorithm title of described foundation and the file hash value inquiry file status corresponding with described file hash value comprise:
Described algorithm title and file hash value are sent to database server, and receive the file status corresponding with described file hash value that database server returns.
6. method according to claim 5, is characterized in that, also comprises:
After file has been downloaded, the file hash value of the file downloading to is sent to the corresponding relation of described database server for transaction file and file hash value.
7. the file based on end-to-end protocol is downloaded a guard method, it is characterized in that, comprising:
Receive the file hash value of the to be downloaded file corresponding with the algorithm title of end-to-end download request and download request;
According to described hashing algorithm title, described file hash value is converted to normative document hashed value, and uses the described normative document hashed value inquiry file status corresponding with described normative document hashed value; Described file status has identified whether safety of described file to be downloaded;
Described file status is returned to the equipment that sends described file hash value.
8. method according to claim 7, is characterized in that, described hashing algorithm title comprises: message digest algorithm or SHA, described normative document hashed value is the value of message digest algorithm five.
9. according to method described in claim 7 or 8, it is characterized in that, also comprise:
Receive described equipment after file has been downloaded, the file hash value of the file downloading to of transmission, and the corresponding relation of transaction file and file hash value.
10. the file based on end-to-end protocol is downloaded a protective device, it is characterized in that, comprising:
Mark acquiring unit, for obtaining the unique identification value of the to be downloaded file corresponding with end-to-end download request;
Query unit, for being used the described unique identification value inquiry file status corresponding with described unique identification value; Described file status has identified whether safety of described file to be downloaded.
11. install according to claim 10, it is characterized in that, described unique identification value is file hash value, and described device also comprises:
Name acquiring unit, for obtaining the hashing algorithm title of described end-to-end request;
Described query unit, specifically for inquiring about the file status corresponding with described file hash value according to described hashing algorithm title and file hash value.
12. according to device described in claim 11, it is characterized in that,
Described mark acquiring unit, specifically for extracting the file hash value of the to be downloaded file corresponding with described end-to-end download request from end-to-end download request;
Described name acquiring unit, specifically for extracting the hashing algorithm title of described end-to-end request from end-to-end download request.
13. according to device described in claim 12, it is characterized in that, also comprises:
Intercept subelement, before extracting the file hash value of to be downloaded file and the hashing algorithm title of described end-to-end request corresponding with described end-to-end download request from end-to-end download request, intercept user's end-to-end download request;
Resolve subelement, for resolving described end-to-end download request.
14. according to device described in claim 12, it is characterized in that, described query unit comprises:
Send subelement, for described algorithm title and file hash value are sent to database server;
Receive subelement, the file status corresponding with described file hash value returning for receiving database server.
15. install described in 14 any one, it is characterized in that, described device also comprises:
Upgrade transmitting element, after having downloaded at file, the file hash value of the file downloading to is sent to the corresponding relation of described database server for transaction file and file hash value.
16. 1 kinds of database servers, is characterized in that, comprising:
Data receiver unit, for receiving the file hash value of the to be downloaded file corresponding with the algorithm title of end-to-end download request and download request;
Converting unit, for being converted to normative document hashed value according to described hashing algorithm title by described file hash value;
Data base querying unit, for using the described normative document hashed value inquiry file status corresponding with described normative document hashed value; Described file status has identified whether safety of described file to be downloaded;
Result transmitting element, for returning to described file status the equipment that sends described file hash value.
17. according to database server described in claim 16, it is characterized in that, described hashing algorithm title comprises: message digest algorithm or SHA;
Described converting unit, specifically for being converted to described file hash value according to described hashing algorithm title the value of message digest algorithm five.
18. according to database server described in claim 16 or 17, it is characterized in that, also comprises:
Upgrade data receiver unit, for receiving described equipment after file has been downloaded, the file hash value of the file downloading to of transmission;
Updating block, for the corresponding relation of the file hash value transaction file according to the described file downloading to and file hash value.
19. 1 kinds of files based on end-to-end protocol are downloaded protection system, it is characterized in that, comprising:
The database server of the device of claim 14 and claim 16 or 17, or, the device of claim 15 and the database server of claim 18.
CN201210486971.2A 2012-11-26 2012-11-26 File download protection method, device, and system based on an end-to-end protocol Pending CN103841156A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210486971.2A CN103841156A (en) 2012-11-26 2012-11-26 File download protection method, device, and system based on an end-to-end protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210486971.2A CN103841156A (en) 2012-11-26 2012-11-26 File download protection method, device, and system based on an end-to-end protocol

Publications (1)

Publication Number Publication Date
CN103841156A true CN103841156A (en) 2014-06-04

Family

ID=50804283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210486971.2A Pending CN103841156A (en) 2012-11-26 2012-11-26 File download protection method, device, and system based on an end-to-end protocol

Country Status (1)

Country Link
CN (1) CN103841156A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254497A (en) * 2016-08-19 2016-12-21 北京金山安全管理系统技术有限公司 A kind of method that black file in black file polling is added up

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051980A (en) * 2007-05-21 2007-10-10 华为技术有限公司 File data distributing method and relative device
CN101079709A (en) * 2006-06-15 2007-11-28 腾讯科技(深圳)有限公司 Single-node-to-multi-node concurrent download system and method
CN101141469A (en) * 2007-10-17 2008-03-12 深圳市迅雷网络技术有限公司 Safety information retrieval server, system, method and a terminal
CN101304321A (en) * 2008-07-09 2008-11-12 南京邮电大学 Method for defending equity network virus based on trust
CN101447006A (en) * 2008-12-30 2009-06-03 深圳市迅雷网络技术有限公司 Method for providing file security information and security information processing system
CN101572707A (en) * 2009-05-31 2009-11-04 成都市华为赛门铁克科技有限公司 Method, apparatus and system for validating certificate state
CN101616005A (en) * 2009-07-27 2009-12-30 成都市华为赛门铁克科技有限公司 Endorsement method, device and signature verification method, device and system
CN102752326A (en) * 2011-04-19 2012-10-24 腾讯科技(深圳)有限公司 Method, client, server and system for processing data in file downloading

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079709A (en) * 2006-06-15 2007-11-28 腾讯科技(深圳)有限公司 Single-node-to-multi-node concurrent download system and method
CN101051980A (en) * 2007-05-21 2007-10-10 华为技术有限公司 File data distributing method and relative device
CN101141469A (en) * 2007-10-17 2008-03-12 深圳市迅雷网络技术有限公司 Safety information retrieval server, system, method and a terminal
CN101304321A (en) * 2008-07-09 2008-11-12 南京邮电大学 Method for defending equity network virus based on trust
CN101447006A (en) * 2008-12-30 2009-06-03 深圳市迅雷网络技术有限公司 Method for providing file security information and security information processing system
CN101572707A (en) * 2009-05-31 2009-11-04 成都市华为赛门铁克科技有限公司 Method, apparatus and system for validating certificate state
CN101616005A (en) * 2009-07-27 2009-12-30 成都市华为赛门铁克科技有限公司 Endorsement method, device and signature verification method, device and system
CN102752326A (en) * 2011-04-19 2012-10-24 腾讯科技(深圳)有限公司 Method, client, server and system for processing data in file downloading

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254497A (en) * 2016-08-19 2016-12-21 北京金山安全管理系统技术有限公司 A kind of method that black file in black file polling is added up
CN106254497B (en) * 2016-08-19 2019-03-26 北京金山安全管理系统技术有限公司 A method of the black file in black file polling is counted

Similar Documents

Publication Publication Date Title
Xu et al. Am I eclipsed? A smart detector of eclipse attacks for Ethereum
US8880698B2 (en) Storage of content data in a peer-to-peer network
Park et al. Towards automated application signature generation for traffic identification
US8204915B2 (en) Apparatus and method for generating a database that maps metadata to P2P content
Farina et al. Bittorrent sync: First impressions and digital forensic implications
US20080319861A1 (en) System and method for advertising on a peer-to-peer network
CN110650128A (en) System and method for detecting digital currency stealing attack of Etheng
US20140359066A1 (en) System, method and device for offline downloading resource and computer storage medium
WO2013130867A1 (en) Method and apparatus for retroactively detecting malicious or otherwise undesirable software
CN102932391A (en) Method and device for processing data in peer to server/peer (P2SP) system, and P2SP system
KR102122679B1 (en) Method and system for preventing distribution of illegal contents over the internet
CN102833262A (en) Whois information-based phishing website gathering, identification method and system
US9432273B2 (en) System and method for monitoring bittorrent content and the computers that share bittorrent content
CN110225045A (en) Full link data method for authenticating, device, equipment and storage medium
CN108768934B (en) Malicious program release detection method, device and medium
CN108924139A (en) The method, apparatus and execute server of file detection efficiency are promoted based on cloud
US11847219B2 (en) Determining a state of a network
CN113849820A (en) Vulnerability detection method and device
CN103746768A (en) Data packet identification method and equipment thereof
CN103841156A (en) File download protection method, device, and system based on an end-to-end protocol
CN103685367A (en) Offline download system and offline download method
CN104468601A (en) P2P worm detecting system and method
Quinn et al. Forensic analysis and remote evidence recovery from syncthing: An open source decentralised file synchronisation utility
Kurokawa et al. Study on the distributed data sharing mechanism with a mutual authentication and meta database technology
CN116055083B (en) Method for improving network security and related equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140604