CN109309651A - A kind of document transmission method, device, equipment and storage medium - Google Patents

A kind of document transmission method, device, equipment and storage medium Download PDF

Info

Publication number
CN109309651A
CN109309651A CN201710628723.XA CN201710628723A CN109309651A CN 109309651 A CN109309651 A CN 109309651A CN 201710628723 A CN201710628723 A CN 201710628723A CN 109309651 A CN109309651 A CN 109309651A
Authority
CN
China
Prior art keywords
file
information
transmitted
identification information
deposit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710628723.XA
Other languages
Chinese (zh)
Other versions
CN109309651B (en
Inventor
史明江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Banma Zhixing Network Hongkong Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710628723.XA priority Critical patent/CN109309651B/en
Priority to PCT/CN2018/095873 priority patent/WO2019019936A1/en
Publication of CN109309651A publication Critical patent/CN109309651A/en
Application granted granted Critical
Publication of CN109309651B publication Critical patent/CN109309651B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application provides a kind of document transmission method, device, equipment and storage medium, to improve the safety of data.The method includes: to determine the verifying target information of file to be transmitted according to deposit file, and send the verifying target information, wherein the file to be transmitted is matched with deposit file;From at least one identification information obtained in the file to be transmitted in received verification information, the identification information is determined according to the verifying target information;Whether the identification information for judging the file to be transmitted, match with the identification information of corresponding deposit file;After confirming identification information match, the information of the file to be transmitted is sent.Guarantee that file the problem of server and client side exists, prevents spurious information steal files, guarantees the safety of information by verification information.

Description

A kind of document transmission method, device, equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of document transmission method, a kind of file transfer means, A kind of terminal device, a kind of server, a kind of storage medium and a kind of operating system for terminal device.
Background technique
It is a kind of " ignoring formula " to upload mode that second, which passes, it makes the same file of different user that need to only store portion, this is not But it avoids unnecessary file to upload, and reduces the bandwidth and carrying cost of server-side, while the user experience is improved. Therefore, in cloud storage system, second biography is essential function.
Biography mode is as follows within a kind of second: server precomputes the md5 value of deposit file, thus store deposit file, its The corresponding relationship of md5 value and file identification.Client calculates the md5 value of file to be transmitted before upper transmitting file, then sends and takes Request of data with md5 value is to server.Whether server detects the md5 value identical as the md5 value deposited, then creates if they are the same The newly-built file identification and md5 value, corresponding deposit file are established corresponding relationship, and return to newly-built text by one file identification Part is identified to client, is characterized this document and has been uploaded, to realize the quick upload of file.
But md5 value is the character string of 32 characters, theoretically, attacker can enumerate all md5 values, then mould Quasi- client initiates second biography request, so that attacker can also spread out of file the second in the case where not possessing file, and being capable of base Respective file is got in the file identification etc. that server is replied, leads to leaking data, influences data safety.
Summary of the invention
The technical problem to be solved in the embodiments of the present application is that a kind of document transmission method is provided, to improve the safety of data Property.
Correspondingly, the embodiment of the present application also provides a kind of file transfer means, a kind of terminal device, a kind of server, A kind of storage medium and a kind of operating system, to guarantee the implementation and application of the above method.
To solve the above-mentioned problems, the embodiment of the present application discloses a kind of document transmission method, comprising: according to deposit file Determine the verifying target information of file to be transmitted, and send the verifying target information, wherein the file to be transmitted with deposited File matching;From at least one identification information obtained in received verification information in the file to be transmitted, the mark letter Breath is determined according to the verifying target information;The identification information for judging the file to be transmitted, with the mark of corresponding deposit file Whether information matches;After confirming identification information match, the information of the file to be transmitted is sent.
The embodiment of the present application also discloses a kind of document transmission method, comprising: receives verifying target information, wherein described Target information is verified to generate according to the matched deposit file of file to be transmitted;Institute is determined according to the verifying target information At least one identification information for stating file to be transmitted generates verification information according to the identification information;Send the verification information; Receive the information of the file to be transmitted.
The embodiment of the present application also discloses a kind of file transfer means, comprising: target sending module has deposited text for foundation Part determines the verifying target information of file to be transmitted, and sends the verifying target information, wherein the file to be transmitted with Deposit file matching;Module is obtained, for obtaining at least one of described file to be transmitted mark from received verification information Information, the identification information are determined according to the verifying target information;Judgment module, for judging the mark of the file to be transmitted Know information, whether is matched with the identification information of corresponding deposit file;Sending module is stored, in confirmation identification information match Afterwards, the information of the file to be transmitted is sent.
The embodiment of the present application also discloses a kind of file transfer means characterized by comprising receiving module, for connecing Receive verifying target information, wherein the verifying target information is generated according to the matched deposit file of file to be transmitted;With And receive the information of the file to be transmitted;Verification information determining module, described in being determined according to the verifying target information At least one identification information of file to be transmitted generates verification information according to the identification information;Sending module, for sending State verification information.
The embodiment of the present application also discloses a kind of server, comprising: one or more processors;It is instructed with being stored thereon with One or more machine readable medias, when by one or more of processors execute when so that the server execute such as Method described in one or more in the embodiment of the present application.
The embodiment of the present application also discloses one or more machine readable medias, is stored thereon with instruction, when by one or When multiple processors execute, so that server executes the method as described in one or more in the embodiment of the present application.
The embodiment of the present application also discloses a kind of terminal device, comprising: one or more processors;Refer to being stored thereon with One or more machine readable medias of order, when being executed by one or more of processors, so that the terminal device is held Method of the row as described in one or more in the embodiment of the present application.
The embodiment of the present application also discloses one or more machine readable medias, is stored thereon with instruction, when by one or When multiple processors execute, so that terminal device executes the method as described in one or more in the embodiment of the present application.
The embodiment of the present application also discloses a kind of operating system for terminal device, comprising: receiving unit receives verifying Target information, wherein the verifying target information is generated according to the matched deposit file of file to be transmitted;And receive institute State the information of file to be transmitted;Authentication unit determines the file to be transmitted at least one according to the verifying target information Identification information generates verification information according to the identification information;Communication unit sends the verification information.
Compared with prior art, the embodiment of the present application includes the following advantages:
It in the embodiment of the present application, can be according to deposit file after server confirms that file to be transmitted is matched with deposit file The verifying target information of file to be transmitted is determined, so that terminal device can be calculated based on verifying target information, in file to be transmitted The identification information of at least one target data, server judge the identification information of the file to be transmitted again, have deposited text with corresponding Whether the identification information of part matches, and confirms in terminal device after confirming identification information match and is stored with the file to be transmitted, because The information of the file to be transmitted can be transmitted in this, thus guarantee that file exists in server and client side by verification information, The problem of preventing spurious information steal files, guarantees the safety of information.
Detailed description of the invention
Fig. 1 is a kind of data transmission architecture schematic diagram of the embodiment of the present application;
Fig. 2 is the step flow chart of terminal equipment side in a kind of document transmission method embodiment of the application;
Fig. 3 is the step flow chart of server side in a kind of document transmission method embodiment of the application;
Fig. 4 is another data transmission architecture schematic diagram of the embodiment of the present application;
Fig. 5 is the step flow chart of terminal equipment side in another document transmission method embodiment of the application;
Fig. 6 is the step flow chart of server side in another document transmission method embodiment of the application;
Fig. 7 is a kind of structural block diagram of file transfer means embodiment of the application;
Fig. 8 is the structural block diagram of the application another kind file transfer means embodiment;
Fig. 9 is the structural block diagram of the application another kind file transfer means alternative embodiment;
Figure 10 is the hardware structural diagram for the terminal device that one embodiment of the application provides;
Figure 11 is the hardware structural diagram for the terminal device that another embodiment of the application provides;
Figure 12 is the operating system schematic diagram that one embodiment of the application provides.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real Applying mode, the present application will be further described in detail.
In the embodiment of the present application, terminal device refers to the equipment with intelligent operating system, these equipment can support sound Frequently, the function of video, data etc., including intelligent mobile terminal such as smart phone, tablet computer, intelligent wearable device, It can be the equipment such as smart television, personal computer.Intelligent operating system such as YunOS, IOS, Android etc..
Referring to Fig.1, a kind of data for showing the embodiment of the present application transmit interaction schematic diagram.
The data transmission system includes: terminal device 10 and server 20.User can pass through client in terminal device It is interacted Deng applying with server, executes the operations such as file upload.
Wherein, server 20 can record the identification information of this document, which can only table for the file of storage A data content is levied, i.e. the identification information of different data is different, and the identification information for the data that match matches, the packet that matches It includes identical.Therefore its data content can be characterized by file identification information for file, file identification information is also a kind of mark The file identification information of information, different files is different, and the file identification information for the file that matches matches.Wherein, identification information It can be calculated by many algorithms, each algorithm corresponds to a type of identification information, the mark letter that algorithm of the same race obtains It can mutually compare between breath, not have comparativity between the identification information that algorithms of different obtains, i.e., held in the embodiment of the present application Capable matching is to obtain the matching between identification information and between file identification information for same algorithm.Identification information It include: eap-message digest, file identification information includes: eap-message digest, which is unique correspondence The value of the regular length of one data (file), be data file is calculated by certain algorithm to obtain, once data file It changes, then eap-message digest can also change, therefore also be considered as the digital finger-print of data file, can be used for uniquely marking Know a data file.
Therefore when different user is to server uploading system file, server only stores text document, it is subsequent on The user for passing this document can be passed function based on the second and realize quick upload.But attacker is by forging identification information in order to prevent The mode steal files of (such as eap-message digest), the present embodiment can pass through on the basis of confirming that server end has stored this document Locally there is file to ensure terminal device in the verifying of file data, and it is in this on the basis of the second be provided pass function, inform and correspond to Terminal device file uploads successfully.Therefore in the file basis that server confirmation storage matches with file to be transmitted, file Transmission verifying can be realized by following interactive process:
102, after server confirms that file to be transmitted is matched with deposit file, file to be transmitted is determined according to deposit file Verify target information.For the file to be transmitted that needs upload, server confirms that the file to be transmitted matches (such as with deposit file In the presence of file identical with file data content to be transmitted, i.e., after file to be transmitted is identical as deposit file), it can have been deposited according to this File determines the verifying target information of file to be transmitted, which is used to inform the mesh that terminal device needs to verify Mark, such as data, the need algorithm to be used of target area.
104, server sends the verifying target information.
106, terminal device determines at least one identification information of the file to be transmitted according to the verifying target information, Verification information is generated according to the identification information.Terminal device determines the target for needing to verify according to the verifying target information, Therefore at least one identification information can be calculated according to file to be transmitted, which can be according to the part number in file to be transmitted It is calculated according to the data of such as target area, then generates verification information according to identification information.
108, terminal device sends the verification information.
110, server is from least one identification information obtained in the file to be transmitted in verification information.
112, server judges the identification information of the file to be transmitted, with the identification information of corresponding deposit file whether Match.The identification information that target information is verified according to deposit file determines, consequently facilitating the identification information of file to be transmitted and having deposited Matching between the identification information of file.
114, server sends the information of the file to be transmitted after confirming identification information match.The information includes depositing It stores up information and also ignores the upload to this document in addition, file that is, to be transmitted is insincere if server authentication does not pass through, it can also The response message of feedback transmission failure, hereafter terminal device can be transmitted to file to server, the above transmitting file.
To determine file to be transmitted based on deposit file in the case where confirming file to be transmitted and the matched situation of deposit file The middle target for needing to verify, to obtain at least one identification information in file to be transmitted, then judges the file to be transmitted Identification information, whether matched with the identification information of corresponding deposit file, confirm identification information match, that is, terminal device in exist The file to be transmitted then sends the file to be transmitted without terminal device, that is, the information of the file to be transmitted can be transmitted, and informs File transmission success guarantees the safety of data to effectively prevent the problem of forging document based on identification information.
Referring to Fig. 2, show the step flow chart of server side in a kind of document transmission method embodiment of the application.
Step 202, the verifying target information of file to be transmitted is determined according to deposit file, and send the verifying target letter Breath.
Step 204, from least one identification information obtained in received verification information in the file to be transmitted.
Step 206, the identification information for judging the file to be transmitted, with the identification information of corresponding deposit file whether Match.
If so, executing step 208;If it is not, terminating the process.
Step 208, after confirming identification information match, the information of the file to be transmitted is sent.
It is (as identical with file data content to be transmitted in existed that server confirms that the file to be transmitted is matched with deposit file File, i.e., after file to be transmitted is identical as deposit file), the verifying target letter of file to be transmitted can be determined according to the deposit file Breath.The verifying target information is used to inform the target that terminal device needs are verified, data, need calculation to be used such as target area Method etc., wherein terminal device calculates the identification information of file to be transmitted according to verifying target information, the verifying target information be according to It is determined according to the identification information of the corresponding deposit file that matches.Therefore terminal device can calculate file to be transmitted according to identification information In at least one identification information, constitute verification information after return to server.
The corresponding receivable verification information of server, and at least one of described file to be transmitted is obtained from verification information Then identification information matches each identification information with the corresponding identification information of deposit file, respectively if each identification information It matches, then confirms in terminal device there are the file to be transmitted, second biography function can be provided for it, therefore can the text to be transmitted The information of part, such as the storage record based on deposit file generate the storage information of file to be transmitted, such as by deposit file Then storage information is fed back to terminal device by the storage address in storage record, the storage address etc. as file to be transmitted, To inform that terminal device file uploads successfully, according to the storage information etc. of this document in the server.
Referring to Fig. 3, show the step flow chart of terminal equipment side in a kind of document transmission method embodiment of the application.
Step 302, verifying target information is received.
Step 304, at least one identification information of the file to be transmitted, foundation are determined according to the verifying target information The identification information generates verification information.
Step 306, the verification information is sent.
Step 308, the information of the file to be transmitted is received.
It is (as identical with file data content to be transmitted in existed that server confirms that the file to be transmitted is matched with deposit file File, i.e., after file to be transmitted is identical as deposit file), the verifying target letter of file to be transmitted can be determined according to the deposit file Breath.Terminal device receive verifying target information after, can it is described verifying target information determine the file to be transmitted at least one Identification information determines at least one target data for needing to verify in the file to be transmitted according to verification information, then divides The identification information for not calculating each target data generates verification information using at least one obtained identification information, retransmits verifying Information is to server.Confidence level of the server according to verification information checking file, i.e., determine according to identification information and prestore file Identification information whether match, with this come verify in terminal device whether the actual stored file to be transmitted, then confirm mark The actual stored file to be transmitted is thought after information matches, therefore the information of the file to be transmitted can be transmitted, and terminal receives Confirm that file uploads successfully after the information of the file to be transmitted, it is subsequent when needing this document, it can be according to the file to be transmitted Information obtains this document from server.
In conclusion can be determined according to deposit file to be passed after server confirms that file to be transmitted is matched with deposit file The verifying target information of defeated file, so that terminal device can be calculated based on verifying target information, at least one in file to be transmitted The identification information of target data, server judge the identification information of the file to be transmitted again, with the mark of corresponding deposit file Whether information matches, and confirms after confirming identification information match and is stored with the file to be transmitted in terminal device, therefore is transmittable The information of the file to be transmitted prevents from forging to guarantee that file exists in server and client side by verification information The problem of information stealth file, guarantees the safety of information.
In order to improve the safety that the second passes function, the present embodiment may include two stages, a stage for file transmission It is inquiry phase, for inquiring whether file to be transmitted is deposit file in server, if deposit file, then second biography can be performed Function passes the stage into second stage, that is, second, in order to guarantee the safety of file, it may be verified that whether terminal device is locally really deposited This document is stored up, second biography function is provided for the terminal device of necessary being file, it is notified to upload successfully.
Referring to Fig. 4, another data for showing the embodiment of the present application transmit interaction schematic diagram.
402, terminal device is according to file generated the file information to be transmitted.
For the file information for the determining and matched deposit file of file to be transmitted, the file information includes institute State the file identification information of file to be transmitted.
404, terminal device sends the file information of file to be transmitted to server.
406, server obtains at least one file identification information from the file information.
408, server judges that the file identification information of the file to be transmitted, the file identification information with deposit file are No matching.
If 410a, file identification information mismatch, server sends response message and informs transmitting file on terminal device;? Transmitting file is to server on 412a, terminal device.
If 410b, file identification information match, server determines the verifying target letter of file to be transmitted according to deposit file Breath, and send the verifying target information.
412b, terminal device determine at least one mark letter of the file to be transmitted according to the verifying target information Breath generates verification information according to the identification information.Terminal device sends the verification information.
414, server is from least one identification information obtained in the file to be transmitted in verification information.
416, server judges the identification information of the file to be transmitted, with the identification information of corresponding deposit file whether Match.The identification information that target information is verified according to deposit file determines, consequently facilitating the identification information of file to be transmitted and having deposited Matching between the identification information of file.
418, server generates the storage information of the file to be transmitted after confirming identification information match, and sends institute State storage information.In addition, file that is, to be transmitted is insincere if server authentication does not pass through, also ignore the upload to this document, Can also feedback transmission failure response message, hereafter terminal device can be transmitted to file to server, the above transmitting file.
Referring to Fig. 5, the step process of terminal equipment side in another document transmission method embodiment of the application is shown Figure.
Step 502, at least one file identification information of the file to be transmitted is calculated, extremely by the file to be transmitted A kind of few file identification information is as the file information.
Step 504, the file information of file to be transmitted is sent.
Wherein, at least one file identification information that the file to be transmitted can be calculated, if file identification information is message Abstract, then can calculate file to be transmitted (Message-Digest Algorithm 5, Message Digest Algorithm 5) value, At least one of SHA (Secure Hash Algorithm, Secure Hash Algorithm) value, base64 value, by the text to be transmitted At least one file identification information of part is as the file information.The file size that file to be transmitted can also be obtained, in the file The file size of the file to be transmitted is added in information.That is the file information file identification information and text that include file to be transmitted Part size, this document identification information can be eap-message digest, and eap-message digest includes md5 value, SHA value, base64 value etc..It can also be in text Carried terminal information such as MAC Address, user information such as user identifier etc. in part information.Then the file information is sent to service Device, so that server file identification information file-based and file size are verified whether to store the file to match.
Step 506, verifying target information is received.
If server judges that file to be transmitted and deposit file mismatch, the response message of upper transmitting file can be transmitted, eventually End equipment sends file to be transmitted to server after receiving the transmission response information for indicating upper transmitting file.If server is sentenced The file to be transmitted that breaks is matched with deposit file, then generates verifying target information and be sent to terminal device.The embodiment of the present application with For server judges that file to be transmitted is matched with deposit file.
Step 508, according to the verifying target information, determine that the file to be transmitted corresponds at least one target area.
Step 510, the identification information for calculating the target area corresponding data generates verifying letter according to the identification information Breath.
Step 512, the verification information is sent to server.
The present embodiment is by taking deposit file in server is matched with file to be transmitted as an example, and the verifying target information is for determining The verify data that terminal device improves determines the target area of extraction target data such as to calculate identification information.Therefore it is receiving To after verifying target information, at least one target area can be determined according to the verifying target information, from the file to be transmitted Target data is extracted respectively in each target area, calculates the corresponding identification information of each target data such as eap-message digest.Therefore it calculates The identification information of one or more parts in file to be transmitted, such as calculate message every the 1024KB data for extracting 20KB and pluck It wants.The region of the calculating identification information is the region that the corresponding deposit file to match also calculates identification information in server, Consequently facilitating the matching judgment of server.In the embodiment of the present application, verification information may include more than one eap-message digest, then is more than One message, which is plucked, to be calculated according to discrete target area corresponding data in the file to be transmitted.I.e. from text to be transmitted In part determine more than one target area when, each target area be it is discrete, the eap-message digest obtained from is text to be transmitted The eap-message digest of non-continuous data in part.
Wherein, in an alternative embodiment, according to the verifying target information, determine that the file to be transmitted is corresponding at least One target area, comprising: obtain at least one data length and at least one offset from verifying target information;According to institute Offset and data length are stated, target area is determined from the file to be transmitted.Can from verifying target information in obtain to A few data length and at least one offset, data length is the data length for needing to calculate eap-message digest target area, Difference according to data length can determine different size of target area, and offset is used to determine the initial position of target area, The initial position of target area can be then determined based on offset, be based on the corresponding stop bit in the data length field initial position It sets, so that it is determined that target area out, then extraction data are identified the calculating of information from the target area.Wherein, work as data When length and more than one offset, verifies the matching gone back between recorded data length and offset in target information and close System, so as to accurately determine target area.
In the embodiment of the present application, after determining target area, the algorithm for calculating identification information, different identification may further determine that Information is determined according to algorithms of different, wherein identification information includes eap-message digest, and eap-message digest comprises at least one of the following: md5 Value, SHA value, base64 value.Wherein, SHA value includes sha1, sha125, sha256, the eap-message digest of the SHA such as sha512 family. Therefore corresponding algorithm can be taken to be calculated above-mentioned various eap-message digests, progress between the eap-message digest of same type With judgement.
In one alternative embodiment of the application, the verifying target information includes: gap marker, this, which is preached, is identified as service The mark of device and terminal equipment in communication corresponding channel, such as session session is established between server and terminal device, then channel It is identified as sessionId, the sessionId can be set to the character string that a length is 48.It can be solved from gap marker The creation time and expired time of the transmission channel is precipitated.In addition, further including signed data in gap marker to guarantee that transmission is logical The unforgeable of road mark, such as signed data is the auth_md5 to sign through user key.It can then be marked according to the channel Know and judges whether corresponding transmission channel is effective;After judging that transmission channel is effective, the step of sending the verification information is executed. Judge whether corresponding transmission channel is effective according to the gap marker, such as judges whether according to creation time, expired time Within effective time, for another example judge whether it is correct etc. according to signed data.If transmission channel in vain if the message can be ignored Or tell the server is transmitted again;If transmission channel effectively if can carry out subsequent step.Wherein, target data can calculated The validity of transmission channel is judged before eap-message digest, or the validity of transmission channel is judged before sending the verification information.
Step 514, storage information is received.
After server judges verification information by verification, i.e., corresponding mark in the identification information and deposit file of file to be transmitted After knowing information matches, server produces the file identification of the file to be transmitted, and determines the storages such as corresponding storage address letter Breath, feeds back to middle sight equipment for the storage information, and to identify the file transmission success to be transmitted, terminal device is believed according to the storage The information such as file identification, the storage address for determining respective file are ceased, subsequent acquisition is convenient for.
Referring to Fig. 6, show the step flow chart of server side in another document transmission method embodiment of the application.
Step 602, the file information for receiving the file to be transmitted, obtains at least one file from the file information Identification information.
Server can receive the file information that terminal device is sent, and this document information may be notified that the terminal device text to be uploaded Part, therefore the file identification information of the file to be transmitted can be obtained from this document information, this document identification information can characterize The data content of file to be transmitted, and the file size of the file to be transmitted can be obtained from the file information.
Step 604, the file identification information for judging the file to be transmitted, with the file identification information of deposit file whether Matching.
Then the file identification information of deposit file in the file identification information and server of the file to be transmitted can be used It is matched,.If so, the file identification information of file i.e. to be transmitted is matched with the file identification information of deposit file, step is executed Rapid 608;If it is not, the file identification information of file i.e. to be transmitted and the file identification information of deposit file mismatch, step is executed 606.Wherein, if the file identification information of file to be transmitted is identical with the file identification information of deposit file, can confirm to be passed Defeated file and the deposit file are same file, i.e., data content having the same.
Step 606, it generates and sends response message and informs transmitting file on terminal device.
Step 608, judging the file size of the file to be transmitted, the file size with the deposit file of Corresponding matching is It is no to match.
After the file identification information of the file identification information and deposit file that judge file to be transmitted matches, also it can determine whether Whether the file size for the deposit file that this document identification information matches and the file size of file to be transmitted match.If It is to execute step 610;If it is not, executing step 606.
Step 610, according to the corresponding identification information of the deposit file, target area is corresponded to using at least one identification information Domain determines verifying target information.
To which terminal device can obtain the storage record or storage information of deposit file, determine this according to the storage information The corresponding identification information of file is deposited, which is calculated according to the corresponding data in target area in deposit file, therefore The target area for calculating identification information determines at least one target area for needing to calculate identification information in file to be transmitted, is based on At least one target area is verified target information.And the gap marker that transmission channel can be obtained, such as server and end It is communicated between end equipment using session (session), then gap marker is sessionId, and addition should in verifying target information Gap marker.
Wherein, documentary various information are stored in the storage record of deposit file or storage information, such as the storage of file File identification information that address, at least one algorithm obtain, file size, at least one target area corresponding data in file Identification information etc. further, since file identification information can uniquely characterize the data content of a file, therefore is deposited in different user When containing same file (i.e. the file of same data content), a file identification can be distributed for each user, institute is useful certainly Family can also share this document mark, therefore the also recordable file identification in storage record or storage information, also can record and text Part identifies corresponding each user identifier.It separates alternatively, file is stored information and user data in the server, i.e. file is deposited The information for storing up storage file in information, such as at least one target area corresponding data in file identification information, file size, file Identification information, stored in user data: file identification, user identifier, uplink time etc., by the user data and file Storage information establishes mapping relations, to can find this document based on file identification, can also be searched based on file identification information To corresponding user.
In one alternative embodiment of the application, target area is corresponded to using at least one identification information and determines verifying target letter Breath, comprising: correspond to target area according at least one described identification information, determine offset and data length;Using described inclined Shifting amount and data length generate verifying target information.Its meter can be determined according to the deposit file to match with file to be transmitted Each target area for having identification information is calculated, so that middle at least one target area of selection calculates offset and data length, then Offset can be used and data length generates verifying target information.
Step 612, the verifying target information is sent.
Transmittable verifying target information is to server.
Step 614, verification information is received.
Terminal device generates verification information according to verifying target information, and returns to verification information to server.Wherein, it verifies Information includes the identification information of gap marker He at least one target area corresponding data.
Step 616, the identification information of target area corresponding data is obtained from the verification information.
Step 618, the identification information for judging the file to be transmitted, with the identification information of corresponding deposit file whether Match.
The identification information of Acquisition channel mark and target area corresponding data, then uses foundation from the verification information The transmission channel mark and the eap-message digest of the target area corresponding data carry out the inspection of file trust to be transmitted, if It is both credible by verification confirmation, it is otherwise insincere.
Whether the identification information that can determine whether the file to be transmitted, match with the identification information of corresponding deposit file;If so, That is identification information match executes step 620;If it is not, i.e. identification information mismatches, the process can be terminated, or execute step 606, instruction terminal equipment uploads respective file.
In one alternative embodiment, i.e., judge whether corresponding transmission channel is effective according to the gap marker;Judging After transmission channel is effective, the step of sending the verification information is executed.Corresponding transmission channel is judged according to the gap marker Whether effectively, such as according to creation time, expired time judge whether within effective time, be according to signed data judgement for another example No is correct etc..And also it can judge whether Replay Attack occur based on gap marker, to judge the effective of transmission channel Property, i.e., after being used, meeting be marked as having used one effective gap marker (such as sessionId) in server-side, thus After encountering identical gap marker again, server-side can refuse this request, prevent from being cut in transmission process due to verification information It gets and leads to Replay Attack occur.If transmission channel in vain if the message can be ignored;If transmission channel effectively if can carry out after Continuous step.
Step 620, file identification is distributed for the file to be transmitted, and by the file identification and the deposit file pair Record should be stored and establish incidence relation.
Step 622, it using the file address stored in record and/or the file identification, generates described to be transmitted The storage information of file.
Step 624, the storage information is sent.
Confirming file credible to be transmitted, i.e. gap marker is effective, and after identification information match, can be identical according to correspondence Deposit file generates a new file identification, and this document mark is distributed to the file to be transmitted, and by file identification and The corresponding storage record of the deposit file establishes incidence relation, i.e., storage record is corresponding is associated with terminal device and to go up transmitting file File identification.So as to from the storage record in obtain file address, and/or, obtain this document mark, using file Location and/or the file identification, the storage information for generating the file to be transmitted return to the storage information to terminal device, to accuse Know that terminal device file uploads successfully, completes second biography function.
In the embodiment of the present application, eap-message digest is comprised at least one of the following: md5 value, SHA value, base64 value.Wherein, SHA Value includes sha1, sha125, sha256, the eap-message digest of the SHA such as sha512 family.
Therefore in an alternative embodiment, file to be transmitted can be carried in the file information in inquiry phase and is calculated at least A kind of eap-message digest, to carry out the judgement that file to be transmitted corresponds to storage state.It can be md5 in inquiry phase the file information The combination of the eap-message digests and file size such as value can also be the combination of two kinds or more of eap-message digest, such as md5 value and sha1 value The combination of equal hash functions.Also, for verification information, disappearing for a target area corresponding data can be calculated in file to be transmitted Breath abstract such as md5 value, can also calculate the eap-message digest of multiple discontinuous target area corresponding datas.
To sum up, many factors such as eap-message digest, file size can be used to uniquely determine a file in the embodiment of the present application, To whether be stored with respective file in query service device.On this basis, it greatly reduces attacker's spurious information and steals text The probability of part.
Secondly, passing the stage in the second, judge that client possesses this document by the way that in file, the eap-message digest of target area is used as One of judgment criteria, it is therefore prevented that provide the second in the case where client does not have file for it and pass function, is i.e. client is not having In the case where file can not second transmitting file, improve the safety of data.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented Necessary to example.
The embodiment of the present application also provides a kind of file transfer means, are applied to server.
Referring to Fig. 7, a kind of structural block diagram of file transfer means embodiment of the application is shown, can specifically include as follows Module:
Target sending module 702 for determining the verifying target information of file to be transmitted according to deposit file, and sends institute State verifying target information, wherein the file to be transmitted is matched with deposit file.
Module 704 is obtained, for obtaining at least one of described file to be transmitted mark from received verification information Information, the identification information are determined according to the verifying target information.
Judgment module 706, for judging the identification information of the file to be transmitted, with the identification information of corresponding deposit file Whether match.
Sending module 708 is stored, for sending the information of the file to be transmitted after confirming identification information match.
To sum up, after server confirms that file to be transmitted is matched with deposit file, text to be transmitted can be determined according to deposit file The verifying target information of part, so that terminal device can be calculated based on verifying target information, at least one target in file to be transmitted The identification information of data, server judge the identification information of the file to be transmitted again, with the identification information of corresponding deposit file Whether match, confirm after confirming identification information match and be stored with the file to be transmitted in terminal device, therefore is transmittable described The information of file to be transmitted prevents spurious information to guarantee that file exists in server and client side by verification information The problem of steal files, guarantees the safety of information.
Wherein, the identification information includes: eap-message digest.The eap-message digest comprises at least one of the following: eap-message digest The 5th edition md5 value of algorithm, Secure Hash Algorithm SHA value, base64 value.
The target sending module 702, for being marked using at least one according to the corresponding identification information of the deposit file Know information and corresponds to the determining verifying target information in target area.
The target sending module 702 determines offset for corresponding to target area according at least one described identification information Amount and data length;Verifying target information is generated using the offset and data length.
Wherein, the identification information is generated according to the data of target area in the file to be transmitted.If the mark letter Cease it is more than one, then each identification information according to target area corresponding data discrete in the file to be transmitted calculate determine.
The target sending module 702, is also used to obtain the gap marker of transmission channel, in the verifying target information Add the gap marker of the transmission channel.
The judgment module 706 is also used to judge whether the transmission channel is effective according to the gap marker; If the transmission channel is effective, the matching judgment of the identification information is executed.
Wherein, the acquisition module 704, is also used to receive the file information of the file to be transmitted, believes from the file At least one file identification information is obtained in breath;The judgment module 706 is also used to judge the files-designated of the file to be transmitted Know information, whether is matched with the file identification information of deposit file;If file identification information matches, the text to be transmitted is confirmed Part and deposit file matching.
The file information further include: the file size of the file to be transmitted;The judgment module 706, is also used to sentence Break the file size of the file to be transmitted, whether matches with the file size of the matched deposit file of file identification information; If file size matches, the file to be transmitted and deposit file matching are confirmed.
The information of the file to be transmitted includes the storage information of the file to be transmitted, the storage sending module 708, It is also used to distribute file identification for the file to be transmitted, and the file identification and the corresponding storage of the deposit file is recorded Establish incidence relation;Using the file address stored in record and/or the file identification, the file to be transmitted is generated Storage information
The embodiment of the present application also provides a kind of file transfer means, are applied to terminal device.
Referring to Fig. 8, show the structural block diagram of the application another kind file transfer means embodiment, can specifically include as Lower module:
Receiving module 802, for receive verifying target information, wherein the verifying target information be foundation with it is to be transmitted The matched deposit file of file generates;And receive the information of the file to be transmitted.
Verification information determining module 804, for determining the file to be transmitted at least according to the verifying target information One identification information generates verification information according to the identification information.
Sending module 806, for sending the verification information.
To sum up, after server confirms that file to be transmitted is matched with deposit file, text to be transmitted can be determined according to deposit file The verifying target information of part, so that terminal device can be calculated based on verifying target information, at least one target in file to be transmitted The identification information of data, server judge the identification information of the file to be transmitted again, with the identification information of corresponding deposit file Whether match, confirm after confirming identification information match and be stored with the file to be transmitted in terminal device, therefore produces described The storage information of file to be transmitted prevents from forging to guarantee that file exists in server and client side by verification information The problem of information stealth file, guarantees the safety of information.
Referring to Fig. 9, the structural block diagram of the application another kind file transfer means alternative embodiment is shown.
Wherein, the identification information includes: eap-message digest.The eap-message digest comprises at least one of the following: eap-message digest The 5th edition md5 value of algorithm, Secure Hash Algorithm SHA value, base64 value.
Verification information determining module 804, comprising: region determines submodule 8042 and computational submodule 8044.
Region determines submodule 8042, for determining that the file to be transmitted is corresponding extremely according to the verifying target information A few target area.
Computational submodule 8044, for calculating the identification information of the target area corresponding data.
The region determines submodule 8044, for obtaining at least one data length and at least from verifying target information One offset;According to the offset and data length, target area is determined from the file to be transmitted.
The verifying target information includes: gap marker;The verification information determining module 804 is also used to according to described in Gap marker judges whether corresponding transmission channel is effective;After confirmation transmission channel is effective, the hair of the verification information is executed It send.
Wherein, if the verification information includes more than one identification information, each identification information is according to the text to be transmitted Discrete target area corresponding data, which calculates, in part determines.
The device further include:
The file information determining module 808 for generating the file information of the file to be transmitted, and sends file to be transmitted The file information, wherein the file information is for determining with the matched deposit file of file to be transmitted.
The file information determining module 808, for calculating at least one file identification information of the file to be transmitted, Using at least one file identification information of the file to be transmitted as the file information.
The file information determining module 808 is also used to obtain the file size of the file to be transmitted, in the file The file size of the file to be transmitted is added in information.
In the embodiment of the present application, eap-message digest is comprised at least one of the following: md5 value, SHA value, base64 value.Wherein, SHA Value includes sha1, sha125, sha256, the eap-message digest of the SHA such as sha512 family.
Therefore in an alternative embodiment, two kinds that file to be transmitted calculates can be carried in the file information in inquiry phase Or above eap-message digest, to carry out the judgement that file to be transmitted corresponds to storage state.Can be in inquiry phase the file information The combination of the eap-message digests such as md5 value and file size can also be the combination of two kinds or more of eap-message digest, such as md5 value and The combination of other hash functions of sha1 value.Also, for the second verification information, 1 target area in file to be transmitted can be calculated The eap-message digest of corresponding data such as md5 value can also calculate the eap-message digest of multiple discontinuous target area corresponding datas.
To sum up, many factors such as eap-message digest, file size can be used to uniquely determine a file in the embodiment of the present application, To whether be stored with respective file in query service device.On this basis, it greatly reduces attacker's spurious information and steals text The probability of part.
Secondly, passing the stage in the second, judge that client possesses this document by the way that in file, the eap-message digest of target area is used as One of judgment criteria, it is therefore prevented that provide the second in the case where client does not have file for it and pass function, is i.e. client is not having In the case where file can not second transmitting file, improve the safety of data.
The embodiment of the present application also provides a kind of non-volatile readable storage medium, be stored in the storage medium one or Multiple modules (programs) when the one or more module is used in terminal device, can make the terminal device execute The instruction (instructions) of various method steps in the embodiment of the present application.
In one alternative embodiment, comprising: one or more machine readable medias are stored thereon with instruction, when by one Or multiple processors are when executing, so that terminal device executes file transmission side described in one or more in the embodiment of the present application Method.
In another alternative embodiment, comprising: one or more machine readable medias are stored thereon with instruction, when by one When a or multiple processors execute, so that server executes file transmission side described in one or more in the embodiment of the present application Method.
Figure 10 is the hardware structural diagram for the equipment that one embodiment of the application provides.The equipment may include server, end The various equipment such as end equipment, Temperature-controlled appliance.As shown in Figure 10, which may include input equipment 100, processor 101, output equipment 102, memory 103 and at least one communication bus 104.Communication bus 104 is for realizing between element Communication connection.Memory 103 may include high speed RAM memory, it is also possible to further include non-volatile memories NVM, for example, at least One magnetic disk storage can store various programs in memory 103, for completing various processing functions and realizing this implementation The method and step of example.
Optionally, above-mentioned processor 101 can be for example central processing unit (Central Processing Unit, abbreviation CPU), application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable Logical device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are real Existing, which is coupled to above-mentioned input equipment 100 and output equipment 102 by wired or wireless connection.
Optionally, above-mentioned input equipment 100 may include a variety of input equipments, such as may include user oriented user At least one of interface, device oriented equipment interface, the programmable interface of software, camera, sensor.Optionally, the face It can be wireline interface for carrying out data transmission between equipment and equipment to the equipment interface of equipment, can also be for setting Standby hardware insertion interface (such as USB interface, serial ports etc.) carried out data transmission between equipment;Optionally, the user oriented User interface for example can be user oriented control button, for receive voice input voice-input device and user Receive the touch awareness apparatus (such as touch screen, Trackpad with touch sensing function etc.) of user's touch input;Optionally, The programmable interface of above-mentioned software for example can be the entrance for editing or modifying program for user, such as the input pin of chip Interface or input interface etc.;Optionally, above-mentioned transceiver can be rf chip with communication function, at base band Manage chip and dual-mode antenna etc..The audio input device such as microphone can receive voice data.Output equipment 102 may include The output equipments such as display, sound equipment.
In the present embodiment, the processor of the terminal device includes for executing each module of data processing equipment in each equipment Function, concrete function and technical effect are referring to above-described embodiment, and details are not described herein again.
Figure 11 is the hardware structural diagram for the terminal device that another embodiment of the application provides.Figure 11 is to Figure 10 in reality A specific embodiment during now.As shown in figure 11, the terminal device of the present embodiment includes processor 111 and storage Device 112.
Processor 111 executes the computer program code that memory 112 is stored, and realizes Fig. 1 to Fig. 6 in above-described embodiment Document transmission method.
Memory 112 is configured as storing various types of data to support the operation in terminal device.These data Example includes the instruction of any application or method for operating on the terminal device, such as message, picture, video etc.. Memory 112 may include random access memory (random access memory, abbreviation RAM), it is also possible to further include non- Volatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Optionally, processor 111 is arranged in processing component 110.The terminal device can also include: communication component 113, Power supply module 114, multimedia component 115, audio component 116, input/output interface 117 and/or sensor module 118.Terminal Component that equipment is specifically included etc. is set according to actual demand, and the present embodiment is not construed as limiting this.
The integrated operation of the usual controlling terminal equipment of processing component 110.Processing component 110 may include one or more places Device 111 is managed to execute instruction, to complete all or part of the steps of above-mentioned Fig. 1 to Fig. 6 method.In addition, processing component 110 can be with Including one or more modules, convenient for the interaction between processing component 110 and other assemblies.For example, processing component 110 can wrap Multi-media module is included, to facilitate the interaction between multimedia component 115 and processing component 110.
Power supply module 114 provides electric power for the various assemblies of terminal device.Power supply module 114 may include power management system System, one or more power supplys and other with for terminal device generate, manage, and distribute the associated component of electric power.
Multimedia component 115 includes the display screen of one output interface of offer between terminal device and user.One In a little embodiments, display screen may include liquid crystal display (LCD) and touch panel (TP).If display screen includes touch surface Plate, display screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touchings Sensor is touched to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or cunning The boundary of movement, but also detect duration and pressure associated with the touch or slide operation.
Audio component 116 is configured as output and/or input audio signal.For example, audio component 116 includes a Mike Wind (MIC), when terminal device is in operation mode, when such as speech recognition mode, microphone is configured as receiving external audio letter Number.The received audio signal can be further stored in memory 112 or send via communication component 113.In some realities It applies in example, audio component 116 further includes a loudspeaker, is used for output audio signal.
Input/output interface 117 provides interface, above-mentioned peripheral interface between processing component 110 and peripheral interface module Module can be click wheel, button etc..These buttons may include, but are not limited to: volume button, start button and locking press button.
Sensor module 118 includes one or more sensors, and the state for providing various aspects for terminal device is commented Estimate.For example, sensor module 118 can detecte the state that opens/closes of terminal device, the relative positioning of component, Yong Huyu The existence or non-existence of terminal device contact.Sensor module 118 may include proximity sensor, be configured to do not appointing Detected the presence of nearby objects when what physical contact, including detection user between terminal device at a distance from.In some embodiments In, which can also be including camera etc..
Communication component 113 is configured to facilitate the communication of wired or wireless way between terminal device and other equipment.Eventually End equipment can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In one embodiment In, it may include SIM card slot in the terminal device, which step on terminal device for being inserted into SIM card GPRS network is recorded, is communicated by internet with server foundation.
From the foregoing, it will be observed that communication component 113, audio component 116 involved in Figure 11 embodiment and input/output connect Mouth 117, sensor module 118 can be used as the implementation of the input equipment in Figure 10 embodiment.
In a kind of terminal device of the present embodiment, comprising: one or more processors;Be stored thereon with instruction One or more machine readable medias, when being executed by one or more of processors, so that the terminal device executes such as Method described in one or more in the embodiment of the present application.
In a kind of server of the present embodiment, comprising: one or more processors;Be stored thereon with the one of instruction A or multiple machine readable medias, when being executed by one or more of processors, so that the server executes such as this Shen It please method described in one or more in embodiment.
The embodiment of the present application also provides a kind of operating system for terminal device, as shown in figure 12, the operation of the equipment System includes: receiving unit 1202, authentication unit 1204 and communication unit 1206.
Receiving unit 1202 receives verifying target information, wherein the verifying target information is foundation and file to be transmitted What matched deposit file generated;And receive the information of the file to be transmitted.
Authentication unit 1204 determines at least one mark letter of the file to be transmitted according to the verifying target information Breath generates verification information according to the identification information.
Communication unit 1006 sends the verification information.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to a kind of document transmission method provided herein, a kind of file transfer means, a kind of terminal device, one Kind of storage medium, a kind of operating system, are described in detail, used herein principle and reality of the specific case to the application The mode of applying is expounded, the description of the example is only used to help understand the method for the present application and its core ideas;Together When, for those of ordinary skill in the art, according to the thought of the application, have in specific embodiments and applications Change place, in conclusion the contents of this specification should not be construed as limiting the present application.

Claims (33)

1. a kind of document transmission method characterized by comprising
The verifying target information of file to be transmitted is determined according to deposit file, and sends the verifying target information, wherein described File to be transmitted is matched with deposit file;
From at least one identification information obtained in received verification information in the file to be transmitted, the identification information foundation The verifying target information determines;
Whether the identification information for judging the file to be transmitted, match with the identification information of corresponding deposit file;
After confirming identification information match, the information of the file to be transmitted is sent.
2. the method according to claim 1, wherein the identification information includes: eap-message digest.
3. according to the method described in claim 2, it is characterized in that, the eap-message digest comprises at least one of the following: message is plucked Want the 5th edition md5 value of algorithm, Secure Hash Algorithm SHA value, base64 value.
4. the method according to claim 1, wherein the verifying for determining file to be transmitted according to deposit file Target information, comprising:
According to the corresponding identification information of the deposit file, target area is corresponded to using at least one identification information and determines verifying mesh Mark information.
5. being determined the method according to claim 1, wherein corresponding to target area using at least one identification information Verify target information, comprising:
Target area is corresponded to according at least one described identification information, determines offset and data length;
Verifying target information is generated using the offset and data length.
6. method according to claim 4 or 5, which is characterized in that the identification information is according in the file to be transmitted The data of target area generate.
7. according to the method described in claim 6, it is characterized in that, if the identification information is more than one, each identification information It calculates and determines according to target area corresponding data discrete in the file to be transmitted.
8. the method according to claim 1, wherein further include:
The gap marker for obtaining transmission channel adds the gap marker of the transmission channel in the verifying target information.
9. according to the method described in claim 8, it is characterized by further comprising:
According to the gap marker, judge whether the transmission channel is effective;
If the transmission channel is effective, the matching judgment step of the identification information is executed.
10. the method according to claim 1, wherein further include:
The file information for receiving the file to be transmitted, obtains at least one file identification information from the file information;
Whether the file identification information for judging the file to be transmitted, match with the file identification information of deposit file;
If file identification information matches, the file to be transmitted and deposit file matching are confirmed.
11. according to the method described in claim 10, it is characterized in that, the file information further include: the file to be transmitted File size;After the judgement file identification information matching, further includes:
The file size for judging the file to be transmitted, with the file size of the matched deposit file of file identification information whether phase Matching;
If file size matches, the file to be transmitted and deposit file matching are confirmed.
12. the method according to claim 1, wherein the information of the file to be transmitted includes: described to be transmitted The storage information of file, the method further include:
File identification is distributed for the file to be transmitted, and the file identification and the corresponding storage record of the deposit file are built Vertical incidence relation;
Using the file address stored in record and/or the file identification, the storage letter of the file to be transmitted is generated Breath.
13. a kind of document transmission method characterized by comprising
Receive verifying target information, wherein the verifying target information is according to raw with the matched deposit file of file to be transmitted At;
At least one identification information that the file to be transmitted is determined according to the verifying target information, according to the identification information Generate verification information;
Send the verification information;
Receive the information of the file to be transmitted.
14. according to the method for claim 13, which is characterized in that the identification information includes: eap-message digest.
15. according to the method for claim 14, which is characterized in that the eap-message digest comprises at least one of the following: message The 5th edition md5 value of digest algorithm, Secure Hash Algorithm SHA value, base64 value.
16. according to the method for claim 13, which is characterized in that it is described according to the verifying target information determine described in Transmit at least one identification information of file, comprising:
According to the verifying target information, determine that the file to be transmitted corresponds at least one target area;
Calculate the identification information of the target area corresponding data.
17. according to the method for claim 16, which is characterized in that according to the verifying target information, determine described to be passed Defeated file corresponds at least one target area, comprising:
At least one data length and at least one offset are obtained from verifying target information;
According to the offset and data length, target area is determined from the file to be transmitted.
18. according to the method for claim 13, which is characterized in that the verifying target information includes: gap marker;It is described Method further include:
According to the gap marker, judge whether corresponding transmission channel is effective;
After confirmation transmission channel is effective, the step of sending the verification information is executed.
19. method according to claim 16 or 17, which is characterized in that if the verification information includes more than one mark Information, then each identification information is calculated according to target area corresponding data discrete in the file to be transmitted and is determined.
20. according to the method for claim 13, which is characterized in that further include:
The file information of the file to be transmitted is generated, and sends the file information of file to be transmitted, wherein the file information For the determining and matched deposit file of file to be transmitted.
21. according to the method for claim 20, which is characterized in that the file information for generating the file to be transmitted, Include:
At least one file identification information for calculating the file to be transmitted, by least one files-designated of the file to be transmitted Information is known as the file information.
22. according to the method for claim 21, which is characterized in that further include:
The file size for obtaining the file to be transmitted, the file that the file to be transmitted is added in the file information are big It is small.
23. a kind of file transfer means characterized by comprising
Target sending module for determining the verifying target information of file to be transmitted according to deposit file, and sends the verifying Target information, wherein the file to be transmitted is matched with deposit file;
Module is obtained, for from least one identification information obtained in the file to be transmitted in received verification information, institute Identification information is stated to determine according to the verifying target information;
Judgment module, for judging the identification information of the file to be transmitted, with the identification information of corresponding deposit file whether Match;
Sending module is stored, for sending the information of the file to be transmitted after confirming identification information match.
24. device according to claim 23, which is characterized in that the identification information includes: eap-message digest.
25. device according to claim 23, which is characterized in that
The acquisition module is also used to receive the file information of the file to be transmitted, obtains from the file information at least One file identification information;
The judgment module is also used to judge the file identification information of the file to be transmitted, the file identification with deposit file Whether information matches;If file identification information matches, the file to be transmitted and deposit file matching are confirmed.
26. a kind of file transfer means characterized by comprising
Receiving module, for receiving verifying target information, wherein the verifying target information is that foundation is matched with file to be transmitted Deposit file generate;And receive the information of the file to be transmitted;
Verification information determining module, for determining at least one mark of the file to be transmitted according to the verifying target information Information generates verification information according to the identification information;
Sending module, for sending the verification information.
27. device according to claim 26, which is characterized in that the identification information includes: eap-message digest.
28. device according to claim 26, which is characterized in that further include:
The file information determining module for generating the file information of the file to be transmitted, and sends the file of file to be transmitted Information, wherein the file information is for the determining and matched deposit file of file to be transmitted.
29. a kind of server characterized by comprising
One or more processors;With
One or more machine readable medias of instruction are stored thereon with, when being executed by one or more of processors, are made Obtain method of the server execution as described in one or more in claim 1-12.
30. one or more machine readable medias, are stored thereon with instruction, when executed by one or more processors, so that Server executes the method as described in one or more in claim 1-12.
31. a kind of terminal device characterized by comprising
One or more processors;With
One or more machine readable medias of instruction are stored thereon with, when being executed by one or more of processors, are made Obtain method of the terminal device execution as described in one or more in claim 13-22.
32. one or more machine readable medias, are stored thereon with instruction, when executed by one or more processors, so that Terminal device executes the method as described in one or more in claim 13-22.
33. a kind of operating system for terminal device characterized by comprising
Receiving unit receives verifying target information, wherein the verifying target information is according to matched with file to be transmitted Deposit file generated;And receive the information of the file to be transmitted;
Authentication unit determines at least one identification information of the file to be transmitted according to the verifying target information, according to institute It states identification information and generates verification information;
Communication unit sends the verification information.
CN201710628723.XA 2017-07-28 2017-07-28 File transmission method, device, equipment and storage medium Active CN109309651B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710628723.XA CN109309651B (en) 2017-07-28 2017-07-28 File transmission method, device, equipment and storage medium
PCT/CN2018/095873 WO2019019936A1 (en) 2017-07-28 2018-07-17 File transmission method, apparatus, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710628723.XA CN109309651B (en) 2017-07-28 2017-07-28 File transmission method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109309651A true CN109309651A (en) 2019-02-05
CN109309651B CN109309651B (en) 2021-12-28

Family

ID=65041045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710628723.XA Active CN109309651B (en) 2017-07-28 2017-07-28 File transmission method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN109309651B (en)
WO (1) WO2019019936A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368341A (en) * 2020-03-07 2020-07-03 郑州美林通科技股份有限公司 Electronic marking self-service method and system
CN112491812A (en) * 2020-07-08 2021-03-12 支付宝(杭州)信息技术有限公司 Hash updating method and device of block chain all-in-one machine
CN112738249A (en) * 2020-12-30 2021-04-30 平安证券股份有限公司 File uploading method, device, equipment and storage medium based on quantitative transaction
CN114172890A (en) * 2021-11-03 2022-03-11 阿里巴巴(中国)有限公司 File second-pass processing method and device, storage medium and electronic equipment
US11604633B2 (en) 2020-07-08 2023-03-14 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted startup methods and apparatuses of blockchain integrated station

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112769883A (en) * 2019-11-01 2021-05-07 科美诊断技术股份有限公司 Consumable data uploading method and device
CN112464264B (en) * 2020-12-04 2023-12-29 深信服科技股份有限公司 Information transmission method, system and computer readable storage medium
CN112804312B (en) * 2020-12-31 2023-06-30 上海掌门科技有限公司 File uploading method, equipment and computer readable medium
CN113132462B (en) * 2021-03-15 2022-07-15 深圳震有科技股份有限公司 File data transmission method, system and terminal equipment of 5G virtualized network element
CN112988427B (en) * 2021-04-14 2024-03-01 深圳证券交易所 Data exchange method, device and medium
CN113467825A (en) * 2021-06-30 2021-10-01 完美世界(北京)软件科技发展有限公司 IPA data display system, method, device, equipment and computer readable medium thereof

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070050626A1 (en) * 2005-08-25 2007-03-01 Katsuji Tokie Document management system, document processing computer, signature generating computer, storage medium storing program for document management, and document management method
CN101202624A (en) * 2007-12-24 2008-06-18 北京创毅视讯科技有限公司 Method and system of document transmission
CN101882216A (en) * 2009-05-08 2010-11-10 成都市华为赛门铁克科技有限公司 Method, device and electronic equipment for structuring data fingerprint
CN102325016A (en) * 2011-10-18 2012-01-18 深圳市融创天下科技股份有限公司 Data channel establishment requesting and responding method, system and terminal equipment
US20120117111A1 (en) * 1995-04-11 2012-05-10 Level 3 Communications, Llc Data Distribution in A Data Processing System
US20140172795A1 (en) * 2012-03-02 2014-06-19 Huawei Technologies Co., Ltd. Data processing method and data processing device
CN104410692A (en) * 2014-11-28 2015-03-11 上海爱数软件有限公司 Method and system for uploading duplicated files
CN104883385A (en) * 2015-03-31 2015-09-02 小米科技有限责任公司 Rich media file transmission method and apparatus
CN104935650A (en) * 2015-06-03 2015-09-23 南京传唱软件科技有限公司 File transmission method, system and method
CN104980482A (en) * 2014-12-24 2015-10-14 深圳市腾讯计算机系统有限公司 File transmitting method and device, file receiving method and device
CN106101291A (en) * 2016-08-26 2016-11-09 苏州蓝海彤翔系统科技有限公司 A kind of transmit the method for file, system, server and client
CN106603614A (en) * 2015-10-20 2017-04-26 北京国双科技有限公司 File transmission method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8135922B2 (en) * 2004-11-08 2012-03-13 International Business Machines Corporation Apparatus and method to validate the configuration of an information storage and retrieval system
CN103269302A (en) * 2012-12-07 2013-08-28 北京奇虎科技有限公司 Shared file management method and system for instant messaging
CN104602102B (en) * 2014-07-24 2018-06-01 腾讯科技(北京)有限公司 Transmission response method, apparatus, server and the system of video intercepting content

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120117111A1 (en) * 1995-04-11 2012-05-10 Level 3 Communications, Llc Data Distribution in A Data Processing System
US20070050626A1 (en) * 2005-08-25 2007-03-01 Katsuji Tokie Document management system, document processing computer, signature generating computer, storage medium storing program for document management, and document management method
CN101202624A (en) * 2007-12-24 2008-06-18 北京创毅视讯科技有限公司 Method and system of document transmission
CN101882216A (en) * 2009-05-08 2010-11-10 成都市华为赛门铁克科技有限公司 Method, device and electronic equipment for structuring data fingerprint
CN102325016A (en) * 2011-10-18 2012-01-18 深圳市融创天下科技股份有限公司 Data channel establishment requesting and responding method, system and terminal equipment
US20140172795A1 (en) * 2012-03-02 2014-06-19 Huawei Technologies Co., Ltd. Data processing method and data processing device
CN104410692A (en) * 2014-11-28 2015-03-11 上海爱数软件有限公司 Method and system for uploading duplicated files
CN104980482A (en) * 2014-12-24 2015-10-14 深圳市腾讯计算机系统有限公司 File transmitting method and device, file receiving method and device
CN104883385A (en) * 2015-03-31 2015-09-02 小米科技有限责任公司 Rich media file transmission method and apparatus
CN104935650A (en) * 2015-06-03 2015-09-23 南京传唱软件科技有限公司 File transmission method, system and method
CN106603614A (en) * 2015-10-20 2017-04-26 北京国双科技有限公司 File transmission method and device
CN106101291A (en) * 2016-08-26 2016-11-09 苏州蓝海彤翔系统科技有限公司 A kind of transmit the method for file, system, server and client

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LINGJING ZHOU: "A secure data transmission scheme for wireless sensor networks based on digital watermarking", 《2012 9TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY》 *
胡渝苹: ""文件秒传系统在云存储环境下的设计与实现"", 《计算机应用与软件》 *
胡渝苹: "文件秒传系统在云存储环境下的设计与实现", 《计算机应用与软件》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368341A (en) * 2020-03-07 2020-07-03 郑州美林通科技股份有限公司 Electronic marking self-service method and system
CN112491812A (en) * 2020-07-08 2021-03-12 支付宝(杭州)信息技术有限公司 Hash updating method and device of block chain all-in-one machine
CN112491812B (en) * 2020-07-08 2022-03-01 支付宝(杭州)信息技术有限公司 Hash updating method and device of block chain all-in-one machine
US11604633B2 (en) 2020-07-08 2023-03-14 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted startup methods and apparatuses of blockchain integrated station
US11616636B2 (en) 2020-07-08 2023-03-28 Alipay (Hangzhou) Information Technology Co., Ltd. Hash updating methods and apparatuses of blockchain integrated station
CN112738249A (en) * 2020-12-30 2021-04-30 平安证券股份有限公司 File uploading method, device, equipment and storage medium based on quantitative transaction
CN112738249B (en) * 2020-12-30 2023-11-21 平安证券股份有限公司 File uploading method, device, equipment and storage medium based on quantitative transaction
CN114172890A (en) * 2021-11-03 2022-03-11 阿里巴巴(中国)有限公司 File second-pass processing method and device, storage medium and electronic equipment
CN114172890B (en) * 2021-11-03 2024-02-27 阿里巴巴(中国)有限公司 File second transmission processing method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
WO2019019936A1 (en) 2019-01-31
CN109309651B (en) 2021-12-28

Similar Documents

Publication Publication Date Title
CN109309651A (en) A kind of document transmission method, device, equipment and storage medium
CN109068179B (en) Multi-platform live broadcast method, computer device and computer readable storage medium
WO2018177124A1 (en) Service processing method and device, data sharing system and storage medium
US11611443B2 (en) Network node encryption method and apparatus
US9860357B2 (en) Establishing an authenticated wireless connection between short-range wireless terminals more conveniently
WO2018112940A1 (en) Service execution method and device for blockchain node, and node device
KR102087526B1 (en) Method and apparatus, device and storage medium for data processing between terminals
CN109496419A (en) Document handling method, device and system
US20140115340A1 (en) Unique device identifier provision method and apparatus
CN111601115B (en) Video detection method, related device, equipment and storage medium
JP2017500822A (en) Information communication method, apparatus, and electronic apparatus
WO2017198079A1 (en) File download method and apparatus, user terminal and machine-readable storage medium
WO2021036086A1 (en) Transaction data processing method, apparatus and system, and computer-readable storage medium
CN111461720B (en) Identity verification method and device based on blockchain, storage medium and electronic equipment
EP2978162B1 (en) Anti-counterfeiting verification method, device and system
US20170171270A1 (en) Method and electronic device for controlling video playing
WO2017113840A1 (en) Information recommending method and device
WO2019061629A1 (en) Data verification method, and server
CN103914520B (en) Data query method, terminal device and server
WO2019061626A1 (en) Data verification method, and server
WO2019061598A1 (en) Data verification method and client
CN104166602A (en) Data backup method and device and electronic device
CN111431724A (en) Data transmission method and device and electronic equipment
WO2014022605A1 (en) Attestation of possession of media content items using fingerprints
CN110532324B (en) Block chain-based bulletin information display method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201228

Address after: Room 603, 6 / F, Roche Plaza, 788 Cheung Sha Wan Road, Kowloon, China

Applicant after: Zebra smart travel network (Hong Kong) Limited

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant