CN102801699A - System, method and equipment for preventing data tampering of server - Google Patents

System, method and equipment for preventing data tampering of server Download PDF

Info

Publication number
CN102801699A
CN102801699A CN2011104470943A CN201110447094A CN102801699A CN 102801699 A CN102801699 A CN 102801699A CN 2011104470943 A CN2011104470943 A CN 2011104470943A CN 201110447094 A CN201110447094 A CN 201110447094A CN 102801699 A CN102801699 A CN 102801699A
Authority
CN
China
Prior art keywords
information
modification
server
unauthorized access
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011104470943A
Other languages
Chinese (zh)
Other versions
CN102801699B (en
Inventor
王乃青
桑胜田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ahtech network Safe Technology Ltd
Original Assignee
Beijing Antiy Electronic Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Antiy Electronic Equipment Co Ltd filed Critical Beijing Antiy Electronic Equipment Co Ltd
Priority to CN201110447094.3A priority Critical patent/CN102801699B/en
Publication of CN102801699A publication Critical patent/CN102801699A/en
Application granted granted Critical
Publication of CN102801699B publication Critical patent/CN102801699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a system, a method and equipment for preventing the data tampering of a server. The system comprises a fixed host, a main server and a backup server, wherein the fixed host is used for recording information about a login user and modification operation information, verifying a user key, and transmitting a modification instruction to the main server and the backup server; the main server is used for receiving the modification instruction from the fixed host, receiving running condition information from the backup server, recording illegal access information when receiving information which is not transmitted by the fixed host or the backup server, and giving an alarm; and the backup server is used for receiving the modification instruction from the fixed host and the main server; the main server is connected with a local area network; the backup server is connected with an outer network; and different architectures and operating systems are adopted for the main server and the backup server. By the method, the contents of the server can be effectively prevented from being tampered, and the security of the server is improved.

Description

Prevent system, method and apparatus that server data is distorted
Technical field
The present invention relates to the Host Security field, particularly a kind of system, method and apparatus that prevents that server data from distorting.
Background technology
Along with the Internet era development, computer server can get more and more, and the fail safe of server is more and more important.Existing server much is to adopt backup server to guarantee the integrality of data, uses certain methods data to be encrypted or server is monitored simultaneously.But when server was broken, the integrality of data just can't be preserved, and server data or homepage will be distorted.
Summary of the invention
The invention provides a kind of system, method and apparatus that prevents that server data from distorting, solved server data by malicious modification, and the server data problem that can't guarantee data integrity after by malicious modification.
A kind of system that prevents that server data from distorting comprises:
Fixed host computer is used to write down login user information and retouching operation information, sends the preceding checking of user's modification instruction user key; If user key is correct; Then host verification information is added the user's modification instruction, send to master server and backup server, and confirmation of receipt information; If the user key mistake then produces alarm signal;
Master server is used to receive the user's modification instruction, and judges whether transmitting terminal is fixed host computer; If; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
The ruuning situation information that master server receives and the record backup server sends has judged whether suspicious process or wrong file, if having, then sends modification information and produces alarm signal;
Backup server is used to receive the user's modification instruction, and judges whether transmitting terminal is fixed host computer; If; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
Backup server; Be used for sending ruuning situation information and receiving the modification information that master server sends to master server; And judge whether transmitting terminal is master server, if the modification information of then sending according to master server is carried out file modification; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information.
In the described system, described host verification information comprises at least: the MAC Address of fixed host computer, IP address and CPU information.
In the described system, when the unauthorized access number of times of master server or backup server during greater than preset value, master server or backup server produce alarm signal.
In the described system, described unauthorized access information comprises at least: Hostname, IP address and action type.
In the described system, described master server connects local area network (LAN), and backup server connects outer net, and master server adopts different frameworks and operating system with backup server.
A kind of method that prevents that server data from distorting is applicable to the fixed host computer that prevents in the system that server data distorts, and said method comprises:
Record login user information and retouching operation information;
Verify user key before sending the user's modification instruction,, then host verification information is added the user's modification instruction, send to master server and backup server if user key is correct, and confirmation of receipt information, if the user key mistake then produces alarm signal.
In the described method, described host verification information comprises at least: the MAC Address of fixed host computer, IP address and CPU information.
Said user key can be various ways, like Ukey or disc key etc.
A kind of fixed host computer equipment comprises:
Logging modle is used to write down login user information and retouching operation information;
The key authentication module is used to send the preceding checking of modify instruction user key, if user key is correct, then gets into distribution module, otherwise gets into alarm module;
Distribution module is used for being used for key when correct when checking, and host verification information is added the user's modification instruction, sends to master server and backup server, and confirmation of receipt information;
Alarm module is used for when checking user key mistake, producing alarm signal.
Described equipment, in it is characterized in that, described host verification information comprises at least: the MAC Address of fixed host computer, IP address and CPU information.
A kind of method that prevents that server data from distorting is applicable to the master server that prevents in the system that server data distorts, comprising:
Receive the ruuning situation information that user's modification instruction or backup server send;
If the user's modification instruction judges then whether transmitting terminal is fixed host computer, if; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
If the ruuning situation information that backup server sends then writes down backup server ruuning situation information, and judged whether suspicious process or wrong file,, then send modification information and produce alarm signal if having.
In the described method,, produce alarm signal when unauthorized access number of times during greater than preset value.
In the described method, described unauthorized access information comprises at least: visit Hostname, IP address and action type.
In the described method, described ruuning situation information comprises at least:
The MD5 information of backup server master file and operation process title and number.
In the described method, described modification information is the fileinfo on the corresponding master server of apocrypha.
The method of misjudgment file can do, the MD5 value comparison of corresponding document in the MD5 value of the master file that backup server is sent and the master server in the said method, if identical then file is correct, otherwise file error.If file is correct, then do not feed back any information, if file error, then the file amendment with backup server is the file of master server.
A kind of master server equipment comprises:
Receiver module is used to receive the ruuning situation information that user's modification is instructed or backup server sends;
The fixed host computer authentication module when being used to receive the user's modification instruction, judges whether transmitting terminal is fixed host computer, if then instruction is made amendment according to user's modification, otherwise confirms as unauthorized access;
Logging modle is used for record modification time and action type, unauthorized access number of times and unauthorized access information and backup server ruuning situation information;
Detect and modified module, when being used to receive the ruuning situation information of backup server transmission, judged whether suspicious process or wrong file, if the alarm module of entering and sending module are arranged;
Alarm module is used to produce alarm signal;
Sending module is used for returning confirmation or sending modification information to backup server to fixed host computer.
In the described equipment, when unauthorized access number of times during greater than preset value, alarm module produces alarm signal.
Described logging modle also can be carried out the expansion of recorded content according to demand, sends time and the file content etc. of modification information to backup server like the record master server.
A kind of method that prevents that server data from distorting is applicable to the backup server that prevents in the system that server data distorts, comprising:
Receive the user's modification instruction or send ruuning situation information to master server;
If receive the user's modification instruction, judge then whether transmitting terminal is fixed host computer, if; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
If send ruuning situation information to master server; Then receive the modification information that master server sends; And judge whether transmitting terminal is master server, if the modification information of then sending according to master server is carried out file modification; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information.
In the described method,, produce alarm signal when unauthorized access number of times during greater than preset value.
In the described method, described unauthorized access information comprises at least: visit Hostname, IP address and action type.
In the described method, described ruuning situation information comprises at least: the MD5 information of backup server master file and operation process title and number.
A kind of backup server equipment comprises:
Receiver module is used to receive the modification information that user's modification is instructed and master server sends;
Fixed host computer and master server authentication module; Be used for when receiving the modification information of user's modification instruction or master server transmission, judging whether transmitting terminal is fixed host computer or master server, if fixed host computer; Then get into modified module; If master server then gets into the master server modified module, otherwise confirm as unauthorized access;
Logging modle is used for record modification time and action type and unauthorized access number of times and unauthorized access information;
Modified module is used for making amendment according to user's modification instruction, and returns confirmation;
Safe reporting module is used for sending ruuning situation information to master server;
The master server modified module is used to receive the modification information that master server sends, and carries out file modification according to the modification information that master server sends.
In the described equipment, also comprise alarm module, be used for producing alarm signal when unauthorized access number of times during greater than preset value.
Among the present invention, master server is not directly connected to outer net, but only in local area network (LAN), exists, and backup server connects with outer net, and with main servers link is arranged.In order to guarantee the safety of server, two-server adopts the CPU of different frameworks, and different operating systems is installed, and has increased the difficulty of distorting server data greatly, thereby improves the fail safe of server.Aspect the server content modification, also doing strict restriction, can only use fixing machine to make amendment, fixed host computer also can carry out the external key checking when in use simultaneously.
The invention provides a kind of system, method and apparatus that prevents that server data from distorting.System comprises fixed host computer, master server and backup server, and described fixed host computer is used to write down login user information and retouching operation information and verifies user key, sends modify instruction to master server and backup server; Master server is used to receive the modify instruction of fixed host computer transmission and the ruuning situation information that backup server sends, when receiving the information of on-fixed main frame or backup server transmission, and record unauthorized access information and warning; Backup server is used to receive the modify instruction of fixed host computer and master server transmission.Said master server connects local area network (LAN), and said backup server connects outer net, and master server adopts different frameworks and operating system with backup server.Prevented effectively that through method of the present invention server content from being distorted, improved server security property.
Description of drawings
In order to be illustrated more clearly in the present invention or technical scheme of the prior art; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiment that put down in writing among the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of system schematic that prevents that server data from distorting;
Fig. 2 prevents fixed host computer method flow diagram in the method that server data distorts for a kind of;
Fig. 3 is a kind of fixed host computer equipment structure chart;
Fig. 4 prevents master server method flow diagram in the method that server data distorts for a kind of;
Fig. 5 is a kind of master server equipment structure chart;
Fig. 6 prevents backup server method flow diagram in the method that server data distorts for a kind of;
Fig. 7 is a kind of backup server equipment structure chart.
Embodiment
In order to make those skilled in the art person understand the technical scheme in the embodiment of the invention better, and make above-mentioned purpose of the present invention, feature and advantage can be more obviously understandable, below in conjunction with accompanying drawing technical scheme among the present invention done further detailed explanation.
The invention provides a kind of system, method and apparatus that prevents that server data from distorting, solved server data by malicious modification, and the server data problem that can't guarantee data integrity after by malicious modification.
A kind of system that prevents that server data from distorting, as shown in Figure 1, comprising:
Fixed host computer 101 is used to write down login user information and retouching operation information, sends the preceding checking of user's modification instruction user key; If user key is correct; Then host verification information is added the user's modification instruction, send to master server and backup server, and confirmation of receipt information; If the user key mistake then produces alarm signal;
Master server 102 is used to receive the user's modification instruction, and judges whether transmitting terminal is fixed host computer; If; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
The ruuning situation information that master server receives and the record backup server sends has judged whether suspicious process or wrong file, if having, then sends modification information and produces alarm signal;
Backup server 103 is used to receive the user's modification instruction, and judges whether transmitting terminal is fixed host computer; If; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
Backup server 103 sends ruuning situation information and receives the modification information that master server sends to master server; And judge whether transmitting terminal is master server; If; The modification information of then sending according to master server is carried out file modification, otherwise confirms as unauthorized access, and record unauthorized access number of times and unauthorized access information.
In the described system, described host verification information comprises at least: the MAC Address of fixed host computer, IP address and CPU information.
In the described system, when the unauthorized access number of times of master server or backup server during greater than preset value, master server or backup server produce alarm signal.
In the described system, described unauthorized access information comprises at least: Hostname, IP address and action type.
In the described system, described master server connects local area network (LAN), and backup server connects outer net, and master server adopts different frameworks and operating system with backup server.Adopt X86 framework window operating system like master server, backup server adopts ARM framework (SuSE) Linux OS.
A kind of method that prevents that server data from distorting is applicable to the fixed host computer that prevents in the system that server data distorts, and as shown in Figure 2, said method comprises:
S201: record login user information and retouching operation information;
S202: verify user key before sending the user's modification instruction, if user key is correct, then carry out S203, if the user key mistake is then carried out S205;
S203: host verification information is added the user's modification instruction, send to master server and backup server;
S204: confirmation of receipt information, finish to revise;
S205: produce alarm signal.
In the described method, described host verification information comprises at least: the MAC Address of fixed host computer, IP address and CPU information.
Said user key can be various ways, like Ukey or disc key etc.
A kind of fixed host computer equipment, as shown in Figure 3, comprising:
Logging modle 301 is used to write down login user information and retouching operation information;
Key authentication module 302 is used to send the preceding checking of modify instruction user key, if user key is correct, then gets into distribution module, otherwise gets into alarm module;
Distribution module 303 is used for being used for key when correct when checking, and host verification information is added the user's modification instruction, sends to master server and backup server, and confirmation of receipt information;
Alarm module 304 is used for when checking user key mistake, producing alarm signal.
Described equipment, in it is characterized in that, described host verification information comprises at least: the MAC Address of fixed host computer, IP address and CPU information.
A kind of method that prevents that server data from distorting is applicable to the master server that prevents in the system that server data distorts, and is as shown in Figure 4, comprising:
S401: receive the ruuning situation information that user's modification instruction or backup server send; If S402 is then carried out in the user's modification instruction, if the ruuning situation information that backup server sends is then carried out S405;
S402: judge whether transmitting terminal is fixed host computer, if, then carry out S403, otherwise confirm as unauthorized access, carry out S404;
S403: instruction is made amendment according to user's modification, record modification time and action type, and return confirmation;
S404: record unauthorized access number of times and unauthorized access information, but do not return any information;
S405: record backup server ruuning situation information;
S406: judged whether suspicious process or wrong file,, then carried out S407,, then do not done any replying if do not have if having;
S407: send modification information and produce alarm signal.
In the described method,, produce alarm signal when unauthorized access number of times during greater than preset value.
In the described method, described unauthorized access information comprises at least: visit Hostname, IP address and action type.
In the described method, described ruuning situation information comprises at least:
The MD5 information of backup server master file and operation process title and number.
In the described method, described modification information is the fileinfo on the corresponding master server of apocrypha.
The method of misjudgment file can do, the MD5 value comparison of corresponding document in the MD5 value of the master file that backup server is sent and the master server in the said method, if identical then file is correct, otherwise file error.If file is correct, then do not feed back any information, if file error, then the file amendment with backup server is the file of master server.
A kind of master server equipment, as shown in Figure 5, comprising:
Receiver module 501 is used to receive the ruuning situation information that user's modification is instructed or backup server sends;
Fixed host computer authentication module 502 when being used to receive the user's modification instruction, judges whether transmitting terminal is fixed host computer, if then instruction is made amendment according to user's modification, otherwise confirms as unauthorized access;
Logging modle 503 is used for record modification time and action type, unauthorized access number of times and unauthorized access information and backup server ruuning situation information;
Detect and modified module 504, when being used to receive the ruuning situation information of backup server transmission, judged whether suspicious process or wrong file, if the alarm module of entering and sending module are arranged;
Alarm module 505 is used to produce alarm signal;
Sending module 506 is used for returning confirmation or sending modification information to backup server to fixed host computer.
In the described equipment, when unauthorized access number of times during greater than preset value, alarm module produces alarm signal.
Described logging modle also can be carried out the expansion of recorded content according to demand, sends time and the file content etc. of modification information to backup server like the record master server.
A kind of method that prevents that server data from distorting is applicable to the backup server that prevents in the system that server data distorts, and is as shown in Figure 6, comprising:
S601: receive the user's modification instruction or send ruuning situation information to master server; If receive the user's modification instruction, then carry out S602, if send ruuning situation information, then carry out S605 to master server;
S602: judge whether transmitting terminal is fixed host computer, if then carry out S603, otherwise confirm as unauthorized access, and carry out S604;
S603: instruction is made amendment according to user's modification, record modification time and action type, and return confirmation;
S604: record unauthorized access number of times and unauthorized access information, but do not return any information;
S605: receive the modification information that master server sends;
S606: judge whether transmitting terminal is master server, if then carry out S607, otherwise confirm as unauthorized access, and carry out S608;
S607: the modification information according to master server sends is carried out file modification;
S608: record unauthorized access number of times and unauthorized access information, but do not return any information.
In the described method,, produce alarm signal when unauthorized access number of times during greater than preset value.
In the described method, described unauthorized access information comprises at least: visit Hostname, IP address and action type.
In the described method, described ruuning situation information comprises at least: the MD5 information of backup server master file and operation process title and number.
A kind of backup server equipment, as shown in Figure 7, comprising:
Receiver module 701 is used to receive the modification information that user's modification is instructed and master server sends;
Fixed host computer and master server authentication module 702; Be used for when receiving the modification information of user's modification instruction or master server transmission, judging whether transmitting terminal is fixed host computer or master server, if fixed host computer; Then get into modified module 704; If master server then gets into master server modified module 406, otherwise confirm as unauthorized access;
Logging modle 703 is used for record modification time and action type and unauthorized access number of times and unauthorized access information;
Modified module 704 is used for making amendment according to user's modification instruction, and returns confirmation;
Safe reporting module 705 is used for sending ruuning situation information to master server;
Master server modified module 706 is used to receive the modification information that master server sends, and carries out file modification according to the modification information that master server sends.
In the described equipment, also comprise alarm module 707, be used for producing alarm signal when unauthorized access number of times during greater than preset value.
Among the present invention, master server is not directly connected to outer net, but only in local area network (LAN), exists, and backup server connects with outer net, and with main servers link is arranged.In order to guarantee the safety of server, two-server adopts the CPU of different frameworks, and different operating systems is installed, and has increased the difficulty of distorting server data greatly, thereby improves the fail safe of server.Aspect the server content modification, also doing strict restriction, can only use fixing machine to make amendment, fixed host computer also can carry out the external key checking when in use simultaneously.
The invention provides a kind of system, method and apparatus that prevents that server data from distorting.System comprises fixed host computer, master server and backup server, and described fixed host computer is used to write down login user information and retouching operation information and verifies user key, sends modify instruction to master server and backup server; Master server is used to receive the modify instruction of fixed host computer transmission and the ruuning situation information that backup server sends, when receiving the information of on-fixed main frame or backup server transmission, and record unauthorized access information and warning; Backup server is used to receive the modify instruction of fixed host computer and master server transmission.Said master server connects local area network (LAN), and said backup server connects outer net, and master server adopts different frameworks and operating system with backup server.Prevented effectively that through method of the present invention server content from being distorted, improved server security property.
Though described the present invention through embodiment, those of ordinary skills know, the present invention has many distortion and variation and do not break away from spirit of the present invention, hope that appended claim comprises these distortion and variation and do not break away from spirit of the present invention.

Claims (22)

1. a system that prevents that server data from distorting is characterized in that, comprising:
Fixed host computer is used to write down login user information and retouching operation information, sends the preceding checking of user's modification instruction user key; If user key is correct; Then host verification information is added the user's modification instruction, send to master server and backup server, and confirmation of receipt information; If the user key mistake then produces alarm signal;
Master server is used to receive the user's modification instruction, and judges whether transmitting terminal is fixed host computer; If; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
The ruuning situation information that master server receives and the record backup server sends has judged whether suspicious process or wrong file, if having, then sends modification information and produces alarm signal;
Backup server is used to receive the user's modification instruction, and judges whether transmitting terminal is fixed host computer; If; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
Backup server; Be used for sending ruuning situation information and receiving the modification information that master server sends to master server; And judge whether transmitting terminal is master server, if the modification information of then sending according to master server is carried out file modification; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information.
2. the system of claim 1 is characterized in that, described host verification information comprises at least: the MAC Address of fixed host computer, IP address and CPU information.
3. the system of claim 1 is characterized in that, when the unauthorized access number of times of master server or backup server during greater than preset value, master server or backup server produce alarm signal.
4. the system of claim 1 is characterized in that, described unauthorized access information comprises at least: Hostname, IP address and action type.
5. the system of claim 1 is characterized in that, described master server connects local area network (LAN), and backup server connects outer net, and master server adopts different frameworks and operating system with backup server.
6. a method that prevents that server data from distorting is characterized in that, is applicable to the fixed host computer in the said system of claim 1, and said method comprises:
Record login user information and retouching operation information;
Verify user key before sending the user's modification instruction,, then host verification information is added the user's modification instruction, send to master server and backup server if user key is correct, and confirmation of receipt information, if the user key mistake then produces alarm signal.
7. method as claimed in claim 6 is characterized in that, described host verification information comprises at least: the MAC Address of fixed host computer, IP address and CPU information.
8. a fixed host computer equipment is applicable to the described system of claim 1, it is characterized in that, comprising:
Logging modle is used to write down login user information and retouching operation information;
The key authentication module is used to send the preceding checking of modify instruction user key, if user key is correct, then gets into distribution module, otherwise gets into alarm module;
Distribution module is used for being used for key when correct when checking, and host verification information is added the user's modification instruction, sends to master server and backup server, and confirmation of receipt information;
Alarm module is used for when checking user key mistake, producing alarm signal.
9. equipment as claimed in claim 8 is characterized in that, described host verification information comprises at least: the MAC Address of fixed host computer, IP address and CPU information.
10. a method that prevents that server data from distorting is characterized in that, is applicable to the master server in the said system of claim 1, and said method comprises:
Receive the ruuning situation information that user's modification instruction or backup server send;
If the user's modification instruction judges then whether transmitting terminal is fixed host computer, if; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
If the ruuning situation information that backup server sends then writes down backup server ruuning situation information, and judged whether suspicious process or wrong file,, then send modification information and produce alarm signal if having.
11. method as claimed in claim 10 is characterized in that, when unauthorized access number of times during greater than preset value, produces alarm signal.
12. method as claimed in claim 10 is characterized in that, described unauthorized access information comprises at least: visit Hostname, IP address and action type.
13. method as claimed in claim 10 is characterized in that, described ruuning situation information comprises at least:
The MD5 information of backup server master file and operation process title and number.
14. method as claimed in claim 10 is characterized in that, described modification information is the fileinfo on the corresponding master server of apocrypha.
15. a master server equipment is characterized in that, is applicable to the said system of claim 1, said equipment comprises:
Receiver module is used to receive the ruuning situation information that user's modification is instructed or backup server sends;
The fixed host computer authentication module when being used to receive the user's modification instruction, judges whether transmitting terminal is fixed host computer, if then instruction is made amendment according to user's modification, otherwise confirms as unauthorized access;
Logging modle is used for record modification time and action type, unauthorized access number of times and unauthorized access information and backup server ruuning situation information;
Detect and modified module, when being used to receive the ruuning situation information of backup server transmission, judged whether suspicious process or wrong file, if the alarm module of entering and sending module are arranged;
Alarm module is used to produce alarm signal;
Sending module is used for returning confirmation or sending modification information to backup server to fixed host computer.
16. equipment as claimed in claim 15 is characterized in that, when unauthorized access number of times during greater than preset value, alarm module produces alarm signal.
17. a method that prevents that server data from distorting is characterized in that, is applicable to the backup server in the said system of claim 1, said method comprises:
Receive the user's modification instruction or send ruuning situation information to master server;
If receive the user's modification instruction, judge then whether transmitting terminal is fixed host computer, if; Then instruction is made amendment according to user's modification, record modification time and action type, and return confirmation; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
If send ruuning situation information to master server; Then receive the modification information that master server sends; And judge whether transmitting terminal is master server, if the modification information of then sending according to master server is carried out file modification; Otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information.
18. method as claimed in claim 17 is characterized in that, when unauthorized access number of times during greater than preset value, produces alarm signal.
19. method as claimed in claim 17 is characterized in that, described unauthorized access information comprises at least: visit Hostname, IP address and action type.
20. method as claimed in claim 17 is characterized in that, described ruuning situation information comprises at least:
The MD5 information of backup server master file and operation process title and number.
21. a backup server equipment is characterized in that, is applicable to the described system of claim 1, said equipment comprises:
Receiver module is used to receive the modification information that user's modification is instructed and master server sends;
Fixed host computer and master server authentication module; Be used for when receiving the modification information of user's modification instruction or master server transmission, judging whether transmitting terminal is fixed host computer or master server, if fixed host computer; Then get into modified module; If master server then gets into the master server modified module, otherwise confirm as unauthorized access;
Logging modle is used for record modification time and action type and unauthorized access number of times and unauthorized access information;
Modified module is used for making amendment according to user's modification instruction, and returns confirmation;
Safe reporting module is used for sending ruuning situation information to master server;
The master server modified module is used to receive the modification information that master server sends, and carries out file modification according to the modification information that master server sends.
22. equipment as claimed in claim 21 is characterized in that, also comprises alarm module, is used for producing alarm signal when unauthorized access number of times during greater than preset value.
CN201110447094.3A 2011-12-28 2011-12-28 The system preventing server data from distorting, method and apparatus Active CN102801699B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110447094.3A CN102801699B (en) 2011-12-28 2011-12-28 The system preventing server data from distorting, method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110447094.3A CN102801699B (en) 2011-12-28 2011-12-28 The system preventing server data from distorting, method and apparatus

Publications (2)

Publication Number Publication Date
CN102801699A true CN102801699A (en) 2012-11-28
CN102801699B CN102801699B (en) 2015-07-29

Family

ID=47200665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110447094.3A Active CN102801699B (en) 2011-12-28 2011-12-28 The system preventing server data from distorting, method and apparatus

Country Status (1)

Country Link
CN (1) CN102801699B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825124A (en) * 2015-01-06 2016-08-03 中国移动通信集团广西有限公司 Server illegal operation monitoring method and monitoring system
CN106302806A (en) * 2016-09-13 2017-01-04 腾讯科技(深圳)有限公司 A kind of method of data synchronization, system, synchronous obtaining method and relevant apparatus
CN106407049A (en) * 2016-10-14 2017-02-15 惠州Tcl移动通信有限公司 Method and system for determining chip setting of mobile terminal to be disturbed
CN112218173A (en) * 2020-10-13 2021-01-12 广州欢网科技有限责任公司 Smart television user information protection method, device, equipment and storage medium
CN112532590A (en) * 2020-11-06 2021-03-19 北京冠程科技有限公司 Software security boundary system and method
CN116319099A (en) * 2023-05-22 2023-06-23 威海海洋职业学院 Multi-terminal financial data management method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1494022A (en) * 2002-10-30 2004-05-05 华为技术有限公司 Method accessing data bank through protocol agency mode
CN1858738A (en) * 2006-02-15 2006-11-08 华为技术有限公司 Method and device for access data bank
CN101330474A (en) * 2007-06-22 2008-12-24 鸿富锦精密工业(深圳)有限公司 System and method for managing and controlling consumer authority
CN101494651A (en) * 2009-02-11 2009-07-29 江苏敏捷科技股份有限公司 Method for active backup of data
US20100299422A1 (en) * 2009-05-21 2010-11-25 Hon Hai Precision Industry Co., Ltd. Client management system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1494022A (en) * 2002-10-30 2004-05-05 华为技术有限公司 Method accessing data bank through protocol agency mode
CN1858738A (en) * 2006-02-15 2006-11-08 华为技术有限公司 Method and device for access data bank
CN101330474A (en) * 2007-06-22 2008-12-24 鸿富锦精密工业(深圳)有限公司 System and method for managing and controlling consumer authority
CN101494651A (en) * 2009-02-11 2009-07-29 江苏敏捷科技股份有限公司 Method for active backup of data
US20100299422A1 (en) * 2009-05-21 2010-11-25 Hon Hai Precision Industry Co., Ltd. Client management system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825124A (en) * 2015-01-06 2016-08-03 中国移动通信集团广西有限公司 Server illegal operation monitoring method and monitoring system
CN106302806A (en) * 2016-09-13 2017-01-04 腾讯科技(深圳)有限公司 A kind of method of data synchronization, system, synchronous obtaining method and relevant apparatus
WO2018049983A1 (en) * 2016-09-13 2018-03-22 腾讯科技(深圳)有限公司 Data synchronization method and system, and synchronization acquisition method and device
CN106302806B (en) * 2016-09-13 2019-10-25 腾讯科技(深圳)有限公司 A kind of method of data synchronization, system, synchronous obtaining method and relevant apparatus
US10895996B2 (en) 2016-09-13 2021-01-19 Tencent Technology (Shenzhen) Company Limited Data synchronization method, system, and apparatus using a work log for synchronizing data greater than a threshold value
CN106407049A (en) * 2016-10-14 2017-02-15 惠州Tcl移动通信有限公司 Method and system for determining chip setting of mobile terminal to be disturbed
CN106407049B (en) * 2016-10-14 2021-05-28 惠州Tcl移动通信有限公司 Method and system for judging whether chip setting is interfered by mobile terminal
CN112218173A (en) * 2020-10-13 2021-01-12 广州欢网科技有限责任公司 Smart television user information protection method, device, equipment and storage medium
CN112532590A (en) * 2020-11-06 2021-03-19 北京冠程科技有限公司 Software security boundary system and method
CN116319099A (en) * 2023-05-22 2023-06-23 威海海洋职业学院 Multi-terminal financial data management method and system

Also Published As

Publication number Publication date
CN102801699B (en) 2015-07-29

Similar Documents

Publication Publication Date Title
CN108322461B (en) Method, system, device, equipment and medium for automatically logging in application program
US10229547B2 (en) In-vehicle gateway device, storage control method, and computer program product
US20200028864A1 (en) Non-harmful insertion of data mimicking computer network attacks
CN102801699A (en) System, method and equipment for preventing data tampering of server
US8510572B2 (en) Remote access system, gateway, client device, program, and storage medium
US8473752B2 (en) Apparatus, system, and method for auditing access to secure data
CN112217835B (en) Message data processing method and device, server and terminal equipment
CN104348809A (en) Network security monitoring method and system
CN110324416B (en) Download path tracking method, device, server, terminal and medium
CN102957705B (en) A kind of method and device of webpage tamper protection
CN104991526A (en) Industrial control system safe support framework and data safe transmission and storage method thereof
US20210349836A1 (en) Field-replaceable unit (fru) secure component binding
CN103166977A (en) Method, terminal, server and system for accessing website
US11899777B2 (en) Memory module authentication extension
CN105162763B (en) Communication data processing method and device
CN104104650B (en) data file access method and terminal device
CN101694683A (en) Method for preventing Trojans ferrying via movable memories to steal files
CN106850519B (en) Application security authentication method and device
CN111901418A (en) External terminal protection equipment and system based on one-way file transfer protocol
CN106878233A (en) The read method of secure data, security server, terminal and system
CN109582454A (en) Permission releasing control method, device and equipment in a kind of distributed storage cluster
CN105373745A (en) Data access control method and device for site enforcement recorder and site enforcement recorder
JP6253168B2 (en) Improved tamper resistance of aggregated data
CN111614620A (en) Database access control method, system and storage medium
CN110995658A (en) Gateway protection method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 100080 Haidian District City, Zhongguancun, the main street, No. 1 Hailong building, room 1415, room 14

Applicant after: Beijing Antiy Electronic Installation Co., Ltd.

Address before: 100084, 2B-521, bright city, No. 1, Nongda South Road, Beijing, Haidian District

Applicant before: Beijing Antiy Electronic Installation Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: 100080 Beijing city Haidian District minzhuang Road No. 3, Tsinghua Science Park Building 1 Yuquan Huigu a

Patentee after: Beijing ahtech network Safe Technology Ltd

Address before: 100080 Haidian District City, Zhongguancun, the main street, No. 1 Hailong building, room 1415, room 14

Patentee before: Beijing Antiy Electronic Installation Co., Ltd.

CP03 Change of name, title or address
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: System, method and equipment for preventing data tampering of server

Effective date of registration: 20170821

Granted publication date: 20150729

Pledgee: CITIC Bank Harbin branch

Pledgor: Beijing ahtech network Safe Technology Ltd

Registration number: 2017990000776

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20180817

Granted publication date: 20150729

Pledgee: CITIC Bank Harbin branch

Pledgor: Beijing ahtech network Safe Technology Ltd

Registration number: 2017990000776

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: System, method and equipment for preventing data tampering of server

Effective date of registration: 20180817

Granted publication date: 20150729

Pledgee: CITIC Bank Harbin branch

Pledgor: Beijing ahtech network Safe Technology Ltd

Registration number: 2018990000700

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20191021

Granted publication date: 20150729

Pledgee: CITIC Bank Harbin branch

Pledgor: Beijing ahtech network Safe Technology Ltd

Registration number: 2018990000700