CN102801699B - The system preventing server data from distorting, method and apparatus - Google Patents

The system preventing server data from distorting, method and apparatus Download PDF

Info

Publication number
CN102801699B
CN102801699B CN201110447094.3A CN201110447094A CN102801699B CN 102801699 B CN102801699 B CN 102801699B CN 201110447094 A CN201110447094 A CN 201110447094A CN 102801699 B CN102801699 B CN 102801699B
Authority
CN
China
Prior art keywords
information
server
unauthorized access
master server
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110447094.3A
Other languages
Chinese (zh)
Other versions
CN102801699A (en
Inventor
王乃青
桑胜田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ahtech network Safe Technology Ltd
Original Assignee
Beijing Antiy Electronic Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Antiy Electronic Equipment Co Ltd filed Critical Beijing Antiy Electronic Equipment Co Ltd
Priority to CN201110447094.3A priority Critical patent/CN102801699B/en
Publication of CN102801699A publication Critical patent/CN102801699A/en
Application granted granted Critical
Publication of CN102801699B publication Critical patent/CN102801699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a kind of system, the method and apparatus that prevent server data from distorting.System comprises fixed host computer, master server and backup server, and described fixed host computer, for recording login user information and retouching operation information and authentication of users key, sends modify instruction to master server and backup server; The ruuning situation information that master server sends for the modify instruction and backup server receiving fixed host computer transmission, when receiving the information of on-fixed main frame or backup server transmission, record unauthorized access information is also reported to the police; Backup server is for receiving the modify instruction of fixed host computer and master server transmission.Described master server connects local area network (LAN), and described backup server connects outer net, and master server and backup server adopt different framework and operating system.Effectively prevent server content by method of the present invention to be tampered, improve Server Security.

Description

The system preventing server data from distorting, method and apparatus
Technical field
The present invention relates to Host Security field, particularly a kind of system, method and apparatus preventing server data from distorting.
Background technology
Along with Internet era development, computer server can get more and more, and the fail safe of server is more and more important.Existing server is much adopt backup server to ensure the integrality of data, uses certain methods be encrypted data or monitor server simultaneously.But when server is broken time, the integrality of data just cannot be preserved, and server data or homepage will be distorted.
Summary of the invention
The invention provides a kind of system, the method and apparatus that prevent server data from distorting, solve server data by malicious modification, and server data is by the problem that cannot guarantee data integrity after malicious modification.
Prevent the system that server data is distorted, comprising:
Fixed host computer, for recording login user information and retouching operation information, authentication of users key before transmission user modify instruction, if user key is correct, then host verification information is added access customer modify instruction, be sent to master server and backup server, and confirmation of receipt information, if user key mistake, then produce alarm signal;
Master server, for receiving user's modify instruction, and judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
Master server receives and records the ruuning situation information of backup server transmission, has judged whether suspicious process or wrong file, if had, then sends amendment information and produces alarm signal;
Backup server, for receiving user's modify instruction, and judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
Backup server, for sending the amendment information of ruuning situation information and the transmission of reception master server to master server, and judge whether transmitting terminal is master server, if, the amendment information then sent according to master server carries out file modification, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information.
In described system, described host verification information at least comprises: the MAC Address of fixed host computer, IP address and CPU information.
In described system, when the unauthorized access number of times of master server or backup server is greater than preset value, master server or backup server produce alarm signal.
In described system, described unauthorized access information at least comprises: Hostname, IP address and action type.
In described system, described master server connects local area network (LAN), and backup server connects outer net, and master server and backup server adopt different framework and operating system.
Prevent the method that server data is distorted, be applicable to the fixed host computer in the system preventing server data from distorting, described method comprises:
Record login user information and retouching operation information;
Authentication of users key before transmission user modify instruction, if user key is correct, then adds access customer modify instruction by host verification information, is sent to master server and backup server, and confirmation of receipt information, if user key mistake, then produce alarm signal.
In described method, described host verification information at least comprises: the MAC Address of fixed host computer, IP address and CPU information.
Described user key can be various ways, as Ukey or disc key etc.
A kind of fixed host computer equipment, comprising:
Logging modle, for recording login user information and retouching operation information;
Key verification module, for sending authentication of users key before modify instruction, if user key is correct, then enters distribution module, otherwise entering alarm module;
Distribution module, for when verifying correct for key, adding access customer modify instruction by host verification information, being sent to master server and backup server, and confirmation of receipt information;
Alarm module, for when authentication of users wrong cipher key, produces alarm signal.
Described equipment, in it is characterized in that, described host verification information at least comprises: the MAC Address of fixed host computer, IP address and CPU information.
Prevent the method that server data is distorted, be applicable to the master server in the system preventing server data from distorting, comprise:
Receive the ruuning situation information of user's modify instruction or backup server transmission;
If user's modify instruction, then judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
If the ruuning situation information that backup server sends, then record backup server ruuning situation information, and judged whether suspicious process or wrong file, if had, then send amendment information and produce alarm signal.
In described method, when unauthorized access number of times is greater than preset value, produce alarm signal.
In described method, described unauthorized access information at least comprises: access Hostname, IP address and action type.
In described method, described ruuning situation information at least comprises:
MD5 information and operation process title and the number of backup server master file.
In described method, described amendment information is the fileinfo on master server that apocrypha is corresponding.
In described method, the method for misjudgment file can be, the MD5 value of master file that backup server sends is compared with the MD5 value of corresponding document in master server, and if the same file is correct, otherwise file error.If file is correct, then not feeding back any information, if file error, is then the file of master server by the file amendment of backup server.
A kind of master server equipment, comprising:
Receiver module, for receiving the ruuning situation information of user's modify instruction or backup server transmission;
Fixed host computer authentication module, during for receiving user's modify instruction, judging whether transmitting terminal is fixed host computer, if so, then modifying according to user's modify instruction, otherwise confirm as unauthorized access;
Logging modle, for record modification time and action type, unauthorized access number of times and unauthorized access information and backup server ruuning situation information;
Detect and modified module, for receive backup server send ruuning situation information time, judged whether suspicious process or wrong file, if enter alarm module and sending module;
Alarm module, for generation of alarm signal;
Sending module, for returning confirmation or sending amendment information to backup server to fixed host computer.
In described equipment, when unauthorized access number of times is greater than preset value, alarm module produces alarm signal.
Described logging modle also can carry out recording the expansion of content according to demand, as record master server sends time of amendment information and file content etc. to backup server.
Prevent the method that server data is distorted, be applicable to the backup server in the system preventing server data from distorting, comprise:
Receive user's modify instruction or send ruuning situation information to master server;
If receive user's modify instruction, then judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
If send ruuning situation information to master server, then receive the amendment information that master server sends, and judge whether transmitting terminal is master server, if, the amendment information then sent according to master server carries out file modification, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information.
In described method, when unauthorized access number of times is greater than preset value, produce alarm signal.
In described method, described unauthorized access information at least comprises: access Hostname, IP address and action type.
In described method, described ruuning situation information at least comprises: MD5 information and operation process title and the number of backup server master file.
A kind of backup server equipment, comprising:
Receiver module, for receiving the amendment information of user's modify instruction and master server transmission;
Fixed host computer and master server authentication module, for when receiving the amendment information of user's modify instruction or master server transmission, judge whether transmitting terminal is fixed host computer or master server, if fixed host computer, then enter modified module, if master server, then enter master server modified module, otherwise confirm as unauthorized access;
Logging modle, for record modification time and action type and unauthorized access number of times and unauthorized access information;
Modified module, for modifying according to user's modify instruction, and returns confirmation;
Safe reporting module, for sending ruuning situation information to master server;
Master server modified module, for receiving the amendment information that master server sends, carries out file modification according to the amendment information that master server sends.
In described equipment, also comprise alarm module, for when unauthorized access number of times is greater than preset value, produce alarm signal.
In the present invention, master server is not directly connected to outer net, but only exists in a local network, and backup server connects with outer net, and has link with main servers.In order to the safety of Deterministic service device, two-server adopts the CPU of different framework, and installs different operating system, considerably increases the difficulty of distorting server data, thus improves the fail safe of server.Have also been made strict restriction in server content amendment, fixing machine can only be used to modify, fixed host computer also can carry out external key checking when in use simultaneously.
The invention provides a kind of system, the method and apparatus that prevent server data from distorting.System comprises fixed host computer, master server and backup server, and described fixed host computer, for recording login user information and retouching operation information and authentication of users key, sends modify instruction to master server and backup server; The ruuning situation information that master server sends for the modify instruction and backup server receiving fixed host computer transmission, when receiving the information of on-fixed main frame or backup server transmission, record unauthorized access information is also reported to the police; Backup server is for receiving the modify instruction of fixed host computer and master server transmission.Described master server connects local area network (LAN), and described backup server connects outer net, and master server and backup server adopt different framework and operating system.Effectively prevent server content by method of the present invention to be tampered, improve Server Security.
Accompanying drawing explanation
In order to be illustrated more clearly in the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of system schematic preventing server data from distorting;
Fig. 2 is fixed host computer method flow diagram in a kind of method preventing server data from distorting;
Fig. 3 is a kind of fixed host computer equipment structure chart;
Fig. 4 is master server method flow diagram in a kind of method preventing server data from distorting;
Fig. 5 is a kind of master server equipment structure chart;
Fig. 6 is backup server method flow diagram in a kind of method preventing server data from distorting;
Fig. 7 is a kind of backup server equipment structure chart.
Embodiment
In order to make those skilled in the art person understand technical scheme in the embodiment of the present invention better, and enable above-mentioned purpose of the present invention, feature and advantage become apparent more, below in conjunction with accompanying drawing, technical scheme in the present invention is described in further detail.
The invention provides a kind of system, the method and apparatus that prevent server data from distorting, solve server data by malicious modification, and server data is by the problem that cannot guarantee data integrity after malicious modification.
Prevent the system that server data is distorted, as shown in Figure 1, comprising:
Fixed host computer 101, for recording login user information and retouching operation information, authentication of users key before transmission user modify instruction, if user key is correct, then host verification information is added access customer modify instruction, be sent to master server and backup server, and confirmation of receipt information, if user key mistake, then produce alarm signal;
Master server 102, for receiving user's modify instruction, and judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
Master server receives and records the ruuning situation information of backup server transmission, has judged whether suspicious process or wrong file, if had, then sends amendment information and produces alarm signal;
Backup server 103, for receiving user's modify instruction, and judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
Backup server 103 sends ruuning situation information to master server and receives the amendment information of master server transmission, and judge whether transmitting terminal is master server, if, the amendment information then sent according to master server carries out file modification, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information.
In described system, described host verification information at least comprises: the MAC Address of fixed host computer, IP address and CPU information.
In described system, when the unauthorized access number of times of master server or backup server is greater than preset value, master server or backup server produce alarm signal.
In described system, described unauthorized access information at least comprises: Hostname, IP address and action type.
In described system, described master server connects local area network (LAN), and backup server connects outer net, and master server and backup server adopt different framework and operating system.As master server adopts X86-based window operating system, backup server adopts ARM framework (SuSE) Linux OS.
Prevent the method that server data is distorted, be applicable to the fixed host computer in the system preventing server data from distorting, as shown in Figure 2, described method comprises:
S201: record login user information and retouching operation information;
S202: authentication of users key before transmission user modify instruction, if user key is correct, then performs S203, if user key mistake, then perform S205;
S203: host verification information is added access customer modify instruction, is sent to master server and backup server;
S204: confirmation of receipt information, terminates amendment;
S205: produce alarm signal.
In described method, described host verification information at least comprises: the MAC Address of fixed host computer, IP address and CPU information.
Described user key can be various ways, as Ukey or disc key etc.
A kind of fixed host computer equipment, as shown in Figure 3, comprising:
Logging modle 301, for recording login user information and retouching operation information;
Key verification module 302, for sending authentication of users key before modify instruction, if user key is correct, then enters distribution module, otherwise entering alarm module;
Distribution module 303, for when verifying correct for key, adding access customer modify instruction by host verification information, being sent to master server and backup server, and confirmation of receipt information;
Alarm module 304, for when authentication of users wrong cipher key, produces alarm signal.
Described equipment, in it is characterized in that, described host verification information at least comprises: the MAC Address of fixed host computer, IP address and CPU information.
Prevent the method that server data is distorted, be applicable to the master server in the system preventing server data from distorting, as shown in Figure 4, comprising:
S401: the ruuning situation information receiving user's modify instruction or backup server transmission; If user's modify instruction, then perform S402, if the ruuning situation information that backup server sends, then perform S405;
S402: judge whether transmitting terminal is fixed host computer, if so, then performs S403, otherwise confirms as unauthorized access, performs S404;
S403: modify according to user's modify instruction, record modification time and action type, and return confirmation;
S404: record unauthorized access number of times and unauthorized access information, but do not return any information;
S405: record backup server ruuning situation information;
S406: judged whether suspicious process or wrong file, if had, then performs S407, if do not had, does not then do any response;
S407: send amendment information and produce alarm signal.
In described method, when unauthorized access number of times is greater than preset value, produce alarm signal.
In described method, described unauthorized access information at least comprises: access Hostname, IP address and action type.
In described method, described ruuning situation information at least comprises:
MD5 information and operation process title and the number of backup server master file.
In described method, described amendment information is the fileinfo on master server that apocrypha is corresponding.
In described method, the method for misjudgment file can be, the MD5 value of master file that backup server sends is compared with the MD5 value of corresponding document in master server, and if the same file is correct, otherwise file error.If file is correct, then not feeding back any information, if file error, is then the file of master server by the file amendment of backup server.
A kind of master server equipment, as shown in Figure 5, comprising:
Receiver module 501, for receiving the ruuning situation information of user's modify instruction or backup server transmission;
Fixed host computer authentication module 502, during for receiving user's modify instruction, judging whether transmitting terminal is fixed host computer, if so, then modifying according to user's modify instruction, otherwise confirm as unauthorized access;
Logging modle 503, for record modification time and action type, unauthorized access number of times and unauthorized access information and backup server ruuning situation information;
Detect and modified module 504, for receive backup server send ruuning situation information time, judged whether suspicious process or wrong file, if enter alarm module and sending module;
Alarm module 505, for generation of alarm signal;
Sending module 506, for returning confirmation or sending amendment information to backup server to fixed host computer.
In described equipment, when unauthorized access number of times is greater than preset value, alarm module produces alarm signal.
Described logging modle also can carry out recording the expansion of content according to demand, as record master server sends time of amendment information and file content etc. to backup server.
Prevent the method that server data is distorted, be applicable to the backup server in the system preventing server data from distorting, as shown in Figure 6, comprising:
S601: receive user's modify instruction or send ruuning situation information to master server; If receive user's modify instruction, then perform S602, if send ruuning situation information to master server, then perform S605;
S602: judge whether transmitting terminal is fixed host computer, if so, then performs S603, otherwise confirms as unauthorized access, and perform S604;
S603: modify according to user's modify instruction, record modification time and action type, and return confirmation;
S604: record unauthorized access number of times and unauthorized access information, but do not return any information;
S605: receive the amendment information that master server sends;
S606: judge whether transmitting terminal is master server, if so, then performs S607, otherwise confirms as unauthorized access, and perform S608;
S607: carry out file modification according to the amendment information that master server sends;
S608: record unauthorized access number of times and unauthorized access information, but do not return any information.
In described method, when unauthorized access number of times is greater than preset value, produce alarm signal.
In described method, described unauthorized access information at least comprises: access Hostname, IP address and action type.
In described method, described ruuning situation information at least comprises: MD5 information and operation process title and the number of backup server master file.
A kind of backup server equipment, as shown in Figure 7, comprising:
Receiver module 701, for receiving the amendment information of user's modify instruction and master server transmission;
Fixed host computer and master server authentication module 702, for when receiving the amendment information of user's modify instruction or master server transmission, judge whether transmitting terminal is fixed host computer or master server, if fixed host computer, then enter modified module 704, if master server, then enter master server modified module 406, otherwise confirm as unauthorized access;
Logging modle 703, for record modification time and action type and unauthorized access number of times and unauthorized access information;
Modified module 704, for modifying according to user's modify instruction, and returns confirmation;
Safe reporting module 705, for sending ruuning situation information to master server;
Master server modified module 706, for receiving the amendment information that master server sends, carries out file modification according to the amendment information that master server sends.
In described equipment, also comprise alarm module 707, for when unauthorized access number of times is greater than preset value, produce alarm signal.
In the present invention, master server is not directly connected to outer net, but only exists in a local network, and backup server connects with outer net, and has link with main servers.In order to the safety of Deterministic service device, two-server adopts the CPU of different framework, and installs different operating system, considerably increases the difficulty of distorting server data, thus improves the fail safe of server.Have also been made strict restriction in server content amendment, fixing machine can only be used to modify, fixed host computer also can carry out external key checking when in use simultaneously.
The invention provides a kind of system, the method and apparatus that prevent server data from distorting.System comprises fixed host computer, master server and backup server, and described fixed host computer, for recording login user information and retouching operation information and authentication of users key, sends modify instruction to master server and backup server; The ruuning situation information that master server sends for the modify instruction and backup server receiving fixed host computer transmission, when receiving the information of on-fixed main frame or backup server transmission, record unauthorized access information is also reported to the police; Backup server is for receiving the modify instruction of fixed host computer and master server transmission.Described master server connects local area network (LAN), and described backup server connects outer net, and master server and backup server adopt different framework and operating system.Effectively prevent server content by method of the present invention to be tampered, improve Server Security.
Although depict the present invention by embodiment, those of ordinary skill in the art know, the present invention has many distortion and change and do not depart from spirit of the present invention, and the claim appended by wishing comprises these distortion and change and do not depart from spirit of the present invention.

Claims (21)

1. the system preventing server data from distorting, is characterized in that, comprising:
Fixed host computer, for recording login user information and retouching operation information, authentication of users key before transmission user modify instruction, if user key is correct, then host verification information is added access customer modify instruction, be sent to master server and backup server, and confirmation of receipt information, if user key mistake, then produce alarm signal;
Master server, for receiving user's modify instruction, and judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
Master server receives and records the ruuning situation information of backup server transmission, has judged whether suspicious process or wrong file, if had, then sends amendment information and produces alarm signal;
Backup server, for receiving user's modify instruction, and judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
For sending the amendment information of ruuning situation information and the transmission of reception master server to master server, and judge whether transmitting terminal is master server, if, the amendment information then sent according to master server carries out file modification, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
Described master server connects local area network (LAN), and backup server connects outer net, and master server and backup server adopt different framework and operating system.
2. the system as claimed in claim 1, is characterized in that, described host verification information at least comprises: the MAC Address of fixed host computer, IP address and CPU information.
3. the system as claimed in claim 1, is characterized in that, when the unauthorized access number of times of master server or backup server is greater than preset value, master server or backup server produce alarm signal.
4. the system as claimed in claim 1, is characterized in that, described unauthorized access information at least comprises: Hostname, IP address and action type.
5. the method preventing server data from distorting, is characterized in that, is applicable to the fixed host computer in system described in claim 1, and described method comprises:
Record login user information and retouching operation information;
Authentication of users key before transmission user modify instruction, if user key is correct, then adds access customer modify instruction by host verification information, is sent to master server and backup server, and confirmation of receipt information, if user key mistake, then produce alarm signal.
6. method as claimed in claim 5, it is characterized in that, described host verification information at least comprises: the MAC Address of fixed host computer, IP address and CPU information.
7. a fixed host computer equipment, is applicable to system according to claim 1, it is characterized in that, comprising:
Logging modle, for recording login user information and retouching operation information;
Key verification module, for sending authentication of users key before modify instruction, if user key is correct, then enters distribution module, otherwise entering alarm module;
Distribution module, for when verifying correct for key, adding access customer modify instruction by host verification information, being sent to master server and backup server, and confirmation of receipt information;
Alarm module, for when authentication of users wrong cipher key, produces alarm signal.
8. equipment as claimed in claim 7, it is characterized in that, described host verification information at least comprises: the MAC Address of fixed host computer, IP address and CPU information.
9. the method preventing server data from distorting, is characterized in that, is applicable to the master server in system described in claim 1, and described method comprises:
Receive the ruuning situation information of user's modify instruction or backup server transmission;
If user's modify instruction, then judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
If the ruuning situation information that backup server sends, then record backup server ruuning situation information, and judged whether suspicious process or wrong file, if had, then send amendment information and produce alarm signal.
10. method as claimed in claim 9, is characterized in that, when unauthorized access number of times is greater than preset value, produces alarm signal.
11. methods as claimed in claim 9, it is characterized in that, described unauthorized access information at least comprises: access Hostname, IP address and action type.
12. methods as claimed in claim 9, it is characterized in that, described ruuning situation information at least comprises:
MD5 information and operation process title and the number of backup server master file.
13. methods as claimed in claim 9, is characterized in that, described amendment information is the fileinfo on master server that apocrypha is corresponding.
14. 1 kinds of master server equipment, is characterized in that, are applicable to system described in claim 1, and described equipment comprises:
Receiver module, for receiving the ruuning situation information of user's modify instruction or backup server transmission;
Fixed host computer authentication module, during for receiving user's modify instruction, judging whether transmitting terminal is fixed host computer, if so, then modifying according to user's modify instruction, otherwise confirm as unauthorized access;
Logging modle, for record modification time and action type, unauthorized access number of times and unauthorized access information and backup server ruuning situation information;
Detect and modified module, for receive backup server send ruuning situation information time, judged whether suspicious process or wrong file, if enter alarm module and sending module;
Alarm module, for generation of alarm signal;
Sending module, for returning confirmation or sending amendment information to backup server to fixed host computer.
15. equipment as claimed in claim 14, is characterized in that, when unauthorized access number of times is greater than preset value, alarm module produces alarm signal.
16. 1 kinds of methods preventing server data from distorting, is characterized in that, are applicable to the backup server in system described in claim 1, and described method comprises:
Receive user's modify instruction or send ruuning situation information to master server;
If receive user's modify instruction, then judge whether transmitting terminal is fixed host computer, if, then modify according to user's modify instruction, record modification time and action type, and return confirmation, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information;
If send ruuning situation information to master server, then receive the amendment information that master server sends, and judge whether transmitting terminal is master server, if, the amendment information then sent according to master server carries out file modification, otherwise confirm as unauthorized access, and record unauthorized access number of times and unauthorized access information.
17. methods as claimed in claim 16, is characterized in that, when unauthorized access number of times is greater than preset value, produce alarm signal.
18. methods as claimed in claim 16, it is characterized in that, described unauthorized access information at least comprises: access Hostname, IP address and action type.
19. methods as claimed in claim 16, it is characterized in that, described ruuning situation information at least comprises:
MD5 information and operation process title and the number of backup server master file.
20. 1 kinds of backup server equipment, is characterized in that, are applicable to system according to claim 1, and described equipment comprises:
Receiver module, for receiving the amendment information of user's modify instruction and master server transmission;
Fixed host computer and master server authentication module, for when receiving the amendment information of user's modify instruction or master server transmission, judge whether transmitting terminal is fixed host computer or master server, if fixed host computer, then enter modified module, if master server, then enter master server modified module, otherwise confirm as unauthorized access;
Logging modle, for record modification time and action type and unauthorized access number of times and unauthorized access information;
Modified module, for modifying according to user's modify instruction, and returns confirmation;
Safe reporting module, for sending ruuning situation information to master server;
Master server modified module, for receiving the amendment information that master server sends, carries out file modification according to the amendment information that master server sends.
21. equipment as claimed in claim 20, is characterized in that, also comprise alarm module, for when unauthorized access number of times is greater than preset value, produce alarm signal.
CN201110447094.3A 2011-12-28 2011-12-28 The system preventing server data from distorting, method and apparatus Active CN102801699B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110447094.3A CN102801699B (en) 2011-12-28 2011-12-28 The system preventing server data from distorting, method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110447094.3A CN102801699B (en) 2011-12-28 2011-12-28 The system preventing server data from distorting, method and apparatus

Publications (2)

Publication Number Publication Date
CN102801699A CN102801699A (en) 2012-11-28
CN102801699B true CN102801699B (en) 2015-07-29

Family

ID=47200665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110447094.3A Active CN102801699B (en) 2011-12-28 2011-12-28 The system preventing server data from distorting, method and apparatus

Country Status (1)

Country Link
CN (1) CN102801699B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825124A (en) * 2015-01-06 2016-08-03 中国移动通信集团广西有限公司 Server illegal operation monitoring method and monitoring system
CN106302806B (en) * 2016-09-13 2019-10-25 腾讯科技(深圳)有限公司 A kind of method of data synchronization, system, synchronous obtaining method and relevant apparatus
CN106407049B (en) * 2016-10-14 2021-05-28 惠州Tcl移动通信有限公司 Method and system for judging whether chip setting is interfered by mobile terminal
CN112218173A (en) * 2020-10-13 2021-01-12 广州欢网科技有限责任公司 Smart television user information protection method, device, equipment and storage medium
CN112532590B (en) * 2020-11-06 2022-11-29 北京冠程科技有限公司 Software security boundary system and method
CN116319099A (en) * 2023-05-22 2023-06-23 威海海洋职业学院 Multi-terminal financial data management method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1494022A (en) * 2002-10-30 2004-05-05 华为技术有限公司 Method accessing data bank through protocol agency mode
CN1858738A (en) * 2006-02-15 2006-11-08 华为技术有限公司 Method and device for access data bank
CN101330474A (en) * 2007-06-22 2008-12-24 鸿富锦精密工业(深圳)有限公司 System and method for managing and controlling consumer authority
CN101494651A (en) * 2009-02-11 2009-07-29 江苏敏捷科技股份有限公司 Method for active backup of data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894094B (en) * 2009-05-21 2014-10-15 鸿富锦精密工业(深圳)有限公司 Client management system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1494022A (en) * 2002-10-30 2004-05-05 华为技术有限公司 Method accessing data bank through protocol agency mode
CN1858738A (en) * 2006-02-15 2006-11-08 华为技术有限公司 Method and device for access data bank
CN101330474A (en) * 2007-06-22 2008-12-24 鸿富锦精密工业(深圳)有限公司 System and method for managing and controlling consumer authority
CN101494651A (en) * 2009-02-11 2009-07-29 江苏敏捷科技股份有限公司 Method for active backup of data

Also Published As

Publication number Publication date
CN102801699A (en) 2012-11-28

Similar Documents

Publication Publication Date Title
CN102801699B (en) The system preventing server data from distorting, method and apparatus
CN108322461B (en) Method, system, device, equipment and medium for automatically logging in application program
CN103391216B (en) A kind of illegal external connection is reported to the police and blocking-up method
CN104869175A (en) Cross-platform account resource sharing implementation method, device and system
CN104243419A (en) Data processing method, device and system based on secure shell protocol
CN110768951B (en) Method and device for verifying system vulnerability, storage medium and electronic device
CN109861968A (en) Resource access control method, device, computer equipment and storage medium
CN102868702B (en) System login device and system login method
CN104869102A (en) Authorization method, device and system based on xAuth protocols
CN111314381A (en) Safety isolation gateway
CN111586021B (en) Remote office business authorization method, terminal and system
CN112615858B (en) Internet of things equipment monitoring method, device and system
CN105516135A (en) Method and device used for account login
CN108712376B (en) Verification method and device for server login
CN105162763B (en) Communication data processing method and device
CN113225351A (en) Request processing method and device, storage medium and electronic equipment
CN106534129A (en) Access control method and apparatus
CN104683290A (en) Method and device for monitoring phishing and terminal
CN104104650A (en) Data file visit method and terminal equipment
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN101197822A (en) System for preventing information leakage and method based on the same
CN105991619A (en) Safety authentication method and device
CA2706582C (en) Method and system for defeating the man in the middle computer hacking technique
CN107911500B (en) Method, equipment and device for positioning user based on situation awareness and storage medium
CN114726606B (en) User authentication method, client, gateway and authentication server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: 100080 Haidian District City, Zhongguancun, the main street, No. 1 Hailong building, room 1415, room 14

Applicant after: Beijing Antiy Electronic Installation Co., Ltd.

Address before: 100084, 2B-521, bright city, No. 1, Nongda South Road, Beijing, Haidian District

Applicant before: Beijing Antiy Electronic Installation Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 100080 Beijing city Haidian District minzhuang Road No. 3, Tsinghua Science Park Building 1 Yuquan Huigu a

Patentee after: Beijing ahtech network Safe Technology Ltd

Address before: 100080 Haidian District City, Zhongguancun, the main street, No. 1 Hailong building, room 1415, room 14

Patentee before: Beijing Antiy Electronic Installation Co., Ltd.

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: System, method and equipment for preventing data tampering of server

Effective date of registration: 20170821

Granted publication date: 20150729

Pledgee: CITIC Bank Harbin branch

Pledgor: Beijing ahtech network Safe Technology Ltd

Registration number: 2017990000776

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20180817

Granted publication date: 20150729

Pledgee: CITIC Bank Harbin branch

Pledgor: Beijing ahtech network Safe Technology Ltd

Registration number: 2017990000776

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: System, method and equipment for preventing data tampering of server

Effective date of registration: 20180817

Granted publication date: 20150729

Pledgee: CITIC Bank Harbin branch

Pledgor: Beijing ahtech network Safe Technology Ltd

Registration number: 2018990000700

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20191021

Granted publication date: 20150729

Pledgee: CITIC Bank Harbin branch

Pledgor: Beijing ahtech network Safe Technology Ltd

Registration number: 2018990000700

PC01 Cancellation of the registration of the contract for pledge of patent right